Defending against Malicious Threats in Wireless Sensor Network: A Mathematical Model

Wireless Sensor Networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and at the same time constrained by limited battery life, processing capability, memory and bandwidth which makes it soft target of malicious objects such as virus and worms. We study the potential threat for worm spread in wireless sensor network using epidemic theory. We propose a new model Susceptible- Exposed-Infectious-Quarantine-Recovered with Vaccination (SEIQRS-V), to characterize the dynamics of the worm spread in WSN. Threshold, equilibrium and their stability are discussed. Numerical methods are employed to solve the system of equations and MATLAB is used to simulate the system. The Quarantine is a method of isolating the most infected nodes from the network till they get recovered and the Vaccination is the mechanism to immunize the network temporarily to reduce the spread worms.

[1]  J. Gillis,et al.  Matrix Iterative Analysis , 1961 .

[2]  Brian L. Mark,et al.  Analysis of virus spread in wireless sensor networks: An epidemic model , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.

[3]  Donald F. Towsley,et al.  Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.

[4]  Shengqiang Liu,et al.  SEIR epidemic model with delay , 2006 .

[5]  Sajal K. Das,et al.  Modeling node compromise spread in wireless sensor networks using epidemic theory , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[6]  A. J. Hall Infectious diseases of humans: R. M. Anderson & R. M. May. Oxford etc.: Oxford University Press, 1991. viii + 757 pp. Price £50. ISBN 0-19-854599-1 , 1992 .

[7]  Thomas M. Chen,et al.  Effectiveness of Quarantine in Worm Epidemics , 2006, 2006 IEEE International Conference on Communications.

[8]  Jeffrey O. Kephart,et al.  A biologically inspired immune system for computers , 1994 .

[9]  N. Bailey The mathematical theory of epidemics , 1957 .

[10]  Alessandro Vespignani,et al.  Efficiency and reliability of epidemic data dissemination in complex networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[11]  R. May,et al.  Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.

[12]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[13]  Dinesh Kumar Saini,et al.  SEIRS epidemic model with delay for transmission of malicious objects in computer network , 2007, Appl. Math. Comput..

[14]  Bimal Kumar Mishra,et al.  Mathematical models on computer viruses , 2007, Appl. Math. Comput..

[15]  Bimal Kumar Mishra WITHDRAWN: Generality of the final size formula for infected nodes due to the attack of malicious agents in a computer network , 2007 .

[16]  Stephanie Forrest,et al.  Email networks and the spread of computer viruses. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[17]  Bimal Kumar Mishra,et al.  Two Quarantine Models on the Attack of Malicious Objects in Computer Network , 2012 .

[18]  Bimal Kumar Mishra,et al.  Dynamic model of worms with vertical transmission in computer network , 2011, Appl. Math. Comput..

[19]  R.W. Thommes,et al.  Modeling Virus Propagation in Peer-to-Peer Networks , 2005, 2005 5th International Conference on Information Communications & Signal Processing.

[20]  W. O. Kermack,et al.  A contribution to the mathematical theory of epidemics , 1927 .