research article modeling and stability analysis of worm...

9
Research Article Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network Liping Feng, 1 Lipeng Song, 2 Qingshan Zhao, 1 and Hongbin Wang 1 1 Department of Computer Science of Xinzhou Normal University, Xinzhou, Shanxi 034000, China 2 School of Computer and Control Engineering, North University of China, Taiyuan, Shanxi 030051, China Correspondence should be addressed to Hongbin Wang; [email protected] Received 28 April 2015; Revised 20 July 2015; Accepted 19 August 2015 Academic Editor: Stefan Balint Copyright © 2015 Liping Feng et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. An improved SIRS model considering communication radius and distributed density of nodes is proposed. e proposed model captures both the spatial and temporal dynamics of worms spread process. Using differential dynamical theories, we investigate dynamics of worm propagation to time in wireless sensor networks (WSNs). Reproductive number which determines global dynamics of worm propagation in WSNs is obtained. Equilibriums and their stabilities are also found. If reproductive number is less than one, the infected fraction of the sensor nodes disappears and if the reproduction number is greater than one, the infected fraction asymptotically stabilizes at the endemic equilibrium. Based on the reproduction number, we discuss the threshold of worm propagation about communication radius and distributed density of nodes in WSNs. Finally, numerical simulations verify the correctness of theoretical analysis. 1. Introduction A sensor network is composed of hundreds or even thou- sands of sensor nodes that are allowed random deployment in inaccessible terrains or disaster relief operations [1]. Wireless sensor networks (WSNs), as a kind of new information and communication network, have gained worldwide attention owing to their potential in civil and military applications, for instance, intrusion detection, perimeter monitoring, infor- mation gathering, and smart logistics support in an unknown deployed area [2–4]. With widespread applications of WSNs, research on WSNs has been a hot topic. Some methods have been proposed for prolonging the lifetime of WSNs focusing on energy consumption [5–7], device placement [8], and topol- ogy management [9]. Because sensor nodes are constrained sources, they have weak defenses and are attacking targets for worms. Injecting malware into some nodes has become a serious threat [10]. Recently, malicious codes targeting wire- less devices have emerged, which can spread directly from device to device using wireless communication technology, such as Wi-Fi and Bluetooth [11–14]. For instance, computer worm like Cabir uses the Bluetooth interface to spread among cellphones, which means that worms have committed the wireless domain and WSNs are also extremely vulnerable to malware. Actions of malicious objects on the Internet have been studied by using epidemical models and have provided insights for controlling worm prevalence in networks [15– 20]. In [15], the authors presented an E-mail virus model that accounts for behaviors of E-mail users and analyzed propagation features of E-mail viruses in different network topologies. In [16–20], the authors proposed epidemic mod- els with time delay and analyzed dynamical features of worm prevalence. To effectively defend against worm intrusions, it is necessary to deeply understand dynamical features of worm propagation in WSNs. Existing research prove that epidemical models are valuable for portraying characteris- tics of worm propagation. Since there is a basic similarity between worm propagation through wireless devices and traditional worm spread on the Internet, the epidemical models extensively are applied to study worm spread in WSNs by some researchers in recent years [11, 21–23]. In [21], the authors proposed a SIRS malware propagation model with feedback controller and analyzed Hopf bifurcation dynamics of malware prevalence in mobile wireless networks. Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2015, Article ID 129598, 8 pages http://dx.doi.org/10.1155/2015/129598

Upload: others

Post on 07-Apr-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Research Article Modeling and Stability Analysis of Worm ...downloads.hindawi.com/journals/mpe/2015/129598.pdf · Research Article Modeling and Stability Analysis of Worm Propagation

Research ArticleModeling and Stability Analysis of Worm Propagation inWireless Sensor Network

Liping Feng1 Lipeng Song2 Qingshan Zhao1 and Hongbin Wang1

1Department of Computer Science of Xinzhou Normal University Xinzhou Shanxi 034000 China2School of Computer and Control Engineering North University of China Taiyuan Shanxi 030051 China

Correspondence should be addressed to Hongbin Wang whb-163163com

Received 28 April 2015 Revised 20 July 2015 Accepted 19 August 2015

Academic Editor Stefan Balint

Copyright copy 2015 Liping Feng et al This is an open access article distributed under the Creative Commons Attribution Licensewhich permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited

An improved SIRS model considering communication radius and distributed density of nodes is proposed The proposed modelcaptures both the spatial and temporal dynamics of worms spread process Using differential dynamical theories we investigatedynamics of worm propagation to time in wireless sensor networks (WSNs) Reproductive number which determines globaldynamics of worm propagation in WSNs is obtained Equilibriums and their stabilities are also found If reproductive numberis less than one the infected fraction of the sensor nodes disappears and if the reproduction number is greater than one theinfected fraction asymptotically stabilizes at the endemic equilibrium Based on the reproduction number we discuss the thresholdof worm propagation about communication radius and distributed density of nodes inWSNs Finally numerical simulations verifythe correctness of theoretical analysis

1 Introduction

A sensor network is composed of hundreds or even thou-sands of sensor nodes that are allowed randomdeployment ininaccessible terrains or disaster relief operations [1] Wirelesssensor networks (WSNs) as a kind of new information andcommunication network have gained worldwide attentionowing to their potential in civil and military applications forinstance intrusion detection perimeter monitoring infor-mation gathering and smart logistics support in an unknowndeployed area [2ndash4]

With widespread applications of WSNs research onWSNs has been a hot topic Some methods have beenproposed for prolonging the lifetime of WSNs focusing onenergy consumption [5ndash7] device placement [8] and topol-ogy management [9] Because sensor nodes are constrainedsources they have weak defenses and are attacking targetsfor worms Injecting malware into some nodes has become aserious threat [10] Recently malicious codes targeting wire-less devices have emerged which can spread directly fromdevice to device using wireless communication technologysuch as Wi-Fi and Bluetooth [11ndash14] For instance computerworm like Cabir uses the Bluetooth interface to spread among

cellphones which means that worms have committed thewireless domain and WSNs are also extremely vulnerable tomalware

Actions of malicious objects on the Internet have beenstudied by using epidemical models and have providedinsights for controlling worm prevalence in networks [15ndash20] In [15] the authors presented an E-mail virus modelthat accounts for behaviors of E-mail users and analyzedpropagation features of E-mail viruses in different networktopologies In [16ndash20] the authors proposed epidemic mod-els with time delay and analyzed dynamical features of wormprevalence To effectively defend against worm intrusionsit is necessary to deeply understand dynamical features ofworm propagation in WSNs Existing research prove thatepidemical models are valuable for portraying characteris-tics of worm propagation Since there is a basic similaritybetween worm propagation through wireless devices andtraditional worm spread on the Internet the epidemicalmodels extensively are applied to study worm spread inWSNs by some researchers in recent years [11 21ndash23] In [21]the authors proposed a SIRS malware propagation modelwith feedback controller and analyzed Hopf bifurcationdynamics ofmalware prevalence inmobile wireless networks

Hindawi Publishing CorporationMathematical Problems in EngineeringVolume 2015 Article ID 129598 8 pageshttpdxdoiorg1011552015129598

2 Mathematical Problems in Engineering

The authors in [22] presented an epidemic model withvaccination compartment which captures both the spatialand temporal dynamics of worm spread process and somemathematical analyses and numerical simulations were per-formed based on this model The common problem of theabove models is that the characteristics of wireless sensornetworks like energy consumption communication radiusand distributed density of nodes have not been considered inmodels In [11] the authors developed a mathematical modelfor the propagation that incorporates important parametersderived from the communication patterns of the protocolunder test Based on this model the authors analyzed thepropagation rate and the extent of spread of a malware overtypical broadcast protocols proposed in the paper Wang andLi derived an iSIR model describing the process of wormpropagation with energy consumption of nodes in WSNs[23] Numerical simulations are performed to observe theeffects of the network topology and energy consumption ofnodes on worm spread in WSNs However the authors havenot performedmathematical analyses based on thismodel Infact key parameters of affectingworm spread can be found byexplicit mathematical analyses

To better portrait the features of worm propagation inWSNs in this paper we study the attacking behavior ofpossible worms in WSNs by constructing an improved SIRSepidemicmodel In thismodel the following three factors areconsidered (i) energy consumptions of nodes (ii) communi-cation radius of nodes and (iii) distributed density of nodesin WSNs Based on this model we analyze the stability ofworm prevalence through finding the equilibriums of model

The rest of this paper is organized as follows in Section 2we analyze topology of WSNs and present the model for-mulation Section 3 derives the equilibriums of the modeland discusses the stability of worm propagation at theequilibriums In Sections 4 and 5 numerical simulations areperformed to verify the correctness of theoretical analysesand some conclusions are given respectively

2 The Proposed Model

21 System Description Wemodel a wireless sensor networkcomposed of119873nodesThenodes are uniformly distributed in119871 times 119871 area (nodes average density is 120588 = 1198731198712) and the wire-less communication range of every node is 119903 The topologicalstructure of a WSN is shown in Figure 1

Based on the existing 119878119868119877 epidemic model [24 25] thenodes in WSNs are classified into three states

(i) Susceptible state (119878) nodes in 119878have not been infectedbyworms and these nodes are vulnerable toworms inWSNs

(ii) Infected state (119868) nodes have been infected by wormsand have the ability to infect other nodes in WSNs

(iii) Recover state (119877) nodes have installed a detectiontool that can identify and remove worms or nodeshave installed a software patch to eliminate the nodevulnerability exploited by worms

L

L

r

Figure 1 The topology structure of a WSN

120583N

120583S

IS120574I

R

120583R120583I

120576R

120596S

120573S998400I

Figure 2 Transition relationship of states of nodes

We consider the following state transitions among thesethree states

(i) Users may immunize their nodes with countermea-sures in states 119878 and 119868 with probabilities 120596 and 120574respectively

(ii) As the energy of nodes is exhausted some nodesbecome dead nodes with probability 120583

(iii) Infected nodes 119868 infect susceptible 119878 with effectiveinfection rate 120573

(iv) Some recovered nodesmay become susceptible nodeswith probability 120576

Transition relationships among node states are described inFigure 2

22 Model Derivation The communication area of a node isdenoted by 119878

119903 and the density of susceptible nodes in a unit

area inWSNs is denoted by119901(119905)Then the following equationshold

119901 (119905) =119878 (119905)

1198712

119878119903= 1205871199032

1198781015840(119905) = 119878

119903119901 (119905)

(1)

Mathematical Problems in Engineering 3

From (1) we can get

1198781015840(119905) = 120587119903

2 119878 (119905)

1198712 (2)

According to state transition relationships in Figure 2 themathematical model of worm propagation in WSNs can bederived as follows

119889119878 (119905)

119889119905= 120583119873 minus

1205871199032

1198712120573119878 (119905) 119868 (119905) minus (120583 + 120596) 119878 + 120576119877

119889119868 (119905)

119889119905=1205871199032

1198712120573119878 (119905) 119868 (119905) minus (120583 + 120574) 119868

119889119877 (119905)

119889119905= 120596119878 + 120574119868 minus (120583 + 120576) 119877

(3)

For convenience let

120585 =1205871199032

1198712120573 (4)

Then system (3) can be written as

119889119878

119889119905= 120583119873 minus 120585119878 (119905) 119868 (119905) minus (120583 + 120596) 119878 + 120576119877

119889119868

119889119905= 120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868

119889119877

119889119905= 120596119878 + 120574119868 minus (120583 + 120576) 119877

(5)

3 Stability Analysis of Equilibriums

In this section we will find the equilibriums of system (5) andinvestigate their stability The equilibriums of system (5) aregiven by solutions of

120583119873 minus 120585119878 (119905) 119868 (119905) minus (120583 + 120596) 119878 + 120576119877 = 0

120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 = 0

120596119878 + 120574119868 minus (120583 + 120576) 119877 = 0

(6)

Let 120585119878(119905)119868(119905) minus (120583 + 120574)119868 = 0 (the second equation of (6)) wehave 119868lowast = 0 or 119868lowast gt 0 and 119878lowast = (120583 + 120574)120585 For the case of119868lowast= 0 we have worm-free equilibrium

1198760= (119878lowast

0 119868lowast

0 119877lowast

0) = (

(120583 + 120576)

120583 + 120576 + 120596119873 0

120596119878

120583 + 120576) (7)

For the case of 119868lowast gt 0 we have endemic equilibrium

119876lowast= (119878lowast

1 119868lowast

1 119877lowast

1) = (

120583 + 120574

120585

120585 (120583 + 120576)119873 minus (120583 + 120574) (120583 + 120576 + 120596)

120585 (120583 + 120576 + 120574)120596119878lowast

1+ 120574119868lowast

1

120583 + 120576)

(8)

Let

1198770=

120585 (120583 + 120576)

(120583 + 120574) (120583 + 120576 + 120596)119873 (9)

Notably the endemic equilibrium is meaningful only if 1198770gt

1

31 Worm-Free Equilibrium and Its Stability

Lemma 1 Theworm-free equilibrium is locally asymptoticallystable if 119877

0lt 1 and unstable if 119877

0gt 1

Proof According to 1198760= (((120583 + 120576)(120583 + 120576 + 120596))119873 0 120596119878(120583 +

120576)) the characteristic equation of system (5) at worm-freeequilibrium 119876

0is

det(minus(120583 + 120596) minus 120582 minus120585119878

lowast

0120576

0 120585119878 minus (120583 + 120574) minus 120582 0

120596 120574 (120583 + 120576) minus 120582

)

= 0

(10)

which is equivalent to

[120585119878lowast

0minus (120583 + 120574) minus 120582]

sdot [1205822minus (2120583 + 120576 + 120596) 120582 + 120583

2+ 120576120583 + 120583120596] = 0

(11)

Equation (11) has a characteristic root 1205821= 120585119878lowast

0minus (120583 + 120574) =

(120583 + 120574)(1198770minus 1) and the roots of equation

1205822+ (2120583 + 120576 + 120596) 120582 + 120583

2+ 120576120583 + 120583120596 = 0 (12)

Obviously in accordance with the relationship betweenroots and coefficients of quadratic equation there is nopositive real part characteristic root of (12) Hence when119877

0lt

1 (11) has no positive real root and worm-free equilibrium1198760is locally asymptotically stable When 119877

0gt 1 (11) has a

positive root thus worm-free equilibrium 1198760is an unstable

saddle-point

Furthermore the following theorem holds

Theorem 2 The worm-free equilibrium is globally asymptoti-cally stable if 119877

0le 1

Proof From the first equation of system (5)

119878 (119905) le (120583 + 120576)119873 minus (120583 + 120576 + 120596) 119878 (13)

4 Mathematical Problems in Engineering

Thus 119878(119905) le (120583 + 120576)119873(120583 + 120576 + 120596) + (119878(0) minus (120583 + 120576)(120583 + 120576 +

120596))exp[minus(120583 + 120576 + 120596)119905] When 119905 rarr infin we obtain

119878 (119905) le120583 + 120576

120583 + 120576 + 120596119873 (14)

