2019
DOI: 10.1002/dac.4102
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of malware propagation behavior in Social Internet of Things

Abstract: Summary Social Internet of Things (SIoT) is an evolution of the Internet of Things, where objects interact socially with each other in the sense that they can independently establish new relationships, offer, or discover services, in order to accomplish their tasks with minimum involvement of the user. This additional convenience comes at the expense of higher risk of speeding up malware propagation through the dynamically created relationships. Because of the undesirable effects of malware (eg, disruption of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…Due to the rechargeable characteristic, the time of the charging behavior relative to the whole process of the spreading of malware [ 33 ] is short, and the charging behavior can be thought of as a pulse activity to some extent. The problem of malware spreading under pulse charging is different from that under continuous charging mode [ 34 ].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the rechargeable characteristic, the time of the charging behavior relative to the whole process of the spreading of malware [ 33 ] is short, and the charging behavior can be thought of as a pulse activity to some extent. The problem of malware spreading under pulse charging is different from that under continuous charging mode [ 34 ].…”
Section: Introductionmentioning
confidence: 99%
“…Typically, we apply epidemic theory to model IoT malware diffusion in both wired and wireless networks since malware propagation can be likened to the spread of pathogens in humans [7]. In particular, Susceptible-Infectious (SI) [8]- [10], Susceptible-Infectious-Susceptible (SIS) [11]- [14], and Susceptible-Infectious-Recovered (SIR) [15]- [17] models are widely applied. Many variants such as Susceptible-Exposed-Infected-Recovered (SEIR) [18]- [20], Susceptible-Active-Dormant-Immune (SADI) [21], and Heterogeneous-Susceptible-Infected-Recovered-Dead (HSIRD) [22] are developed by introducing additional states and their corresponding parameters.…”
Section: Introductionmentioning
confidence: 99%
“…Many variants such as Susceptible-Exposed-Infected-Recovered (SEIR) [18]- [20], Susceptible-Active-Dormant-Immune (SADI) [21], and Heterogeneous-Susceptible-Infected-Recovered-Dead (HSIRD) [22] are developed by introducing additional states and their corresponding parameters. By considering propagation via both INF and D2D transmission links [8], [13], [17], [21], the epidemic models become more complicated but better suited for modeling the spreading behavior of realistic IoT malware.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations