Loading [MathJax]/jax/output/SVG/jax.js
Theory article

Stochastic model of economic cycles and its econometric application

  • In this paper, I demonstrate the adequacy of economic systems to the basic provisions of synergetics, which makes the latter eligible for macroeconomic analysis. In justifying this statement, a synergetic approach to the development of a model of economic cycles was considered. The novelty of this model was related to the probabilistic description of the investment function and the perception of the economic system as a material object with certain properties. According to the model, the income oscillations are induced by both exogenous (investment fluctuations) and endogenous (system elasticity) causes. The cycle's amplitudes correlate with the intensity of investment fluctuations as well as the efficiency of the economic system. The duration of the economic cycle is determined by the inclusive wealth of the system and its dynamic factor, which characterizes the ability of the system to withstand investment fluctuations and eliminates their consequences. Thus, the economic cycle is interpreted as the "natural noise" accompanying the functioning of market economics.

    The proposed model creates a mathematical basis for the numerical analysis of empirical economic data. An example of possible econometric applications of the model was considered using the current cyclic contraction in US incomes.

    Citation: Karmalita Viacheslav. Stochastic model of economic cycles and its econometric application[J]. Data Science in Finance and Economics, 2024, 4(4): 615-628. doi: 10.3934/DSFE.2024026

    Related Papers:

    [1] Tingting Yang, Yi He . Design of intelligent robots for tourism management service based on green computing. Mathematical Biosciences and Engineering, 2023, 20(3): 4798-4815. doi: 10.3934/mbe.2023222
    [2] Fengyong Li, Gang Zhou, Jingsheng Lei . Reliable data transmission in wireless sensor networks with data decomposition and ensemble recovery. Mathematical Biosciences and Engineering, 2019, 16(5): 4526-4545. doi: 10.3934/mbe.2019226
    [3] Xiaonan Chen, Suxia Zhang . An SEIR model for information propagation with a hot search effect in complex networks. Mathematical Biosciences and Engineering, 2023, 20(1): 1251-1273. doi: 10.3934/mbe.2023057
    [4] Liang Tian, Fengjun Shang, Chenquan Gan . Optimal control analysis of malware propagation in cloud environments. Mathematical Biosciences and Engineering, 2023, 20(8): 14502-14517. doi: 10.3934/mbe.2023649
    [5] Hao Yuan, Qiang Chen, Hongbing Li, Die Zeng, Tianwen Wu, Yuning Wang, Wei Zhang . Improved beluga whale optimization algorithm based cluster routing in wireless sensor networks. Mathematical Biosciences and Engineering, 2024, 21(3): 4587-4625. doi: 10.3934/mbe.2024202
    [6] Xiao Wang, Jianbiao Zhang, Ai Zhang, Jinchang Ren . TKRD: Trusted kernel rootkit detection for cybersecurity of VMs based on machine learning and memory forensic analysis. Mathematical Biosciences and Engineering, 2019, 16(4): 2650-2667. doi: 10.3934/mbe.2019132
    [7] Zhonghua Lu, Min Tian, Jie Zhou, Xiang Liu . Enhancing sensor duty cycle in environmental wireless sensor networks using Quantum Evolutionary Golden Jackal Optimization Algorithm. Mathematical Biosciences and Engineering, 2023, 20(7): 12298-12319. doi: 10.3934/mbe.2023547
    [8] Noman Zahid, Ali Hassan Sodhro, Usman Rauf Kamboh, Ahmed Alkhayyat, Lei Wang . AI-driven adaptive reliable and sustainable approach for internet of things enabled healthcare system. Mathematical Biosciences and Engineering, 2022, 19(4): 3953-3971. doi: 10.3934/mbe.2022182
    [9] Haitao Huang, Min Tian, Jie Zhou, Xiang Liu . Reliable task allocation for soil moisture wireless sensor networks using differential evolution adaptive elite butterfly optimization algorithm. Mathematical Biosciences and Engineering, 2023, 20(8): 14675-14698. doi: 10.3934/mbe.2023656
    [10] F. Berezovskaya, G. Karev, Baojun Song, Carlos Castillo-Chavez . A Simple Epidemic Model with Surprising Dynamics. Mathematical Biosciences and Engineering, 2005, 2(1): 133-152. doi: 10.3934/mbe.2005.2.133
  • In this paper, I demonstrate the adequacy of economic systems to the basic provisions of synergetics, which makes the latter eligible for macroeconomic analysis. In justifying this statement, a synergetic approach to the development of a model of economic cycles was considered. The novelty of this model was related to the probabilistic description of the investment function and the perception of the economic system as a material object with certain properties. According to the model, the income oscillations are induced by both exogenous (investment fluctuations) and endogenous (system elasticity) causes. The cycle's amplitudes correlate with the intensity of investment fluctuations as well as the efficiency of the economic system. The duration of the economic cycle is determined by the inclusive wealth of the system and its dynamic factor, which characterizes the ability of the system to withstand investment fluctuations and eliminates their consequences. Thus, the economic cycle is interpreted as the "natural noise" accompanying the functioning of market economics.

    The proposed model creates a mathematical basis for the numerical analysis of empirical economic data. An example of possible econometric applications of the model was considered using the current cyclic contraction in US incomes.



    The integration of wireless sensor networks (WSNs) within the framework of the Internet of Things (IoT) has marked a significant milestone in the current technological society. These networks, composed of autonomous nodes collecting data from the environment, play a crucial role in building intelligent and connected systems. The importance of WSNs in the IoT lies in their ability to provide real-time information, enabling more agile and efficient decision-making in various applications, from environmental monitoring to supply chain management.

    However, this technological advancement is not without challenges, and the security of WSNs emerges as an unavoidable priority. In particular, the propagation of malware in these networks poses a serious threat that can compromise the integrity and confidentiality of collected data. The importance of ensuring the security of WSNs, especially concerning malware propagation, becomes an essential element to preserve the reliability of IoT systems as a whole. This aspect takes on special relevance in critical environments such as health and infrastructure, where the reliability of information is crucial.

    In this context, the development of mathematical models to simulate the propagation of malware on WSNs emerges as an essential tool. These models not only allow a better understanding of propagation patterns but also facilitate the evaluation of security strategies and the implementation of preventive measures. In this regard, several mathematical and computational models have been proposed, and some of them will be reviewed in Section 3. The importance of addressing malware propagation through mathematical approaches lies in the ability to anticipate potential threats and mitigate associated risks, thereby strengthening the resilience of WSNs. In this work, we will explore these crucial aspects and propose innovative approaches to address emerging challenges in the landscape of WSNs within the context of the IoT.

    The main goal of this work is to propose a new model to study the propagation of malware on WSNs with the aim to address some of the deficiencies found in the global models proposed to date. Specifically, the main contributions of this paper are the following:

    ● Get a more realistic description of malware propagation on WSNs by considering: 1) New compartments of devices: susceptible, patched susceptible, latent non-infectious, latent infectious, compromised non-infectious, compromised infectious, damaged, ad deactivated; and 2) a novel way to determine the incidence term based on a new definition of the time unit that takes into account the average routings performed by different nodes.

    ● The basic reproductive number is explicitly computed and some control strategies are presented from its analytical study.

    The rest of the paper is organized as follows: In Section 2, the fundamentals of WSNs are introduced. The state of the art related to the design of mathematical models for malware propagation is presented in Section 3. Section 4 is devoted to the mathematical description of WSNs. The specifications of the novel model proposed in this work are shown in Section 5. The explicit and detailed description of the new model is presented in Section 6, and, finally, the conclusions and future work are shown in Section 7.

