Research article Special Issues

A novel model for malware propagation on wireless sensor networks


  • The main goal of this work was to propose a novel mathematical model for malware propagation on wireless sensor networks (WSN). Specifically, the proposed model was a compartmental and global one whose temporal dynamics were described by means of a system of ordinary differential equations. This proposal was more realistic than others that have appeared in the scientific literature since. On the one hand, considering the specifications of malicious code propagation, several types of nodes were considered (susceptible, patched susceptible, latent non-infectious, latent infectious, compromised non-infectious, compromised infectious, damaged, ad deactivated), and on the other hand, a new and more realistic term of the incidence was defined and used based on some particular characteristics of transmission protocol on wireless sensor networks.

    Citation: Angel Martin-del Rey. A novel model for malware propagation on wireless sensor networks[J]. Mathematical Biosciences and Engineering, 2024, 21(3): 3967-3998. doi: 10.3934/mbe.2024176

    Related Papers:

    [1] Yong Liu, Hong Yang, Shanshan Gong, Yaqing Liu, Xingzhong Xiong . A daily activity feature extraction approach based on time series of sensor events. Mathematical Biosciences and Engineering, 2020, 17(5): 5173-5189. doi: 10.3934/mbe.2020280
    [2] Ying Chang, Lan Wang, Yunmin Zhao, Ming Liu, Jing Zhang . Research on two-class and four-class action recognition based on EEG signals. Mathematical Biosciences and Engineering, 2023, 20(6): 10376-10391. doi: 10.3934/mbe.2023455
    [3] Yunqian Yu, Zhenliang Hao, Guojie Li, Yaqing Liu, Run Yang, Honghe Liu . Optimal search mapping among sensors in heterogeneous smart homes. Mathematical Biosciences and Engineering, 2023, 20(2): 1960-1980. doi: 10.3934/mbe.2023090
    [4] Guixiang Liang, Xiang Li, Hang Yuan, Min Sun, Sijun Qin, Benzheng Wei . Abnormal static and dynamic amplitude of low-frequency fluctuations in multiple brain regions of methamphetamine abstainers. Mathematical Biosciences and Engineering, 2023, 20(7): 13318-13333. doi: 10.3934/mbe.2023593
    [5] Yue Shi, Xin Zhang, Chunlan Yang, Jiechuan Ren, Zhimei Li, Qun Wang . A review on epileptic foci localization using resting-state functional magnetic resonance imaging. Mathematical Biosciences and Engineering, 2020, 17(3): 2496-2515. doi: 10.3934/mbe.2020137
    [6] Chunkai Zhang, Ao Yin, Wei Zuo, Yingyang Chen . Privacy preserving anomaly detection based on local density estimation. Mathematical Biosciences and Engineering, 2020, 17(4): 3478-3497. doi: 10.3934/mbe.2020196
    [7] Antonella Lupica, Piero Manfredi, Vitaly Volpert, Annunziata Palumbo, Alberto d'Onofrio . Spatio-temporal games of voluntary vaccination in the absence of the infection: the interplay of local versus non-local information about vaccine adverse events. Mathematical Biosciences and Engineering, 2020, 17(2): 1090-1131. doi: 10.3934/mbe.2020058
    [8] Noman Zahid, Ali Hassan Sodhro, Usman Rauf Kamboh, Ahmed Alkhayyat, Lei Wang . AI-driven adaptive reliable and sustainable approach for internet of things enabled healthcare system. Mathematical Biosciences and Engineering, 2022, 19(4): 3953-3971. doi: 10.3934/mbe.2022182
    [9] Qianqian Li, Ankur Jyoti Kashyap, Qun Zhu, Fengde Chen . Dynamical behaviours of discrete amensalism system with fear effects on first species. Mathematical Biosciences and Engineering, 2024, 21(1): 832-860. doi: 10.3934/mbe.2024035
    [10] Shouming Zhang, Yaling Zhang, Yixiao Liao, Kunkun Pang, Zhiyong Wan, Songbin Zhou . Polyphonic sound event localization and detection based on Multiple Attention Fusion ResNet. Mathematical Biosciences and Engineering, 2024, 21(2): 2004-2023. doi: 10.3934/mbe.2024089
  • The main goal of this work was to propose a novel mathematical model for malware propagation on wireless sensor networks (WSN). Specifically, the proposed model was a compartmental and global one whose temporal dynamics were described by means of a system of ordinary differential equations. This proposal was more realistic than others that have appeared in the scientific literature since. On the one hand, considering the specifications of malicious code propagation, several types of nodes were considered (susceptible, patched susceptible, latent non-infectious, latent infectious, compromised non-infectious, compromised infectious, damaged, ad deactivated), and on the other hand, a new and more realistic term of the incidence was defined and used based on some particular characteristics of transmission protocol on wireless sensor networks.



    A BCI provides a pathway for people suffering from neuro-muscular dysfunctions to communicate with the world [1], by decoding electroencephalography (EEG) signals that reflect synchronous activities of neurons in the cerebral cortex beneath the skull [2]. An ERP-based BCI speller, also referred to as the P300 speller in literatures [3,4], relies on characteristics of the ERP components elicited by the attended stimuli in a spelling task [5].

