Next Article in Journal
Field Measurements and Numerical Simulations of Temperature and Moisture in Highway Engineering Using a Frequency Domain Reflectometry Sensor
Next Article in Special Issue
A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks
Previous Article in Journal
Improving the Accuracy of Laplacian Estimation with Novel Variable Inter-Ring Distances Concentric Ring Electrodes
Previous Article in Special Issue
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reliability Evaluation for Clustered WSNs under Malware Propagation

1
Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China
2
College of Mathematics, Physics and Information Engineering, Jiaxing University, Jiaxing 314001, China
3
Department of Computer Science and Engineering, The Ohio State University, Columbus, OH 43210, USA
4
School of Information Technology, Deakin University, Burwood 3125, Australia
5
College of Computer Science and Technology, Donghua University, Shanghai 201620, China
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(6), 855; https://doi.org/10.3390/s16060855
Submission received: 21 April 2016 / Revised: 4 June 2016 / Accepted: 6 June 2016 / Published: 10 June 2016
(This article belongs to the Special Issue Security and Privacy in Sensor Networks)

Abstract

:
We consider a clustered wireless sensor network (WSN) under epidemic-malware propagation conditions and solve the problem of how to evaluate its reliability so as to ensure efficient, continuous, and dependable transmission of sensed data from sensor nodes to the sink. Facing the contradiction between malware intention and continuous-time Markov chain (CTMC) randomness, we introduce a strategic game that can predict malware infection in order to model a successful infection as a CTMC state transition. Next, we devise a novel measure to compute the Mean Time to Failure (MTTF) of a sensor node, which represents the reliability of a sensor node continuously performing tasks such as sensing, transmitting, and fusing data. Since clustered WSNs can be regarded as parallel-serial-parallel systems, the reliability of a clustered WSN can be evaluated via classical reliability theory. Numerical results show the influence of parameters such as the true positive rate and the false positive rate on a sensor node’s MTTF. Furthermore, we validate the method of reliability evaluation for a clustered WSN according to the number of sensor nodes in a cluster, the number of clusters in a route, and the number of routes in the WSN.

1. Introduction

Wireless Sensor Networks (WSNs) play an important role in daily life, as numerous modern information systems rely on WSNs, which consist of many sensor nodes with limited computation, storage, and communication resources. WSN applications include environmental, highway, and patient health monitoring as well as other commercial uses [1]. To realize these applications, the research community has focused on ensuring the reliability of WSNs. By definition, reliability reflects the ability of a system or component to perform its required functions under stated conditions for a specified period of time. Due to the nature of data collection in WSNs, this ability has been a major challenge in applying WSNs for successful monitoring. All sensor nodes need to send their sensed data towards the sink. Hence, packet loss due to transmission errors, packet collisions, interference, node failures, and malicious attacks is common [2]. Therefore, reliability evaluation for WSNs is vital in order to guarantee the delivery of sensed data from sensor nodes to the sink. In addition, reliability evaluation is crucial for maintaining sensor nodes’ functionality as nodes face attacks from self-replicating malicious code (malware for short).
In practice, WSNs are prone to malware propagation [3] for two reasons. First, sensor nodes have similar hardware and software, which results in large-scale malware propagation if even one sensor node is compromised. Second, there are several over-the-air reprogramming protocols (such as Trickle, Firecracker, Deluge, and MNP) that reconfigure sensor nodes without physical contact. Such protocols provide an opportunity for malware to spread across WSNs. Hence, WSNs’ reliability needs to be evaluated under epidemic-malware propagation conditions. This article focuses on such evaluation.
Epidemic models are borrowed from epidemiology to describe malware propagation in WSNs, since there are strong similarities between biological viruses’ self-replication and malware propagation. Classical epidemic models that have attracted much attention in the scientific community are classified among several families. The first family, the Susceptible-Infected (SI) model, is suitable for situations where nodes are either susceptible or infected. In this model, the state transition of any node is only from state Susceptible (S) to state Infected (I) and it is assumed that infected nodes remain in state I forever. The second family, the Susceptible-Infected-Susceptible (SIS) model, considers a susceptible node’s infection with a certain probability when it comes into contact with another infected node. Unlike the SI model, an infected node can be removed with a different probability, becoming susceptible again. The third family, the Susceptible-Infected-Removed (SIR) model, adds the state Removed (R) by extending the SI model. In this model, a susceptible node can be infected only once, since a node transforming from state I to state R becomes immune and is hence unable to propagate malware to other susceptible nodes.
A continuous-time Markov chain (CTMC) provides considerable flexibility for modeling state transitions of sensor nodes, which is suitable for illustrating malware propagation. In general, when the CTMC is used, it includes a set of discrete states and is formally described by a state-transition-rate diagram. The diagram indicates possible states of a sensor node along with directed arcs that characterize transition rates between states. Since malware actions lead to state transitions in a CTMC, it shows the process of malware propagation.
However, the CTMC, which is only one type of stochastic model, is insufficient for correctly treating malware infections that often result in security failures for sensor nodes. Malware residing in an infected sensor node always intentionally propagates itself to other susceptible sensor nodes; thus, such infections cannot be modeled as a stochastic process. Even if the time to propagate malware may be randomly distributed, the decision to propagate is not. To solve this problem, we are motivated to leverage a strategic game to obtain the malware’s expected propagation probability.
Game theory investigating strategic decision-making among players has been widely employed in the field of WSN security [4,5,6,7,8,9,10,11,12] such as optimizing intrusion detection strategies [5,6,10,11,12], securing data aggregation [7], localizing malicious nodes [8], and providing secure defenses for virtual sensor services [9]. This efficient mathematical tool is also suitable to explore different critical decisions during malware propagation. Usually, WSNs guard susceptible sensor nodes from malware attacks using Intrusion Detection Systems (IDSes). However, this method inevitably increases nodes’ costs upon launching IDS agents, since sensor nodes have limited computational resources. Malware achieves greater gains by infecting more sensor nodes and eavesdropping on sensed data from infectious nodes, but this infection behavior obviously increases the probability of detection by IDSes. Thus, malware selects an optimal infection strategy to determine its propagation.
In this paper, we study reliability evaluation for clustered WSNs under epidemic-malware propagation. We use a strategic game to predict malware’s infection behavior whose consequences we integrate into the transition probability upon infection of a sensor node. As a result, we determine how to relate the intent of malware infection to the CTMC’s randomness. Next, we propose a novel measure to reflect the reliability of a sensor node. After considering clustered WSNs as parallel-serial-parallel systems due to their communication modes, we obtain equations to compute the reliability of a cluster, a route, and a clustered WSN, respectively.
Our main contributions are as follows:
(1)
We relate the intent of malware infection to the CTMC’s randomness by introducing a strategic game that can predict malware’s infection behavior. In this manner, state transitions of a sensor node that arise from malware actions can be modeled by the CTMC; and
(2)
We propose a novel measure to compute the Mean Time to Failure (MTTF) of a sensor node, which represents the reliability of a sensor node continuously performing tasks such as sensing, transmitting, and fusing data. Thus, we can deduce the reliability of a cluster, a route, and a clustered WSN from the perspective of a parallel-serial-parallel system, respectively. This method of reliability evaluation for clustered WSNs under epidemic-malware propagation can help establish theoretical foundations that guide rules for applying reliability techniques. Consequently, WSNs that guarantee reliable delivery of sensor nodes’ sensed data may be realized.
The rest of this article is organized as follows: we first review related work and highlight the salient features of our approach in Section 2. We describe infections as state transitions from the view of a CTMC in Section 3. We obtain the infection probability by introducing a strategic malware-infection game in Section 4. We propose measures of reliability evaluation for clustered WSNs under the scenario of epidemic-malware propagation in Section 5. We validate the proposed measures’ efficacy in Section 6. Finally, we conclude the article in Section 7.

2. Related Work

Based on classical epidemic models, many extended studies have been performed to describe the characteristics of malware propagation in WSNs. In a good survey, Yu et al. [13] presented current works on modeling malware propagation. Generally, sensor nodes periodically enter sleep mode to save energy. Typical models reflecting nodes sleeping during malware propagation include EiSIRS [14], a modified SI model [15], a modified SIS model [16], and Shen’s model [17]. Moreover, sensor nodes “die” due to energy exhaustion or intentional destruction by malware. Thus, a dead state was introduced in iSIRS [18] based on the SIR model and Shen’s model [17]. Furthermore, a reaction-diffusion-theoretic model [19], a pulse-differential-equation-based SIR model [20], and a susceptible-exposed-infected-recovered-susceptible model [21] were proposed in order to foresee spatial distribution and the temporal dynamics characteristic of malware propagation. In addition, Yu et al. [22] proposed a two-layer malware propagation model that better represents malware propagation in large-scale networks compared with existing single-layer epidemic models. Keshri and Mishra [23] presented a susceptible-exposed-infectious-recovered model with two time delays for charactering the transmission dynamics of malware propagation. Zhu and Zhao [24] explored a SIR-based nonlinear malware propagation model in WSNs. Wang et al. [25] presented a survey on modeling malware propagation in networks including WSNs. Other typical models [26,27,28,29] address the problem of malware propagation in multi-hop networks, which can help illustrate malware propagation in WSNs.
Several authors have considered decision-making dilemmas arising during malware propagation. Khouzani et al. [30] established a zero-sum dynamic game between the network system and the malware, given that malware can dynamically alter infection parameters based on the network system’s dynamics. Jin et al. [31] used an evolutionary game to construct a malware propagation model under bounded rationality, where the game is to predict the trend of malware’s evolutionary infection. Spyridopoulos et al. [32] employed a complete information game to obtain the defender’s optimal strategy that minimizes the security cost as well as the malware effect. In addition, Trajanovski et al. [33] found decentralized optimal protection strategies for the network system by proposing a game-theoretic framework and seeking its Nash equilibria and the Price of Anarchy.
Several methods have been proposed using various techniques to cope with the challenge of evaluating WSNs’ reliability. In a pioneering work [34], the authors employed a probabilistic graph to represent WSNs given a failure probability estimation of sensor nodes. Kar et al. [35] modeled WSNs’ energy reliability assuming Markovian sensor discharge/recharge periods. Distefano [36] used dynamic reliability block diagrams to represent static structural interactions between sensor nodes, where sleep/wake-up standby policies and interference are considered dynamically. Based on [36], he further gave a reliability evaluation model integrating Petri nets [37]. Silva et al. [38] proposed an evaluation methodology supporting arbitrary failure conditions based on automatically generated fault trees. Niyato et al. [39] proposed reliability analysis of wireless communications systems in the smart grid, which is also suitable for WSNs. Kamal et al. [40] developed a novel framework called Packet-Level Attestation for sensor data reliability evaluation using the spatial relationship among data sensed by nearby sensor nodes. In [41] Dâmaso et al. proposed a reliability evaluation model based on routing algorithms in WSNs and sensor nodes’ various battery levels. According to MAC protocols adopted in WSNs, Wang et al. [42] evaluated a sensor node’s reliability under three typical working scenarios including sensor nodes always in active mode, alternating between sleep and active modes on average, and alternating between these modes based on a certain distribution. Zonouz et al. [43] evaluated the reliability of energy harvesting sensor nodes and battery-powered sensor nodes as well as develop the corresponding wireless-link-reliability models. Cai et al. [44] characterized event-driven WSNs according to limited node battery energy and shadowing under channel fading, obtaining reliable data flows in WSNs via wireless link reliability and node energy availability. Wang et al. [45] analyzed a body sensor node’s reliability subject to probabilistic competition between propagation effects and probabilistic failure isolation. Yan et al. [46] proposed a symbolic ordered-binary-decision-diagram-multicast method to evaluate the reliability of multicast WSNs. Zhu et al. [47] proposed mission-oriented and transmission-paths-based models for evaluating WSNs’ transmission reliability. Other measures closely related to reliability include dependability and survivability such as the stochastic-activity-network-based dependability measure [48], the epidemic-theory-based survivability measure [49,50], survivability analysis using probabilistic model checking [51], and natural-tenacity-based survivability evaluation for mobile WSNs [52].
Unlike this body of work, to the best of our knowledge this work is the first that concentrates on reliability evaluation for clustered WSNs under epidemic-malware propagation conditions. While our epidemic model is similar to [14,17], we further model all state transitions of a sensor node as a CTMC by integrating the malware’s infection probability predicted by our strategic malware-infection game into the transition probability. We apply the approach proposed in [53] to compute the MTTF from a Markov process; however, we further find the equation to compute the reliability of a sensor node under epidemic-malware propagation, which is a novel measure. Considering the topology of a typical clustered WSN, we can thus deduce the reliability of a cluster, a route, and a clustered WSN based on reliability theory. In summary, we propose a unified framework for malware-infection and reliability evaluation that integrates both security and reliability properties of a clustered WSN during the evaluation process.

