In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the attacker will not likely select this random multi-hop propagation approach in a mobile sensor network. This is because multi-hop worm route paths to random vulnerable targets can be often breached due to node mobility, leading to failure of fast worm spread under this strategy. Therefore, an appropriate propagation strategy is needed for mobile sensor worms. To meet this need, we discuss a hop-by-hop worm propagation model in mobile sensor networks. In a hop-by-hop worm propagation model, benign nodes are infected by worm in neighbor-to-neighbor spread manner. Since worm infection occurs in hop-by-hop contact, it is not substantially affected by...
Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating s...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
Passive worms are prone to spreading through Peer-to-Peer networks, and they pose a great threat to ...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
Sensor networks are a branch of distributed ad hoc networks with a broad range of applications in su...
Sensor networks are a branch of distributed ad hoc networks with a broad range of applications in su...
Sensor networks are a branch of distributed ad hoc networks with a broad range of applications in su...
Abstract—Worms have become an emergent threat towards information confidentiality, integrity, and se...
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions....
Millions of users world-wide are sharing content using the Peer-to-Peer (P2P) client network. While ...
The network performance of WSNs (Wireless Sensor Networks) can be improved significantly by injectin...
WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks ...
The mobile networks have increasingly facilitated our daily life but are also breeding grounds for m...
This manuscript addresses the security challenges wireless sensor networks (WSNs) face due to their ...
Worms spreading directly between cell-phones over short-range radio (Bluetooth, WiFi, etc.) are incr...
Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating s...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
Passive worms are prone to spreading through Peer-to-Peer networks, and they pose a great threat to ...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
Sensor networks are a branch of distributed ad hoc networks with a broad range of applications in su...
Sensor networks are a branch of distributed ad hoc networks with a broad range of applications in su...
Sensor networks are a branch of distributed ad hoc networks with a broad range of applications in su...
Abstract—Worms have become an emergent threat towards information confidentiality, integrity, and se...
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions....
Millions of users world-wide are sharing content using the Peer-to-Peer (P2P) client network. While ...
The network performance of WSNs (Wireless Sensor Networks) can be improved significantly by injectin...
WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks ...
The mobile networks have increasingly facilitated our daily life but are also breeding grounds for m...
This manuscript addresses the security challenges wireless sensor networks (WSNs) face due to their ...
Worms spreading directly between cell-phones over short-range radio (Bluetooth, WiFi, etc.) are incr...
Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating s...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
Passive worms are prone to spreading through Peer-to-Peer networks, and they pose a great threat to ...