Username   Password       Forgot your password?  Forgot your username? 

 

Dynamic Behaviors of Wireless Sensor Networks Infected by Virus with Latency Delay

Volume 15, Number 3, March 2019, pp. 719-731
DOI: 10.23940/ijpe.19.03.p1.719731

Xiaopan Zhanga, Lingyun Yuana,b, Jianhou Ganb, and Cong Lia

aSchool of Information Science and Technology, Yunnan Normal University, Kunming, 650500, China
b
Key Laboratory of Educational Information for Nationalities, Ministry of Education, Yunnan Normal University, Kunming, 650500, China


(Submitted on October 22, 2018; Revised on November 21, 2018; Accepted on December 23, 2018)

Abstract:

Oscillatory behavior is a ubiquitous phenomenon in various physical and biological processes. Recently, it has been reported that oscillations of wireless sensor networks infected by virus (WSNIVs) can potentially be deleterious to the security strength of systems and may even cause network congestion and paralysis. Moreover, it has been discovered that latency delays are essential for the function of WSNIVs and can drive instability and periodic oscillations, enhance complexity, and even lead to multistability and chaotic motion. However, the precise roles of such delay during the regulation process are still not completely understood. Here, the primary objective of this paper is to study oscillatory behaviors of WSNIVs with latency delay. In particular, the sufficient conditions for local stability and existence with Hopf bifurcation are obtained. Moreover, we further discuss the properties of Hopf bifurcation by using the normal form and the center manifold theorem. The obtained results show that the latency delay can drive the WSNIVs to be oscillatory even when the network is at a stable state, suggesting that such delay might be a potential hazard to the security of wireless sensor systems. Our findings highlight the importance of considering delays when developing safer and more effective wireless sensor networks. Finally, we test and analyze the above research results through numerical calculation with Matlab and simulation experiments with OPNET, and the conclusions are verified to be correct and effective in experiments.

 