    A WSN is a network composed of several sensor devices or nodes (also called "smart sensors") deployed massively in a specific region with monitoring, wireless communication, and computing capabilities. The main goal of a WSN is to collect and transmit environmental data.

    Functionally, nodes are low-power devices equipped with one or more sensors (mechanical, thermal, biological, chemical, optical, magnetic, etc.), a processor, a memory, a power source, and other components necessary for their proper functioning. Since these nodes have limited memory and they are usually deployed in hard-to-reach locations (which also complicates their maintenance), they must have radio connectivity to transmit collected data to a base station. In this sense, it is important to note that one of the most significant limitations of WSNs is energy management in the sensor devices. Therefore, one of their main objectives is energy conservation by optimizing communication and monitoring processes.

    Due to their small size, low cost, and ease of deployment, WSNs have several applications in various fields: tracking and surveillance of military targets, environmental monitoring to predict natural disasters, patient monitoring (e-Health), infrastructures monitoring (Industry 4.0), agricultural crop monitoring (Smart Agriculture), etc. [1,2,3].

    The process of transmitting data between the node that "collected" it and the base is governed by algorithms that continuously select the most efficient route, considering node limitations such as memory, battery, etc. WSNs can be classified as "single-hop networks" (in contrast to "multi-hop networks"), meaning that information is transmitted from node to node until it reaches its final destination.

    The devices deployed in a WSN can be of different types depending on their functions and capabilities. The most numerous class is composed of "motes" or sensor nodes whose mission is to monitor the environment and transmit that information (in addition to routing data packets from other sensor nodes). Additionally, there are gateway nodes or collector nodes whose goal is to receive all information sent by sensor nodes and allow interconnection between the WSN and a TCP/IP (Transmission Control Protocol/Internet Protocol) network. For this purpose, assistance from a base station (data collector based on a common computer or embedded system) is required.

    The security of WSNs is essential as many of their uses and applications are related to very sensitive phenomena or situations (monitoring combat zones, disaster management, monitoring critical infrastructure, etc.). Protecting WSNs is challenging since each node is a potential target for a logical or physical attack. Among logical attacks, some are aimed at monitoring communications by intercepting and modifying data, impersonating the identity of legitimate nodes to inject false information into the network, etc. Privacy concerns are significant in WSNs given the large volume of data generated and transmitted, which could be easily accessed remotely. Physical attacks aim to directly access nodes to reprogram their operation, manually introduce malicious nodes, intentionally damage deployed nodes, etc. [4,5].

    The main security requirements when deploying and operating a WSN would be the following:

    ● Confidentiality: Data monitored by a given sensor should not leak to an unauthorized neighbor node. The key distribution process is fundamental to ensuring the security of the transmission channel.

    ● Authentication: The user must be sure that the data used in any decision-making process comes from a reliable source.

    ● Integrity: It should not be possible to modify the data collected and transmitted by the sensor devices by, for example, injecting manipulated data from a "malicious" node.

    ● Timeliness: It is necessary to ensure that the information is up-to-date at all times, especially when implementing key exchange protocols.

    ● Availability: It is a basic point to ensure availability, within the energy consumption margins, of the largest number of nodes for the longest possible monitoring period.

    ● Temporal synchronization: To save energy, each sensor must be able to deactivate its transmission/reception capability during certain periods of time.

    Cyberattacks on WSNs can be of different types: denial service attacks, sybil attacks, traffic analysis attacks, etc., and in the great majority, malicious code plays an important role. The methodology that can be carried out to try to prevent and counteract these attacks is mainly based on the development of three fundamental types of actions: 1) implementation of defensive measures [6,7,8], 2) use of cryptographic protocols [9,10,11], and 3) implementation of key management infrastructures [12,13,14].

    Malware stands out as a basic tool in the development of cyberattacks on various systems and/or computer networks. Traditionally, its malicious activity has been focused on devices with sufficient computational resources (processing, communication, etc.), such as computers, smartphones, etc., connected to different types of networks. More recently, its use has extended to devices with much more limited processing capabilities, such as wearable devices or, more specifically, sensor devices deploying the WSNs [15].

    In the realm of WSNs malware activity primarily revolves around the "reprogramming" of the infected node (for example, considering host specifications regarding memory, processing and communication capabilities, or energy consumption). This alteration affects its functionalities related to monitoring and/or transmission (modification of collected environmental data, disruption of connections with adjacent nodes, compromise of data packet integrity, etc.) or may even cause permanent damage. Moreover, the propagation process depends not only on the characteristics of the sensor devices but also on the routing protocols implemented in the WSN [16]. As a consequence the study of the dissemination of different specimens of malware in WSNs is an area of interest that the scientific community has begun to explore in recent years by proposing and analyzing mathematical propagation models.

    In the vast majority of works that appeared in scientific literature and proposed mathematical models to simulate malware propagation in WSNs, ordinary differential equations are commonly used to describe the dynamics. These are continuous and global models, and usually follow the same framework as models developed to study the spread of biological agents (classical Mathematical Epidemiology), with minor specific modifications as including new compartments, consideration of some characteristics specific to WSNs, etc. These studies are inherently theoretical with the challenge lying in theoretical demonstrations of the stability of the system, and their practical application and efficiency are not thoroughly analyzed. To a lesser extent, individual-based models have emerged, attempting to address some deficiencies in global models, which are accentuated in the context of malware propagation.

    In the following we will review models proposed in recent years. The great majority of these models are of a global nature (both deterministic and stochastic), with very few proposals based in the individual-based modeling paradigm.

    As global models, noteworthy examples include a review in [17] that examines SI (Susceptible-Infectious) compartmental models based on the Kermack-McKendrick paradigm adapted for studying malware propagation in WSNs. This study determines that models proposed to date inadequately consider energy and memory management, the use of authentication schemes, and sensor mobility, among other factors. In [18], a global SEIRS (Susceptible-Exposed-Infectious-Recovered-Susceptible) model is proposed and analyzed, considering nodes that collect correlated information in a certain common monitoring area. Spatial correlation is considered to analyze the dynamics of the computer virus in event-controlled WSNs. A Susceptible-Unexposed-Infected-Isolated-Removed epidemic model is presented in [19] where the qualitative study is shown. In [20], a global SIR (Susceptible-Infectious-Recovered) mathematical model is presented for cluster-based WSNs (differentiating nodes that are grouped in clusters from those that are not). Additionally, an attack/defense game is established between malware and implemented defensive elements, obtaining infection and recovery rates associated with the mixed Nash equilibrium strategy. Other works using game theory (and cellular automata in the description of the dynamics) to study malware propagation in a WSN through SIS (Susceptible-Infectious-Susceptible) and SIRD (Susceptible-Infectious-Recovered-Damaged) compartmental models can be found in [21] and [22], respectively. In [23], a global SIRS-L (Susceptible-Infectious-Recovered-Susceptible-Low energy devices) model is proposed and qualitatively analyzed where sensor nodes can recharge energy, and a new compartment, L, is considered for devices with low energy levels. A very similar work by the same authors that analyze a SISL model can be found in [24]. This compartment, representing nodes with low energy load, is also considered in [25], where a SILRD type (Susceptible-Infectious-Node with low energy level-Recovered-Dead) model is proposed and analyzed, such that the energy depletion due to malware action is considered. In [26], a SIR model with a nonlinear incidence term and a sigmoid recovery rate is proposed and studied from a qualitative perspective, determining the most efficient control strategies. A similar study on a SEIR model is presented in [27], where the Pontryagin maximum principle is used to determine the optimal control strategy. In [28], a qualitative analysis is conducted on an SIRS model considering two types of recovered nodes: those with total immunity and those who have recovered from infection but can be reinfected. In [29], a purely theoretical study proposes a SEIRS-V model (spreading a computer worm in a WSN) that includes the immunized compartment (V) and explicitly calculates its solution using the homotopy perturbation method. In [30], an SEIQRV (Susceptible-Exposed-Infectious-Quarantined-Recovered-Vaccinated) compartmental model is proposed, considering the compartment of quarantined nodes (Q). A qualitative study of solutions is given, examining the effect of node density and transmission radius on malware spread. In [31], a susceptible-unexposed-infected-isolation-removed model is proposed and its dynamics are described by means of a system of ordinary differential equations whose qualitative analysis is also presented. In [32], a probabilistic model is proposed on complex networks where the dynamics are defined by a system of stochastic ordinary differential equations; in addition to susceptible nodes, two types of infected nodes (with high battery level and low battery level) and "secured" nodes are also considered. In this work a theoretical study of the stability in probability is performed. In [33], a qualitative study is carried out, proposing a SCIRS (Susceptible-Carrier-Infectious-Recovered-Susceptible) compartmental model that introduces the compartment of "carrier" nodes, similar to [34]. In [35], the authors propose a hybrid model based on cellular automata and differential equations to simulate the spatiotemporal spread of malware on a WSN. The continuous model is qualitatively studied by analyzing the stability of the equilibrium points obtained. In [36], a theoretical study is conducted on an SIQPD (Susceptible-Infectious-Quarantined-Patched-Damaged) model considering that sensor nodes can move. This model is an improvement of those proposed by several of the same authors in [37,38]. In [39], an SIS model is constructed, considering specific characteristics of the network such as limited energy use and node density in the definition of epidemiological coefficients. In [40], a stochastic SIRD model is designed (the dynamics are described by means of Markov chains) where both the spatial distribution of nodes and their differences in vulnerability to malware are considered. Another stochastic SIS model has been recently proposed in [41], where a simple derivation of the exact Markov chain for random propagation of the malicious code is presented.

    The mathematical description of the spread of malware using fractional epidemiological models has been also proposed: In [42], a SEIVR (Susceptible-Exposed-Infectious-Vaccinated-Recovered) model on scale-free networks was introduced and analyzed, and in [43] the qualitative analysis of a SEIR model was presented and the optimal control strategy was also discussed. In [44], another fractional-order compartmental epidemic model was presented and analyzed: The population of devices is divided into susceptible, exposed, infected, recovered and vaccinated, and bot theoretical and numerical aspects are studied. Moreover, the optimal control problem for a fractional malware propagation model is studied in [45] in the case of underwater WSNs, and these control strategies are improved using machine learning techniques such as deep neural networks and random forest. Furthermore, propagation models based on differential equations have also been proposed to study the behavior of malware and develop the corresponding antivirus software [46]. Some characteristics of the life cycle of nodes are taken into account in [47] such that several compartments are considered: susceptible, susceptible and sleeping, infectious, infectious and sleeping, recovered, recovered and sleeping, and dead. The authors use a system of differential equations to represent the transition between these states in such a way that states a decision-making problem between the system and the specimen of malicious code as an optimal control problem. In [48], a model for malware propagation in underground and above-ground WSNs was introduced and analyzed. In this compartmental model, the devices are divided into susceptible, exposed, infectious, recovered, and low energy and each of this compartments is subdivided into underground and above-ground devices. Moreover, three basic features are captured in this model: the cross-infection, the infection time and low energy, and three hybrid control schemes are considered: the recovery scheme, quarantine, and pulse charging. A detailed study of the conditions for optimal control is done from a classic point of view and deep learning techniques are used.

    Following this review of the scientific literature, it can be observed that the majority of works focus on the theoretical analysis of the proposed mathematical model, often overlooking the characteristics of malware propagation on WSNs that are only tangentially considered within the mathematical description. While some models take into account some of these factors (see, for example, [48]), it is not the norm. Consequently, it seems opportune to design new families of models with the aim to provide the most possible detailed description of this phenomenon: considering new compartments of devices, incorporating characteristics of the data routing process in WSNs into the incidence term, etc.

    On the other hand, in the field of individual models, in [49], the authors propose an individual-based, discrete, and stochastic SEIRS-F (Susceptible-Exposed-Infectious-Recovered-Susceptible-Failed) model aiming to analyze malware propagation on a WSN and to study the reliability of its components in this situation. In [50], an SITPS (Susceptible-Infected-Traced-Patched-Susceptible) compartmental model is studied, considering, in addition to the classic compartments of susceptible and infected nodes, the compartments of "tracked" (T) and "repaired" (P). This is a stochastic individual-based model (based on Markov chains), where the authors analyze the optimal epidemic control strategies. In [51], the authors propose a stochastic SI individual-based model to compute the probability associated to an industrial IoT device to be compromised by an Advanced Persistent Threat (APT). In [52,53], two works based on similar theoretical techniques are presented to analyze a propagation model of false data malware (false data injection attack).

    In this work, we will consider N deployed nodes: n1,n2,,nN, such that pi=(xi,yi)R2 stands for the cartesian coordinates of the position of the i-th node ni, with 1iN. Additionally, we will assume that Ri denotes the monitoring radius such that B(pi,Ri)={(x,y)R2:(xxi)2+(yyi)2Ri} is the monitoring area of the i-th sensor node, and ri is the transmission radius with B(pi,ri)={(x,y)R2:(xxi)2+(yyi)2ri} being the transmission area (see Figure 1), so that any node nj such that pjB(pi,ri) will be able to receive data transmitted by node ni.

    Figure 1.  Arrangement of nodes ni and nj along with their respective monitoring and transmission regions.

    Node deployment in the monitoring region RR2 can be done either in a predetermined manner (placing nodes in predefined locations) or in a non-predetermined manner (placing these devices in locations distributed more or less randomly). When constructing the model, the monitoring region R can be considered as a continuum (see Figure 2(a)) or it can be "discretized" into equal cells (square shape) and distributed homogeneously (see Figure 2(b)).

    Figure 2.  (a) Continuous monitoring region R. (b) Discretized monitoring region R.

    Once the nodes are deployed, the directed network defining the topology of contacts, G=(VG,EG), is created and it is denoted as local connectivity (nodal) network. Here, the vertices of the network represent the sensor nodes: VG={n1,n2,,nN}, and there exists an edge between node ni and nj, eij=(ni,nj)EG, whenever node nj is located within the transmission area of node ni: pjB(ni,ri).

    If all transmission radii are equal, ri=rj for 1i<jN, the local connectivity network is defined by an undirected graph since eij=ejiEG. This is the situation we will work with.

    Example 1. Figure 3 illustrates the local connectivity network defined by the deployment of N=100 nodes - all equipped with the same transmission radius - shown in Figure 2.

    Figure 3.  Local connectivity network associated with the node deployment illustrated in Figure 2.

    Certain characteristics inherent to the sensor nodes constituting a WSN must be taken into account when designing epidemiological models. Among these, the most important is the management of energy consumption. In this way, during the period when the node is not performing monitoring or communication (reception and transmission) tasks, it remains "dormant" or "asleep, " maintaining energy consumption at the minimum possible level. On the other hand, when it is carrying out the aforementioned tasks, the node is in an "active" state, consuming only the energy necessary for the proper development of these activities.

    Although sensor devices are designed to have low energy consumption, if they only have one power source, it will eventually be depleted over time, and the node will cease its operation, becoming "inactive." Some nodes may additionally be equipped with a secondary energy supply source that provides them with energy obtained from the environment, which will impact the lifespan of the device.

