Influence of node mobility on virus spreading behaviors in multi-hop network

Multi-hop network has received growing attention recently with the widely use of wireless network communication technology. At the same time, the security of multi-hop network is facing more serve challenges. Unfortunately, classic techniques for computer virus spreading model cannot be applied to multi-hop network because of ignoring dynamic topology of network. In this paper, classic susceptible-infected (SI) model, susceptible-infected-susceptible (SIS) model and susceptible-infected-removed (SIR) model are applied to multi-hop network based on random way-point (RWP) model, and contact duration of virus is introduced. Virus spreading behaviors are examined through contact duration of virus, communication radius of node, distribution density of node, and the number of initial infected nodes. Simulation results show that node mobility has significant effect on virus spreading behaviors. In particular, a special node speed that can lead network to appear the fastest-spreading virus phenomenon is found. The special speed is approximately equal to the ratio of communication radius of node to contact duration of virus. Distribution density of node and the number of initial infected nodes almost do not affect the special speed.

[1]  Vijayan Sugumaran,et al.  Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media , 2016, EURASIP J. Wirel. Commun. Netw..

[2]  Ioanis Nikolaidis,et al.  On the Artifacts of Random Waypoint Simulations , 2002, International Conference on Internet Computing.

[3]  Hossam S. Hassanein,et al.  Introduction to Wireless Multi-Hop Networks , 2013 .

[4]  Hossam S. Hassanein,et al.  Routing for Wireless Multi-Hop Networks , 2013, Springer Briefs in Computer Science.

[5]  David Myers,et al.  Modified SIS epidemic model for analysis of virus spread in wireless sensor networks , 2013, Int. J. Wirel. Mob. Comput..

[6]  Yuan Zhu-zhi,et al.  The Influence of Smart Phone's Mobility on Bluetooth Worm Propagation , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[7]  Ding-Zhu Du,et al.  Ad Hoc Wireless Networking , 2004, Network Theory and Applications.

[8]  Lu-Xing Yang,et al.  A delayed computer virus propagation model and its dynamics , 2012 .

[9]  Yunhuai Liu,et al.  Crowdsourcing based social media data analysis of urban emergency events , 2017, Multimedia Tools and Applications.

[10]  Xuezhi Tan,et al.  Characteristic Analysis of Virus Spreading in Ad Hoc Networks , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).

[11]  Hannes Hartenstein,et al.  Stochastic Properties of the Random Waypoint Mobility Model , 2004, Wirel. Networks.

[12]  Poonam Garg,et al.  Impact Of Random Waypoint Mobility Model On Hybrid Routing Protocols Of Scalable Mobile Ad Hoc Network , 2013 .

[13]  Stefan Saroiu,et al.  A preliminary investigation of worm infections in a bluetooth environment , 2006, WORM '06.

[14]  Sancheng Peng,et al.  Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[15]  Brian D. Noble,et al.  Analytical Models for Epidemics in Mobile Networks , 2007 .

[16]  Dharma P. Agrawal,et al.  Introduction to Wireless and Mobile Systems , 2002 .

[17]  Brian D. Noble,et al.  Modeling epidemic spreading in mobile environments , 2005, WiSe '05.

[18]  Paolo Santi,et al.  The random waypoint mobility model with uniform node spatial distribution , 2014, Wirel. Networks.

[19]  Michalis Faloutsos,et al.  Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point , 2011, Networking.

[20]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[21]  Ma Jianfeng,et al.  Malware Propagation Model in Wireless Sensor Network , 2011 .

[22]  H Deng,et al.  ROUTING SECURITY IN AD HOC NETWORKS , 2002 .

[23]  Steve R. White,et al.  Computers and epidemiology , 1993, IEEE Spectrum.

[24]  Paolo Santi,et al.  The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[25]  Maziar Nekovee,et al.  The Opportunistic Transmission of Wireless Worms between Mobile Devices , 2008, ArXiv.

[26]  Charles B. Owen,et al.  Factors affecting the performance of ad hoc networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[27]  Ozgur Koray Sahingoz,et al.  Networking Models in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges , 2013, Journal of Intelligent & Robotic Systems.

[28]  Vasileios Karyotis,et al.  Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis , 2008, Journal of Computer Science and Technology.

[29]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[30]  Xiaofan Yang,et al.  Modeling and analysis of the spread of computer virus , 2012 .

[31]  Bruno Gonçalves,et al.  Modeling and Predicting Human Infectious Diseases , 2015, Social Phenomena.