Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking

Authors: Haowei Chen, Kaiqi Xiong

Abstract:

We have developed a better model for understanding the dynamics of malware spread in WMNs in this paper. The suggested model provides an insight into how viral propagation with energy exhaustion and various dispersed node densities might function. Based on a theoretical examination of the suggested model, we conclude that the threshold parameter could be used to identify the dynamics of viral spread globally. When the threshold is less than 1, the virus may be contained, but if it is greater than 1, a pandemic may result. Lastly, we discuss the various viral propagation strategies in relation to the distributed node densities and communication radii in WMNs. The aforementioned numerical simulation findings could serve as a guarantee of the theoretical analyses’ correctness.

Keywords: Bluetooth Security, Malware Propagation, Wireless Mesh Networks, Stability Analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 327

References:


[1] P. De, Y. Liu, and S. K. Das, An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks, IEEE Transactions on Mobile Computing, vol. 8, no. 3, pp. 413–425, 2009
[2] S. Zanero, Wireless malware propagation: a reality check, IEEE Security and Privacy, vol. 7, no. 5, pp. 70–74, 2009.
[3] S. A. Khayam and H. Radha, Using signal processing techniques to model worm propagation over wireless sensor networks, IEEE Signal Processing Magazine, vol. 23, no. 2, pp. 164–169, 2006.
[4] G. Yan and S. Eidenbenz, Modeling propagation dynamics of bluetooth worms, IEEE Transactions on Mobile Computing, vol. 8, no. 3, pp. 353–367, 2009.
[5] I. Akyildiz and W. Wang, A survey on wireless mesh networks, IEEE Communications Magazine, vol. 43, no. 9, pp. S23-S30, Sept. 2005.
[6] C. C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis, In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002.
[7] J. W. Mickens and B. D. Noble. Modeling epidemic spreading in mobile environments, In ACMWorkshop onWireless Security (WiSE’05), 2005.
[8] M. Nekovee. Worm epidemics in wireless ad hoc networks, New Journal of Physics, 9:189–202, 2007.
[9] K. Ramachandran and B. Sikdar. Modeling malware propagation in networks of smart cell phones with spatial dynamics, In Proceedings of IEEE INFOCOM’07, 2007.
[10] K. Ramachandran and B. Sikdar. On the stability of the malware free equilibrium in cell phones networks with spatial dynamics, In IEEE International Conference on Communications (ICC’07), 2007.
[11] E. AmaldiA. CaponeM. CesanaI. FilippiniF. Malucelli.Optimization models and methods for planning wireless mesh networks Computer Networks vol 52,pp.2159 2171,2008.
[12] Yatao Yang, Ping Zeng, Xinghua Yang, Yina Huang.Efficient Intrusion Detection System Model in Wireless Mesh Network, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing
[13] K. R. Griffin, S. J. Schafrik, M. E. Karmis. Designing and Modeling wireless Mesh Communication in Underground Coal Mines, SME Annual Meeting,2010
[14] R. Renugadevi and K. Vijayalakshmi Modeling a Novel Network Coding Aware Routing Protocol for Enhancement of Network Performance in Wireless Mesh Network, Wireless Personal Communications, vol 107, pp.621–649, 2019
[15] Arindam K. Das, Hamed M. K. Alazemi, Rajiv Vijayakumar, Sumit Roy.Optimization Models for Fixed Channel Assignment in Wireless Mesh Networks with Multiple Radios, IEEE SECON, 2005.
[16] Chetan Kumar Verma, Bheemarjuna Reddy Tamma, B. S. Manoj, and Rame.A Realistic Small-World Model for Wireless Mesh Networks, IEEE Communication Letters, vol 15, No. 4, April 2011
[17] K. Tanaka, T. Hori,H.O. Wang.,A multiple Lyapunov function approach to stabilization of fuzzy, IEEE Transactions on Fuzzy Systems, vol 11, pp.582 - 589, 2003.
[18] Gjerrit Meinsma.Elementary proof of the Routh-Hurwitz test, Systems and Control Letters,vol 25, pp.237-242,1995.