<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Remedial Pre-Quarantine Perspective to Worm Propagation Defense Modeling for Wireless Sensor Networks Using a Combination of Differential Equation and Agent-Based Approaches</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<title level="a" type="main">A Remedial Pre-Quarantine Perspective to Worm Propagation Defense Modeling for Wireless Sensor Networks Using a Combination of Differential Equation and Agent-Based Approaches</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">E0F46615D8405A5E51C4DF50CA7A6CD4</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T00:54+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Wireless sensors</term>
					<term>Agent-based modeling</term>
					<term>differential equation</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Investigations have shown that recent models that characterize spread of malicious codes have failed to account for certain characteristics of a real network which can be exploited to aid faster containment of worms. Specifically, we identified the absence of uniform random distribution (i.e. sensor deployment) and disease status check for incoming nodes into the sensor field (i.e. access control). Advancing these models (using the epidemic theory) to include these features for Wireless Sensor Networks (WSNs) underpins our research. We would use the differential equation and agent-based modeling paradigms to represent time-related and spatial dynamics of worm propagation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>CCS Concepts</head><p>• Hardware ➝ Communication hardware, interfaces and storage ➝Wireless integrated network sensors Keywords</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">PROBLEM STATEMENT</head><p>The extensive use of WSN and its deployment in harsh unreachable terrains make them easy prey for worm attack. Recent models that didn't account for sensor deployment and control which would constitute our research are SEIRS-V <ref type="bibr" target="#b2">[3]</ref>; SEIQR <ref type="bibr" target="#b1">[2]</ref> and SEIQRS-V <ref type="bibr" target="#b4">[5]</ref>. There is no information on the effects of distribution density and communication range (r) and sensor deployment area types on Exposed, Quarantined and Vaccinated nodes. Figure <ref type="figure">1</ref> shows the range between sensor nodes.</p><p>Although <ref type="bibr" target="#b8">[9]</ref> built a maintenance mechanism that performs "infection check"; their work modeled a closed population with no node inclusion or node loss (due to infection/hardware failure). The model also ignored the possibility that immigrant nodes might carry a worm. So are these models; SEIR <ref type="bibr" target="#b3">[4]</ref> and SEIRS-V [3] etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">RELEVANCY</head><p>Our analyses on uniform random distribution (URD) would inform organizations using WSN on the best way to deploy sensors in order to inhibit faster worm propagation. It would also elicit information on the particular deployment area that encourages the spread of worms thereby impacting sensor deployment decisions.</p><p>Since network access control (NAC) hasn't been settled for WSN, we embark on our study in order to add to what is already in existence using the epidemic theory. It is our hope that adding NAC (through our pre-quarantine mechanism) we can harden the sensor network, prevent worm attacks, and eliminate unauthorized access by illegitimate nodes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">BACKGROUND AND RELATED WORK</head><p>The journey of developing analytical models for disease propagation started with SIR <ref type="bibr" target="#b0">[1]</ref>. Since then other models has been developed to address issues. These models include SIS, SEIR, SEIRS-V, SEIQR, SEIQRS-V etc. Here, technological networks are treated like a dynamical system. Its stages include; model formulation; finding its equilibrium points, deriving the Reproduction number, showing proof of stability; performing simulation experiments. explode2kg@yahoo.com Virginia E. Ejiofor Nnamdi Azikiwe University, Awka. virguche2004@yahoo.com</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">RESEARCH METHODOLOGY</head><p>We would apply the differential equation and agent-based modeling approaches. The equation approach would characterize the temporal parameters while the agent oriented programming would represent spatial parameters existent in a real world sensor network. Our key innovation is the introduction of a pre-quarantine mechanism to check disease status for incoming nodes and to provide remedial measures (NAC).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">PRELIMINARY RESULTS</head><p>Firstly, we produced a survey report on the usage (and weaknesses) of known epidemic models of computer and wireless networks <ref type="bibr" target="#b5">[6]</ref>. Secondly, we highlighted the impact of URD for a circular strip sensor field <ref type="bibr" target="#b6">[7]</ref>. To improve recovery rate of infectious nodes, we applied the pre-quarantine mechanisms in SEIR and SEIRS-V model modifying them to QSEIR and QSEIR-V <ref type="bibr" target="#b7">[8]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">EVALUATION PLAN</head><p>We would compare the simulation experiments of both modeling approaches. Thereafter, we would compare the results of our modified models with results of the original models.</p><p>Using the SEIRS-V model we would also perform comparative analysis with expressions for sensor URD i.e. ( for a circular area <ref type="bibr" target="#b8">[9]</ref> and ⁄ ) for a square area. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">EXPECTED CONTRIBUTION</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.">REFLECTIONS</head><p>Research can arise by finding and applying expressions for other categories of sensor deployment aside the "Fixed, no control" type described with URD. URD can be applied to a multi-group model. Pursuit of other mathematical objectives such as performing global stability analyses can ensue. Providing survey reports for usage of epidemic models in P2P networks would constitute our future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>9.</head></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>CoRI' 16 ,</head><label>16</label><figDesc>Sept 7-9, 2016, Ibadan, Nigeria. Chukwunonso H. Nwokoye Nnamdi Azikiwe University, Awka.</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A Contribution to the Mathematical Theory of Epidemics</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">O</forename><surname>Kermack</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Mckendrick</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proc. R. Soc. A Math. Phys. Eng. Sci</title>
		<imprint>
			<biblScope unit="volume">115</biblScope>
			<biblScope unit="page" from="700" to="721" />
			<date type="published" when="1927">1927</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">SEIQRS model for the transmission of malicious objects in computer network</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Jha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Appl. Math. Model</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="710" to="715" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Mathematical model on the transmission of worms in wireless sensor network</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Keshri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Appl. Math. Model</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="4103" to="4111" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Dynamic model of worms with vertical transmission in computer network</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Pandey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Appl. Math. Comput</title>
		<imprint>
			<biblScope unit="volume">217</biblScope>
			<biblScope unit="page" from="8438" to="8446" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Defending against Malicious Threats in Wireless Sensor Network: A Mathematical Model</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Tyagi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IJIT. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="12" to="19" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A survey of classical SI-based analytical epidemic models for malicious objects&apos; spread in prevailing network environments</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Nwokoye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">E</forename><surname>Ejiofor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">G</forename><surname>Ozoegwu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Comput. Surv. Under review</title>
		<imprint>
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Investigating the Effect of Uniform Random Distribution of Nodes in Wireless Sensor Networks using an Epidemic Worm Model</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Nwokoye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Orji</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Mbeledogu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Umeh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CoRI</title>
		<imprint>
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
	<note>Accepted</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Pre-Quarantine Approach for Defense against Propagation of Malicious Objects in Networks</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Nwokoye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">G</forename><surname>Ozoegwu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">E</forename><surname>Ejiofor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">FESE. Under Review</title>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Analysis of virus spread in wireless sensor networks: An epidemic model</title>
		<author>
			<persName><forename type="first">S</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">L</forename><surname>Mark</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">DRCN</title>
		<imprint>
			<biblScope unit="volume">2009</biblScope>
			<biblScope unit="page" from="86" to="91" />
			<date type="published" when="2009">2009. 2009</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
