Investigating the Effect of Uniform Random Distribution of Nodes in Wireless Sensor Networks using an Epidemic Worm Model ChukwuNonso H. Nwokoye Virginia E. Ejiofor Rita Orji Nnamdi Azikiwe University, Nnamdi Azikiwe University of Waterloo, Awka, Nigeria. University, Awka, Nigeria. Canada. explode2kg@yahoo.com virguche2004@yahoo.com purity.rita@gmail.com Ikechukwu Umeh Njideka N. Mbeledogu Nnamdi Azikiwe University, Nnamdi Azikiwe University, Awka, Nigeria. Awka, Nigeria. ikumeh1@gmail.com njidembeledogu@yahoo.com ABSTRACT Random Deployment; Differential Equations; Stability The emergence of malicious codes that attack Wireless Sensor Networks (WSN) made it necessary to direct research attention 1. INTRODUCTION to security. These attacks arising from worms pose devastating In recent times, Wireless Sensor Networks (WSNs) has enjoyed threats to networks which can lead to substantial losses or considerable use in civilian applications for precision farming damages. However, recent models developed for the purpose of [17] and the provision of smart and quality healthcare. In the understanding worm transmission patterns and ensuring its military, WSNs are used to monitor rebel activities and to detect containment did not account for the effect of uniform random enemy movements etc. It consists of large number of deployment of sensor nodes on the Exposed and the Vaccinated communicating devices which are randomly deployed in compartments. Therefore, in this paper we present a modified unreachable territories without an engineered or predetermined Susceptible–Exposed–Infectious–Recovered–Susceptible with position for the nodes [9], [14]. These territories are basically Vaccination (SEIRS-V) model for worm propagation dynamics unfriendly and unguarded. in sensor networks. Our model applies the expression for uniform distribution deployment of sensor nodes so as to study The sensor nodes are distributed in a sensor field where they are the effect of distribution density and transmission range on the wirelessly connected to the sink. Although they have minimal characterized compartments. Furthermore, we presented battery capacity they are able to monitor and collect data about a solutions for the equilibrium points, the reproduction number given area. The data and information can be territorial and proof of stability. Finally, we employed numerical methods parameters like pressure, position/condition of objects/humans, to solve and simulate with real values the developed system of humidity, temperature etc. The collected data and information differential equations. are sent back to the local sink through transmission between neighboring nodes. This transmission is basically done in a CCS Concepts “multihop infrastructureless” manner. Subsequently, analyses Computer systems organizations Embedded and cyber- are performed on the collated data accessed by a remote user physical systems Sensor networks. • Security and privacy through the internet for suitable decision making. Intrusion/anomaly detection and malware mitigation The constrained nature of sensor resources that gives rise to frail Malware and its mitigation. • Mathematics of computing protective potential makes them suitable prey for self-replicating Mathematical analysis Differential equations Ordinary malevolent codes (such as worms) that spread without human differential equations. • Computing Methodologies involvement. In addition, these worms often tamper with the modeling and simulation Model development and analysis, confidentiality, integrity and availability measures of neighboring sensor nodes due to its distributed nature. Simulation support systems. Keywords With the proliferation of the use of network technologies, Wireless Sensor Network; Worm; Epidemic Model; Uniform increasing efforts have been focused on developing appropriate cyber protection structure in order to secure both stationary and moving information. Wireless Sensor Network research believes that achieving this objective is overly expedient. As a result, several continuous (and discrete) equation-based models that characterize, investigate and aid better comprehension of the CoRI’16, Sept 7–9, 2016, Ibadan, Nigeria. behavioral tendencies of worm variants have been developed. Predictions of worm behavior are largely dependent on the presuppositions of the model characterization and analysis. 