    Multi-sensor recordings are normally required to capture the widely distributed ERP features over the cortical surface, as well as to compensate for the poor signal quality from a single sensor. More sensors typically yield better classification accuracies, while it is at the cost of increased complexity and reduced usability of the speller, limiting the popularization of mobile/wearable BCI devices [6,7,8] for the end use. Reduction and centralization of sensors may bring much more comfort to the user, decreases installation time duration, reduce the cost and improve portability and convenience of a BCI [9]. To reduce the number of sensors, recently many computational sensor-selection methods, from the perspectives of the dimensionality reduction and the spatial filtering, have been developed, such as those based on the swarm algorithm [10,11], independent component analysis [12], automatic relevance determination [13], and other strategies [14,15], etc. However, aside from an additional computational burden, these sensor-selection methods are of no help to centralization of sensors, because they only select but do not change the underlying sources. On the contrary, the localization of brain activities could be a solution to both reduction and centralization of sensors.

    The basic concept of localization is to reinforce local rather than global brain activities, and make useful information concentrated on centralized sensors. Some BCI modalities, such as motor imagery BCI [12] and steady-state visual evoked potential (SSVEP)-based BCI [16], are born with alocalization feature. Motor imagery BCIs are based on contralateral ERD/ERS rhythms that are mainly concentrated around the central area over the sensorimotor cortex, and SSVEP BCIs are based on homogeneous SSVEP rhythms that are originated from the visual cortex and spread over the whole cortical surface. Different from these BCI modalities, ERP-based BCIs may suffer from a dispersed distribution of the underlying ERP activities, mainly involving those associated with visual N1, P2, N2, and P3 components. Visual P2 and N2 preponderating over the frontal-central area, P3 preponderating over the parietal area, and N1 preponderating over the occipito-temporal area, have been thought to make major contributions to the working of an ERP speller [5,17,18]. Such a dispersed distribution poses a huge challenge for the localization of an ERP-based BCI, because discarding any of these ERP components may remarkably deteriorate the classification performance, which now is still too low even if considering all of these components. Because characteristics of ERPs are closely related to the perceptual and cognitive meanings of the visual stimulus processed by the brain, one possible way to handle the challenge is to optimize the visual stimulus to obtain more localized activities.

    The traditional ERP speller uses a type of character-flashing stimulus, where luminous intensification of characters is used for accentuation [4]. Recently, new stimulus types, such as the face-flashing stimulus [19,20,21], the object rotation stimulus (the FLIP paradigm) [22], and the object motion stimulus (motion-onset paradigm) [23], have been shown to have advantages over the traditional character-flashing type. The face-flashing paradigm, which superimposes face images onto characters for accentuation, was shown to benefit from additional ERPs related to face recognition, such as N170 and N400, and thus significantly improved the classification performance. The FLIP paradigm was revealed to be able to suppress the refractory effect of the P3 component in an ERP speller, and the motion-onset paradigm was revealed to elicit the motion-onset N200 component, and have a merit of low contrast and luminance tolerance. In our previous work, we had investigated a novel visual graphic stimulus, and demonstrated its effectiveness for improving overall classification performance of an ERP speller [18]. Different from the stimulus types examined in literatures [19,20,21,22,23], the visual graphic stimulus has significantly increased complexity and unpredictability, which profoundly affects the perceptual processing and leads to significant enhancement of ERP responses [24,25]. Although many stimulus types have been proposed, hardly any of them has been evaluated referring to the localization performance.

    The novelty and main contributions of the present study is to reveal the specific localization effect of brain activities elicited by the visual graphic stimulus, and verify its effectiveness and significance for the centralization and reduction of sensors, for an ERP speller. For this purpose, three sensor settings, i.e., the FS, NS, and LS settings, were tested, and the classification performance of an ERP speller with the visual graphic stimulus, were reevaluated, and compared to those with the traditional character-flashing stimulus. The FS condition uses a full set of all sensors and provides the baseline performance, whereas for the NS condition, ten sensors, Fz, Cz, C3, C4, Pz, Oz, O1, O2, T5, T6, were selected in accordance with relevant state-of-the-art studies [13,15,18], and for the LS condition, only five posterior sensors, Pz, O1, O2, T5, T6, were selected, according to our findings about ERP characteristics under both graphic and character-flashing paradigms. The sensor placement adopted in the present study is illustrated in Figure 1.

    Figure 1.  Sensor placement adopted in the present study. Sensors with red dotted circles refer to the NS setting, whereas those with blue background refer to the LS setting. All sensors were used under the FS setting.

    A description of the traditional character-flashing paradigm could be found in [4]. The visual graphic stimulus-based paradigm modifies the traditional paradigm by changing the stimulus type from the character-flashing type to a varied graphic pattern flashing type, as shown in Figure 2. For each row/column flashing, the characters involved are accentuated by being superimposed with 6 highlighted geometric patterns, which are selected randomly and uniquely from a set including eleven patterns shown in Figure 2c. We adopt a dynamic presentation scheme to ensure the unpredictability of the stimulus: 1) All patterns in a row/column flashing should be selected randomly and uniquely from the set; 2) patterns for two successive flashings of a character should be distinct. In this way, the user would be uncertain about the morphology of the target stimulus in the next flashing, as well as the morphologies of its non-target surrounding stimuli. More details about the varied graphic pattern flashing paradigm could be found in [18].