    Consequently, the activity of a sensor node consists of:

    1) Monitoring the environment at regular time intervals.

    2) Sending the data obtained from monitoring to the sink node.

    3) Routing the data packets received (collected and emitted by other sensor nodes) toward the sink node.

    It can be assumed that activities 1) and 2) are performed sequentially with little time lapse between them and at predefined time intervals. Activity 3) is carried out whenever the node receives a data packet "in transit" to the sink node (see Figure 4).

    Figure 4.  Timing of the main activities of a sensor node.

    As it is assumed that routing protocols should optimize the distance traveled, both self-transmissions (sending the collected data) and transmissions due to routing received data packets from other nodes, should be directed toward the nearest neighboring nodes to the sink node.

    When designing any mathematical model to simulate the spread of a particular agent in a specific environment, it is crucial to clearly define the main characteristics of propagation and infection processes. These specifications will determine the variables and coefficients involved in the model, as well as the design of equations governing the dynamics of the phenomenon. Considerations should include both the environment of the spread (a WSN, in this case), the properties of the agent being propagated (malware in our case), and the actors that can host this malicious code (the sensor nodes of the network).

    Regarding the propagation process, the following assumptions will be made:

    1) At the onset of the outbreak, there will be a single infectious node capable of spreading the malware throughout the network (obviously, it will not be isolated).

    2) The malicious code will propagate from one sensor node to another, utilizing legitimate communications established between them as a result of their activities (data transmission and data routing). This minimizes the chance of detection by potential security measures implemented in the WSN. It is noteworthy that, in this case, a "proper contact" can be defined as any transmission initiated by an infectious node, and whose recipient is a susceptible node, not vice versa. That is, a transmission initiated by a susceptible node toward an infectious node (even if the infectious node sends a data reception confirmation back to the susceptible node) will not be considered as a proper contact. It is assumed that the presence of malicious code embedded in these confirmation transmissions would be easily detected.

    3) Direct spread will always occur toward nodes within the transmission range of the infectious node. If, for example, ni is an infectious node and njB(ni,ri), then the probability of the malware being directly transmitted (not through intermediary nodes belonging to any path connecting them) from ni to nj is zero. However, during each time unit, the code initially transmitted from ni could reach nodes that are not within its transmission range, thanks to routing.

    4) Spread to nodes within the transmission range (neighbor nodes) could be of two types, depending on the specifications of the malicious code:

    (ⅰ) Unrestricted spread: The malware specimen lacks the ability to know the state of neighboring nodes (due to technical or other issues) and, consequently, attempts to spread indiscriminately.

    (ⅱ) "Intelligent" spread: The malware specimen has the ability to fully or partially know the characteristics of neighboring nodes and can, consequently, decide to spread only to those sensor nodes of interest.

    Regarding the infection process, the following scheme will be followed:

    1) When the malware specimen reaches a node, it has to "bypass" the security measures implemented in it so that if a intrusion attempt is detected, it is blocked, and the malware does not infect the sensor node (keeping it in the "susceptible" state).

    2) If security measures cannot detect the intrusion, then the malware infects the node, which becomes a "latent" state. The malware evaluates the utility of the host for its purpose. If the malicious code determines that the infected node is not of interest, it tries to spread to a neighboring node. During this period (where the malicious code attempts to infect another device), the host node will be in the "infectious-latent" state and will return to the susceptible state after the malware has successfully spread. If, on the other hand, the specimen of malware determines that the infected node is useful, it decides on the type of attack to perform: carrying out malicious activity without physical harm to the node (for example: malicious manipulation of collected data or data in transit), or physically damaging the node. In the first case, the node is to be in the "compromised" state, while in the second case, the node is in the "damaged" state.

    3) During the malicious activity, the malware may have the ability to spread (in which case the node is in the "compromised-infectious" state) or simply limit itself to carrying out malicious activity in the node itself (state "compromised").

    4) The security measures implemented in the network and in the node could detect the presence of malware, and in this case, they would evaluate if it is possible to eliminate the malicious code. If possible, the node would be "free" of malware, and its state would transition to "patched-susceptible." Otherwise, (when countermeasures could not eliminate the malware), the node would be disconnected from the network, transitioning its state to "deactivated."

    5) Finally, if the malware activity in the infectious or compromised node is not detected, it will continue its operation until it ends. At this point, the node will return to the susceptible state. The duration of this period (infectious or compromise period) will be variable obviously, the greater the activity and the longer the period in which this malicious activity is carried out, the greater the probability of being detected).

    As is previously discussed, the characteristics of the propagation and infection processes of the malware specimen, as well as the particularities of both the nodes and the WSN as a whole, define what is called the state set X. This is a finite set whose elements are all the possible states in which each node, at each step of time, can be found (susceptible, exposed, infected, compromised, immunized, etc.). Thus, in general, X={x1,x2,,xm}.

    In the case of designing global models, we can work with two types of variables depending on whether we consider the discretized monitoring region or the continuum monitoring region. Thus, in the first case, many variables will be defined as there are states and the number of tessellations in the region R:

    Xi(a,b,t)={nk:pkCab,sk(t)=xiX},1af,1bc,1im, (5.1)

    where sk(t)X is the state of the k-th sensor node at time t. In the second case, that is, if we consider the region R as a continuum, the variables will be defined as follows:

    Xi(t)={nk:sk(t)=xiX},1im. (5.2)

    Note that if we work with the discretized region, it is obviously possible to define "global" variables:

    Xi(t)=1af1bcXi(a,b,t),1im. (5.3)

    In this work, it is assumed that the node population remains constant not only globally but also in each of the possible cells into which R is divided so that:

    N=X1(t)+X2(t)++Xm(t),t, (5.4)
    Nab(t)=X1(a,b,t)++Xm(a,b,t),t,1af,1bc, (5.5)
    N=1af1bcNab(t),t. (5.6)

    Taking into account all these considerations, the possible states in which any node may be are the following:

    ● Susceptible, S: The node is "free" of malware and either has never been infected before, or having been infected, such intrusion was not detected.

    ● Patched susceptible, SP: The node is "free" of malware, having been infected at some previous time when security measures successfully detected and eliminated the malicious code.

    ● Latent (non-infectious), L: This is an infected node in which the malware is determining what activity to perform based on the characteristics of the node.

    ● Latent infectious, LI: The node will not be attacked by the malware but is being used as a transmission vector for its spread through the network (it is infectious).

    ● Compromised (non-infectious), A: A node that is infected and is being attacked without physical damage.

    ● Compromised infectious, AI: An infected node that is being attacked without physical damage and, at the same time, is serving as a transmission vector for the spread of malware to neighboring nodes.

    ● Damaged, D: This is an infected node that has been attacked by malware, causing physical damage that prevents its operation.

    ● Deactivated, Q: An infected node in which the malware has been successfully detected but could not be eliminated, so it has been disconnected from the rest of the network.

    Consequently, the state set is:

    X={x1=S,x2=SP,x3=L,x4=LI,x5=A,x6=AI,x7=D,x8=Q}. (5.7)

    In Figure 5, the flow diagram representing all the transitions between states is shown.

    Figure 5.  Flow diagram representing the transition of states.

    The correct definition of the temporal unit is a key factor in the model development as all epidemiological coefficients (and equations) depend on it. In our case, as is mentioned earlier, the milestones that determine the propagation process are the legitimate transmissions made by nodes, both of the data collected by themselves during the monitoring process and the data packets they receive from other nodes and have to route to reach the sink node. Therefore, we believe that the notion of a temporal unit should strongly depend on the number of such transmissions, specifically the number of own transmissions emitted by a sensor node. In this sense, given a number of monitorings (and subsequent transmissions) c, we define the temporal unit as the period of time during which c own transmissions of a sensor node occur (see Figure 6).

    Figure 6.  Structure of the temporal unit where it is considered c=3.

    In the novel global model that is proposed in the following section, some additional assumptions will be made, derived from what has already been previously established, and the nature of global models:

    ● Transmissions carried out by each node (whether own or associated with the routing process) will be directed toward all nodes in its neighborhood.

    ● The number (average) of own transmissions of each node per unit of time will be K0=kc, where k is the average degree of the network.

    ● The number of routings performed by an arbitrary node per unit of time depends proportionally on the betweenness centrality of nodes and the average length of the shortest paths between nodes.

    ● The path taken by a data packet during a unit of time has an average length l, which will be reduced by one unit after each monitoring. Consequently, during the period of time that lasts one unit of time, the data collected in the i-th (1ic) monitoring carried out during that unit will travel a path of length l(i1) (see Figure 7).

    Figure 7.  Length of paths traveled by data sent during a unit of time.

    The mathematical determination of the incidence term is one of the most important (and decisive) tasks in designing a mathematical model to simulate the propagation of malware on a WSN. Considering the previous description of the propagation process, infection can occur when there exist an effective contact (communication between sensor nodes) between an infectious node (either in a latent state, LI, or attacked, AI) and a susceptible node (whether it is an "original" susceptible or a patched susceptible). In this way, we have:

    incidence=αLSLI+αASAI+ˆαLSPLI+ˆαASPAI, (6.1)

    where

    αL=qLk(N)N,αA=qAk(N)N,ˆαL=ˆqLk(N)N,ˆαA=ˆqAk(N)N, (6.2)

    where k(N) stands for the average appropriate contacts of each node with the rest of the sensor nodes per unit of time, and 0<qAqL1,0<ˆqAˆqL1 are the probabilities that a suitable contact leads to infection when receiving a transmission from a node in infectious latent state LI or from a node in infectious attacked state AI, respectively. Additionally, it is assumed that ˆqAqA and ˆqLqL.

    Taking into account the above, we have:

    k(N)=kN1(K0+K1(N)) (6.3)

    where K0=kc is the average self-transmissions of the node, and K1(N) is the (average) number of routings each node manages in each unit of time. Specifically, in this work, we assume:

    K1(N)=Ni=1CB(ni)N(N1)(δ+1), (6.4)

    where l(δ1)<Llδ and L is the average length of the shortest paths between any pair of nodes in the WSN. Note that CB(ni) is the betweenness centrality associated to the i-th sensor node.

    In summary, we will have:

    k(N)=k2cN1+k(δ+1)NNi=1CB(ni)=k2cN1+2k(δ+1)N(N1)(N2)Ni=11r<sNri,sirs(ni)rs. (6.5)

    Considering the above, once the malicious code reaches a sensor node, it proceeds to evaluate it to decide what activity to develop: not attack the node and use it as a transmission vector or attack the sensor node with a higher or lower level of "aggressiveness". We can assume that during each unit of time, there is a fraction of nodes, 0γL1, that are not attacked, another fraction of nodes, 0γD1, are attacked and damaged, and another fraction of nodes, 0γA1, which are attacked and used to carry out malicious activity without disabling them. Within these latter nodes, a fraction defined by 0ν1 will not be used as transmission vectors (infectious nodes). There will also be a fraction 0ω1 of latent nodes that are detected as infected by security countermeasures, of which another fraction 0ρ1 will be possible to eliminate the malicious code specimen. Finally, it will be assumed that there will be a small fraction (per unit of time), 0η1, of latent nodes that cannot be classified. Therefore, we will have γL+γD+γA+η+ω+ρ=1. Additionally, we can make the following assumptions about the numerical value of these epidemiological coefficients:

    ● There will be fewer attacked and/or damaged nodes than non-attacked nodes: γD+γAγL. Also, there will be many fewer damaged nodes than attacked nodes: γDγA.

    ● The fraction of latent nodes detected by security countermeasures will be very small not only in comparison with these epidemiological coefficients: ω,ρη,γD,γA, but also in relation to the detection and elimination rates that affect attacked and infectious nodes.

    ● The fraction of nodes in which a decision cannot be made will be very low: ηγL,γD,γA.

    As a consequence, we are assuming that: 0ω,ρηγDγAγL.

    It is assumed that security countermeasures are constantly monitoring the WSN to detect (and eliminate, if possible) malware. Roughly speaking its detection will consist in searching for suspicious or unusual activities of the nodes. Remember that in infected nodes, the activities carried out by the malware (during monitoring and legitimate transmission periods -to try to go unnoticed-) are the following:

    ● Development of malicious activity in a node without permanently damaging it.

    ● Irreversibly damaging a node.

    ● Attempt to spread to other nodes.

    Depending on the state of the node, different activities will be carried out, and it is reasonable to assume that the more activities are performed, the more probability of detection there will be. In this sense, the minimum detection probability (per unit of time) can be assigned to latent state L nodes, as mentioned earlier, 0ω1. From here, we will assume the following: ωLI=cω,ωA=2cω,ωAI=3cω, where ωLI,ωA, and ωAI are the detection probabilities for latent infectious, attacked, and infectious attacked nodes, respectively.

    On the other hand, the rate of elimination of malicious code will be assumed to be the same regardless of the state of the considered node: 0ρ1. Finally, infected nodes where the malware has not been detected and has completed its malicious activity will become, again, susceptible in a fraction that will depend on the state of the node: 0ϵ1 for attacked nodes and 0ζ1 for latent infectious nodes. In Figure 8 the transition diagram of the described model is illustrated.

    Figure 8.  Flow diagram representing the transition of states between compartments.

    As indicated in Subsection 5.3, the variables used in this model are the following:

    X1(t)=number of susceptible nodes S at time t.X2(t)=number of patched susceptible nodes SP at time t.X3(t)=number of latent nodes L at time t.X4(t)=number of latent infectious nodes LI at time t.X5(t)=number of attacked nodes A at time t.X6(t)=number of infectious attacked nodes AI at timet.X7(t)=number of damaged nodes D at time t.X8(t)=number of deactivated nodes Q at time t.

    Then, taking into account the specifications of the model given above, the system of ordinary differential equations that governs its dynamics is:

    X1(t)=(αLX4(t)+αAX6(t))X1(t)+ζX4(t)+ϵX5(t)+ϵX6(t), (6.6)
    X2(t)=(ˆαLX4(t)+ˆαAX6(t))X2(t)+ωρX3(t)+cωρX4(t)+2cωρX5(t)+3cωρX6(t), (6.7)
    X3(t)=(αLX4(t)+αAX6(t))X1(t)+(ˆαLX4(t)+ˆαAX6(t))X2(t)(ω+γL+γA+γD)X3(t), (6.8)
    X4(t)=γLX3(t)(ζ+cω)X4(t), (6.9)
    X5(t)=γAνX3(t)(ϵ+2cω)X5(t), (6.10)
    X6(t)=γA(1ν)X3(t)(ϵ+3cω)X6(t), (6.11)
    X7(t)=γDX3(t), (6.12)
    X8(t)=ω(1ρ)X3(t)+cω(1ρ)X4(t)+2cω(1ρ)X5(t)+3cω(1ρ)X6(t), (6.13)

    where N=8i=1Xi(t) for all t. Also, the following initial conditions will be considered:

    X1(0)=S0,X2(0)=SP(0),X3(0)=L0,X4(0)=LI,0,X5(0)=A0,X6(0)=AI,0,X7(0)=D0,X8(0)=Q0. (6.14)

    Note that the feasible region of this system is Γ={(X1,,X8)(R+)8 such that X1++X8N}, so only solutions living in this region will be of interest.