58 diagram); b. finding the equilibrium states (for the worm-free 2. RELATED WORKS and the endemic states); and c. deriving the Reproduction It is unarguably true that propagation of malicious agents in number. Subsequent stages include; d. proof of stability and e. cyberspace is similar to the spread of epidemic in the biological simulations experiments using software such as MatLab, Maple world. Therefore, modeling and analysis enhance optimized etc. containment by providing better understanding of the factors that aid faster propagation of malicious codes in networks. The During model formulation, the analyst presents the equations Susceptible-Infectious-Recovered (SIR) model by [5], [4] and that represent a real world phenomenon (in this case worm [6] initiated the journey into developing mathematical models propagation in WSNs). Some authors also present a conceptual for worm/virus propagation. Building on the SIR model, other (or schematic) diagram at this point. Next, the analyst will extensions such as Susceptible-Exposed-Infectious-Recovered derive the equilibrium points by equating the model (or system (SIER) [13], [12], Susceptible-Exposed-Infectious-Vaccinated of differential equation) to zero. The Reproduction number is (SIEV) [11], Susceptible-Exposed-Infectious–Recovered- then derived to establish a threshold for disease/infection Vaccinated (SEIR-V) [9] etc., were developed to address several extinction in the network. Furthermore, stability analyses (using concerns arising in a real world network environment. several renowned methods in literature) and simulation experiments are performed. The simulations experiments are In this paper we modify the Susceptible–Exposed–Infectious– more like sensitivity analyses. They are done by first solving the Recovered–Susceptible with a Vaccination compartment proposed model using a numerical method and applying real (SEIRS-V) epidemic model of [9] by applying [15] expression values for the simulation. Depending on the modeler’s intention for uniform random distribution of sensor nodes with the aim of the method can take different turns for analyses. But stages such investigating the effect of both distribution density (σ) and as model formulation and simulation experiments are transmission range ( ) on the characterized compartments. We significantly part of this methodology. discovered that though [15] represented distribution density and transmission range their SIR model did not include analyses for 3.1 The Modified SEIRS-V Model the Exposed and the Vaccinated compartments. On the other We characterize worm attack in wireless sensor network using hand, though [9] included these two compartments their the Susceptible–Exposed–Infectious–Recovered–Susceptible analyses did not involve distribution density and transmission with a Vaccination compartment (SEIRS-V). Our assumptions range. Wang and Yang [16] also applied Tang and Mark’s include addition of nodes in the network and removal (i.e. death) formulation but their model used the Susceptible-Infectious (SI) of nodes as a result of worm attack or due to hardware/software compartments for their analyses; and didn’t discuss the Exposed failure. All sensor nodes are susceptible to potential of worm and Vaccinated compartments. Considering the argument by [3] attack and with time (probably) get infected (i.e. forming nodes that standard incidence “presents a more reasonable and in the Infectious compartment). Some sensor nodes before practical scenario of contact than the simple mass action becoming infectious exists in the Exposed stage where the worm incidence”, we would modify the above model using the former. is latent and the nodes cannot transmit the infection. A symptom of this stage is slower data transmission for affected nodes. In epidemiology, the Exposed class contains nodes that are However, due to the existence of several worm variants in infected but not infectious. These nodes which are in a latent cyberspace the sensor nodes never acquire a permanent phase possess different infectivity rate when compared to the immunity i.e. they become susceptible to worm infection with Infectious nodes. Common symptom for nodes in this latent time. stage is slow data transmission speed [9]. On the hand, The total population N (t) represents the nodes in the Wireless vaccination (or immunization) is a known countermeasure in Sensor Network which is subdivided into Susceptible, Exposed epidemiology. It is aimed at fortifying a fraction of the total (latent), Infectious (contagious), Recovered (temporarily sensor node population prior to the outset of an epidemic. This immune), Vaccinated (immunized) denoted by S( t), E(t), I(t), study is necessary since there is a strong likelihood that sensor R(t) and V(t). This implies that S (t) + E (t) + I (t) + R (t) + V nodes can exist in the latent stage and that network managers (t) = N (t). can employ vaccination strategies to ensure security. In addition, Specifically, the sensor nodes are uniformly and randomly the analyses of distribution density and transmission range using deployed with a distribution density of σ and a transmission worm models can positively impact sensor deployment activities range of , this implies that the effective contact with an for institutions. infected node for transfer of infection is in the order of . Other parameters include which is the inclusion rate of nodes 3. METHODOLOGY into the sensor network population, is the Infectivity contact In this study, we basically perform modeling and simulation. rate, is the mortality or the death rate of nodes due to hardware Specifically, we employ a widely applied method for or software failure, is the crashing rate due to attack of investigating network epidemic [10], [9] and [11] etc. This malicious objects (in this case worm), is the rate at which method is called modeling and analysis of dynamical systems. exposed nodes become infectious, is the recovery rate, is the Here, the WSN is treated like a dynamical system and rate at which recovered nodes become susceptible to infection, equilibrium positions are studied. The methodology starts with; is the rate of vaccination for susceptible sensor nodes and is a. model formulation (and optionally drawing the schematic the rate of transmission from the Vaccinated compartment to the Susceptible compartment. 59 𝝆𝑺 and Endemic equilibrium =( , , , , ) i.e. ( )( ) 𝝃V 𝝇𝝅𝒓𝟐𝟎 ( )( )( ( )( )( ) ) 𝜷𝑺𝑰 𝜽𝑬 𝝂𝑰 ( ) 𝝀 𝑵 R = S E I V ( ) ( ) ( )( ) ( )( )( ) ( )( ) ( ) (3) ( ) ( ) ( )( ) 𝝉 𝝉+𝝎 𝝉 ( )( )( ) 𝝉 𝝉 ( ( ) ) 𝝋𝑹 ( ) ( ) ( )( ) Figure 1. Schematic diagram for the flow of worms in sensor network ( )( ) ( ) The schematic diagram for the dynamical transmission of worms A cursory look at the symbolic solutions of the endemic in a Wireless Sensor Network given our assumption is depicted equilibrium in [9] shows the differences. It is observed here that in Fig. 1. The system of differential equation (1) is adapted from the expression for uniform distribution deployment formed part [9] but modified to capture distribution density and transmission of the solutions; this is absent in the solutions of [9]. range. 3.3 The Basic Reproduction Number The modified SEIRS-V model is represented using the following The Reproduction number commonly denoted as is a system of differential equations; threshold quantity defined as “the expected number of secondary cases produced in a completely susceptible population, by a typical infective individual” [1] or the spectral radius which can also be referred to as the “dominant eigenvalue of the matrix G ( ) = FV-1” [2], [9]. Some authors also refer to it as the inverse of the susceptible ( ) at the endemic equilibrium [10]. The Reproduction number ( ) is . ( ) (1) ( )( ) (4) ( ) In this study, the Reproduction number is different from what was obtained in [15] and [9] . Our Reproduction number can be used to determine the possible contained/endemic dynamics of ( ) worm propagation in WSNs considering distribution density and transmission range. 3.2 Solutions of Equilibrium Points We equate the modified system of differential equations (1) to 3.4 Stability of the Worm-free zero i.e. Equilibrium point ; to obtain two We show the proof of local asymptotic stability at the Worm- solutions which are the Worm-free equilibrium and the Endemic free Equilibrium using the jacobian method. This is done by equilibrium points. The Worm-free equilibrium describes the showing that “the eigen-values of the jacobian matrix all have absence of worms while the Endemic equilibrium describes the negative real parts” [9] or that the “characteristic equation of the presence of worms in the Wireless Sensor Network using jacobian matrix” derived from the system of equations has formulated mathematical model. negative roots [8]. The solutions of equilibrium points are Worm-free equilibrium Theorem: The worm-free equilibrium is locally asymptotically ( ) i.e. stable if < 1 and unstable if > 1. ( ) ( ) Proof: Using - the characteristic equation of system (1) at worm-free equilibrium is (2) ( ) 60 ( ) –( ) ( ) | ( ) | –( ) ( ) det = 0 (5) –( ) | –( ) | –( ) which equates to; ( )( )( )(( )( ) ) . (6) The roots of the characteristic equation all have negative real parts i.e. – , , ( √( ) ) ( √( ) ); Therefore the worm free equilibrium is locally asymptotically stable. 4. NUMERICAL RESULTS AND DISCUSSION We solved the system of differential equation using a numerical Figure 3. Dynamical behaviour of the system for different method i.e. Runge-Kutta Fehlberg method of order 4 and 5. compartments of the equivalent model Subsequently we performed simulation experiments using this Source: [9] following initial values for the Wireless Sensor network: S=100; E=3; I=1; R=0; V=0. Other values used for the simulation Figure 4 shows the dynamical behavior of the Exposed include =0.33; =0.003; =0.07; =0.25 =0.4; compartment with respect to changes in the distribution density =0.3; =0.3 =0.06; adapted from the time history of [9]. We and transmission range. At 0.5 and 2.0 for density and range compared our results with the results of similar models in respectively depicted with red, there was still an increase in the literature for the purposes of verification and validation. number of Exposed sensor nodes even though the range was kept constant (like in first response depicted with green). The Figure 2 shows the time history of the compartments used for effect of both density and range was again evident in the third the analyses. Note that the transient response of Figure 2 response (0.7 and 2.5 for density and range respectively) simulated with values for distribution density and transmission depicted with blue when compared with the first response where range differs from the time history of [9]. For the sake of clarity 0.3 and 2.0 for density and range respectively. and ambiguity reduction we prepared the simulation experiment of Figure 2 using the same colors used in Figure 3. It is evident Exposed Nodes against Time 90 that our model showed increase in both the Exposed and density = 0.3, range =2 80 Infected compartments and a reduction in both the Susceptible density = 0.5, range =2 density = 0.7, range =2.5 70 and Vaccinated compartments. 