Consider a Lyapunov function

119871 (119905) = 119864 (119905)

(119905) = 120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)

le [120585120583 + 120596

120583 + 120596 + 120576119873 minus (120583 + 120574)] 119868 (119905)

=1

120583 + 120574(1198770minus 1) 119868 (119905) le 0

(15)

So we prove that worm-free equilibrium 1198760is globally

asymptotically stable

32 Endemic Equilibrium and Its Stability Now we inves-tigate the local stability of endemic equilibrium 119876

lowast Thecharacteristic equation of system (5) at endemic equilibrium119876lowast is

det(minus120585119868lowast

1minus (120583 + 120596) minus 120582 minus120585119878

lowast

1120576

120585119868lowast

1120585119878lowast

1minus (120583 + 120574) minus 120582 0

120596 120574 (120583 + 120576) minus 120582

)

= 0

(16)

which is equivalent to

1205823+ 11990101205822+ 1199011120582 + 1199012= 0 (17)

where 1199010= 3120583 + 120576 + 120596 + ((120583 + 120576)(120583 + 120576 + 120574))119873 119901

1= (120583 +

120576)[2120583 + 120574 + ((120583 + 120576)(120583 + 120576 + 120574))119873] + 120583120596 + 1205852119878lowast

1119868lowast

1 and 119901

2=

120583120585(120583 + 120576)(119868lowast

1minus 119878lowast

1) + 120583(120583 + 120574)(120583 + 120576 + 120596) + 120583120585(120574119868

lowast

1minus 120596119878lowast

1)

Obviously 1199010

gt 0 1199011

gt 0 1199012

gt 0 and 11990101199011minus

1199012gt 0 According to the theorem of Routh-Hurwitz [26 27]

it follows that the roots of (17) have negative real partsTherefore the endemic equilibrium is locally asymptoticallystable

From the above discussion we can summarize the follow-ing conclusion

Lemma 3 If 1198770gt 1 then endemic equilibrium is locally

asymptotically stable

Note that the number of nodes in WSNs is relativelystable that is at time 119905 the number of nodes 119878(119905) 119868(119905) and119877(119905) in states 119878 119868 and 119877 respectively satisfies

119878 (119905) + 119868 (119905) + 119877 (119905) = 119873 (18)Hence the dynamics of system (5) is equivalent to thefollowing system

119889119878 (119905)

119889119905= (120583 + 120596)119873 minus 120585119878 (119905) 119868 (119905) minus (120583 + 120596 + 120576) 119878 (119905)

minus 120576119868 (119905)

119889119868 (119905)

119889119905= 120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)

(19)

Clearly when 1198770gt 1 system (19) has a unique positive

equilibrium 119876lowast(119878lowast

1 119868lowast

1) where

(119878lowast

1 119868lowast

1)

= (120583 + 120574

120585120585 (120583 + 120576)119873 minus (120583 + 120574) (120583 + 120576 + 120596)

120585 (120583 + 120576 + 120574))

(20)

Now we state and prove a result on the global stability of theendemic equilibrium (119878

lowast

1 119868lowast

1) of system (19)

Theorem 4 When 1198770gt 1 the endemic equilibrium (119878

lowast

1 119868lowast

1)

of system (19) is globally asymptotically stable

Proof Consider the following Lyapunov function [28]

119871 (119905) = int

119878

119878lowast

1

119909 minus 119878lowast

1

119909119889119909 + int

119868

119868lowast

1

119909 minus 119868lowast

1

119909119889119909 (21)

The time derivative of 119871(119905) along the solution of system (19)is given by

(119905) = (119878 minus 119878lowast

1

119878) 1198781015840+ (

119868 minus 119868lowast

1

119868) 1198681015840= (1 minus

119878lowast

1

119878)

sdot [(120583 + 120576)119873

minus 120585119878 (119905) 119868 (119905) minus (120583 + 120576 + 120596) 119878 (119905) minus 120576119868 (119905)] + (1

minus119868lowast

1

119868) [120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)] le (1 minus

119878lowast

1

119878)

sdot [(120583 + 120576)119873

minus 120585119878 (119905) 119868 (119905) minus (120583 + 120576 + 120596) 119878 (119905)] + (1 minus119868lowast

1

119868)

sdot [120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)]

= minus (120583 + 120576)119873119878

119878lowast

1

(119878lowast

1

119878minus 1)

2

le 0

(22)

The proof is completed

Remark 5 By Theorem 4 we obtain that 1198770

gt 1 thenendemic equilibrium 119876

lowast of system (5) is globally asymptoti-cally stable

4 Worm Propagation Threshold Analysis andNumerical Simulations

We have proved that the basic reproductive number 1198770

equaling zero is the threshold whether worms are eliminatedWhen 119877

0le 1 worms in WSNs can be eliminated and

system (5) will stabilize at worm-free equilibrium When1198770gt 1 worms in WSNs will exist consistently and system

(5) will stabilize at the endemic equilibrium For verifyingthe correctness of theoretical analysis we perform wormpropagation threshold analyses and numerical simulationsfrom the following two sides

Mathematical Problems in Engineering 5

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(a)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(b)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(c)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(d)

Figure 3 Simulation results of different communication radius of nodes (a) 119903 = 01 (b) 119903 = 03 (c) 119903 = 08 and (d) 119903 = 1

41 Communication Radius of Nodes 119903 Let 1198770= (120585(120583 +

120576)(120583 + 120574)(120583 + 120576 + 120596))119873 = 1 we can get the thresholdof worm propagation about communication radius of nodes119903119888= 119871radic(120583 + 120574)(120583 + 120576 + 120596)120587120573(120583 + 120576)119873 that is when 119903 le 119903

119888

1198770le 1 according to Theorem 2 worms in WSNs can be

eliminated and system (5) will stabilize at the worm-freeequilibrium when 119903 gt 119903

119888 1198770gt 1 according to Remark 5

worms in WSNs will exist consistently and system (5) willstabilize at the endemic equilibrium

We choose a set of simulation parameters as follows119873 =

1000 119871 = 10 120583 = 0001 120573 = 00003 120596 = 0001 120576 = 00003and 120574 = 0002 By calculation we have 119903

119888= 07506 Initial

values of susceptible infected and recovered nodes in WSNs

are 119878(0) = 990 119868(0) = 10 and 119877(0) = 0 When 119903 takesdifferent values simulation results are depicted in Figures3(a)ndash3(d)

When 119903 = 01 lt 119903119888and 119903 = 03 lt 119903

119888 Figures 3(a) and 3(b)

show that system (5) stabilizes at worm-free equilibriumThesimulation results are consistent withTheorem 2

When 119903 = 08 gt 119903119888and 119903 = 1 gt 119903

119888 Figures 3(c) and 3(d)

show that system (5) stabilizes at the endemic equilibriumSimulation results are consistent with Remark 5

42 NodesDistributedDensity120588 Let1198770= (120585(120583+120576)(120583+120574)(120583+

120576 + 120596))119873 = (1205871199032120573(120583 + 120576)(120583 + 120574)(120583 + 120576 + 120596))120588 = 1 we can get

the threshold of worm propagation about node distributed

6 Mathematical Problems in Engineering

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(a)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(b)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(c)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(d)

Figure 4 Simulation results of different nodes density (a) 120588 = 25 (b) 120588 = 16 (c) 120588 = 6944 and (d) 120588 = 10

density 120588119888= (120583 + 120574)(120583 + 120576 + 120596)120587119903

2120573(120583 + 120576) When 120588 lt 120588

119888

1198770le 1 system (5) has only a worm-free equilibrium and is

globally asymptotically stable when 120588 gt 120588119888 1198770gt 1 system

(5) has an endemic equilibrium besides the worm-free equi-librium and endemic equilibrium is globally asymptoticallystable

We choose a set of simulation parameters as follows119873 =

1000 119903 = 1120583 = 0001120573 = 00003120596 = 0001 120576 = 00003 and120574 = 0002 By calculation we get 120588

119888= 56345 Initial values

of system (5) are set as 119878(0) = 990 119868(0) = 10 and 119877(0) = 0When 119871 = 20 25 12 and 10 we can get 120588 = 119873119871

2= 25

16 6944 and 10 Simulation results are depicted in Figures4(a)ndash4(d)

When 120588 = 25 lt 120588119888and 120588 = 16 lt 120588

119888 Figures

4(a) and 4(b) indicate that system (5) stabilizes at the worm-free equilibrium and worm propagation is controlled finallySimulation results are consistent with theoretical analysis

When 120588 = 6944 gt 120588119888and 120588 = 10 gt 120588

119888 Figures 4(c)

and 4(d) show that the trajectories converge to the endemicequilibriumThe conclusions agree with theoretical analysis

5 Conclusions

In this paper we have proposed an improved SIRS modelfor analyzing dynamics of worm propagation in WSNs Thismodel can describe the process of worm propagation with

Mathematical Problems in Engineering 7

the energy consumption and different distributed densityof nodes Based on this model a control parameter 119877

0

that completely determines the global dynamics of wormpropagation has been obtained by the explicit mathematicalanalyses From Theorems 4 and 2 we learn out that wormwill be controlled in WSNs when 119877

0lt 1 and they will

be prevalent otherwise Finally based on 1198770 we discuss the

threshold of worm propagation about communication radiusand distributed densities of nodes inWSNs Numerical simu-lations verify the correctness of theoretical analysis Researchresults show that decreasing the value of communicationradius or reducing distributed density of nodes is an effectivemethod to prevent worms spread in WSNs Research ofthis paper provides the theoretical basis for predicting andcontrolling worm propagation in WSNs It is worth pointingout that we do not consider physical effects like ldquocollisionsrdquoand heterogeneous distribution of nodes on infection ratewhen modeling which is our focus in the future

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work is supported by the National Natural ScienceFoundation of China (61379125) the Natural Science Foun-dation of Shanxi Province (2015011053) Key ConstructionDisciplines of Xinzhou Normal University (ZDXK201204XK201307)

References

[1] S Tang and W Li ldquoQoS supporting and optimal energy allo-cation for a cluster based wireless sensor networkrdquo ComputerCommunications vol 29 no 13-14 pp 2569ndash2577 2006

[2] L H Zhu and H Y Zhao ldquoDynamical analysis and optimalcontrol for a malware propagation model in an informationnetworkrdquo Neurocomputing vol 149 pp 1370ndash1386 2015

[3] S S W Lee P-K Tseng and A Chen ldquoLink weight assignmentand loop-free routing table update for link state routing pro-tocols in energy-aware internetrdquo Future Generation ComputerSystems vol 28 no 2 pp 437ndash445 2012

[4] T Rault A Bouabdallah and Y Challal ldquoEnergy efficiencyin wireless sensor networks a top-down surveyrdquo ComputerNetworks vol 67 pp 104ndash122 2014

[5] M Chiang ldquoBalancing transport and physical layers in wirelessmultihop networks jointly optimal congestion control andpower controlrdquo IEEE Journal on Selected Areas in Communica-tions vol 23 no 1 pp 104ndash116 2005

[6] H Shi W Wang and N Kwok ldquoEnergy dependent divisibleload theory for wireless sensor network workload allocationrdquoMathematical Problems in Engineering vol 2012 Article ID235289 16 pages 2012

[7] J Zhang and H-N Lee ldquoEnergy-efficient utility maximizationfor wireless networks withwithout multipath routingrdquo AEUmdashInternational Journal of Electronics and Communications vol64 no 2 pp 99ndash111 2010

[8] C-Y Chang J-P Sheu Y-C Chen and S-W Chang ldquoAnobstacle-free and power-efficient deployment algorithm forwireless sensor networksrdquo IEEE Transactions on Systems Manand Cybernetics Part A Systems and Humans vol 39 no 4 pp795ndash806 2009

[9] H Chen C K Tse and J Feng ldquoImpact of topology onperformance and energy efficiency in wireless sensor networksfor source extractionrdquo IEEE Transactions on Parallel and Dis-tributed Systems vol 20 no 6 pp 886ndash897 2009

[10] M H Khouzani and S Sarkar ldquoMaximum damage batterydepletion attack in mobile sensor networksrdquo IEEE Transactionson Automatic Control vol 56 no 10 pp 2358ndash2368 2011

[11] P De Y Liu and S K Das ldquoAn epidemic theoretic frameworkfor vulnerability analysis of broadcast protocols in wirelesssensor networksrdquo IEEE Transactions on Mobile Computing vol8 no 3 pp 413ndash425 2009

[12] S Zanero ldquoWirelessmalware propagation a reality checkrdquo IEEESecurity amp Privacy vol 7 no 5 pp 70ndash74 2009

[13] S A Khayam and H Radha ldquoUsing signal processing tech-niques to model worm propagation over wireless sensor net-worksrdquo IEEE Signal Processing Magazine vol 23 no 2 pp 164ndash169 2006

[14] G Yan and S Eidenbenz ldquoModeling propagation dynamics ofbluetooth wormsrdquo IEEE Transactions onMobile Computing vol8 no 3 pp 353ndash367 2009

[15] C C Zou D Towsley and W B Gong ldquoModeling andsimulation study of the propagation and defense of internete-mail wormsrdquo IEEE Transactions on Dependable and SecureComputing vol 4 no 2 pp 105ndash118 2007

[16] B KMishra andD K Saini ldquoSEIRS epidemicmodel with delayfor transmission of malicious objects in computer networkrdquoAppliedMathematics and Computation vol 188 no 2 pp 1476ndash1482 2007

[17] S J Wang Q M Liu X F Yu and Y Ma ldquoBifurcation analysisof a model for network worm propagation with time delayrdquoMathematical and ComputerModelling vol 52 no 3-4 pp 435ndash447 2010

[18] Q Zhu X Yang L-X Yang and C Zhang ldquoOptimal control ofcomputer virus under a delayed modelrdquo Applied Mathematicsand Computation vol 218 no 23 pp 11613ndash11619 2012

[19] L Feng X Liao H Li and Q Han ldquoHopf bifurcation analysisof a delayed viral infection model in computer networksrdquoMathematical and Computer Modelling vol 56 no 7-8 pp 167ndash179 2012

[20] L Feng X Liao Q Han and H Li ldquoDynamical analysisand control strategies on malware propagation modelrdquo AppliedMathematical Modelling vol 37 no 16-17 pp 8225ndash8236 2013

[21] L H Zhu H Y Zhao and X M Wang ldquoBifurcation analysisof a delay reaction-diffusion malware propagation model withfeedback controlrdquo Communications in Nonlinear Science andNumerical Simulation vol 22 no 1ndash3 pp 747ndash768 2015

[22] B K Mishra and N Keshri ldquoMathematical model on thetransmission of worms in wireless sensor networkrdquo AppliedMathematical Modelling vol 37 no 6 pp 4103ndash4111 2013

[23] X M Wang and Y S Li ldquoAn improved SIR model foranalyzing the dynamics of worm propagation in wireless sensornetworksrdquo Chinese Journal of Electronics vol 18 no 1 pp 8ndash122009

[24] D J Daley and J Gani Epidemic Modeling An IntroductionCambridge University Press New York NY USA 1999

