Taming epidemic outbreaks in mobile adhoc networks

被引:4
|
作者
Hoque, E. [1 ]
Potharaju, R. [1 ]
Nita-Rotaru, C. [1 ]
Sarkar, S. [2 ]
Venkatesh, S. S. [2 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Univ Penn, Dept Elect Engn, Philadelphia, PA USA
关键词
Epidemic; Malware; Defense; Mobile adhoc networks; CONTAINMENT; MODELS;
D O I
10.1016/j.adhoc.2014.07.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The openness of the smartphone operating systems has increased the number of applications developed, but it has also introduced a new propagation vector for mobile malware. We model the propagation of mobile malware among humans carrying smartphones using epidemiology theory and study the problem as a function of the underlying mobility models. We define the optimal approach to heal an infected system with the help of a set of static healers that distribute patches as the T-COVER problem, which is NP-COMPLETE. We then propose three families of healer protocols that allow for a trade-off between the recovery time and the energy consumed for deploying patches. We show through simulations using the NS-3 simulator that despite lacking knowledge of the exact future, our healers obtain a recovery time within a 7.4x similar to 10x bound of the oracle solution that has knowledge of the future arrival time of all the infected nodes. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 50 条
  • [21] A Novel Approach to Implement Fixed to Mobile Convergence in Mobile Adhoc Networks
    Suri, P. K.
    Maan, Sandeep
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (01) : 93 - 99
  • [22] Secure Intrusion Detection System for Mobile Adhoc Networks
    Bharati, Taran Singh
    Kumar, R.
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1257 - 1261
  • [23] Diverse Security Intimidation and Disputes in Mobile Adhoc Networks
    Lakshminarasimha, Kasetty
    Subramanyam, M. V.
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 546 - 550
  • [24] An Improved Cluster Maintenance Scheme for Mobile AdHoc Networks
    Pathak, Sunil
    Dutta, Nitul
    Jain, Sonal
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 2117 - 2121
  • [25] A Comparative Study on Intrusion Detection in Mobile Adhoc Networks
    Divya, S.
    Krishnaveni, S. H.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [26] Epidemic outbreaks with adaptive prevention on complex networks
    Silva, Diogo H.
    Anteneodo, Celia
    Ferreira, Silvio C.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2023, 116
  • [27] An improved intrusion detection technique for mobile adhoc networks
    Prasanna, S
    Vetriselvi, V
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 364 - 376
  • [28] TCP Variants for Mobile Adhoc Networks: Challenges and Solutions
    Hardik K. Molia
    Amit D. Kothari
    Wireless Personal Communications, 2018, 100 : 1791 - 1836
  • [29] Analysing the Data Variation of QOS in Mobile adhoc networks
    Malany, A. Boomarani
    Chandrasekaran, R. M.
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 881 - 883
  • [30] Enhanced AODV Routing Protocol for Mobile Adhoc Networks
    Shobha, K. R.
    Rajanikanth, K.
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 265 - 276