Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 129598, 8 pages
http://dx.doi.org/10.1155/2015/129598
Research Article

Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network

1Department of Computer Science of Xinzhou Normal University, Xinzhou, Shanxi 034000, China
2School of Computer and Control Engineering, North University of China, Taiyuan, Shanxi 030051, China

Received 28 April 2015; Revised 20 July 2015; Accepted 19 August 2015

Academic Editor: Stefan Balint

Copyright © 2015 Liping Feng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Tang and W. Li, “QoS supporting and optimal energy allocation for a cluster based wireless sensor network,” Computer Communications, vol. 29, no. 13-14, pp. 2569–2577, 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. L. H. Zhu and H. Y. Zhao, “Dynamical analysis and optimal control for a malware propagation model in an information network,” Neurocomputing, vol. 149, pp. 1370–1386, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. S. S. W. Lee, P.-K. Tseng, and A. Chen, “Link weight assignment and loop-free routing table update for link state routing protocols in energy-aware internet,” Future Generation Computer Systems, vol. 28, no. 2, pp. 437–445, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. T. Rault, A. Bouabdallah, and Y. Challal, “Energy efficiency in wireless sensor networks: a top-down survey,” Computer Networks, vol. 67, pp. 104–122, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Chiang, “Balancing transport and physical layers in wireless multihop networks: jointly optimal congestion control and power control,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 1, pp. 104–116, 2005. View at Publisher · View at Google Scholar · View at Scopus
  6. H. Shi, W. Wang, and N. Kwok, “Energy dependent divisible load theory for wireless sensor network workload allocation,” Mathematical Problems in Engineering, vol. 2012, Article ID 235289, 16 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Zhang and H.-N. Lee, “Energy-efficient utility maximization for wireless networks with/without multipath routing,” AEU—International Journal of Electronics and Communications, vol. 64, no. 2, pp. 99–111, 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. C.-Y. Chang, J.-P. Sheu, Y.-C. Chen, and S.-W. Chang, “An obstacle-free and power-efficient deployment algorithm for wireless sensor networks,” IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, vol. 39, no. 4, pp. 795–806, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. H. Chen, C. K. Tse, and J. Feng, “Impact of topology on performance and energy efficiency in wireless sensor networks for source extraction,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 6, pp. 886–897, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. M. H. Khouzani and S. Sarkar, “Maximum damage battery depletion attack in mobile sensor networks,” IEEE Transactions on Automatic Control, vol. 56, no. 10, pp. 2358–2368, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. P. De, Y. Liu, and S. K. Das, “An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 8, no. 3, pp. 413–425, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. S. Zanero, “Wireless malware propagation: a reality check,” IEEE Security & Privacy, vol. 7, no. 5, pp. 70–74, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. S. A. Khayam and H. Radha, “Using signal processing techniques to model worm propagation over wireless sensor networks,” IEEE Signal Processing Magazine, vol. 23, no. 2, pp. 164–169, 2006. View at Publisher · View at Google Scholar · View at Scopus
  14. G. Yan and S. Eidenbenz, “Modeling propagation dynamics of bluetooth worms,” IEEE Transactions on Mobile Computing, vol. 8, no. 3, pp. 353–367, 2009. View at Publisher · View at Google Scholar · View at Scopus
  15. C. C. Zou, D. Towsley, and W. B. Gong, “Modeling and simulation study of the propagation and defense of internet e-mail worms,” IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 2, pp. 105–118, 2007. View at Publisher · View at Google Scholar · View at Scopus
  16. B. K. Mishra and D. K. Saini, “SEIRS epidemic model with delay for transmission of malicious objects in computer network,” Applied Mathematics and Computation, vol. 188, no. 2, pp. 1476–1482, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. S. J. Wang, Q. M. Liu, X. F. Yu, and Y. Ma, “Bifurcation analysis of a model for network worm propagation with time delay,” Mathematical and Computer Modelling, vol. 52, no. 3-4, pp. 435–447, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. Q. Zhu, X. Yang, L.-X. Yang, and C. Zhang, “Optimal control of computer virus under a delayed model,” Applied Mathematics and Computation, vol. 218, no. 23, pp. 11613–11619, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  19. L. Feng, X. Liao, H. Li, and Q. Han, “Hopf bifurcation analysis of a delayed viral infection model in computer networks,” Mathematical and Computer Modelling, vol. 56, no. 7-8, pp. 167–179, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. L. Feng, X. Liao, Q. Han, and H. Li, “Dynamical analysis and control strategies on malware propagation model,” Applied Mathematical Modelling, vol. 37, no. 16-17, pp. 8225–8236, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  21. L. H. Zhu, H. Y. Zhao, and X. M. Wang, “Bifurcation analysis of a delay reaction-diffusion malware propagation model with feedback control,” Communications in Nonlinear Science and Numerical Simulation, vol. 22, no. 1–3, pp. 747–768, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. B. K. Mishra and N. Keshri, “Mathematical model on the transmission of worms in wireless sensor network,” Applied Mathematical Modelling, vol. 37, no. 6, pp. 4103–4111, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. X. M. Wang and Y. S. Li, “An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks,” Chinese Journal of Electronics, vol. 18, no. 1, pp. 8–12, 2009. View at Google Scholar · View at Scopus
  24. D. J. Daley and J. Gani, Epidemic Modeling: An Introduction, Cambridge University Press, New York, NY, USA, 1999.
  25. J. O. Kephart and S. R. White, “Measuring and modeling computer virus prevalence,” in Proceedings of the IEEE Computer Society Symposium on Security and Privacy, pp. 2–15, May 1993. View at Scopus
  26. E. A. Barbashin, Introduction to the Theory of Stability, Walters-Noordhoff, Groningen, The Netherlands, 1970. View at MathSciNet
  27. J. La Salle and S. Lefschetz, Stability by Liapunovs Direct Method, Academic Press, New York, NY, USA, 1961.
  28. H. Yuan and G. Q. Chen, “Network virus-epidemic model with the point-to-group information propagation,” Applied Mathematics and Computation, vol. 206, no. 1, pp. 357–367, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus