Advertisement

A CA Model for Mobile Malware Spreading Based on Bluetooth Connections

  • Ángel Martín del Rey
  • Gerardo Rodríguez Sánchez
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 239)

Abstract

There is an unstoppable rise of the number of smartphones worldwide and, as several applications requires an Internet access, these mobile devices are exposed to the malicious effects of malware. Of particular interest is the malware which is propagated using bluetooth connections since it infects devices in its proximity as does biological virus. The main goal of this work is to introduce a new mathematical model to study the spread of a bluetooth mobile malware. Specifically, it is a compartmental model where the mobile devices are classified into four types: susceptibles, carriers, exposed and infectious; its dynamic is governed by means of a couple of two-dimensional cellular automata. Some computer simulations are shown and analyzed in order to determine how a proximity mobile malware might spread under different conditions.

Keywords

Mobile malware Bluetooth Cellular automata SCEIS model Mathematical modeling 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. Comput. Netw. 54(15), 2787–2805 (2010)MATHCrossRefGoogle Scholar
  2. 2.
    Cheng, S.M., Ao, W.C., Chen, P.Y., Chen, K.C.: On Modeling Malware Propagation in Generalized Social Networks. IEEE Commun. Lett. 15(1), 25–27 (2011)CrossRefGoogle Scholar
  3. 3.
    International Data Corporation (IDC), http://www.idc.com/
  4. 4.
    Jackson, J.T., Creese, S.: Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors. IEEE T. Depend. Secure 9(6), 930–943 (2012)CrossRefGoogle Scholar
  5. 5.
    Mickens, J.W., Noble, B.D.: Modeling Epidemic Spreading in Mobile Environments. In: Proc. of the 4th ACM Workshop on Wireless Security, pp. 77–86. ACM Press, NY (2005)CrossRefGoogle Scholar
  6. 6.
    Peng, S., Wang, G., Yu, S.: Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones. J. Comput. System Sci. 79(5), 586–595 (2013)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Ramachandran, K., Sikdar, B.: On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics. In: Proc. of the 2007 IEEE International Conference on Communications, pp. 6169–6174. IEEE Press (2007)Google Scholar
  8. 8.
    Ramachandran, K., Sikdar, B.: Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics. In: Proc. of the 26th IEEE International Conference on Computer Communications, pp. 2516–2520. IEEE Press (2007)Google Scholar
  9. 9.
    Rhodes, C.J., Nekovee, M.: The opportunistic transmission of wireless worms between mobile devices. Physica A 387, 6837–6844 (2008)CrossRefGoogle Scholar
  10. 10.
    Sathyan, J., Anoop, N., Narayan, N., Vallathai, S.K.: A Comprohensive Guide to Enterprise Mobility. CRC Press (2012)Google Scholar
  11. 11.
    Wei, X., Zhao-Hui, L., Zeng-Qiang, C., Zhu-Zhi, Y.: Commwarrior worm propagation model for smart phone networks. J. China U Posts Telecommun. 15(2), 60–66 (2008)CrossRefGoogle Scholar
  12. 12.
    Wolfram, S.: A New Kind of Science. Wolfram Media Inc., Champaign (2002)MATHGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Ángel Martín del Rey
    • 1
  • Gerardo Rodríguez Sánchez
    • 2
  1. 1.Department of Applied MathematicsE.P.S. de Ávila, University of SalamancaÁvilaSpain
  2. 2.Department of Applied MathematicsE.P.S. de Zamora, University of SalamancaZamoraSpain

Personalised recommendations