2022
DOI: 10.1109/access.2022.3213032
|View full text |Cite
|
Sign up to set email alerts
|

A Mobility-Based Epidemic Model for IoT Malware Spread

Abstract: With the rapid advancement of technology, IoT has become inseparable from human lives. IoT is extensively used in transport, healthcare, manufacturing, among other sectors. However, this technology lacks sufficient security defense capabilities, thus becoming a highway for malicious actors. IoT networks use infrastructure-based (INF) and device-to-device (D2D) communications to propagate data. The INF communication utilizes technologies such as WLAN, LTE, GPRS, and GSM to relay information from source to desti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 43 publications
0
0
0
Order By: Relevance
“…All malware mathematical models are based on a mix of these common states, developing specific transitions between them according to the modeled network. Examples can be found in SIRS models [22,23], SEIRS models [24][25][26], or SEIRD models [27,28]), to cite the most popular combinations. On top of them, innumerable variations introduce one or more new subdynamics, e.g., [22], where an SIRS-L model was proposed to account for the low-energy mode of wireless sensors.…”
Section: Review Of Literature Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…All malware mathematical models are based on a mix of these common states, developing specific transitions between them according to the modeled network. Examples can be found in SIRS models [22,23], SEIRS models [24][25][26], or SEIRD models [27,28]), to cite the most popular combinations. On top of them, innumerable variations introduce one or more new subdynamics, e.g., [22], where an SIRS-L model was proposed to account for the low-energy mode of wireless sensors.…”
Section: Review Of Literature Modelsmentioning
confidence: 99%
“…Moreover, the diversity of software platforms on which Internet connectivity is built marks IoT networks as strongly heterogeneous compared to former networks [30], increasing surfaces of attack. This complexity can be introduced in models by adding more parameters and elements to the transition between states, like the model of [28] did to model heterogeneous IoT networks where malware spreads both via standard network infrastructure and device-to-device connections (Equations (3a)-(3e)):…”
Section: Review Of Literature Modelsmentioning
confidence: 99%