You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

17 July 2021

A Novel Multi-Agent Model for Robustness with Component Failure and Malware Propagation in Wireless Sensor Networks

,
,
and
1
The Key Laboratory on Reliability and Environmental Engineering Technology, Beihang University, Beijing 140191, China
2
School of Reliability and Systems Engineering, Beihang University, Beijing 140191, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Sensor Networks for Cyber Physical Systems

Abstract

A wireless sensor network (WSN) is a group of sensors connected with a wireless communications infrastructure designed to monitor and send collected data to the primary server. The WSN is the cornerstone of the Internet of Things (IoT) and Industry 4.0. Robustness is an essential characteristic of WSN that enables reliable functionalities to end customers. However, existing approaches primarily focus on component reliability and malware propagation, while the robustness and security of cascading failures between the physical domain and the information domain are usually ignored. This paper proposes a cross-domain agent-based model to analyze the connectivity robustness of a system in the malware propagation process. The agent characteristics and transition rules are also described in detail. To verify the practicality of the model, three scenarios based on different network topologies are proposed. Finally, the robustness of the scenarios and the topologies are discussed.

1. Introduction

As a critical driver of the social evolution progress, the Internet has significantly transformed the way things communicate with each other. The Internet of Things (IoT) aims to promote this stride further to seamlessly connect people and various things, transforming society toward becoming intelligent, convenient, and efficient (ICE) with potentially excessive economic and environmental profits [,]. At the bottom layer of the IoT, smart, low-power, and micro-sensor devices are typically deployed to measure the physical conditions of the object or environment being monitored. These sensor devices are typically networked through wireless mediums, forming a wireless sensor network (WSN).
Due to some IoT application domains’ safety-critical or mission-critical features, it is compulsory that the WSN operate robustly throughout the intended mission time and mission environment. In other words, robustness is one of the crucial requirements for the adoption of the WSN in critical applications [,,,,]. Malfunctions of WSN devices, failing to capture data, network outage, data corruption, or loss may cause catastrophic effects, such as mission failure, financial loss, and harm to people and environments.
For a more robust WSN, considerable research efforts have been disbursed in modeling and designing the reliability of WSN in the past decades. These studies are distributed at different levels, including the component level, path level, and system level [].
The component-level reliability models aim to produce a realistic estimation of reliability or related attributes of nodes or links. Wang et al. [] modeled the battery-powered sensor node (BPSN) reliability as the battery component, while Deif et al. [] evaluated the BPSN reliability by considering the failures and dependencies of its four major constituent components. To make WSN resilient to sensor node failures, refs [,] studied several reliability designs using hot or cold standby sparing techniques. As for the path level, refs [,,] analyzed the connectivity-based reliability of an end-to-end path (selected using a specific routing algorithm). The system-level WSN reliability has been defined and modeled based on the function performed. Researchers focus on the information transfer from sink node to sensor node [,,] and/or the opposite direction [,,]. Although the levels are different, it is undoubted that these component parameter estimations are crucial foundations of the reliability analysis at the path level and system level of WSN. In addition, higher network connectivity usually leads to higher resistance to node failure because it can provide multiple alternative connectivity paths.
Recently, increasing attention has been paid to the security of WSN. This trend has triggered our consideration of the security of WSN networks. According to current WSN reliability research, the information domain (for example, software failure and malware-related failure) is seldom considered in the reliability modeling of sensor nodes. To the best of our knowledge, no modeling work combines the propagation of malware and the impact of malware on the reliability of sensor nodes. WSN with high connectivity robustness needs a high average degree network topology, which will also accelerate the spread of malware, which may eventually reduce the connectivity robustness of WSN. If we only consider the component reliability or malware propagation factors to select the WSN network topology with higher connectivity reliability, then the results of selection may be quite different.
Consequently, in this work, an agent-based model (ABM) is proposed to analyze the malware propagation in WSN together with component reliability. We identify the individual physical-domain and information-domain characteristics of the agents involved, as well as the agent–agent and agent–environment interactions. The ABM presented in this research will use mathematical epidemiology to determine the states of agents in each slice of time and choose the maximally connected component (MCC) as the measure to evaluate the connectivity robustness of WSN. The SEIRS-F ABM proposed in this study considers system characteristics such as the reliability of sensor nodes, malware, topology, environment, and maintenance. The main contributions of this work are listed as follows.
  • We propose a cross-domain ABM. The model integrates the physical domain (component failure) and information domain (malware propagation) and can model the cascading failures between the physical and information domains.
  • We consider a cross-domain description and classification of agents, which includes not only sensors but also other aspects such as malware, network topology, environment, and maintenance.
  • We carry out a series of simulations based on NetLogo with different scenarios and topologies. Scenarios include military, industry, and Smart Home scenarios. Topologies include star, lattice-2d, random, and complex networks. The real-time display of the discrete states of the node and the MCC at each step of time t is shown.
  • We compare the robustness of each scenario and topology based on the simulation results. We also compared with an existing model; the results show that there is a significant difference in the robustness of the model considering malware propagation compared to the control model. Noting that malware is already one of the important factors affecting WSN reliability, our model is more realistic.
The rest of the paper is organized as follows. Section 2 gives an overview of recent research in the field of component reliability and mathematical models that have been proposed to model malware propagation in WSN. In Section 3, the SEIRS-F agent-based model to simulate node failure and malware propagation in WSN is presented. For simulations, the model parameters obtained according to the application scenarios are given in Section 4. Section 5 discusses the simulation results. Finally, in Section 6, the conclusions are presented.

3. SEIRS-F Agent-Based Model

The SEIRS-F (i.e., susceptible, exposed, infected, recovered, and failed) agent-based model proposed in this work is an individual, discrete, and stochastic model. This model has allowed analyzing the component failure behavior and the malware behavior from a cross-domain perspective by integrating new elements that will enable the adjustment of the characteristics of the model to more realistic interactions between component and malware. Therefore, sensors, malware, network topology, environment, and maintenance have been defined as agents. Additionally, transition rules have been adjusted with characteristics of different agents and behaviors of the WSN in the environment.
Additionally, the behavior and characteristics of an agent can be evaluated individually in a slice of time t . Finally, this model uses the advantages of agent-based models for cross-domain dependency in wireless sensor networks.
In the proposed SEIRS-F model, the sensor nodes adopt, in each slice of time t , one of the following states (see Figure 1):
Figure 1. Scheme of the SEIRS-F model.
Susceptible: the sensor is working correctly without subsystem failure and has not been infected by malware, but it has the characteristics to be failed or infected.
Exposed: the sensor is reached by malware but cannot transmit malware to the neighbor sensor due to the characteristics of the sensor. Whether the sensor works properly depends on the type of malware.
Infected: the sensor infected by malware. The infected sensor obtains the ability to transmit malware to its neighbors. Whether the sensor works appropriately depends on the type of malware.
Recovered: the sensor acquires temporal resistance to malware when it has successfully removed malware or installed security fixes.
Failed: the sensor that dies because of malicious physical damage, subsystem failure, battery life out, or the quick discharge when infected by malware.
The population of nodes is supposed to remain constant, consequently: S t + E t + I t + R t + F t = N at each step of time t . For a given time t , N is the total number of agents, S t are the susceptible agents, E t stands for the number of exposed agents, I t represents the number of agents in the infected state, R t are the recovered agents, and finally, F t denotes the agents in the failed state.
Agents concern the meaning of autonomy and interact, collaborate, coordinate, and negotiate with both each other and the environment, based on the transition rules. In the model proposed in this work, the agents and the characteristics will be defined in Section 3.1. In Section 3.2, these transition rules will be detailed according to agents’ behavior, which is established by rules that define the agents’ response to other agents and the environment.

3.1. Agents and Environmental Characteristics

Sensors and some other environmental factors compose the SEIRS-F agent-based model—sensor nodes, malware, network topology, environment, and maintenance resource. These factors have been selected after analyzing the different characteristics and environments that may affect the operation of the wireless sensor network. The main characteristics considered for each factor are as follows: (1) importance to the component failure process and maintenance process and (2) contribution to the malware propagation process.
The factors with their specific characteristics and corresponding values are described in Table 1.
Table 1. Factors with their characteristics.
Sensors can collect data from the environment, which is the main element in WSN. Based on the consideration of reliability and security, we will consider the following characteristics of sensors:
  • Reliability state of sensor: the sensor has two states, i.e., the normal state and the failure state. The sensor can achieve the expected function such as collection, processing, and transmission in the normal state. While in the failure state, one or all of these functions cannot be accomplished.
  • Reliability level: has been divided into a high level, medium level, and low level, corresponding to the sensor nodes whose reliability level is from high to low.
  • Security level: has been classified into high level when the trusted security methods are used, medium-level if it uses basic means, and low level if it does not have any security designs.
  • Transmission capability: Some nodes are limited by software and hardware function and cannot spread malware to their neighbors.
  • Battery power: essentially determines the lifetime and thus the reliability of the sensor node [,]. The initial battery power is divided into three levels, from low to high.
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. The following two characteristics of malware are considered in our model:
  • Infection intensity is the attack strength of malware; higher infection intensity has a greater possibility of infecting the node’s neighbors. Infection intensity may vary between very high and very low.
  • Target: malware is designed for different targets, some of which hinder the function of the software; some could increase energy consumption and accelerate the consumption of battery lifetime; others can even damage the hardware. The target can be software function, subsystem hardware, or battery power.
Network topology: refers to the structure of the network. We will consider one characteristic of this agent:
  • Type of topologies: star topology, lattice-2d topology, and random topology.
Environment: differs regarding the type and application of the WSN. In this work, we divided the environment by the risk of physical attack and the risk of malware attack, as follows:
  • Risk of physical attack: sensors are deployed in hostile environments in a military surveillance application, which means high risk. Some attackers may attack the physical devices and information functions of the industrial infrastructure at the same time to achieve a higher success rate, which leads to medium risk. Sensors in other application scenarios are usually deployed in a friendly environment with close attention, and the risk of intentional physical attack is shallow, which is generally just accidental damage.
  • Risk of malware attack: Military environment corresponds to high risk, medium risk when the environment is industrial, and low risk when the environment is daily activities and Smart Home.
Maintenance: this is related to the maintenance resources, behaviors, and cycle. The connectivity robustness of WSN is maintained by restoring the function of nodes after they suffer from physical or information shock. The two characteristics considered here are:
  • Resource: The available maintenance resources, including materials and workforce, are not unlimited. The amount of resources is divided into a high level, medium level, and low level.
  • Maintenance behavior: in some environments, it is inconvenient or even impossible to recharge or repair the sensor nodes for WSN in hostile environments such as military surveillance applications. The failed nodes can only be replaced by re-dropping nodes regularly. In other scenarios, the node can be repaired or charged, but it also costs human resources.
  • Maintenance cycle: each can reset the remaining maintenance resources. There is an upper limit for one-time input of resources, and resources can be recovered over time. Due to the work cycle of humans and equipment, the recovery of maintenance resources is designed to be periodic.

3.2. Transition Rules

The transition rules of the SEIRS-F model define the conditions that a sensor x i must be satisfied to transform from one state to another in a step of time t , where the state of x i S , E , I , R , F . These rules are designed based on previously defined agent characteristics.
Transition rules define the interaction patterns between sensors and their environment.

3.2.1. Susceptible to Infected

A sensor transforms from a susceptible to an infected state when it is compromised by malware during an attack. The probability of a node changing from susceptible to infected depends on five characteristics: the reliability state of the sensor, as a failed node will not be infected by malware; transmission capability, as some nodes are limited by hardware and software resources and cannot spread malware; the security level of the sensor and the infection intensity of malware are two opposite characteristics, which constitute the probability of the sensor being infected by the malware; and there is also the risk of malware attack, which affects the number of initially infected nodes.
The explicit expression is the following:
P x i 0 = S 0 x i 0 = I 0 = β X 10   w h e n   X 1 = n o r m a l   s t a t e   AND   X 4 = t r u e
P x i t = S t x i t + 1 = I t + 1 = σ X 3 , X 6   w h e n   X 1 = n o r m a l   s t a t e   AND   X 4 = t r u e
where X 1 represents the reliability state of the sensor, X 4 indicates the transmission capability, X 3 means the security level of the sensor, X 6 reflects the infection intensity of the malware, and X 10 considers the risk of malware attack.