3. Modeling State Transitions of a Sensor Node as a CTMC

The various epidemic-malware propagation models mentioned above are actually state transition models. These states are mutually exclusive: a sensor node is in exactly one state at any time. During its lifecycle, a sensor node interchanges among different states. Figure 1 illustrates a CTMC indicating state transitions of a sensor node, where p i j , i ,   j { S ,   S ,   I ,   I ,   R ,   R ,   D } , denotes the transition rate from state i to state j , and S , S , I , I , R , R , and D denote states Susceptible, Susceptible while sleeping, Infected, Infected while sleeping, Recovered, Recovered while sleeping, and Dead, respectively. Each sensor node’s characteristics determine its state. State S denotes a sensor node that works normally and is not infected by malware, but it is susceptible to malware. S denotes a sleeping sensor node that malware cannot infect although the node is susceptible. I denotes a sensor node that has been infected by malware and may propagate malware to neighboring nodes with which it communicates as it is under the malware’s control. I denotes an infected sensor node that is sleeping; thus, it cannot propagate malware. R denotes a “recovered” node that can be “immunized” to current malware, but not to future malware. R denotes a recovered node that is sleeping. D denotes a node that is unusable because malware exhausted its energy, deliberately destroyed it, or both.
In practice, behaviors of both sensor nodes and malware trigger each state transition. For each sensor node, installing security patches is a normal method to either prevent susceptible nodes from known malware by fixing bugs or to remedy an infected node and immunize it to known malware. Thus, this action results in the state transitions S R and I R . In general, each node is scheduled to sleep, which saves energy, or to awaken, which leads to the state transitions S S or S S . The state transitions I I or I I as well as R R or R R follow likewise. When confronting unknown malware, a sensor node usually lacks immunity, and the state transition R S follows. In addition, the state transitions S D , S D , I D , I D , R D , and R D take place when malware exhausts a sensor node’s energy. On the other hand, contamination by malware leads to the state transition S I . Moreover, malware can deliberately destroy an infectious sensor node besides the case of death from energy exhaustion; hence, the state transition I D occurs.
However, the state transition S I cannot be formulated as a stochastic process because the infection behavior resulting in this transition is deliberate. Even though the time to execute action Infect is stochastically distributed, the decision to execute the actual infection is not. Since malware decides whether to infect a susceptible sensor node, there is an infection probability that malware determines to execute infection. We let ρ I be the probability that the malware will choose action Infect to propagate itself and λ be the probability of a successful infection in order to formalize the malware’s decision. Thus, the infection rate (i.e., the state transition rate) from state S to state I becomes:
p S I = ρ I λ
By introducing the infection probability ρ I , we can model the consequence of a successful infection as one deliberate state transition of the CTMC, which describes the dynamics of a sensor node’s behavior. In this manner, our modeling approach concentrates on the higher-level effects of infection on a sensor node rather than the lower-level specific infection procedures.