60 Exposed Nodes 50 40 Popluation of Compartments against Time 100 30 Susceptible Population of Compartments S, E, I, R,V 20 Exposed 80 Infected 10 Recovered E Vaccinated 0 0 10 20 30 40 50 60 70 80 90 100 60 Time in Minutes I R 40 V S Figure 4. Dynamical behaviour of Exposed Compartment 20 versus Time w.r.t. to σ and Figure 5 shows the dynamical behavior of the Infectious 0 0 10 20 30 40 50 60 70 80 90 100 compartment with respect to changes in the distribution density Time in Minutes and transmission range. At 0.5 and 2.0 for density and range respectively depicted with red, there was still an increase in the Figure 2. Dynamical behaviour of the system for different number of Infectious sensor nodes even though the range was compartments of the modified model kept constant (like in the first response depicted with green). 61 The effect of both density and range was again evident in the Graph of Susceptible Nodes Plotted against Vaccinated Nodes 100 third response (i.e. 0.7 and 2.5 for density and range density=0.3, range=2.0 0 90 respectively) depicted with blue when compared with the first density=0.5, range=2.0 0 response where 0.3 and 2.0 for density and range respectively. 80 density=0.5, range=2.5 0 Susceptible Sensor Nodes 70 Infectious Sensor Nodes against Time 60 30 50 density = 0.3, range = 2.0 density = 0.5, range = 2.0 40 25 density = 0.7, range = 2.5 30 Infectious Sensor Nodes 20 20 10 15 0 0 5 10 15 20 25 10 Vaccinated Sensor Nodes 5 Figure 7. Dynamical behaviour of Susceptible Compartment 0 versus Vaccinated Compartment w.r.t. to σ and 0 50 100 150 Time in Minutes Figure 5. Dynamical behaviour of Infectious Compartment versus Time w.r.t. to σ and Figure 6 shows the dynamical behavior of the Infectious compartment plotted against the Exposed compartment with respect to changes in the distribution density and transmission range. This figure showed how both the Exposed and Infectious compartments increased with increase in density and transmission range. The increase was observed when density was kept constant (at 0.5) and when range was kept constant (at Figure 7a. Dynamical behaviour of Susceptible 0.2). The difference between the Exposed and Infectious sensor Compartment versus Vaccinated Compartment of the nodes is in line with the real world because even though both equivalent model as adapted from [9] have contacted the infection, only the Infectious sensor nodes can transmit the infection to susceptible nodes. From our simulation experiments we noticed that at transmission Graph of Infectious Nodes Plotted against Exposed Nodes range of 1 and density of 0.3 depicted in Figure 8 the dynamical 30 density=0.3,range=2.0 0 responses were close to Figure 3 of [9] for the Exposed and density=0.5,range=2.0 0 Vaccinated compartments. Increasing the range to 2 (as evident 25 density=0.5,range=2.5 0 in Figure 2) visibly changed the behavior of the compartments (most especially Exposed and the Vaccinated). The Exposed Infectious Sensor Nodes 20 nodes moved from above 30 nodes to above sixty nodes while 15 Vaccinated nodes reduced to slightly above 20 nodes from above 40 nodes. 10 Poplation CompartmentsS,E, I, R, V against Time 100 5 Susceptible 90 Exposed Infectious Population Compartments S, E, I, R, V 80 0 Recovered 0 10 20 30 40 50 60 70 80 Vaccinated 70 Exposed Sensor Nodes 60 Figure 6. Dynamical behaviour of Infectious Compartment 50 V E versus Exposed Compartment w.r.t. to σ and 40 R 30 I S Figure 7 shows the dynamical behavior of the Susceptible 20 compartment plotted against the Vaccinated compartment with 10 respect to changes in the distribution density and transmission 0 0 10 20 30 40 50 60 70 80 90 100 range. This figure showed a decrease in both the Susceptible and Time in Minutes the Vaccinated compartments. The decrease was observed when density was kept constant (at 0.5) and when range was kept Figure 8. Dynamical behaviour of Infectious Compartment constant (at 0.2); this is clearly visible when compared to Figure versus Exposed Compartment w.r.t. to σ=0.3 and =1 7a. 62 5. CONCLUSION AND FUTURE [5] Kermack, W. O. and McKendrick, A. G. 1927. A contribution to the mathematical theory of epidemics. DIRECTION Proceedings of the Royal Society of London A: In this study, we discovered that the increase in density and mathematical, physical and