• DocumentCode
    2201312
  • Title

    Dynamic malware attack in energy-constrained mobile wireless networks

  • Author

    Khouzani, M.H.R. ; Sarkar, Saswati

  • fYear
    2010
  • fDate
    Jan. 31 2010-Feb. 5 2010
  • Firstpage
    1
  • Lastpage
    11
  • Abstract
    Large scale proliferation of wireless technologies are dependent on developing reliable security measures against outbreaks of malware. The first step toward this goal is investigating the possible attack strategies of wireless malware and the extent of damage they can incur. A malware in a mobile wireless network relies on the infrastructure of the network and the constrained resources to spread itself. In this paper, we consider a battery-constrained mobile wireless network. The worm at each infective node at any given time may choose to amplify the transmission range and elevate the media scanning rate and thus increase the chance of contacting susceptible nodes and accelerate its spread. However, a larger transmission range and an elevated media scanning rate results in (a) easier detection of the malware and thus more effective counter-measure by the network, and (b) faster depletion of the battery and thus losing the node. Even if depleting the battery is an objective of the malware, early loss of infective nodes may thwart the spread of the malware. We assume the viewpoint of the malware and cast the problem of dynamically selecting the transmission range and media accessing rate in the infective nodes as an optimal control problem. We utilize Pontryagin´s Maximum Principle to find an optimum solution. Moreover, we investigate the structural properties of an optimal solution to develop intuition about the nature of optimum attacks.
  • Keywords
    invasive software; maximum principle; mobile communication; radio access networks; Pontryagin maximum principle; dynamic malware attack; elevated media scanning rate; energy-constrained mobile wireless networks; large scale proliferation; reliable security measures; transmission range; Acceleration; Batteries; Communication system security; Computer worms; Data privacy; Investments; Large-scale systems; Optimal control; Telecommunication traffic; Wireless networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory and Applications Workshop (ITA), 2010
  • Conference_Location
    San Diego, CA
  • Print_ISBN
    978-1-4244-7012-9
  • Electronic_ISBN
    978-1-4244-7014-3
  • Type

    conf

  • DOI
    10.1109/ITA.2010.5454093
  • Filename
    5454093