4. A Strategic Malware-Infection Game to Obtain the Infection Probability

We employ a strategic game to predict the malware’s infection behavior, namely obtaining the probability ρ I . We adopt game-theoretic analysis as the following dilemma arises: the malware attempts to infect as many sensor nodes as possible without detection, whereas the defender attempts to enhance the network robustness by detecting more malware. Facing this dilemma, we introduce players malware and system to play the strategic game. Even though there are various kinds of malware whose goals may be to eavesdrop on private sensed data or to disable communication among sensor nodes, it is sufficient to regard all malware as player malware due to malware’s similar motivations and skills. Player system, the opponent of malware, actually corresponds to IDSes residing in WSNs.
In practice, iterations of the strategic game can be depicted as follows. There are discrete periods of time in which player malware launches infection. Player system intends to prevent infection in any of these periods. In each period, each player has two actions: player malware can either infect or not infect while player system can either defend or not defend. But each player can choose only one action with either pure or mixed strategies. If player malware takes no action and player system does not defend, then the game enters the next stage. Next, we formally define our strategic game and we explore the game entirely from malware’s view, since the target of our strategic game is to predict the infection intention of player malware and not to obtain the optimal defense strategies for player system.
Definition 1
The Strategic Malware-Infection Game (SMIG) is formulated by a 4-tuple G = ( N , A M , A S , U ) , where:
  • N = { m a l w a r e ,   s y s t e m } is a set of players;
  • A M = { I n f e c t   ( I ) ,   N o n - i n f e c t   ( ϕ ) } is a set of actions performed by player malware;
  • A S = { D e f e n d   ( D ) ,   N o n - d e f e n d   ( ϕ ) } is a set of actions performed by player system;
  • U : A M × A S is a payoff matrix.
Let ρ I and ρ ϕ be the probabilities that player malware adopts actions Infect and Non-infect, respectively. Let δ D and δ ϕ be the probabilities that player system adopts actions Defend and Non-defend, respectively. Accordingly, infection strategy ρ and defense strategy δ are mixed strategies ( ρ I , ρ ϕ ) and ( δ D , δ ϕ ) , which represent the probability distributions over action sets A M and A S , respectively. Both of them certainly satisfy ρ I + ρ ϕ = 1 and δ D + δ ϕ = 1 . Actually, the infection probability ρ I describes the degree of infection for a sensor node (equivalently, the aggressiveness of player malware targeting a sensor node). The larger ρ I is, the greater the probability of action Infect and, hence, the larger the corresponding infection rate for a sensor node.
Now we consider the payoff matrix to explore malware’s motivation. For simplicity, we denote the worth of a sensor node by ω , where ω > 0 . Actually, ω is equivalent to a degree of damage such as the loss of sensed data, loss due to compromise, and so on. If player malware infects successfully, it will obtain payoff ω and its opponent will obtain payoff ω . On the contrary, if player system succeeds in defense, its payoff is ω because it has protected a sensor node worth ω and player malware will be penalized by ω . However, no IDS can entirely detect all current and future malware: all IDSes have true positive rates and false positive rates. Next, we consider these two rates as defining the payoffs of malware and system and we let α and β be the true positive rate and the false positive rate of the WSN IDS, respectively. We also let c I and c D be the cost of player malware infecting a susceptible sensor node and player system detecting the malware’s infection, respectively. Obviously, there are four possible payoffs constructing the payoff matrix, since each of malware and system has two possible actions. For the action profile (Infect, Defend), player malware will obtain gain ( 1 α ) ω from detection failure as well as loss α ω from being detected successfully and loss c I from adopting action Infect. Thus, the payoff of player malware, u I D I , is:
u I D I = ( 1 α ) ω α ω c I = ( 1 2 α ) ω c I
On the other hand, player system obtains gain α ω as well as loses ( 1 α ) ω from detection failure, β ω from false positive detection, and c D from detecting malware’s infection. Thus, the payoff of player system, u I D S , is:
u I D S = α ω ( 1 α ) ω β ω c D = ( 2 α 1 β ) ω c D
For the action profile (Infect, Non-defend), player malware obtains gain λ ω from successful infection and loses c I from adopting action Infect. Thus, the payoff of player malware, u I ϕ I , is:
u I ϕ I = λ ω c I
whereas the payoff of player system, u I ϕ S , is:
u I ϕ S = λ ω
For the action profile (Non-infect, Defend), the payoff of player malware, u ϕ D I , is:
u ϕ D I = 0
whereas the payoff of player system, u ϕ D S , is:
u ϕ D S = β ω c D
Finally, for the action profile (Non-infect, Non-defend), since neither player malware nor player system can obtain any gain or produce any loss, the payoff of player malware, u ϕ ϕ I , is:
u ϕ ϕ I = 0
and the payoff of player system, u ϕ ϕ S , is:
u ϕ ϕ S = 0
Table 1 summizes our defined payoff matrix.
The objective of player malware is to maximize its expected infection utility, whereas the objective of player system is to minimize its expected defense utility. This objective can be achieved by solving the mixed-strategy Nash Equilibrium (NE) of the strategic game.
Theorem 1. 
In the SMIG, the optimal probability of player malware choosing action Infect is:
ρ I * = β ω + c D ( λ + 2 α 1 ) ω
Proof: 
Under player malware’s mixed strategy, player system’s expected payoffs for choosing actions Defend and Non-defend are:
E S ( D e f e n d ) = ρ I ( ( 2 α 1 β ) ω c D ) + ( 1 ρ I ) ( β ω c D )
and:
E S ( N o n d e f e n d ) = ρ I ( λ ω ) + ( 1 ρ I ) 0 = ρ I λ ω
respectively. From the indifference between actions Defend and Non-defend under the optimal mixed strategy of player system, we obtain:
E S ( D e f e n d ) = E S ( N o n d e f e n d )
Therefore, the optimal probability of player malware choosing action Infect is:
ρ I * = β ω + c D ( λ + 2 α 1 ) ω
 □
Obtaining the optimal infection probability ρ I * means that we acquire the indication of the expected infection behavior of player malware for WSNs under epidemic-malware propagation. In other words, malware will choose action Infect with probability ρ I * . When following ρ I * , player malware has no reason to adjust its strategy as it has maximized its expected utility from the infection regardless of the success of its actions.

5. Reliability Evaluation Method

5.1. Evaluating the Reliability of a Sensor Node

The reliability of WSNs represents the probability that sensor nodes continue to perform tasks such as data sensing, transmission, and fusion over a particular period of time under stated conditions. In general, MTTF and MTBF (Mean Time between Failures) are typical ways to evaluate the reliability of pieces of hardware or other technology. Here, MTTF refers to the length of time that a device is expected to last in operation, whereas MTBF is the average elapsed time between a device’s failures in operation. The difference between two terms is that MTTF is used for non-repairable devices, whereas MTBF is used for devices that can be repaired and returned to operation. In this work, we concentrate on WSNs where sensor nodes can hardly be repaired upon failure and we use MTTF for evaluating the reliability of a sensor node.
We denote as the discrete state space where:
= { S ,   S ,   I ,   I ,   R ,   R ,   D }
as illustrated in Figure 1. Let:
Y ( t ) = [ Y S ( t )  Y S ( t )  Y I ( t )  Y I ( t )  Y R ( t )  Y R ( t )  Y D ( t ) ]
be the state probability vector, where Y x ( t ) denotes the probability that a sensor node is in state x , x , at time t . Let P be the 7 × 7 state transition matrix consisting of element p i j , i ,   j . We find the state equation of a sensor node as:
d Y ( t ) d t = Y ( t ) P
We find the steady-state probability vector that is independent of Y ( 0 ) (i.e., the initial state):
Y = [ Y S  Y S  Y I  Y I  Y R  Y R  Y D ]
by solving the system of seven equations where six of the seven equations are from:
Y P = 0
and the seventh equation is:
i Y i = 1
Next, we compute a sensor node’s MTTF from the steady-state probability vector. The discrete state space can be split into two disjoint sets U s e and D i s u s e , where:
U s e = { S ,   R }
and:
D i s u s e = { S ,   I ,   I ,   R ,   D }
denote the set of usable and unusable states, respectively. Correspondingly, the state transition matrix P can be rewritten as:
P = [ P 1 P 2 P 3 P 4 ]
where:
P 1 = [ p S S p S R p R S p R R ]
P 2 = [ p S S p S I p S I p S R p S D p R S p R I p R I p R R p R D ]
P 3 = [ p S S p S R p I S p I R p I S p I R p R S p R R p D S p D R ]
and:
P 4 = [ p S S p S I p S I p S R p S D p I S p I I p I I p I R p I D p I S p I I p I I p I R p I D p R S p R I p R I p R R p R D p D S p D I p D I p D R p D D ]
Likewise, we split the steady-state probability vector into two disjoint parts Y U s e and Y D i s u s e , where:
Y U s e = [ Y S  Y R ]
and:
Y D i s u s e = [ Y S  Y I  Y I  Y R  Y D ]
According to the method provided in [53] to compute the MTTF from a Markov process, we find the MTTF of a sensor node η as:
η = Y U s e ( 0 ) ( P 1 ) 1 I
where Y U s e ( 0 ) denotes the initial usable state probability vector (i.e., with t = 0 ) computed as:
Y U s e ( 0 ) = Y U s e Y U s e I
and I denotes a column vector of two ones:
I = [ 1 1 ] 1
Let R e l i a b i l i t y n o d e ( t ) be the reliability of a sensor node at time t . We assume that all sensor nodes, due to their similarity, have the same MTTF. From reliability theory, we find that:
R e l i a b i l i t y n o d e ( t ) = exp ( 1 η t )