engineering sciences, The transmission range increased the Exposed and Infectious Royal Society, 700–721. compartments and decreased and Vaccinated compartments. [6] Kermack, W. O. and McKendrick, A. G. 1933. This study is consistent with [15] and [16] that employed similar Contributions to the mathematical theory of epidemics. III. expression for uniform random distribution i.e. the increase in Further studies of the problem of endemicity. Proceedings the number of Infectious sensor nodes with the increase in both of the Royal Society of London. Series A, Containing the node density and communication range. Papers of a Mathematical and Physical Character 141, 843: 94–122. Due to the effect of uniform random distribution on Vaccinated [7] Li, M. Y. and Muldowney, J. S. 1996. A Geometric sensor nodes, it is only wise that the rate at which nodes are Approach to Global-Stability Problems. SIAM Journal on immunized is increased as density and range increase in order to Mathematical Analysis 27, 1070–1083. reduce high susceptibility to infection. In future we would focus http://doi.org/10.1137/S0036141094266449 our analyses on how to achieve increased vaccination rate for [8] Mishra, B. K. and Singh, A. 2010. Global Stability of vulnerable sensor nodes (to ensure reduced susceptibility to Worms in Computer Network Bimal Kumar Mishra Aditya infection) in the light of increased density and increased Kumar Singh. Applications and Applied Mathematics An communication/transmission range. International Journal 05, 10: 1511–1528. [9] Mishra, B. K. and Keshri, N. 2013. Mathematical model on Furthermore, we would also perform analysis and simulation the transmission of worms in wireless sensor network. experiments to observe the effect of uniform random distribution Applied Mathematical Modelling 37, 6: 4103–4111. on Quarantine models. In addition, pursuit of other mathematical http://doi.org/10.1016/j.apm.2012.09.025 objectives such as extending analyses to the global stability at [10] Mishra, B. K. and Pandey, S. K. 2011. Dynamic model of the endemic equilibrium using the geometrical approach of [7] worms with vertical transmission in computer network. etc. can ensue; since the symbolic solutions at the endemic Applied Mathematics and Computation 217, 21: 8438– equilibrium have been provided by this study. To creatively 8446. http://doi.org/10.1016/j.amc.2011.03.041 protect the interchange of data and information the generalized [11] Mishra, B. K. and Pandey, S. K. 2014. Dynamic model of form of the analytical model (that characterizes other worm worm propagation in computer network. Applied variants) will be integrated into the cyberspace defense structure Mathematical Modelling 38, 7–8: 2173–2179. of organization(s) that use Wireless Sensor Networks for http://doi.org/http://dx.doi.org/10.1016/j.apm.2013.10.046 monitoring rebel activities, detecting enemy movements, and [12] Mishra, B. K. and Saini, D. K. 2007. SEIRS epidemic providing smart healthcare etc. model with delay for transmission of malicious objects in computer network. Applied Mathematics and Computation 188, 2: 1476–1482. 6. REFERENCES http://doi.org/10.1016/j.amc.2006.11.012 [1] Diekmann, O., Heesterbeek, J. A P and Metz, J. A J. 1990. [13] Mishra, B. K. and Saini, D. K. 2007. Mathematical models On the definition and the computation of the basic on computer viruses. Applied Mathematics and reproduction ratio R0 in models for infectious diseases in Computation 187, 2: 929–936. heterogeneous populations. Journal of Mathematical http://doi.org/10.1016/j.amc.2006.09.062 Biology 28, 4: 365–382. [14] 14. Mishra, B. K. and Tyagi, I. 2014. Defending against http://doi.org/10.1007/BF00178324 Malicious Threats in Wireless Sensor Network: A [2] Driessche , P. V. D. and Watmough, J. 2002. Reproduction Mathematical Model. International Journal of Information numbers and sub-threshold endemic equilibria for Technology and Computer Science 6, 3: 12–19. compartmental models of disease transmission. http://doi.org/10.5815/ijitcs.2014.03.02 Mathematical Biosciences 180: 29–48. [15] Tang, S. and Mark, B. L.. 2009. Analysis of virus spread in http://doi.org/10.1016/S0025-5564(02)00108-6 wireless sensor networks: An epidemic model. Proceedings [3] Hethcote, H., Zhien, M. and Shengbing, L . 2002. Effects of the 2009 7th International Workshop on the Design of of quarantine in six endemic models for infectious diseases. Reliable Communication Networks, DRCN 2009: 86–91. Mathematical Biosciences 180, 1: 141–160. http://doi.org/10.1109/DRCN.2009.5340022 http://doi.org/10.1016/S0025-5564(02)00111-6 [16] Wang, Y. and Yang, X. 2013. Virus spreading in wireless [4] Kermack, W. O. and McKendrick, A. G. 1932. sensor networks with a medium access control mechanism. Contributions to the mathematical theory of epidemics. ii. Chinese Physics B 22, 4: 040206. the problem of endemicity. Proceedings of the Royal http://doi.org/10.1088/1674-1056/22/4/040206 Society of London. Series A. v138 i834: 55–83. 63