Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks

WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks by introducing mobile actuator elements. Previous studies indicated that mobile actuators can improve network performance in terms of data collection, energy supplementation, etc. However, according to our experimental simulations, the actuator’s mobility also causes the sensor worm to spread faster if an attacker launches worm attacks on an actuator and compromises it successfully. Traditional worm propagation models and defense strategies did not consider the diffusion with a mobile worm carrier. To address this new problem, we first propose a microscopic mathematical model to describe the propagation dynamics of the sensor worm. Then, a two-step local defending strategy (LDS) with a mobile patcher (a mobile element which can distribute patches) is designed to recover the network. In LDS, all recovering operations are only taken in a restricted region to minimize the cost. Extensive experimental results demonstrate that our model estimations are rather accurate and consistent with the actual spreading scenario of the mobile sensor worm. Moreover, on average, the LDS outperforms other algorithms by approximately 50% in terms of the cost.

[1]  Neeli R. Prasad,et al.  Self-propagating worms in wireless sensor networks , 2009, Co-Next Student Workshop '09.

[2]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[3]  Donald F. Towsley,et al.  Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms , 2007, IEEE Transactions on Dependable and Secure Computing.

[4]  Li Xu,et al.  Worm propagation model in mobile network , 2016, Concurr. Comput. Pract. Exp..

[5]  Zhou Hanxun and Zhao Hong Modeling and Analysis of Active-Benign Worms and Hybrid-Benign Worms , 2007 .

[6]  Qijun Gu,et al.  A study of self-propagating mal-packets in sensor networks: Attacks and defenses , 2011, Comput. Secur..

[7]  Ruchuan Wang,et al.  Modeling and analysis of anti-worm in P2P networks , 2012 .

[8]  WangMeng,et al.  Worm propagation model in mobile network , 2016 .

[9]  Bimal Kumar Mishra,et al.  Mathematical model on the transmission of worms in wireless sensor network , 2013 .

[10]  Daeyoung Kim,et al.  A2S: Automated Agriculture System based on WSN , 2007, 2007 IEEE International Symposium on Consumer Electronics.

[11]  Athanasios V. Vasilakos,et al.  Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.

[12]  Sencun Zhu,et al.  Improving sensor network immunity under worm attacks: a software diversity approach , 2008, MobiHoc '08.

[13]  Shensheng Tang,et al.  A Modified SI Epidemic Model for Combating Virus Spread in Wireless Sensor Networks , 2011, Int. J. Wirel. Inf. Networks.

[14]  Xingming Sun,et al.  Efficient algorithm for k-barrier coverage based on integer linear programming , 2016, China Communications.

[15]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[16]  Md. Rafiqul Islam,et al.  Anomaly Detection in Wireless Sensor Network , 1969, J. Networks.

[17]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[18]  Sandeep S. Kulkarni,et al.  Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[19]  Sajal K. Das,et al.  Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, Ad Hoc Networks.

[20]  S. Subha,et al.  Message authentication and wormhole detection mechanism in wireless sensor network , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).

[21]  Tian Wang,et al.  Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks , 2016, Int. J. Distributed Sens. Networks.

[22]  M. Srbinovska,et al.  Environmental parameters monitoring in precision agriculture using wireless sensor networks , 2015 .

[23]  Bimal Kumar Mishra,et al.  Optimal Control Model for Attack of Worms in Wireless Sensor Network , 2014 .

[24]  Jiannong Cao,et al.  Following Targets for Mobile Tracking in Wireless Sensor Networks , 2016, ACM Trans. Sens. Networks.

[25]  Ziyad S. Al-Salloum Defensive computer worms: an overview , 2012, Int. J. Secur. Networks.

[26]  Sencun Zhu,et al.  Improving sensor network immunity under worm attacks: A software diversity approach , 2016, Ad Hoc Networks.

[27]  Hao Wang,et al.  A measure system of zero moment point using wearable inertial sensors , 2016, China Communications.

[28]  Nilesh K. Modi,et al.  Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in Ad hoc Networks , 2014 .

[29]  Li-Ping Feng,et al.  Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network , 2015 .

[30]  Adel Torkaman Rahmani,et al.  Malware propagation modeling considering software diversity and immunization , 2016, J. Comput. Sci..

[31]  K DasSajal,et al.  Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, AdhocNets 2012.

[32]  Walid Abdallah,et al.  A location-aware authentication and key management scheme for wireless sensor networks , 2016, 2016 22nd Asia-Pacific Conference on Communications (APCC).

[33]  Michalis Faloutsos,et al.  Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point , 2011, Networking.

[34]  Daniel P. W. Ellis,et al.  White Worms Don't Work , 2006, Login: The Usenix Magazine.

[35]  Jun Zhang,et al.  Modeling and Analysis on the Propagation Dynamics of Modern Email Malware , 2014, IEEE Transactions on Dependable and Secure Computing.

[36]  Wanlei Zhou,et al.  On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[37]  Steven Myers,et al.  Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm , 2011, LEET.

[38]  Yuxiang Wang,et al.  Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..

[39]  Bin Wang,et al.  P2P Anti-worm: Modeling and Analysis of a New Worm Counter-measurement Strategy , 2008, 2008 The 9th International Conference for Young Computer Scientists.