8 Mathematical Problems in Engineering

[25] J O Kephart and S R White ldquoMeasuring and modeling com-puter virus prevalencerdquo in Proceedings of the IEEE ComputerSociety Symposium on Security and Privacy pp 2ndash15 May 1993

[26] E A Barbashin Introduction to theTheory of Stability Walters-Noordhoff Groningen The Netherlands 1970

[27] J La Salle and S Lefschetz Stability by LiapunovsDirectMethodAcademic Press New York NY USA 1961

[28] H Yuan and G Q Chen ldquoNetwork virus-epidemic model withthe point-to-group information propagationrdquo Applied Mathe-matics and Computation vol 206 no 1 pp 357ndash367 2008

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Page 2: Research Article Modeling and Stability Analysis of Worm ...downloads.hindawi.com/journals/mpe/2015/129598.pdf · Research Article Modeling and Stability Analysis of Worm Propagation

2 Mathematical Problems in Engineering

The authors in [22] presented an epidemic model withvaccination compartment which captures both the spatialand temporal dynamics of worm spread process and somemathematical analyses and numerical simulations were per-formed based on this model The common problem of theabove models is that the characteristics of wireless sensornetworks like energy consumption communication radiusand distributed density of nodes have not been considered inmodels In [11] the authors developed a mathematical modelfor the propagation that incorporates important parametersderived from the communication patterns of the protocolunder test Based on this model the authors analyzed thepropagation rate and the extent of spread of a malware overtypical broadcast protocols proposed in the paper Wang andLi derived an iSIR model describing the process of wormpropagation with energy consumption of nodes in WSNs[23] Numerical simulations are performed to observe theeffects of the network topology and energy consumption ofnodes on worm spread in WSNs However the authors havenot performedmathematical analyses based on thismodel Infact key parameters of affectingworm spread can be found byexplicit mathematical analyses

To better portrait the features of worm propagation inWSNs in this paper we study the attacking behavior ofpossible worms in WSNs by constructing an improved SIRSepidemicmodel In thismodel the following three factors areconsidered (i) energy consumptions of nodes (ii) communi-cation radius of nodes and (iii) distributed density of nodesin WSNs Based on this model we analyze the stability ofworm prevalence through finding the equilibriums of model

The rest of this paper is organized as follows in Section 2we analyze topology of WSNs and present the model for-mulation Section 3 derives the equilibriums of the modeland discusses the stability of worm propagation at theequilibriums In Sections 4 and 5 numerical simulations areperformed to verify the correctness of theoretical analysesand some conclusions are given respectively

2 The Proposed Model

21 System Description Wemodel a wireless sensor networkcomposed of119873nodesThenodes are uniformly distributed in119871 times 119871 area (nodes average density is 120588 = 1198731198712) and the wire-less communication range of every node is 119903 The topologicalstructure of a WSN is shown in Figure 1

Based on the existing 119878119868119877 epidemic model [24 25] thenodes in WSNs are classified into three states

(i) Susceptible state (119878) nodes in 119878have not been infectedbyworms and these nodes are vulnerable toworms inWSNs

(ii) Infected state (119868) nodes have been infected by wormsand have the ability to infect other nodes in WSNs

(iii) Recover state (119877) nodes have installed a detectiontool that can identify and remove worms or nodeshave installed a software patch to eliminate the nodevulnerability exploited by worms

L

L

r

Figure 1 The topology structure of a WSN

120583N

120583S

IS120574I

R

120583R120583I

120576R

120596S

120573S998400I

Figure 2 Transition relationship of states of nodes

We consider the following state transitions among thesethree states

(i) Users may immunize their nodes with countermea-sures in states 119878 and 119868 with probabilities 120596 and 120574respectively

(ii) As the energy of nodes is exhausted some nodesbecome dead nodes with probability 120583

(iii) Infected nodes 119868 infect susceptible 119878 with effectiveinfection rate 120573

(iv) Some recovered nodesmay become susceptible nodeswith probability 120576

Transition relationships among node states are described inFigure 2

22 Model Derivation The communication area of a node isdenoted by 119878

119903 and the density of susceptible nodes in a unit

area inWSNs is denoted by119901(119905)Then the following equationshold

119901 (119905) =119878 (119905)

1198712

119878119903= 1205871199032

1198781015840(119905) = 119878

119903119901 (119905)

(1)

Mathematical Problems in Engineering 3

From (1) we can get

1198781015840(119905) = 120587119903

2 119878 (119905)

1198712 (2)

According to state transition relationships in Figure 2 themathematical model of worm propagation in WSNs can bederived as follows

119889119878 (119905)

119889119905= 120583119873 minus

1205871199032

1198712120573119878 (119905) 119868 (119905) minus (120583 + 120596) 119878 + 120576119877

119889119868 (119905)

119889119905=1205871199032

1198712120573119878 (119905) 119868 (119905) minus (120583 + 120574) 119868

119889119877 (119905)

119889119905= 120596119878 + 120574119868 minus (120583 + 120576) 119877

(3)

For convenience let

120585 =1205871199032

1198712120573 (4)

Then system (3) can be written as

119889119878

119889119905= 120583119873 minus 120585119878 (119905) 119868 (119905) minus (120583 + 120596) 119878 + 120576119877

119889119868

119889119905= 120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868

119889119877

119889119905= 120596119878 + 120574119868 minus (120583 + 120576) 119877

(5)

3 Stability Analysis of Equilibriums

In this section we will find the equilibriums of system (5) andinvestigate their stability The equilibriums of system (5) aregiven by solutions of

120583119873 minus 120585119878 (119905) 119868 (119905) minus (120583 + 120596) 119878 + 120576119877 = 0

120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 = 0

120596119878 + 120574119868 minus (120583 + 120576) 119877 = 0

(6)

Let 120585119878(119905)119868(119905) minus (120583 + 120574)119868 = 0 (the second equation of (6)) wehave 119868lowast = 0 or 119868lowast gt 0 and 119878lowast = (120583 + 120574)120585 For the case of119868lowast= 0 we have worm-free equilibrium

1198760= (119878lowast

0 119868lowast

0 119877lowast

0) = (

(120583 + 120576)

120583 + 120576 + 120596119873 0

120596119878

120583 + 120576) (7)

For the case of 119868lowast gt 0 we have endemic equilibrium

119876lowast= (119878lowast

1 119868lowast

1 119877lowast

1) = (

120583 + 120574

120585

120585 (120583 + 120576)119873 minus (120583 + 120574) (120583 + 120576 + 120596)

120585 (120583 + 120576 + 120574)120596119878lowast

1+ 120574119868lowast

1

120583 + 120576)

(8)

Let

1198770=

120585 (120583 + 120576)

(120583 + 120574) (120583 + 120576 + 120596)119873 (9)

Notably the endemic equilibrium is meaningful only if 1198770gt

1

31 Worm-Free Equilibrium and Its Stability

Lemma 1 Theworm-free equilibrium is locally asymptoticallystable if 119877

0lt 1 and unstable if 119877

0gt 1

Proof According to 1198760= (((120583 + 120576)(120583 + 120576 + 120596))119873 0 120596119878(120583 +

120576)) the characteristic equation of system (5) at worm-freeequilibrium 119876

0is

det(minus(120583 + 120596) minus 120582 minus120585119878

lowast

0120576

0 120585119878 minus (120583 + 120574) minus 120582 0

120596 120574 (120583 + 120576) minus 120582

)

= 0

(10)

which is equivalent to

[120585119878lowast

0minus (120583 + 120574) minus 120582]

sdot [1205822minus (2120583 + 120576 + 120596) 120582 + 120583

2+ 120576120583 + 120583120596] = 0

(11)

Equation (11) has a characteristic root 1205821= 120585119878lowast

0minus (120583 + 120574) =

(120583 + 120574)(1198770minus 1) and the roots of equation

1205822+ (2120583 + 120576 + 120596) 120582 + 120583

2+ 120576120583 + 120583120596 = 0 (12)

Obviously in accordance with the relationship betweenroots and coefficients of quadratic equation there is nopositive real part characteristic root of (12) Hence when119877

0lt

1 (11) has no positive real root and worm-free equilibrium1198760is locally asymptotically stable When 119877

0gt 1 (11) has a

positive root thus worm-free equilibrium 1198760is an unstable

saddle-point

Furthermore the following theorem holds

Theorem 2 The worm-free equilibrium is globally asymptoti-cally stable if 119877

0le 1

Proof From the first equation of system (5)

119878 (119905) le (120583 + 120576)119873 minus (120583 + 120576 + 120596) 119878 (13)

4 Mathematical Problems in Engineering

Thus 119878(119905) le (120583 + 120576)119873(120583 + 120576 + 120596) + (119878(0) minus (120583 + 120576)(120583 + 120576 +

120596))exp[minus(120583 + 120576 + 120596)119905] When 119905 rarr infin we obtain

119878 (119905) le120583 + 120576

120583 + 120576 + 120596119873 (14)

Consider a Lyapunov function

119871 (119905) = 119864 (119905)

(119905) = 120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)

le [120585120583 + 120596

120583 + 120596 + 120576119873 minus (120583 + 120574)] 119868 (119905)

=1

120583 + 120574(1198770minus 1) 119868 (119905) le 0

(15)

So we prove that worm-free equilibrium 1198760is globally

asymptotically stable

32 Endemic Equilibrium and Its Stability Now we inves-tigate the local stability of endemic equilibrium 119876

lowast Thecharacteristic equation of system (5) at endemic equilibrium119876lowast is

det(minus120585119868lowast

1minus (120583 + 120596) minus 120582 minus120585119878

lowast

1120576

120585119868lowast

1120585119878lowast

1minus (120583 + 120574) minus 120582 0

120596 120574 (120583 + 120576) minus 120582

)

= 0

(16)

which is equivalent to

1205823+ 11990101205822+ 1199011120582 + 1199012= 0 (17)

where 1199010= 3120583 + 120576 + 120596 + ((120583 + 120576)(120583 + 120576 + 120574))119873 119901

1= (120583 +

120576)[2120583 + 120574 + ((120583 + 120576)(120583 + 120576 + 120574))119873] + 120583120596 + 1205852119878lowast

1119868lowast

1 and 119901

2=

120583120585(120583 + 120576)(119868lowast

1minus 119878lowast

1) + 120583(120583 + 120574)(120583 + 120576 + 120596) + 120583120585(120574119868

lowast

1minus 120596119878lowast

1)

Obviously 1199010

gt 0 1199011

gt 0 1199012

gt 0 and 11990101199011minus

1199012gt 0 According to the theorem of Routh-Hurwitz [26 27]

it follows that the roots of (17) have negative real partsTherefore the endemic equilibrium is locally asymptoticallystable

From the above discussion we can summarize the follow-ing conclusion

Lemma 3 If 1198770gt 1 then endemic equilibrium is locally

asymptotically stable

Note that the number of nodes in WSNs is relativelystable that is at time 119905 the number of nodes 119878(119905) 119868(119905) and119877(119905) in states 119878 119868 and 119877 respectively satisfies

119878 (119905) + 119868 (119905) + 119877 (119905) = 119873 (18)Hence the dynamics of system (5) is equivalent to thefollowing system

119889119878 (119905)

119889119905= (120583 + 120596)119873 minus 120585119878 (119905) 119868 (119905) minus (120583 + 120596 + 120576) 119878 (119905)

minus 120576119868 (119905)

119889119868 (119905)

119889119905= 120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)

(19)

Clearly when 1198770gt 1 system (19) has a unique positive

equilibrium 119876lowast(119878lowast

1 119868lowast

1) where

(119878lowast

1 119868lowast

1)

= (120583 + 120574

120585120585 (120583 + 120576)119873 minus (120583 + 120574) (120583 + 120576 + 120596)

120585 (120583 + 120576 + 120574))

(20)

Now we state and prove a result on the global stability of theendemic equilibrium (119878

lowast

1 119868lowast

1) of system (19)

Theorem 4 When 1198770gt 1 the endemic equilibrium (119878

lowast

1 119868lowast

1)

of system (19) is globally asymptotically stable

Proof Consider the following Lyapunov function [28]

119871 (119905) = int

119878

119878lowast

1

119909 minus 119878lowast

1

119909119889119909 + int

119868

119868lowast

1

119909 minus 119868lowast

1

119909119889119909 (21)

The time derivative of 119871(119905) along the solution of system (19)is given by

(119905) = (119878 minus 119878lowast

1

119878) 1198781015840+ (

119868 minus 119868lowast

1

119868) 1198681015840= (1 minus

119878lowast

1

119878)

sdot [(120583 + 120576)119873

minus 120585119878 (119905) 119868 (119905) minus (120583 + 120576 + 120596) 119878 (119905) minus 120576119868 (119905)] + (1

minus119868lowast

1

119868) [120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)] le (1 minus

119878lowast

1

119878)

sdot [(120583 + 120576)119873

minus 120585119878 (119905) 119868 (119905) minus (120583 + 120576 + 120596) 119878 (119905)] + (1 minus119868lowast

1

119868)

sdot [120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)]

= minus (120583 + 120576)119873119878

119878lowast

1

(119878lowast

1

119878minus 1)

2

le 0

(22)

The proof is completed

Remark 5 By Theorem 4 we obtain that 1198770

gt 1 thenendemic equilibrium 119876

lowast of system (5) is globally asymptoti-cally stable

4 Worm Propagation Threshold Analysis andNumerical Simulations

We have proved that the basic reproductive number 1198770

equaling zero is the threshold whether worms are eliminatedWhen 119877

0le 1 worms in WSNs can be eliminated and

system (5) will stabilize at worm-free equilibrium When1198770gt 1 worms in WSNs will exist consistently and system

(5) will stabilize at the endemic equilibrium For verifyingthe correctness of theoretical analysis we perform wormpropagation threshold analyses and numerical simulationsfrom the following two sides

Mathematical Problems in Engineering 5

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(a)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(b)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(c)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(d)

Figure 3 Simulation results of different communication radius of nodes (a) 119903 = 01 (b) 119903 = 03 (c) 119903 = 08 and (d) 119903 = 1

41 Communication Radius of Nodes 119903 Let 1198770= (120585(120583 +

120576)(120583 + 120574)(120583 + 120576 + 120596))119873 = 1 we can get the thresholdof worm propagation about communication radius of nodes119903119888= 119871radic(120583 + 120574)(120583 + 120576 + 120596)120587120573(120583 + 120576)119873 that is when 119903 le 119903

119888

1198770le 1 according to Theorem 2 worms in WSNs can be

eliminated and system (5) will stabilize at the worm-freeequilibrium when 119903 gt 119903

119888 1198770gt 1 according to Remark 5

worms in WSNs will exist consistently and system (5) willstabilize at the endemic equilibrium

We choose a set of simulation parameters as follows119873 =

1000 119871 = 10 120583 = 0001 120573 = 00003 120596 = 0001 120576 = 00003and 120574 = 0002 By calculation we have 119903

