메뉴 건너뛰기




Volumn 56, Issue 9, 2013, Pages 1-18

Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks

Author keywords

equilibrium point; malware propagation; mobile wireless sensor network; reaction diffusion equation; spatial distribution; stability; targeted immunization strategy

Indexed keywords

EQUILIBRIUM POINT; MALWARE PROPAGATION; MOBILE WIRELESS SENSOR NETWORK; REACTION DIFFUSION EQUATIONS; TARGETED IMMUNIZATION STRATEGY;

EID: 84883791574     PISSN: 1674733X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11432-013-4977-4     Document Type: Article
Times cited : (32)

References (21)
  • 1
    • 83655201468 scopus 로고    scopus 로고
    • Energy-based multiple target localization and pursuit in mobile sensor networks
    • Hu J W, Xie L H, Zhang C S. Energy-based multiple target localization and pursuit in mobile sensor networks. IEEE Trans Instrum Meas, 2012, 61: 212-220.
    • (2012) IEEE Trans Instrum Meas , vol.61 , pp. 212-220
    • Hu, J.W.1    Xie, L.H.2    Zhang, C.S.3
  • 2
    • 84862831121 scopus 로고    scopus 로고
    • Design and analysis of delay-tolerant sensor networks for monitoring and tracking free-roaming animals
    • Ehsan S, Bradford K, Brugger M, et al. Design and analysis of delay-tolerant sensor networks for monitoring and tracking free-roaming animals. IEEE Trans Wirel Commun, 2012, 11: 1220-1227.
    • (2012) IEEE Trans Wirel Commun , vol.11 , pp. 1220-1227
    • Ehsan, S.1    Bradford, K.2    Brugger, M.3
  • 3
    • 67349129674 scopus 로고    scopus 로고
    • A secure mobile healthcare system using trust-based multicast scheme
    • Boukerche A, Ren Y L. A secure mobile healthcare system using trust-based multicast scheme. IEEE J Sel Area Commun, 2009, 27: 387-399.
    • (2009) IEEE J Sel Area Commun , vol.27 , pp. 387-399
    • Boukerche, A.1    Ren, Y.L.2
  • 4
    • 84859722160 scopus 로고    scopus 로고
    • The three-tier security scheme in wireless sensor networks with mobile sinks
    • Rasheed A, Mahapatra R N. The three-tier security scheme in wireless sensor networks with mobile sinks. IEEE Trans Paral Distr, 2012, 23: 958-965.
    • (2012) IEEE Trans Paral Distr , vol.23 , pp. 958-965
    • Rasheed, A.1    Mahapatra, R.N.2
  • 5
    • 80053630581 scopus 로고    scopus 로고
    • Maximum damage battery deletion attack in mobile sensor networks
    • Khouzani M H R, Sarkar S. Maximum damage battery deletion attack in mobile sensor networks. IEEE Trans Automat Contr, 2011, 56: 2358-2368.
    • (2011) IEEE Trans Automat Contr , vol.56 , pp. 2358-2368
    • Khouzani, M.H.R.1    Sarkar, S.2
  • 6
    • 84861197180 scopus 로고    scopus 로고
    • A scalable code dissemination protocol in heterogeneous wireless sensor networks
    • Peng S L, Li S S, Liao X K, et al. A scalable code dissemination protocol in heterogeneous wireless sensor networks. Sci China Inf Sci, 2012, 55: 1323-1336.
    • (2012) Sci China Inf Sci , vol.55 , pp. 1323-1336
    • Peng, S.L.1    Li, S.S.2    Liao, X.K.3
  • 8
    • 84255190735 scopus 로고    scopus 로고
    • A malware detection model based on a negative selection algorithm with penalty factor
    • Zhang P T, Wang W, Tan Y. A malware detection model based on a negative selection algorithm with penalty factor. Sci China Inf Sci, 2010, 53: 2461-2471.
    • (2010) Sci China Inf Sci , vol.53 , pp. 2461-2471
    • Zhang, P.T.1    Wang, W.2    Tan, Y.3
  • 9
    • 84865614588 scopus 로고    scopus 로고
    • A spatial-temporal model for the malware propagation in MWSNs based on the reaction-diffusion equations
