Keywords

1 Statement and Problem

A wireless sensor network is a wireless network formed by several sensor nodes where each node is capable of computation, communication and sensing. These networks have been widely applied in critical applications such as military, industrial, environmental studies, healthcare or daily life applications, among others [1]. In general, as these applications are deployed in hostile environments without the human supervision it is not difficult for them to be exposed to malicious actions by a third party. Therefore, WSN are highly vulnerable to environmental noise and malicious acts like cyber-attacks [3]. Our goal is to propose an innovative software tool based in a mathematical model to evaluate control strategies and malicious code’s behavior.

Over the last two decades several models have appeared to simulate malware propagation in different stages: computer networks, mobile networks, wireless networks, etc. what has created antecedents for the adaptation of these models to WSN. Similarly, as WSN are usually used in both critical infrastructures and the Internet of Things, where the security requirements are too high, information security is a fundamental issue in WSN; in fact new communication protocols have been implemented with frame ciphers, several studies have been carried out for the detection of false nodes, and the theft or listener data via network.

During this study, we intend to design an agent-based model to simulate malware spreading in WSN. It must include the most important characteristics of a WSN, to design a software tool for simulating malware propagation, creating a scenario like the actual WSN. This tool will allow network administrators to implement security policies taking into account the characteristics of the network (since, for example, a network of volcanic studies does not need to implement the same level of security as a military WSN).

Mathematical models are the basis for the study of malware propagation in a WSN. Then, the theoretical model to be used will be developed as a first instance. Several proposed models [2] are being studied and analyzed to correct their errors and drawbacks in order to adapt it to the characteristics of WSNs. Subsequently, several simulation tests of the proposed model will be carried out, in a controlled virtual environment, with existing tools. At the end of these tests, the possible tools, which will be useful for the development of malware propagation simulation software based on the proposed model, will be analyzed.

2 Preliminary Results and Future Work

The documentation related to WSN is very extensive, which has led to an exhaustive bibliographical revision. It has been found that the same device is often called with several terms that can cause confusion. In addition, it was detected that the mathematical models proposed are very theoretical and, therefore, difficult to apply to reality. The great majority of these models are characterized by the use of systems of ordinary differential equations in order to describe the dynamics, and they do not take into account the individual characteristics of the nodes of the WSN and their local interactions.

As a consequence, we propose the use of an individual-based model to simulate malware spreading in WSNs. Specifically, an agent-based model will be defined. The different classes of nodes of the WSN (sensor nodes, cluster-head nodes, sink nodes, and base stations) will stand for the agents. Their particular characteristics will be considered (energy consumption, computation capabilities, etc.) and the local interactions will be defined by the topologies considered in the network: star topology, mesh topology, star-mesh topology, etc. (see Fig. 1).

Fig. 1.
figure 1

Scheme with the structure of a wireless sensor network.

Each agent will be endowed with a state taking into account their status: susceptible (the agent is not infected by the malware), exposed (the malware has reached the host node but it is in latent status), infected (the malware is active and it is ready to perform its malicious payload), quarantined (the malware has been successfully detected and the infected node is isolated), recovered, etc.

The rules that govern the transition between the states of each agent will be logical rules. These functions update the state of each agent in discrete steps of time, and the variables and parameters involved are the following:

  • Variables: the states of the main agent and their neighbor agents at the previous step of time. Note that the neighbor agents are those adjacent agents to the main one taking into account the topology stablished in the network.

  • Parameters: infection coefficient, recovery coefficient, latent period, immunity period, vaccination coefficient, etc.

Moreover, these rules must consider the life cycle of each sensor node (see Fig. 2).

Fig. 2.
figure 2

Life cycle of a node in a wireless sensor node.

This theoretical model will be computationally implemented to obtain a software for the simulation of malware propagation in WSN networks. In this sense, the agent-based model will be designed using Netlogo (or another software with similar options for agent-based modeling). Finally, it is expected to collect real values for the performance of tests.