119888= 07506 Initial

values of susceptible infected and recovered nodes in WSNs

are 119878(0) = 990 119868(0) = 10 and 119877(0) = 0 When 119903 takesdifferent values simulation results are depicted in Figures3(a)ndash3(d)

When 119903 = 01 lt 119903119888and 119903 = 03 lt 119903

119888 Figures 3(a) and 3(b)

show that system (5) stabilizes at worm-free equilibriumThesimulation results are consistent withTheorem 2

When 119903 = 08 gt 119903119888and 119903 = 1 gt 119903

119888 Figures 3(c) and 3(d)

show that system (5) stabilizes at the endemic equilibriumSimulation results are consistent with Remark 5

42 NodesDistributedDensity120588 Let1198770= (120585(120583+120576)(120583+120574)(120583+

120576 + 120596))119873 = (1205871199032120573(120583 + 120576)(120583 + 120574)(120583 + 120576 + 120596))120588 = 1 we can get

the threshold of worm propagation about node distributed

6 Mathematical Problems in Engineering

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(a)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(b)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(c)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(d)

Figure 4 Simulation results of different nodes density (a) 120588 = 25 (b) 120588 = 16 (c) 120588 = 6944 and (d) 120588 = 10

density 120588119888= (120583 + 120574)(120583 + 120576 + 120596)120587119903

2120573(120583 + 120576) When 120588 lt 120588

119888

1198770le 1 system (5) has only a worm-free equilibrium and is

globally asymptotically stable when 120588 gt 120588119888 1198770gt 1 system

(5) has an endemic equilibrium besides the worm-free equi-librium and endemic equilibrium is globally asymptoticallystable

We choose a set of simulation parameters as follows119873 =

1000 119903 = 1120583 = 0001120573 = 00003120596 = 0001 120576 = 00003 and120574 = 0002 By calculation we get 120588

119888= 56345 Initial values

of system (5) are set as 119878(0) = 990 119868(0) = 10 and 119877(0) = 0When 119871 = 20 25 12 and 10 we can get 120588 = 119873119871

2= 25

16 6944 and 10 Simulation results are depicted in Figures4(a)ndash4(d)

When 120588 = 25 lt 120588119888and 120588 = 16 lt 120588

119888 Figures

4(a) and 4(b) indicate that system (5) stabilizes at the worm-free equilibrium and worm propagation is controlled finallySimulation results are consistent with theoretical analysis

When 120588 = 6944 gt 120588119888and 120588 = 10 gt 120588

119888 Figures 4(c)

and 4(d) show that the trajectories converge to the endemicequilibriumThe conclusions agree with theoretical analysis

5 Conclusions

In this paper we have proposed an improved SIRS modelfor analyzing dynamics of worm propagation in WSNs Thismodel can describe the process of worm propagation with

Mathematical Problems in Engineering 7

the energy consumption and different distributed densityof nodes Based on this model a control parameter 119877

0

that completely determines the global dynamics of wormpropagation has been obtained by the explicit mathematicalanalyses From Theorems 4 and 2 we learn out that wormwill be controlled in WSNs when 119877

0lt 1 and they will

be prevalent otherwise Finally based on 1198770 we discuss the

threshold of worm propagation about communication radiusand distributed densities of nodes inWSNs Numerical simu-lations verify the correctness of theoretical analysis Researchresults show that decreasing the value of communicationradius or reducing distributed density of nodes is an effectivemethod to prevent worms spread in WSNs Research ofthis paper provides the theoretical basis for predicting andcontrolling worm propagation in WSNs It is worth pointingout that we do not consider physical effects like ldquocollisionsrdquoand heterogeneous distribution of nodes on infection ratewhen modeling which is our focus in the future

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work is supported by the National Natural ScienceFoundation of China (61379125) the Natural Science Foun-dation of Shanxi Province (2015011053) Key ConstructionDisciplines of Xinzhou Normal University (ZDXK201204XK201307)

References

[1] S Tang and W Li ldquoQoS supporting and optimal energy allo-cation for a cluster based wireless sensor networkrdquo ComputerCommunications vol 29 no 13-14 pp 2569ndash2577 2006

[2] L H Zhu and H Y Zhao ldquoDynamical analysis and optimalcontrol for a malware propagation model in an informationnetworkrdquo Neurocomputing vol 149 pp 1370ndash1386 2015

[3] S S W Lee P-K Tseng and A Chen ldquoLink weight assignmentand loop-free routing table update for link state routing pro-tocols in energy-aware internetrdquo Future Generation ComputerSystems vol 28 no 2 pp 437ndash445 2012

[4] T Rault A Bouabdallah and Y Challal ldquoEnergy efficiencyin wireless sensor networks a top-down surveyrdquo ComputerNetworks vol 67 pp 104ndash122 2014

[5] M Chiang ldquoBalancing transport and physical layers in wirelessmultihop networks jointly optimal congestion control andpower controlrdquo IEEE Journal on Selected Areas in Communica-tions vol 23 no 1 pp 104ndash116 2005

[6] H Shi W Wang and N Kwok ldquoEnergy dependent divisibleload theory for wireless sensor network workload allocationrdquoMathematical Problems in Engineering vol 2012 Article ID235289 16 pages 2012

[7] J Zhang and H-N Lee ldquoEnergy-efficient utility maximizationfor wireless networks withwithout multipath routingrdquo AEUmdashInternational Journal of Electronics and Communications vol64 no 2 pp 99ndash111 2010

[8] C-Y Chang J-P Sheu Y-C Chen and S-W Chang ldquoAnobstacle-free and power-efficient deployment algorithm forwireless sensor networksrdquo IEEE Transactions on Systems Manand Cybernetics Part A Systems and Humans vol 39 no 4 pp795ndash806 2009

[9] H Chen C K Tse and J Feng ldquoImpact of topology onperformance and energy efficiency in wireless sensor networksfor source extractionrdquo IEEE Transactions on Parallel and Dis-tributed Systems vol 20 no 6 pp 886ndash897 2009

[10] M H Khouzani and S Sarkar ldquoMaximum damage batterydepletion attack in mobile sensor networksrdquo IEEE Transactionson Automatic Control vol 56 no 10 pp 2358ndash2368 2011

[11] P De Y Liu and S K Das ldquoAn epidemic theoretic frameworkfor vulnerability analysis of broadcast protocols in wirelesssensor networksrdquo IEEE Transactions on Mobile Computing vol8 no 3 pp 413ndash425 2009

[12] S Zanero ldquoWirelessmalware propagation a reality checkrdquo IEEESecurity amp Privacy vol 7 no 5 pp 70ndash74 2009

[13] S A Khayam and H Radha ldquoUsing signal processing tech-niques to model worm propagation over wireless sensor net-worksrdquo IEEE Signal Processing Magazine vol 23 no 2 pp 164ndash169 2006

[14] G Yan and S Eidenbenz ldquoModeling propagation dynamics ofbluetooth wormsrdquo IEEE Transactions onMobile Computing vol8 no 3 pp 353ndash367 2009

[15] C C Zou D Towsley and W B Gong ldquoModeling andsimulation study of the propagation and defense of internete-mail wormsrdquo IEEE Transactions on Dependable and SecureComputing vol 4 no 2 pp 105ndash118 2007

[16] B KMishra andD K Saini ldquoSEIRS epidemicmodel with delayfor transmission of malicious objects in computer networkrdquoAppliedMathematics and Computation vol 188 no 2 pp 1476ndash1482 2007

[17] S J Wang Q M Liu X F Yu and Y Ma ldquoBifurcation analysisof a model for network worm propagation with time delayrdquoMathematical and ComputerModelling vol 52 no 3-4 pp 435ndash447 2010

[18] Q Zhu X Yang L-X Yang and C Zhang ldquoOptimal control ofcomputer virus under a delayed modelrdquo Applied Mathematicsand Computation vol 218 no 23 pp 11613ndash11619 2012

[19] L Feng X Liao H Li and Q Han ldquoHopf bifurcation analysisof a delayed viral infection model in computer networksrdquoMathematical and Computer Modelling vol 56 no 7-8 pp 167ndash179 2012

[20] L Feng X Liao Q Han and H Li ldquoDynamical analysisand control strategies on malware propagation modelrdquo AppliedMathematical Modelling vol 37 no 16-17 pp 8225ndash8236 2013

[21] L H Zhu H Y Zhao and X M Wang ldquoBifurcation analysisof a delay reaction-diffusion malware propagation model withfeedback controlrdquo Communications in Nonlinear Science andNumerical Simulation vol 22 no 1ndash3 pp 747ndash768 2015

[22] B K Mishra and N Keshri ldquoMathematical model on thetransmission of worms in wireless sensor networkrdquo AppliedMathematical Modelling vol 37 no 6 pp 4103ndash4111 2013

[23] X M Wang and Y S Li ldquoAn improved SIR model foranalyzing the dynamics of worm propagation in wireless sensornetworksrdquo Chinese Journal of Electronics vol 18 no 1 pp 8ndash122009

[24] D J Daley and J Gani Epidemic Modeling An IntroductionCambridge University Press New York NY USA 1999

8 Mathematical Problems in Engineering

[25] J O Kephart and S R White ldquoMeasuring and modeling com-puter virus prevalencerdquo in Proceedings of the IEEE ComputerSociety Symposium on Security and Privacy pp 2ndash15 May 1993

[26] E A Barbashin Introduction to theTheory of Stability Walters-Noordhoff Groningen The Netherlands 1970

[27] J La Salle and S Lefschetz Stability by LiapunovsDirectMethodAcademic Press New York NY USA 1961

[28] H Yuan and G Q Chen ldquoNetwork virus-epidemic model withthe point-to-group information propagationrdquo Applied Mathe-matics and Computation vol 206 no 1 pp 357ndash367 2008

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Page 3: Research Article Modeling and Stability Analysis of Worm ...downloads.hindawi.com/journals/mpe/2015/129598.pdf · Research Article Modeling and Stability Analysis of Worm Propagation

Mathematical Problems in Engineering 3

From (1) we can get

1198781015840(119905) = 120587119903

2 119878 (119905)

1198712 (2)

According to state transition relationships in Figure 2 themathematical model of worm propagation in WSNs can bederived as follows

119889119878 (119905)

119889119905= 120583119873 minus

1205871199032

1198712120573119878 (119905) 119868 (119905) minus (120583 + 120596) 119878 + 120576119877

119889119868 (119905)

119889119905=1205871199032

1198712120573119878 (119905) 119868 (119905) minus (120583 + 120574) 119868

119889119877 (119905)

119889119905= 120596119878 + 120574119868 minus (120583 + 120576) 119877

(3)

For convenience let

120585 =1205871199032

1198712120573 (4)

Then system (3) can be written as

119889119878

119889119905= 120583119873 minus 120585119878 (119905) 119868 (119905) minus (120583 + 120596) 119878 + 120576119877

119889119868

119889119905= 120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868

119889119877

119889119905= 120596119878 + 120574119868 minus (120583 + 120576) 119877

(5)

3 Stability Analysis of Equilibriums

In this section we will find the equilibriums of system (5) andinvestigate their stability The equilibriums of system (5) aregiven by solutions of

120583119873 minus 120585119878 (119905) 119868 (119905) minus (120583 + 120596) 119878 + 120576119877 = 0

120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 = 0

120596119878 + 120574119868 minus (120583 + 120576) 119877 = 0

(6)

Let 120585119878(119905)119868(119905) minus (120583 + 120574)119868 = 0 (the second equation of (6)) wehave 119868lowast = 0 or 119868lowast gt 0 and 119878lowast = (120583 + 120574)120585 For the case of119868lowast= 0 we have worm-free equilibrium

1198760= (119878lowast

0 119868lowast

0 119877lowast

0) = (

(120583 + 120576)

120583 + 120576 + 120596119873 0

120596119878

120583 + 120576) (7)

For the case of 119868lowast gt 0 we have endemic equilibrium

119876lowast= (119878lowast

1 119868lowast

1 119877lowast

1) = (

120583 + 120574

120585

120585 (120583 + 120576)119873 minus (120583 + 120574) (120583 + 120576 + 120596)

120585 (120583 + 120576 + 120574)120596119878lowast

1+ 120574119868lowast

1

120583 + 120576)

(8)

Let

1198770=

120585 (120583 + 120576)

(120583 + 120574) (120583 + 120576 + 120596)119873 (9)

Notably the endemic equilibrium is meaningful only if 1198770gt

1

31 Worm-Free Equilibrium and Its Stability

Lemma 1 Theworm-free equilibrium is locally asymptoticallystable if 119877

0lt 1 and unstable if 119877

0gt 1

Proof According to 1198760= (((120583 + 120576)(120583 + 120576 + 120596))119873 0 120596119878(120583 +

120576)) the characteristic equation of system (5) at worm-freeequilibrium 119876

0is

det(minus(120583 + 120596) minus 120582 minus120585119878

lowast

0120576

0 120585119878 minus (120583 + 120574) minus 120582 0

120596 120574 (120583 + 120576) minus 120582

)

= 0

(10)

which is equivalent to

[120585119878lowast

0minus (120583 + 120574) minus 120582]

sdot [1205822minus (2120583 + 120576 + 120596) 120582 + 120583

2+ 120576120583 + 120583120596] = 0

(11)

Equation (11) has a characteristic root 1205821= 120585119878lowast

0minus (120583 + 120574) =

(120583 + 120574)(1198770minus 1) and the roots of equation

1205822+ (2120583 + 120576 + 120596) 120582 + 120583

2+ 120576120583 + 120583120596 = 0 (12)

Obviously in accordance with the relationship betweenroots and coefficients of quadratic equation there is nopositive real part characteristic root of (12) Hence when119877

0lt

1 (11) has no positive real root and worm-free equilibrium1198760is locally asymptotically stable When 119877

0gt 1 (11) has a

positive root thus worm-free equilibrium 1198760is an unstable

saddle-point

Furthermore the following theorem holds

Theorem 2 The worm-free equilibrium is globally asymptoti-cally stable if 119877

0le 1

Proof From the first equation of system (5)

119878 (119905) le (120583 + 120576)119873 minus (120583 + 120576 + 120596) 119878 (13)

4 Mathematical Problems in Engineering

Thus 119878(119905) le (120583 + 120576)119873(120583 + 120576 + 120596) + (119878(0) minus (120583 + 120576)(120583 + 120576 +

120596))exp[minus(120583 + 120576 + 120596)119905] When 119905 rarr infin we obtain

119878 (119905) le120583 + 120576

120583 + 120576 + 120596119873 (14)

Consider a Lyapunov function

119871 (119905) = 119864 (119905)

(119905) = 120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)

le [120585120583 + 120596

120583 + 120596 + 120576119873 minus (120583 + 120574)] 119868 (119905)

=1

120583 + 120574(1198770minus 1) 119868 (119905) le 0

(15)

So we prove that worm-free equilibrium 1198760is globally

asymptotically stable

32 Endemic Equilibrium and Its Stability Now we inves-tigate the local stability of endemic equilibrium 119876

lowast Thecharacteristic equation of system (5) at endemic equilibrium119876lowast is

det(minus120585119868lowast

1minus (120583 + 120596) minus 120582 minus120585119878

lowast

1120576

120585119868lowast

1120585119878lowast

1minus (120583 + 120574) minus 120582 0

120596 120574 (120583 + 120576) minus 120582

)

= 0

(16)

which is equivalent to

1205823+ 11990101205822+ 1199011120582 + 1199012= 0 (17)

where 1199010= 3120583 + 120576 + 120596 + ((120583 + 120576)(120583 + 120576 + 120574))119873 119901

1= (120583 +

120576)[2120583 + 120574 + ((120583 + 120576)(120583 + 120576 + 120574))119873] + 120583120596 + 1205852119878lowast

1119868lowast

1 and 119901

2=

120583120585(120583 + 120576)(119868lowast

1minus 119878lowast

1) + 120583(120583 + 120574)(120583 + 120576 + 120596) + 120583120585(120574119868

lowast

1minus 120596119878lowast

1)

Obviously 1199010

gt 0 1199011

gt 0 1199012

gt 0 and 11990101199011minus

1199012gt 0 According to the theorem of Routh-Hurwitz [26 27]

it follows that the roots of (17) have negative real partsTherefore the endemic equilibrium is locally asymptoticallystable

From the above discussion we can summarize the follow-ing conclusion

Lemma 3 If 1198770gt 1 then endemic equilibrium is locally

asymptotically stable

Note that the number of nodes in WSNs is relativelystable that is at time 119905 the number of nodes 119878(119905) 119868(119905) and119877(119905) in states 119878 119868 and 119877 respectively satisfies

119878 (119905) + 119868 (119905) + 119877 (119905) = 119873 (18)Hence the dynamics of system (5) is equivalent to thefollowing system

119889119878 (119905)

119889119905= (120583 + 120596)119873 minus 120585119878 (119905) 119868 (119905) minus (120583 + 120596 + 120576) 119878 (119905)

minus 120576119868 (119905)

119889119868 (119905)

119889119905= 120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)

(19)

Clearly when 1198770gt 1 system (19) has a unique positive

equilibrium 119876lowast(119878lowast

1 119868lowast

1) where

(119878lowast

1 119868lowast

1)

= (120583 + 120574

120585120585 (120583 + 120576)119873 minus (120583 + 120574) (120583 + 120576 + 120596)

120585 (120583 + 120576 + 120574))

(20)

Now we state and prove a result on the global stability of theendemic equilibrium (119878

lowast

1 119868lowast

1) of system (19)

Theorem 4 When 1198770gt 1 the endemic equilibrium (119878

lowast

1 119868lowast

1)

of system (19) is globally asymptotically stable

Proof Consider the following Lyapunov function [28]

119871 (119905) = int

119878

119878lowast

1

119909 minus 119878lowast

1

119909119889119909 + int

119868

119868lowast

1

119909 minus 119868lowast

1

119909119889119909 (21)

The time derivative of 119871(119905) along the solution of system (19)is given by

(119905) = (119878 minus 119878lowast

1

119878) 1198781015840+ (

119868 minus 119868lowast

1

119868) 1198681015840= (1 minus

119878lowast

1

119878)

sdot [(120583 + 120576)119873

minus 120585119878 (119905) 119868 (119905) minus (120583 + 120576 + 120596) 119878 (119905) minus 120576119868 (119905)] + (1

minus119868lowast

1

119868) [120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)] le (1 minus

119878lowast

1

119878)

sdot [(120583 + 120576)119873

minus 120585119878 (119905) 119868 (119905) minus (120583 + 120576 + 120596) 119878 (119905)] + (1 minus119868lowast

1

119868)

sdot [120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)]

= minus (120583 + 120576)119873119878

119878lowast

1

(119878lowast

1

119878minus 1)

2

le 0

(22)

The proof is completed

Remark 5 By Theorem 4 we obtain that 1198770

gt 1 thenendemic equilibrium 119876

lowast of system (5) is globally asymptoti-cally stable

4 Worm Propagation Threshold Analysis andNumerical Simulations

We have proved that the basic reproductive number 1198770

equaling zero is the threshold whether worms are eliminatedWhen 119877

0le 1 worms in WSNs can be eliminated and

system (5) will stabilize at worm-free equilibrium When1198770gt 1 worms in WSNs will exist consistently and system

(5) will stabilize at the endemic equilibrium For verifyingthe correctness of theoretical analysis we perform wormpropagation threshold analyses and numerical simulationsfrom the following two sides

Mathematical Problems in Engineering 5

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(a)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(b)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(c)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(d)

Figure 3 Simulation results of different communication radius of nodes (a) 119903 = 01 (b) 119903 = 03 (c) 119903 = 08 and (d) 119903 = 1

41 Communication Radius of Nodes 119903 Let 1198770= (120585(120583 +

120576)(120583 + 120574)(120583 + 120576 + 120596))119873 = 1 we can get the thresholdof worm propagation about communication radius of nodes119903119888= 119871radic(120583 + 120574)(120583 + 120576 + 120596)120587120573(120583 + 120576)119873 that is when 119903 le 119903

119888

1198770le 1 according to Theorem 2 worms in WSNs can be

eliminated and system (5) will stabilize at the worm-freeequilibrium when 119903 gt 119903

119888 1198770gt 1 according to Remark 5

worms in WSNs will exist consistently and system (5) willstabilize at the endemic equilibrium

We choose a set of simulation parameters as follows119873 =

1000 119871 = 10 120583 = 0001 120573 = 00003 120596 = 0001 120576 = 00003and 120574 = 0002 By calculation we have 119903

119888= 07506 Initial

values of susceptible infected and recovered nodes in WSNs

are 119878(0) = 990 119868(0) = 10 and 119877(0) = 0 When 119903 takesdifferent values simulation results are depicted in Figures3(a)ndash3(d)

When 119903 = 01 lt 119903119888and 119903 = 03 lt 119903

119888 Figures 3(a) and 3(b)

show that system (5) stabilizes at worm-free equilibriumThesimulation results are consistent withTheorem 2

When 119903 = 08 gt 119903119888and 119903 = 1 gt 119903

119888 Figures 3(c) and 3(d)

show that system (5) stabilizes at the endemic equilibriumSimulation results are consistent with Remark 5

42 NodesDistributedDensity120588 Let1198770= (120585(120583+120576)(120583+120574)(120583+

120576 + 120596))119873 = (1205871199032120573(120583 + 120576)(120583 + 120574)(120583 + 120576 + 120596))120588 = 1 we can get

the threshold of worm propagation about node distributed

6 Mathematical Problems in Engineering

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(a)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(b)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(c)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(d)

Figure 4 Simulation results of different nodes density (a) 120588 = 25 (b) 120588 = 16 (c) 120588 = 6944 and (d) 120588 = 10

density 120588119888= (120583 + 120574)(120583 + 120576 + 120596)120587119903

2120573(120583 + 120576) When 120588 lt 120588

119888

1198770le 1 system (5) has only a worm-free equilibrium and is

globally asymptotically stable when 120588 gt 120588119888 1198770gt 1 system

(5) has an endemic equilibrium besides the worm-free equi-librium and endemic equilibrium is globally asymptoticallystable

We choose a set of simulation parameters as follows119873 =

1000 119903 = 1120583 = 0001120573 = 00003120596 = 0001 120576 = 00003 and120574 = 0002 By calculation we get 120588

119888= 56345 Initial values

of system (5) are set as 119878(0) = 990 119868(0) = 10 and 119877(0) = 0When 119871 = 20 25 12 and 10 we can get 120588 = 119873119871

2= 25

16 6944 and 10 Simulation results are depicted in Figures4(a)ndash4(d)

When 120588 = 25 lt 120588119888and 120588 = 16 lt 120588

119888 Figures

4(a) and 4(b) indicate that system (5) stabilizes at the worm-free equilibrium and worm propagation is controlled finallySimulation results are consistent with theoretical analysis

When 120588 = 6944 gt 120588119888and 120588 = 10 gt 120588

119888 Figures 4(c)

and 4(d) show that the trajectories converge to the endemicequilibriumThe conclusions agree with theoretical analysis

5 Conclusions

In this paper we have proposed an improved SIRS modelfor analyzing dynamics of worm propagation in WSNs Thismodel can describe the process of worm propagation with

Mathematical Problems in Engineering 7

the energy consumption and different distributed densityof nodes Based on this model a control parameter 119877

0

that completely determines the global dynamics of wormpropagation has been obtained by the explicit mathematicalanalyses From Theorems 4 and 2 we learn out that wormwill be controlled in WSNs when 119877

0lt 1 and they will

be prevalent otherwise Finally based on 1198770 we discuss the

threshold of worm propagation about communication radiusand distributed densities of nodes inWSNs Numerical simu-lations verify the correctness of theoretical analysis Researchresults show that decreasing the value of communicationradius or reducing distributed density of nodes is an effectivemethod to prevent worms spread in WSNs Research ofthis paper provides the theoretical basis for predicting andcontrolling worm propagation in WSNs It is worth pointingout that we do not consider physical effects like ldquocollisionsrdquoand heterogeneous distribution of nodes on infection ratewhen modeling which is our focus in the future

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work is supported by the National Natural ScienceFoundation of China (61379125) the Natural Science Foun-dation of Shanxi Province (2015011053) Key ConstructionDisciplines of Xinzhou Normal University (ZDXK201204XK201307)

References

[1] S Tang and W Li ldquoQoS supporting and optimal energy allo-cation for a cluster based wireless sensor networkrdquo ComputerCommunications vol 29 no 13-14 pp 2569ndash2577 2006

[2] L H Zhu and H Y Zhao ldquoDynamical analysis and optimalcontrol for a malware propagation model in an informationnetworkrdquo Neurocomputing vol 149 pp 1370ndash1386 2015

[3] S S W Lee P-K Tseng and A Chen ldquoLink weight assignmentand loop-free routing table update for link state routing pro-tocols in energy-aware internetrdquo Future Generation ComputerSystems vol 28 no 2 pp 437ndash445 2012

[4] T Rault A Bouabdallah and Y Challal ldquoEnergy efficiencyin wireless sensor networks a top-down surveyrdquo ComputerNetworks vol 67 pp 104ndash122 2014

[5] M Chiang ldquoBalancing transport and physical layers in wirelessmultihop networks jointly optimal congestion control andpower controlrdquo IEEE Journal on Selected Areas in Communica-tions vol 23 no 1 pp 104ndash116 2005

[6] H Shi W Wang and N Kwok ldquoEnergy dependent divisibleload theory for wireless sensor network workload allocationrdquoMathematical Problems in Engineering vol 2012 Article ID235289 16 pages 2012

[7] J Zhang and H-N Lee ldquoEnergy-efficient utility maximizationfor wireless networks withwithout multipath routingrdquo AEUmdashInternational Journal of Electronics and Communications vol64 no 2 pp 99ndash111 2010

[8] C-Y Chang J-P Sheu Y-C Chen and S-W Chang ldquoAnobstacle-free and power-efficient deployment algorithm forwireless sensor networksrdquo IEEE Transactions on Systems Manand Cybernetics Part A Systems and Humans vol 39 no 4 pp795ndash806 2009

[9] H Chen C K Tse and J Feng ldquoImpact of topology onperformance and energy efficiency in wireless sensor networksfor source extractionrdquo IEEE Transactions on Parallel and Dis-tributed Systems vol 20 no 6 pp 886ndash897 2009

[10] M H Khouzani and S Sarkar ldquoMaximum damage batterydepletion attack in mobile sensor networksrdquo IEEE Transactionson Automatic Control vol 56 no 10 pp 2358ndash2368 2011

[11] P De Y Liu and S K Das ldquoAn epidemic theoretic frameworkfor vulnerability analysis of broadcast protocols in wirelesssensor networksrdquo IEEE Transactions on Mobile Computing vol8 no 3 pp 413ndash425 2009

[12] S Zanero ldquoWirelessmalware propagation a reality checkrdquo IEEESecurity amp Privacy vol 7 no 5 pp 70ndash74 2009

[13] S A Khayam and H Radha ldquoUsing signal processing tech-niques to model worm propagation over wireless sensor net-worksrdquo IEEE Signal Processing Magazine vol 23 no 2 pp 164ndash169 2006

[14] G Yan and S Eidenbenz ldquoModeling propagation dynamics ofbluetooth wormsrdquo IEEE Transactions onMobile Computing vol8 no 3 pp 353ndash367 2009

[15] C C Zou D Towsley and W B Gong ldquoModeling andsimulation study of the propagation and defense of internete-mail wormsrdquo IEEE Transactions on Dependable and SecureComputing vol 4 no 2 pp 105ndash118 2007

[16] B KMishra andD K Saini ldquoSEIRS epidemicmodel with delayfor transmission of malicious objects in computer networkrdquoAppliedMathematics and Computation vol 188 no 2 pp 1476ndash1482 2007

[17] S J Wang Q M Liu X F Yu and Y Ma ldquoBifurcation analysisof a model for network worm propagation with time delayrdquoMathematical and ComputerModelling vol 52 no 3-4 pp 435ndash447 2010

[18] Q Zhu X Yang L-X Yang and C Zhang ldquoOptimal control ofcomputer virus under a delayed modelrdquo Applied Mathematicsand Computation vol 218 no 23 pp 11613ndash11619 2012

[19] L Feng X Liao H Li and Q Han ldquoHopf bifurcation analysisof a delayed viral infection model in computer networksrdquoMathematical and Computer Modelling vol 56 no 7-8 pp 167ndash179 2012

[20] L Feng X Liao Q Han and H Li ldquoDynamical analysisand control strategies on malware propagation modelrdquo AppliedMathematical Modelling vol 37 no 16-17 pp 8225ndash8236 2013

[21] L H Zhu H Y Zhao and X M Wang ldquoBifurcation analysisof a delay reaction-diffusion malware propagation model withfeedback controlrdquo Communications in Nonlinear Science andNumerical Simulation vol 22 no 1ndash3 pp 747ndash768 2015

[22] B K Mishra and N Keshri ldquoMathematical model on thetransmission of worms in wireless sensor networkrdquo AppliedMathematical Modelling vol 37 no 6 pp 4103ndash4111 2013

[23] X M Wang and Y S Li ldquoAn improved SIR model foranalyzing the dynamics of worm propagation in wireless sensornetworksrdquo Chinese Journal of Electronics vol 18 no 1 pp 8ndash122009

[24] D J Daley and J Gani Epidemic Modeling An IntroductionCambridge University Press New York NY USA 1999

8 Mathematical Problems in Engineering

[25] J O Kephart and S R White ldquoMeasuring and modeling com-puter virus prevalencerdquo in Proceedings of the IEEE ComputerSociety Symposium on Security and Privacy pp 2ndash15 May 1993

[26] E A Barbashin Introduction to theTheory of Stability Walters-Noordhoff Groningen The Netherlands 1970

[27] J La Salle and S Lefschetz Stability by LiapunovsDirectMethodAcademic Press New York NY USA 1961

[28] H Yuan and G Q Chen ldquoNetwork virus-epidemic model withthe point-to-group information propagationrdquo Applied Mathe-matics and Computation vol 206 no 1 pp 357ndash367 2008

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Page 4: Research Article Modeling and Stability Analysis of Worm ...downloads.hindawi.com/journals/mpe/2015/129598.pdf · Research Article Modeling and Stability Analysis of Worm Propagation

4 Mathematical Problems in Engineering

Thus 119878(119905) le (120583 + 120576)119873(120583 + 120576 + 120596) + (119878(0) minus (120583 + 120576)(120583 + 120576 +

120596))exp[minus(120583 + 120576 + 120596)119905] When 119905 rarr infin we obtain

119878 (119905) le120583 + 120576

120583 + 120576 + 120596119873 (14)

Consider a Lyapunov function

119871 (119905) = 119864 (119905)

(119905) = 120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)

le [120585120583 + 120596

120583 + 120596 + 120576119873 minus (120583 + 120574)] 119868 (119905)

=1

120583 + 120574(1198770minus 1) 119868 (119905) le 0

(15)

So we prove that worm-free equilibrium 1198760is globally

asymptotically stable

32 Endemic Equilibrium and Its Stability Now we inves-tigate the local stability of endemic equilibrium 119876

lowast Thecharacteristic equation of system (5) at endemic equilibrium119876lowast is

det(minus120585119868lowast

1minus (120583 + 120596) minus 120582 minus120585119878

lowast

1120576

120585119868lowast

1120585119878lowast

1minus (120583 + 120574) minus 120582 0

120596 120574 (120583 + 120576) minus 120582

)

= 0

(16)

which is equivalent to

1205823+ 11990101205822+ 1199011120582 + 1199012= 0 (17)

where 1199010= 3120583 + 120576 + 120596 + ((120583 + 120576)(120583 + 120576 + 120574))119873 119901

1= (120583 +

120576)[2120583 + 120574 + ((120583 + 120576)(120583 + 120576 + 120574))119873] + 120583120596 + 1205852119878lowast

1119868lowast

1 and 119901

2=

120583120585(120583 + 120576)(119868lowast

1minus 119878lowast

1) + 120583(120583 + 120574)(120583 + 120576 + 120596) + 120583120585(120574119868

lowast

1minus 120596119878lowast

1)

Obviously 1199010

gt 0 1199011

gt 0 1199012

gt 0 and 11990101199011minus

1199012gt 0 According to the theorem of Routh-Hurwitz [26 27]

it follows that the roots of (17) have negative real partsTherefore the endemic equilibrium is locally asymptoticallystable

From the above discussion we can summarize the follow-ing conclusion

Lemma 3 If 1198770gt 1 then endemic equilibrium is locally

asymptotically stable

Note that the number of nodes in WSNs is relativelystable that is at time 119905 the number of nodes 119878(119905) 119868(119905) and119877(119905) in states 119878 119868 and 119877 respectively satisfies

119878 (119905) + 119868 (119905) + 119877 (119905) = 119873 (18)Hence the dynamics of system (5) is equivalent to thefollowing system

119889119878 (119905)

119889119905= (120583 + 120596)119873 minus 120585119878 (119905) 119868 (119905) minus (120583 + 120596 + 120576) 119878 (119905)

minus 120576119868 (119905)

119889119868 (119905)

119889119905= 120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)

(19)

Clearly when 1198770gt 1 system (19) has a unique positive

equilibrium 119876lowast(119878lowast

1 119868lowast

1) where

(119878lowast

1 119868lowast

1)

= (120583 + 120574

120585120585 (120583 + 120576)119873 minus (120583 + 120574) (120583 + 120576 + 120596)

120585 (120583 + 120576 + 120574))

(20)

Now we state and prove a result on the global stability of theendemic equilibrium (119878

lowast

1 119868lowast

1) of system (19)

Theorem 4 When 1198770gt 1 the endemic equilibrium (119878

lowast

1 119868lowast

1)

of system (19) is globally asymptotically stable

Proof Consider the following Lyapunov function [28]

119871 (119905) = int

119878

119878lowast

1

119909 minus 119878lowast

1

119909119889119909 + int

119868

119868lowast

1

119909 minus 119868lowast

1

119909119889119909 (21)

The time derivative of 119871(119905) along the solution of system (19)is given by

(119905) = (119878 minus 119878lowast

1

119878) 1198781015840+ (

119868 minus 119868lowast

1

119868) 1198681015840= (1 minus

119878lowast

1

119878)

sdot [(120583 + 120576)119873

minus 120585119878 (119905) 119868 (119905) minus (120583 + 120576 + 120596) 119878 (119905) minus 120576119868 (119905)] + (1

minus119868lowast

1

119868) [120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)] le (1 minus

119878lowast

1

119878)

sdot [(120583 + 120576)119873

minus 120585119878 (119905) 119868 (119905) minus (120583 + 120576 + 120596) 119878 (119905)] + (1 minus119868lowast

1

119868)

sdot [120585119878 (119905) 119868 (119905) minus (120583 + 120574) 119868 (119905)]

= minus (120583 + 120576)119873119878

119878lowast

1

(119878lowast

1

119878minus 1)

2

le 0

(22)

The proof is completed

Remark 5 By Theorem 4 we obtain that 1198770

gt 1 thenendemic equilibrium 119876

lowast of system (5) is globally asymptoti-cally stable

4 Worm Propagation Threshold Analysis andNumerical Simulations

We have proved that the basic reproductive number 1198770

equaling zero is the threshold whether worms are eliminatedWhen 119877

0le 1 worms in WSNs can be eliminated and

system (5) will stabilize at worm-free equilibrium When1198770gt 1 worms in WSNs will exist consistently and system

(5) will stabilize at the endemic equilibrium For verifyingthe correctness of theoretical analysis we perform wormpropagation threshold analyses and numerical simulationsfrom the following two sides

Mathematical Problems in Engineering 5

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(a)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(b)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(c)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(d)

Figure 3 Simulation results of different communication radius of nodes (a) 119903 = 01 (b) 119903 = 03 (c) 119903 = 08 and (d) 119903 = 1

41 Communication Radius of Nodes 119903 Let 1198770= (120585(120583 +

120576)(120583 + 120574)(120583 + 120576 + 120596))119873 = 1 we can get the thresholdof worm propagation about communication radius of nodes119903119888= 119871radic(120583 + 120574)(120583 + 120576 + 120596)120587120573(120583 + 120576)119873 that is when 119903 le 119903

119888

1198770le 1 according to Theorem 2 worms in WSNs can be

eliminated and system (5) will stabilize at the worm-freeequilibrium when 119903 gt 119903

119888 1198770gt 1 according to Remark 5

worms in WSNs will exist consistently and system (5) willstabilize at the endemic equilibrium

We choose a set of simulation parameters as follows119873 =

1000 119871 = 10 120583 = 0001 120573 = 00003 120596 = 0001 120576 = 00003and 120574 = 0002 By calculation we have 119903

119888= 07506 Initial

values of susceptible infected and recovered nodes in WSNs

are 119878(0) = 990 119868(0) = 10 and 119877(0) = 0 When 119903 takesdifferent values simulation results are depicted in Figures3(a)ndash3(d)

When 119903 = 01 lt 119903119888and 119903 = 03 lt 119903

119888 Figures 3(a) and 3(b)

show that system (5) stabilizes at worm-free equilibriumThesimulation results are consistent withTheorem 2

When 119903 = 08 gt 119903119888and 119903 = 1 gt 119903

119888 Figures 3(c) and 3(d)

show that system (5) stabilizes at the endemic equilibriumSimulation results are consistent with Remark 5

42 NodesDistributedDensity120588 Let1198770= (120585(120583+120576)(120583+120574)(120583+

120576 + 120596))119873 = (1205871199032120573(120583 + 120576)(120583 + 120574)(120583 + 120576 + 120596))120588 = 1 we can get

the threshold of worm propagation about node distributed

6 Mathematical Problems in Engineering

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(a)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(b)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(c)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(d)

Figure 4 Simulation results of different nodes density (a) 120588 = 25 (b) 120588 = 16 (c) 120588 = 6944 and (d) 120588 = 10

density 120588119888= (120583 + 120574)(120583 + 120576 + 120596)120587119903

2120573(120583 + 120576) When 120588 lt 120588

119888

1198770le 1 system (5) has only a worm-free equilibrium and is

globally asymptotically stable when 120588 gt 120588119888 1198770gt 1 system

(5) has an endemic equilibrium besides the worm-free equi-librium and endemic equilibrium is globally asymptoticallystable

We choose a set of simulation parameters as follows119873 =

1000 119903 = 1120583 = 0001120573 = 00003120596 = 0001 120576 = 00003 and120574 = 0002 By calculation we get 120588

119888= 56345 Initial values

of system (5) are set as 119878(0) = 990 119868(0) = 10 and 119877(0) = 0When 119871 = 20 25 12 and 10 we can get 120588 = 119873119871

2= 25

16 6944 and 10 Simulation results are depicted in Figures4(a)ndash4(d)

When 120588 = 25 lt 120588119888and 120588 = 16 lt 120588

119888 Figures

4(a) and 4(b) indicate that system (5) stabilizes at the worm-free equilibrium and worm propagation is controlled finallySimulation results are consistent with theoretical analysis

When 120588 = 6944 gt 120588119888and 120588 = 10 gt 120588

119888 Figures 4(c)

and 4(d) show that the trajectories converge to the endemicequilibriumThe conclusions agree with theoretical analysis

5 Conclusions

In this paper we have proposed an improved SIRS modelfor analyzing dynamics of worm propagation in WSNs Thismodel can describe the process of worm propagation with

Mathematical Problems in Engineering 7

the energy consumption and different distributed densityof nodes Based on this model a control parameter 119877

0

that completely determines the global dynamics of wormpropagation has been obtained by the explicit mathematicalanalyses From Theorems 4 and 2 we learn out that wormwill be controlled in WSNs when 119877

0lt 1 and they will

be prevalent otherwise Finally based on 1198770 we discuss the

threshold of worm propagation about communication radiusand distributed densities of nodes inWSNs Numerical simu-lations verify the correctness of theoretical analysis Researchresults show that decreasing the value of communicationradius or reducing distributed density of nodes is an effectivemethod to prevent worms spread in WSNs Research ofthis paper provides the theoretical basis for predicting andcontrolling worm propagation in WSNs It is worth pointingout that we do not consider physical effects like ldquocollisionsrdquoand heterogeneous distribution of nodes on infection ratewhen modeling which is our focus in the future

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work is supported by the National Natural ScienceFoundation of China (61379125) the Natural Science Foun-dation of Shanxi Province (2015011053) Key ConstructionDisciplines of Xinzhou Normal University (ZDXK201204XK201307)

References

[1] S Tang and W Li ldquoQoS supporting and optimal energy allo-cation for a cluster based wireless sensor networkrdquo ComputerCommunications vol 29 no 13-14 pp 2569ndash2577 2006

[2] L H Zhu and H Y Zhao ldquoDynamical analysis and optimalcontrol for a malware propagation model in an informationnetworkrdquo Neurocomputing vol 149 pp 1370ndash1386 2015

[3] S S W Lee P-K Tseng and A Chen ldquoLink weight assignmentand loop-free routing table update for link state routing pro-tocols in energy-aware internetrdquo Future Generation ComputerSystems vol 28 no 2 pp 437ndash445 2012

[4] T Rault A Bouabdallah and Y Challal ldquoEnergy efficiencyin wireless sensor networks a top-down surveyrdquo ComputerNetworks vol 67 pp 104ndash122 2014

[5] M Chiang ldquoBalancing transport and physical layers in wirelessmultihop networks jointly optimal congestion control andpower controlrdquo IEEE Journal on Selected Areas in Communica-tions vol 23 no 1 pp 104ndash116 2005

[6] H Shi W Wang and N Kwok ldquoEnergy dependent divisibleload theory for wireless sensor network workload allocationrdquoMathematical Problems in Engineering vol 2012 Article ID235289 16 pages 2012

[7] J Zhang and H-N Lee ldquoEnergy-efficient utility maximizationfor wireless networks withwithout multipath routingrdquo AEUmdashInternational Journal of Electronics and Communications vol64 no 2 pp 99ndash111 2010

[8] C-Y Chang J-P Sheu Y-C Chen and S-W Chang ldquoAnobstacle-free and power-efficient deployment algorithm forwireless sensor networksrdquo IEEE Transactions on Systems Manand Cybernetics Part A Systems and Humans vol 39 no 4 pp795ndash806 2009

[9] H Chen C K Tse and J Feng ldquoImpact of topology onperformance and energy efficiency in wireless sensor networksfor source extractionrdquo IEEE Transactions on Parallel and Dis-tributed Systems vol 20 no 6 pp 886ndash897 2009

[10] M H Khouzani and S Sarkar ldquoMaximum damage batterydepletion attack in mobile sensor networksrdquo IEEE Transactionson Automatic Control vol 56 no 10 pp 2358ndash2368 2011

[11] P De Y Liu and S K Das ldquoAn epidemic theoretic frameworkfor vulnerability analysis of broadcast protocols in wirelesssensor networksrdquo IEEE Transactions on Mobile Computing vol8 no 3 pp 413ndash425 2009

[12] S Zanero ldquoWirelessmalware propagation a reality checkrdquo IEEESecurity amp Privacy vol 7 no 5 pp 70ndash74 2009

[13] S A Khayam and H Radha ldquoUsing signal processing tech-niques to model worm propagation over wireless sensor net-worksrdquo IEEE Signal Processing Magazine vol 23 no 2 pp 164ndash169 2006

[14] G Yan and S Eidenbenz ldquoModeling propagation dynamics ofbluetooth wormsrdquo IEEE Transactions onMobile Computing vol8 no 3 pp 353ndash367 2009

[15] C C Zou D Towsley and W B Gong ldquoModeling andsimulation study of the propagation and defense of internete-mail wormsrdquo IEEE Transactions on Dependable and SecureComputing vol 4 no 2 pp 105ndash118 2007

[16] B KMishra andD K Saini ldquoSEIRS epidemicmodel with delayfor transmission of malicious objects in computer networkrdquoAppliedMathematics and Computation vol 188 no 2 pp 1476ndash1482 2007

[17] S J Wang Q M Liu X F Yu and Y Ma ldquoBifurcation analysisof a model for network worm propagation with time delayrdquoMathematical and ComputerModelling vol 52 no 3-4 pp 435ndash447 2010

[18] Q Zhu X Yang L-X Yang and C Zhang ldquoOptimal control ofcomputer virus under a delayed modelrdquo Applied Mathematicsand Computation vol 218 no 23 pp 11613ndash11619 2012

[19] L Feng X Liao H Li and Q Han ldquoHopf bifurcation analysisof a delayed viral infection model in computer networksrdquoMathematical and Computer Modelling vol 56 no 7-8 pp 167ndash179 2012

[20] L Feng X Liao Q Han and H Li ldquoDynamical analysisand control strategies on malware propagation modelrdquo AppliedMathematical Modelling vol 37 no 16-17 pp 8225ndash8236 2013

