Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries

  • Baik Hoh
  • Marco Gruteser


Detection Probability Intrusion Detection Propagation Speed Road Segment Intrusion Detection System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    DSRC-5GHz-Standards-Group. Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems - 5GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications. ASTM E2213-03, 2003.Google Scholar
  2. 2.
    Qing Xu, Raja Sengupta, and Daniel Jiang. Design and analysis of highway safety communication protocol in 5.9 ghz dedicated short range communication spectrum. In IEEE VTC Spring 2003, April 2003.Google Scholar
  3. 3.
    Jijun Yin, Tamer ElBatt, Gavin Yeung, Bo Ryu, Stephen Habermas, Hariharan Krishnan, and Timothy Talty. Performance evaluation of safety applications over dsrc vehicular ad hoc networks. In VANET ’04: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, pages 1–, 2004.Google Scholar
  4. 4.
    Jing Su, Kelvin K.W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, and Ashvin Goel. A preliminary investigation of worm infections in a bluetooth environment. In WORM –06: Proceedings of the 4th ACM workshop on Recurring malcode, pages 9–16, New York, NY, USA, 2006. ACM Press.Google Scholar
  5. 5.
    Abhijit Bose and Kang G. Shin. On mobile viruses exploiting messaging and bluetooth services. In Proceedings of IEEE/Create-Net SecureComm 2006, Baltimore, MD, USA, August 2006.Google Scholar
  6. 6.
    Reuters. Mobile phone virus infects helsinki championships: The cabir virus uses bluetooth to jump between cell phones. securitytopics/security/virus/story/0,10801,103835,00.html, Aug 2005.Google Scholar
  7. 7.
    ZDNet-UK. Year-old bluetooth vulnerability invites mobile worm. http://news.,39020375,39162400,00.htm, Aug 2004.Google Scholar
  8. 8.
    Xatrix-Security. Widcomm bluetooth connectivity software multiple buffer overflow vulnerabilities.,Aug 2004.Google Scholar
  9. 9.
    David Dagon, Tom Martin, and Thad Starner. Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing, 3(4):11–15, 2004.CrossRefGoogle Scholar
  10. 10.
    Peter Szor. The Art of Computer Virus Research and Defense. Addison-Wesley Professional,symantec press, 2005.Google Scholar
  11. 11.
    Grant A. Jacoby, Randy Marchany, and Nathaniel J. Davis IV. Using battery constraints within mobile hosts to improve network security. IEEE Security and Privacy, 4(5):40–49, 2006.CrossRefGoogle Scholar
  12. 12.
    Ross J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, January 2001.Google Scholar
  13. 13.
    Thomas Martin, Michael Hsiao, Dong Ha, and Jayan Krishnaswami. Denial-of-service attacks on battery-powered mobile computers. percom, 00:309, 2004.Google Scholar
  14. 14.
    Yongguang Zhang and Wenke Lee. Intrusion detection in wireless ad-hoc networks. In The Sixth International Conference on Mobile Computing and Networking (MobiCom). ACM, August 2000.Google Scholar
  15. 15.
    Farooq Anjum, Dhanant Subhadrabandhu, and Saswati Sarkar. Intrusion detection for wireless adhoc networks. In Proceedings of Vehicular Technology Conference, Wireless Security Symposium. IEEE, October 2003.Google Scholar
  16. 16.
    Open-Interface. Bluetooth security overview. service_additions/security_whitepaper_docpage.html,Dec 2005.Google Scholar
  17. 17.
    Open-Mobile-Alliance. Provisioning architecture overview. http://www. V1_ 1-20050428-C/OMA-WAP-ProvArch-v1_1-20050428-C.pdf,Apr 2005.Google Scholar
  18. 18.
    Quadstone-Limited. Paramics v4.0 - microscopic traffic simulation system. www. Scholar
  19. 19.
    Stuart Staniford, Vern Paxson, and Nicholas Weaver. How to own the internet in your spare time. In Proceedings of the 11th USENIX Security Symposium, pages 149–167, Berkeley, CA, USA, 2002. USENIX Association.Google Scholar
