Skip to main content

Modeling Malware Propagation Dynamics and Developing Prevention Methods in Wireless Sensor Networks

  • Chapter
  • First Online:
Nonlinear Combinatorial Optimization

Abstract

Modeling malware propagation dynamics and developing prevention methods are very imperative with flourishing and advancement of WSN technologies in a variety of fields, such as smart cities. In the last decade, a lot of effort has been put into designing effective models to characterize the propagation dynamics of malware and developing effective prevention methods, with different focuses such as spatial–temporal model, pulse immunization, trade-off model between prevention cost and network utility, etc. This chapter reviews the state-of-the-art malware modeling and prevention method to present a comprehensive guide on how to choose a more appropriate approach for different applications. First, the application background and definitions of WSNs and malware are introduced, followed by the challenges of modeling malware propagation dynamics and developing prevention methods. Second, the recent advances in modeling and prevention methods are summarized. Third, four recently published papers that focus on spatial–temporal modeling, pulse immunization, and cost-efficiency trade-off are introduced. Finally, this chapter is ended by pointing out some possible future research directions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 69.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rashid, B., Rehmani, M.H.: Applications of wireless sensor networks for urban areas: a survey. J. Netw. Comput. Appl. 60, 192–219 (2016)

    Article  Google Scholar 

  2. Kurt, S., Yildiz, H.U., Yigit, M., Tavli, B., Gungor, V.C.: Packet size optimization in wireless sensor networks for smart grid applications. IEEE Trans. Ind. Electron. 64(3), 2392–2401 (2017)

    Article  Google Scholar 

  3. Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., Khan, M.K.: A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Netw. 9(15), 2643–2655 (2016)

    Article  Google Scholar 

  4. Lu, C., Saifullah, A., Li, B., Sha, M., Gonzalez, H., Gunatilaka, D., Wu, C., Nie, L., Chen, Y.: Real-time wireless sensor-actuator networks for industrial cyber-physical systems. Proc. IEEE 104(5), 1013–1024 (2016)

    Article  Google Scholar 

  5. Wu, J., Ota, K., Dong, M., Li, C.: A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4(4), 416–424 (2016)

    Article  Google Scholar 

  6. Fadel, E., Gungor, V.C., Nassef, L., Akkari, N., Malik, M.A., Almasri, S., Akyildiz, I.F.: A survey on wireless sensor networks for smart grid. Comput. Commun. 71, 22–33(2015)

    Article  Google Scholar 

  7. Xu, G., Shen, W., Wang, X.: Applications of wireless sensor networks in marine environment monitoring: a survey. Sensors 14(9), 16932–16954 (2014)

    Article  Google Scholar 

  8. Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S.: Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secure Comput. 12(1), 98–110 (2015)

    Article  Google Scholar 

  9. Luo, X., Zhang, D., Yang, L.T., Liu, J., Chang, X., Ning, H.: A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for the cyber-physical systems. Futur. Gener. Comput. Syst. 61, 85–96 (2016)

    Article  Google Scholar 

  10. Shen, S., Li, H., Han, R., Vasilakos, A.V., Wang, Y., Cao, Q.: Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 9(11), 1962–1973 (2014)

    Article  Google Scholar 

  11. Liu, B., Zhou, W., Gao, L., Wen, S., Luan, T.H.: Mobility increases the risk of malware propagations in wireless networks. In: Trustcom/BigDataSE/ISPA, 2015 IEEE, vol. 1, pp. 90–95. IEEE, Piscataway (2015)

    Google Scholar 

  12. De, P., Liu, Y., Das, S.K.: An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks. IEEE Trans. Mob. Comput. 8(3), 413–425 (2009)

    Article  Google Scholar 

  13. Haghighi, M.S., Wen, S., Xiang, Y., Quinn, B., Zhou, W.: On the race of worms and patches: Modeling the spread of information in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 11(12), 2854–2865 (2016)

    Article  Google Scholar 

  14. Illiano, V.P., Lupu, E.C.: Detecting malicious data injections in wireless sensor networks: a survey. ACM Comput. Surv. CSUR 48(2), 24 (2015)

    Google Scholar 

  15. Wang, T., Wu, Q., Wen, S., Cai, Y., Tian, H., Chen, Y., Wang, B.: Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks. Sensors 17(1), 139 (2017)

    Article  Google Scholar 

  16. Osanaiye, O., Alfa, A.S., Hancke, G.P.: A statistical approach to detect jamming attacks in wireless sensor networks. Sensors 18(6), 1691 (2018)

