Optimal Control of Malware Spreading Model with Tracing and Patching in Wireless Sensor Networks

  • PDF / 2,479,412 Bytes
  • 23 Pages / 439.37 x 666.142 pts Page_size
  • 91 Downloads / 191 Views

DOWNLOAD

REPORT


Optimal Control of Malware Spreading Model with Tracing and Patching in Wireless Sensor Networks Senthilkumar Muthukrishnan1 · Sumathi Muthukumar2   · Veeramani Chinnadurai3 Accepted: 5 November 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Wireless sensor networks (WSNs), which emerge from an un-attended environment monitoring, are deployed for monitoring purposes in different environments. But, WSNs suffer from vulnerable malware to propagate via exploiting message exchange among the sensor nodes. To draw attention to this issue, this paper investigates an optimal control strategy to reduce the spread of malware in wireless sensor networks. A node-based epidemic model Susceptible-Infected-Traced-Patched-Susceptible is analyzed. The optimal control strategies are analytically investigated. The proposed optimal strategy achieves a low level of infections at a low cost. Finally, numerical illustrations are presented to show the spread of malware through infected nodes which can be effectively suppressed by adopting the suitable optimal control strategy. Keywords  Wireless sensor networks · Epidemic spreading · Mean-field approximation · Network science · Optimal control

1 Introduction Overwhelming technological advancements such as the Micro-Electro-Mechanical System (MEMS) and the Internet of Things(IoT) demand WSNs for real-time monitoring of environments. Preventing malware attacks in WSNs poses as a challenging problems. WSN comprises of a large number of sensor nodes that are densely deployed in a preset location [1, 2]. According to [3], WSN is a self-configuring network with small sensor nodes that

* Sumathi Muthukumar [email protected] Senthilkumar Muthukrishnan [email protected] Veeramani Chinnadurai [email protected] 1

Department of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, India

2

Department of Mathematics, PSG College of Technology, Coimbatore, India

3

Department of Applied Science (Mathematics), PSG College of Technology, Coimbatore, India



13

Vol.:(0123456789)



S. Muthukrishnan et al.

communicate among them using radio signals and is deployed in large quantity to sense the physical world. WSNs are deployed in military applications for monitoring forces/equipment, battlefield surveillance, exploration, targeting, and combat damage evaluation. In environment applications, WSNs are placed for biocomplexity mapping, precision agriculture, fire and flood detection, etc. Furthermore, health sectors use WSNs for telemonitoring of data, tracking/monitoring of doctors/patients, and drug administration [4, 5]. There are plenty of research works addressing several strategies for securing WSNs from threatening malware attacks employed through Bluetooth or WiFi connectivity [6]. Mishra et al. [1] pointed out that the malware attacks are the most dangerous threats to the integrity of computer and WSN. Ensuring security in WSN poses many security mechanisms to discard malware from WSNs. Khayam and Radha