5.2. Evaluating Reliability of a Clustered WSN

We aim to perform reliability evaluations for clustered WSNs due to their popularity. Figure 2 illustrates the topology of a clustered WSN. Coordinating cluster heads (CHs) control the topology where each CH guides a different cluster of sensor nodes. Such an architecture leads to a two-tier hierarchy where the upper tier comprises CHs and the lower tier comprises sensor nodes. Sensor nodes in specific regions transmit their sensed data to the responsible CH that manages the nodes. The responsible CH collects the data, which are transmitted to the single base station via other CHs. In this way, we can relate each cluster to a parallel system and each set of clusters to a serial system. Therefore, any route from a sensor node to the base station can be naturally regarded as a serial-parallel path. Since there are various routes through which sensed data can be transferred, a clustered WSN can be mapped correspondingly to a parallel-serial-parallel system where each sensor node fails independently. Each cluster operates if at least one of its sensor nodes works normally. However, for any route, all of its clusters must work normally for proper operation. As a result, we can evaluate the reliability of a clustered WSN based on the MTTF of a sensor node from the perspective of classical reliability theory.
Since each cluster is a parallel system, the reliability of a cluster at time t , R e l i a b i l i t y c l u s t e r ( t ) , can be computed as:
R e l i a b i l i t y c l u s t e r ( t ) = 1 n o d e c l u s t e r ( 1 R e l i a b i l i t y n o d e ( t ) )
Moreover, any route composed of clusters is a serial system, and thus the reliability of a route at time t , R e l i a b i l i t y r o u t e ( t ) , can be computed as:
R e l i a b i l i t y r o u t e ( t ) = c l u s t e r r o u t e R e l i a b i l i t y c l u s t e r ( t )
Finally, a clustered WSN composed of available routes is a parallel system. Therefore, the reliability of a clustered WSN at time t , R e l i a b i l i t y ( t ) , is:
R e l i a b i l i t y ( t ) = 1 r o u t e ( 1 R e l i a b i l i t y r o u t e ( t ) )
So far, we have developed a method of reliability evaluation for clustered WSNs under epidemic-malware propagation conditions. In practice, we suggest using the proposed method in off-line mode, since performing on-line reliability evaluation for clustered WSNs is very difficult. First, we define our strategic game mathematically and solve it analytically. We integrate the results of the game with the transition probability upon infection of a sensor node from which we compute the MTTF of a sensor node. As soon as the topology of a clustered WSN is determined based on the actual requirements, we can find the number of sensor nodes in a cluster, the number of clusters in a route, and the number of routes in a clustered WSN. Based on these numbers, we can compute the reliability of a clustered WSN from Equation (35). In fact, our way is popular in the field of using the game theoretical approaches, which is easy to realize.

6. Numerical Results

6.1. Illustrating Influence of α and β

With MATLAB R2010b, we explore how the optimal infection probability and the MTTF of a sensor node depend on the parameters of the true positive rate (i.e., the detection rate) and the false positive rate (i.e., the false alarm rate). The parameters of the strategic game are ω = 50 , c I = 20 , c D = 10 , and λ = 0.5 . Note that we can attain similar trends if the parameters are changed. However, specific values will be correspondingly changed.
Figure 3 and Figure 4 demonstrate the changing optimal infection probabilities that player malware adopts according to α and β , which reveals the malware’s intention. Obviously, a higher detection rate and a lower false-alarm rate can help a WSN IDS detect malware. Therefore, player malware will choose its optimal strategy to lower the infection probability in order to minimize the loss arising from IDS detection. As shown in Figure 3, the optimal infection probability decreases gradually when the true positive rate increases slowly from 0.7 to 0.98. Moreover, a lower false positive rate results in a lower infection probability. For example, when α = 0.88 in Figure 3, the optimal infection probabilities are ~0.1667, ~0.1984, and ~0.2381 for β = 0.01 , β = 0.05 , and β = 0.1 , respectively. We observe in Figure 4 the optimal infection probability increases gradually when the false positive rate increases slowly from 0.01 to 0.15. Furthermore, a higher detection rate leads to a lower infection probability. For example, when β = 0.1 in Figure 4, the optimal infection probabilities are ~0.2727, ~0.2308, and ~0.2055 for α = 0.8 , α = 0.9 , and α = 0.98 , respectively. These experimental results indicate that the true positive rate should be increased and the false positive rate should be decreased in order to decrease the infection probability adopted by player malware and to enhance a sensor node’s reliability.
Figure 5 shows the MTTF of a sensor node under the epidemic-malware propagation scenario in terms of α and β . As the true positive rate increases and the false positive rate decreases, it is easy for player system to detect infected sensor nodes, increasing their MTTFs. From Figure 5, as we expect, the MTTF increases slowly when the true positive rate increases gradually from 70% to 98%. There is a similar tendency when the false positive rate decreases from 15% to 1%. Smaller decreases of the false positive rate increase the MTTF for a sensor node more than the same decreases of the true positive rate. For example, the MTTF of a sensor node increases from ~4.6366 to ~5.7219 (an increase of ~23.41%) as β drops from 15% to 1% when α = 88 % . However, when β = 10 % , the MTTF of a sensor node increases from ~4.2487 to ~5.0350 (an increase of ~18.51%) as α increases from 70% to 90%. These results indicate that we should further reduce the false positive rate while improving IDSes for WSNs in order to increase a sensor node’s MTTF.