    Article  Google Scholar 

  17. Dâmaso, A., Rosa, N., Maciel, P.: Integrated evaluation of reliability and power consumption of wireless sensor networks. Sensors 17(11), 2547 (2017)

    Article  Google Scholar 

  18. Wang, X., He, Z., Zhao, X., Lin, C., Pan, Y., Cai, Z.: Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks. Sci. China Inf. Sci. 56(9), 1–18 (2013)

    Google Scholar 

  19. He, Z., Wang, X.: A spatial-temporal model for the malware propagation in MWSNs based on the reaction-diffusion equations. In: International Conference on Web-Age Information Management, pp. 45–56. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  20. Xiaoming, W., Zaobo, H., Lichen, Z.: A pulse immunization model for inhibiting malware propagation in mobile wireless sensor networks. Chin. J. Electron. 23(CJE-4), 810–815 (2014)

    Google Scholar 

  21. He, Z., Cai, Z., Wang, X.: Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks. In: 2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS), pp. 205–214. IEEE, Piscataway (2015)

    Google Scholar 

  22. He, Z., Cai, Z., Yu, J., Wang, X., Sun, Y., Li, Y.: Cost-efficient strategies for restraining rumor spreading in mobile social networks. IEEE Trans. Veh. Technol. 66(3), 2789–2800 (2017)

    Article  Google Scholar 

  23. Sun, B., Osborne, L., Xiao, Y., Guizani, S.: Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wirel. Commun. 14(5), 56–63 (2007)

    Article  Google Scholar 

  24. Wang, J., Jiang, C., Zhang, K., Quek, T.Q., Ren, Y., Hanzo, L.: Vehicular sensing networks in a smart city: Principles, technologies and applications. IEEE Wirel. Commun. 25(1), 122–132 (2018)

    Article  Google Scholar 

  25. Ojha, R.P., Srivastava, P.K., Sanyal, G.: Pre-vaccination and quarantine approach for defense against worms propagation of malicious objects in wireless sensor networks. Int. J. Inf. Syst. Model. Des. IJISMD 9(1), 1–20 (2018)

    Article  Google Scholar 

  26. Zhang, Z., Wang, H., Wang, C., Fang, H.: Cluster-based epidemic control through smartphone-based body area networks. IEEE Trans. Parallel Distrib. Syst. 26(3), 681–690 (2015)

    Article  Google Scholar 

  27. Mishra, B.K., Tyagi, I.: Defending against malicious threats in wireless sensor network: a mathematical model. Int. J. Inf. Technol. Comput. Sci. IJITCS 6(3), 12 (2014)

    Google Scholar 

  28. Nwokoye, C.H., Ozoegwu, G.C., Ejiofor, V.E.: Pre-quarantine approach for defense against propagation of malicious objects in networks. Int. J. Comput. Netw. Inf. Secur. 9(2), 43 (2017)

    Google Scholar 

  29. Sookhak, M., Tang, H., He, Y., Yu, F.R.: Security and privacy of smart cities: a survey, research issues and challenges. In: IEEE Communications Surveys and Tutorials (2018)

    Google Scholar 

  30. Braun, T., Fung, B.C., Iqbal, F., Shah, B.: Security and privacy challenges in smart cities. Sustain. Cities Soc. 39, 499–507 (2018)

    Article  Google Scholar 

  31. Khatoun, R., Zeadally, S.: Cybersecurity and privacy solutions in smart cities. IEEE Commun. Mag. 55(3), 51–59 (2017)

    Article  Google Scholar 

  32. Can, O., Sahingoz, O.K.: A survey of intrusion detection systems in wireless sensor networks. In: 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), pp. 1–6. IEEE, Piscataway (2015)

    Google Scholar 

  33. Radhappa, H., Pan, L., Xi Zheng, J., Wen, S.: Practical overview of security issues in wireless sensor network applications. Int. J. Comput. Appl. 40(4), 1–12 (2017)

    Google Scholar 

  34. Chen, H., Lou, W.: On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. Pervasive Mob. Comput. 16, 36–50 (2015)

    Article  Google Scholar 

  35. Mallela, S.S., Jonnalagadda, S.K.: Internet security—a brief review. In: Microelectronics, Electromagnetics and Telecommunications, pp. 889–894. Springer, Singapore (2018)

    Google Scholar 

  36. del Rey, A.M., Peinado, A.: Mathematical models for malware propagation in wireless sensor networks: an analysis. In: Computer and Network Security Essentials, pp. 299–313. Springer, Cham (2018)

