Modeling the Propagation of Wireless Worms among Vehicles

Article Preview

Abstract:

We investigate the problem of a widespread occurrence of an unknown worm in vehicular networks at equilibrium traffic. We introduce an intelligent microscopic mobility and consider the fading effect in channel model; meanwhile we design a new series of rules to imitate the most relevant aspect of medium access control. The extensive Monte Carlo simulations uncovered the impacts of the transmission range (from minimum to maximum), the velocity (from free to congested), and the vehicle density (from sparse to dense) on worm spreading.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 480-481)

Pages:

833-840

Citation:

Online since:

June 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Hypponen, Scientific American Nov, 70 (2006).

Google Scholar

[2] M. Nekovee, New Journal of Physics 9, 189 (2007).

Google Scholar

[3] J. Kleinberg, Nature 449, 287 (2007).

Google Scholar

[4] C.J. Rhodesa and M. Nekovee, Physica A 387, 6837 (2008).

Google Scholar

[5] P. Wang, M. Gonzalez, C. A. Hidalgo and A. -L. Barabási, Science 324, 1071 (2009).

Google Scholar

[6] M. C. González, C. A. Hidalgo and A. -L. Barabási, Nature 435, 779 (2008).

Google Scholar

[7] T. Nagatani, Phys. Lett. A 372, 5887 (2008).

Google Scholar

[8] Y. Hayashi, Physica A 388, 991 (2009).

Google Scholar

[9] L. Ding and Z. H. Guan, Physica A 387, 3008 (2008).

Google Scholar

[10] J. S. Kong and V. P. Roychowdhury, Physica A 387, 3335 (2008).

Google Scholar

[11] S. Qin, G. Z. Dai, L. Wang and M. Fan, Physica A 386, 679 (2007).

Google Scholar

[12] M. Schonhof, A. Kesting, M. Treiber and D. Helbing, Physica A 363, 73 (2006).

Google Scholar

[13] W. Krause, J. Scholz and M. Greiner, Physica A 361, 707 (2006).

Google Scholar

[14] H. Mohammadi, E. N. Oskoee, M. Afsharchi, N. Yazdani and M. Sahimi, International Journal of Modern Physics C 20, 1871 (2009).

DOI: 10.1142/s0129183109014795

Google Scholar

[15] M. B. Hu, R. Jiang, Y. H. Wu, W. X. Wang and Q. S. Wu, European Physical Journal B 63, 127 (2008).

Google Scholar

[16] S. E. Coull and B. K. Szymanski, Computers & Security 28, 637 (2009).

Google Scholar

[17] B. Stephenson and B. Sikdar, IEEE Trans. On Computers 58, 1289 (2009).

Google Scholar

[18] D. Dagon, T. Martin and T. Starner, IEEE Pervasive Computing 3, 11 (2004).

Google Scholar

[19] G. H. Yan and S. Eidenbenz, IEEE Trans. On Mobile Computing 8, 353 (2009).

Google Scholar

[20] S. Tanachaiwiwat and A. Helmy, Ad Hoc Networks 7, 1414 (2009).

Google Scholar

[21] N. Levitt, IEEE Computer 38, 20 (2005).

Google Scholar

[22] D. H. Shih, B. Lin, H. S. Chiang and M. H. Shih, Industrial Management & Data Systems 108, 478 (2008).

Google Scholar

[23] S. Khayam and H. Radha, Analyzing the Spread of Active Worms over VANET, in Proc. ACM Int. Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, p.86–87 (2004).

DOI: 10.1145/1023875.1023889

Google Scholar

[24] M. Nekovee, Modeling the Spread of Worm Epidemics in Vehicular Ad Hoc Networks, in Proc. IEEE Vehicular Technology Conference, Melbourne, Australia, pp.841-845 (2006).

DOI: 10.1109/vetecs.2006.1682943

Google Scholar

[25] M. Treiber, A. Hennecke and D. Helbing. Phys. Rev. E 62, 1805 (2000).

Google Scholar

[26] T. Rappaport, Wireless Communications, Principle and Parctice (Englewood Cliffs, NJ: Prentice-Hall) (2000).

Google Scholar

[27] L. Cheng and R. Shakya, International Journal of Communication Networks and Information Security 2, 50 (2010).

Google Scholar

[28] Z. J. Bao, Y. J. Cao, G. Z. Wang and L. J. Ding, Physics Letters A 373, 3032 (2009).

Google Scholar

[29] J. Wang, Y. H. Liu, Y. Jiao and H. Y. Hu, European Physical Journal B 67, 95 (2009).

Google Scholar

[30] J. Wang, Y. H. Liu, D. X. Tian and D. Wei, Journal of China Universities of Posts and Telecommunications 14, 79 (2007).

Google Scholar

[31] R. Moskovitch, Y. Elovici and L. Rokach, Computational Statistics & Data Analysis 52, 4544 (2008).

DOI: 10.1016/j.csda.2008.01.028

Google Scholar