The complexity increase in the software and hardware necessary to support more and more advanced applications for Wireless Sensor Networks conspicuously contribute to render them susceptible to security attacks. The nodes of most complex WSN applications sport desktop-level operating systems and this reliance on software make them ideal prey for traditional threats, like viruses and general malware. To address these problems, in this paper we devise a system for a dedicated mobile node to locate, track, access and cure the infected elements of a WSN, threatened by a proximity malware infection. In parallel, we provide a mathematical formulation for the aforementioned operations. We perform extended simulations, comparing our proposal against classic solutions in different network scenarios and we use the results of the mathematical formulation as a benchmark. Furthermore, we introduce a variation of our proposal, capable to support the concurrent operation of multiple mobile nodes and implement cooperation.

MeDrone: On the use of a medical drone to heal a sensor network infected by a malicious epidemic / Nicola Roberto, Zema; Enrico, Natalizio; Ruggeri, Giuseppe; Michael, Poss; Molinaro, Antonella. - In: AD HOC NETWORKS. - ISSN 1570-8713. - 50:(2016), pp. 115-127. [10.1016/j.adhoc.2016.06.008]

MeDrone: On the use of a medical drone to heal a sensor network infected by a malicious epidemic

RUGGERI, Giuseppe;MOLINARO, Antonella
2016-01-01

Abstract

The complexity increase in the software and hardware necessary to support more and more advanced applications for Wireless Sensor Networks conspicuously contribute to render them susceptible to security attacks. The nodes of most complex WSN applications sport desktop-level operating systems and this reliance on software make them ideal prey for traditional threats, like viruses and general malware. To address these problems, in this paper we devise a system for a dedicated mobile node to locate, track, access and cure the infected elements of a WSN, threatened by a proximity malware infection. In parallel, we provide a mathematical formulation for the aforementioned operations. We perform extended simulations, comparing our proposal against classic solutions in different network scenarios and we use the results of the mathematical formulation as a benchmark. Furthermore, we introduce a variation of our proposal, capable to support the concurrent operation of multiple mobile nodes and implement cooperation.
2016
Networks of autonomous agents, Optimization, Sensor networks
File in questo prodotto:
File Dimensione Formato  
Zema_2016_AdHoc_MeDrone_Editorial.pdf

non disponibili

Descrizione: Editoriale
Tipologia: Versione Editoriale (PDF)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 2.87 MB
Formato Adobe PDF
2.87 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Zema_2016_AdHoc_MeDrone_postprint.pdf

Open Access dal 22/06/2018

Descrizione: Postprint
Tipologia: Documento in Post-print
Licenza: Creative commons
Dimensione 597.54 kB
Formato Adobe PDF
597.54 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12318/859
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 20
  • ???jsp.display-item.citation.isi??? 13
social impact