Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 896187, 13 pages
http://dx.doi.org/10.1155/2013/896187
Research Article

An Efficient Patch Dissemination Strategy for Mobile Networks

1Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
2National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
3College of Mathematics and Information Science, Shandong Institute of Business and Technology, Shandong, Yantai 264005, China

Received 8 June 2013; Accepted 5 July 2013

Academic Editor: Ming Li

Copyright © 2013 Dawei Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Wang, M. C. González, C. A. Hidalgo, and A.-L. Barabasi, “Understanding the spreading patterns of mobile phone viruses,” Science, vol. 324, no. 5930, pp. 1071–1076, 2009. View at Publisher · View at Google Scholar · View at Scopus
  2. S.-M. Cheng, W. C. Ao, P.-Y. Chen, and K.-C. Chen, “On modeling malware propagation in generalized social networks,” IEEE Communications Letters, vol. 15, no. 1, pp. 25–27, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. G. Yan and S. Eidenbenz, “Modeling propagation dynamics of bluetooth worms (Extended version),” IEEE Transactions on Mobile Computing, vol. 8, no. 3, pp. 353–367, 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. P. De, Y. Liu, and S. K. Das, “An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 8, no. 3, pp. 413–425, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Toma, “Advanced signal processing and command synthesis for memory-limited complex systems,” Mathematical Problems in Engineering, vol. 2012, Article ID 927821, 13 pages, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  6. E. G. Bakhoum and C. Toma, “Specific mathematical aspects of dynamics generated by coherence functions,” Mathematical Problems in Engineering, vol. 2011, Article ID 436198, 10 pages, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  7. Y. Chen, G. Paul, S. Havlin, F. Liljeros, and H. E. Stanley, “Finding a better immunization strategy,” Physical Review Letters, vol. 101, no. 5, Article ID 058701, 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. W.-J. Bai, T. Zhou, and B.-H. Wang, “Immunization of susceptible-infected model on scale-free networks,” Physica A, vol. 384, no. 2, pp. 656–662, 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. R. Cohen, S. Havlin, and D. Ben-Avraham, “Efficient immunization strategies for computer networks and populations,” Physical Review Letters, vol. 91, no. 24, Article ID 247901, 4 pages, 2003. View at Google Scholar · View at Scopus
  10. P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han, “Attack vulnerability of complex networks,” Physical Review E, vol. 65, no. 5, Article ID 056109, 14 pages, 2002. View at Publisher · View at Google Scholar · View at Scopus
  11. D. Samfat and R. Molva, “IDAMN: an intrusion detection architecture for mobile networks,” IEEE Journal on Selected Areas in Communications, vol. 15, no. 7, pp. 1373–1380, 1997. View at Publisher · View at Google Scholar · View at Scopus
  12. T. S. Yap and H. T. Ewe, “A mobile phone malicious software detection model with behavior checker,” in Web and Communication Technologies and Internet-Related Social Issues—HSI 2005, vol. 3597 of Lecture Notes in Computer Science, pp. 57–65, 2005. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Cheng, S. H. Y. Wong, H. Yang, and S. Lu, “SmartSiren: Virus detection and alert for smartphones,” in Proceedings of the 5th International Conference on Mobile Systems, Applications and Services (MobiSys '07), pp. 258–271, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Smirnov and T.-C. Chiueh, “Automatic patch generation for buffer overflow attacks,” in Proceedings of the 3rd Internationl Symposium on Information Assurance and Security (IAS '07), pp. 165–170, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Sidiroglou and A. D. Keromytis, “Countering network worms through automatic patch generation,” IEEE Security and Privacy, vol. 3, no. 6, pp. 41–49, 2005. View at Publisher · View at Google Scholar · View at Scopus
  16. W. Cui, M. Peinado, H. J. Wang, and M. E. Locasto, “ShieldGen: automatic data patch generation for unknown vulnerabilities with informed probing,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '07), pp. 252–266, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. F. Li, Y. Yang, and J. Wu, “CPMC: an efficient proximity malware coping scheme in smartphone-based mobile networks,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '10), pp. 1–9, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. G. Zyba, G. M. Voelker, M. Liljenstam, A. Méhes, and P. Johansson, “Defending mobile phones from proximity malware,” in Proceedings of the 28th Conference on Computer Communications (INFOCOM '09), pp. 1503–1511, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. M. H. R. Khouzani, S. Sarkar, and E. Altman, “Dispatch then stop: optimal dissemination of security patches in mobile wireless networks,” in Proceedings of the 49th IEEE Conference on Decision and Control (CDC '10), pp. 2354–2359, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. C. Gao and J. Liu, “Modeling and restraining mobile virus propagation,” IEEE Transactions on Mobile Computing, vol. 12, no. 3, pp. 529–541, 2013. View at Publisher · View at Google Scholar
  21. C. Gao and J. Liu, “Modeling and restraining mobile virus propagation,” IEEE Transactions on Mobile Computing, 2013. View at Publisher · View at Google Scholar
  22. J. Liu, “Autonomy-Oriented Computing (AOC): the nature and implications of a paradigm for self-organized computing,” in Proceedings of the 4th International Conference on Natural Computation (ICNC '08), pp. 3–11, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  23. J. Liu, X. Jin, and K. C. Tsui, Autonomy Oriented Computing (AOC): From Problem Solving to Complex Systems Modeling, Springer, New York, NY, USA, 2005.
  24. M. Li and W. Zhao, “Asymptotic identity in min-plus algebra: a report on CPNS,” Computational and Mathematical Methods in Medicine, vol. 2012, Article ID 154038, 11 pages, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  25. M. Li and W. Zhao, “Representation of a stochastic traffic bound,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1368–1372, 2010. View at Publisher · View at Google Scholar · View at Scopus
  26. C. Gao, J. Liu, and N. Zhong, “Network immunization with distributed autonomy-oriented entities,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1222–1229, 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. R. Guimerà, L. Danon, A. Díaz-Guilera, F. Giralt, and A. Arenas, “Self-similar community structure in a network of human interactions,” Physical Review E, vol. 68, no. 6, Article ID 065103, pp. 651031–651034, 2003. View at Google Scholar · View at Scopus
  28. J. Leskovec, J. Kleinberg, and C. Faloutsos, “Graphs over time: densification laws, shrinking diameters and possible explanations,” in Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 177–187, ACM, August 2005. View at Publisher · View at Google Scholar · View at Scopus
  29. J. Leskovec, J. Kleinberg, and C. Faloutsos, “Graph evolution: densification and shrinking diameters,” ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 1, pp. 1–41, 2007. View at Publisher · View at Google Scholar · View at Scopus
  30. T. Bu and D. Towsley, “On distinguishing between internet power law topology generators,” in Proceedings of the 21st IEEE International Conference on Computer and Communications (INFOCOM '02), pp. 638–647, 2002.
  31. C. C. Zou, D. F. Towsley, and W. Gong, “Modeling and simulation study of the propagation and defense of internet e-mail worms,” IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 2, pp. 106–118, 2007. View at Publisher · View at Google Scholar · View at Scopus
  32. C. Gao, J. Liu, and N. Zhong, “Network immunization and virus propagation in email networks: experimental evaluation and analysis,” Knowledge and Information Systems, vol. 27, no. 2, pp. 253–279, 2011. View at Publisher · View at Google Scholar · View at Scopus
  33. T. J. Norman Bailey, The Mathematical Theory of Infectious Diseases and Its Applications, Griffin, London, UK, 2nd edition, 1975.
  34. D. J. Daley and J. Gani, Epidemic Modelling: An Introduction, Cambridge University Press, Cambridge, UK, 2000.
  35. O. Diekmann and J. A. P. Heesterbeek, Mathematical Epidemiology of Infectious Diseases, John Wiley & Sons, New York, NY, USA, 2000.