Dynamic properties of the multimalware attacks in wireless sensor networks: Fractional derivative analysis of wireless sensor networks

被引:1
|
作者
Tahir, Hassan [4 ,5 ]
Din, Anwarud [6 ]
Shah, Kamal [7 ,8 ]
Aphane, Maggie [9 ]
Abdeljawad, Thabet [1 ,2 ,3 ]
机构
[1] Prince Sultan Univ, Dept Math & Sci, POB 11586, Riyadh, Saudi Arabia
[2] Sefako Makgatho Hlth Sci Univ, Sch Sci & Technol, Dept Math & Appl Math, Ga Rankuwa, South Africa
[3] China Med Univ, Dept Med Res, Taichung 40402, Taiwan
[4] EastChina Normal Univ, Sch Math Sci, Key Lab MEA, Minist Educ, Shanghai 200241, Peoples R China
[5] East China Normal Univ, Shanghai Key Lab PMMP, Shanghai 200241, Peoples R China
[6] Sun Yat Sen Univ, Dept Math, Guangzhou 510275, Peoples R China
[7] Prince Sultan Univ, Dept Math & Sci, Saudi Arabi, POB 11586, Riyadh, Saudi Arabia
[8] Univ Malakand, Dept Math, POB 18000, Khyber Pakhtunkhwa, Pakistan
[9] Sefako Makgatho Hlth Sci Univ, Sch Sci & Technol, Dept Math & Appl Math, Ga Rankuwa, South Africa
来源
OPEN PHYSICS | 2024年 / 22卷 / 01期
关键词
epidemic model; wireless sensor networks; fractional derivative; differential operator; computational method; DIFFERENTIAL-OPERATORS; COUPLED SYSTEM; COVID-19; MODEL; STABILITY; EXISTENCE; EQUATIONS; SPREAD;
D O I
10.1515/phys-2023-0190
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Due to inherent operating constraints, wireless sensor networks (WSNs) need help assuring network security. This problem is caused by worms entering the networks, which can spread uncontrollably to nearby nodes from a single node infected with computer viruses, worms, trojans, and other malicious software, which can compromise the network's integrity and functionality. This article discusses a fractional SE1E2IR model to explain worm propagation in WSNs. For capturing the dynamics of the virus, we use the Mittag-Leffler kernel and the Atangana-Baleanu (AB) Caputooperator. Besides other characteristics of the problem, the properties of superposition and Lipschitzness of the AB Caputo derivatives are studied. Standard numerical methods were employed to approximate the Atangana-Baleanu-Caputto fractional derivative, and a detailed analysis is presented. To illustrate our analytical conclusions, we ran numerical simulations.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks
    Yang, Yukun
    Xiong, Pengwen
    Wang, Qing
    Zhang, Qiang
    SENSORS, 2019, 19 (15)
  • [22] Dynamic TDMA for Wireless Sensor Networks
    Benrebbouh, Chahrazed
    Louail, Lemia
    2021 30TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2021), 2021, : 204 - 208
  • [23] Dynamic Solution for Detecting Denial of Service Attacks in Wireless Sensor Networks
    Guechari, Malek
    Mokdad, Lynda
    Tan, Sovanna
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [24] Distributed Detection of Wormhole Attacks in Wireless Sensor Networks
    de Graaf, Rennie
    Hegazy, Islam
    Horton, Jeffrey
    Safavi-Naini, Reihaneh
    AD HOC NETWORKS, 2010, 28 : 208 - +
  • [25] On Mitigating On-Off Attacks in Wireless Sensor Networks
    Wei, Zhe
    Wang, Fang
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01): : 298 - 301
  • [26] Distributed Detection of Clone Attacks in Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi Vincenzo
    Mei, Alessandro
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) : 685 - 698
  • [27] An Effective Classification for DoS Attacks in Wireless Sensor Networks
    Thi-Thu-Huong Le
    Park, Taehwan
    Cho, Dongkeun
    Kim, Howon
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 683 - 686
  • [28] DEFENDING WIRELESS SENSOR NETWORKS FROM JAMMING ATTACKS
    Mpitziopoulos, Aristides
    Gavalas, Damianos
    Pantziou, Grammati
    Konstantopoulos, Charalampos
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 81 - +
  • [29] Secure routing in wireless sensor networks: Attacks and countermeasures
    Karlof, C
    Wagner, D
    PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, 2003, : 113 - 127
  • [30] Security in wireless sensor networks: a survey of attacks and countermeasures
    Martins, David
    Guyennet, Herve
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2011, 1 (1-3) : 151 - 162