    Figure 2.  Experimental paradigm. (a) Blank speller; (b) one row is transiently accentuated by superimposed visual graphic stimulus; (c) visual graphic patterns.

    A subtrial is defined as the twelve row and column flashings of the matrix, and a trial is defined as several consecutive subtrials required for spelling a character. In our experiment, a trial contained 5 subtrials. Stimulus onset asynchrony (SOA), defined as the time interval from the onset of one flashing to the onset of the next flashing, was set as 160 ms with an accentuation period of 80 ms.

    Sixteen healthy participants (12 males and 4 females), all right-handed, with normal or corrected to normal vision, took part in the experiment. All participants were naïve to BCIs. Ethical approval and informed consents were obtained in compliance with the Declaration of Helsinki.

    Participants were instructed to copy-spell 72 characters without feedback under both the graphic stimulus-based paradigm (GP) and traditional character-flashing paradigm (CP). Target characters were selected randomly from 36 characters in the character matrix, with each character selected twice. These target characters were divided into 6 groups, and each group contained 12 characters. In each experimental run, a group of characters was selected as targets. Therefore, there were totally 12 runs, with 6 runs under the GP, and the other 6 runs under CP. For counterbalancing, the runs were carried out alternately, and half of the participants began with GP, while the others began with CP.

    A run contained 12 trials. For each trial, participants were instructed to attend to the flashings of one target character. When a trial began, they had 3 seconds to focus on the target item in the matrix before the flashings occurred. Then, they should mentally count the number of flashings of the target character. At the end of the trial, there was a 2-second blank, during which they should report the number they counted. Then, they would continue with the next trial until the end of the run. When a run finished, there was a 2-minute break before the next run began. To reduce the ocular artefacts, participants were told to try not to blink during flashings.

    Finally, we got 144 trials for each participant, with 72 trials for each paradigm.

    Brain signals were acquired with a Nuamps 40 amplifier (Neuroscan Inc.) at a sampling rate of 250 Hz, with linked-mastoid reference and a forehead ground. Thirty-two Ag/AgCl sensors, including 30 recording sensors and 2 reference sensors, were placed according to the international 10–20 EEG systems, as shown in Figure 1. The sensor impedance was kept below 5 kilohm. Data from all sensors were recorded in the experiment. Data storage and speller implementation are achieved by BCI2000 [26].

    For classification, the recorded brain signals were filtered successively using a causal 3-order Butterworth high-pass filter with a cutoff of 0.5 Hz, and a causal 6-order Butterworth low-pass filter with a cutoff of 5.5 Hz. Whereas for ERP analysis, non-causal zero-phased filters were used instead, with the cutoff of the low-pass filter broadened to 40 Hz. To overcome possible ERP distortion arising from epoch overlapping due to a short SOA, only epochs with target-to-target intervals greater than 5*SOA were used for examining ERP responses.

    The epoch length was 800 ms, starting from 200 ms preceding stimulus onset. For classification, data epochs were down sampled to a rate of 25 Hz, and then the resultant epochs from the selected sensors were concatenated to form feature vectors. A stepwise linear discriminant analysis (SWLDA) classifier [27] was adopted.

    Grand-average difference ERP responses between both spellers were compared, obtained by subtracting non-target responses from target responses averaged across all participants.

    Based on the comparison on ERP responses, a localized sensor set was determined. Then, classification accuracies and information transfer rates (ITR) [28] between GP and CP, were compared respectively, through three-way 2 × 3 × 5 repeated measures ANOVA (PARADIGM [GP, CP] × SENSORSETTING [FS, NS, LS] × TRIAL LENGTH [1,2,3,4,5]). Trial length was defined as the number of subtrials used in a trial. For a trial length level less than 5, a corresponding number of subtrials in the front of each trial were always used, without screening, for the classification, e.g., for trial length 1, only the first subtrial in each trial was used for the classification. For the FS condition, all the 30 recording sensors were selected. ANOVA were carried out with the Statistic Package for Social Science (SPSS).

    A 4-fold cross validation was adopted to obtain the estimation of classification accuracies. For each participant, the obtained 72-character dataset were divided sequentially into four groups, with 18 characters in each group. Every time, one of the four groups was selected for training the classifier, while the remaining were used for evaluating the character-wise accuracy. Then, accuracies from the 4 folds were averaged to obtain a final result. ITRs were calculated using [28]

    ITR=(log2N+Plog2P+(1P)log21PN1)/T

    where N indicates the number of items in the speller matrix, P indicates the character-wise classification accuracy, T indicates the time span of a trial (unit: Min (minute)), and ITR means the number of bits being sent in a trial (unit: Bits/min).

    Grand-average difference ERP responses for both paradigms are shown in Figure 3. Several differences could be found between GP and CP. First, at occipito-temporal sensor sites, e.g., O1 and O2 sites, an enhanced negative N1 component with a latency of about 200 ms could be observed for GP. Second, at T5, T6, O1, and O2 sites, a pronounced positive peak with a latency around 320 ms is observed for GP, which seems absent for CP. Third, at frontal-central sites, typically Fz and Cz, a more negative N2 component with a latency around 300 ms, is elicited for GP than that for CP. While for the P2 component at frontal-central sites, with a latency around 230 ms, and for the P3 component at parietal and occipito-temporal sites, with a latency around 400 ms, there seem no much differences between both spellers.

