| ESP Journal of Engineering & Technology Advancements |
| © 2022 by ESP JETA |
| Volume 2 Issue 1 |
| Year of Publication : 2022 |
| Authors : Shamsuddin Ali Akbari A J, Mohammed Ali Hussian |
: 10.56472/25832646/ESP-V2I1P101 |
Shamsuddin Ali Akbari A J, Mohammed Ali Hussian, 2022. "An Effective Malware Detection Algorithm for WSN", ESP Journal of Engineering & Technology Advancements (ESP-JETA) 2(1): 1-4.
Wireless sensor network used as a main element in today world. The sensor network transfers sensed data wireless to the other nodes in the presence of attackers . Attackers in the node affects network performance by dropping and vanishing the packets . In this work, an effective malfunction node detection algorithm is used with malware prevention. The proposed algorithm is implemented using ns2 toll and compared in terms of delay , packet and energy.
[1] C. C. Zou, W. Gong, and D. Towsley, “Code red worm propagation modeling and analysis,” in Proceedings of the 9th ACM conference on Computer and communications security. ACM, 2002, pp. 138–147.
[2] Y. Wang, S. Wen, Y. Xiang, and W. Zhou, “Modeling the propagation of worms in networks: A survey,” IEEE Communications Surveys Tutorials, vol. 16, no. 2, 2014. pp. 942–960.
[3] K. Yang, K. Zhang, J. Ren, and X. Shen, “Security and privacy in mobile crowdsourcing networks: challenges and opportunities,” IEEE Communications Magazine, vol. 53, no. 8, 2015. pp. 75–81.
[4] M. Roberts and J. Heesterbeek, “Mathematical models in epidemiology,” Encyclopedia of Life Support Systems (EOLSS), 2003.
[5] R. Pastor-Satorras and A. Vespignani, “Epidemic spreading in scale-free networks,” Physical review letters, vol. 86, no. 14, 2001. p. 3200.
[6] Y. Moreno, J. B. G´omez, and A. F. Pacheco, “Epidemic incidence in correlated complex networks,” Physical Review E, vol. 68, no. 3, p.035103, 2003.
[7] C. C. Zou, D. Towsley, and W. Gong, “Modeling and simulation study of the propagation and defense of internet e-mail worms,” IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 2, 2007, pp. 105–118.
[8] Z. Chen and C. Ji, “Importance-scanning worm using vulnerable-host distribution.” in Proceedings of IEEE GLOBECOM 2005, 2005, p. 6.
[9] Z. Chen and C. Chen, “A closed-form expression for static worm-scanning strategies,” in Proceedings of IEEE ICC 2008. IEEE, 2008, pp. 1573–1577.
[10] Q. Wang, Z. Chen, C. Chen, and N. Pissinou, “On the robustness of the botnet topology formed by worm infection,” in Proceedings of IEEE GLOBECOM 2010. IEEE, 2010, pp. 1–6.
[11] W. Yu, X. Wang, P. Calyam, D. Xuan, and W. Zhao, “Modeling and detection of camouflaging worm,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 3, 2011, pp. 377–390.
[12] M. Nekovee, “Worm epidemics in wireless ad hoc networks,” New Journal of Physics, vol. 9, no. 6, 2007, p. 189.
[13] ——, “Modeling the spread of worm epidemics in vehicular ad hoc networks,” in Proceedings of IEEE VTC 2006-Spring, vol. 2. IEEE, 2006, pp. 841–845.
[14] B. K. Mishra, S. K. Srivastava, and B. K. Mishra, “A quarantine model on the spreading behavior of worms in wireless sensor network,” Transaction on IoT and Cloud Computing, vol. 2, no. 1, 2014, pp. 1–13.
[15] P. De, Y. Liu, and S. K. Das, “An epidemic theoretic framework for vul-nerability analysis of broadcast protocols in wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 8, no. 3, 209, pp. 413–425.
[16] G. Yan and S. Eidenbenz, “Modeling propagation dynamics of Bluetooth worms (extended version),” IEEE Transactions on Mobile Computing, vol. 8, no. 3, 2009, pp. 353–368.
[17] B. Liu, W. Zhou, L. Gao, S. Wen, and T. H. Luan, “Mobility increases the risk of malware propagations in wireless networks,” in Proceedings of IEEE TrustCom 2015.
[18] R. Hekmat, Ad-hoc networks: fundamental properties and network topologies. Springer Science & Business Media, 2006.
[19] Z. J. Haas, J. Deng, B. Liang, P. Papadimitratos, and S. Sajama, “Wireless ad hoc networks,” Encyclopedia of Telecommunications, 2002.
[20] C. Wang, J. C. Knight, and M. C. Elder, “On computer viral infection and the effect of immunization,” in Proceedings of Computer Security Applications 2000. IEEE, 2000, pp. 246–256.
[21] G. Kesidis, I. Hamadeh, Y. Jin, S. Jiwasurat, and M. Vojnovi´c, “A model of the spread of randomly scanning internet worms that saturate access links,” ACM Transactions on Modeling and Computer Simulation (TOMACS), vol. 18, no. 2, 2008, p. 6.
[22] J. Su, K. K. Chan, A. G. Miklas, K. Po, A. Akhavan, S. Saroiu, E. de Lara, and A. Goel, “A preliminary investigation of worm infections in a bluetooth environment,” in Proceedings of the 4th ACM workshop on Recurring malcode. ACM, 2006, pp. 9–16.
Malware, WSN.