An Individual-Based Model for Malware Propagation in Wireless Sensor Networks

In this work a novel mathematical model to simulate malware spreading in wireless sensor networks is introduced. This is an improvement of the global model (based on a system of delayed ordinary differential equations) proposed by Zhu and Zhao in 2015 ([15]). Specifically, our model follows the individual-based paradigm which allows us to consider the particular characteristics and specifications of each element of the model.

[1]  Mohamed F. Younis,et al.  A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.

[2]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[3]  Ian F. Akyildiz,et al.  A survey on wireless sensor networks for smart grid , 2015, Comput. Commun..

[4]  Shuang-Hua Yang,et al.  Wireless Sensor Networks: Principles, Design and Applications , 2013 .

[5]  Naixue Xiong,et al.  Data prediction, compression, and recovery in clustered wireless sensor networks for environmental monitoring applications , 2016, Inf. Sci..

[6]  Mauro Conti,et al.  Secure Wireless Sensor Networks , 2015, Advances in Information Security.

[7]  Athanasios V. Vasilakos,et al.  Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Xiaoming Wang,et al.  A Spatial-temporal Model for the Malware Propagation in MWSNs Based on the Reaction-Diffusion Equations , 2012, WAIM Workshops.

[9]  Yan Zhang,et al.  Security in RFID and Sensor Networks , 2009 .

[10]  Hongyong Zhao,et al.  Stability and bifurcation analysis in a delayed reaction-diffusion malware propagation model , 2015, Comput. Math. Appl..

[11]  Yurong Song,et al.  The Model of Malware Propagation in Wireless Sensor Networks with Regional Detection Mechanism , 2014, CWSN.

[12]  Mauro Conti Secure Wireless Sensor Networks: Threats and Solutions , 2015 .

[13]  Hongyong Zhao,et al.  Dynamical analysis and optimal control for a malware propagation model in an information network , 2015, Neurocomputing.

[14]  Sajal K. Das,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON MOBILE COMPUTING An Epidemic Theoretic Framework for Vulnerability Analysi , 2022 .