    Figure 3.  Grand-average difference ERP responses for GP and CP.

    From the ERP responses, it can be found that GP elicited enhanced ERP features on occipito-temporal sensor sites. These differences are mainly concentrated on several minority posterior sites, indicating a localization effect. The localization effect brought out by GP could be seen in more detail in individual scalp distributions of amplitudes of the posterior negative (named N1) and positive (named P2b) peaks in difference responses between GP and CP, as shown in Figures 4 and 5, respectively. It should be noted that, in Figure 4, amplitudes of inverse N1 are shown such that a greater value in the map indicates more pronounced N1 amplitudes. For evaluating the amplitudes of these components, these negative and positive peaks were first found in a range of 100 to 400 ms referring to Oz, and then mean amplitudes within 40 ms around the peaks were evaluated. It can be seen obviously that, for most participants, enhancement of ERP activities by GP is primarily localized over the posterior region. Therefore, four occipito-temporal sites, T5, T6, O1, and O2, were selected for the localized sensor setting. On the other hand, a parietal site Pz was also included in the localized sensor setting, in consideration of the contribution of P3 component to classification, which preponderates at the parietal area. Finally, five posterior sensors, at T5, T6, O1, O2, and Pz sites, respectively, were selected for the localized sensor setting.

    Figure 4.  Individual distributions of amplitudes of inverse N1 in difference responses between GP and CP (GP-CP).
    Figure 5.  Individual distributions of amplitudes of P2b in difference responses between GP and CP (GP-CP).

    Mean accuracies and mean information transfer rates of both spellers, obtained from the 4-fold cross validation, are shown in Figure 6a and b, respectively.

    Figure 6.  Accuracies and information transfer rates (ITR) under different trial lengths and sensor sets. (a) Mean accuracies at various trial lengths; (b) mean ITRs at various trial lengths. The error bar shows the standard deviation.

    Results from ANOVA on classification accuracies revealed a significant PARADIGM × SENSORSETTING × TRIALLENGTH interaction (F(8,120) = 2.68, p = 0.010). GP significantly outperforms CP irrespective of sensor setting and trial length (5 trial length levels (1~5) within 3 sensor settings (FS, NS, LS): F(1, 15) = 34.85, 47.23, 18.50, 13.71, 9.23; 41.68, 32.99, 23.07, 15.75, 9.95; 25.20, 39.56, 31.51, 32.33, 19.59 respectively. All p-values < 0.01). PARADIGM × TRIALLENGTH interactions are also revealed to be significant for each sensor settings (F(4, 60) = 12.60, 10.30, 2.62; p = 0.000, 0.000, 0.043 respectively). At short trial lengths (1~2), the differences between both paradigms become more obvious than those at long trial lengths (3~5).

    Results from ANOVA on information transfer rates revealed a significant PARADIGM × TRIAL LENGTH interaction (F(4, 60) = 21.61, p = 0.000). Similar to the results of ANOVA on accuracies, at each trial length level, GP outperformed CP (F(1, 15) = 34.77, 53.25, 33.75, 29.15, 18.13 respectively; all p-values < 0.01), and the differences become more obvious for short trial lengths than for long trial lengths. The PARADIGM × SENSOR × TRIALLENGTH interaction does not reach the significant level (F(8,120) = 1.70, p = 0. 104).

    From Figure 6, it can be seen that even if with the localized sensor setting, GP still achieves better results than CP with any of the three sensor settings. To verify this argument, we further performed two-tailed paired-samples T-tests between the LS-GP condition and each of the FS-CP, NS-CP, and LS-CP conditions. Results from T-tests on accuracies show that, at short trial lengths (1~2), the LS-GP outperforms either of the FS-CP and NS-CP (p < 0.05); while when trial length increases (3~4), differences between the LS-GP and the NS-CP become less significant (p < 0.1), and differences between the LS-GP and the FS-CP do not reach the significant level (p > 0.1); at trial length 5, there are no significant differences between the LS-GP and either of the NS-CP and the FS-CP (p = 0.271 and 0.332 respectively); however, at all trial lengths (1~5), the LS-GP is significantly better than the LS-CP (all p-values = 0.000). T-tests on information transfer rates give the similar results to T-tests on accuracies. Therefore, it can be concluded that, at short trial lengths (1~2), GP with the localized sensor set outperforms CP with any of FS, NS, and LS, while the differences become less significant as the trial length increases.

    Sensor reduction is an important issue for lowering complexity of an ERP speller. However, a tradeoff between the accuracy and the sensor set size should always be considered when pursuing the minimization of sensors. Because the amount of information available for classification may decrease with reduced sensors, classification accuracy would typically degenerate as well. One way for sensor reduction is to exploit signal processing methods to find the optimal sensor set. These methods, also commonly called the sensor/channel selection methods [9,10,11,12,13,14,15], depend on the established characteristics of the ERP signals within an experimental paradigm. Another way for sensor reduction is through localization of brain activities, which is the main purpose of the present study. Different from the signal processing methods, which do not change the physical properties of the underlying ERP components, localization methods could directly improve the quality of the ERP components, and make the useful information more concentrated on minority sensors, so it would be more powerful for sensor reduction.