6.2. Validating the Method of Reliability Evaluation for a Clustered WSN

Next, from the perspective of a clustered WSN, we evaluate its reliability according to the number of sensor nodes in a cluster, the number of clusters in a route, and the number of routes in a clustered WSN, as illustrated in Figure 6, Figure 7 and Figure 8, respectively.
Figure 6 illustrates varying degrees of reliability for a clustered WSN when there are two, four, and six sensor nodes in a cluster, respectively. When both the number of clusters in a route and the number of routes in a clustered WSN are static, the reliability of the WSN increases with the number of sensor nodes in a cluster. With two, four, and six nodes in a cluster, it takes about six, nine, and eleven days, respectively, to reduce the reliability of a clustered WSN to 0.5 under the epidemic-malware propagation scenario.
Figure 7 illustrates varying degrees of reliability for a clustered WSN when there are two, four, and six clusters in a route, respectively. When both the number of sensor nodes in a cluster and the number of routes in a clustered WSN are static, the reliability of the WSN decreases with the number of clusters in a route. With two, four, and six clusters in a route, it takes about eleven, eight, and seven days, respectively, to reduce the reliability of a clustered WSN to 0.5 under the epidemic-malware propagation scenario.
Figure 8 illustrates varying degrees of reliability for a clustered WSN when there are two, four, and six routes in a clustered WSN, respectively. When both the number of sensor nodes in a cluster and the number of clusters in a route are static, the reliability of the WSN increases with the number of routes in the clustered WSN. With two, four, and six routes in the clustered WSN, it takes about seven, eight, and nine days, respectively, to reduce the reliability of the clustered WSN to 0.5 under the epidemic-malware propagation scenario.
In summary, the experimental results shown in Figure 6, Figure 7 and Figure 8 indicate that deploying more redundant sensor nodes in a cluster, deducing the clusters along constructed routes, and providing more available routes all help improve the reliability of a clustered WSN, which accords with our expectations.

7. Conclusions

We have performed reliability analysis on clustered WSNs under the epidemic-malware propagation scenario and developed a corresponding measure of reliability evaluation in order to establish a kind of highly reliable WSN. We have determined how to relate the intent of malware infection to the randomness of CTMCs using a strategic game that can predict malware’s infection behavior. We have proposed the MTTF to reflect the reliability of a sensor node and we have regarded clustered WSNs as a parallel-serial-parallel system. Using this approach, we have obtained equations to compute the reliability of a cluster, a route, and a clustered WSN, respectively. As a result, we have provided a foundation for the mechanism of reliability evaluation for susceptible WSNs. Our experiments have shown the importance of reducing the false positive rate rather than the true positive rate in order to increase MTTFs for susceptible sensor nodes. We have also validated the efficacy of our proposed measure of reliability evaluation for susceptible WSNs.
We have assumed that the topology of a clustered WSN only consists of a single sink node; however, actual clustered WSNs may have several sink nodes. Furthermore, the topology of a clustered WSN may be changed once mobile sensor nodes are introduced. Under these circumstances, the equation to compute the reliability of the clustered WSN will be more complicated. Providing such a reliability evaluation method is an interesting research direction when the assumption is relaxed. Moreover, providing measures of availability, dependability, and survivability for WSNs under malware propagation is another interesting direction.

Acknowledgments

This work was supported by National Natural Science Foundation of China under Grants Nos. 61272034 and 61572014 and by Zhejiang Provincial Natural Science Foundation of China under Grant No. LY16F020028.