    Proposition 2. The system determined by equations (6.6)-(6.13) always has an infection-free equilibrium point P0=(X1,0,,X8,0) defined by the following coordinates:

    X1,0=N1,0,X2,0=N2,0,X3,0=X4,0=X5,0=X6,0=0,X7,0=N7,0,X8,0=NN1,0N2,0N7,0. (6.15)

    Proof. The equilibrium points are solutions of the system

    Xi(t)=0,1i8,N=8i=1Xi(t), (6.16)

    namely:

    0=(αLX4+αAX6)X1+ζX4+ϵX5+ϵX6 (6.17)
    0=(ˆαLX4+ˆαAX6)X2+ωρ(1+cX4+2cX5+3cX6), (6.18)
    0=(αLX4+αAX6)X1+(ˆαLX4+ˆαAX6)X2(ω+γL+γA+γD)X3, (6.19)
    0=γLX3(ζ+cω)X4, (6.20)
    0=γAνX3(ϵ+2cω)X5, (6.21)
    0=γA(1ν)X3(ϵ+3cω)X6, (6.22)
    0=γDX3, (6.23)
    0=ω(1ρ)X3+cω(1ρ)X4+2cω(1ρ)X5+3cω(1ρ)X6 (6.24)
    N=X1+X2+X3+X4+X5+X6+X7+X8. (6.25)

    From Eqs (6.20)–(6.22), it follows that:

    X4=γLζ+cωX3=a1X3,X5=γAνϵ+2cωX3=a3X3,X6=γA(1ν)ϵ+3cωX3=a2X3, (6.26)

    so the system (6.17)–(6.25) is reduced to the equation N=X1+X2+X7+X8. This immediately yields that if X1,0=N1,0, X2,0=N2,0, and X7,0=N7,0, then X8,0=NN1,0N2,0N7,0, and the statement is proven.

    Proposition 3. If γD=0, then the system determined by Eqs (6.6)–(6.13) has an endemic equilibrium point Pe=(X1,e,,X8,e) such that:

    1) If ω=0, it is given by:

    X1,e=a1ζ+ϵ(a2+a3)a1αL+a2αA, (6.27)
    X2,e=0,X3,e=E3,e,X4,e=a1E3,e,X5,e=a3E3,e,X6,e=a2E3,e,X7,e=E7,e, (6.28)
    X8,e=Na1ζ+ϵ(a2+a3)a1αL+a2αA(1+a1+a2+a3)E3,eE7,0. (6.29)

    2) If ρ=1, it is given by:

    X1,e=a1ζ+ϵ(a2+a3)a1αL+a2αA, (6.30)
    X2,e=ω(1+ca1+2ca3+3ca2)a1ˆαL+a2ˆαA, (6.31)
    X3,e=E3,e,X4,e=a1E3,e,X5,e=a3E3,e,X6,e=a2E3,e,X7,e=E7,0, (6.32)
    X8,0=Na1ζ+ϵ(a2+a3)a1αL+a2αAω(1+ca1+2ca3+3ca2)a1ˆαL+a2ˆαA(1+a1+a2+a3)E3,eE7,0. (6.33)

    where:

    a1=γLζ+cω,a2=γA(1ν)ϵ+3cω,a3=γAνϵ+2cω. (6.34)

    Proof. Considering Eq (6.23) and assuming that X30, we have γD=0, so the system can be written as follows:

    0=(αLa1+αAa2)X1+ζa1+ϵa3+ϵa2 (6.35)
    0=(ˆαLa1+ˆαAa2)X2+ωρ(1+ca1+2ca3+3ca2), (6.36)
    0=(αLa1+αAa2)X1+(ˆαLa1+ˆαAa2)X2(ω+γL+γA), (6.37)
    0=ω(1ρ)(1+a1c+2a3c+3a2c), (6.38)
    N=X1+X2+(1+a1+a2+a3)X3+X7+X8. (6.39)

    From Eqs (6.35) and (6.36), it follows that:

    X1=ζa1+ϵa3+ϵa2αLa1+αAa2,X2=ωρ(1+ca1+2ca3+3ca2)ˆαLa1+ˆαAa2, (6.40)

    and from Eq (6.38), it is deduced that either ω=0 or ρ=1. Thus:

    1) In the first case, when ω=0, then X2=0, and the system becomes:

    0=(ζa1+ϵa3+ϵa2)X3(γL+γA)X3, (6.41)
    N=ζa1+ϵa3+ϵa2αLa1+αAa2+(1+a1+a2+a3)X3+X7+X8. (6.42)

    The first equation is a tautology, so only the last equation remains and the result stated in the proposition is obtained.

    2) In the second case, if ρ=1 (with ω0), then

    X2=ω(1+ca1+2ca3+3ca2)ˆαLa1+ˆαAa2, (6.43)

    and the system becomes:

    0=(ζa1+ϵa3+ϵa2)+ω(1+ca1+2ca3+3ca2)(ω+γL+γA),N=ζa1+ϵa3+ϵa2αLa1+αAa2+ω(1+ca1+2ca3+3ca2)ˆαLa1+ˆαAa2+(1+a1+a2+a3)X3+X7+X8. (6.44)

    The first equation is a tautology, and from the remaining equation, through a simple calculation, the result of the proposition is obtained.

    It can be assumed that a1αL+a2αA0 and a1ˆαL+a2ˆαA0 since αL and αA cannot be zero at the same time (for there to be incidence). Additionally, it can also be supposed that γL0 and γA0 because otherwise there would be no transition between latent and infective-latents and attacked nodes, respectively.

    Note that the endemic equilibrium point exists when several very special conditions are satisfied, namely:

    1) γD=0, meaning that the malicious code specimen is not capable of permanently damaging sensor nodes and rendering them disabled.

    2) Either

    2.1) ω=0, meaning that security countermeasures are not capable of detecting the presence of the malicious code specimen.

    2.2) or ρ=1, meaning that security countermeasures are capable of eliminating the malware specimen from all nodes where it has been detected.

    Meeting these conditions would simplify the model significantly by eliminating three transitions between compartments. Consequently, this case can be considered as marginal.

    Theorem 4. The basic reproductive number associated with the previously described epidemiological model for malware propagation is given by:

    R0=(αLa1+αAa2)N1,0+(ˆαLa1+ˆαAa2)N2,0ω+γA+γD+γL. (6.45)

    Proof. We will apply the next-generation method (see, for example, [54,55]) to compute in an explicit way its basic reproductive number. Thus, considering only the variables corresponding to compartments of infected nodes, the system (6.6)–(6.13) can be written as follows:

    Xi=Fi(X3,X4,X5,X6)+Vi(X3,X4,X5,X6),3i6, (6.46)

    with Vi=ViV+i, where:

    F3=(αLX4+αAX6)X1+(ˆαLX4+ˆαAX6)X2 (6.47)
    V3=(ω+γL+γA+γD)X3,V+3=0, (6.48)
    F4=0, (6.49)
    V4=(ζ+cω)X4, (6.50)
    V+4=γLX3, (6.51)
    F5=0, (6.52)
    V5=(ϵ+2cω)X5, (6.53)
    V+5=γAνX3, (6.54)
    F6=0, (6.55)
    V6=(ϵ+3cω)X6, (6.56)
    V+6=γA(1ν)X3, (6.57)

    such that Fi represents the appearance of new nodes in compartment Xi from infection, V+i indicates the number of nodes entering in state Xi due to system dynamics, and Vi stands for the number of nodes disappearing from compartment Xi due to model dynamics.