    We evaluated the localization performance under a novel visual graphic stimulus paradigm. Performance of GP was compared to that of CP under three sensor set conditions, i.e., the full 30-sensor set, the normal 10-sensor set, and the localized 5-sensor set. Results showed that, GP achieves significantly greater classification accuracies and information transfer rates than CP, irrespective of sensor settings. Furthermore, even with the localized sensor set, GP still shows its advantage over CP using any of the three sensor settings, especially at short trial lengths. For instance, at trial length 2, the average accuracy of GP under LS reaches up to 80.24%, significantly greater than those of CP under FS, NS, and LS, i.e., 75.38, 75.00 and 67.64% respectively (all p-values < 0.05). To increase the output rate of an ERP speller, researchers have always been finding ways, from either signal processing or experimental paradigm directions, to increase the classification accuracy at short trial lengths. In this sense, GP is also especially valuable for BCI studies with short trial lengths. GP also obtained a maximum average ITR of 69.76 bit/min under LS, significantly higher than those of CP under FS, NS, and LS, i.e., 58.36, 56.47 and 49.38 bit/min respectively (all p-values < 0.01). In conclusion, for GP, the sensor-set size could be reduced half, from the normal frontal-central and posterior sites to only the localized posterior sites, whereas the performance remains better than CP. Therefore, we think GP is remarkably effective for sensor reduction and localization of brain activities of an ERP BCI. Besides the localization performance, the trial length effect needs also be discussed. As shown in Figure 6, a clear trial length effect can be observed for both accuracies and ITRs, under each of the six conditions, where mean accuracies show a positive correlation trend, and mean ITRs show a negative correlation trend, with respect to the trial length. That is because, a greater trial length means more stimulus repetitions, and thus brings about increased signal-to-noise ratio for the obtained ERP samples, which naturally leads to increased accuracies. This may explain the trial length effect on accuracies shown in Figure 6a. However, an increase of the trial length may also prolong the time span of a trial, and thus, according to the definition of the ITR, may cause a reduction of ITRs, as observed from our results given in Figure 6b.

    According to our results, five posterior sensors, including one parietal and four occipito-temporal sensors, were enough for GP to obtain a comparable or even higher performance than CP. Because these sensors are concentrated over the local posterior area, the proposed method may facilitate the design and setup of an ERP speller device, and so it would be of great value for the practical use. These results could be supported by the underlying ERP responses at these sensors. As shown in Figure 3, for GP, at Pz site, differences between target and non-target responses mainly come from P2, N2, and P3 components, whose latencies are 230,300 and 400 ms respectively, whereas for O1, O2, T5, and T6 sites, N1, P3, and a pronounced positive component with a latency of about 320ms, provide discriminative information for classification. Performance enhancement of GP should probably come from the enhancement of N1, and the elicitation of a pronounced positive component (denoted as P2b here) earlier than P3 at occipito-temporal sensor sites.

    In this paper, we examined the localization issue for an ERP speller, which may be especially useful for reduction and centralization of sensors, and thus for popularization of wearable/mobile BCIs for the end use. A novel visual graphic stimulus was used to yield localized posterior activities, which, from our experimental results, was demonstrated to achieve comparable or even better classification performance than those obtained by the traditional character-flashing stimulus using global activities, and was also revealed to be able to reduce the number of sensors required by half. Participants also reported that they felt more concentrated and less fatigue with the graphic stimulus than the character-flashing stimulus. Future work may involve incorporating dimensionality reduction approaches, such as the Grassmannian subspace method [29,30], to further reduce the computational load and boost the classification performance, as well as revealing the cognitive origins of the localized posterior activities under visual graphic stimulus, by solving an EEG inverse problem [2,31].

    This work was supported in part by the National Natural Science Foundation of China (61772508, U1713213, 61906183, 61671105), Shenzhen Technology Project (JCYJ20170413152535587, JCYJ20180507182610734), Key Research and Development Program of Guangdong Province (2019B090915001), CAS Key Technology Talent Program, Shenzhen Engineering Laboratory for 3D Content Generating Technologies (NO. [2017]476).

    All authors declare that they have no conflict of interest in relation to this scientific work.



    [1] P. G. Steeneken, E. Kaiser, G. J. Verbiest, M. C. ten Veldhuis, Sensors in agriculture: towards an internet of plants, Nat. Rev. Method. Prim., 3 (2023), 60. https://doi.org/10.1038/s43586-023-00250-x doi: 10.1038/s43586-023-00250-x
    [2] J. Garcia-Martin, A. Torralba, E. Hidalgo-Fort, D. Daza, R. Gonzalez-Carvajal, Iot solution for smart water distribution networks based on a low-power wireless network, combined at the device-level: A case study, Int. Things, 22 (2023), 100746.
    [3] B. Camboim, J. Tavares, M. Tavares, J. Barbosa, Posture monitoring in healthcare: a systematic mapping study and taxonomy, Med. Biol. Eng. Comput., 61 (2023), 1887–1899. https://doi.org/10.1007/s11517-023-02851-w doi: 10.1007/s11517-023-02851-w
    [4] M. Conti, Secure Wireless Sensor Networks. Threats and Solutions, Springer Science Business Media, 2016.
    [5] J. Lopez, J. Zhou, Wireless Sensor Network Security, IOS Press, 2008.
    [6] P. Devi, B. Jaison, Protection on wireless sensor network from clone attack using the sdn-enabled hybrid clone node detection mechanisms, Comput. Commun., 152 (2020), 316–322.
    [7] S. A. Elsaid, N. S. Albatati, An optimized collaborative intrusion detection system for wireless sensor networks, Soft Comput., 24 (2020), 12553–12567.
    [8] A. Salim, W. Osamy, A. Aziz, A. Khedr, Seedgt: Secure and energy efficient data gathering technique for iot applications based wsns, J. Netw. Comput. Appl., 202. https://doi.org/10.1016/j.jnca.2022.103353 doi: 10.1016/j.jnca.2022.103353
    [9] D. Cong, X. Zhongwei, A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography, Ad Hoc Netw., 127 (2022), 102768.
    [10] X. Liu, Z. Guo, J. Ma, Y. Song, A secure authentication scheme for wireless sensor networks based on dac and intel sgx, IEEE Int. Things J., 9 (2022), 3533–3547. https://doi.org/10.1109/JIOT.2021.3097996 doi: 10.1109/JIOT.2021.3097996
    [11] V. Rao, K. Prema, A review on lightweight cryptography for internet-of-things based applications, J. Ambient Intell. Humaniz. Comput., 12 (2021), 8835–8857. https://doi.org/10.1007/s12652-020-02672-x doi: 10.1007/s12652-020-02672-x
    [12] A. Gautam, R. Kumar, A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks, SN Appl. Sci., 3 (2021), 50. https://doi.org/10.1007/s42452-020-04089-9 doi: 10.1007/s42452-020-04089-9
    [13] M. Faisal, I. Ali, M. Khan, J. Kim, S. Kim, Cyber security and key management issues for internet of things: Techniques, requirements, and challenges, Complexity, 2020 (2020). https://doi.org/10.1155/2020/6619498 doi: 10.1155/2020/6619498
    [14] C. Kumar, R. Amin, M. Brindha, Safecom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks, J. Syst. Architect., 130 (2022), 102650. https://doi.org/10.1016/j.sysarc.2022.102650 doi: 10.1016/j.sysarc.2022.102650
    [15] E. Praveen Kumar, S. Priyanka, A comprehensive survey on hardware-assisted malware analysis and primitive techniques, Comput. Netw., 235 (2023), 109967. https://doi.org/10.1016/j.comnet.2023.109967 doi: 10.1016/j.comnet.2023.109967
    [16] M. K. Roberts, P. Ramasamy, An improved high performance clustering based routing protocol for wireless sensor networks in iot, Telecommun. Syst., 82 (2023), 45–59. https://doi.org/10.1007/s11235-022-00968-1 doi: 10.1007/s11235-022-00968-1
    [17] C. H. Nwokoye, V. Madhusudanan, Epidemic models of malicious-code propagation and control in wireless sensor networks: An indepth review, Wirel. Pers. Commun., 125 (2022), 1827–1856. https://doi.org/10.1007/s11277-022-09636-8 doi: 10.1007/s11277-022-09636-8
    [18] R. K. Shakya, T. H. Ayane, F. D. Diba, P. Mamoria, Seirs model with spatial correlation for analyzing dynamic of virus spreading in event-driven wireless sensor networks, Int. J. Syst. Assur. Eng. Manag., 13 (2022), 752–760. https://doi.org/10.1007/s13198-021-01336-z doi: 10.1007/s13198-021-01336-z
    [19] Y. Zhou, Y. Wang, K. Zhou, S. F. Shen, W. X. Ma, Dynamical behaviors of an epidemic model for malware propagation in wireless sensor networks, Front. Physics, 11 (2023). https://doi.org/10.3389/fphy.2023.1198410 doi: 10.3389/fphy.2023.1198410
    [20] X. Zhu, J. Huang, Malware propagation model for cluster-based wireless sensor networks using epidemiological theory, PeerJ Comput. Sci., 7 (2021), e728. https://doi.org/10.7717/peerj-cs.728 doi: 10.7717/peerj-cs.728
    [21] H. Zhou, S. Shen, J. Liu, Malware propagation model in wireless sensor networks under attack-defense confrontation, Comput. Commun., 162 (2020), 51–58. https://doi.org/10.1016/j.comcom.2020.08.009 doi: 10.1016/j.comcom.2020.08.009