Author Contributions

S.S, L.H., and J.L. constructed the CTMC, formulated the game, proved the theorem, and deduced the reliability evaluation. S.S also drafted the initial version of the manuscript. L.H. also performed the experiments. A.C.C. polished the English grammar. Y.S. revised and improved the paper. Q.C. gave the initial idea and supervised the development of the work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Borges, L.M.; Velez, F.J.; Lebres, A.S. Survey on the characterization and classification of wireless sensor network applications. IEEE Commun. Surv. Tutor. 2014, 16, 1860–1890. [Google Scholar] [CrossRef]
  2. Mahmood, M.A.; Seah, W.K.G.; Welch, I. Reliability in wireless sensor networks: A survey and challenges ahead. Comput. Netw. 2015, 79, 166–187. [Google Scholar] [CrossRef]
  3. Illiano, V.P.; Lupu, E.C. Detecting malicious data injections in wireless sensor networks: A survey. ACM Comput. Surv. 2015, 48, 24. [Google Scholar] [CrossRef]
  4. Manshaei, M.H.; Zhu, Q.; Alpcan, T.; Başar, T.; Hubaux, J. Game theory meets network security and privacy. ACM Comput. Surv. 2013, 45, 25. [Google Scholar] [CrossRef]
  5. Moosavi, H.; Bui, F.M. A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1367–1379. [Google Scholar] [CrossRef]
  6. Shamshirband, S.; Patel, A.; Anuar, N.B.; Kiah, M.L.M.; Abraham, A. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng. Appl. Artif. Int. 2014, 32, 228–241. [Google Scholar] [CrossRef]
  7. Engouang, T.D.; Liu, Y.; Zhang, Z. GABs: A game-based secure and energy efficient data aggregation for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 2015. [Google Scholar] [CrossRef]
  8. Basilico, N.; Gatti, N.; Monga, M.; Sicari, S. Security games for node localization through verifiable multilateration. IEEE Trans. Depend. Secur. 2014, 11, 72–85. [Google Scholar] [CrossRef] [Green Version]
  9. Liu, J.; Shen, S.; Yue, G.; Han, R.; Li, H. A stochastic evolutionary coalition game model of secure and dependable virtual service in sensor-cloud. Appl. Soft Comput. 2015, 30, 123–135. [Google Scholar] [CrossRef]
  10. Shen, S.; Hu, K.; Huang, L.; Li, H.; Han, R.; Cao, Q. Quantal response equilibrium-based strategies for intrusion detection in WSNs. Mob. Inf. Syst. 2015, 2015. [Google Scholar] [CrossRef]
  11. Shen, S.; Hu, K.; Huang, L.; Li, H.; Han, R.; Cao, Q. Optimal report strategies for WBANs using a cloud-assisted IDS. Int. J. Distrib. Sens. Netw. 2015, 2015. [Google Scholar] [CrossRef]
  12. Shen, S.; Li, Y.; Xu, H.; Cao, Q. Signaling game based strategy of intrusion detection in wireless sensor networks. Comput. Math. Appl. 2011, 62, 2404–2416. [Google Scholar] [CrossRef]
  13. Yu, S.; Wang, G.; Zhou, W. Modeling malicious activities in cyber space. IEEE Netw. 2015, 29, 83–87. [Google Scholar] [CrossRef]
  14. Wang, X.; Li, Q.; Li, Y. EiSIRS: A formal model to analyze the dynamics of worm propagation in wireless sensor networks. J. Comb. Optim. 2010, 20, 47–62. [Google Scholar] [CrossRef]
  15. Tang, S. A modified SI epidemic model for combating virus spread in wireless sensor networks. Int. J. Wirel. Inf. Netw. 2011, 18, 319–326. [Google Scholar] [CrossRef]
  16. Tang, S.; Myers, D.; Yuan, J. Modified SIS epidemic model for analysis of virus spread in wireless sensor networks. Int. J. Wirel. Mob. Comput. 2013, 6, 99–108. [Google Scholar] [CrossRef]
  17. Shen, S.; Li, H.; Han, R.; Vasilakos, A.V.; Wang, Y.; Cao, Q. Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1962–1973. [Google Scholar] [CrossRef]
  18. Wang, X.; Li, Y. An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks. Chin. J. Electron. 2009, 18, 8–12. [Google Scholar]
  19. Wang, X.; He, Z.; Zhao, X.; Lin, C.; Pan, Y.; Cai, Z. Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks. Sci. China Inf. Sci. 2013, 56, 1–18. [Google Scholar] [CrossRef]
  20. Wang, X.; He, Z.; Zhang, L. A pulse immunization model for inhibiting malware propagation in mobile wireless sensor networks. Chin. J. Electron. 2014, 23, 810–815. [Google Scholar]
  21. Mishra, B.K.; Keshri, N. Mathematical model on the transmission of worms in wireless sensor network. Appl. Math. Model. 2013, 37, 4103–4111. [Google Scholar] [CrossRef]
  22. Yu, S.; Gu, G.; Barnawi, A.; Guo, S.; Stojmenovic, I. Malware propagation in large-scale networks. IEEE Trans. Knowl. Data Eng. 2015, 27, 170–179. [Google Scholar] [CrossRef]
  23. Keshri, N.; Mishra, B.K. Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network. Chaos Solitons Fractals 2014, 68, 151–158. [Google Scholar] [CrossRef]
  24. Zhu, L.; Zhao, H. Dynamical analysis and optimal control for a malware propagation model in an information network. Neurocomputing 2015, 149, 1370–1386. [Google Scholar] [CrossRef]
  25. Wang, Y.; Wen, S.; Xiang, Y.; Zhou, W. Modeling the propagation of worms in networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 942–960. [Google Scholar] [CrossRef]
  26. Zou, C.C.; Towsley, D.; Gong, W. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Trans. Depend. Secur. 2007, 4, 106–118. [Google Scholar] [CrossRef]
  27. Wen, S.; Zhou, W.; Zhang, J.; Xiang, Y.; Zhou, W.; Jia, W.; Zou, C.C. Modeling and analysis on the propagation dynamics of modern email malware. IEEE Trans. Depend. Secur. 2014, 11, 361–374. [Google Scholar] [CrossRef]
  28. Wen, S.; Zhou, W.; Zhang, J.; Xiang, Y.; Zhou, W.; Jia, W. Modeling propagation dynamics of social network worms. IEEE Trans. Parall. Distr. 2013, 24, 1633–1643. [Google Scholar] [CrossRef]
  29. Karyotis, V. Markov Random Fields for malware propagation: The case of chain networks. IEEE Commun. Lett. 2010, 14, 875–877. [Google Scholar] [CrossRef]
  30. Khouzani, M.H.R.; Sarkar, S.; Altman, E. Saddle-point strategies in malware attack. IEEE J. Sel. Area Commun. 2012, 30, 31–43. [Google Scholar] [CrossRef]
  31. Jin, C.; Jin, S.W.; Tan, H.Y. Computer virus propagation model based on bounded rationality evolutionary game theory. Secur. Commun. Netw. 2013, 6, 210–218. [Google Scholar] [CrossRef]
  32. Spyridopoulos, T.; Maraslis, K.; Mylonas, A.; Tryfonas, T.; Oikonomou, G. A game theoretical method for cost-benefit analysis of malware dissemination prevention. Inform. Secur. J. 2015, 24, 164–176. [Google Scholar] [CrossRef]
  33. Trajanovski, S.; Hayel, Y.; Altman, E.; Wang, H.; Van Mieghem, P. Decentralized protection strategies against SIS epidemics in networks. IEEE Trnas. Control Netw. Syst. 2015, 2, 406–419. [Google Scholar] [CrossRef]
  34. AboElFotoh, H.M.F.; Iyengar, S.S.; Chakrabarty, K. Computing reliability and message delay for cooperative wireless distributed sensor networks subject to random failures. IEEE Trans. Reliab. 2005, 54, 145–155. [Google Scholar] [CrossRef]