3.2.2. Susceptible to Exposed

A sensor moves from a susceptible to an exposed state when it has been captured by malware but does not have the processing capacity to disseminate the malware to neighboring nodes. The probability of a node switch from susceptible to exposed depends on the same five characteristics as the previous transition rule; merely one of the features has changed.
That is:
P x i 0 = S 0 x i 0 = E 0 = β X 10   w h e n   X 1 = n o r m a l   s t a t e   AND   X 4 = f a l s e
P x i t = S t x i t + 1 = E t + 1 = σ X 3 , X 6   w h e n   X 1 = n o r m a l   s t a t e   AND   X 4 = f a l s e
where X 1 represents the reliability state of the sensor, X 4 indicates the transmission capability, X 3 means the security level of the sensor, X 6 reflects the infection intensity of the malware, and X 10 considers the risk of malware attack.

3.2.3. Susceptible to Failed

A sensor moves from a susceptible to a failed state when its subsystems (including power subsystem, sensing subsystem, processing subsystem, communication subsystem, and other specific subsystems) fail, or the software fails, or the battery power is exhausted. The probability of a node switch from susceptible to failed depends on four characteristics: the reliability state of the sensor, as a failed node will not fail again; the reliability level of the sensor, which contains the reliability level of hardware and software; battery power, which is the essential condition of sensor operation; and the risk of physical attack, as sensors deployed in hostile environments are highly likely to be physically damaged. This characteristic affects the number of sensors that are initially physically destroyed and fail.
That is:
P x i 0 = S 0 x i 0 = F 0 = δ X 9   w h e n   X 1 = n o r m a l   s t a t e
P x i t = S t x i t + 1 = F t + 1 = 1   w h e n   X 1 = n o r m a l   s t a t e   AND   X 5 0
P x i t = S t x i t + 1 = F t + 1 = λ X 2   w h e n   X 1 = n o r m a l   s t a t e   AND   X 5 > 0
where X 1 represents the reliability state of the sensor, X 2 indicates the reliability level, X 5 means the remaining battery power of the sensor, and X 9 reflects the risk of physical attack, which affects the number of nodes that fail initially due to physical damage.

3.2.4. Infected to Failed

Similar to the previous transition rule, a sensor moves from an infected to a failed state when its subsystems fail, the software fails, or the battery power is exhausted. However, a characteristic related to transition probability is added, which is the target. Different malware will cause different types of damage to the sensor. Some will directly attack the hardware and software, resulting in sensor failure. Some others could accelerate power consumption, eventually leading to power exhaustion and sensor failure.
It is supposed that:
P x i t = I t x i t + 1 = F t + 1 = 1   w h e n   X 1 = n o r m a l   s t a t e   AND   X 5 0
P x i t = I t x i t + 1 = F t + 1 = λ X 2   w h e n   X 1 = n o r m a l   s t a t e   AND   X 5 > 0   A N D   X 7   i s   n o t   s o f t w a r e   f u n c t i o n   o r   s u b s y s t e m   h a r d w a r e
P x i t = I t x i t + 1 = F t + 1 = λ X 2 , X 7   w h e n   X 1 = n o r m a l   s t a t e   AND   X 5 > 0   A N D   X 7   i s   s o f t w a r e   f u n c t i o n   o r   s u b s y s t e m   h a r d w a r e
where X 1 represents the reliability state of the sensor, X 2 indicates the reliability level, X 5 means the remaining battery power of the sensor, and X 7 reflects the target of the malware.

3.2.5. Exposed to Failed

Analogous to the past transition rule, a sensor passes from an exposed to a failed state when its subsystems fail, the software fails, or the battery power is exhausted. The difference between the infected state and the exposed state is whether the node can spread malicious software, which does not affect the state transformation of the node itself.
As a consequence:
P x i t = E t x i t + 1 = F t + 1 = 1   w h e n   X 1 = n o r m a l   s t a t e   AND   X 5 0
P x i t = E t x i t + 1 = F t + 1 = λ X 2   w h e n   X 1 = n o r m a l   s t a t e   AND   X 5 > 0   A N D   X 7   i s   n o t   s o f t w a r e   f u n c t i o n   o r   s u b s y s t e m   h a r d w a r e
P x i t = E t x i t + 1 = F t + 1 = λ X 2 , X 7   w h e n   X 1 = n o r m a l   s t a t e   AND   X 5 > 0   A N D   X 7   i s   s o f t w a r e   f u n c t i o n   o r   s u b s y s t e m   h a r d w a r e
where X 1 represents the reliability state of the sensor, X 2 indicates the reliability level, X 5 means the remaining battery power of the sensor, and X 7 reflects the target of the malware.

3.2.6. Infected to Recovered

A sensor shifts from an infected to a recovered state when the malware of the compromised node has been removed, and the node temporarily gains immunity to malware. The duration of temporary immunity relates to the security level of the sensor and the infection intensity of malware, which both decide the duration of immunization.
The probability of a node switch from infected to recovered depends on three characteristics. The security level of the sensor and the infection intensity of malware represent the technical strength of the defense and the attacker, respectively. The more notable the gap between the two, the easier/harder it is to remove malware from nodes and gain immunity. In the maintenance cycle, the premise of installing security patches is that malware infection is found during maintenance. In the simulation, the maintenance cycle decreases with time. When it is equal to 0, the maintenance is executed, and the maintenance cycle resets.
It is defined as follows:
P x i t = I t x i t + 1 = R t + 1 = γ X 3 , X 6   w h e n   X 13 = 0
where X 3 represents the security level of the sensor, X 6 indicates the infection intensity of the malware, and X 13 means the maintenance cycle.

3.2.7. Exposed to Recovered

Like the previous transition rule, the sensor moves from an exposed to a recovered state when the malware has been detected and removed, and the node temporarily gains immunity to malware. Both transition rules are mainly the same.
As a consequence:
P x i t = E t x i t + 1 = R t + 1 = γ X 3 , X 6   w h e n   X 13 = 0
where X 3 represents the security level of the sensor, X 6 indicates the infection intensity of the malware, and X 13 means the maintenance cycle.