    [22] Y. Wang, D. Li, N. Dong, Cellular automata malware propagation model for wsn based on multi-player evolutionary game, IET Netw., 7 (2018), 129–135. https://doi.org/10.1049/iet-net.2017.0070 doi: 10.1049/iet-net.2017.0070
    [23] G. Liu, J. Li, Z. Liang, Z. Peng, Dynamical behavior analysis of a time-delay sirs-l model in rechargeable wireless sensor networks, Mathematics, 9 (2021), 2007. https://doi.org/10.3390/math9162007 doi: 10.3390/math9162007
    [24] G. Liu, J. Li, Z. Liang, Z. Peng, Analysis of time-delay epidemic model in rechargeable wireless sensor networks, Mathematics, 9 (2021), 978. https://doi.org/10.3390/math9090978 doi: 10.3390/math9090978
    [25] S. Awasthi, N. Kumar, P. K. Srivastava, An epidemic model to analyze the dynamics of malware propagation in rechargeable wireless sensor network, J. Discrete Math. Sci. Criptogr., 24 (2021), 1529–1543. https://doi.org/10.1080/09720529.2021.1951436 doi: 10.1080/09720529.2021.1951436
    [26] S. Kumari, R. K. Upadhyay, Exploring the dynamics of a malware propagation model and its control strategy, Wirel. Pers. Commun., 121 (2021), 1945–1978. https://doi.org/10.1007/s11277-021-08748-x doi: 10.1007/s11277-021-08748-x
    [27] G. Liu, J. Chen, Z. Liang, Z. Peng, J. Li, Dynamical analysis and optimal control for a seir model based on virus mutation in wsns, Mathematics, 9 (2021), 929. https://doi.org/10.3390/math9090929 doi: 10.3390/math9090929
    [28] X. Ye, S. Xie, S. Shen, Sir1r2: Characterizing malware propagation in wsns with second immunization, IEEE Access, 9 (2021), 82083–82093. https://doi.org/10.1109/ACCESS.2021.3086531 doi: 10.1109/ACCESS.2021.3086531
    [29] D. Ganeshan, K. Selvan, Analytical solution of propagation of worms in wireless sensor network model by homotopy perturbation method, Tamkang J. Math., 51 (2020), 333–347.
    [30] R. Ojha, P. Srivastava, G. Sanyal, N. Gupta, Improved model for the stability analysis of wireless sensor network against malware attacks, Wirel. Pers. Commun., 116 (2021), 2525–2548. https://doi.org/10.1007/s11277-020-07809-x doi: 10.1007/s11277-020-07809-x
    [31] Y. Zhou, Y. Wang, K. Zhou, S. F. Shen, W. X. Ma, Dynamical behaviors of an epidemic model for malware propagation in wireless sensor networks, Front. Phys., 11 (2023). https://doi.org/10.3389/fphy.2023.1198410 doi: 10.3389/fphy.2023.1198410
    [32] X. Zhong, B. Peng, F. Deng, G. Liu, Stochastic stabilization of malware propagation in wireless sensor network via aperiodically intermittent white noise, Complexity, 2020 (2020), 2903635. https://doi.org/10.1155/2020/2903635 doi: 10.1155/2020/2903635
    [33] J. D. Hernández Guillén, A. Martín del Rey, A mathematical model for malware spread on wsns with population dynamics, Phys. A, 545 (2020), 123609. https://doi.org/10.1016/j.physa.2019.123609 doi: 10.1016/j.physa.2019.123609
    [34] B. Du, H. Wang, M. Liu, An information diffusion model in social networks with carrier compartment and delay, Nonlinear Anal. Model Control, 23 (2018), 568–582. https://doi.org/10.15388/NA.2018.4.7 doi: 10.15388/NA.2018.4.7
    [35] H. Zhang, S. Shen, Q. Cao, X. Wu, S. Liu, Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton, Int. J. Distrib. Sens. Netw., 16 (2020). https://doi.org/10.1177/1550147720972944 doi: 10.1177/1550147720972944
    [36] S. Shen, H. Zhou, S. Feng, J. Liu, H. Zhang, Q. Cao, An epidemiology-based model for disclosing dynamics of malware propagation in heterogeneous and mobile wsns, IEEE Access, 8 (2020), 43876–43887. https://doi.org/10.1109/ACCESS.2020.2977966 doi: 10.1109/ACCESS.2020.2977966
    [37] S. Shen, H. Zhou, S. Feng, L. Huang, J. Liu, S. Yu and Q. Cao, Hsird: A model for characterizing dynamics of malware diffusion in heterogeneous wsns, J. Netw. Comput. Appl., 146, 102420. https://doi.org/10.1016/j.jnca.2019.102420 doi: 10.1016/j.jnca.2019.102420
    [38] S. Shen, H. Zhou, S. Feng, J. Liu, Q. Cao, Snird: Disclosing rules of malware spread in heterogeneous wireless sensor networks, IEEE Access, 7 (2019), 92881–92892. https://doi.org/10.1109/ACCESS.2019.2927220 doi: 10.1109/ACCESS.2019.2927220
    [39] D. Acarali, M. Rajarajan, N. Komninos, B. Zarpelao, Modelling the spread of botnet malware in iot-based wireless sensor networks, Secur. Commun. Netw., 2019 (2019). https://doi.org/10.1155/2019/3745619 doi: 10.1155/2019/3745619
    [40] X. Wu, Q. Cao, J. Jin, Y. Li, H. Zhang, Nodes availability analysis of nb-iot based heterogeneous wireless sensor networks under malware infection, Wirel. Commun. Mob. Comput., 2019 (2019). https://doi.org/10.1155/2019/4392839 doi: 10.1155/2019/4392839
