A novel numerical solution of nonlinear stochastic model for the propagation of malicious codes in Wireless Sensor Networks using a high order spectral collocation technique

. 2025 Jan 02 ; 15 (1) : 228. [epub] 20250102

Status PubMed-not-MEDLINE Jazyk angličtina Země Velká Británie, Anglie Médium electronic

Typ dokumentu časopisecké články

Perzistentní odkaz   https://www.medvik.cz/link/pmid39747261
Odkazy

PubMed 39747261
PubMed Central PMC11697034
DOI 10.1038/s41598-024-82033-2
PII: 10.1038/s41598-024-82033-2
Knihovny.cz E-zdroje

The open nature of Wireless Sensor Networks (WSNs) renders them an easy target to malicious code propagation, posing a significant and persistent threat to their security. Various mathematical models have been studied in recent literature for understanding the dynamics and control of the propagation of malicious codes in WSNs. However, due to the inherent randomness and uncertainty present in WSNs, stochastic modeling approach is essential for a comprehensive understanding of the propagation of malicious codes in WSNs. In this paper, we formulate a general stochastic compartmental model for analyzing the dynamics of malicious code distribution in WSNs and suggest its possible control. We incorporate the stochasticity in the classical deterministic model for the inherent unpredictability in code propagation, which results in a more appropriate representation of the dynamics. A basic theoretical analysis including the stability results of the model with randomness is carried out. Moreover, a higher-order spectral collocation technique is applied for the numerical solution of the proposed stochastic model. The accuracy and numerical stability of the model is presented. Finally, a comprehensive simulation is depicted to verify theoretical results and depict the impact of parameters on the model's dynamic behavior. This study incorporates stochasticity in a deterministic model of malicious codes spread in WSNs with the implementation of spectral numerical scheme which helps to capture these networks' inherent uncertainties and complex nature.

Zobrazit více v PubMed

Keshri, Ajit Kumar, Mishra, Bimal Kumar & Mallick, Dheeresh K. “Library formation of known malicious attacks and their future variants.” International Journal of Advanced Science and Technology 94 (2016): 1-12.

Dai, Miao, Luo, Long, Ren, Jing, Hongfang, Yu. & Sun, Gang. PSACCF: Prioritized online slice admission control considering fairness in 5G/B5G networks. IEEE Transactions on Network Science and Engineering9(6), 4101–4114 (2022).

Keshri, Ajit Kumar, Mishra, Bimal Kumar & Mallick, Dheeresh K. “A predatorprey model on the attacking behavior of malicious objects in wireless nanosensor networks.” Nano communication networks 15: 1-16. (2018)

Shen, Shigen, Lanlan Xie, Yanchun Zhang, Guowen Wu, Hong Zhang, and Shui Yu. “Joint differential game and double deep qnetworks for suppressing malware spread in industrial internet of things.” IEEE Transactions on Information Forensics and Security (2023).

Wu, Guowen et al. STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things. Journal of Network and Computer Applications214, 103608 (2023).

Liu, Zhimin, Jiang, Guiyan, Jia, Weijia, Wang, Tian & Wu, Youke. “Critical density for k-coverage under border effects in camera sensor networks with irregular obstacles existence.” IEEE Internet of Things Journal (2023).

Cybercrime-Report. Available online: http://cyberseurityventures.com/2015-wp/wp-content/uploads/2017/ 10/2017-Cybercrime-Report.pdf (accessed on 23 April 2019).

State of IoT 2024: https://iot-analytics.com/number-connected-iot-devices/; (accessed on 30 September 2024).

Zhou, Ying, Wang, Yan, Zhou, Kai, Shen, Shou-Feng. & Ma, Wen-Xiu. Dynamical behaviors of an epidemic model for malware propagation in wireless sensor networks. Frontiers in Physics11, 1198410 (2023).

Youssef, Mina & Scoglio, Caterina. An individual-based approach to SIR epidemics in contact networks. Journal of theoretical biology283(1), 136–144 (2011). PubMed

Liu, Wanping & Zhong, Shouming. Web malware spread modelling and optimal control strategies. Scientific reports7(1), 42308 (2017). PubMed PMC

Gong, Yongkang, Yu, Dongxiao, Cheng, Xiuzhen, Yuen, Chau, Bennis, Mehdi & Debbah , Mrouane. “Computation Offloading and Quantization Schemes for Federated Satellite-Ground Graph Networks.” IEEE Transactions on Wireless Communications (2024).

Singh, Akansha, Awasthi, Amit K., Singh, Karan & Srivastava, Pramod K. Modeling and analysis of worm propagation in wireless sensor networks. Wireless Personal Communications98, 2535–2551 (2018).

Sun, Gang, Zhu, Xu., Hongfang, Yu. & Chang, Victor. Dynamic network function provisioning to enable network in box for industrial applications. IEEE Transactions on Industrial Informatics17(10), 7155–7164 (2020).

Yang, Lu-Xing. & Yang, Xiaofan. The spread of computer viruses under the influence of removable storage devices. Applied Mathematics and Computation219(8), 3914–3922 (2012).

Muroya, Yoshiaki & Kuniya, Toshikazu. Global stability of nonresident computer virus models. Mathematical Methods in the Applied Sciences38(2), 281–295 (2015).

Wang, Fangwei, et al. “Stability analysis of an e-SEIAR model with point-to-group worm propagation. ” Communications in Nonlinear Science and Numerical Simulation 20.3: 897-904. (2015)

Tang, Canqin & Yonghong, Wu. Global exponential stability of nonresident computer virus models. Nonlinear Analysis: Real World Applications34, 149–158 (2017).

Fatima, Umbreen, Ali, Mubasher, Ahmed, Nauman & Rafiq, M. “Numerical modeling of susceptible latent breaking-out quarantine computer virus epidemic dynamics.” Heliyon 4, no. 5 (2018). PubMed PMC

Zhang, Xianxiu & Li, Chuandong. “A novel computer virus model with generic nonlinear burst rate.” 2017 International Workshop on Complex Systems and Networks (IWCSN). IEEE, (2017)..

Feng, Liping, et al. “Modeling and stability analysis of worm propagation in wireless sensor network.” Mathematical Problems in Engineering 2015 (2015).

Srivastava, Arun Pratap, Awasthi, Shashank, Ojha, Rudra Pratap, Srivastava, Pramod Kumar & Katiyar, Saurabh. “Stability analysis of SIDR model for worm propagation in wireless sensor network.” Indian J. Sci. Technol 9, no. 31: 1-5. (2016)

Keshri, Neha & Mishra, Bimal Kumar. “Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network.” Chaos, Solitons and Fractals 68: 151-158. (2014)

Wu, Guowen et al. SIHQR model with time delay for worm spread analysis in IIoT-enabled PLC network. Ad Hoc Networks160, 103504 (2024).

Ye, Jiehao, Cheng, Wen, Liu, Xiaolong, Zhu, Wenyi & Shen, Shigen. “SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks.” Computers, Materials & Continua 79, no. 2 (2024).

Ojha, Rudra Pratap, Sanyal, Goutam, Srivastava, Pramod Kumar, Sharma, Kavita. “Design and analysis of modified SIQRS model for performance study of wireless sensor network.” Scalable Computing: Practice and Experience 18, no. 3: 229-242. (2017)

Nwokoye, C. H. & Umeh, Ikechukwu I. “The SEIQRV model: On a more accurate analytical characterization of malicious threat defense.” Int. J. Inf. Technol. Comput. Sci 9.12: 28-37. (2017)

Zhang, Zizhen, Kundu, Soumen & Wei, Ruibin. A delayed epidemic model for propagation of malicious codes in wireless sensor network. Mathematics7(5), 396 (2019).

Zarin, Rahat, Ullah, Niamat, Khan, Amir & Humphries, Usa Wannasingha. “A numerical study of a new non-linear fractal fractional mathematical model of malicious codes propagation in wireless sensor networks.” Computers & Security 135: 103484. (2023)

Ali, Raza, et al. “Numerical treatment for stochastic computer virus model”. Computer Modeling in Engineering and Sciences 120.2: 445-465. (2019)

Amador, Julia & Artalejo, Jesus R. Stochastic modeling of computer virus spreading with warning signals. Journal of the Franklin Institute350(5), 1112–1138 (2013).

Arif, M. Shoaib, et al. “Numerical simulations for stochastic computer virus propagation model.” Comput. Mater. Contin 62: 61-77. (2020)

Khan, Sami Ullah, Ullah, Saif, Li, Shuo, Mostafa, Almetwally M., Riaz, Muhammad Bilal, AlQahtani, Nouf F. & Teklu, Shewafera Wondimagegnhu. “A novel simulation-based analysis of a stochastic HIV model with the time delay using high order spectral collocation technique.” Scientific Reports 14, no. 1: 7961. (2024) PubMed PMC

Liu, Peijiang & Din, Anwarud. Comprehensive analysis of a stochastic wireless sensor network motivated by Black-Karasinski process. Scientific Reports14(1), 8799 (2024). PubMed PMC

Khan, Sami Ullah & Ishtiaq, Ali. Numerical analysis of stochastic SIR model by Legendre spectral collocation method, Advances in Mechanical Engineering, SAGE Publications Sage UK: London, England, 11, 7, (2019).

Khan, Sami Ullah & Ali, Ishtiaq. Applications of Legendre spectral collocation method for solving system of time delay differential equations. Advances in Mechan- ical Engineering 12.6 (2020): 1687814020922113.

Ali, Ishtiaq & Ullah Khan, Sami. “A Dynamic Competition Analysis of Stochastic Fractional Differential Equation Arising in Finance via Pseudospectral Method.” Mathematics 11.6: 1328. (2023)

Hu, Haifeng, et al. “A spectral clustering approach to identifying cuts in wireless sensor networks.” IEEE Sensors Journal 15.3: 1838-1848. (2014)

Sami Ullah Khan. Ishtiaq Ali, Application of Legendre spectral-collocation method to delay differential and stochastic delay differential eqnarray. AIP Advances8, 035301. 10.1063/1.5016680 (2018).

Sahu, Prakash Kumar & Saha Ray, S. “Legendre spectral collocation method for the solution of the model describing biological species living together.” Journal of Computational and Applied Mathematics 296 : 47-55. (2016)

Gul, Naseeb, Khan, Sami Ullah, Ali, Ishtiaq, Khan & Farman Ullah. “Transmission dynamic of stochastic hepatitis C model by spectral collocation method.” Computer Methods in Biomechanics and Biomedical Engineering 25, no. 5 : 578-592. (2022) PubMed

Asgari, M., Hashemizadeh, E., Khodabin, M. & Maleknejad, K. Numerical solution of nonlinear stochastic integral eqnarray by stochastic operational matrix based on Bernstein polynomials, Bull. Math. Sci. Math. Roumanie, Tome, 57105 (1) 3-12. (2014)

Najít záznam

Citační ukazatele

Nahrávání dat ...

Možnosti archivace

Nahrávání dat ...