[21] L H Zhu H Y Zhao and X M Wang ldquoBifurcation analysisof a delay reaction-diffusion malware propagation model withfeedback controlrdquo Communications in Nonlinear Science andNumerical Simulation vol 22 no 1ndash3 pp 747ndash768 2015

[22] B K Mishra and N Keshri ldquoMathematical model on thetransmission of worms in wireless sensor networkrdquo AppliedMathematical Modelling vol 37 no 6 pp 4103ndash4111 2013

[23] X M Wang and Y S Li ldquoAn improved SIR model foranalyzing the dynamics of worm propagation in wireless sensornetworksrdquo Chinese Journal of Electronics vol 18 no 1 pp 8ndash122009

[24] D J Daley and J Gani Epidemic Modeling An IntroductionCambridge University Press New York NY USA 1999

8 Mathematical Problems in Engineering

[25] J O Kephart and S R White ldquoMeasuring and modeling com-puter virus prevalencerdquo in Proceedings of the IEEE ComputerSociety Symposium on Security and Privacy pp 2ndash15 May 1993

[26] E A Barbashin Introduction to theTheory of Stability Walters-Noordhoff Groningen The Netherlands 1970

[27] J La Salle and S Lefschetz Stability by LiapunovsDirectMethodAcademic Press New York NY USA 1961

[28] H Yuan and G Q Chen ldquoNetwork virus-epidemic model withthe point-to-group information propagationrdquo Applied Mathe-matics and Computation vol 206 no 1 pp 357ndash367 2008

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Page 5: Research Article Modeling and Stability Analysis of Worm ...downloads.hindawi.com/journals/mpe/2015/129598.pdf · Research Article Modeling and Stability Analysis of Worm Propagation

Mathematical Problems in Engineering 5

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(a)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(b)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(c)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(d)

Figure 3 Simulation results of different communication radius of nodes (a) 119903 = 01 (b) 119903 = 03 (c) 119903 = 08 and (d) 119903 = 1

41 Communication Radius of Nodes 119903 Let 1198770= (120585(120583 +

120576)(120583 + 120574)(120583 + 120576 + 120596))119873 = 1 we can get the thresholdof worm propagation about communication radius of nodes119903119888= 119871radic(120583 + 120574)(120583 + 120576 + 120596)120587120573(120583 + 120576)119873 that is when 119903 le 119903

119888

1198770le 1 according to Theorem 2 worms in WSNs can be

eliminated and system (5) will stabilize at the worm-freeequilibrium when 119903 gt 119903

119888 1198770gt 1 according to Remark 5

worms in WSNs will exist consistently and system (5) willstabilize at the endemic equilibrium

We choose a set of simulation parameters as follows119873 =

1000 119871 = 10 120583 = 0001 120573 = 00003 120596 = 0001 120576 = 00003and 120574 = 0002 By calculation we have 119903

119888= 07506 Initial

values of susceptible infected and recovered nodes in WSNs

are 119878(0) = 990 119868(0) = 10 and 119877(0) = 0 When 119903 takesdifferent values simulation results are depicted in Figures3(a)ndash3(d)

When 119903 = 01 lt 119903119888and 119903 = 03 lt 119903

119888 Figures 3(a) and 3(b)

show that system (5) stabilizes at worm-free equilibriumThesimulation results are consistent withTheorem 2

When 119903 = 08 gt 119903119888and 119903 = 1 gt 119903

119888 Figures 3(c) and 3(d)

show that system (5) stabilizes at the endemic equilibriumSimulation results are consistent with Remark 5

42 NodesDistributedDensity120588 Let1198770= (120585(120583+120576)(120583+120574)(120583+

120576 + 120596))119873 = (1205871199032120573(120583 + 120576)(120583 + 120574)(120583 + 120576 + 120596))120588 = 1 we can get

the threshold of worm propagation about node distributed

6 Mathematical Problems in Engineering

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(a)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(b)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(c)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(d)

Figure 4 Simulation results of different nodes density (a) 120588 = 25 (b) 120588 = 16 (c) 120588 = 6944 and (d) 120588 = 10

density 120588119888= (120583 + 120574)(120583 + 120576 + 120596)120587119903

2120573(120583 + 120576) When 120588 lt 120588

119888

1198770le 1 system (5) has only a worm-free equilibrium and is

globally asymptotically stable when 120588 gt 120588119888 1198770gt 1 system

(5) has an endemic equilibrium besides the worm-free equi-librium and endemic equilibrium is globally asymptoticallystable

We choose a set of simulation parameters as follows119873 =

1000 119903 = 1120583 = 0001120573 = 00003120596 = 0001 120576 = 00003 and120574 = 0002 By calculation we get 120588

119888= 56345 Initial values

of system (5) are set as 119878(0) = 990 119868(0) = 10 and 119877(0) = 0When 119871 = 20 25 12 and 10 we can get 120588 = 119873119871

2= 25

16 6944 and 10 Simulation results are depicted in Figures4(a)ndash4(d)

When 120588 = 25 lt 120588119888and 120588 = 16 lt 120588

119888 Figures

4(a) and 4(b) indicate that system (5) stabilizes at the worm-free equilibrium and worm propagation is controlled finallySimulation results are consistent with theoretical analysis

When 120588 = 6944 gt 120588119888and 120588 = 10 gt 120588

119888 Figures 4(c)

and 4(d) show that the trajectories converge to the endemicequilibriumThe conclusions agree with theoretical analysis

5 Conclusions

In this paper we have proposed an improved SIRS modelfor analyzing dynamics of worm propagation in WSNs Thismodel can describe the process of worm propagation with

Mathematical Problems in Engineering 7

the energy consumption and different distributed densityof nodes Based on this model a control parameter 119877

0

that completely determines the global dynamics of wormpropagation has been obtained by the explicit mathematicalanalyses From Theorems 4 and 2 we learn out that wormwill be controlled in WSNs when 119877

0lt 1 and they will

be prevalent otherwise Finally based on 1198770 we discuss the

threshold of worm propagation about communication radiusand distributed densities of nodes inWSNs Numerical simu-lations verify the correctness of theoretical analysis Researchresults show that decreasing the value of communicationradius or reducing distributed density of nodes is an effectivemethod to prevent worms spread in WSNs Research ofthis paper provides the theoretical basis for predicting andcontrolling worm propagation in WSNs It is worth pointingout that we do not consider physical effects like ldquocollisionsrdquoand heterogeneous distribution of nodes on infection ratewhen modeling which is our focus in the future

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work is supported by the National Natural ScienceFoundation of China (61379125) the Natural Science Foun-dation of Shanxi Province (2015011053) Key ConstructionDisciplines of Xinzhou Normal University (ZDXK201204XK201307)

References

[1] S Tang and W Li ldquoQoS supporting and optimal energy allo-cation for a cluster based wireless sensor networkrdquo ComputerCommunications vol 29 no 13-14 pp 2569ndash2577 2006

[2] L H Zhu and H Y Zhao ldquoDynamical analysis and optimalcontrol for a malware propagation model in an informationnetworkrdquo Neurocomputing vol 149 pp 1370ndash1386 2015

[3] S S W Lee P-K Tseng and A Chen ldquoLink weight assignmentand loop-free routing table update for link state routing pro-tocols in energy-aware internetrdquo Future Generation ComputerSystems vol 28 no 2 pp 437ndash445 2012

[4] T Rault A Bouabdallah and Y Challal ldquoEnergy efficiencyin wireless sensor networks a top-down surveyrdquo ComputerNetworks vol 67 pp 104ndash122 2014

[5] M Chiang ldquoBalancing transport and physical layers in wirelessmultihop networks jointly optimal congestion control andpower controlrdquo IEEE Journal on Selected Areas in Communica-tions vol 23 no 1 pp 104ndash116 2005

[6] H Shi W Wang and N Kwok ldquoEnergy dependent divisibleload theory for wireless sensor network workload allocationrdquoMathematical Problems in Engineering vol 2012 Article ID235289 16 pages 2012

[7] J Zhang and H-N Lee ldquoEnergy-efficient utility maximizationfor wireless networks withwithout multipath routingrdquo AEUmdashInternational Journal of Electronics and Communications vol64 no 2 pp 99ndash111 2010

[8] C-Y Chang J-P Sheu Y-C Chen and S-W Chang ldquoAnobstacle-free and power-efficient deployment algorithm forwireless sensor networksrdquo IEEE Transactions on Systems Manand Cybernetics Part A Systems and Humans vol 39 no 4 pp795ndash806 2009

[9] H Chen C K Tse and J Feng ldquoImpact of topology onperformance and energy efficiency in wireless sensor networksfor source extractionrdquo IEEE Transactions on Parallel and Dis-tributed Systems vol 20 no 6 pp 886ndash897 2009

[10] M H Khouzani and S Sarkar ldquoMaximum damage batterydepletion attack in mobile sensor networksrdquo IEEE Transactionson Automatic Control vol 56 no 10 pp 2358ndash2368 2011

[11] P De Y Liu and S K Das ldquoAn epidemic theoretic frameworkfor vulnerability analysis of broadcast protocols in wirelesssensor networksrdquo IEEE Transactions on Mobile Computing vol8 no 3 pp 413ndash425 2009

[12] S Zanero ldquoWirelessmalware propagation a reality checkrdquo IEEESecurity amp Privacy vol 7 no 5 pp 70ndash74 2009

[13] S A Khayam and H Radha ldquoUsing signal processing tech-niques to model worm propagation over wireless sensor net-worksrdquo IEEE Signal Processing Magazine vol 23 no 2 pp 164ndash169 2006

[14] G Yan and S Eidenbenz ldquoModeling propagation dynamics ofbluetooth wormsrdquo IEEE Transactions onMobile Computing vol8 no 3 pp 353ndash367 2009

[15] C C Zou D Towsley and W B Gong ldquoModeling andsimulation study of the propagation and defense of internete-mail wormsrdquo IEEE Transactions on Dependable and SecureComputing vol 4 no 2 pp 105ndash118 2007

[16] B KMishra andD K Saini ldquoSEIRS epidemicmodel with delayfor transmission of malicious objects in computer networkrdquoAppliedMathematics and Computation vol 188 no 2 pp 1476ndash1482 2007

[17] S J Wang Q M Liu X F Yu and Y Ma ldquoBifurcation analysisof a model for network worm propagation with time delayrdquoMathematical and ComputerModelling vol 52 no 3-4 pp 435ndash447 2010

[18] Q Zhu X Yang L-X Yang and C Zhang ldquoOptimal control ofcomputer virus under a delayed modelrdquo Applied Mathematicsand Computation vol 218 no 23 pp 11613ndash11619 2012

[19] L Feng X Liao H Li and Q Han ldquoHopf bifurcation analysisof a delayed viral infection model in computer networksrdquoMathematical and Computer Modelling vol 56 no 7-8 pp 167ndash179 2012

[20] L Feng X Liao Q Han and H Li ldquoDynamical analysisand control strategies on malware propagation modelrdquo AppliedMathematical Modelling vol 37 no 16-17 pp 8225ndash8236 2013

[21] L H Zhu H Y Zhao and X M Wang ldquoBifurcation analysisof a delay reaction-diffusion malware propagation model withfeedback controlrdquo Communications in Nonlinear Science andNumerical Simulation vol 22 no 1ndash3 pp 747ndash768 2015

[22] B K Mishra and N Keshri ldquoMathematical model on thetransmission of worms in wireless sensor networkrdquo AppliedMathematical Modelling vol 37 no 6 pp 4103ndash4111 2013

[23] X M Wang and Y S Li ldquoAn improved SIR model foranalyzing the dynamics of worm propagation in wireless sensornetworksrdquo Chinese Journal of Electronics vol 18 no 1 pp 8ndash122009

[24] D J Daley and J Gani Epidemic Modeling An IntroductionCambridge University Press New York NY USA 1999

8 Mathematical Problems in Engineering

[25] J O Kephart and S R White ldquoMeasuring and modeling com-puter virus prevalencerdquo in Proceedings of the IEEE ComputerSociety Symposium on Security and Privacy pp 2ndash15 May 1993

[26] E A Barbashin Introduction to theTheory of Stability Walters-Noordhoff Groningen The Netherlands 1970

[27] J La Salle and S Lefschetz Stability by LiapunovsDirectMethodAcademic Press New York NY USA 1961

[28] H Yuan and G Q Chen ldquoNetwork virus-epidemic model withthe point-to-group information propagationrdquo Applied Mathe-matics and Computation vol 206 no 1 pp 357ndash367 2008

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Page 6: Research Article Modeling and Stability Analysis of Worm ...downloads.hindawi.com/journals/mpe/2015/129598.pdf · Research Article Modeling and Stability Analysis of Worm Propagation

6 Mathematical Problems in Engineering

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(a)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(b)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000

Num

ber o

f nod

es

S(t)

I(t)

R(t)

(c)

1000 2000 3000 4000 50000t

0

100

200

300

400

500

600

700

800

900

1000N

umbe

r of n

odes

S(t)

I(t)

R(t)

(d)

Figure 4 Simulation results of different nodes density (a) 120588 = 25 (b) 120588 = 16 (c) 120588 = 6944 and (d) 120588 = 10

density 120588119888= (120583 + 120574)(120583 + 120576 + 120596)120587119903

2120573(120583 + 120576) When 120588 lt 120588

119888

1198770le 1 system (5) has only a worm-free equilibrium and is

globally asymptotically stable when 120588 gt 120588119888 1198770gt 1 system

(5) has an endemic equilibrium besides the worm-free equi-librium and endemic equilibrium is globally asymptoticallystable

We choose a set of simulation parameters as follows119873 =

1000 119903 = 1120583 = 0001120573 = 00003120596 = 0001 120576 = 00003 and120574 = 0002 By calculation we get 120588

119888= 56345 Initial values

of system (5) are set as 119878(0) = 990 119868(0) = 10 and 119877(0) = 0When 119871 = 20 25 12 and 10 we can get 120588 = 119873119871

2= 25

16 6944 and 10 Simulation results are depicted in Figures4(a)ndash4(d)

When 120588 = 25 lt 120588119888and 120588 = 16 lt 120588

119888 Figures

4(a) and 4(b) indicate that system (5) stabilizes at the worm-free equilibrium and worm propagation is controlled finallySimulation results are consistent with theoretical analysis

When 120588 = 6944 gt 120588119888and 120588 = 10 gt 120588

119888 Figures 4(c)

and 4(d) show that the trajectories converge to the endemicequilibriumThe conclusions agree with theoretical analysis

5 Conclusions

In this paper we have proposed an improved SIRS modelfor analyzing dynamics of worm propagation in WSNs Thismodel can describe the process of worm propagation with

Mathematical Problems in Engineering 7

the energy consumption and different distributed densityof nodes Based on this model a control parameter 119877

0

that completely determines the global dynamics of wormpropagation has been obtained by the explicit mathematicalanalyses From Theorems 4 and 2 we learn out that wormwill be controlled in WSNs when 119877

