DocumentCode :
2201312
Title :
Dynamic malware attack in energy-constrained mobile wireless networks
Author :
Khouzani, M.H.R. ; Sarkar, Saswati
fYear :
2010
fDate :
Jan. 31 2010-Feb. 5 2010
Firstpage :
1
Lastpage :
11
Abstract :
Large scale proliferation of wireless technologies are dependent on developing reliable security measures against outbreaks of malware. The first step toward this goal is investigating the possible attack strategies of wireless malware and the extent of damage they can incur. A malware in a mobile wireless network relies on the infrastructure of the network and the constrained resources to spread itself. In this paper, we consider a battery-constrained mobile wireless network. The worm at each infective node at any given time may choose to amplify the transmission range and elevate the media scanning rate and thus increase the chance of contacting susceptible nodes and accelerate its spread. However, a larger transmission range and an elevated media scanning rate results in (a) easier detection of the malware and thus more effective counter-measure by the network, and (b) faster depletion of the battery and thus losing the node. Even if depleting the battery is an objective of the malware, early loss of infective nodes may thwart the spread of the malware. We assume the viewpoint of the malware and cast the problem of dynamically selecting the transmission range and media accessing rate in the infective nodes as an optimal control problem. We utilize Pontryagin´s Maximum Principle to find an optimum solution. Moreover, we investigate the structural properties of an optimal solution to develop intuition about the nature of optimum attacks.
Keywords :
invasive software; maximum principle; mobile communication; radio access networks; Pontryagin maximum principle; dynamic malware attack; elevated media scanning rate; energy-constrained mobile wireless networks; large scale proliferation; reliable security measures; transmission range; Acceleration; Batteries; Communication system security; Computer worms; Data privacy; Investments; Large-scale systems; Optimal control; Telecommunication traffic; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and Applications Workshop (ITA), 2010
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4244-7012-9
Electronic_ISBN :
978-1-4244-7014-3
Type :
conf
DOI :
10.1109/ITA.2010.5454093
Filename :
5454093
Link To Document :
بازگشت