2009
DOI: 10.1145/1525856.1525861
|View full text |Cite
|
Sign up to set email alerts
|

Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory

Abstract: Motivated by recently surfacing viruses that can spread over the air interfaces, in this article, we investigate the potentially disastrous threat of node compromise spreading in wireless sensor networks. We assume such a compromise originating from a single infected node, can propagate to other sensor nodes via communication and pre-established mutual trust. We focus on the possible epidemic breakout of such propagations where the whole network may fall victim to the attack. Using epidemic theory, we model an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(46 citation statements)
references
References 32 publications
0
46
0
Order By: Relevance
“…To curb the potential spread of virus that causes node compromise, De, Liu, and Das [10] investigated the use of random graphs structured in accordance to real world network parameters. This is to generate insights that allow network managers to curb network epidemics.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To curb the potential spread of virus that causes node compromise, De, Liu, and Das [10] investigated the use of random graphs structured in accordance to real world network parameters. This is to generate insights that allow network managers to curb network epidemics.…”
Section: Related Workmentioning
confidence: 99%
“…Their proposed model parameterized the communication patterns of Trickle, Deluge and MNP. Assuming that broadcast protocol propagation originates from a single node and in a ripple-like manner spreads to other nodes with the passage of time, De, Liu, and Das [12] modeled two node deployment patterns, namely: uniform random and group-based deployment.…”
Section: Related Workmentioning
confidence: 99%
“…De et al proposed in [6] proposed the spreading process of node compromise in large-scale sensor networks. To study the results and effects of node capture attack, the author expressed the spread process to compromise the node by using epidemic theory.…”
Section: Survey Of Modeling Of Node Capture Attack Using Different Scmentioning
confidence: 99%
“…In [14], authors investigated the potentially disastrous threat of node compromise spreading (via communication and preestablished mutual trust) in wireless sensor networks and proposed an epidemiological model to investigate the probability of a breakout. This model can be adapted to analyze the spread of malicious behavior of compromised nodes in the process of secrecy transfer.…”
Section: Security Analysismentioning
confidence: 99%