Defending against Malicious Threats in Wireless Sensor Network: A Mathematical Model

Full Text (PDF, 446KB), PP.12-19

Views: 0 Downloads: 0

Author(s)

Bimal Kumar Mishra 1,* Indu Tyagi 1

1. Department of Applied Mathematics, Birla Institute of Technology Mesra, Ranchi- 835215, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2014.03.02

Received: 23 Jun. 2013 / Revised: 5 Oct. 2013 / Accepted: 19 Nov. 2013 / Published: 8 Feb. 2014

Index Terms

Wireless Sensor Network, Worms, Epidemic Model, Stability

Abstract

Wireless Sensor Networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and at the same time constrained by limited battery life, processing capability, memory and bandwidth which makes it soft target of malicious objects such as virus and worms. We study the potential threat for worm spread in wireless sensor network using epidemic theory. We propose a new model Susceptible-Exposed-Infectious-Quarantine-Recovered with Vaccination (SEIQRS-V), to characterize the dynamics of the worm spread in WSN. Threshold, equilibrium and their stability are discussed. Numerical methods are employed to solve the system of equations and MATLAB is used to simulate the system. The Quarantine is a method of isolating the most infected nodes from the network till they get recovered and the Vaccination is the mechanism to immunize the network temporarily to reduce the spread worms.

Cite This Paper

Bimal Kumar Mishra, Indu Tyagi, "Defending against Malicious Threats in Wireless Sensor Network: A Mathematical Model", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.3, pp.12-19, 2014. DOI:10.5815/ijitcs.2014.03.02

Reference

[1]Akyildiz, W. Su, Y Sankarasubramaniam, and E. Cayirci, A Survey on networks, IEEE Communications Magazine, Vol.40, 8, 2002.

[2]Tang Shensheng and Mark Brian L., Analysis of virus spread in wireless sensor network, Design of Reliable Communication Networks, 2009

[3]Ferrie P., Security responses: Symbos.cabir, Tech. Report, Symantec Corporation, 2004.

[4]E. Chien, Security response: Symbos.mabir, Tech Rep., Symantec Corporation, 2005.

[5]Y. Moreno, M. Nekovee and A.Vespignani, Efficiency and reliability of epidemic data dissemination in complex networks, Physical Review E, vol. 69, pp. 1-4, May 2004.

[6]Bimal Kumar Mishra, Dinesh Kumar Saini, SEIRS epidemic model with delay for transmission of malicious objects in computer network, Applied Mathematics and Computation, 188 (2) (2007) 1476-1482.

[7]Mishra B.K., Generality of the final size formula for infected nodes due to the attack of malicious agents in a computer network, Applied Mathematics and Computation, Elsevier, 2007

[8]Mishra B.K. and Saini Dinesh Kumar, Mathematical models on computer viruses, Applied Mathematics and Computation, Elsevier, 187(2), 926-936, 2007

[9]C.C. Zou, Gong, D.Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, in: proceedings of the ACM CCS Workshop on Rapid Malcode ACM, 2003, pp. 51-60.

[10]Newman M.E.J., Forest S., Balthrop J., Email networks and the spread of computer virus, Physical Review E, 66, 035101-1 – 035101-4, 2002

[11]Kermack. W. O. and McKendrick. A. G., A contribution to the mathematical theory of epidemics, Proceedings of the Royal Society A, 115, 700–721, 1927 

[12]Bailey, N. T. J., The mathematical theory of epidemics London, Griffin, 1957 

[13]Anderson R. M. and May R. M., Infectious Diseases of Human: Dynamics and Control, Oxford, Oxford Univ. Press, 1991.

[14]Richard W.T. and Mark J.C., Modelling virus propagation in peer-to-peer networks, IEEE International Conference on Information, Communications and Signal Processing, 981-985, 2005

[15]Ping Yan and Shengqiang Liu, SEIR epidemic model with delay, Journal of Australian Mathematical Society, Series B – Applied Mathematics, 48(1), 119-134, 2006

[16]Mishra Bimal Kumar and Pandey Samir Kumar, 2011, Dynamic model of worms with vertical transmission in computer network, Applied Mathematics and Computation, Elsevier, 217, 8438–8446, 2011 

[17]Mishra Bimal Kumar and Singh Aditya Kumar,2012, Two Quarantine Models on the Attack of Malicious Objects in Computer Network, Mathematical Problems in Engineering, 1-14, 2012

[18]Kephart J.O., A biologically inspired immune system for computers, Proceedings of International Joint Conference on Artificial Intelligence, 1995

[19]T. Chen, N. Jamil, Effectiveness of quarantine in worm epidemics, in: IEEE International Conference on Communications 2006, IEEE, June 2006, pp. 2142 -2147.

[20]P. De, Y. Liu, and S. K. Das, Modeling node compromise spreading in wireless sensor networks using epidemic theory, in Proc. IEEE WoWMoM 2006, (Niagara-Falls, NY),June 2006.

[21]Bimal Kumar Mishra, Prasant Kumar Nayak, Navnit Jha, Effect of quarantine nodes in SEQIAmS model for the transmission of malicious objects in computer network, International Journal of Mathematical Modeling, Simulation and Applications,2(1), 2009,102-113.

[22]R.S. Varga, Matrix iterative analysis, Englewood cliffs, N.J: Prentice-Hall Inc., 1962.