Skip to main content
Top

2017 | OriginalPaper | Chapter

A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks

Authors : Miguel López, Alberto Peinado, Andrés Ortiz

Published in: International Joint Conference SOCO’16-CISIS’16-ICEUTE’16

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper describes the utilization of epidemiological models, usually employed for malware propagation, to study the effects of random jamming attacks, which can affect the physical and MAC/link layers of all nodes in a wireless sensor network, regardless of the complexity and computing power of the devices. The random jamming term considers both the more classical approach of interfering signals, focusing on the physical level of the systems, and the cybersecurity approach that includes the attacks generated in upper layers, mainly in the MAC/link layer, producing the same effect on the communication channel. We propose, as a preliminary modelling task, the epidemiological mathematical model Susceptible–Exposed–Infected–Susceptible (SEIS), and analyze the basic reproductive number, the infection rate, the average incubation time and the average infection time.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kermack, W.O., McKendrick, A.G.: Contributions to the mathematical theory of epidemics, part I. Proc. Roy Soc Edin A 115, 700–721 (1927)MATH Kermack, W.O., McKendrick, A.G.: Contributions to the mathematical theory of epidemics, part I. Proc. Roy Soc Edin A 115, 700–721 (1927)MATH
2.
go back to reference Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 343–359 (1991) Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 343–359 (1991)
3.
go back to reference Azni, A.H., Ahmad, R., Mohamad Noh, Z.A.: Correlated node behavior in wireless ad hoc networks: an epidemic model. In: Proceedings of 7th International Conference for Internet Technology and Secured Transactions, pp. 403–410 (2012) Azni, A.H., Ahmad, R., Mohamad Noh, Z.A.: Correlated node behavior in wireless ad hoc networks: an epidemic model. In: Proceedings of 7th International Conference for Internet Technology and Secured Transactions, pp. 403–410 (2012)
4.
go back to reference De, P., Liu, Y., Das, S.K.: Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Trans. Sensor Networks 3, 1–33 (2009)CrossRef De, P., Liu, Y., Das, S.K.: Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Trans. Sensor Networks 3, 1–33 (2009)CrossRef
5.
go back to reference Keshri, N., Mishra, B.K.: Optimal control model for attack of worms in wireless sensor network. Int. J. Grid Distrib. Comput. 7, 251–272 (2014)CrossRef Keshri, N., Mishra, B.K.: Optimal control model for attack of worms in wireless sensor network. Int. J. Grid Distrib. Comput. 7, 251–272 (2014)CrossRef
6.
go back to reference Mishra, B.K., Keshri, N.: Mathematical model on the transmission of worms in wireless sensor network. Appl. Math. Model. 37, 4103–4111 (2013)MathSciNetCrossRefMATH Mishra, B.K., Keshri, N.: Mathematical model on the transmission of worms in wireless sensor network. Appl. Math. Model. 37, 4103–4111 (2013)MathSciNetCrossRefMATH
7.
go back to reference Mishra, B.K., Srivastava, S.K.: A quarantine model on the spreading behavior of worms in wireless sensor network. Trans. IoT Cloud Comput. 2, 1–12 (2014) Mishra, B.K., Srivastava, S.K.: A quarantine model on the spreading behavior of worms in wireless sensor network. Trans. IoT Cloud Comput. 2, 1–12 (2014)
8.
go back to reference Tang, S.: A modified epidemic model for virus spread control in wireless sensor networks. Int. J. Wirel. Inf. Networks 18, 319–326 (2011)CrossRef Tang, S.: A modified epidemic model for virus spread control in wireless sensor networks. Int. J. Wirel. Inf. Networks 18, 319–326 (2011)CrossRef
9.
go back to reference Xiaoming, W., Yingshu, L.: An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks. Chin. J. Electron. 18, 8–12 (2009) Xiaoming, W., Yingshu, L.: An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks. Chin. J. Electron. 18, 8–12 (2009)
10.
go back to reference Martín del Rey, A.: Mathematical modeling of the propagation of malware: a review. Secur. Commun. Networks 8(15), 2561–2579 (2015)CrossRef Martín del Rey, A.: Mathematical modeling of the propagation of malware: a review. Secur. Commun. Networks 8(15), 2561–2579 (2015)CrossRef
11.
go back to reference Chowdhury, M., Kader, M.F.: Asaduzzaman: security issues in wireless sensor networks: a survey. Int. J. Future Gener. Commun. Networking 6, 97–116 (2013)CrossRef Chowdhury, M., Kader, M.F.: Asaduzzaman: security issues in wireless sensor networks: a survey. Int. J. Future Gener. Commun. Networking 6, 97–116 (2013)CrossRef
12.
go back to reference Francillon, A., Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Proceedings of the 15th ACM conference on Computer and communications security, pp. 15–26. ACM (2008) Francillon, A., Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Proceedings of the 15th ACM conference on Computer and communications security, pp. 15–26. ACM (2008)
