2022
DOI: 10.1007/s11277-022-09636-8
|View full text |Cite
|
Sign up to set email alerts
|

Epidemic Models of Malicious-Code Propagation and Control in Wireless Sensor Networks: An Indepth Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 83 publications
0
4
0
Order By: Relevance
“…Each network node consists of a singleboard computer Raspberry Pi version 3 or 2, connected sensors (temperature, pressure, humidity, etc.) and a Digi XBee communication module [28,29]. The main characteristics of the nodes are presented in Table 7.…”
Section: Experiments and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Each network node consists of a singleboard computer Raspberry Pi version 3 or 2, connected sensors (temperature, pressure, humidity, etc.) and a Digi XBee communication module [28,29]. The main characteristics of the nodes are presented in Table 7.…”
Section: Experiments and Discussionmentioning
confidence: 99%
“…A malicious code injection attack is a type of attack that exploits errors in software and injects malicious code into the host control program, for example, by injecting code into a data packet [28,29]. The goal is to disrupt the operation algorithms of the node.…”
Section: Attack Modelmentioning
confidence: 99%
“…A critical evaluation of the above-given models shows that besides considering the deterministic SLB model with their delay analysis, this work presents its SLB's stochastic version, wherein the impact of white noise is studied. Our model also includes the patch (P) compartment that prevents the inundation [26] of the computer network as a result of virus infestation.…”
Section: Related Literaturementioning
confidence: 99%
“…Particularly interesting are those dedicated to study the propagation of malicious code on wireless sensor networks (WSNs), which constitute the foundation for the development and implementation of IoT networks. The vast majority of these models are of a global nature (see, for example, [10][11][12][13][14] and the references therein), and their dynamics are described by continuous mathematical techniques, such as systems of ordinary differential equations. These are compartmental models (that is, the device population is divided into different classes or compartments: susceptible, infectious, recovered, etc.…”
Section: Introductionmentioning
confidence: 99%