  20. Akira Okubo and Simon A. Levin. Diffusion and Ecological Problems: Modern Perspectives. Springer, 2002.Google Scholar
  21. 21.
    C. S. Elton. The Ecology of Invasions by Animals and Plants. Methuen Co. Ltd., London, 1958.Google Scholar
  22. 22.
    J. G. Skellam. Random dispersal in theoretical populations. Biometrika, 38(4):196–218, 1951.MATHGoogle Scholar
  23. 23.
    Muhammad Sadiq. Toxic metal chemistry in marine environments. CRC, New York, 1992.Google Scholar
  24. 24.
    MathWorks-Inc. Overlaying polygons with set logic. http://www.mathworks. de/access/helpdesk/help/toolbox/map/polybool.html, 2005.Google Scholar
  25. 25.
    Darel R. Finley. Point-in-polygon algorithm: Determining whether a point is inside a complex polygon., 1998.Google Scholar
  26. 26.
    N. T. Bailey. The Mathematical Theory of Infectious Diseases and its Applications. Hafner Press, New York, 1975.MATHGoogle Scholar
  27. K. Ozbay and B. Bartin. South jersey real-time motorist information system. NJDOT Project Report, March 2003.Google Scholar
  28. 28.
    J. P. Hubaux, S. Capkun, and J. Luo. The security and privacy of smart vehicles. IEEE Security and Privacy Magazine, 2(3):49–55, June 2004.CrossRefGoogle Scholar
  29. 29.
    M. Raya and J. P. Hubaux. The security of vehicular ad hoc networks. In Proceedings of SASN’05, November 2005.Google Scholar
  30. 30.
    H. Wu, R. Fujimoto, and G. Riley. Analytical models for data dissemination in vehicleto-vehicle networks. In Proceedings of IEEE 2004-fall Vehicle Technology Conference (VTC), September 2004.Google Scholar
  31. 31.
    Linda Briesemeister, Lorenz Schafers, and Gunter Hommel. Disseminating messages among highly mobile hosts based on inter-vehicle communication. In IEEE Intelligent Vehicles Symposium, October 2000.Google Scholar
  32. 32.
    Samir Goel, Tomasz Imielinski, and Kaan Ozbay. Ascertaining the viability of wifi based vehicle-to-vehicle network for traffic information dissemination. In Proceedings of the 7th Annual IEEE Intelligent Transportation Systems Conference (ITSC), October 2004.Google Scholar
  33. 33.
    Zang Li, Wade Trappe, Yanyong Zhang, and Badri Nath. Robust statistical methods for securing wireless localization in sensor networks. In IPSN, pages 91–98, 2005.Google Scholar
  34. 34.
    S. Forrest, S. Hofmeyr, and A. Somayaji. Computer immunology. Communications of the ACM, 40(10):88–96, 1997.CrossRefGoogle Scholar
  35. 35.
    M. E. J. Newman, S. Forrest, and J. Balthrop. Email networks and the spread of computer viruses. Physical Review, 66(035101), 2002.Google Scholar
  36. 36.
    David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage. Internet quarantine: Requirements for containing self-propagating code. In INFOCOM. ACM, 2003.Google Scholar
  37. 37.
    Syed A. Khayam and Hayder Radha. Analyzing the spread of active worms over vanet. In Proceedings of the first ACM workshop on Vehicular ad hoc networks, January 2004.Google Scholar
  38. 38.
    Abhijit Bose and Kang G. Shin. Proactive security for mobile messaging networks. In WiSe –06: Proceedings of the 5th ACM workshop on Wireless security, pages 95–104, New York, NY, USA, 2006. ACM Press. 166 Hoh and GruteserGoogle Scholar
  39. 39.
    A. Mishra, K. Nadkarni, and A. Patcha. Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, 11:48–60, 2004.CrossRefGoogle Scholar
  40. 40.
    K. Iwata, K. Kawasaki, and N. Shigesada. A dynamical model for the growth and size distribution of multiple metastatic tumors. Journal of theoretical biology, 203(2): 177–186, 2000.CrossRefGoogle Scholar
  41. 41.
    N. Shigesada, K. Kawasaki, and Y. Takeda. Modeling stratified diffusion in biological invasions. American Naturalist, 146(2):229–251, 1995.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Baik Hoh
    • 1
  • Marco Gruteser
    • 1
  1. 1.WINLAB, ECE Department Rutgers, The State UniversityNew Jersey

Personalised recommendations