INFORMATION CHANGE THE WORLD

International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.9, No.12, Dec. 2017

The SEIQR–V Model: On a More Accurate Analytical Characterization of Malicious Threat Defense

Full Text (PDF, 1087KB), PP.28-37


Views:76   Downloads:3

Author(s)

ChukwuNonso H. Nwokoye, Ikechukwu I. Umeh

Index Terms

Epidemic model;Wireless sensor network;Worm;Communication range;Distribution density

Abstract

Epidemic models have been used in recent times to model the dynamics of malicious codes in wireless sensor network (WSN). This is due to its open nature which provides an easy target for malware attacks aimed at disrupting the activities of the network or at worse, causing total failure of the network. The Susceptible-Exposed-Infectious-Quarantined-Recovered–Susceptible with a Vaccination compartment (SEIQR-V) model by Mishra and Tyagi is one of such models that characterize worm dynamics in WSN. However, a critical analysis of this model and WSN epidemic literature shows that it is absent essential factors such as communication range and distribution density. Therefore, we modify the SEIQR-V model to include these factors and to generate better reproduction ratios for the introduction of an infectious sensor into a susceptible sensor population. The symbolic solutions of the equilibriums were derived for two topological expressions culled from WSN literature. A suitable numerical method was used to solve, simulate and validate the modified model. Simulation results show the effect of our modifications.

Cite This Paper

ChukwuNonso H. Nwokoye, Ikechukwu I. Umeh, "The SEIQR–V Model: On a More Accurate Analytical Characterization of Malicious Threat Defense", International Journal of Information Technology and Computer Science(IJITCS), Vol.9, No.12, pp.28-37, 2017. DOI: 10.5815/ijitcs.2017.12.04

Reference

[1]A. Bröring, J. Echterhoff and Simon Jirka, "New Generation Sensor Web Enablement," Sensors, vol. 11, pp. 2652–2699, 2011. 

[2]S. Yinbiao, K. Lee, P. Lanctot, and F. Jianbin. Internet of Things : Wireless Sensor Networks, 2014.

[3]C. H. Nwokoye, I. Umeh, M. Nwanze, and B. F. Alao. 2015. Analyzing Time Delay and Sensor Distribution in Sensor Networks. IEEE African Journal of Computing & ICT, vol. 8, pp. 159–164, 2015.

[4]S. Singh and A. Malik, "Heterogenous energy efficient protocol for enhncing the lifetime in WSNs", International Journal of Information Technology and Computer Science, vol 9, pp. 62-72, 2016

[5]W. O. Kermack and A. G. McKendrick, "A Contribution to the Mathematical Theory of Epidemics," Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 115, pp. 700–721, 1927. 

[6]W. O. Kermack and A. G. McKendrick, "Contributions to the mathematical theory of epidemics. ii. the problem of endemicity," Proceedings of the Royal Society of London. Series A., vo1. 38i834, pp. 55–83, 1932.

[7]W. O. Kermack and A. G. McKendrick, "Contributions to the mathematical theory of epidemics. III. Further studies of the problem of endemicity," Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, vol. 141, pp. 94–122, 1933.

[8]S. A. Khayam and H. Radha, "A topologically-aware worm propagation model for wireless sensor networks", 25th IEEE International Conference on Distributed Computing Systems Workshops, IEEE, pp. 210–216, 2005.

[9]S. A. Khayam and H. Radha, "Using Signal Processing Techniques to Model Worm Propagation over Wireless Sensor Networks," IEEE Signal Processing Magazine, pp. 164–169, 2006.

[10]P. De, Y. Liu, and S. K. Das, "Modeling node compromise spread in wireless sensor networks using epidemic theory," International Symposium on on World of Wireless, Mobile and Multimedia Networks, IEEE Computer Society, pp. 237–243, 2006.

[11]P. De, Y. Liu, and S. K. Das, "An epidemic theoretic framework for evaluating broadcast protocols in wireless sensor networks. 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, IEEE, pp 1–9, 2007.

[12]P. De, Y. Liu, and S. K. Das. 2009. Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Transactions on Sensor Networks (TOSN) vol. 5, pp. 3-23, 2009.

[13]S. Tang and B. L. Mark, "Analysis of virus spread in wireless sensor networks: An epidemic model," Proceedings of the 2009 7th International Workshop on the Design of Reliable Communication Networks, DRCN 2009: pp. 86–91, 2009. http://doi.org/10.1109/DRCN.2009.5340022

[14]X. Wang and Y. Li, "An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks," Chinese Journal of Electronics, vol. 18, 2009.

[15]X. Wang, Q. Li, and Y. Li, "EiSIRS: A formal model to analyze the dynamics of worm propagation in wireless sensor networks," Journal of Combinatorial Optimization, vol. 20, pp. 47–62, 2010. http://doi.org/10.1007/s10878-008-9190-9

[16]S. Tang, "A modified SI epidemic model for combating virus spread in wireless sensor networks." International Journal of Wireless Information Networks, vol. 18, pp. 319–326, 2011.

[17]B. K. Mishra and N. Keshri, "Mathematical model on the transmission of worms in wireless sensor network," Applied Mathematical Modelling vol. 37, pp. 4103–4111, 2013. http://doi.org/10.1016/j.apm.2012.09.025

[18]Y. Wang and X. Yang, "Virus spreading in wireless sensor networks with a medium access control mechanism," Chinese Physics B, vol. 22, 40200-40206, 2013. http://doi.org/10.1088/1674-1056/22/4/040206

[19]B. K. Mishra, S. K. Srivastava, and B. K. Mishra, "A quarantine model on the spreading behavior of worms in wireless sensor network. Transaction on IoT and Cloud Computing, vol. 2, pp. 1–12, 2014.

[20]B. K. Mishra and I. Tyagi, "Defending against malicious threats in wireless sensor network: A mathematical model", International Journal of Information Technology and Computer Science, vol. 6, pp. 12–19, 2014. 

[21]Z. Zhang and F. Si, "Dynamics of a delayed SEIRS-V model on the transmission of worms in a wireless sensor network," Advances in Difference Equations: 1–15, 2014. http://doi.org/http://www.advancesindifferenceequations.com/content/2014/1/295

[22]L. Feng, L. Song, Q. Zhao, and H. Wang, “Modeling and stability analysis of worm propagation in wireless sensor network. Mathematical Problems in Engineering 2015.

[23]C. H. Nwokoye, V. E. Ejiofor and C. G. Ozoegwu, "Pre-Quarantine approach for defense against propagation of malicious objects in networks," International Journal of Computer Network and Information Security (IJCNIS), vol. 9, pp. 43-52, 2017. doi:10.5815/ijcnis.2017.02.06

[24]C. H. Nwokoye, V. E. Ejiofor, R. Orji, I. Umeh, and N. N. Mbeledogu. Investigating the effect of uniform random distribution of nodes in wireless sensor networks using an epidemic worm model. CORI'16, pp. 58-63, 2016.

[25]B. K. Mishra and S. K. Pandey, "Dynamic model of worms with vertical transmission in computer network," Applied Mathematics and Computation, vol. 217, pp. 8438–8446, 2011.

[26]B. K. Mishra and A. Singh, "Global Stability of Worms in Computer Network," Applications and Applied Mathematics,An International Journal vol. 5, pp. 1511–1528, 2010.