    • He Z B, Wang X M. A spatial-temporal model for the malware propagation in MWSNs based on the reaction-diffusion equations. In: Proceedings of WAIM 2012 Workshops, Harbin, 2012. 45-56.
    • (2012) Proceedings of WAIM 2012 Workshops, Harbin , pp. 45-56
    • He, Z.B.1    Wang, X.M.2
  • 10
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • Hethcote H W. The mathematics of infectious diseases. SIAM Rev, 2000, 42: 599-653.
    • (2000) SIAM Rev , vol.42 , pp. 599-653
    • Hethcote, H.W.1
  • 11
    • 26844473415 scopus 로고    scopus 로고
    • Spatial-temporal modeling of malware propagation in networks
    • Chen S Z, Ji C Y. Spatial-temporal modeling of malware propagation in networks. IEEE Trans Neural Netw, 2005, 16: 1291-1303.
    • (2005) IEEE Trans Neural Netw , vol.16 , pp. 1291-1303
    • Chen, S.Z.1    Ji, C.Y.2
  • 12
    • 58849089560 scopus 로고    scopus 로고
    • An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks
    • De P, Liu Y H, Das S K. An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks. IEEE Trans Mob Comput, 2009, 8: 413-425.
    • (2009) IEEE Trans Mob Comput , vol.8 , pp. 413-425
    • De, P.1    Liu, Y.H.2    Das, S.K.3
  • 13
    • 84861096936 scopus 로고    scopus 로고
    • Malware characteristics and threats on the Internet ecosystem
    • Chen Z Q, Roussopoulos M, Liang Z Y, et al. Malware characteristics and threats on the Internet ecosystem. J Syst Softw, 2012, 85: 1650-1672.
    • (2012) J Syst Softw , vol.85 , pp. 1650-1672
    • Chen, Z.Q.1    Roussopoulos, M.2    Liang, Z.Y.3
  • 14
    • 77957705451 scopus 로고    scopus 로고
    • Markov random fields for malware propagation: the case of chain networks
    • Karyotis V. Markov random fields for malware propagation: the case of chain networks. IEEE Commun Lett, 2010, 14: 875-877.
    • (2010) IEEE Commun Lett , vol.14 , pp. 875-877
    • Karyotis, V.1
  • 15
    • 70350136704 scopus 로고    scopus 로고
    • Wireless malware propagation: a reality check
    • Zanero S. Wireless malware propagation: a reality check. IEEE Secur Priv, 2009, 7: 70-74.
    • (2009) IEEE Secur Priv , vol.7 , pp. 70-74
    • Zanero, S.1
  • 17
    • 79251600457 scopus 로고    scopus 로고
    • A study of self-propagating mal-packets in sensor networks: attacks and defenses
    • Gu Q J, Ferguson C, Noorani R. A study of self-propagating mal-packets in sensor networks: attacks and defenses. Comput Secur, 2011, 30: 13-27.
    • (2011) Comput Secur , vol.30 , pp. 13-27
    • Gu, Q.J.1    Ferguson, C.2    Noorani, R.3
  • 18
    • 79957596079 scopus 로고    scopus 로고
    • Dynamics of malware spread in decentralized peer-to-peer networks
    • Ramachandran K K, Sikdar B. Dynamics of malware spread in decentralized peer-to-peer networks. IEEE Trans Dependable Secure Comput, 2011, 8: 617-623.
    • (2011) IEEE Trans Dependable Secure Comput , vol.8 , pp. 617-623
    • Ramachandran, K.K.1    Sikdar, B.2
  • 19
    • 77955012721 scopus 로고    scopus 로고
    • EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks
    • Wang X M, Li Q L, Li Y S. EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks. J Comb Optim, 2010, 20: 47-62.
    • (2010) J Comb Optim , vol.20 , pp. 47-62
    • Wang, X.M.1    Li, Q.L.2    Li, Y.S.3
  • 20
    • 59049100560 scopus 로고    scopus 로고
    • An improved SIR model for analysing the dynamics of worm propagation in wireless sensor networks
    • Wang X M, Li Y S. An improved SIR model for analysing the dynamics of worm propagation in wireless sensor networks. Chin J Electron, 2009, 18: 8-12.
    • (2009) Chin J Electron , vol.18 , pp. 8-12
    • Wang, X.M.1    Li, Y.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.