    Google Scholar 

  37. Peng, S., Yu, S., Yang, A.: Smartphone malware and its propagation modeling: a survey. IEEE Commun. Surv. Tutorials 16(2), 925–941 (2014)

    Article  Google Scholar 

  38. Feng, L., Song, L., Zhao, Q., Wang, H.: Modeling and stability analysis of worm propagation in wireless sensor network. Math. Probl. Eng. 2015 (2015)

    MathSciNet  MATH  Google Scholar 

  39. Zhu, L., Zhao, H.: Dynamical analysis and optimal control for a malware propagation model in an information network. Neurocomputing 149, 1370–1386 (2015)

    Article  Google Scholar 

  40. Liu, B., Zhou, W., Gao, L., Zhou, H., Luan, T.H., Wen, S.: Malware propagations in wireless ad hoc networks. IEEE Trans. Dependable Secure Comput. (1), 1–1 (2016)

    Google Scholar 

  41. Batista, F.K., del Rey, Á.M., Queiruga-Dios, A.: Malware propagation software for wireless sensor networks. In: International Conference on Practical Applications of Agents and Multi-Agent Systems, pp. 238–241. Springer, Berlin (2017)

    Google Scholar 

  42. Lin, Y., Wang, X., Hao, F., Wang, L., Zhang, L., Zhao, R.: An on-demand coverage based self-deployment algorithm for big data perception in mobile sensing networks. Futur. Gener. Comput. Syst. 82, 220–234 (2018)

    Article  Google Scholar 

  43. Lu, J., Wang, X., Zhang, L.: Signal power random fading based interference-aware routing for wireless sensor networks. Wirel. Netw. 20(7), 1715–1727 (2014)

    Article  Google Scholar 

  44. Wang, X., Lin, Y., Zhao, Y., Zhang, L., Liang, J., Cai, Z.: A novel approach for inhibiting misinformation propagation in human mobile opportunistic networks. Peer-to-Peer Netw. Appl. 10(2), 377–394 (2017)

    Article  Google Scholar 

  45. Wang, X., Lin, Y., Zhang, S., Cai, Z.: A social activity and physical contact-based routing algorithm in mobile opportunistic networks for emergency response to sudden disasters. Enterp. Inf. Syst. 11(5), 597–626 (2017)

    Article  Google Scholar 

  46. Lin, Y., Wang, X., Zhang, L., Li, P., Zhang, D., Liu, S.: The impact of node velocity diversity on mobile opportunistic network performance. J. Netw. Comput. Appl. 55, 47–58 (2015)

    Article  Google Scholar 

  47. Wang, X., Lin, Y., Zhang, L., Cai, Z.: A double pulse control strategy for misinformation propagation in human mobile opportunistic networks. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 571–580. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  48. Wang, X., Zhang, L., Dou, W., Hu, X.: Fuzzy colored time petri net and termination analysis for fuzzy event-condition-action rules. Inf. Sci. 232, 225–240 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  49. Zhang, L., Wang, X., Lu, J., Li, P., Cai, Z.: An efficient privacy preserving data aggregation approach for mobile sensing. Secur. Commun. Netw. 9(16), 3844–3853 (2016)

    Article  Google Scholar 

  50. Cheng, S.-M., Ao, W.C., Chen, P.-Y., Chen, K.-C.: On modeling malware propagation in generalized social networks. IEEE Commun. Lett. 15(1), 25–27 (2011)

    Article  Google Scholar 

  51. Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P., Ribagorda, A.: Evolution, detection and analysis of malware for smart devices. IEEE Commun. Surv. Tutorials 16(2), 961–987 (2014)

    Article  Google Scholar 

  52. Shen, S., Huang, L., Liu, J., Champion, A.C., Yu, S., Cao, Q.: Reliability evaluation for clustered WSNs under malware propagation. Sensors 16(6), 855 (2016)

    Article  Google Scholar 

  53. Yu, S., Gu, G., Barnawi, A., Guo, S., Stojmenovic, I.: Malware propagation in large-scale networks. IEEE Trans. Knowl. Data Eng. 27(1), 170–179 (2015)

    Article  Google Scholar 

  54. Liu, Y., Dong, M., Ota, K., Liu, A.: ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 11(9), 2013–2027 (2016)

    Article  Google Scholar 

  55. Shen, S., Ma, H., Fan, E., Hu, K., Yu, S., Liu, J., Cao, Q.: A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion. J. Netw. Comput. Appl. 91, 26–35 (2017)

    Article  Google Scholar 

  56. Liu, L., Ko, R.K., Ren, G., Xu, X.: Malware propagation and prevention model for time-varying community networks within software defined networks. Secur. Commun. Netw. 2017 (2017)