3.2.8. Recovered to Susceptible

A sensor shifts from a recovered to a susceptible state when it loses its temporary immunity. While the node obtains security repair, the attacker will also update the malicious code—the node cannot get immunity once and for all.
Then:
P x i t = R t x i t + 1 = S t + 1 = 1   w h e n   i m m u n i t y   d u r a t i o n = 0
where X 1 represents the reliability state of the sensor, X 2 indicates the reliability level, X 5 means the remaining battery power of the sensor, and X 7 reflects the target of the malware.

3.2.9. Failed to Susceptible

A sensor alternates from failed to susceptible state when the sensor failure has been repaired. The failure may be caused by subsystem hardware failure, software failure, and power exhaustion. Various deployment environments and failure reasons affect the choice of maintenance behavior. For example, in military applications, sensors deployed in a hostile environment are challenging to repair or charge. Hence, they often choose to put in new sensors to replace the failed sensors directly.
Furthermore, different maintenance behaviors correspond to different maintenance resource consumption, which will affect the remaining maintenance resources. The probability of a node switch from failed to susceptible depends on three characteristics: the resource of maintenance, as the maintenance of failed sensor node consumes a certain amount of resources; maintenance behavior, which corresponds to different resource consumption; and the maintenance cycle, as each cycle resets the remaining maintenance resources.
It is supposed that:
P x i t = F t x i t + 1 = S t + 1 = 1   w h e n   X 11 > 0   AND   X 13 = 0
where X 11 represents the remaining maintenance resources, X 13 indicates the maintenance cycle, X 12 is implied in the change of X 11 and different X 12 corresponds to different consumption quantities of X 11 .

4. Simulation

Some software supports ABM modeling and simulation, including free open source software and paid commercial software. Each solution brings valid characters for different domains that can be studied. Abar et al. [] summarized the tools used to model and simulate these models and their application areas and analyzed the ease of model development and computational modeling ability; another critical feature is the scalability of the models.
The simulation of the SEIRS-F model has been developed in NetLogo []. The framework has been chosen according to the number of supported nodes, implementation area, programming convenience, and result visualization. In this case, a network of 140 nodes, a personal computer as the implementation area, NetLogo’s language as the programming language, graphics generation, and real-time results visualization have been easily obtained for the selected simulation tool.
The model’s simulation is implemented with 140 nodes; each node corresponds to a sensor agent, and three network topologies have been defined in each scenario (see Figure 2): star, lattice-2d (basically, a grid), and random (generating algorithm uses the G (n, p) variant of the Erdős–Rényi model []). We choose the maximally connected component (MCC) as the measure to evaluate the connectivity robustness of WSN.
Figure 2. View of network topologies.
Next, different scenarios are described, and the simulation results under the combination of scenario and topology are given. These scenarios include military, industry, and Smart Home, which are typical application scenarios for WSNs. They have significant differences in the reliability and security of sensor nodes, malware infection intensity, the number of maintenance resources invested, and how they are invested due to different stakeholder considerations. We have additionally added simulation experiments on complex networks to explore the MCC performance of more network topologies. See Appendix A for parameter settings for all these simulations.

4.1. Scenario 1

The environment is the military surveillance application in this scenario.
The reliability and security of military sensors are highly required. To maintain long-term work, the battery power is large.
The infection intensity in terms of the attacker’s technical level is high, and the attackers may choose multiple targets.
Nodes are usually deployed in malicious areas, and the risks of physical attacks and malware attacks are high.
Due to the private nature of the mission and the inaccessibility of the hostile territory, it may not be possible to repair or recharge the sensors during the task; the maintenance team chose to replace the failed sensor with the intact one. The maintenance resources and maintenance cycle are high (see Table A1 and Table A2).
The three topologies have been defined with the same feathers: 140 sensor nodes and ten random intransmissible nodes. The connection probability of each node in a random topology is 0.03. These simulation designs have resulted in the following graphs for star (see Figure 3a), lattice-2d (see Figure 3b), and random (see Figure 3c) topologies. The evolution of the MCC in each topology is observed. In order to distinguish the MCC curve from the normal curve in the image, we slightly reduce the values of each point on the MCC curve. The following figures are processed in the same way.
Figure 3. Simulation on military surveillance application in (a) star topology, (b) lattice-2d topology, and (c) random topology.

4.2. Scenario 2

The setting for this scenario is the industry.
Industrial sensors have high-reliability requirements and have a general level of security. A peaceful deployment environment allows the sensor to be charged, so the battery capacity is suitable.
Some malicious attackers will implant computer viruses into the enterprise’s industrial facilities for ransom. The organized hacker groups are skillful in technical means. They usually choose the software function as the target and do not seek to obliterate the WSN—that is against the purpose of blackmail.
To improve the attack’s success rate, it is also feasible to confuse the maintenance team with simultaneous physical destruction. The risk of a physical attack is medium, and the risk of a malware attack is high.
The inspection and maintenance of industrial sensors is a routine work of the maintenance team, and the maintenance resource and maintenance cycle are medium (see Table A4 and Table A5).
Configurations of the topologies are the following: 140 sensor nodes and ten random intransmissible nodes. The connection probability of each node in a random topology is 0.03. The simulation results are in the following graphs for star (see Figure 4a), lattice-2d (see Figure 4b), and random (see Figure 4c) topologies. The evolution of the MCC in each topology is observed.
Figure 4. Simulation on industry application in (a) star topology, (b) lattice-2d topology, and (c) random topology.

4.3. Scenario 3

The last environment has been defined with daily activities and Smart Home.
Considering the cost, the reliability and security of Smart Home sensors are low. The charging of daily equipment is convenient, so the battery power is low.
Attacking individual users can only gain little for skilled attackers, and it is not convenient to obtain ransom money. This type of information attack is often large-scale, using less advanced malicious code, not specifically for someone. The infection intensity is low, and the target is software function.
The risk of physical attacks and malware attacks is low.
Problems with daily necessities can usually be found and maintained immediately. Maintenance resource and maintenance cycle are low (see Table A6 and Table A7).
The following topologies have been defined: 140 sensor nodes and ten random intransmissible nodes. The connection probability of each node in random topology is 0.03. Next, the results obtained in this scenario can be seen in (Figure 5a–c).
Figure 5. Simulation on Smart Home in (a) star topology, (b) lattice-2d topology, and (c) random topology.

