scholarly journals Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network

2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Liping Feng ◽  
Lipeng Song ◽  
Qingshan Zhao ◽  
Hongbin Wang

An improved SIRS model considering communication radius and distributed density of nodes is proposed. The proposed model captures both the spatial and temporal dynamics of worms spread process. Using differential dynamical theories, we investigate dynamics of worm propagation to time in wireless sensor networks (WSNs). Reproductive number which determines global dynamics of worm propagation in WSNs is obtained. Equilibriums and their stabilities are also found. If reproductive number is less than one, the infected fraction of the sensor nodes disappears and if the reproduction number is greater than one, the infected fraction asymptotically stabilizes at the endemic equilibrium. Based on the reproduction number, we discuss the threshold of worm propagation about communication radius and distributed density of nodes in WSNs. Finally, numerical simulations verify the correctness of theoretical analysis.

Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2126 ◽  
Author(s):  
Lijun Wang ◽  
Jia Yan ◽  
Tao Han ◽  
Dexiang Deng

Based on the connectivity and energy consumption problems in wireless sensor networks, this paper proposes a kind of new network algorithm called the connectivity and energy efficiency (CEE) algorithm to guarantee the connectivity and connectivity probability, and also to reduce the network energy consumption as much as possible. Under the premise that all sensors can communicate with each other in a specific communication radius, we obtained the relationship among the connectivity, the number of sensor nodes, and the communication radius because of the theory of probability and statistics. The innovation of the paper is to maximize the network connectivity and connectivity probability, by choosing which types of sleeping nodes to wake up. According to the node’s residual energy and the relative value of distance, the algorithm reduces the energy consumption of the whole network as much as possible, and wakes up the number of neighbor nodes as little as possible, to improve the service life of the whole network. Simulation results show that this algorithm combines the connectivity and the energy efficiency, provides a useful reference value for the normal operation of the sensors networks.


2008 ◽  
Vol 136 (12) ◽  
pp. 1667-1677 ◽  
Author(s):  
G. CHOWELL ◽  
C. A. TORRE ◽  
C. MUNAYCO-ESCATE ◽  
L. SUÁREZ-OGNIO ◽  
R. LÓPEZ-CRUZ ◽  
...  

SUMMARYThe weekly number of dengue cases in Peru, South America, stratified by province for the period 1994–2006 were analysed in conjunction with associated demographic, geographic and climatological data. Estimates of the reproduction number, moderately correlated with population size (Spearman ρ=0·28, P=0·03), had a median of 1·76 (IQR 0·83–4·46). The distributions of dengue attack rates and epidemic durations follow power-law (Pareto) distributions (coefficient of determination >85%, P<0·004). Spatial heterogeneity of attack rates was highest in coastal areas followed by mountain and jungle areas. Our findings suggest a hierarchy of transmission events during the large 2000–2001 epidemic from large to small population areas when serotypes DEN-3 and DEN-4 were first identified (Spearman ρ=−0·43, P=0·03). The need for spatial and temporal dengue epidemic data with a high degree of resolution not only increases our understanding of the dynamics of dengue but will also generate new hypotheses and provide a platform for testing innovative control policies.


2015 ◽  
Vol 2015 ◽  
pp. 1-6 ◽  
Author(s):  
Jun-Won Ho

Wireless sensor networks are vulnerable to sensor worm attacks in which the attacker compromises a few nodes and makes these compromised nodes initiate worm spread over the network, targeting the worm infection of the whole nodes in the network. Several defense mechanisms have been proposed to prevent worm propagation in wireless sensor networks. Although these proposed schemes use software diversity technique for worm propagation prevention under the belief that different software versions do not have common vulnerability, they have fundamental drawback in which it is difficult to realize the aforementioned belief in sensor motes. To resolve this problem, we propose on-demand software-attestation based scheme to defend against worm propagation in sensor network. The main idea of our proposed scheme is to perform software attestations against sensor nodes in on-demand manner and detect the infected nodes by worm, resulting in worm propagation block in the network. Through analysis, we show that our proposed scheme defends against worm propagation in efficient and robust manner. Through simulation, we demonstrate that our proposed scheme stops worm propagation at the reasonable overhead while preventing a majority of sensor nodes from being infected by worm.