  35. Kar, K.; Krishnamurthy, A.; Jaggi, N. Dynamic node activation in networks of rechargeable sensors. IEEE/ACM Trans. Netw. 2006, 14, 15–26. [Google Scholar] [CrossRef]
  36. Distefano, S. Reliability evaluation of WSN with dynamic-dependent nodes. Int. J. Reliab. Qual. Saf. Eng. 2011, 18, 515–530. [Google Scholar] [CrossRef]
  37. Distefano, S. Evaluating reliability of WSN with sleep/wake-up interfering nodes. Int. J. Syst. Sci. 2013, 44, 1793–1806. [Google Scholar] [CrossRef]
  38. Silva, I.; Guedes, L.A.; Portugal, P.; Vasques, F. Reliability and availability evaluation of wireless sensor networks for industrial applications. Sensors 2012, 12, 806–838. [Google Scholar] [CrossRef] [PubMed]
  39. Niyato, D.; Wang, P.; Hossain, E. Reliability analysis and redundancy design of smart grid wireless communications system for demand side management. IEEE Wirel. Commun. 2012, 19, 38–46. [Google Scholar] [CrossRef]
  40. Kamal, A.R.M.; Bleakley, C.; Dobson, S. Packet-level attestation (PLA): A framework for in-network sensor data reliability. ACM Trans. Sens. Netw. 2013, 9. [Google Scholar] [CrossRef]
  41. Dâmaso, A.; Rosa, N.; Maciel, P. Reliability of wireless sensor networks. Sensors 2014, 14, 15760–15785. [Google Scholar] [CrossRef] [PubMed]
  42. Wang, C.; Xing, L.; Vokkarane, V.M.; Sun, Y. Reliability and lifetime modeling of wireless sensor nodes. Microelectron. Reliab. 2014, 54, 160–166. [Google Scholar] [CrossRef]
  43. Zonouz, A.E.; Xing, L.; Vokkarane, V.M.; Sun, Y.L. Reliability-oriented single-path routing protocols in wireless sensor networks. IEEE Sens. J. 2014, 14, 4059–4068. [Google Scholar] [CrossRef]
  44. Cai, J.; Song, X.; Wang, J.; Gu, M. Reliability analysis for a data flow in event-driven wireless sensor networks. Wirel. Pers. Commun. 2014, 78, 151–169. [Google Scholar] [CrossRef]
  45. Wang, Y.; Xing, L.; Wang, H.; Levitin, G. Combinatorial analysis of body sensor networks subject to probabilistic competing failures. Reliab. Eng. Syst. Saf. 2015, 142, 388–398. [Google Scholar] [CrossRef]
  46. Yan, Z.; Nie, C.; Dong, R.; Gao, X.; Liu, J. A novel OBDD-based reliability evaluation algorithm for wireless sensor networks on the multicast model. Math. Probl. Eng. 2015, 2015. [Google Scholar] [CrossRef]
  47. Zhu, X.; Lu, Y.; Han, J.; Shi, L. Transmission Reliability Evaluation for Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2016, 2016. [Google Scholar] [CrossRef]
  48. Di Martino, C.; Cinque, M.; Cotroneo, D. Automated generation of performance and dependability models for the assessment of wireless sensor networks. IEEE Trans. Comput. 2012, 61, 870–884. [Google Scholar] [CrossRef]
  49. Di Pietro, R.; Verde, N.V. Epidemic theory and data survivability in unattended wireless sensor networks: Models and gaps. Pervasive Mob. Comput. 2013, 9, 588–597. [Google Scholar] [CrossRef]
  50. Bahi, J.M.; Guyeux, C.; Hakem, M.; Makhoul, A. Epidemiological approach for data survivability in unattended wireless sensor networks. J. Netw. Comput. Appl. 2014, 46, 374–383. [Google Scholar] [CrossRef]
  51. Petridou, S.; Basagiannis, S.; Roumeliotis, M. Survivability analysis using probabilistic model checking: A study on wireless sensor networks. IEEE Syst. J. 2013, 7, 4–12. [Google Scholar] [CrossRef]
  52. Xu, L.; Zhang, J.; Tsai, P.W.; Wu, W.; Wang, D.J. Uncertain random spectra: A new metric for assessing the survivability of mobile wireless sensor networks. Soft Comput. 2015. [Google Scholar] [CrossRef]
  53. Buzacott, J.A. Markov approach to finding failure times of repairable systems. IEEE Trans. Reliab. 1970, R-19, 128–134. [Google Scholar] [CrossRef]
Figure 1. A CTMC that illustrates the state transition of a sensor node.
Figure 1. A CTMC that illustrates the state transition of a sensor node.
Sensors 16 00855 g001
Figure 2. Topology of a clustered WSN, where n denotes the number of clusters in a route.
Figure 2. Topology of a clustered WSN, where n denotes the number of clusters in a route.
Sensors 16 00855 g002
Figure 3. Optimal infection probability in terms of the true positive rate.
Figure 3. Optimal infection probability in terms of the true positive rate.
Sensors 16 00855 g003
Figure 4. Optimal infection probability in terms of the false positive rate.
Figure 4. Optimal infection probability in terms of the false positive rate.
Sensors 16 00855 g004
Figure 5. A sensor node’s MTTF in terms of the true positive rate and the false positive rate.
Figure 5. A sensor node’s MTTF in terms of the true positive rate and the false positive rate.
Sensors 16 00855 g005
Figure 6. Reliability of a clustered WSN when m = 2, m = 4, and m = 6, respectively. Here, m denotes the number of sensor nodes in a cluster. There are four clusters in a route and four routes in a clustered WSN.
Figure 6. Reliability of a clustered WSN when m = 2, m = 4, and m = 6, respectively. Here, m denotes the number of sensor nodes in a cluster. There are four clusters in a route and four routes in a clustered WSN.
Sensors 16 00855 g006
Figure 7. Reliability of a clustered WSN when n = 2, n = 4, and n = 6, respectively. Here, n denotes the number of clusters in a route. There are four sensor nodes in a cluster and four routes in a clustered WSN.
Figure 7. Reliability of a clustered WSN when n = 2, n = 4, and n = 6, respectively. Here, n denotes the number of clusters in a route. There are four sensor nodes in a cluster and four routes in a clustered WSN.
Sensors 16 00855 g007
Figure 8. Reliability of a clustered WSN when l = 2, l = 4, and l = 6, respectively. Here, l denotes the number of routes in the clustered WSN. There are four sensor nodes in a cluster and four clusters in a route.
Figure 8. Reliability of a clustered WSN when l = 2, l = 4, and l = 6, respectively. Here, l denotes the number of routes in the clustered WSN. There are four sensor nodes in a cluster and four clusters in a route.
Sensors 16 00855 g008
Table 1. The payoff matrix of the SMIG.
Table 1. The payoff matrix of the SMIG.
DefendNon-Defend
Infect ( 1 2 α ) ω c I , ( 2 α 1 β ) ω c D λ ω c I , λ ω
Non-infect0, β ω c D 0, 0

Share and Cite

MDPI and ACS Style

Shen, S.; Huang, L.; Liu, J.; Champion, A.C.; Yu, S.; Cao, Q. Reliability Evaluation for Clustered WSNs under Malware Propagation. Sensors 2016, 16, 855. https://doi.org/10.3390/s16060855

AMA Style

Shen S, Huang L, Liu J, Champion AC, Yu S, Cao Q. Reliability Evaluation for Clustered WSNs under Malware Propagation. Sensors. 2016; 16(6):855. https://doi.org/10.3390/s16060855

Chicago/Turabian Style

Shen, Shigen, Longjun Huang, Jianhua Liu, Adam C. Champion, Shui Yu, and Qiying Cao. 2016. "Reliability Evaluation for Clustered WSNs under Malware Propagation" Sensors 16, no. 6: 855. https://doi.org/10.3390/s16060855

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop