Taming epidemic outbreaks in mobile adhoc networks

被引:4
|
作者
Hoque, E. [1 ]
Potharaju, R. [1 ]
Nita-Rotaru, C. [1 ]
Sarkar, S. [2 ]
Venkatesh, S. S. [2 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Univ Penn, Dept Elect Engn, Philadelphia, PA USA
关键词
Epidemic; Malware; Defense; Mobile adhoc networks; CONTAINMENT; MODELS;
D O I
10.1016/j.adhoc.2014.07.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The openness of the smartphone operating systems has increased the number of applications developed, but it has also introduced a new propagation vector for mobile malware. We model the propagation of mobile malware among humans carrying smartphones using epidemiology theory and study the problem as a function of the underlying mobility models. We define the optimal approach to heal an infected system with the help of a set of static healers that distribute patches as the T-COVER problem, which is NP-COMPLETE. We then propose three families of healer protocols that allow for a trade-off between the recovery time and the energy consumed for deploying patches. We show through simulations using the NS-3 simulator that despite lacking knowledge of the exact future, our healers obtain a recovery time within a 7.4x similar to 10x bound of the oracle solution that has knowledge of the future arrival time of all the infected nodes. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 50 条
  • [31] A New Protocol to Secure AODV in Mobile AdHoc Networks
    Krishnan, Avinash
    Manjunath, Aishwarya
    Reddy, Geetha J.
    ADVANCED COMPUTING, PT III, 2011, 133 : 378 - 389
  • [32] Interference Management through Mobile Relays in Adhoc Networks
    Naini, Rohit
    Moulin, Pierre
    2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 2077 - 2080
  • [33] Security Assessment of Routing Protocols in Mobile Adhoc Networks
    Soni, Megha
    Joshi, Brijendra Kumar
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [34] Mapping wireless signal strength for mobile adhoc networks
    Larkin, H
    da Wu, Z
    Toomey, W
    ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 151 - 157
  • [35] Self-organized management of mobile adhoc networks
    Kulkarni, Amit B.
    Spackmann, Richard
    Kuthethoor, Giri
    MILCOM 2006, VOLS 1-7, 2006, : 1165 - +
  • [36] A Comprehensive Analysis of DoS Attacks in Mobile Adhoc Networks
    Das, Kasturiniva
    Taggu, Amar
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 2273 - 2278
  • [37] Stable and energy efficient routing for mobile Adhoc networks
    Rishiwal, Vinay
    Kush, Ashwani
    Verma, Shekhar
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 1028 - +
  • [38] Design and Performance of QOSRGA Protocol for Mobile Adhoc Networks
    Abdullah, J.
    INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2009, 1 (03): : 19 - 31
  • [39] A Robust Cooperation Approach For Mobile Multimedia Adhoc Networks
    Bahi, J. M.
    Eskandar, M.
    Mostefaoui, A.
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 499 - 504
  • [40] TCP Variants for Mobile Adhoc Networks: Challenges and Solutions
    Molia, Hardik K.
    Kothari, Amit D.
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (04) : 1791 - 1836