2021 ◽  
Vol 7 ◽  
pp. e728
Author(s):  
Xuejin Zhu ◽  
Jie Huang

Due to limited resources, wireless sensor network (WSN) nodes generally possess weak defense capabilities and are often the target of malware attacks. Attackers can capture or infect specific sensor nodes and propagate malware to other sensor nodes in WSNs through node communication. This can eventually infect an entire network system and even cause paralysis. Based on epidemiological theory, the present study proposes a malware propagation model suitable for cluster-based WSNs to analyze the propagation dynamic of malware. The model focuses on the data-transmission characteristics between different nodes in a cluster-based network and considers the actual application parameters of WSNs, such as node communication radius, node distributed density, and node death rate. In addition, an attack and defense game between malware and defending systems is also established, and the infection and recovery rates of malware propagation under the mixed strategy Nash equilibrium condition are given. In particular, the basic reproductive number, equilibrium point, and stability of the model are derived. These studies revealed that a basic reproductive number of less than 1 leads to eventual disappearance of malware, which provides significant insight into the design of defense strategies against malware threats. Numerical experiments were conducted to validate the theory proposed, and the influence of WSN parameters on malware propagation was examined.


Malware (worm, virus, malicious signals, etc.) propagation in Wireless Sensor Network (WSN) is one of the important concern. The WSN becomes unstable due to presence of malicious signals. Vulnerability of WSN is very high because of the structural constraint of sensor nodes. The attackers target a sensor node of WSN for malware attack. A single infected node starts to spread the malware in the entire network through neighbouring nodes. Therefore, for controlling of malware propagation in WSN a mathematical model is developed. The developed model is based on epidemic theory. The developed model consist of five states such as Susceptible-Infectious-Quarantine-Vaccination-Dead (SIQVD). The quarantine is a method through which to cease the infection spread in WSN. And through vaccination eliminate the malware from the network. The combination of quarantine and vaccination technique improves the network stability. This technique prevents malware propagation in WSN. The basic reproduction number ( ) of the model is deduced. The stability of the network depends on the value of basic reproduction number. It is found that if the value of is less than one the network system exist in malware-fee state, otherwise in endemic state. The equilibrium points of the system is obtained. The effects of quarantine and vaccination has been analyzed on system performance. The theoretical findings are verified by simulation results. Attack Epidemic model Equilibrium point Malware propagation Security Wireless Sensor Network


2011 ◽  
Author(s):  
M. Leonard ◽  
N. Ferjan Ramirez ◽  
C. Torres ◽  
M. Hatrak ◽  
R. Mayberry ◽  
...  

Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


2020 ◽  
Vol 637 ◽  
pp. 117-140 ◽  
Author(s):  
DW McGowan ◽  
ED Goldstein ◽  
ML Arimitsu ◽  
AL Deary ◽  
O Ormseth ◽  
...  

Pacific capelin Mallotus catervarius are planktivorous small pelagic fish that serve an intermediate trophic role in marine food webs. Due to the lack of a directed fishery or monitoring of capelin in the Northeast Pacific, limited information is available on their distribution and abundance, and how spatio-temporal fluctuations in capelin density affect their availability as prey. To provide information on life history, spatial patterns, and population dynamics of capelin in the Gulf of Alaska (GOA), we modeled distributions of spawning habitat and larval dispersal, and synthesized spatially indexed data from multiple independent sources from 1996 to 2016. Potential capelin spawning areas were broadly distributed across the GOA. Models of larval drift show the GOA’s advective circulation patterns disperse capelin larvae over the continental shelf and upper slope, indicating potential connections between spawning areas and observed offshore distributions that are influenced by the location and timing of spawning. Spatial overlap in composite distributions of larval and age-1+ fish was used to identify core areas where capelin consistently occur and concentrate. Capelin primarily occupy shelf waters near the Kodiak Archipelago, and are patchily distributed across the GOA shelf and inshore waters. Interannual variations in abundance along with spatio-temporal differences in density indicate that the availability of capelin to predators and monitoring surveys is highly variable in the GOA. We demonstrate that the limitations of individual data series can be compensated for by integrating multiple data sources to monitor fluctuations in distributions and abundance trends of an ecologically important species across a large marine ecosystem.


Sign in / Sign up

Export Citation Format

Share Document