Skip to main content

ORIGINAL RESEARCH article

Front. Phys., 05 May 2023
Sec. Mathematical Physics
This article is part of the Research Topic Future Challenges in the Fractional-Order Dynamical Systems: From Mathematics to Applications View all 6 articles

Dynamical behaviors of an epidemic model for malware propagation in wireless sensor networks

Ying ZhouYing Zhou1Yan WangYan Wang2Kai ZhouKai Zhou3Shou-Feng Shen
Shou-Feng Shen3*Wen-Xiu Ma,,,
Wen-Xiu Ma4,5,6,7*
  • 1College of Information Science and Technology, Zhejiang Shuren University, Hangzhou, Zhejiang, China
  • 2Hangzhou College of Commerce, Zhejiang Gongshang University, Hangzhou, Zhejiang, China
  • 3Department of Applied Mathematics, Zhejiang University of Technology, Hangzhou, China
  • 4Department of Mathematics, Zhejiang Normal University, Jinhua, Zhejiang, China
  • 5Department of Mathematics, King Abdulaziz University, Jeddah, Saudi Arabia
  • 6Department of Mathematics and Statistics, University of South Florida, Tampa, FL, United States
  • 7School of Mathematical and Statistical Sciences, North-West University, Mafikeng Campus, Mmabatho, South Africa

To explore malware propagation mechanisms in networks and to develop optimal strategies for controlling the spread of malware, we propose a susceptible-unexposed-infected-isolation-removed epidemic model. First, we establish a non-linear dynamic equation of malware propagation. Then, the basic reproductive number is derived by using the next-generation method. Finally, we carry out numerical simulations to observe the malware spreading in WSNs to verify the obtained theoretical results. Furthermore, we investigate the communication range of the nodes to make the results more complete. The optimal range of the nodes is designed to control malware propagation.

1 Introduction

Malware attacks pose a serious security risk, which threatens our ever-expanding wireless sensor networks (WSNs). The characteristic of malware propagation in WSNs is similar to how an epidemic spreads among humans. The malware at each infective node may seek to contract more susceptible nodes by amplifying the transmission range and the media scanning rate, thereby accelerating its spread. Kephart et al [1] originally applied the mean-field theory to study the modeling of malware propagation.

Since then, a number of mathematical epidemic models, ones have looked into dynamic behaviors of malware propagation. In the past few decades, many researchers focused on the Susceptible-Infectious-Recovered (SIR) epidemic model to describe behaviors of malware propagation, such as Youssef et al. [2], Feng et al. [3], and Rey et al [4]. In their works, all nodes are divided into the susceptible node, infectious node, and recovered node. The interaction of these three classes is governed by the following model, consisting of three non-linear differential equations:

dStdt=γStIt,dItdt=γStIt+μIt,dRtdt=μIt,(1)

where S(t), I(t), and R(t) are the densities of the susceptible node, infectious node, and recovered node at time t, respectively, and γ and μ are the multiplication rate and the recovered rate, respectively.