4.4. Complex Networks

To make a simulation comparison on a larger scale topology with complex network properties, we add simulation experiments of complex networks. Due to the large scale of complex networks and a substantial number of nodes and connections, the simulation speed is affected. Complex networks’ simulation has only been implemented in military applications, and the parameter design is the same as Scenario 1 (see Table A3).
The scale-free network and small-world network have been configured with 400 nodes (see Figure 6). These nodes have been distributed as follows: 400 sensor nodes and 20 random intransmissible nodes.
Figure 6. (a) Scale-free network; (b) small-world network.
In the scale-free network, the graph is generated using the Barabási–Albert model. This network has the property of being “scale-free”: the distribution of degrees (i.e., the number of links for each turtle) follows a power law. The minimum degree is 1—each newly added node creates an edge with the existing nodes.
The small-world network uses Watts–Strogatz model to produce a graph with small-world properties, including short average path lengths and high clustering. The algorithm creates a ring of nodes first, where each node is connected to three nodes on either side. Then, each link is rewired with a probability of 0.05.
Graphs obtained by simulation on complex networks are as follows (Figure 7a,b). The evolution of the MCC in each topology is observed.
Figure 7. Simulation results of a (a) scale-free network, (b) small-world network.
To demonstrate the significance of malware propagation considered in WSN reliability modeling, we use the reliability model proposed in [] for comparison, which uses the dual-mode (on and off) SN model. To make a fair comparison, we use our proposed complex network topology. The dual-mode SN model assumes that a given SN is either in a fully functional or failed state. The SN does not have a negative but unfailed state of being infected. Malware propagation is not considered, and the number of maintenance resources is reduced to maintain the fairness of comparison because the impact of malware on reliability is eliminated.

5. Discussion

An SEIRS-F agent-based model is introduced to simulate the component failure and malware propagation on wireless sensor networks. Agent and transition rules constitute this model. Each agent is divided into the following categories: susceptible, infected, exposed, recovered, and failed.
The model is simulated in three different scenarios, corresponding to the three typical working environments of WSN. In each case, different characteristics are established to simulate the deployment environment. The parameter settings of the three network topologies are consistent in different scenarios. The simulation results are analyzed according to each scene and each topology.

5.1. Results per Scenario

The first scenario of simulation corresponds to the military application environment. In this type of network, the nodes’ reliability and security tend to be high. Additionally, the attacker’s technical strength is the strongest, and often regardless of cost; for these reasons, the infection intensity in these networks is high. As shown in Figure 3a, the MCC maintains consistency with the normal state for a large proportion of the time and is 0 in the rest time. Aggregation and separation of two curves mean that these nodes can maintain the connection relationship as long as the central node functions correctly, but it is all over if the central node fails. In the lattice-2d topology, the number of infected sensors increased slowly in the early stage. The stability and consistency of the number of normal nodes and MCC are maintained after the spread of malware. The random topology shows a slightly worse MCC than that of lattice-2d; in general, both can maintain the connectivity of the remaining normal nodes when a considerable number of sensors fail.
The simulation environment has been performed in the industry in the second scenario. In these networks, the sensors may have high reliability and medium security level; attackers are willing to attack industrial infrastructure to demand ransom from businesses. In Figure 4, it is observed that the last two topologies maintain acceptable MCC performance. However, different from the military scenario, the MCC performance of lattice-2d topology is worse than that of random topology, which shows that after the proportion of failure nodes in all nodes rises to a certain extent, the lattice-2d network may be “divided” by failure nodes. In contrast, random topology with more global connectivity will not be so split. Not surprisingly, the problem with star topology is the same as in the previous scenario—dramatic mutation.
The third scenario of simulation has been designed as an environment of daily activities and Smart Home. In these networks, the nodes’ reliability and security tend to be low. The attacker also has no interest in attacking individuals. In this case, all the performances of the three topologies are unacceptable, especially star topology. Only random topology networks have been able to maintain a low-quality MCC (see Figure 5).

5.2. Results per Topology

In star topology, almost all nodes communicate through the central node. In this case, the central node controls the infection—other nodes can only contact no more than one infectious source. However, when the central sensor node has been infected and failed, The spread of malware will be accelerated, and MCC will plummet to 0. Therefore, controlling the infection and failure of the central sensor is an effective way to improve the robustness.
The lattice-2d topology presents a 2D lattice network; the average degree of nodes is about 4. It can maintain a stable connection between nodes in case of a node failure and will control the spread of malware to a certain extent in the earlier stage—each node is only connected to two to four nearby nodes. However, it will spread and maintain a certain number of infected nodes eventually. Moreover, if the number of failed nodes exceeds a particular proportion, the MCC of lattice-2d topology will deteriorate more than random topology.
In general, random topology has the best MCC performance. In this network type, each node has a connection probability (between 0 and 1) of being connected to each other node, which means that all nodes are able to communicate with distant ones, and the connection between nodes is homogeneous. In this case, the network can always maintain a certain degree of connectivity, even if a considerable number of nodes fail.
The topology that performs the best is the random topology. We try a simulation that only considers the failure caused by subsystem failure and external physical damage; then, the performance of random topology is also excellent. However, with the integration of malware propagation factors, the global spread of malware will drastically reduce the reliability of the nodes, thereby reducing the functionality of the network. Furthermore, a completely uniform connectivity network does not exist in reality; ignoring the distance between nodes to establish an average connection is unacceptable in cost. The star topology can be considered to have the same MCC and number of normal nodes—unless the central node fails, it will lead to the collapse of network performance. Finally, the lattice-2d topology has a performance in the middle of the other two.