    Google Scholar 

  57. Lu, Y., Da Xu, L.: Internet of things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J. 13pp. (2018). https://doi.org/10.1109/JIOT.2018.2869847

    Article  Google Scholar 

  58. Duan, W., Fan, Z., Zhang, P., Guo, G., Qiu, X.: Mathematical and computational approaches to epidemic modeling: a comprehensive review. Front. Comp. Sci. 9(5), 806–826 (Oct 2015)

    Article  Google Scholar 

  59. Colizza, V., Pastor-Satorras, R., Vespignani, A.: Reaction–diffusion processes and metapopulation models in heterogeneous networks. Nat. Phys. 3(4), 276 (2007)

    Article  Google Scholar 

  60. Doi, M.: Stochastic theory of diffusion-controlled reaction. J. Phys. A Math. Gen. 9(9), 1479 (1976)

    Article  Google Scholar 

  61. Hirsch, M.W., Smale, S., Devaney, R.L.: Differential Equations, Dynamical Systems, and an Introduction to Chaos. Academic, Amsterdam (2012)

    MATH  Google Scholar 

  62. Wang, X., Zhang, L., Lin, Y., Zhao, Y., Hu, X.: Computational models and optimal control strategies for emotion contagion in the human population in emergencies. Knowl.-Based Syst. 109, 35–47 (2016)

    Article  Google Scholar 

  63. Kopp, R.E.: Pontryagin maximum principle. In: Mathematics in Science and Engineering, vol. 5, pp. 255–279. Elsevier, New York (1962)

    Google Scholar 

  64. Mishra, B.K., Srivastava, S.K., Mishra, B.K.: A quarantine model on the spreading behavior of worms in wireless sensor network. Trans. IoT Cloud Comput. 2(1), 1–12 (2014)

    Article  Google Scholar 

  65. Li, F., Yang, Y., Wu, J.: CPMC: An efficient proximity malware coping scheme in smartphone-based mobile networks. In: INFOCOM, 2010 Proceedings IEEE, pp. 1–9. IEEE, Piscataway (2010)

    Google Scholar 

  66. Tang, S., Mark, B.L.: Analysis of virus spread in wireless sensor networks: an epidemic model. In: 7th International Workshop on Design of Reliable Communication Networks, 2009. DRCN 2009, pp. 86–91. IEEE, Piscataway (2009)

    Google Scholar 

  67. Sun, X., Lu, Z., Zhang, X., Salathé, M., Cao, G.: Targeted vaccination based on a wireless sensor system. In: 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 215–220. IEEE, Piscataway (2015)

    Google Scholar 

  68. Gardner, M.T., Beard, C., Medhi, D.: Using SEIRS epidemic models for IoT botnets attacks. In: Proceedings of DRCN 2017-Design of Reliable Communication Networks; 13th International Conference, pp. 1–8. VDE, Berlin (2017)

    Google Scholar 

  69. Perko, L.: Differential Equations and Dynamical Systems, vol. 7. Springer Science and Business Media, New York (2013)

    MATH  Google Scholar 

  70. Wang, Y., Li, D., Dong, N.: Cellular automata malware propagation model for WSN based on multi-player evolutionary game. IET Netw. 7(3), 129–135 (2017)

    Article  Google Scholar 

  71. García, G.G., Ramirez, M.E.L.: Modeling the spatio-temporal dynamics of worm propagation in smartphones based on cellular automata. In: Modelling Symposium (EMS), 2016, European, pp. 196–201. IEEE, Piscataway (2016)

    Google Scholar 

  72. Peng, S., Wang, G.: Worm propagation modeling using 2d cellular automata in Bluetooth networks. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 282–287. IEEE, Piscataway (2011)

    Google Scholar 

  73. Zhao, Y., Wang, X., Li, L.: Research on mobile cellular automata model for public sentiment dissemination in opportunistic networks. Appl. Res. Comput. 2 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhipeng Cai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

He, Z., Lin, Y., Liang, Y., Wang, X., Vera Venkata Sai, A.M., Cai, Z. (2019). Modeling Malware Propagation Dynamics and Developing Prevention Methods in Wireless Sensor Networks. In: Du, DZ., Pardalos, P., Zhang, Z. (eds) Nonlinear Combinatorial Optimization. Springer Optimization and Its Applications, vol 147. Springer, Cham. https://doi.org/10.1007/978-3-030-16194-1_10

Download citation

Publish with us

Policies and ethics