In recent years, many malware propagation models based on the classical SIR model have been developed. For example, Xiao et al. [5] established a SIRS model of malware propagation with diffusion and time delays. They forecasted the occurrence of tipping points and studied the tipping dynamics due to the Turing instability and Hopf bifurcation. Dong et al. [6] proposed a fractional network SIRS epidemic model with fuzzy transmission and saturated treatment function. Carnier et al. [7] generalized the methodology of derivation of the exact Markov chain for any malware model based on the simplest compartmental model SIR model. In those proposed models, the susceptible, exposed, infected, and recovered (SEIR) model is the most adopted to characterize the spreading of malware. In addition, calculation of the basic reproduction numbers and local stability of a non-trivial equilibrium and an endemic equilibrium are widely concerned in mathematical epidemiology. For example, Prajapati et al. [8] proposed an epidemic model to describe the spread of malicious objects in the network due to removable devices. Equilibrium points, both endemic and malware free, were obtained, and they also formulated a reproduction number. Liu et al. [9] proposed a delayed e-epidemic SEIRS malware propagation model with a generalized non-monotone incidence rate. Shakya et al. [10] proposed the correlation-based SIR model, which takes into account the spatial correlation characteristics of WSNs. The basic reproduction number was derived, and the local stability and Hopf bifurcation analysis were performed in their works. Moreover, Liu et al. [11] proposed a distributed continuous-time model in which two competing viruses spread over a network. The unique equilibrium and global stability were performed in their work. Zhang et al. [12] proposed an e-epidemic time-delay epidemic model to study the appearance of delay dynamics and performed non-linear stability analysis, Hopf bifurcation analysis, and an analysis of its stability. Due to the exposed nodes in WSNs, they may have different infection rates during malware propagation, Yu et al. [13] proposed the improved SEIR model with two infectious rates in the cyber-physical systems to explore the transition mechanism. Dmitriy et al. [14] divided infectious nodes into susceptible-infected by strain 1 or by strain 2-susceptible with duty cycles. The basic reproduction number and the stability were analyzed in their work. Dong et al. [15, 16] proposed the improved SEIR model with two distinct compartment exposed nodes. The dynamics of the network-based fractional order epidemic model were studied in their work. Nwokoye et al. [17] combined the strength of the above models and proposed a multi-group model, which represents multiple exposed infections due to worms and viruses. In addition to the SEIR model, some researchers have tried to divide nodes into more classes. For example, Ojha et al. [18] proposed an improved epidemic model that aggregates quarantine and vaccination techniques. The basic reproduction number and equilibrium points were analyzed in their work. Hosseini et al. [1921] proposed a new dynamic model of malware propagation in heterogeneous networks based on the rumor diffusion model. In their works, all the nodes were divided into six classes: susceptible nodes, exposed nodes, infectious nodes, recovered nodes, vaccinated nodes, and quarantine nodes. In addition to their characteristic of the spreading over the network, the optimal strategies are also a concern for many researchers, such as Muthukrishnan et al. [22], who investigated an optimal control strategy to reduce malware propagation in WSNs. Liu et al. [23] extended the traditional SIR model by adding another delitescent compartment to address the behavior of malware. The optimal control theory was employed to study malware immunization strategies. Moreover, Nwokoye et al. [24] reviewed the epidemic models of malware propagation and control in WSNs. Jain et al. [25] introduced an optimal control of rumor spreading in a homogeneously mixed population to minimize the density of rumor adopters and control cost.

The majority of previous studies have focused on modeling malware propagation but ignored the characteristics of WSNs. How to design efficient control strategies to reduce the spread of malware is little discussed. For example, the malware transmission rate is a parameter related to the communication radius of the node communication volume; the node recovery rate can be realized by a node system update. Therefore, combining node characteristics can optimize the wireless sensor network by reducing the propagation radius and increasing the update frequency. To overcome such weaknesses, an improved malware propagation model is introduced in this article. The basic reproduction number is derived in detail, which is the main contribution we make. The novelty of this work is to explore malware propagation mechanisms in networks through the proposed SUIQR model and finding the optimized strategies for controlling the spread of malware based on the reproduction number. The rest of the article is organized as follows. The main contribution of this article is briefly summarized in Section 2. A new difference model is proposed, called a SUIQR model. Then, the basic reproduction number of the proposed model is derived, and local stability is analyzed in Section 3. In Section 4, optimal strategies are discussed to control the spread of malware propagation. Mathematical results are illustrated by numerical simulations, and some control strategies are given in Section 5. Finally, the conclusions and further questions are presented in Section 6.

2 Model formulation

In this section, a new differential equation epidemic model is built to describe the dynamic behaviors of malware propagation. The total nodes in WSNs are divided into five categories: susceptible, unexposed, infectious, isolation, and removed, called SUIQR. The relationship of these categories is shown in Figure 1, and the meaning of all the symbols in Figure 1 is shown in Table 1.

FIGURE 1
www.frontiersin.org

FIGURE 1. The transfer diagram of a system.

TABLE 1
www.frontiersin.org

TABLE 1. Definition of the parameters.

The susceptible nodes will be infected by the unexposed nodes and infectious nodes at the rate of γ. There are γS(U + I) nodes, which will remove from class S into class U. Due to the system being updated at a certain period, the nodes in WSNs will enter the class R at the rate of μ. The recovered nodes will enter class S at the rate of τ due to protection failure [26, 27]. Therefore, the transfer relationships between S and other classes can be expressed as follows:

dSdt=γSU+I+τRμS.(2)

The density of the unexposed nodes will increase when the susceptible nodes are infected. Some unexposed nodes will be found as the isolated class Q at the rate of η through regular checking. Some unexposed nodes will move into class I before being recovered at the rate of β. Therefore, the transfer relationships between U and other classes can be expressed as follows:

dUdt=γSU+IμUβUηU.(3)

The density of the infectious nodes will increase because some unexposed nodes will move into class I. Some nodes in class I will remove into class R due to the periodic system updates at the rate of μ. Therefore, the transfer relationships between I and other classes can be expressed as the following equations:

dIdt=βUμI,(4)

The density of the isolation nodes will increase when the unexposed nodes are founded. Some nodes in class Q will remove into class R due to the periodic system updates at the rate of μ. Therefore, the transfer relationships between Q and other classes can be expressed as the following equations:

dQdt=ηUμQ.(5)

Assuming the total number of the nodes in WSNs is a constant. Therefore, the transfer relationships between R and other classes can be obtained as follows:

dRdt=μS+μU+μI+μQτR.(6)

Combining the above ideas, the SUIQR model governing the transmission of malware is described by the following system of non-linear differential equations:

St=γSU+I+τRμS,Ut=γSU+IμUβUηU,It=βUμI,Qt=ηUμQ,Rt=μS+μU+μI+μQτR.(7)

3 The mathematical analysis of the SUIQR epidemic model

The basic reproductive number is a key parameter to represent the infected numbers in an average infection period. Firstly, the global stability of the malware-free equilibrium (MFE) is introduced [28]. We can get the SUIQR model 7) to have a malware-free equilibrium point Pf* and the malware-endemic equilibrium point Pe* by solving the following Eq. 8:

γS×U+I+τRμS=0,γS×U+IμUβUηU=0,βUμI=0,ηUμQ=0,S+U+R+I+Q=1.(8)

The malware-free equilibrium point Pf* and the malware-endemic equilibrium point Pe* are shown in Eq.9 and Eq.(10), respectively:

Pf*Sf*,Uf*,If*,Qf*,Rf*=τμ+τ,0,0,0,μμ+τ.(9)
PeSe,Ue,Ie,Qe,Re=βμ+ημ+μ2βγ+γμ,μβμ2+ημ2+μ2τ+μ3βγτ+βμτ+ημτγμτμ+τγβ2+2γβμ+ηγβ+γμ2+ηγμ,ββμ2+ημ2+μ2τ+μ3βγτ+βμτ+ημτγμτμ+τγβ2+2γβμ+ηγβ+γμ2+ηγμ,ημ3+η2μ2+ημ2τ+η2μτ+βημ2βηγτ+βημτηγμτμ+1γβ2+2γβμ+ηγβ+γμ2+ηγμ,μμ+τ(10)

Then, the next-generation method (NGM) is applied to calculate the basic reproductive number R0 [29]. The main advantage of the NGM is that it allows the research to ignore any uninfected classes and focus only on the infected classes. There are three infected classes in the proposed SUIQR model. Let X = (U,I,Q)T, the model 7) equals to the following form:

dXdt=FV.(11)

Where F=γS(U+I)00 and V=μU+βU+ηUβU+μIηU+μQ.

We define f and v as the Jacobian matrices of F and V evaluated at the malware-free equilibrium point Pf*:

f=FX|Pf*=γSf*γSf*0000000=τγμ+ττγμ+τ0000000.(12)
v=VX|Pf*=μ+β+η00βμ0η0μ.(13)

The basic reproductive number R0 is the largest eigenvalue of the matrix fv−1 given by Eq. 14:

fv1=β+μτγμμ+τβ+η+μγτμμ+τ0000000.(14)

Then, we can obtain the basic reproductive number R0.

R0=ρfv1=β+μτγμμ+τβ+η+μ.(15)

When R0 < 1, it means that the SUIQR model will reach a malware-free situation eventually; when R0 > 1, the SUIQR model always has malware and has an endemic equilibrium.

Finally, we analyze the sensitivity of each parameter (μ, η, β, λ) about the basic reproductive number and obtain normed forward sensitivity indexes as follows:

R0R0λλ=1>0,R0R0ββ=ηββ+μβ+μ+η>0,R0R0μμ=τγμ2+μτβ+η+μτγβ+μ3μ2+2μβ+η+τ+τβ+τημ+τβ+η+μβ+μτγ<0,R0R0ηη=ηβ+μ+η<0.(16)

It is obvious that λ, β and R0 are proportional, η, μ, and R0 are inverse proportional. The increase of η or μ may result in the decrease of R0. The decrease of λ and β may result in the decrease of R0. Above all, we can take some measures to control the spread of malware.

• Reduce the period of system updates. This can improve the defense capabilities of nodes, that is, to increase μ.

• Reduce the communication frequency between nodes, that is, to decrease λ. This will reduce the conversion rate that susceptible nodes contract with the other nodes.

The Jacobian matrix of the SUIQR model at Pe* is as follows:

J=γUe+IeμγSeγSe0τγUe+IeγSeμβηγSe000βμ000η0μ0μμμμτ.(17)

The corresponding characteristic equation is shown in Eq. 18:

λ5+A4λ4+A3λ3+A2λ2+A1λ+A0=0.(18)
A4=β+η+4μτ+γIeγSe+γUe,A3=3βμ+3ημβτητ5μτ+6μ2+βγIe+ηγIeβγSe+3γμIe+βγUe+ηγUeγτIe3γμSe+3γμUe+γτSeγτUe,A2=3βμ2+3ημ29μ2τ+4μ34βμτ4ημτ+3γμ2Ie3γμ2Se+3γμ2Ue+2βγμIe+2ηγμIeβγτIe2βγμSeηγτIe+2βγμUe+2ηγμUe+βγτSe4γμτIeβγτUeηγτUe+4γμτSe4γμτUe,A1=βμ3+ημ37μ3τ+μ45βμ2τ5ημ2τ+γμ3Ieγμ3Se+γμ3Ue+βγμ2Ie+ηγμ2Ieβγμ2Se+βγμ2Ue+ηγμ2Ue5γμ2τIe+5γμ2τSe5γμ2τUe3βγμτIe3ηγμτIe+3βγμτSe3βγμτUe3ηγμτUe,A0=2γμ3τSe2βμ3τ2ημ3τ2γμ3τIe2μ4τ2γμ3τUe2βγμ2τIe2ηγμ2τIe+2βγμ2τSe2βγμ2τUe2ηγμ2τUe.(19)

According to the Routh-Hurwitz criterion [27], when R0 > 1, the endemic equilibrium Pe*Se*,Ue*, Ie*,Qe*,Re* is asymptotically stable.

4 The optimal control strategy

We assume that the distribution of the nodes follows the Poisson point process in WSN. The probability of there being k nodes in the communication range can be calculated by the following equation (30):

PX=k=λπR12keλπR12k!.(20)

Where λ is the density of the nodes in WSNs, and R1 is the communication range of each node, which is always an adjustable parameter.

Therefore, the conversion rate that susceptible nodes contract with the other nodes can be calculated by the following equation:

γ=EX=λπR12.(21)

The sensitivity of the communication range about the basic reproductive number and obtaining a normed forward sensitivity index is shown as Eq. 22:

R0R0R1R1=2R1>0.(22)

According to the analysis above, we need to adjust the parameters (μ or R1) to keep the basic reproductive number at less than 1. By substituting Eq. 21 into Eq. 15, the relationship between μ and R1 is given by the following inequality:

β+μτλπR12μμ+τβ+η+μ<1.(23)

•Case 1. R1 is the adjustable parameter and μ is the fixed constant:

R1<μμ+τβ+η+μβ+μτλπ.(24)

Based on the above inequality, we set the threshold of the communication range. When the range is less than the threshold, the SUIQR model reaches a malware-free situation eventually.

•Case 2. μ is the adjustable parameter and R1 is the fixed constant:

μ3+β+η+τμ2+τβ+τητλπR12μτλπβR12>0.(25)

5 Numerical simulations

In this section, some numerical simulations are performed to illustrate and complement our analytical results. There are 100 nodes in the networks with the area of 1000 × 1000. We fix the parameters β = 0.6, λ = 0.0001, η = 0.3, μ = 0.1, R1 = 50, τ = 0.3. The initial density of each class is S(0) = 0.6, U(0) = 0.1, I(0) = 0.1, Q(0) = 0.1, R(0) = 0.1. The evolutions of each class along with time are shown in Figure 2.

FIGURE 2
www.frontiersin.org

FIGURE 2. Evolutions of S, U, I, Q, R along with time t.

In this example, we can calculate the basic reproductive number R0 = 4.1233 based on Eq. 15 As can be seen from Figure 2, the reproduction number is determined by R0 > 1. Here, we can see the densities of class S and class U decrease rapidly over time and eventually stabilize the equilibrium point Pe*, with a high rate of conversion and recovery. The densities of class I and class R increase rapidly over time and eventually stabilize the equilibrium point. The malware-endemic equilibrium point Pe*=[0.1819,0.0568,0.3409,0.2500]. The malware will exist in this WSN. The corresponding characteristic equation is shown as follows:

λ5+2.5406λ4+2.0997λ3+0.6419λ2+0.0692λ+0.0024=0(26)

The roots of the characteristic equation are [-1.1874, −0.8467, - 0.3370, −0.1000, −0.0695]. The Routh-Hurwitz table is given by:

H=1.00002.09970.06922.54060.64190.00241.84700.068300.54800.002400.0603000.002400.

According to the Routh-Hurwitz criterion, this system is stable based on the given parameters.

Then, we analyze the influence of the optimal control strategy on the evolutions of each class. In the above example, the malware will not be eliminated. When only one parameter is adjustable, R1 can be calculated by Eq.24, R1 < 24.6233 if R0 < 1. We fixed R1 = 24, and the evolutions of each class are shown in Figure 3.

FIGURE 3
www.frontiersin.org

FIGURE 3. Evolutions of S, U, I, Q, R for τ =2, R1=24, μ =0.1 along with time t.

In this example, we can calculate the basic reproductive number R0 = 0.9500 based on Eq. 15 As can be seen from Figure 3, the reproduction number is determined by R0 < 1. Here, the densities of class S, class U, and class Q can be seen to increase rapidly and decay slowly to 0, with a high recovery rate. The density of class S decreases rapidly and then slowly increases to eventually stabilize the equilibrium point. The malware-free equilibrium point Pf*=[0.75,0,0,0,0.25]. The corresponding characteristic equation is shown as follows:

λ5+1.6188λ4+0.5099λ3+0.2729λ20.0012λ0.00003=0(27)

The roots of the characteristic equation are [-1.2197, −0.3179, −0.1000, 0.0391, −0.0202]. The Routh-Hurwitz table is given by:

H=1.00000.50990.00121.61880.02730.00000.49300.001100.03100.000000.0007000.000000.

According to the Routh-Hurwitz criterion, this system is stable based on the given parameters.

When only one parameter is adjustable, μ can be calculated by Eq. 24, μ > 0.2961. We fixed the communication range of each R1 = 0.3, and the evolutions of each class are shown in Figure 4.

FIGURE 4
www.frontiersin.org

FIGURE 4. Evolutions of S, U, I, Q, R for τ =2, R1=50, μ =0.4 along with time t.

In this example, we can calculate the basic reproductive number R0 = 0.9817 based on Eq. 15 As can be seen from Figure 4, it is observed that the reproduction number is determined by R0 < 1. Here, the densities of class S, class U, and class Q can be seen to increase rapidly and decay slowly to 0, with a high recovery rate. The density of class S decreases rapidly and then slowly increases to eventually stabilize the equilibrium point. The SUIQR model will reach a malware-free situation eventually, and the malware-free equilibrium point Pf*=[0.5,0,0,0,0.5]. The corresponding characteristic equation is shown as follows:

λ5+3.2799λ4+3.3250λ3+1.2538λ20.1903λ0.0099=0(28)

The roots of the characteristic equation are [-1.7649, −0.9278, −0.3000, −0.1658, −0.1214]. The Routh-Hurwitz table is given by:

H=1.00003.32500.19033.27991.25380.00992.94270.187301.04500.009900.1594000.009900.

According to the Routh-Hurwitz criterion, this system is stable based on the given parameters.

We set the update period of the system μ, which satisfies the above inequality to ensure the SUIQR model will reach a malware-free situation eventually. As shown in Figures 3, 4, the system is optimal and stable when the R1 or μ is set. We can obtain the control strategy to reduce the spread of malware by setting reasonable parameters for nodes in WSNs.

Sometimes, the results of adjusting the single parameter μ or R1 are not satisfactory. In these scenes, we need to adjust μ and R1 simultaneously; the relationship between μ and R1 is given in Eq. 25 Based on the given parameters, the relationship between the two parameters is shown in Figure 5.

FIGURE 5
www.frontiersin.org

FIGURE 5. Evolutions of S, U, I, Q, R along with time t.

As shown in Figure 5, the region below is feasible, while the region above is not. We can adjust these two parameters in the curve to ensure the SUIQR model reaches a malware-free situation eventually. A schematic of the results of controlling both the communication radius and the frequency of system updates to the system is shown in Figure 5. The previous control method highlights that malware propagation in networks can be simulated regardless of whether the radius of communication is decreased or the frequency of updates to the system is increased. In the curve shown in Figure 5, the entire space is divided into two parts. The upper part of the space is not feasible, that is, the control strategy in the upper part of the space cannot achieve the purpose of suppressing the spread of malware. The second half of the space is the feasible part, that is, the control strategy in the second half of the space can effectively suppress the malware. The points on the curve represent the critical values and are the most up-to-date regulatory solution. If the current control strategy can fail to achieve the goal of suppressing malware propagation, control can be achieved by adjusting the radius of communication at a triangle checkpoint or by increasing the frequency of system updates at the circle checkpoint.

6 Conclusion

This article proposed a SUIQR epidemic model to describe the spreading of malware. The basic reproductive number was derived by using the next-generation method. Finally, we carried out numerical simulations to observe the malware spreading in WSNs to verify the obtained theoretical results. Furthermore, we also investigated the communication range of the nodes to make the results more complete. As a result, we can adjust the communication range and the period of system updating to reduce the spreading of malware in WSNs. Due to the lack of experimental data, only numerical simulations were performed in this article, which is also a limitation of the work. In our further work, we will continue to investigate and perform relevant experiments and compare them with other infectious disease models to verify that the method is feasible.

Data availability statement

The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding authors.

Author contributions

YZ: Writing-original draft; YW: Undertook the data analysis; KZ: Methodology; SF-S: Writing-reviewing and editing; W-XM: Writing-reviewing and editing.

Funding

Funding was provided by the National Natural Science Foundation of China (Grant Nos. 11871336, 11771395).

Acknowledgments

We would like to express our sincere thanks to the referees for their useful comments and timely help.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Kephart JO, White SR Proceedings of the IEEE computer society symposium research in security and privacy (1991). p. 343–59.

Google Scholar

2. Youssef M, Scoglio C An individual-based approach to SIR epidemics in contact networks. J Theor Biol (2011) 283(1):136–44. doi:10.1016/j.jtbi.2011.05.029

PubMed Abstract | CrossRef Full Text | Google Scholar

3. Feng L, Liao X, Han Q, Li H Dynamical analysis and control strategies on malware propagation model. Appl Math Model (2013) 37(16-17):8225–36. doi:10.1016/j.apm.2013.03.051

CrossRef Full Text | Google Scholar

4. del Rey AM, Vara RC, González SR A computational propagation model for malware based on the SIR classic model. Neurocomputing (2022) 484:161–71. doi:10.1016/j.neucom.2021.08.149

CrossRef Full Text | Google Scholar

5. Xiao M, Chen S, Zheng WX, Wang Z, Lu Y Tipping point prediction and mechanism analysis of malware spreading in cyber–physical systems. Commun Nonlinear Sci Numer Simulation (2023) 122:107247. doi:10.1016/j.cnsns.2023.107247

CrossRef Full Text | Google Scholar

6. Dong NP, Long HV, Son NTK The analysis of a fractional network-based epidemic model with saturated treatment function and fuzzy transmission. Iranian J Fuzzy Syst (2023) 20(1):1–18. doi:10.22111/ijfs.2023.7342

CrossRef Full Text | Google Scholar

7. Carnier RM, Li Y, Fujimoto Y, Shikata J Modeling exact Markov chains for malware based on random propagation. Techrxiv Techrxiv (2023). doi:10.36227/techrxiv.22047527

CrossRef Full Text | Google Scholar

8. Prajapati A International conference on cybersecurity, cybercrimes, and smart emerging technologies (CCSET), riyadh. SAUDI ARABIA (2022). Paper presented at the.May 10-11) A Propagation Model of Malicious Objects via Removable Devices and Sensitivity Analysis of the Parameters

Google Scholar

9. Liu J, Saeed T, Zeb A Delay effect of an e-epidemic SEIRS malware propagation model with a generalized non-monotone incidence rate. Results Phys (2022) 39:105672. doi:10.1016/j.rinp.2022.105672

CrossRef Full Text | Google Scholar

10. Shakya RK, Rana K, Gaurav A, Mamoria P, Srivastava PK Stability analysis of epidemic modeling based on spatial correlation for wireless sensor networks. Wireless Personal Commun (2019) 108(3):1363–77. doi:10.1007/s11277-019-06473-0

CrossRef Full Text | Google Scholar

11. JiPar LPE, NediTang ACY, Baar T, Basar T. On the analysis of a continuous-time Bi-virus model. Ieee Trans Automatic Control (2016) 64(12):4891–906. doi:10.1109/CDC.2016.7798284

CrossRef Full Text | Google Scholar

12. Zhang Z, Kumari S, Upadhyay RK A delayed e-epidemic SLBS model for computer virus. Adv Difference Equations (2019) 2019(1):414. doi:10.1186/s13662-019-2341-8

CrossRef Full Text | Google Scholar

13. Yu Z, Gao H, Wang D, Alnuaim AA, Firdausi M, Mostafa AM SEI2RS malware propagation model considering two infection rates in cyber-Cphysical systems. Physica A: Stat Mech its Appl (2022) 597:127207. doi:10.1016/j.physa.2022.127207

CrossRef Full Text | Google Scholar

14. Fedorov D, Tabarak Y, Dadlani A, Kumar MS, Kizheppatt V Dynamics of multi-strain malware epidemics over duty-cycled wireless sensor networks. In: 2021 International Balkan Conference on Communications and Networking (BalkanCom) (2021). p. 1–5. doi:10.1109/BalkanCom53780.2021.9593147

CrossRef Full Text | Google Scholar

15. Dong NP, Long HV, Son NTK The dynamical behaviors of fractional-order SE1E2IQR epidemic model for malware propagation on Wireless Sensor Network. Commun Nonlinear Sci Numer Simulation (2022) 111:106428. doi:10.1016/j.cnsns.2022.106428

CrossRef Full Text | Google Scholar

16. Dong NP, Long HV, Khastan A Optimal control of a fractional order model for granular SEIR epidemic with uncertainty. Commun Nonlinear Sci Numer Simulation (2020) 88:105312. doi:10.1016/j.cnsns.2020.105312

PubMed Abstract | CrossRef Full Text | Google Scholar

17. Nwokoye CH, Madhusudanan V, Srinivas MN, Mbeledogu NN Modeling time delay, external noise and multiple malware infections in wireless sensor networks. Egypt Inform J (2022) 23(2):303–14. doi:10.1016/j.eij.2022.02.002

CrossRef Full Text | Google Scholar

18. Ojha RP, Srivastava PK, Sanyal G, Gupta N Improved model for the stability analysis of wireless sensor network against malware attacks. Wireless Personal Commun (2020) 116(3):2525–48. doi:10.1007/s11277-020-07809-x

CrossRef Full Text | Google Scholar

19. Hosseini S, Azgomi MA The dynamics of an SEIRS-QV malware propagation model in heterogeneous networks. Physica A: Stat Mech its Appl (2018) 512:803–17. doi:10.1016/j.physa.2018.08.081

CrossRef Full Text | Google Scholar

20. Hosseini S, Azgomi MA Dynamical analysis of a malware propagation model considering the impacts of mobile devices and software diversification. Physica A: Stat Mech its Appl (2019) 526:120925. doi:10.1016/j.physa.2019.04.161

CrossRef Full Text | Google Scholar

21. Hosseini S, Azgomi MA A model for malware propagation in scale-free networks based on rumor spreading process. Computer Networks (2016) 108:97–107. doi:10.1016/j.comnet.2016.08.010

CrossRef Full Text | Google Scholar

22. Muthukrishnan S, Muthukumar S, Chinnadurai V Optimal control of malware spreading model with tracing and patching in wireless sensor networks. Wireless Personal Commun (2020) 117(3):2061–83. doi:10.1007/s11277-020-07959-y

CrossRef Full Text | Google Scholar

23. Liu W, Zhong S (2017). Web malware spread modelling and optimal control strategies. Sci Rep, 7, 42308. doi:10.1038/srep42308

PubMed Abstract | CrossRef Full Text | Google Scholar

24. Nwokoye CH, Madhusudanan V Epidemic models of malicious-code propagation and control in wireless sensor networks: An indepth review. Wireless Personal Commun (2022) 125(2):1827–56. doi:10.1007/s11277-022-09636-8

CrossRef Full Text | Google Scholar

25. Jain A, Dhar J, Gupta VK Optimal control of rumor spreading model on homogeneous social network with consideration of influence delay of thinkers. Differential Equations Dynamical Syst (2019) 31(1):113–34. doi:10.1007/s12591-019-00484-w

CrossRef Full Text | Google Scholar

26. Yang F, Zhang Z Hopf bifurcation analysis of SEIR-KS computer virus spreading model with two-delay. Results Phys (2021) 24:104090. doi:10.1016/j.rinp.2021.104090

CrossRef Full Text | Google Scholar

27. Zhang H, Upadhyay RK, Liu G, Zhang Z Hopf bifurcation and optimal control of a delayed malware propagation model on mobile wireless sensor networks. Results Phys (2022) 41:105926. doi:10.1016/j.rinp.2022.105926

CrossRef Full Text | Google Scholar

28. Wei X, Xu G, &Zhou W Global stability of endemic equilibrium for a SIQRS epidemic model on complex networks Physica A: Stat Mech its Appl (2018) 512:203–14. doi:10.1016/j.physa.2018.08.119

CrossRef Full Text | Google Scholar

29. Posny D, Wang J Computing the basic reproductive numbers for epidemiological models in nonhomogeneous environments. Appl Maths Comput (2014) 242:473–90. doi:10.1016/j.amc.2014.05.079

CrossRef Full Text | Google Scholar

30. Habibiyan R, Ghorban Sabbagh A Connectivity analysis of 2D underwater optical wireless sensor networks using a geometric approach. Ad Hoc Networks (2022) 134:102910. doi:10.1016/j.adhoc.2022.102910

CrossRef Full Text | Google Scholar

Keywords: SEIQR epidemic model, malware propagation, basic reproductive number, optimal control, SUIQR

Citation: Zhou Y, Wang Y, Zhou K, Shen S-F and Ma W-X (2023) Dynamical behaviors of an epidemic model for malware propagation in wireless sensor networks. Front. Phys. 11:1198410. doi: 10.3389/fphy.2023.1198410

Received: 01 April 2023; Accepted: 25 April 2023;
Published: 05 May 2023.

Edited by:

Christos Volos, Aristotle University of Thessaloniki, Greece

Reviewed by:

Abdelalim A. Elsadany, Suez Canal University, Egypt
Fuhong Min, Nanjing Normal University, China

Copyright © 2023 Zhou, Wang, Zhou, Shen and Ma. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Shou-Feng Shen, YXRoc3NmQHpqdXQuZWR1LmNu; Wen-Xiu Ma, bWF3eEBjYXMudXNmLmVkdQ==

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.