    A simple computation shows that:

    F=(F3X3F3X4F3X5F3X6F4X3F4X4F4X5F4X6F5X3F5X4F5X5F5X6F6X3F6X4F6X5F6X6)=(0αLX1+ˆαLX20αAX1+ˆαAX2000000000000), (6.58)

    and

    V=(V3X3V3X4V3X5V3X6V4X3V4X4V4X5V4X6V5X3V5X4V5X5V5X6V6X3V6X4V6X5V6X6)=(ω+γL+γA+γD000γLγLa100γAν0γAνa30γA(1ν)00γA(1ν)a2), (6.59)

    so that

    V1=(1ω+γL+γA+γD000a1ω+γL+γA+γDa1γL00a3ω+γL+γA+γD0a3γAν0a2ω+γL+γA+γD00a2γA(1ν)). (6.60)

    Consequently we have:

    FV1=(a2(αAX1+ˆαAX2)+a1(αLX1+ˆαLX2)ω+γL+γA+γDa1(αLX1+ˆαLX2)γL0a2(αAX1+ˆαAX2)(1ν)γA000000000000), (6.61)

    and the basic reproductive number will be the spectral radius of the matrix (FV1)P0, i.e.:

    R0=a2(αAX1+ˆαAN2,0)+a1(αLN1,0+ˆαLX2)ω+γL+γA+γD=(αLa1+αAa2)N1,0+(ˆαLa1+ˆαAa2)N2,0ω+γL+γA+γD, (6.62)

    thus finishing the proof.

    The most relevant epidemiological coefficients of the model are those that appear in the explicit expression of the basic reproductive number since this is a crucial threshold parameter that determines the behavior of the temporal evolution of infectious nodes. Considering the meaning of the concept of the basic reproductive number, the lower the numerical value of this coefficient, the easier it is to control the epidemic outbreak. Consequently, the fundamental goal is to try to reduce the value of R0 below 1, since it is reasonable to establish the main prophylactic strategies as those aimed at reducing the value of R0. Note that, in our case, the basic reproductive number can be written as follows:

    R0=qLk(N)NγLζ+cω+qAk(N)NγA(1ν)ϵ+3cωω+γL+γA+γDN1,0+ˆqLk(N)NγLζ+cω+ˆqLk(N)NγA(1ν)ϵ+3cωω+γL+γA+γDN2,0, (6.63)

    which means that R0 will decrease when:

    1) The denominator ω+γL+γA+γD increases.

    2) N1,0 and/or N2,0 decrease.

    3) γLζ+cω and/or γA(1ν)ϵ+3cω decrease.

    4) qL,qA,ˆqL,ˆqA decrease.

    5) k(N)N decreases.

    These are purely mathematical conditions, and some of them may not have "physical" or epidemiological significance or be impractical in practice. Analyzing them in some detail, we can draw the following conclusions:

    1) The denominator ω+γL+γA+γD roughly represents the rate of abandonment from the compartment of nodes in the latent state L. From a practical standpoint, it makes sense to increase ω(1ρ), which is the fraction of latent nodes that are detected and become deactivated, thus preventing them from becoming infectious in the future. However, it does not make much sense to increase ωρ or γAν, and, certainly, it makes no sense to increase γL or γA(1ν) since it would be increasing the compartment of susceptibles in the first case (potential future infectives) or the compartments of infectives, LI and AI, in the second case.

    2) Obviously, if we reduce the number of nodes susceptible to infection, the infectious outbreak will be contained. This could be achieved either by immunizing them (a process not considered in the current model) or by isolating them from the network (which would negatively impact its operation).

    3) In principle, it would not be possible to decrease the rates γL or γA since they correspond to characteristics of the malicious code specimen, and it is assumed that we would not have access to them. The same would apply to increasing the rates ν,ζ, and ϵ. However, it would be possible to influence the detection rate ω of latent nodes, although it would only be practically useful, as discussed in point (1), to increase ω(1ρ).

    4) The contagion probabilities qL,qA,ˆqL, and ˆqA decrease if we enhance the effectiveness of security measures implemented in the nodes.

    5) Decreasing k(N) implies reducing the number of contacts (direct transmissions and routing transmissions) of the nodes. This is not possible without affecting the proper functioning of the WSN.

    We will illustrate the proposed model with some simulations considering different contact topologies: complete network, homogeneous grid network, random network, scale-free network, and small-world network.

    In Table 1, the values of the epidemiological coefficients considered in all simulations are presented. These are purely illustrative numerical values.

    Table 1.  Numerical values of the epidemiological coefficients considered in the simulations.
    Coefficient Numerical value
    qL 0.005
    ˆqA 0.004
    ˆqL 0.85qL
    ˆqA 0.85qA
    ζ 0.2
    ϵ 0.1
    ω 0.01
    ρ 0.005
    ν 0.75
    γL 0.7
    γA 0.17
    γD 0.01

     | Show Table
    DownLoad: CSV

    It will be assumed that at the initial time, we have the following compartment configuration:

    X1(0)=99,X2(0)=0,X3(0)=0,X4(0)=1,X5(0)=X(6)=X(7)=X(8)=0, (6.64)

    which means that all nodes at t=0 are susceptible except for a single node in the latent and infectious state. In addition, as mentioned earlier, simulations will be performed on WSNs whose network topology is defined by five complex networks of different typologies. For the sake of simplicity, we assume N=100 and consider the following contact topologies (note that for N>100, the simulations obtained are similar if the same epidemiological coefficients, global structural indices, and initial conditions are considered):

    ● Complete network, G1.

    ● Homogeneous grid network, G2:

    ● Random network (ER type with connection probability p=0.5), G3:

    ● Scale-free network with the number of reconnected nodes n=3, G4:

    ● Small-world network (WS model with reconnection probability p=0.1), G5:

    In Table 3, some of the main structural coefficients associated with these networks are shown.

    Table 2.  Global structural indices associated with the complex networks used in the simulations.
    Global structural index G1 G2 G3 G4 G5
    Number of links 4950 180 2456 294 200
    Density 1 0.0364 0.4961 0.0594 0.0404
    Diameter 1 18 2 5 9
    Average length of geodesic paths, Li 1 6.667 1.503 2.591 4.638

     | Show Table
    DownLoad: CSV
    Table 3.  Contact rates associated with the complex networks used in the simulations.
    Contact rate G1 G2 G3 G4 G5
    k(N) 297 0.531 74.5 1.49 0.881

     | Show Table
    DownLoad: CSV

    In addition to the previously mentioned values of the coefficients, we will suppose that for each step of time, there will be c=3 monitorings/direct transmissions from each node, and the length of the path traveled in the WSN by a data packet in each time unit is l=max{L1,L2,L3,L4,L5}=7. Additionally, in Table 3 the values of the respective contact rates k(N) in the cases under consideration are shown:

    If the system of differential equations governing the dynamics of the model is numerically solved using the above data (we will use MATHEMATICA software for this simulations), the solutions shown in Figures 1317 are obtained. Note that in all cases, the system evolves toward an infection-free equilibrium state. Also, it can be observed that in two cases (those using the complete network and the random network), there is an initial increase in the number of infected nodes before declining, while in simulations where the WSN has a homogenous grid, scale-free, or small-world topological structure, the infectious outbreak disappears immediately without any impact on the network. This fact could have been foreseen simply by considering the data in Table 3, where it can be observed that given that all simulations have been obtained from the same values of epidemiological coefficients, it is precisely the impact of the network topology on the computation of k(N) that strongly determines the epidemic evolution.

