The complexity increase in the software and hardware necessary to support more and more advanced applications for Wireless Sensor Networks conspicuously contribute to render them susceptible to security attacks. The nodes of most complex WSN applications sport desktop-level operating systems and this reliance on software make them ideal prey for traditional threats, like viruses and general malware. To address these problems, in this paper we devise a system for a dedicated mobile node to locate, track, access and cure the infected elements of a WSN, threatened by a proximity malware infection. In parallel, we provide a mathematical formulation for the aforementioned operations. We perform extended simulations, comparing our proposal against classic solutions in different network scenarios and we use the results of the mathematical formulation as a benchmark. Furthermore, we introduce a variation of our proposal, capable to support the concurrent operation of multiple mobile nodes and implement cooperation.
MeDrone: On the use of a medical drone to heal a sensor network infected by a malicious epidemic / Nicola Roberto, Zema; Enrico, Natalizio; Ruggeri, Giuseppe; Michael, Poss; Molinaro, Antonella. - In: AD HOC NETWORKS. - ISSN 1570-8713. - 50:(2016), pp. 115-127. [10.1016/j.adhoc.2016.06.008]
MeDrone: On the use of a medical drone to heal a sensor network infected by a malicious epidemic
RUGGERI, Giuseppe;MOLINARO, Antonella
2016-01-01
Abstract
The complexity increase in the software and hardware necessary to support more and more advanced applications for Wireless Sensor Networks conspicuously contribute to render them susceptible to security attacks. The nodes of most complex WSN applications sport desktop-level operating systems and this reliance on software make them ideal prey for traditional threats, like viruses and general malware. To address these problems, in this paper we devise a system for a dedicated mobile node to locate, track, access and cure the infected elements of a WSN, threatened by a proximity malware infection. In parallel, we provide a mathematical formulation for the aforementioned operations. We perform extended simulations, comparing our proposal against classic solutions in different network scenarios and we use the results of the mathematical formulation as a benchmark. Furthermore, we introduce a variation of our proposal, capable to support the concurrent operation of multiple mobile nodes and implement cooperation.File | Dimensione | Formato | |
---|---|---|---|
Zema_2016_AdHoc_MeDrone_Editorial.pdf
non disponibili
Descrizione: Editoriale
Tipologia:
Versione Editoriale (PDF)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
2.87 MB
Formato
Adobe PDF
|
2.87 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Zema_2016_AdHoc_MeDrone_postprint.pdf
Open Access dal 22/06/2018
Descrizione: Postprint
Tipologia:
Documento in Post-print
Licenza:
Creative commons
Dimensione
597.54 kB
Formato
Adobe PDF
|
597.54 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.