5.3. Results of Complex Networks

The class of scale-free networks has power-law degree distributions. In this case, a small number of nodes with high connectivity become critical connection points. They can keep the infection within a particular proportion, and then the number of failed nodes is controlled. Moreover, due to their crucial role in maintaining network connectivity, their failure will divide the normal nodes into different connected components. This feature leads to the difference between the MCC and the number of normal nodes—it is easy to observe that the proportion of normal nodes is always high, but MCC often fluctuates wildly (see Figure 7a).
In a small world, the underlying lattice structure of the model produces a locally clustered network, while the randomly rewired links dramatically reduce the average path lengths. In this case, the spread of infection rapidly expands and then leads to a large number of node failures. Because the node across the clusters is the critical connective node for its cluster, its failure will also cause the cluster to be separated from the network, significantly reducing the MCC (see Figure 7b).
As can be observed from Figure 8, the MCC performance of the scale-free network in Figure 8a is somewhat different compared to Figure 7a, but it can be seen that if the number of maintenance resources is slightly increased so that the number of failed nodes in Figure 7a and Figure 8a is approximately equal, then the MCC performance should also be approximately the same in both cases. However, Figure 8b shows a significant difference compared to Figure 7b, where malware can propagate rapidly on a small-world network, massively increasing the number of failed nodes and crippling MCC performance. Once the impact of malware is eliminated, the number of failed nodes in the network remains low and the small-world network can maintain connectivity between normal nodes very well.
Figure 8. Simulation results of (a) scale-free network and (b) small-world network; malware propagation was not considered.

6. Conclusions and Future Work

In this paper, an ABM for connectivity robustness was introduced, integrating component failure with the malware propagation model. ABM uses MCC as a measure of connectivity robustness. Furthermore, the ABM models cascading failures between malware propagation and components, crossing the information domain and the physical domain. Finally, we used NetLogo to evaluate the connectivity robustness of different scenarios and network topologies, and the experimental results were discussed.
Below are the main conclusions drawn from the results: (1) The presented model can be used to provide evaluation results of the connectivity robustness of WSNs. (2) The network with a higher average degree has better connectivity robustness with only the component failure considered. However, considering the influence of malware propagation, high connectivity WSNs may not be robust. The trade-offs of high connectivity for rerouting and network topology for malware propagation resistance need further consideration. (3) The interactions between the physical domain and information domain have apparent impacts on the robustness performance of WSNs, which should be appropriately taken into account in the planning and designing of WSNs. (4) The visualization of the results is easy to understand, and the MCC can be analyzed in each step of time t .
In future work, the coupling relationship between the physical domain and the information domain should not be limited to one-to-one. The one-to-many coupling in the actual situation should also be taken into account. The new coupling relationship will also affect the modeling of cascading failure. Finally, a new optimization method to obtain the optimal network topology in different scenarios is needed.

Author Contributions

Conceptualization, B.X. and M.L.; methodology, B.X.; programing, B.X.; validation, B.X.; formal analysis, H.Z.; writing—original draft preparation, B.X.; writing—review and editing, M.L., H.Z., and C.P.; visualization, B.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The simulation files can be found at https://github.com/pauxavi/cyber-physical-social-system-sims (accessed on 7 July 2021).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

The content of Appendix A is the model parameters corresponding to each scenario.
Table A1. Scenario 1 with characteristics and values.
Table A1. Scenario 1 with characteristics and values.
Type of FactorsCharacteristicsValues
SensorsReliability levelHigh
Security levelHigh
Battery powerHigh
MalwareInfection intensityHigh
TargetSoftware function
Subsystem hardware
Battery power
EnvironmentRisk of physical attackHigh
Risk of malware attackHigh
MaintenanceResourceHigh
Maintenance behaviorReplacement
Maintenance cycleLow
Table A2. Scenario 1 with simulation parameters and values.
Table A2. Scenario 1 with simulation parameters and values.
Simulation ParameterRelated CharacteristicsValues
Spread chanceSecurity level20%
Infection intensity
Initial infection numberRisk of malware attack5
Initial failure numberRisk of physical attack20
Failure rateReliability level5%
Immunity durationSecurity level6
Infection intensity
Recovery chanceSecurity level30%
Infection intensity
Resistance chanceSecurity level30%
Infection intensity
Battery powerBattery power30
Maintenance resourceMaintenance resource30
Maintenance behaviorMaintenance behaviorReplacement (2 resource consumption)
Maintenance cycleMaintenance cycle4
Table A3. Scenario 1 with simulation parameters and values (complex network).
Table A3. Scenario 1 with simulation parameters and values (complex network).
Simulation ParameterRelated CharacteristicsValues
Spread chanceSecurity level20%
Infection intensity
Initial infection numberRisk of malware attack10
Initial failure numberRisk of physical attack40
Failure rateReliability level5%
Immunity durationSecurity level6
Infection intensity
Recovery chanceSecurity level30%
Infection intensity
Resistance chanceSecurity level30%
Infection intensity
Battery powerBattery power30
Maintenance resourceMaintenance resource80
Maintenance behaviorMaintenance behaviorReplacement (2 resource consumption)
Maintenance cycleMaintenance cycle4
Table A4. Scenario 2 with characteristics and values.
Table A4. Scenario 2 with characteristics and values.
Type of FactorsCharacteristicsValues
SensorsReliability levelMedium
Security levelMedium
Battery powerMedium
MalwareInfection intensityHigh
TargetSoftware function
Battery power
EnvironmentRisk of physical attackLow
Risk of malware attackMedium
MaintenanceResourceHigh
Maintenance behaviorRecharge
Repair
Maintenance cycleMedium
Table A5. Scenario 2 with simulation parameters and values.
Table A5. Scenario 2 with simulation parameters and values.
Simulation ParameterRelated CharacteristicsValues
Spread chanceSecurity level30%
Infection intensity
Initial infection numberRisk of malware attack3
Initial failure numberRisk of physical attack5
Failure rateReliability level10%
Immunity durationSecurity level4
Infection intensity
Recovery chanceSecurity level20%
Infection intensity
Resistance chanceSecurity level20%
Infection intensity
Battery powerBattery power15
Maintenance resourceMaintenance resource25
Maintenance behaviorMaintenance behaviorRecharge (0.5 resource consumption)
Repair (1 resource consumption)
Maintenance cycleMaintenance cycle2
Table A6. Scenario 3 with characteristics and values.
Table A6. Scenario 3 with characteristics and values.
Type of FactorsCharacteristicsValues
SensorsReliability levelLow
Security levelLow
Battery powerLow
MalwareInfection intensityLow
TargetSoftware function
Battery power
EnvironmentRisk of physical attackLow
Risk of malware attackLow
MaintenanceResourceLow
Maintenance behaviorRecharge
Repair
Maintenance cycleHigh
Table A7. Scenario 3 with simulation parameters and values.
Table A7. Scenario 3 with simulation parameters and values.
Simulation ParameterRelated CharacteristicsValues
Spread chanceSecurity level25%
Infection intensity
Initial infection numberRisk of malware attack1
Initial failure numberRisk of physical attack0
Failure rateReliability level15%
Immunity durationSecurity level6
Infection intensity
Recovery chanceSecurity level5%
Infection intensity
Resistance chanceSecurity level5%
Infection intensity
Battery powerBattery power10
Maintenance resourceMaintenance resource20
Maintenance behaviorMaintenance behaviorRecharge (0.5 resource consumption)
Repair (1 resource consumption)
Maintenance cycleMaintenance cycle1

