Abstract

Network attacking using malware has become very popular on the Internet and in many other networks, namely Vehicular Ad-hoc Network (VANET) networks. It is required to have the model describing the malware spreading based on factors, which directly affect this process to limit its influences. In this paper, we propose a mathematical model called SEIR-S (Susceptible–Exposed–Infectious–Recovered–Susceptible) based on the characteristics of the VANET network and the well-known disease-spreading model SIR (Susceptible–Infectious–Recovered). We take into account possible behaviors of malware and provide the corresponding states to vehicles: Susceptible (S), Exposed (E), Infectious (I), Recovered (R). We evaluate the basic reproduction number R0 of the model and perform a stability analysis of the proposed model. The results show that, when R0 < 1, the malware spreading will gradually decrease, and, when R0 > 1, that spreading cannot be extinguished. We also point out the condition that we can control the endemic in the VANET network. In addition, the correctness of the proposed model is verified using both numerical analysis and agent-based simulation on NetLogo.

Highlights

  • Because we focus primarily on building the malware spreading model based on the well-known SIR model and the possible states of a vehicle corresponding to the behavior of malware, we will reuse some results and models built before to describe the characteristics of the Vehicular Ad-hoc Network (VANET) network instead of creating a new link model

  • It is necessary to build a malware spreading model based on the characteristics of each type of network to limit the impact of malware and prevent malware from spreading

  • We proposed a mathematical SEIR-S model with four states: Susceptible (S), Exposed (E), Infectious (I), Recovered (R) to model the malware spreading behavior in VANET

Read more

Summary

VANET Security Challenges

A Vehicular Ad-hoc Network (VANET) is a type of Mobile Ad-hoc Network (MANET). In VANET, the vehicles will be equipped with a signal receiver/transmitter to connect with adjacent vehicles. The black hole attack, known as a packet drop attack, is the first threat in the VANET This kind of attack is related to a malicious node within a network. Malevolent nodes gain control of every traffic that passes through them, endangering the security of data contained within packets or deleting them entirely This attack causes significant network disruption, in networks that utilize on-demand routing protocols, such as Ad-hoc On-demand Distance Vector (AODV) or Dynamic Source Routing (DSR) [12]. Electronics 2021, 10, 2403 primary purpose of the attackers is to deny the legal vehicles and communications from accessing the network This type of attack can control the vehicle resources and jamming the communication channels [18]. Readers can find out more details of security challenges in VANET through the studies in References [13,35,36,37,38,39,40,41,42,43,44,45,46,47,48]

Malware Attacks in VANET
Related Works
SIR Model
Link Characteristics in the VANET Network
Motivation
SEIR-S Model Mathematical Model Formulation
NetLogo Simulation
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call