# Hop-by-Hop Worm Propagation with Carryover Epidemic Model in Mobile Sensor Networks

## Abstract

**:**

## 1. Introduction

## 2. Related Work

## 3. Assumptions

## 4. Hop-By-Hop Worm Propagation in Mobile Sensor Networks

## 5. Analysis

**Lemma 1.**In carryover epidemic model, the cumulative number of infected nodes from the 0th time slot to the τth time slot is ${I}_{\tau}-{q}_{\tau}$.

**Proof.**Recall that ${I}_{t+1}-{I}_{t}+{q}_{t}$ is the infection quota in the $t+1$th time slot ($t\ge 1$) in carryover epidemic model, where ${I}_{1}-{I}_{0}$ is the infection quota in the first time slot and ${q}_{t}$ is the infection quota deficit in the tth time slot. The number of infected nodes in a time slot is the difference between the infection quota and the quota deficit in a time slot. Hence, the cumulative number of infected nodes from the 0th time slot to the τth time slot is given by:

**Lemma 2.**If $j>\tau $ and $\mu \le j\left(\frac{\tau}{j-\tau}\right)ln\frac{j}{\tau}$, then

**Proof.**For any $y>0$, the Markov’s inequality is given by:

**Lemma 3.**If $j<\tau +1$ and $\mu \ge j\left(\frac{\tau +1}{j-\tau -1}\right)ln\left(\frac{j}{\tau +1}\right)$, then

**Proof.**For any $y<0$, the Markov’s inequality is given by:

## 6. Simulation Study

#### 6.1. Simulation Configurations

#### 6.2. Simulation Results

## 7. Conclusions

## Acknowledgments

## Conflicts of Interest

## References

- Francillon, A.; Castelluccia, C. Code Injection Attacks on Harvard-Architecture Devices. In Proceedings of the 15th ACM conference on Computer and Communications Security (CCS’08), Alexandria, VA, USA, 27–31 October 2008.
- Gu, Q.; Noorani, R. Towards self-propagating mal-packets in sensor networks. In Proceedings of the First ACM Conference on Wireless Network Security (WiSec’08), Alexandria, VA, USA, 31 March–2 April 2008.
- Daley, D.J.; Gani, J. Epidemic Modeling: An Introduction; Cambridge University Press: Cambridge, UK, 1999. [Google Scholar]
- De, P.; Liu, Y.; Das, S.K. Deployment-Aware Modeling of Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory. ACM Trans. Sens. Netw.
**2009**, 5. [Google Scholar] [CrossRef] - Feng, L.; Song, L.; Zhao, Q.; Wang, H. Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network. Math. Probl. Eng.
**2015**, 2015. [Google Scholar] [CrossRef] - Khayam, S.A.; Radha, H. Using signal processing techniques to model worm propagation over wireless sensor networks. IEEE Signal Process. Mag.
**2006**, 23, 164–169. [Google Scholar] [CrossRef] - Zou, C.; Gong, W.; Towsley, D. Code red worm propagation modeling and analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS’02), Washington, DC, USA, 18–22 November 2002.
- Guo, W.; Zhai, L.; Guo, L.; Shi, J. Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network. In Web Technologies and Applications; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
- Mickens, J.W.; Noble, B.D. Modeling Epidemic Spreading in Mobile Environments. In Proceedings of the 4th ACM Workshop on Wireless Security (WiSe’05), Cologne, Germany, 2 September 2005.
- Mickens, J.W.; Noble, B.D. Analytical models for epidemics in mobile networks. In Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMOB 2007), White Plains, NY, USA, 8–10 October 2007.
- Valler, N.C.; Prakash, B.A.; Tong, H.; Faloutsos, M.; Faloutsos, C. Epidemic Spread in Mobile Ad Hoc Networks Determining the Tripping Point. In Proceedings of the 10th International IFIP TC 6 Conference on Networking (NETWORKING’11), Valencia, Spain, 9–13 May 2011.
- Karlsson, G.; Lenders, V.; May, M. Delay-Tolerant Broadcasting. IEEE Trans. Broadcast.
**2007**, 53. [Google Scholar] [CrossRef] - Ott, J.; Kutscher, D.; Dwertmann, C. Integrating DTN and MANET Routing. In Proceedings of the 2006 SIGCOMM Workshop on Challenged Networks (CHANTS’06), Pisa, Italy, 11–15 September 2006.
- Chen, Z.; Wang, M.; Xu, L.; Wu, W. Worm propagation model in mobile network. In Wiley Concurrency and Computation: Practice and Experience; Wiley: New York, NY, USA, 2015. [Google Scholar]
- Yan, G.; Flores, H.D.; Cuellar, L.; Hengartner, N.; Eidenbenz, S.; Vu, V. Bluetooth Worm Propagation: Mobility Pattern Matters. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS’07), Singapore, 20–22 March 2007.
- Ho, J. Distributed Software-Attestation Defense Against Sensor Worm Propagation. J. Sens.
**2015**, 2015. [Google Scholar] [CrossRef] - Boudec, J.Y.L.; Vojnović, M. Perfect simulation and stationary of a class of moblity models. In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 2005), Miami, FL, USA, 13–17 March 2005; pp. 2743–2754.
- PalChaudhuri, S.; Boudec, J.Y.L.; Vojnović, M. Perfect simulations for random trip mobility models. In Proceedings of the 38th Annual Simulation Symposium, San Diego, CA, USA, 4–6 April 2005.

© 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).

## Share and Cite

**MDPI and ACS Style**

Ho, J.-W.
Hop-by-Hop Worm Propagation with Carryover Epidemic Model in Mobile Sensor Networks. *Computers* **2015**, *4*, 283-292.
https://doi.org/10.3390/computers4040283

**AMA Style**

Ho J-W.
Hop-by-Hop Worm Propagation with Carryover Epidemic Model in Mobile Sensor Networks. *Computers*. 2015; 4(4):283-292.
https://doi.org/10.3390/computers4040283

**Chicago/Turabian Style**

Ho, Jun-Won.
2015. "Hop-by-Hop Worm Propagation with Carryover Epidemic Model in Mobile Sensor Networks" *Computers* 4, no. 4: 283-292.
https://doi.org/10.3390/computers4040283