Ad Hoc Networks. 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers

Research Article

Evaluation of Malware Spreading in Wireless Multihop Networks with Churn

Download59 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-13329-4_6,
        author={Vasileios Karyotis and Symeon Papavassiliou},
        title={Evaluation of Malware Spreading in Wireless Multihop Networks with Churn},
        proceedings={Ad Hoc Networks. 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers},
        proceedings_a={ADHOCNETS},
        year={2014},
        month={11},
        keywords={SIS malware Network churn Wireless multihop networks Product-form queuing networks Network robustness},
        doi={10.1007/978-3-319-13329-4_6}
    }
    
  • Vasileios Karyotis
    Symeon Papavassiliou
    Year: 2014
    Evaluation of Malware Spreading in Wireless Multihop Networks with Churn
    ADHOCNETS
    Springer
    DOI: 10.1007/978-3-319-13329-4_6
Vasileios Karyotis1,*, Symeon Papavassiliou1,*
  • 1: National Technical University of Athens
*Contact email: vassilis@netmode.ntua.gr, papavass@mail.ntua.gr

Abstract

Modeling malware spreading in wireless networks has attracted significant interest lately, since this will increase the robustness of such networks that constitute the lion’s share of Internet access nowadays. However, all of previous works have considered networks with fixed number of devices. In this work, we focus on users that can dynamically join and leave the network (node churn) as a result of the effects of malware, or their own operation, i.e. energy depletion. We adopt and adapt a queuing-based model for malware spreading for the case of wireless distributed networks with churn. The corresponding methodology captures the dynamics of SIS-type malware, where nodes are always prone to receive new or already spreading infections over a long period. The employed framework can be exploited for quantifying network reliability and study network behavior, which can be further used for increasing the robustness of the system against the most severe attacks.