Skip to main content

An Individual-Based Model for Malware Propagation in Wireless Sensor Networks

  • Conference paper
  • First Online:
Distributed Computing and Artificial Intelligence, 13th International Conference

Abstract

In this work a novel mathematical model to simulate malware spreading in wireless sensor networks is introduced. This is an improvement of the global model (based on a system of delayed ordinary differential equations) proposed by Zhu and Zhao in 2015 ([15]). Specifically, our model follows the individual-based paradigm which allows us to consider the particular characteristics and specifications of each element of the model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akkaya, K., Younis, M.: A survey on routing protocols for wireless sensor networks. Ad Hoc Netw. 3, 325–349 (2005)

    Article  Google Scholar 

  2. Conti, M.: Secure Wireless Sensor Networks. Threats and Solutions. Advances in Information Security, vol. 65. Springer, NY (2015)

    Google Scholar 

  3. De, P., Liu, Y., Das, S.K.: An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks. IEEE. Trans. Mob. Comput. 8(3), 413–425 (2009)

    Article  Google Scholar 

  4. Fadel, E., Gungor, V.C., Nassef, L., Akkari, N., Malik, M.G.A., Almasri, S., Akyildiz, I.F.: A survey on wireless sensor networks for smart grid. Comput. Commun. 71, 22–33 (2015)

    Article  Google Scholar 

  5. He, Z., Wang, X.: A spatial-temporal model for the malware propagation in MWSNs based on the reaction-diffusion equations. In: Bao, Z., Gao, Y., Gu, Y., Guo, L., Li, Y., Lu, J., Ren, Z., Wang, Ch., Zhang, X. (eds.) Proceedings of WAIM 2012. LNCS, vol. 7419, pp. 45–56. Springer, Berlin (2012)

    Google Scholar 

  6. Hu, J., Song, Y.: The model of malware propagation in wireless sensor networks with regional detection mechanism. Commun. Comput. Inf. Sci. 501, 651–662 (2015)

    Article  Google Scholar 

  7. Jorgensen, S.E., Fath, B.D.: Individual-Based Model. Dev. Env. Model. 23, 291–308 (2011)

    Google Scholar 

  8. Railsback, S.F., Grimm, V.: Agent-Based and Individual-Based Modeling. Princeton University Press, NJ (2012)

    MATH  Google Scholar 

  9. Shen, S., Li, H., Han, R., et al.: Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Trans. Inf. Forensic Secur. 9(11), 1962–1973 (2014)

    Article  Google Scholar 

  10. Wolfram, S.: A New Kind of Science. Wolfram Media, IL (2002)

    MATH  Google Scholar 

  11. Wu, M., Tan, L., Xiong, N.: Data prediction, compression and recovery in clustered wireless sensor networks for environmental monitoring applications. Inf. Sci. 239, 800–818 (2016)

    Article  Google Scholar 

  12. Yang, S.H.: Wireless sensor networks. Principles, design and applications. Springer-Verlag, London (2014)

    Google Scholar 

  13. Yick, J., Mukherjee, B., Ghosai, D.: Wireless sensor network survey. Comput. Netw. 52(12), 2292–2330 (2009)

    Article  Google Scholar 

  14. Zhang, Y., Kitsos, P.: Security in RFID and Sensor Networks. Auerbach Publications, Boca Raton (2009)

    Book  Google Scholar 

  15. Zhu, L., Zhao, H.: Dynamical analysis and optimal control for a malware propagation model in an information network. Neurocomputing 149, 1370–1386 (2015)

    Article  Google Scholar 

  16. Zhu, L., Zhao, H., Wang, X.: Stability and bifurcation analysis in a delayed reaction-diffusion malware propagation model. Comput. Math. Appl. 69, 852–875 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Martín del Rey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

del Rey, A.M., Hernández Encinas, A., Hernández Guillén, J.D., Martín Vaquero, J., Queiruga Dios, A., Rodríguez Sánchez, G. (2016). An Individual-Based Model for Malware Propagation in Wireless Sensor Networks. In: Omatu, S., et al. Distributed Computing and Artificial Intelligence, 13th International Conference. Advances in Intelligent Systems and Computing, vol 474. Springer, Cham. https://doi.org/10.1007/978-3-319-40162-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-40162-1_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-40161-4

  • Online ISBN: 978-3-319-40162-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics