238
Views
24
CrossRef citations to date
0
Altmetric
Articles

Improving wireless sensor networks performance through epidemic model

, &
Pages 862-879 | Received 15 Jun 2017, Accepted 26 Nov 2018, Published online: 26 Feb 2019

References

  • Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.
  • Azad, P., & Sharma, V. (2015). Pareto-optimal clusters scheme using data aggregation for wireless sensor networks. International Journal of Electronics, 102(7), 1165–1176.
  • Byun, H., & So, J. (2016). Node scheduling control inspired by epidemic theory for data dissemination in wireless sensor-actuator networks with delay constraints. IEEE Transactions on Wireless Communications, 15(3), 1794–1807.
  • De, P., Liu, Y., & Das, S. K. (2009a). An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks. IEEE Transactions on Mobile Computing, 8(3), 413–425.
  • De, P., Liu, Y., & Das, S. K. (2009b). Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Transactions on Sensor Networks, 5(3), 1–33.
  • Del, R., A, M., & Peinado, A. (2018). Mathematical models for malware propagation in wireless sensor networks: An analysis. In K. Daimi (Eds.), Computer and network security essentials (pp. 299–313). Cham: Springer.
  • Driessche, P. V., & Watermouch, J. (2002). Reproduction number and sub-threshold endemic equilibrium for compartmental models of disease transmission. Mathematical Biosciences, 110, 29–48.
  • Feng, L., Song, L., Zhao, Q., & Wang, H. (2015). Modeling and stability analysis of worm propagation in wireless sensor network. Mathematical Problems in Engineering, 2015, 1–8.
  • Haghighi, M. S., Wen, S., Xiang, Y., Quinn, B., & Zhou, W. (2016). On the race of worms and patches: Modeling the spread of information in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(12), 2854–2865.
  • Han, G., Liu, L., Jiang, J., Shu, L., & Hancke, G. (2017). Analysis of energy-efficient connected target coverage algorithms for industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 13(1), 135–143.
  • Hu, F., Li, S., Xue, T., & Li, G. (2012). Design and analysis of low-power body area networks based on biomedical signals. International Journal of Electronics, 99(6), 811–822.
  • Kumar, V., Dhok, B. S., Tripathi, R., & Tiwari, S. (2016). Cluster size optimization with tunable elfes sensing model for single and multi-hop wireless sensor networks. International Journal of Electronics, 104(2), 312–327.
  • LaSalle, J. (1976). The stability of dynamical systems. In CBMS-NSF regional conference series in applied mathematics (pp. 96–106). doi:10.1137/1.9781611970432
  • Lopez, M., Peinado, A., & Ortiz, A. (2017). A SEIS model for propagation of random jamming attacks in wireless sensor networks. In International Joint Conference SOCO16-CISIS16-ICEUTE16 advances in intelligent systems and computing (pp. 668–677). Len, Spain. doi:10.1007/978-3-319-47364-2_65
  • Mishra, B. K., & Keshri, N. (2013). Mathematical model on the transmission of worms in wireless sensor network. Applied Mathematical Modelling, 37(6), 4103–4111.
  • Ojha, R. P., Sanyal, G., & Srivastava, P. K. (2018). Pre-vaccination and quarantine approach for defense against worms propagation of malicious objects in wireless sensor networks. International Journal of Information System Modeling and Design (IJISMD), 9(1), 1–20.
  • Ojha, R. P., Sanyal, G., Srivastava, P. K., & Sharma, K. (2017). Design and analysis of modifed SIQRS model for performance study of wireless sensor network. Scalable Computing: Practice and Experience, 18(3), 229–241.
  • Shen, S., Huang, L., Liu, J., Champion, A. C., Yu, S., & Cao, Q. (2016). Reliability evaluation for clustered WSNs under malware propagation. Sensors, 16(6), 855.
  • Shen, S., Li, H., Han, R., Vasilakos, A. V., Wang, Y., & Cao, Q. (2014). Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(11), 1962–1973.
  • Singh, A. K., Purohit, N., & Varma, S. (2012). Fuzzy logic based clustering in wireless sensor networks: A survey. International Journal of Electronics, 100(1), 126–141.
  • Tang, S. (2011). A modified SI epidemic model for combating virus spread in wireless sensor networks. International Journal of Wireless Information Networks, 18, 319–326.
  • Tang, S., & Li, W. (2011). An epidemic model with adaptive virus spread control for wireless sensor networks. International Journal of Security and Networks, 6(4), 201–210.
  • Tang, S., & Mark, B. L. (2009, November). Analysis of virus spread in wireless sensor networks: An epidemic model. In Proceedings of the 2009 7th international workshop on the design of reliable communication networks, DRCN 2009 (pp. 86–91). Washington, DC, USA. doi:10.1109/DRCN.2009.5340022
  • Tang, S., Myers, D., & Yuan, J. (2013). Modified SIS epidemic model for analysis of virus spread in wireless sensor networks. International Journal of Wireless and Mobile Computing, 6(2), 99–108.
  • Upadhyay, R. K., & Kumari, S. (2017). Bifurcation analysis of an e-epidemic model in wireless sensor network. International Journal of Computer Mathematics, 95(9), 1775–1805.
  • Verma, V. K., Singh, S., & Pathak, N. (2016). Impact of malicious servers over trust and reputation models in wireless sensor networks. International Journal of Electronics, 103(4), 530–540.
  • Wang, T., Wu, Q., Wen, S., Cai, Y., Tian, H., Chen, Y., & Wang, B. (2017). Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks. Sensors, 17(1), 139.
  • Wang, X., Li, Q., & Li, Y. (2010). EiSIRS: A formal model to analyze the dynamics of worm propagation in wireless sensor networks. Journal of Combinatorial Optimization, 20(1), 47–62.
  • Wang, X. M., & Li, Y. S. (2009). An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks. Chinese Journal of Electronics, 18(1), 8–12.
  • Wang, Y., Wen, S., Xiang, Y., & Zhou, W. (2014). Modeling the propagation of worms in networks: A survey. IEEE Communications Surveys & Tutorials, 16(2), 942–960.
  • Wang, Y. Q., & Yang, X. Y. (2013). Virus spreading in wireless sensor networks with a medium access control mechanism. Chinese Physics B, 22(4), 040206.
  • Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 51(12), 2292–2330.
  • Zhang, S. K., Gong, S. R., & Cui, Z. M. (2009, January). Study on spreading of virus infection with sirs characteristic in wireless sensor network. In Proceeding of international conference on communication and mobile computing (Vol. 3, pp.512–517), Yunnan, China.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.