References: 29

    1. M. E. Keskin, “A Column Generation Heuristic for Optimal Wireless Sensor Network Design with Mobile Sinks,” European Journal of Operational Research, Vol. 260, No. 1, pp. 291-304, 2016
    2. S. Yu, L. Shuai, and J. Peng, “A High-Efficiency Uneven Cluster Deployment Algorithm based on Network Layered for Event Coverage in UWSNs,” Sensors, Vol. 16, No. 12, pp. 2103, 2016
    3. T. Gao, D. Greenspan, M. Welsh, R. R. Juang, and A. Alm, “Vital Signs Monitoring and Patient Tracking over a Wireless Network,” in Proceedings of International Conference of the Engineering in Medicine & Biology Society, pp. 102, 2005
    4. A. Rasheed and R. N. Mahapatra, “The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks,” IEEE Press, pp. 958-965, 2012
    5. M. H. R. Khouzani and S. Sarkar, “Maximum Damage Battery Depletion Attack in Mobile Sensor Networks,” IEEE Transactions on Automatic Control, Vol. 56, No. 10, pp. 2358-2368, 2011
    6. C. Karlof and D. Wagner, “Secure Routing in Sensor Networks: Attacks and Countermeasures,” in Proceedings of IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113-127, 2003
    7. Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks,” in Proceedings of Joint Conference of the IEEE Computer and Communications, IEEE Societies, Vol. 3, pp. 1976-1986, 2003
    8. M. H. R. Khouzani, S. Sarkar, and E. Altman, “Optimal Control of Epidemic Evolution,” IEEE INFOCOM, Vol. 8, No. 1, pp. 1683-1691, 2011
    9. L. Zhu, H. Zhao, and X. Wang, “Bifurcation Analysis of A Delay Reaction-Diffusion Malware Propagation Model with Feedback Control,” Communications in Nonlinear Science & Numerical Simulation, Vol. 22, pp. 747-768, 2015
    10. J. G. Ren, X. F. Yang, L. X. Yang, et al., “A Delayed Computer Virus Propagation Model and its Dynamics,” Chaos Solitons & Fractals, Vol. 45, pp. 74-79, 2011
    11. L. Zhu, H. Zhao, and X. Wang, “Stability and Bifurcation Analysis in a Delayed Reaction-Diffusion Malware Propagation Model,” Pergamon Press, Inc., pp. 852-875, 2015
    12. Z. Zhang and F. Si, “Dynamics of a Delayed SEIRS-V Model on the Transmission of Worms in a Wireless Sensor Network,” Advances in Difference Equations, Vol. 2014, No. 1, pp. 1-15, 2014
    13. M. E. J. Newman, “The Structure and Function of Complex Networks,” SIAM Review, Vol. 45, No. 2, pp. 167-256, 2003
    14. B. K. Mishra and N. Jha, “Fixed Period of Temporary Immunity after Run of Anti-Malicious Software on Computer Nodes,” Applied Mathematics & Computation, Vol. 190, No. 2, pp. 1207-1212, 2007
    15. B. K. Mishra and S. K. Pandey, “Fuzzy Epidemic Model for the Transmission of Worms in Computer Network,” Nonlinear Analysis Real World Applications, Vol. 11, No. 5, pp. 4335-4341, 2010
    16. X. Han and Q. Tan, “Dynamical Behavior of Computer Virus on Internet,” Applied Mathematics & Computation, Vol. 217, No. 6, pp. 2520-2526, 2010
    17. H. Yuan, G. Q. Chen, J. J. Wu, and H. Xiong, “Towards Controlling Virus Propagation in Information Systems with Point-to-Group Information Sharing,” Decision Support Systems, Vol. 48, No. 1, pp. 57-68, 2009
    18. B. K. Mishra and S. K. Pandey, “Dynamic Model of Worms with Vertical Transmission in Computer Network,” Applied Mathematics & Computation, Vol. 217, No. 21, pp. 8438-8446, 2011
    19. B. K. Mishra and D. K. Saini, “SEIRS Epidemic Model with Delay for Transmission of Malicious Objects in Computer Network,” Applied Mathematics & Computation, Vol. 188, No. 2, pp. 1476-1482, 2007
    20. B. K. Mishra and N. Jha, “SEIQRS Model for the Transmission of Malicious Objects in Computer Network,” Applied Mathematical Modelling, Vol. 34, No. 3, pp. 710-715, 2010
    21. B. K. Mishra and N. Keshri, “Mathematical Model on the Transmission of Worms in Wireless Sensor Network,” Applied Mathematical Modelling, Vol. 37, No. 6, pp. 4103-4111, 2013
    22. X. Wang, Q. Li, and Y. Li, “EiSIRS: a Formal Model to Analyze the Dynamics of Worm Propagation in Wireless Sensor Networks,” Journal of Combinatorial Optimization, Vol. 20, No. 1, pp. 47-62, 2010
    23. L. P. Song and R. P. Zhang, “Dynamical Analysis for a Malware Propagation Model in Wireless Sensor Network,” Journal of Measurement Science and Instrumentation, 2016
    24. C. Q. Gan, X. F. Yang, Q. Y. Zhu, J. Jin, and L. He, “The Spread of Computer Virus under the Effect of External Computers,” Nonlinear Dynamics, Vol. 73, No. 3, pp. 1615-1620, 2013
    25. L. P. Feng, X. F. Liao, H. Q. Li, and Q. Han, “Hopf Bifurcation Analysis of a Delayed Viral Infection Model in Computer Networks,” Mathematical & Computer Modelling, Vol. 56, No. 7-8, pp, 167-179, 2012
    26. J. G. Ren, Y. H. Xu, Y. C. Zhang, Y. Q. Dong, and G. S. Hao, “Dynamics of a Delay-Varying Computer Virus Propagation Model,” Discrete Dynamics in Nature and Society, Vol. 2012, No. 6, pp. 857-868, 2012
    27. T. Dong, X. Liao, and H. Li, “Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus,” Abstract & Applied Analysis, Vol. 2012, No. 2, pp. 374-388, 2012
    28. H. R. Thieme and P. Van den Driessche, “Global Stability in Cyclic Epidemic Models with Disease Fatalities,” Differential Equations with Applications to Biology, pp. 459-472, 1998
    29. B. D. Hassard, N. D. Kazarinoff, and Y. H. Wan, “Theory and Applications of Hopf Bifurcation,” Cambridge University Press, pp. 961-969, 1981

       

      Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

       
      This site uses encryption for transmitting your passwords. ratmilwebsolutions.com