IJMECS Vol. 9, No. 11, 8 Nov. 2017
Cover page and Table of Contents: PDF (size: 1128KB)
Full Text (PDF, 1128KB), PP.49-57
Views: 0 Downloads: 0
Epidemic Theory, Wireless Sensor Networks, Network Access Control, Random Distribution
Sensor networks are appealing targets for malicious attacks that invade the network with the aim of depleting the confidentiality, availability and integrity (CIA) features/parameters of neighboring sensor nodes. This is due to its open communication, minimal resources and its deployment in un-trusted, unguarded and unfriendly terrains. To restrict illegitimate users or malicious attackers (such as worms) network analysts have suggested network access control (NAC). Specifically, we apply NAC to wireless sensor network epidemic models in order to investigate distribution density, transmission range and sensor area/field. Our analyses involved analytical expressions of two sensor fields gleaned from literature. Additionally, we explored the possibilities of infectivity of sensor nodes at the exposed class using the two expressions for sensor field topologies. We also derived the reproduction ratios and solutions at several equilibrium points for the models. It is our hope that that our work herein would impact sensor deployment decisions for organizations that utilize wireless sensor networks for meaningful daily activities.
ChukwuNonso H. Nwokoye, Njideka Mbeledogu, Ikechukwu I. Umeh, Ihekeremma, A. Ejimofor, "Modeling the effect of Network Access Control and Sensor Random Distribution on Worm Propagation", International Journal of Modern Education and Computer Science(IJMECS), Vol.9, No.11, pp. 49-57, 2017. DOI:10.5815/ijmecs.2017.11.06
[1]I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “Wireless sensor networks: A survey”, Computer Networks, vol. 38, 4, pp. 393–422, 2002.
[2]D. Buch and D. Jinwala, “Prevention of wormhole attack in wireless sensor network”, International Journal of Network Security & Its Applications (IJNSA), vol. 3, pp. 85–98, 2011.
[3]C. H. Nwokoye, I. Umeh, M. Nwanze, B. F. Alao, “Analyzing time delay and sensor distribution in sensor networks”, IEEE African Journal of Computing & ICT 8, vol. 1, pp. 159–164, 2015.
[4]A. Gupta and A. K. Gupta, “A survey: Detection and prevention of wormhole attack in wireless sensor networks”, Global Journal of Computer Science and Technology: E Network, Web & Security, vol. 14, pp. 23–31, 2014.
[5]C. H. Nwokoye, V. E. Ejiofor, R. Orji, I. Umeh and N. Mbeledogu, Investigating the effect of uniform random distribution of nodes in wireless sensor networks using an epidemic worm model”, Proceedings of the 2nd International Conference on Computing Research and Innovations (CoRI’16), pp. 58–63, 2016.
[6]T. Giannetsos, T. Dimitriou and N. R. Prasad, “Self-propagating worms in wireless sensor networks”, ACM CoNEXT - Student Workshop’09, pp. 31–32, 2009.
[7]U. Narayanan and A. Soman, “Attack and counter measurement of worm hole and false data injection in wireless sensor networks: A survey. International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, pp 2–6, 2013.
[8]W. O. Kermack and A. G. McKendrick, "A Contribution to the Mathematical Theory of Epidemics," Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 115, pp. 700–721, 1927.
[9]W. O. Kermack and A. G. McKendrick, "Contributions to the mathematical theory of epidemics. ii. the problem of endemicity," Proceedings of the Royal Society of London. Series A., vo1. 38i834, pp. 55–83, 1932.
[10]W. O. Kermack and A. G. McKendrick, "Contributions to the mathematical theory of epidemics. III. Further studies of the problem of endemicity," Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, vol. 141, pp. 94–122, 1933.
[11]B. K. Mishra and D. K. Saini, “Mathematical models on computer viruses”, Applied Mathematics and Computation, vol. 187, pp. 929–936, 2007.
[12]T. Richard and C. Mark, “Epidemiological modelling of peer-to-peer viruses and pollution”. Proceedings - IEEE INFOCOM, 2006.
[13]B. K. Mishra and N. Keshri, "Mathematical model on the transmission of worms in wireless sensor network," Applied Mathematical Modelling vol. 37, pp. 4103–4111, 2013. http://doi.org/10.1016/j.apm.2012.09.025
[14]L. Chunbo and J. Chunfu, “Modeling passive propagation of malwares on the WWW”, Physics Procedia, vol. 33, pp. 271–278, 2012.
[15]Y. Yao, L. Guo, H. Guo, G. Yu, F. X. Gao and X. J. Tong, “Pulse quarantine strategy of internet worm propagation: Modeling and analysis”, Computers and Electrical Engineering, vol. 38, pp. 1047–1061, 2012.
[16]S. A. Khayam and H. Radha, "A topologically-aware worm propagation model for wireless sensor networks", 25th IEEE International Conference on Distributed Computing Systems Workshops, IEEE, pp. 210–216, 2005.
[17]S. A. Khayam and H. Radha, "Using Signal Processing Techniques to Model Worm Propagation over Wireless Sensor Networks," IEEE Signal Processing Magazine, pp. 164–169, 2006.
[18]P. De, Y. Liu, and S. K. Das, "An epidemic theoretic framework for evaluating broadcast protocols in wireless sensor networks. 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, IEEE, pp 1–9, 2007.
[19]S. Tang and Brian L. Mark, "Analysis of virus spread in wireless sensor networks: An epidemic model," Proceedings of the 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009: pp. 86–91, 2009. http://doi.org/10.1109/DRCN.2009.5340022
[20]X. Wang and Y. Li, "An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks," Chinese Journal of Electronics, vol. 18, 2009.
[21]X. Wang, Q. Li, and Y. Li, "EiSIRS: A formal model to analyze the dynamics of worm propagation in wireless sensor networks," Journal of Combinatorial Optimization, vol. 20, pp. 47–62, 2010. http://doi.org/10.1007/s10878-008-9190-9
[22]Y. Wang and X. Yang, "Virus spreading in wireless sensor networks with a medium access control mechanism," Chinese Physics B, vol. 22, 40200-40206, 2013. http://doi.org/10.1088/1674-1056/22/4/040206
[23]B. K. Mishra, S. K. Srivastava, and B. K. Mishra, "A quarantine model on the spreading behavior of worms in wireless sensor network. Transaction on IoT and Cloud Computing, vol. 2, pp. 1–12, 2014.
[24]B. K. Mishra and I. Tyagi, "Defending against malicious threats in wireless sensor network: A mathematical model", International Journal of Information Technology and Computer Science, vol. 6, pp. 12–19, 2014.
[25]Z. Zhang and F. Si, "Dynamics of a delayed SEIRS-V model on the transmission of worms in a wireless sensor network," Advances in Difference Equations: pp. 1–15, 2014. http://doi.org/http://www.advancesindifferenceequations.com/content/2014/1/295
[26]L. Feng, L. Song, Q. Zhao, and H. Wang, “Modeling and stability analysis of worm propagation in wireless sensor network. Mathematical Problems in Engineering, 2015.
[27]I. Butun and R. Sankar, “A brief survey of access control in wireless sensor networks”, The 8th Annual IEEE Consumer Communications and Networking Conference, pp. 1118–1119, 2011.
[28]Y. Zhou, Y. Zhang, and Y. Fang, “Access control in wireless sensor networks”, Ad Hoc Networks, vol. 5, pp. 3–13, 2007.
[29]C. H. Nwokoye, V. E. Ejiofor and C. G. Ozoegwu, "Pre-Quarantine approach for defense against propagation of malicious objects in networks," International Journal of Computer Network and Information Security (IJCNIS), vol. 9, pp. 43-52, 2017. doi:10.5815/ijcnis.2017.02.06
[30]O. Diekmann, J. A. P. Heesterbeek and J. A. J. Metz, “On the definition and the computation of the basic reproduction ratio r0 in models for infectious diseases in heterogeneous populations. Journal of Mathematical Biology, vol. 28, pp. 365–382, 1990.
[31]B. K. Mishra and S. K. Pandey, "Dynamic model of worms with vertical transmission in computer network," Applied Mathematics and Computation, vol. 217, pp. 8438–8446, 2011.
[32]S. Yinbiao, K. Lee and P. Lanctot, “Internet of Things:Wireless Sensor Networks, 2014.
[33]C. H. Nwokoye, V. E. Ejiofor, M. O. Onyesolu and B. Ekechukwu,"Towards modeling malicious agents in decentralized wireless sensor networks: a case of vertical worm transmissions and containment", International Journal of Computer Network and Information Security (IJCNIS), vol.9, pp.12-21, 2017. DOI: 10.5815/ijcnis.2017.09.02.