Simulation based analysis of spreading dynamics of malware in wireless sensor networks

dc.contributor.authorBadakhshan, Maneli
dc.contributor.authorArifler, Do?u
dc.date.accessioned2026-02-06T17:58:29Z
dc.date.issued2007
dc.departmentDoğu Akdeniz Üniversitesi
dc.description2007 International Conference on Sensor Technologies and Applications, SENSORCOMM 2007 --
dc.description.abstractWe analyze spreading dynamics of malware (malicious software) that can replicate itself on other nodes in a network of wireless sensing devices. Epidemic models have previously been employed by researchers to investigate the spreading dynamics of malware in the Internet. Most studies have generally ignored spatial deployment characteristics of nodes which are critical for a realistic analysis in wireless sensor networks. We consider random and localized attack strategies by malware that may be introduced by an adversary into a network with either completely random or clustered sensor deployment patterns. Results demonstrate that sensor networks face serious security threats, particularly in cases where sensors are deployed in clusters and when malware can carry out attacks to random targets. We recommend possible defense measures based on simple topology control that might slow down the spread of malware across the network and allow necessary measures to be taken for containing the spread when malware employs a localized attack strategy. Presented analysis has a significant impact on network security and defense industry since it provides an insight into potential threats to information and surveillance infrastructure consisting of wireless sensing devices. © 2007 IEEE.
dc.identifier.doi10.1109/SENSORCOMM.2007.4394915
dc.identifier.endpage169
dc.identifier.isbn9780769529882
dc.identifier.isbn0769529887
dc.identifier.scopus2-s2.0-46449112712
dc.identifier.scopusqualityN/A
dc.identifier.startpage164
dc.identifier.urihttps://doi.org/10.1109/SENSORCOMM.2007.4394915
dc.identifier.urihttps://search.trdizin.gov.tr/tr/yayin/detay/
dc.identifier.urihttps://hdl.handle.net/11129/7602
dc.indekslendigikaynakScopus
dc.language.isoen
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.snmzKA_Scopus_20260204
dc.subjectComputer crime
dc.subjectDetectors
dc.subjectDynamics
dc.subjectHybrid sensors
dc.subjectInternet
dc.subjectRandom processes
dc.subjectSensor networks
dc.subjectSensors
dc.subjectTopology
dc.subjectWireless networks
dc.subjectAttack strategies
dc.subjectdefense industries
dc.subjectDefense measures
dc.subjectDeployment characteristics
dc.subjectEpidemic models
dc.subjectinternational conferences
dc.subjectMalicious software
dc.subjectMalware
dc.subjectPotential threats
dc.subjectRandom targets
dc.subjectSecurity threats
dc.subjectsensor deployment
dc.subjectSensor technologies
dc.subjectsimple topology
dc.subjectSimulation-based analysis
dc.subjectSpreading dynamics
dc.subjectWireless sensing
dc.subjectWireless sensors
dc.subjectWireless sensor networks
dc.titleSimulation based analysis of spreading dynamics of malware in wireless sensor networks
dc.typeConference Object

Files