Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory

Published: 04 June 2009 Publication History

Abstract

Motivated by recently surfacing viruses that can spread over the air interfaces, in this article, we investigate the potentially disastrous threat of node compromise spreading in wireless sensor networks. We assume such a compromise originating from a single infected node, can propagate to other sensor nodes via communication and pre-established mutual trust. We focus on the possible epidemic breakout of such propagations where the whole network may fall victim to the attack. Using epidemic theory, we model and analyze this spreading process and identify key factors determining potential outbreaks. In particular, we perform our study on random graphs precisely constructed according to the parameters of the network, such as distance, key sharing constrained communication and node recovery, thereby reflecting the true characteristics therein. Moreover, a comparative study of the epidemic propagation is performed based on the effects of two types of sensor deployment strategies, viz., uniform random and group-based deployment. The analytical results provide deep insights in designing potential defense strategies against this threat. Furthermore, through extensive simulations, we validate the model and perform investigations on the system dynamics. Our analysis and simulation results indicate that the uniform random deployment is more vulnerable to an epidemic outbreak than the group based deployment strategy.

References

[1]
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. A survey on sensor networks. Comm. Mag. 40, 8, 102--114.
[2]
Alarifi, A. and Du, W. 2006. Diversify sensor nodes to improve resilience against node compromise. In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06), 101--112.
[3]
Anderson, R. M. and May, R. M. 1992. Infectious Diseases of Humans: Dynamics and Control. Oxford University Press.
[4]
Bailey, N. 1975. The Mathematical Theory of Infectious Diseases and Its Applications. Griffin, London.
[5]
Barthlemy, M., Barrat, A., Pastor-Satorras, R., and Vespignani, A. 2004. Velocity and hierarchical spread of epidemic outbreaks in scale-free networks. Phys. Rev. Lett. 92, 178701.
[6]
Bettstetter, C. 2002. On the minimum node degree and connectivity of a wireless multihop network. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, 80--91.
[7]
Braginsky, D. and Estrin, D. 2002. Rumor routing algorthim for sensor networks. In C. S. Raghavendra and K. M. Sivalingam (Eds.), Proceedings of the ACM International Workshop on Wireless Sensor Networks and Applications, 22--31.
[8]
Callaway, D. S., Newman, M. E. J., Strogatz, S. H., and Watts, D. J. 2000. Network robustness and fragility: Percolation on random graphs. Phys. Rev. Lett. 85, 5468.
[9]
Chadha, A., Liu, Y., and Das, S. K. 2005. Group key distribution via local collaboration in wireless sensor networks. In Proceedings of the IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON).
[10]
Chan, H., Gligor, V. D., Perrig, A., and Muralidharan, G. 2005. On the distribution and revocation of cryptographic keys in sensor networks. IEEE Trans. Depend. Sec. Comput. 2, 3, 233--247.
[11]
Chan, H., Perrig, A., and Song, D. X. 2003. Random key predistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy, 197--213.
[12]
Chong, C.-Y. and Kumar, S. P. 2003. Sensor networks: evolution, opportunities, and challenges. Proc. IEEE 91, 8, 1247--1256.
[13]
De, P., Liu, Y., and Das, S. K. 2006. Modeling node compromise spread in wireless sensor networks using epidemic theory. In WOWMOM, 237--243.
[14]
Du, W., Deng, J., Han, Y. S., Chen, S., and Varshney, P. K. 2004. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies, 597.
[15]
Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., and Khalili, A. 2005. A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8, 2, 228--258.
[16]
