Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks

Rahul Potharaju, Endadul Hoque, Cristina Nita-Rotaru, Saswati Sarkar, Santosh S. Venkatesh

Research output: Chapter in Book/Entry/PoemConference contribution

2 Scopus citations

Abstract

The openness of the Android operating system increased the number of applications developed, but it also introduced a new propagation vector for mobile malware. We model the propagation of mobile malware using epidemiology theory and study the problem as a function of the underlying mobility models. We define the optimal approach to heal an infected system with the help of a set of static healers that distribute patches, as the T-COVER problem and show that it is NP-HARD. We then propose two families of healer protocols that trade-off time recovery and energy consumed by sending patches. The first one uses randomization to ensure a small recovery time but may result in healers sending more patches than needed. The second one uses system feedback to optimize energy consumed by sending patches, but it may result in a larger recovery time. We show through simulations using the NS-3 simulator that despite lacking knowledge of the future, our protocols obtain a recovery time within a 10x bound of the oracle solution that knows the arrival time of the infected nodes.

Original languageEnglish (US)
Title of host publicationMASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
Pages200-208
Number of pages9
DOIs
StatePublished - 2012
Externally publishedYes
Event9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2012 - Las Vegas, NV, United States
Duration: Oct 8 2012Oct 11 2012

Publication series

NameMASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems

Conference

Conference9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2012
Country/TerritoryUnited States
CityLas Vegas, NV
Period10/8/1210/11/12

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks'. Together they form a unique fingerprint.

Cite this