Dynamic properties of the multimalware attacks in wireless sensor networks: Fractional derivative analysis of wireless sensor networks

被引:1
|
作者
Tahir, Hassan [4 ,5 ]
Din, Anwarud [6 ]
Shah, Kamal [7 ,8 ]
Aphane, Maggie [9 ]
Abdeljawad, Thabet [1 ,2 ,3 ]
机构
[1] Prince Sultan Univ, Dept Math & Sci, POB 11586, Riyadh, Saudi Arabia
[2] Sefako Makgatho Hlth Sci Univ, Sch Sci & Technol, Dept Math & Appl Math, Ga Rankuwa, South Africa
[3] China Med Univ, Dept Med Res, Taichung 40402, Taiwan
[4] EastChina Normal Univ, Sch Math Sci, Key Lab MEA, Minist Educ, Shanghai 200241, Peoples R China
[5] East China Normal Univ, Shanghai Key Lab PMMP, Shanghai 200241, Peoples R China
[6] Sun Yat Sen Univ, Dept Math, Guangzhou 510275, Peoples R China
[7] Prince Sultan Univ, Dept Math & Sci, Saudi Arabi, POB 11586, Riyadh, Saudi Arabia
[8] Univ Malakand, Dept Math, POB 18000, Khyber Pakhtunkhwa, Pakistan
[9] Sefako Makgatho Hlth Sci Univ, Sch Sci & Technol, Dept Math & Appl Math, Ga Rankuwa, South Africa
来源
OPEN PHYSICS | 2024年 / 22卷 / 01期
关键词
epidemic model; wireless sensor networks; fractional derivative; differential operator; computational method; DIFFERENTIAL-OPERATORS; COUPLED SYSTEM; COVID-19; MODEL; STABILITY; EXISTENCE; EQUATIONS; SPREAD;
D O I
10.1515/phys-2023-0190
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Due to inherent operating constraints, wireless sensor networks (WSNs) need help assuring network security. This problem is caused by worms entering the networks, which can spread uncontrollably to nearby nodes from a single node infected with computer viruses, worms, trojans, and other malicious software, which can compromise the network's integrity and functionality. This article discusses a fractional SE1E2IR model to explain worm propagation in WSNs. For capturing the dynamics of the virus, we use the Mittag-Leffler kernel and the Atangana-Baleanu (AB) Caputooperator. Besides other characteristics of the problem, the properties of superposition and Lipschitzness of the AB Caputo derivatives are studied. Standard numerical methods were employed to approximate the Atangana-Baleanu-Caputto fractional derivative, and a detailed analysis is presented. To illustrate our analytical conclusions, we ran numerical simulations.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Analysis of Wormhole Attacks in Wireless Sensor Networks
    Patel, Manish
    Aggarwal, Akshai
    Chaubey, Nirbhay
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2, 2018, 708 : 33 - 42
  • [2] Attacks and Challenges in Wireless Sensor Networks
    Dinker, Aarti Gautam
    Sharma, Vidushi
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3069 - 3074
  • [3] Taxonomy of attacks on wireless sensor networks
    Han, S
    Chang, E
    Gaol, L
    Dillon, T
    EC2ND 2005, PROCEEDINGS, 2006, : 97 - +
  • [4] Comparative Analysis of Wireless Sensor Networks with Wireless Multimedia Sensor Networks
    Mateen, Ahmed
    Sehar, Maida
    Abbas, Khizar
    Akbar, Muhammad Azeem
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 80 - 83
  • [5] Performance Analysis of Sleeping Attacks in Wireless Sensor Networks
    Shakhov, Vladimir
    Popkov, Vladimir
    2008 IEEE REGION 8 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNOLOGIES IN ELECTRICAL AND ELECTRONICS ENGINEERING: SIBIRCON 2008, PROCEEDINGS, 2008, : 418 - +
  • [6] Data tampering attacks diagnosis in dynamic wireless sensor networks
    Huang, Da-Wen
    Liu, Wanping
    Bi, Jichao
    Computer Communications, 2021, 172 : 84 - 92
  • [7] Data tampering attacks diagnosis in dynamic wireless sensor networks
    Huang, Da-Wen
    Liu, Wanping
    Bi, Jichao
    COMPUTER COMMUNICATIONS, 2021, 172 : 84 - 92
  • [8] Main Types of Attacks in Wireless Sensor Networks
    Lupu, Teodor-Grigore
    PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON SIGNALS, SPEECH AND IMAGE PROCESSING/9TH WSEAS INTERNATIONAL CONFERENCE ON MULTIMEDIA, INTERNET & VIDEO TECHNOLOGIES, 2009, : 180 - 185
  • [9] Detecting wormhole attacks in wireless sensor networks
    Xu, Yurong
    Chen, Guanling
    Ford, James
    Makedon, Fillia
    CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 267 - +
  • [10] Detection of masquerade attacks on wireless sensor networks
    Bhuse, Vijay
    Gupta, Ajay
    Al-Fuqaha, Ala
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1142 - 1147