Eschenauer, L. and Gligor, V. D. 2002. A key-management scheme for distributed sensor networks. In V. Atluri (Ed.), Proceedings of the ACM Conference on Computer and Communications Security, 41--47.
[17]
Goel, A., Rai, S., and Krishnamachari, B. 2004. Sharp thresholds for monotone properties in random geometric graphs. In L. Babai (Ed.), Proceedings of the Annual ACM Symposium on Theory of Computing, 580--586.
[18]
Hethcote, H. W. 2000. The mathematics of infectious diseases. SIAM Rev. 42, 4, 599--653.
[19]
Hui, J. W. and Culler, D. E. 2004. The dynamic behavior of a data dissemination protocol for network programming at scale. In J. A. Stankovic, A. Arora, and R. Govindan (Eds.), Proceedings of the International Conference on Embedded Networked Sensor Systems, 81--94.
[20]
Kephart, J. O. and White, S. R. 1993. Measuring and modeling computer virus prevalence. In Proceedings of the IEEE Symposium on Security and Privacy (SP'93), 2.
[21]
Kephart, J. O., White, S. R., and Chess, D. M. 1993. Computers and epidemiology. IEEE Spectr. 30, 5, 20--26.
[22]
Levis, P., Patel, N., Culler, D., and Shenker, S. 2004. Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation (NSDI'04). 2--2.
[23]
Liu, D. and Ning, P. 2003. Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03), 52--61.
[24]
Malan, D., Welsh, M., and Smith, M. 2004. A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In Proceedings of the IEEE International Conference on Sensor and Ad Hoc Communications and Network (SECON'04).
[25]
May, R. M. and Lloyd, A. L. 2001. Infection dynamics on scale-free networks. Phys. Rev. E 64, 6, 066112.
[26]
Moore, C. and Newman, M. E. J. 2000. Epidemics and percolation in small-world networks. Phys. Rev. E 61, 5, 5678--5682.
[27]
Newman, M. E. J. 2002. The spread of epidemic disease on networks. Phys. Rev. Lett. 66, 016128.
[28]
Newman, M. E. J., Strogatz, S. H., and Watts, D. J. 2001. Random graphs with arbitrary degree distributions and their applications. Phys. Rev. E 64, 026118.
[29]
Pastor-Satorras, R. and Vespignani, A. 2001a. Epidemic dynamics and endemic states in complex networks. Phys. Rev. E 63, 6, 066117.
[30]
Pastor-Satorras, R. and Vespignani, A. 2001b. Epidemic spreading in scale-free networks. Phys. Rev. Lett. 86, 14, 3200--3203.
[31]
Penrose, M. D. 1999. On k-connectivity for a geometric random graph. Random Struct. Algorithms, 15, 2, 145--164.
[32]
Pietro, R. D., Mei, A., Mancini, L. V., Panconesi, A., and Radhakrishnan, J. 2006. Sensor networks that are provably resilient. In Proceedings of the 2nd IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm and Workshops'06).
[33]
Staniford, S., Paxson, V., and Weaver, N. 2002. How to own the internet in your spare time. In Proceedings of the 11th USENIX Security Symposium. 149--167.
[34]
Stauffer, D. 1985. Introduction to Percolation Theory (1 ed.). Taylor und Franci, London.
[35]
Wang, L. 2004. Mnp: multihop network reprogramming service for sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems (SenSys'04). 285--286.
[36]
Yagan, O. and Makowski, A. M. 2008. On the random graph induced by a random key predistribution scheme under full visibility. In Proceedings of the IEEE International Symposium on Information Theory (ISIT'08), 1--10.
[37]
Yu, Z. and Guan, Y. 2005. A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN'05), 35.

Cited By

View all
  • (2024)Dynamic properties of the multimalware attacks in wireless sensor networks: Fractional derivative analysis of wireless sensor networksOpen Physics10.1515/phys-2023-019022:1Online publication date: 26-Feb-2024
  • (2024)Comprehensive analysis of a stochastic wireless sensor network motivated by Black-Karasinski processScientific Reports10.1038/s41598-024-59203-314:1Online publication date: 16-Apr-2024
  • (2024)A General Study on the Malware Propagation Models in Wireless Sensor NetworksComputational Science and Its Applications – ICCSA 2024 Workshops10.1007/978-3-031-65223-3_6(83-99)Online publication date: 1-Jul-2024
  • Show More Cited By

Recommendations

Reviews

Yan Liu

A wireless sensor network (WSN) is typically composed of spatially distributed sensors to monitor physical or environmental conditions. Each node in this network is equipped with a wireless signal transmitter and receiver; thus, information detected by sensors can be transmitted node by node to the central processing unit (CPU). This architecture provides an easy route for computer viruses to spread over air interfaces. Therefore, substantial work has focused on defending against virus propagation in such a network. De, Liu, and Das investigate the process of node compromise spreading in WSNs. They propose an analytical model to estimate the probability of a breakout and the number of affected nodes. Three key factors are introduced for the first time: the pairwise key scheme used in the network, the node deployment scheme of the network, and the node recovery strategy. The analytical results indicate that a uniform random deployment is more vulnerable to virus propagation than a Gaussian deployment, and the pairwise key scheme and the node recovery strategy can impact the spreading of the epidemic and the recovery speed of the whole network. The authors perform extensive simulations and verify their conclusions. The main contribution of the paper is the derivation of the analytical model to describe the epidemic propagation process in WSNs, by considering three key factors that are missing from other models. The model proposed provides potential solutions in network design and optimization, to fight the spreading of viruses. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Sensor Networks
ACM Transactions on Sensor Networks  Volume 5, Issue 3
May 2009
284 pages
ISSN:1550-4859
EISSN:1550-4867
DOI:10.1145/1525856
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 04 June 2009
Accepted: 01 June 2008
Revised: 01 July 2007
Received: 01 January 2007
Published in TOSN Volume 5, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Random key predistribution
  2. epidemic theory
  3. group-based deployment
  4. random graph
  5. sensor networks

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Dynamic properties of the multimalware attacks in wireless sensor networks: Fractional derivative analysis of wireless sensor networksOpen Physics10.1515/phys-2023-019022:1Online publication date: 26-Feb-2024
  • (2024)Comprehensive analysis of a stochastic wireless sensor network motivated by Black-Karasinski processScientific Reports10.1038/s41598-024-59203-314:1Online publication date: 16-Apr-2024
  • (2024)A General Study on the Malware Propagation Models in Wireless Sensor NetworksComputational Science and Its Applications – ICCSA 2024 Workshops10.1007/978-3-031-65223-3_6(83-99)Online publication date: 1-Jul-2024
  • (2023)Lévy impact on the transmission of worms in wireless sensor network: Stochastic analysisResults in Physics10.1016/j.rinp.2023.10675752(106757)Online publication date: Sep-2023
  • (2023)A multi objective optimization modeling in WSN for enhancing the attacking efficiency of node capture attackInternational Journal of System Assurance Engineering and Management10.1007/s13198-023-02048-214:6(2187-2207)Online publication date: 19-Aug-2023
  • (2022)A novel SEIRA Epidemic model for Wireless Sensor Network to mitigate the propagation of Malware through Antidotal nodes2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)10.1109/ICAC3N56670.2022.10074212(1779-1784)Online publication date: 16-Dec-2022
  • (2022)Survey on Enterprise Internet-of-Things systems (E-IoT)Ad Hoc Networks10.1016/j.adhoc.2021.102728125:COnline publication date: 1-Feb-2022
  • (2021) SIR 1 R 2 : Characterizing Malware Propagation in WSNs With Second Immunization IEEE Access10.1109/ACCESS.2021.30865319(82083-82093)Online publication date: 2021
  • (2021)Influence of Clamor on the Transmission of Worms in Remote Sensor NetworkWireless Personal Communications: An International Journal10.1007/s11277-020-08024-4118:1(461-473)Online publication date: 1-May-2021
  • (2021)A Black Widow Optimization Algorithm (BWOA) for Node Capture Attack to Enhance the Wireless Sensor Network ProtectionProceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing10.1007/978-981-33-4968-1_47(603-617)Online publication date: 6-Apr-2021
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media