    [41] R. M. Carnier, Y. Li, Y. Fujimoto, J. Shikata, Exact markov chain of random propagation of malware with network-level mitigation, IEEE Int. Things J., 10 (2023), 10933–10947. https://doi.org/10.1109/JIOT.2023.3240421 doi: 10.1109/JIOT.2023.3240421
    [42] V. Srivastava, P. K. Srivastava, J. Mishra, R. P. Ojha, P. S. Pandey, R. S. Dwivedi, et al., Generalized defensive modeling of malware propagation in wsns using atangana-baleanu- caputo (abc) fractional derivative, IEEE Access, 11 (2023), 49042–49058. https://doi.org/10.1109/ACCESS.2023.3276351 doi: 10.1109/ACCESS.2023.3276351
    [43] Y. Zhou, B. T. Liu, K. Zhou, S. F. Shen, Malware propagation model of fractional order, optimal control strategy and simulations, Front. Phys., 11 (2023). https://doi.org/10.3389/fphy.2023.1201053 doi: 10.3389/fphy.2023.1201053
    [44] S. J. Achar, C. Baishya, M. K. A. Kaabar, Dynamics of the worm transmission in wireless sensor network in the framework of fractional derivatives, Math. Meth. Appl. Sci., 45 (2022), 4278–4294. https://doi.org/10.1002/mma.8039 doi: 10.1002/mma.8039
    [45] G. Liu, Z. Tan, Z. Liang, H. Chen, X. Zhong, Fractional optimal control for malware propagation in the internet of underwater things, IEEE Int. Things J. https://doi.org/10.1109/JIOT.2023.3331736 doi: 10.1109/JIOT.2023.3331736
    [46] J. Bi, F. Zhang, A. Dorri, C. Zhang, C. Zhang, A risk management approach to double-virus tradeoff problem, IEEE Access, 7 (2019), 144472–144480. https://doi.org/10.1109/ACCESS.2019.2944985 doi: 10.1109/ACCESS.2019.2944985
    [47] S. Shen, H. Li, R. Han, A. V. Vasilakos, Y. Wang, Q. Cao, Differential game-based strategies for preventing malware propagation in wireless sensor networks, IEEE Trans. Inf. Forensic Secur., 9 (2014), 1962–1973. https://doi.org/10.1109/TIFS.2014.2359333 doi: 10.1109/TIFS.2014.2359333
    [48] Y. Yang, G. Liu, Z. Liang, H. Chen, L. Zhu, X. Zhong, Hybrid control for malware propagation in rechargeable wusn and wasn: From knowledge-driven to data-driven, Chaos Solitons Fractals, 173 (2023). https://doi.org/10.1016/j.chaos.2023.113703 doi: 10.1016/j.chaos.2023.113703
    [49] B. Xu, M. Lu, H. Zhang, C. Pan, A novel multi-agent model for robustness with component failure and malware propagation in wireless sensor networks, Sensors, 21 (2021), 4873. https://doi.org/10.3390/s21144873 doi: 10.3390/s21144873
    [50] S. Muthukrishnan, S. Muthukumar, V. Chinnadurai, Optimal control of malware spreading model with tracing and patching in wireless sensor networks, Wirel. Pers. Commun., 117 (2021), 2061–2083. https://doi.org/10.1007/s11277-020-07959-y doi: 10.1007/s11277-020-07959-y
    [51] J. Bi, S. He, F. Luo, W. Meng, L. Ji, D. W. Huang, Defense of advanced persistent threat on industrial internet of things with lateral movement modeling, IEEE Trans. Ind. Inform., 19 (2023), 9619–9630. https://doi.org/10.1109/TII.2022.3231406 doi: 10.1109/TII.2022.3231406
    [52] J. Bi, F. Luo, S. He, G. Liang, W. Meng, M. Sun, False data injection and propagation-aware game theoretical approach for microgrids, IEEE Trans. Smart Grid, 13 (2022), 3342–3353. https://doi.org/10.1109/TSG.2022.3174918 doi: 10.1109/TSG.2022.3174918
    [53] J. Bi, F. Luo, G. Liang, X. Yang, S. He, Z. Y. Dong, Impact assessment and defense for smart grids with fdia against ami, IEEE Trans. Netw. Sci. Eng., 10 (2023), 578–591. https://doi.org/10.1109/TNSE.2022.3197682 doi: 10.1109/TNSE.2022.3197682
    [54] O. Dieckmann, J. Heesterbeek, Mathematical Epidemiology of Infectious Diseases: Model Building, Analysis and Interpretation, John Wiley and Sons, Ltd., 2000.
    [55] O. Diekmann, J. Heesterbeek, J. Metz, On the definition and the computation of the basic reproduction ration R0 in models for infectious diseases in heterogeneous populations, J. Math. Biol., 28 (1990), 365–382. https://doi.org/10.1007/bf00178324 doi: 10.1007/bf00178324
  • This article has been cited by:

    1. Er. Akshay Katyal, Rajesh Singla, EEG-based hybrid QWERTY mental speller with high information transfer rate, 2021, 59, 0140-0118, 633, 10.1007/s11517-020-02310-w
    2. Xu Yin, Ming Meng, Qingshan She, Yunyuan Gao, Zhizeng Luo, Optimal channel-based sparse time-frequency blocks common spatial pattern feature extraction method for motor imagery classification, 2021, 18, 1551-0018, 4247, 10.3934/mbe.2021213
    3. Tianhui Sha, Yikai Zhang, Yong Peng, Wanzeng Kong, Semi-supervised regression with adaptive graph learning for EEG-based emotion recognition, 2023, 20, 1551-0018, 11379, 10.3934/mbe.2023505
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1417) PDF downloads(124) Cited by(4)

Figures and Tables

Figures(18)  /  Tables(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog