This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks
March 2009 (vol. 8 no. 3)
pp. 413-425
Pradip De, University of Texas at Arlington, Arlington
Yonghe Liu, University of Texas at Arlington, Arlington
Sajal K. Das, University of Texas at Arlington, Arlington
While multi-hop broadcast protocols, such as Trickle, Deluge and MNP, have gained tremendous popularity as a means for fast and convenient propagation of data/code in large scale wireless sensor networks, they can, unfortunately, serve as potential platforms for virus spreading if the security is breached. To understand the vulnerability of such protocols and design defense mechanisms against piggy-backed virus attacks, it is critical to investigate the propagation process of these protocols in terms of their speed and reachability. In this paper, we propose a general framework based on the principles of epidemic theory, for vulnerability analysis of current broadcast protocols in wireless sensor networks. In particular, we develop a common mathematical model for the propagation that incorporates important parameters derived from the communication patterns of the protocol under test. Based on this model, we analyze the propagation rate and the extent of spread of a malware over typical broadcast protocols proposed in the literature. The overall result is an approximate but convenient tool to characterize a broadcast protocol in terms of its vulnerability to malware propagation. We have also performed extensive simulations which have validated our model.

[1] M. Akdere, C.C. Bilgin, O. Gerdaneri, I. Korpeoglu, O. Ulusoy, and U. Cetintemel, “A Comparison of Epidemic Algorithms in Wireless Sensor Networks,” Computer Comm., 2006.
[2] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “ASurvey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, 2002.
[3] R.M. Anderson and R.M. May, Infectious Diseases of Human: Dynamics and Control. Oxford Univ. Press, 1991.
[4] Institute for Software Integrated Systems at Vanderbilt University JProwler, http://www.isis.vanderbilt.edu/projects/ nestjprowler/, 2008.
[5] C. Chong and S. Kumar, “Sensor Networks: Evolution, Opportunities, and Challenges,” Proc. IEEE, vol. 91, no. 8, 2003.
[6] P. De, Y. Liu, and S.K. Das, “Modeling Node Compromise Spread in Sensor Networks Using Epidemic Theory,” Proc. IEEE World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2006.
[7] P. De, Y. Liu, and S.K. Das, “An Epidemic Theoretic Framework for Evaluating Broadcast Protocols in Wireless Sensor Networks,” Proc. IEEE Int'l Conf. Mobile Ad-Hoc and Sensor Systems, 2007.
[8] J. Deng, R. Han, and S. Mishra, “Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks,” Proc. Fifth Int'l Conf. Information Processing in Sensor Networks, 2006.
[9] P.K. Dutta, J.W. Hui, D.C. Chu, and D.E. Culler, “Securing the Deluge Network Programming System,” Proc. Fifth Int'l Conf. Information Processing in Sensor Networks, 2006.
[10] P.E. Lanigan, R. Gandhi, and P. Narasimhan, “Sluice: Secure Dissemination of Code Updates in Sensor Networks,” Proc. IEEE Int'l Conf. Distributed Computing Systems, 2006.
[11] J.W. Hui and D. Culler, “The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale,” Proc. Second ACM Conf. Embedded Networked Sensor Systems, 2004.
[12] S.A. Khayam and H. Radha, “A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks,” Proc. IEEE ICDCS Int'l Workshop Security in Distributed Computing Systems (SDCS), 2005.
[13] J. Kulik, W. Rabiner, and H. Balakrishnan, “Adaptive Protocols for Information Dissemination in Wireless Sensor Networks,” Proc. Fifth ACM/IEEE MobiCom Conf., 1999.
[14] P. Kyasanur, R.R. Choudhury, and I. Gupta, “Smart Gossip: Infusing Adaptivity in Gossiping Protocols for Wireless Sensor Networks,” Proc. Third IEEE Int'l Conf. Mobile Ad-Hoc and Sensor Systems (MASS), 2006.
[15] S.S. Kulkarni and L. Wang, “MNP: Multihop Network Reprogramming Service for Sensor Networks,” Proc. 25th IEEE Int'l Conf. Distributed Computing Systems (ICDCS), 2005.
[16] P. Levis, N. Patel, D. Culler, and S. Shenker, “Trickle: A Self-Regulating Algorithm for Code Maintenance and Propagation in Wireless Sensor Networks,” Proc. First USENIX/ACM Symp. Network Systems Design and Implementation (NSDI), 2004.
[17] S.S. Kulkarni and M. Arumugam, “INFUSE: A TDMA Based Data Dissemination Protocol for Sensor Networks,” Technical Report MSU-CSE-04-46, Dept. of Computer Science, Michigan State University, 2004.
[18] V. Naik, A. Arora, P. Sinha, and H. Zhang, “Sprinkler: A Reliable and Energy Efficient Data Dissemination Service for Wireless Embedded Devices,” Proc. 26th IEEE Int'l Real-Time Systems Symp. (RTSS '05), Dec. 2005.
[19] P. Levis and D. Culler, “The Firecracker Protocol,” Proc. 11th ACM SIGOPS European Workshop, 2004.
[20] M.E.J. Newman, “Spread of Epidemic Disease on Networks,” Physical Rev. E, vol. 66, 016128, 2002.
[21] M.D. Penrose, “Random Geometric Graphs,” Oxford Studies in Probability, vol. 5, Oxford University Press, May 2003.
[22] J. Polastre, J. Hill, and D. Culler, “Versatile Low Power Media Access for Wireless Sensor Networks,” Proc. Second ACM Conf. Embedded Networked Sensor Systems (SenSys), 2004.
[23] T.S. Rappaport, Wireless Communications: Principles and Practice, second ed. Prentice-Hall, Dec. 2001.
[24] E.W. Weisstein, Birthday Attack, From MathWorld—A Wolfram Web Resource, http://mathworld.wolfram.comBirthdayAttack. html , 2008.
[25] E.W. Weisstein, Hypergeometric Function, From MathWorld—A Wolfram Web Resource, http://mathworld.wolfram.com HypergeometricFunction.html , 2008.
[26] C.C. Zou, W. Gong, and D. Towsley, “Code Red Worm Propagation Modeling and Analysis,” Proc. Ninth ACM Conf. Computer and Comm. Security, 2002.
[27] C. Shannon and D. Moore, “The Spread of the Witty Worm,” IEEE Security & Privacy, vol. 2, no. 4, 2004.
[28] http:/www.malware.com, 2008.

Index Terms:
Distributed networks, Network Protocols, Wireless
Citation:
Pradip De, Yonghe Liu, Sajal K. Das, "An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks," IEEE Transactions on Mobile Computing, vol. 8, no. 3, pp. 413-425, March 2009, doi:10.1109/TMC.2008.115
Usage of this product signifies your acceptance of the Terms of Use.