References

  1. Stankovic, J.A. Research directions for the internet of things. IEEE Internet Things J. 2014, 1, 3–9. [Google Scholar] [CrossRef]
  2. Sakhnini, J.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M.; Srivastava, G. Security aspects of Internet of Things aided smart grids: A bibliometric survey. Internet Things 2019. [Google Scholar] [CrossRef]
  3. Kempf, J.; Arkko, J.; Beheshti, N.; Yedavalli, K. Thoughts on reliability in the internet of things. Interconnecting Smart Objects Internet Work. 2011, 1, 1–4. [Google Scholar]
  4. Zin, T.T.; Tin, P.; Hama, H. Reliability and availability measures for Internet of Things consumer world perspectives. In Proceedings of the 2016 IEEE 5th Global Conference on Consumer Electronics, GCCE 2016, Kyoto, Japan, 11–14 October 2016. [Google Scholar]
  5. Safaei, B.; Monazzah, A.M.H.; Bafroei, M.B.; Ejlali, A. Reliability side-effects in Internet of Things application layer protocols. In Proceedings of the 2017 2nd International Conference on System Reliability and Safety, ICSRS 2017, Milan, Italy, 20–22 December 2017; pp. 207–212. [Google Scholar]
  6. Ateeq, M.; Ishmanov, F.; Afzal, M.K.; Naeem, M. Multi-parametric analysis of reliability and energy consumption in IoT: A deep learning approach. Sensors 2019, 19, 309. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  7. Pasricha, S. Overcoming energy and reliability challenges for IoT and mobile devices with data analytics. In Proceedings of the 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), Pune, India, 6–10 January 2018; pp. 238–243. [Google Scholar]
  8. Xing, L. Reliability Modeling of Wireless Sensor Networks: A Review. Recent Pat. Eng. 2019, 15. [Google Scholar] [CrossRef]
  9. Wang, C.; Xing, L.; Vokkarane, V.M.; Sun, Y. Reliability and lifetime modeling of wireless sensor nodes. Microelectron. Reliab. 2014, 54. [Google Scholar] [CrossRef]
  10. Deif, D.; Gadallah, Y. A comprehensive wireless sensor network reliability metric for critical Internet of Things applications. EURASIP J. Wirel. Commun. Netw. 2017, 2017. [Google Scholar] [CrossRef]
  11. Xing, L.; Li, H.; Michel, H.E. Fault-tolerance and reliability analysis for wireless sensor networks. Int. J. Perform. Eng. 2009, 5, 419. [Google Scholar]
  12. Xing, L.; Shrestha, A. QoS reliability of hierarchical clustered wireless sensor networks. In Proceedings of the IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, USA, 10–12 April 2006; pp. 641–646. [Google Scholar]
  13. Zonouz, A.E.; Xing, L.; Vokkarane, V.M.; Sun, Y.L. Reliability-oriented single-path routing protocols in wireless sensor networks. IEEE Sens. J. 2014, 14. [Google Scholar] [CrossRef]
  14. Mahmood, M.A.; Seah, W.K.G.; Welch, I. Reliability in wireless sensor networks: A survey and challenges ahead. Comput. Netw. 2015, 79. [Google Scholar] [CrossRef]
  15. Huang, Y.; Martínez, J.F.; Sendra, J.; López, L. Resilient wireless sensor networks using topology control: A review. Sensors 2015, 15, 24735–24770. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  16. Shrestha, A.; Xing, L.; Liu, H. Infrastructure communication reliability of wireless sensor networks. In Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC, Indianapolis, IN, USA, 29 September–1 October 2006. [Google Scholar]
  17. Shrestha, A.; Xing, L.; Sun, Y.; Vokkarane, V.M. Infrastructure communication reliability of wireless sensor networks considering common-cause failures. Int. J. Perform. Eng. 2012, 8, 141. [Google Scholar]
  18. Wang, C.; Xing, L.; Vokkarane, V.M.; Sun, Y. Manycast and anycast-based infrastructure communication reliability for wireless sensor networks. In Proceedings of the 18th ISSAT International Conference on Reliability and Quality in Design, Boston, MA, USA, 26–28 July 2012. [Google Scholar]
  19. Shrestha, A.; Xing, L. Quantifying application communication reliability of wireless sensor networks. Int. J. Perform. Eng. 2008, 4, 43. [Google Scholar]
  20. Zonouz, A.E.; Xing, L.; Vokkarane, V.M.; Sun, Y. Application communication reliability of wireless sensor networks supporting K-coverage. In Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, DCoSS, Cambridge, MA, USA, 20–23 May 2013. [Google Scholar]
  21. Wang, C.; Xing, L.; Zonouz, A.E.; Vokkarane, V.M.; Sun, Y.L. Communication Reliability Analysis of Wireless Sensor Networks Using Phased-Mission Model. Qual. Reliab. Eng. Int. 2017, 33. [Google Scholar] [CrossRef]
  22. Venkatesan, L.; Shanmugavel, S.; Subramaniam, C. A Survey on Modeling and Enhancing Reliability of Wireless Sensor Network. Wirel. Sens. Netw. 2013, 05. [Google Scholar] [CrossRef] [Green Version]