13.
go back to reference Habibi, J., Gupta, A., Carlsony, S., Panicker, A., Bertino, E.: Mavr: code reuse stealthy attacks and mitigation on unmanned aerial vehicles. In: Distributed Computing Systems (ICDCS), pp. 642–652. IEEE (2015) Habibi, J., Gupta, A., Carlsony, S., Panicker, A., Bertino, E.: Mavr: code reuse stealthy attacks and mitigation on unmanned aerial vehicles. In: Distributed Computing Systems (ICDCS), pp. 642–652. IEEE (2015)
14.
go back to reference Braden, K., Crane, S., Davi, L., Franz, M., Larsen, P., Liebchen, C., Sadeghi, A.R.: Leakage-resilient layout randomization for mobile devices. In: Network and Distributed Systems Security Symposium (NDSS) (2016) Braden, K., Crane, S., Davi, L., Franz, M., Larsen, P., Liebchen, C., Sadeghi, A.R.: Leakage-resilient layout randomization for mobile devices. In: Network and Distributed Systems Security Symposium (NDSS) (2016)
15.
go back to reference Modares, H., Moravejosharieh, A., Salleh, R., Lloret, J.: Security overview of wireless sensor network. Life Sci. J. 10, 1627–1632 (2013) Modares, H., Moravejosharieh, A., Salleh, R., Lloret, J.: Security overview of wireless sensor network. Life Sci. J. 10, 1627–1632 (2013)
16.
go back to reference Znaidi, W., Minier, M., Babau, J.P.: An ontology for attacks in wireless sensor networks. Unité de recherche INRIA Rhône-Alpes, Rapport de recherche Nº 6704, pp 1–13 (2008) Znaidi, W., Minier, M., Babau, J.P.: An ontology for attacks in wireless sensor networks. Unité de recherche INRIA Rhône-Alpes, Rapport de recherche Nº 6704, pp 1–13 (2008)
17.
go back to reference Sokullu, R., Korkmazy, I., Dagdevirenz, O., Mitsevax, A., Prasad, N.R.: An investigation on IEEE 802. 15. 4 MAC layer attacks. In: Proceedings of The 10th International Symposium on Wireless Personal Multimedia Communications (WPMC) (2007) Sokullu, R., Korkmazy, I., Dagdevirenz, O., Mitsevax, A., Prasad, N.R.: An investigation on IEEE 802. 15. 4 MAC layer attacks. In: Proceedings of The 10th International Symposium on Wireless Personal Multimedia Communications (WPMC) (2007)
18.
go back to reference Guglielmo, D., Brienza, S., Anastasi, G.: IEEE 802.15.4e: A survey. Comput. Commun. 88, 1–24 (2016)CrossRef Guglielmo, D., Brienza, S., Anastasi, G.: IEEE 802.15.4e: A survey. Comput. Commun. 88, 1–24 (2016)CrossRef
20.
go back to reference Brauer, F., van den Driessche, P., Wu, J.: Mathematical Epidemiology. Springer, Heidelberg (2008)CrossRefMATH Brauer, F., van den Driessche, P., Wu, J.: Mathematical Epidemiology. Springer, Heidelberg (2008)CrossRefMATH
21.
go back to reference Lichtman, M., Poston, J.D., Amuru, S., Shahriar, C., Clancy, T.C., Buehrer, R.M., Reed, J.H.: A communications jamming taxonomy. IEEE Secur. Priv. 14, 47–54 (2016)CrossRef Lichtman, M., Poston, J.D., Amuru, S., Shahriar, C., Clancy, T.C., Buehrer, R.M., Reed, J.H.: A communications jamming taxonomy. IEEE Secur. Priv. 14, 47–54 (2016)CrossRef
22.
go back to reference Wei, Y., van Hoesel, L.L., Doumen, J., Hartel, P., Havinga, P.: Energy efficient link layer jamming attacks against wireless sensor network MAC protocols. In: SANS 2005 (2005) Wei, Y., van Hoesel, L.L., Doumen, J., Hartel, P., Havinga, P.: Energy efficient link layer jamming attacks against wireless sensor network MAC protocols. In: SANS 2005 (2005)
23.
go back to reference Mohammadi, S., Jadidoleslamy, V.: A comparison of link layer attacks on wireless sensor networks. Int. J. Appl. Graph Theory Wireless ad hoc Networks Sensor Networks 3, 35–56 (2011)CrossRef Mohammadi, S., Jadidoleslamy, V.: A comparison of link layer attacks on wireless sensor networks. Int. J. Appl. Graph Theory Wireless ad hoc Networks Sensor Networks 3, 35–56 (2011)CrossRef
24.
go back to reference Zhu, L., Zhao, H.: Dynamical analysis and optimal control for a malware propagation model in an information network. Neurocomputing 149, 1370–1386 (2015)CrossRef Zhu, L., Zhao, H.: Dynamical analysis and optimal control for a malware propagation model in an information network. Neurocomputing 149, 1370–1386 (2015)CrossRef
25.
go back to reference Hirsch, M.W., Smale, S., Devaney, R.L.: Differential equations, dynamical systems, and an introduction to chaos. In: 3rd Ed., Academic Press (2012) Hirsch, M.W., Smale, S., Devaney, R.L.: Differential equations, dynamical systems, and an introduction to chaos. In: 3rd Ed., Academic Press (2012)
26.
go back to reference Perko, L.: Differential Equations and Dynamical Systems, 3rd edn. Springer, Heidelberg (2010)MATH Perko, L.: Differential Equations and Dynamical Systems, 3rd edn. Springer, Heidelberg (2010)MATH
Metadata
Title
A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks
Authors
Miguel López
Alberto Peinado
Andrés Ortiz
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-47364-2_65

Premium Partner