DocumentCode
2201312
Title
Dynamic malware attack in energy-constrained mobile wireless networks
Author
Khouzani, M.H.R. ; Sarkar, Saswati
fYear
2010
fDate
Jan. 31 2010-Feb. 5 2010
Firstpage
1
Lastpage
11
Abstract
Large scale proliferation of wireless technologies are dependent on developing reliable security measures against outbreaks of malware. The first step toward this goal is investigating the possible attack strategies of wireless malware and the extent of damage they can incur. A malware in a mobile wireless network relies on the infrastructure of the network and the constrained resources to spread itself. In this paper, we consider a battery-constrained mobile wireless network. The worm at each infective node at any given time may choose to amplify the transmission range and elevate the media scanning rate and thus increase the chance of contacting susceptible nodes and accelerate its spread. However, a larger transmission range and an elevated media scanning rate results in (a) easier detection of the malware and thus more effective counter-measure by the network, and (b) faster depletion of the battery and thus losing the node. Even if depleting the battery is an objective of the malware, early loss of infective nodes may thwart the spread of the malware. We assume the viewpoint of the malware and cast the problem of dynamically selecting the transmission range and media accessing rate in the infective nodes as an optimal control problem. We utilize Pontryagin´s Maximum Principle to find an optimum solution. Moreover, we investigate the structural properties of an optimal solution to develop intuition about the nature of optimum attacks.
Keywords
invasive software; maximum principle; mobile communication; radio access networks; Pontryagin maximum principle; dynamic malware attack; elevated media scanning rate; energy-constrained mobile wireless networks; large scale proliferation; reliable security measures; transmission range; Acceleration; Batteries; Communication system security; Computer worms; Data privacy; Investments; Large-scale systems; Optimal control; Telecommunication traffic; Wireless networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory and Applications Workshop (ITA), 2010
Conference_Location
San Diego, CA
Print_ISBN
978-1-4244-7012-9
Electronic_ISBN
978-1-4244-7014-3
Type
conf
DOI
10.1109/ITA.2010.5454093
Filename
5454093
Link To Document