Abstract

A wireless sensor network (WSN) is a group of sensors connected with a wireless communications infrastructure designed to monitor and send collected data to the primary server. The WSN is the cornerstone of the Internet of Things (IoT) and Industry 4.0. Robustness is an essential characteristic of WSN that enables reliable functionalities to end customers. However, existing approaches primarily focus on component reliability and malware propagation, while the robustness and security of cascading failures between the physical domain and the information domain are usually ignored. This paper proposes a cross-domain agent-based model to analyze the connectivity robustness of a system in the malware propagation process. The agent characteristics and transition rules are also described in detail. To verify the practicality of the model, three scenarios based on different network topologies are proposed. Finally, the robustness of the scenarios and the topologies are discussed.

Highlights

  • The Key Laboratory on Reliability and Environmental Engineering Technology, School of Reliability and Systems Engineering, Beihang University, Beijing 140191, China

  • The SEIRS-F agent-based model (ABM) proposed in this study considers system characteristics such as the reliability of sensor nodes, malware, topology, environment, and maintenance

  • We compared with an existing model; the results show that there is a significant difference in the robustness of the model considering malware propagation compared to the control model

Read more

Summary

Introduction

The Key Laboratory on Reliability and Environmental Engineering Technology, School of Reliability and Systems Engineering, Beihang University, Beijing 140191, China. The. WSN is the cornerstone of the Internet of Things (IoT) and Industry 4.0. Robustness is an essential characteristic of WSN that enables reliable functionalities to end customers. This paper proposes a cross-domain agent-based model to analyze the connectivity robustness of a system in the malware propagation process. To verify the practicality of the model, three scenarios based on different network topologies are proposed. As a critical driver of the social evolution progress, the Internet has significantly transformed the way things communicate with each other. Aims to promote this stride further to seamlessly connect people and various things, transforming society toward becoming intelligent, convenient, and efficient (ICE) with potentially excessive economic and environmental profits [1,2].

Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.