0lt 1 and they will

be prevalent otherwise Finally based on 1198770 we discuss the

threshold of worm propagation about communication radiusand distributed densities of nodes inWSNs Numerical simu-lations verify the correctness of theoretical analysis Researchresults show that decreasing the value of communicationradius or reducing distributed density of nodes is an effectivemethod to prevent worms spread in WSNs Research ofthis paper provides the theoretical basis for predicting andcontrolling worm propagation in WSNs It is worth pointingout that we do not consider physical effects like ldquocollisionsrdquoand heterogeneous distribution of nodes on infection ratewhen modeling which is our focus in the future

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work is supported by the National Natural ScienceFoundation of China (61379125) the Natural Science Foun-dation of Shanxi Province (2015011053) Key ConstructionDisciplines of Xinzhou Normal University (ZDXK201204XK201307)

References

[1] S Tang and W Li ldquoQoS supporting and optimal energy allo-cation for a cluster based wireless sensor networkrdquo ComputerCommunications vol 29 no 13-14 pp 2569ndash2577 2006

[2] L H Zhu and H Y Zhao ldquoDynamical analysis and optimalcontrol for a malware propagation model in an informationnetworkrdquo Neurocomputing vol 149 pp 1370ndash1386 2015

[3] S S W Lee P-K Tseng and A Chen ldquoLink weight assignmentand loop-free routing table update for link state routing pro-tocols in energy-aware internetrdquo Future Generation ComputerSystems vol 28 no 2 pp 437ndash445 2012

[4] T Rault A Bouabdallah and Y Challal ldquoEnergy efficiencyin wireless sensor networks a top-down surveyrdquo ComputerNetworks vol 67 pp 104ndash122 2014

[5] M Chiang ldquoBalancing transport and physical layers in wirelessmultihop networks jointly optimal congestion control andpower controlrdquo IEEE Journal on Selected Areas in Communica-tions vol 23 no 1 pp 104ndash116 2005

[6] H Shi W Wang and N Kwok ldquoEnergy dependent divisibleload theory for wireless sensor network workload allocationrdquoMathematical Problems in Engineering vol 2012 Article ID235289 16 pages 2012

[7] J Zhang and H-N Lee ldquoEnergy-efficient utility maximizationfor wireless networks withwithout multipath routingrdquo AEUmdashInternational Journal of Electronics and Communications vol64 no 2 pp 99ndash111 2010

[8] C-Y Chang J-P Sheu Y-C Chen and S-W Chang ldquoAnobstacle-free and power-efficient deployment algorithm forwireless sensor networksrdquo IEEE Transactions on Systems Manand Cybernetics Part A Systems and Humans vol 39 no 4 pp795ndash806 2009

[9] H Chen C K Tse and J Feng ldquoImpact of topology onperformance and energy efficiency in wireless sensor networksfor source extractionrdquo IEEE Transactions on Parallel and Dis-tributed Systems vol 20 no 6 pp 886ndash897 2009

[10] M H Khouzani and S Sarkar ldquoMaximum damage batterydepletion attack in mobile sensor networksrdquo IEEE Transactionson Automatic Control vol 56 no 10 pp 2358ndash2368 2011

[11] P De Y Liu and S K Das ldquoAn epidemic theoretic frameworkfor vulnerability analysis of broadcast protocols in wirelesssensor networksrdquo IEEE Transactions on Mobile Computing vol8 no 3 pp 413ndash425 2009

[12] S Zanero ldquoWirelessmalware propagation a reality checkrdquo IEEESecurity amp Privacy vol 7 no 5 pp 70ndash74 2009

[13] S A Khayam and H Radha ldquoUsing signal processing tech-niques to model worm propagation over wireless sensor net-worksrdquo IEEE Signal Processing Magazine vol 23 no 2 pp 164ndash169 2006

[14] G Yan and S Eidenbenz ldquoModeling propagation dynamics ofbluetooth wormsrdquo IEEE Transactions onMobile Computing vol8 no 3 pp 353ndash367 2009

[15] C C Zou D Towsley and W B Gong ldquoModeling andsimulation study of the propagation and defense of internete-mail wormsrdquo IEEE Transactions on Dependable and SecureComputing vol 4 no 2 pp 105ndash118 2007

[16] B KMishra andD K Saini ldquoSEIRS epidemicmodel with delayfor transmission of malicious objects in computer networkrdquoAppliedMathematics and Computation vol 188 no 2 pp 1476ndash1482 2007

[17] S J Wang Q M Liu X F Yu and Y Ma ldquoBifurcation analysisof a model for network worm propagation with time delayrdquoMathematical and ComputerModelling vol 52 no 3-4 pp 435ndash447 2010

[18] Q Zhu X Yang L-X Yang and C Zhang ldquoOptimal control ofcomputer virus under a delayed modelrdquo Applied Mathematicsand Computation vol 218 no 23 pp 11613ndash11619 2012

[19] L Feng X Liao H Li and Q Han ldquoHopf bifurcation analysisof a delayed viral infection model in computer networksrdquoMathematical and Computer Modelling vol 56 no 7-8 pp 167ndash179 2012

[20] L Feng X Liao Q Han and H Li ldquoDynamical analysisand control strategies on malware propagation modelrdquo AppliedMathematical Modelling vol 37 no 16-17 pp 8225ndash8236 2013

[21] L H Zhu H Y Zhao and X M Wang ldquoBifurcation analysisof a delay reaction-diffusion malware propagation model withfeedback controlrdquo Communications in Nonlinear Science andNumerical Simulation vol 22 no 1ndash3 pp 747ndash768 2015

[22] B K Mishra and N Keshri ldquoMathematical model on thetransmission of worms in wireless sensor networkrdquo AppliedMathematical Modelling vol 37 no 6 pp 4103ndash4111 2013

[23] X M Wang and Y S Li ldquoAn improved SIR model foranalyzing the dynamics of worm propagation in wireless sensornetworksrdquo Chinese Journal of Electronics vol 18 no 1 pp 8ndash122009

[24] D J Daley and J Gani Epidemic Modeling An IntroductionCambridge University Press New York NY USA 1999

8 Mathematical Problems in Engineering

[25] J O Kephart and S R White ldquoMeasuring and modeling com-puter virus prevalencerdquo in Proceedings of the IEEE ComputerSociety Symposium on Security and Privacy pp 2ndash15 May 1993

[26] E A Barbashin Introduction to theTheory of Stability Walters-Noordhoff Groningen The Netherlands 1970

[27] J La Salle and S Lefschetz Stability by LiapunovsDirectMethodAcademic Press New York NY USA 1961

[28] H Yuan and G Q Chen ldquoNetwork virus-epidemic model withthe point-to-group information propagationrdquo Applied Mathe-matics and Computation vol 206 no 1 pp 357ndash367 2008

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Page 7: Research Article Modeling and Stability Analysis of Worm ...downloads.hindawi.com/journals/mpe/2015/129598.pdf · Research Article Modeling and Stability Analysis of Worm Propagation

Mathematical Problems in Engineering 7

the energy consumption and different distributed densityof nodes Based on this model a control parameter 119877

0

that completely determines the global dynamics of wormpropagation has been obtained by the explicit mathematicalanalyses From Theorems 4 and 2 we learn out that wormwill be controlled in WSNs when 119877

0lt 1 and they will

be prevalent otherwise Finally based on 1198770 we discuss the

threshold of worm propagation about communication radiusand distributed densities of nodes inWSNs Numerical simu-lations verify the correctness of theoretical analysis Researchresults show that decreasing the value of communicationradius or reducing distributed density of nodes is an effectivemethod to prevent worms spread in WSNs Research ofthis paper provides the theoretical basis for predicting andcontrolling worm propagation in WSNs It is worth pointingout that we do not consider physical effects like ldquocollisionsrdquoand heterogeneous distribution of nodes on infection ratewhen modeling which is our focus in the future

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work is supported by the National Natural ScienceFoundation of China (61379125) the Natural Science Foun-dation of Shanxi Province (2015011053) Key ConstructionDisciplines of Xinzhou Normal University (ZDXK201204XK201307)

References

[1] S Tang and W Li ldquoQoS supporting and optimal energy allo-cation for a cluster based wireless sensor networkrdquo ComputerCommunications vol 29 no 13-14 pp 2569ndash2577 2006

[2] L H Zhu and H Y Zhao ldquoDynamical analysis and optimalcontrol for a malware propagation model in an informationnetworkrdquo Neurocomputing vol 149 pp 1370ndash1386 2015

[3] S S W Lee P-K Tseng and A Chen ldquoLink weight assignmentand loop-free routing table update for link state routing pro-tocols in energy-aware internetrdquo Future Generation ComputerSystems vol 28 no 2 pp 437ndash445 2012

[4] T Rault A Bouabdallah and Y Challal ldquoEnergy efficiencyin wireless sensor networks a top-down surveyrdquo ComputerNetworks vol 67 pp 104ndash122 2014

[5] M Chiang ldquoBalancing transport and physical layers in wirelessmultihop networks jointly optimal congestion control andpower controlrdquo IEEE Journal on Selected Areas in Communica-tions vol 23 no 1 pp 104ndash116 2005

[6] H Shi W Wang and N Kwok ldquoEnergy dependent divisibleload theory for wireless sensor network workload allocationrdquoMathematical Problems in Engineering vol 2012 Article ID235289 16 pages 2012

[7] J Zhang and H-N Lee ldquoEnergy-efficient utility maximizationfor wireless networks withwithout multipath routingrdquo AEUmdashInternational Journal of Electronics and Communications vol64 no 2 pp 99ndash111 2010

[8] C-Y Chang J-P Sheu Y-C Chen and S-W Chang ldquoAnobstacle-free and power-efficient deployment algorithm forwireless sensor networksrdquo IEEE Transactions on Systems Manand Cybernetics Part A Systems and Humans vol 39 no 4 pp795ndash806 2009

[9] H Chen C K Tse and J Feng ldquoImpact of topology onperformance and energy efficiency in wireless sensor networksfor source extractionrdquo IEEE Transactions on Parallel and Dis-tributed Systems vol 20 no 6 pp 886ndash897 2009

[10] M H Khouzani and S Sarkar ldquoMaximum damage batterydepletion attack in mobile sensor networksrdquo IEEE Transactionson Automatic Control vol 56 no 10 pp 2358ndash2368 2011

[11] P De Y Liu and S K Das ldquoAn epidemic theoretic frameworkfor vulnerability analysis of broadcast protocols in wirelesssensor networksrdquo IEEE Transactions on Mobile Computing vol8 no 3 pp 413ndash425 2009

[12] S Zanero ldquoWirelessmalware propagation a reality checkrdquo IEEESecurity amp Privacy vol 7 no 5 pp 70ndash74 2009

[13] S A Khayam and H Radha ldquoUsing signal processing tech-niques to model worm propagation over wireless sensor net-worksrdquo IEEE Signal Processing Magazine vol 23 no 2 pp 164ndash169 2006

[14] G Yan and S Eidenbenz ldquoModeling propagation dynamics ofbluetooth wormsrdquo IEEE Transactions onMobile Computing vol8 no 3 pp 353ndash367 2009

[15] C C Zou D Towsley and W B Gong ldquoModeling andsimulation study of the propagation and defense of internete-mail wormsrdquo IEEE Transactions on Dependable and SecureComputing vol 4 no 2 pp 105ndash118 2007

[16] B KMishra andD K Saini ldquoSEIRS epidemicmodel with delayfor transmission of malicious objects in computer networkrdquoAppliedMathematics and Computation vol 188 no 2 pp 1476ndash1482 2007

[17] S J Wang Q M Liu X F Yu and Y Ma ldquoBifurcation analysisof a model for network worm propagation with time delayrdquoMathematical and ComputerModelling vol 52 no 3-4 pp 435ndash447 2010

[18] Q Zhu X Yang L-X Yang and C Zhang ldquoOptimal control ofcomputer virus under a delayed modelrdquo Applied Mathematicsand Computation vol 218 no 23 pp 11613ndash11619 2012

[19] L Feng X Liao H Li and Q Han ldquoHopf bifurcation analysisof a delayed viral infection model in computer networksrdquoMathematical and Computer Modelling vol 56 no 7-8 pp 167ndash179 2012

[20] L Feng X Liao Q Han and H Li ldquoDynamical analysisand control strategies on malware propagation modelrdquo AppliedMathematical Modelling vol 37 no 16-17 pp 8225ndash8236 2013

[21] L H Zhu H Y Zhao and X M Wang ldquoBifurcation analysisof a delay reaction-diffusion malware propagation model withfeedback controlrdquo Communications in Nonlinear Science andNumerical Simulation vol 22 no 1ndash3 pp 747ndash768 2015

[22] B K Mishra and N Keshri ldquoMathematical model on thetransmission of worms in wireless sensor networkrdquo AppliedMathematical Modelling vol 37 no 6 pp 4103ndash4111 2013

[23] X M Wang and Y S Li ldquoAn improved SIR model foranalyzing the dynamics of worm propagation in wireless sensornetworksrdquo Chinese Journal of Electronics vol 18 no 1 pp 8ndash122009

[24] D J Daley and J Gani Epidemic Modeling An IntroductionCambridge University Press New York NY USA 1999

8 Mathematical Problems in Engineering

[25] J O Kephart and S R White ldquoMeasuring and modeling com-puter virus prevalencerdquo in Proceedings of the IEEE ComputerSociety Symposium on Security and Privacy pp 2ndash15 May 1993

[26] E A Barbashin Introduction to theTheory of Stability Walters-Noordhoff Groningen The Netherlands 1970

[27] J La Salle and S Lefschetz Stability by LiapunovsDirectMethodAcademic Press New York NY USA 1961

[28] H Yuan and G Q Chen ldquoNetwork virus-epidemic model withthe point-to-group information propagationrdquo Applied Mathe-matics and Computation vol 206 no 1 pp 357ndash367 2008

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Page 8: Research Article Modeling and Stability Analysis of Worm ...downloads.hindawi.com/journals/mpe/2015/129598.pdf · Research Article Modeling and Stability Analysis of Worm Propagation

8 Mathematical Problems in Engineering

[25] J O Kephart and S R White ldquoMeasuring and modeling com-puter virus prevalencerdquo in Proceedings of the IEEE ComputerSociety Symposium on Security and Privacy pp 2ndash15 May 1993

[26] E A Barbashin Introduction to theTheory of Stability Walters-Noordhoff Groningen The Netherlands 1970

[27] J La Salle and S Lefschetz Stability by LiapunovsDirectMethodAcademic Press New York NY USA 1961

[28] H Yuan and G Q Chen ldquoNetwork virus-epidemic model withthe point-to-group information propagationrdquo Applied Mathe-matics and Computation vol 206 no 1 pp 357ndash367 2008

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of

Page 9: Research Article Modeling and Stability Analysis of Worm ...downloads.hindawi.com/journals/mpe/2015/129598.pdf · Research Article Modeling and Stability Analysis of Worm Propagation

Submit your manuscripts athttpwwwhindawicom

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttpwwwhindawicom

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

CombinatoricsHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014 Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Stochastic AnalysisInternational Journal of