  23. Agre, J.; Clare, L. An Integrated Architecture for Cooperative Sensing Networks. Computer 2000, 33. [Google Scholar] [CrossRef]
  24. Al-Karaki, J.N.; Kamal, A.E. Routing techniques in wireless sensor networks: A survey. IEEE Wirel. Commun. 2004, 11. [Google Scholar] [CrossRef] [Green Version]
  25. Anastasi, G.; Conti, M.; Di Francesco, M.; Passarella, A. Energy conservation in wireless sensor networks: A survey. Ad Hoc Netw. 2009, 7. [Google Scholar] [CrossRef]
  26. Koushanfar, F.; Potkonjak, M.; Sangiovanni-Vincentelli, A. Fault tolerance in wireless sensor networks. Handb. Sens. Netw. Compact Wirel. Wired Sens. Syst. 2004, 812–829. [Google Scholar]
  27. Sudevalayam, S.; Kulkarni, P. Energy harvesting sensor nodes: Survey and implications. IEEE Commun. Surv. Tutor. 2011, 13. [Google Scholar] [CrossRef] [Green Version]
  28. He, T.; Krishnamurthy, S.; Luo, L.; Yan, T.; Gu, L.; Stoleru, R.; Zhou, G.; Cao, Q.; Vicaire, P.; Stankovic, J.A.; et al. Vigilnet: An integrated sensor network system for energy-efficient surveillance. ACM Trans. Sens. Netw. 2006, 2, 1–38. [Google Scholar] [CrossRef]
  29. Zhu, C.; Zheng, C.; Shu, L.; Han, G. A survey on coverage and connectivity issues in wireless sensor networks. J. Netw. Comput. Appl. 2012, 35, 619–632. [Google Scholar] [CrossRef]
  30. Zhu, L.; Zhao, H.; Wang, X. Stability and bifurcation analysis in a delayed reaction-diffusion malware propagation model. Comput. Math. Appl. 2015, 69. [Google Scholar] [CrossRef]
  31. Shen, S.; Zhou, H.; Feng, S.; Liu, J.; Cao, Q. SNIRD: Disclosing Rules of Malware Spread in Heterogeneous Wireless Sensor Networks. IEEE Access 2019, 7. [Google Scholar] [CrossRef]
  32. Feng, L.; Song, L.; Zhao, Q.; Wang, H. Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network. Math. Probl. Eng. 2015, 2015. [Google Scholar] [CrossRef] [Green Version]
  33. Liu, B.; Zhou, W.; Gao, L.; Zhou, H.; Luan, T.H.; Wen, S. Malware propagations in wireless Ad Hoc networks. IEEE Trans. Dependable Secur. Comput. 2018, 15. [Google Scholar] [CrossRef]
  34. Acarali, D.; Rajarajan, M.; Komninos, N.; Zarpelão, B.B. Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Secur. Commun. Netw. 2019, 2019. [Google Scholar] [CrossRef]
  35. Shen, S.; Ma, H.; Fan, E.; Hu, K.; Yu, S.; Liu, J.; Cao, Q. A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion. J. Netw. Comput. Appl. 2017, 91. [Google Scholar] [CrossRef]
  36. Wu, X.; Cao, Q.; Jin, J.; Li, Y.; Zhang, H. Nodes Availability Analysis of NB-IoT Based Heterogeneous Wireless Sensor Networks under Malware Infection. Wirel. Commun. Mob. Comput. 2019, 2019. [Google Scholar] [CrossRef]
  37. Wang, T.; Wu, Q.; Wen, S.; Cai, Y.; Tian, H.; Chen, Y.; Wang, B. Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks. Sensors 2017, 17, 139. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  38. Del Rey, A.M.; Guillén, J.D.H.; Sánchez, G.R. Modeling malware propagation in wireless sensor networks with individual-based models. In Proceedings of the Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Salamanca, Spain, 15–16 September 2016; pp. 194–203. [Google Scholar]
  39. Batista, F.K.; Martín del Rey, Á.; Quintero-Bonilla, S.; Queiruga-Dios, A. A SEIR model for computer virus spreading based on cellular automata. In Proceedings of the Advances in Intelligent Systems and Computing, Leon, Spain, 6–8 September 2017; pp. 641–650. [Google Scholar]
  40. Wang, Y.; Li, D.; Dong, N. Cellular automata malware propagation model for WSN based on multi-player evolutionary game. IET Netw. 2018, 7. [Google Scholar] [CrossRef]
  41. Bose, A.; Shin, K.G. Agent-based modeling of malware dynamics in heterogeneous environments. Secur. Commun. Netw. 2013, 6. [Google Scholar] [CrossRef] [Green Version]
  42. Hosseini, S.; Abdollahi Azgomi, M.; Rahmani Torkaman, A. Agent-based simulation of the dynamics of malware propagation in scale-free networks. Simulation 2016, 92. [Google Scholar] [CrossRef]
  43. Bouabdallah, F.; Bouabdallah, N.; Boutaba, R. Energy conservation in reliable wireless sensor networks. In Proceedings of the IEEE International Conference on Communications, Hangzhou, China, 10–12 November 2008; pp. 2404–2408. [Google Scholar]
  44. Abar, S.; Theodoropoulos, G.K.; Lemarinier, P.; O’Hare, G.M.P. Agent Based Modelling and Simulation tools: A review of the state-of-art software. Comput. Sci. Rev. 2017, 24. [Google Scholar] [CrossRef]
  45. Wilensky, U.; Evanston, I. NetLogo: Center for Connected Learning and Computer-Based Modeling; Northwestern University: Evanston, IL, USA, 1999. [Google Scholar]
  46. Li, X.; Magnant, C.; Qin, Z. Random Graphs. In Properly Colored Connectivity of Graphs; Springer: Cham, Switzerland, 2018; pp. 63–72. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.