Taming epidemic outbreaks in mobile adhoc networks

被引:4
|
作者
Hoque, E. [1 ]
Potharaju, R. [1 ]
Nita-Rotaru, C. [1 ]
Sarkar, S. [2 ]
Venkatesh, S. S. [2 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Univ Penn, Dept Elect Engn, Philadelphia, PA USA
关键词
Epidemic; Malware; Defense; Mobile adhoc networks; CONTAINMENT; MODELS;
D O I
10.1016/j.adhoc.2014.07.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The openness of the smartphone operating systems has increased the number of applications developed, but it has also introduced a new propagation vector for mobile malware. We model the propagation of mobile malware among humans carrying smartphones using epidemiology theory and study the problem as a function of the underlying mobility models. We define the optimal approach to heal an infected system with the help of a set of static healers that distribute patches as the T-COVER problem, which is NP-COMPLETE. We then propose three families of healer protocols that allow for a trade-off between the recovery time and the energy consumed for deploying patches. We show through simulations using the NS-3 simulator that despite lacking knowledge of the exact future, our healers obtain a recovery time within a 7.4x similar to 10x bound of the oracle solution that has knowledge of the future arrival time of all the infected nodes. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 50 条
  • [41] Wormhole Attack Avoidance Technique in Mobile Adhoc Networks
    Singh, Yudhvir
    Khatkar, Avni
    Rani, Prabha
    Deepika
    Barak, Dheer Dhwaj
    2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES (ACCT 2013), 2013, : 283 - 287
  • [42] An enforced QoS shceme for high Mobile Adhoc Networks
    Lakrami, Fatima
    Elkamoun, Najib
    El Kamili, Mohamed
    2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2015, : 179 - 186
  • [43] A Novel Multipath Routing Scheme in Mobile Adhoc Networks
    Jaisankar, N.
    Saravanan, R.
    Swamy, K. Durai
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 209 - +
  • [44] Into the Wild: Taming Uncertainty in Perpetual Mobile Networks
    Sorber, Jacob M.
    MOBIHOC S3 09, 2009, : 41 - 43
  • [45] Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey
    Govindan, Kannan
    Mohapatra, Prasant
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 279 - 298
  • [46] Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks
    Alocious, Chaminda
    Xiao, Hannan
    Christianson, Bruce
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 811 - 816
  • [47] Wireless signal strength topology maps in mobile adhoc networks
    Larkin, H
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2004, 3207 : 538 - 547
  • [48] An Optimized Secured Service selection under Mobile Adhoc Networks
    Bibiana, A. Annie
    Shaji, R. S.
    Jayan, J. P.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1048 - 1054
  • [49] Special issue on resource management in wireless and adhoc mobile networks
    Dattagupta, J
    Das, N
    MICROPROCESSORS AND MICROSYSTEMS, 2004, 28 (08) : 401 - 402
  • [50] Maintaining Connectivity in Mobile Adhoc Networks Using Distributed Optimisation
    Hunjet, Robert
    Hui, Ping
    2011 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2011,