    Figure 9.  Homogeneous grid network G2.
    Figure 10.  ER random network with p=0.5, G3.
    Figure 11.  Scale-free network, G4.
    Figure 12.  Small-world network (WS algorithm with p=0.1), G5.
    Figure 13.  Temporal evolution of the compartments in the complete network G1.
    Figure 14.  Temporal evolution of the different compartments in a grid network G2.
    Figure 15.  Temporal evolution of the compartments in an ER random network G3 with p=0.5.
    Figure 16.  Temporal evolution of the compartments in a scale-free network with n=3 G4.
    Figure 17.  Temporal evolution of a WS small-world network with p=0.1 G5.

    In Figure 18, the evolution of the latent compartment in WSNs with contact topologies defined by ER random networks with different connection probabilities p is shown. The corresponding values are presented in Table 4.

    Figure 18.  Temporal evolution of the latent compartment on different WSNs described by ER random networks.
    Table 4.  Characteristics of the random networks used in the simulations.
    Network p k(N) Density
    G1 0.9 242.13 0.90282
    G2 0.8 188.82 0.79717
    G3 0.7 145.47 0.69960
    G4 0.6 101.22 0.58343
    G5 0.5 76.672 0.50768
    G6 0.4 47.736 0.40040
    G7 0.3 27.305 0.302626
    G8 0.2 11.368 0.194950
    G9 0.1 2.8112 0.098384

     | Show Table
    DownLoad: CSV

    It can be observed that as the connection probability used in the random network construction algorithm decreases, the prevalence (number of infected nodes) becomes more "flattened" until a certain threshold value of p - when R0 is less than 1- where the number of nodes in the latent state decreases from the initial time.

    Finally, it should be noted that the definition given for incidence severely undervalues network topologies defined from homogenous grid, scale-free, and small-world networks, even considering the same numerical values for the malware's epidemiological coefficients. Obviously, the effect of propagation cannot be the same as in a complete or random network (constructed using a high probability in the ER algorithm), but, in my opinion, it shouldn't be so slight, especially when empirical evidence shows that contagion probabilities, qL and qA, should be multiplied by 103 to achieve similar behaviors.

    In this work, following a review of the state of the art regarding mathematical models for simulating malware propagation in WSNs, a novel way of defining incidence has been proposed, which takes into account the average number of routings per unit of time. Based on this, a new propagation model has been designed. Through a detailed analysis of the phenomenon, this model considers more compartments than those employed in other existing models.

    Taking into account all these compartments (8 in total), the study of stability becomes overly complex, although it is possible to explicitly obtain the expression for the basic reproductive number. Subsequently, an analysis of the basic reproductive number can be performed to determine key containment measures.

    The proposed model is of a global nature, where the studied variables represent the size or density of the considered epidemiological compartments (for example, the number of infected devices at each step of time). Consequently, it does not take into account the specific characteristics of each of the devices within the WSN (both those related to the processes of propagation and infection, as well as the specific contact topologies). This is a potential limitation of the model that could be addressed by studying the development of individual-based models, which is left as future work. On the other hand, although certain specific aspects and characteristics of WSNs and malware propagation have been considered in this work, further exploration is needed in the ad hoc design of epidemiological coefficients for models simulating malware propagation. Furthermore, as future work, the simplification of the proposed model by using fewer compartments is suggested, thereby enabling an in-depth qualitative analysis.

    The author declares he has used Artificial Intelligence (AI) tools in the revision (and improvement) of the English of this article. Moreover, AI tools have not been used for other purposes.

    This research was funded by "Fundación Memoria de D. Manuel Solórzano Barruso" (Universidad de Salamanca, Spain) under grant number FS/2-2022.

    The authors declare there is no conflict of interest.



    [1] Ashby WR (1962) Principles of the Self-Organizing System, In: Principles of Self Organization: Transactions of the University of Illinois Symposium, Eds: H. von Foerster and G. Zopf, Pergamon Press, 255–278.
    [2] Blanchard OJ (2017) Macroeconomics, 7th ed., Boston: Pearson.
    [3] Bolotin VV (1984) Random vibrations of elastic systems, Heidelberg: Springer.
    [4] Brandt S (2014) Data Analysis: Statistical and Computational Methods for Scientists and Engineers, 4th ed., Cham, Switzerland: Springer.
    [5] Cho S (2018) Fourier Transform and Its Applications Using Microsoft EXCEL®, San Rafael, CA: Morgan & Claypool.
    [6] Cooley TF, Prescott EC (1995) Economic growth and business cycles, In: Frontiers of business cycle research, ed: Cooley TF, Princeton: Princeton University Press, 1–38.
    [7] Golosov M, Menzio G (2020) Agency business cycles. Theor Econ 15: 123–158. https://doi.org/10.3982/TE3379 doi: 10.3982/TE3379
    [8] Haken H (2004) Synergetics: Introduction and Advanced Topics, Berlin, Heidelberg: Springer-Verlag.
    [9] Essays on economic synergetics (2017) Eds: Mayevsky V I, Kirdina-Chandler S G, Deryabina M A, Moscow: Institute of Economics, Russian Academy of Sciences (in Russian).
    [10] Karmalita V (2019) Digital processing of random oscillations, Berlin: De Gruyter.
    [11] Karmalita VA (2023) Recovering the actual trajectory of economic cycles. J Econ Math Method 59: 19–25. https://doi.org/10.31857/S042473880024867-2 doi: 10.31857/S042473880024867-2
    [12] Karmalita VA (2025) Stochastic dynamics of economic cycles: macroeconomic theory and econometric application, Moscow: Prometheus (in Russian).
    [13] Kehoe PJ, Midrigan V, Pastorino E (2018) Evolution of modern business cycle models: accounting or the great recession. J Econ Perspect 32: 141–166. https://doi.org/10.1257/jep.32.3.141 doi: 10.1257/jep.32.3.141
    [14] Korotaev AV, Tsirel SV (2010) Spectral analysis of World GDP Dynamics: Kondratieff Waves, Kuznets Swings, Juglar and Kitchin Cycles in Global Economic Development, and the 2008–2009 Economic Crisis. J Biomol Struct Dyn 4: 3–57. https://doi.org/10.5070/SD941003306 doi: 10.5070/SD941003306
    [15] Kydland F, Prescott E (1982) Time to build and aggregate fluctuations. J Econometrica 50: 1345–1370.
    [16] Pain HJ (2005) The physics of vibrations and waves, 6th ed., Chichester, England: Wiley.
    [17] Pavleino MA, Romadanov VM (2007) Spectral transforms in MATLAB®, St.-Petersburg: SPbSU (in Russian).
    [18] Samuelson P, Nordhaus W (2004) Economics, 18th ed., Irwin: McGraw-Hill.
    [19] Willems JC (1971) Dissipative Dynamic Systems, Part I: General Theory. Arch Rational Mech Anal 45: 321–352. https://doi.org/10.1007/BF00276493 doi: 10.1007/BF00276493
    [20] Zhang WB (1999) Synergetic Economics: Time and Change in Nonlinear Economics, Berlin, Heidelberg: Springer Verlag.
  • This article has been cited by:

    1. Hassan Tahir, Anwarud Din, Kamal Shah, Bahaaeldin Abdalla, Thabet Abdeljawad, Advances in stochastic epidemic modeling: tackling worm transmission in wireless sensor networks, 2024, 30, 1387-3954, 658, 10.1080/13873954.2024.2396480
    2. Seelam Ch Vijaya Bhaskar, Gedela Kalyani, Ramy Al-Fatlawy, Fatima Alsalamy, Waleed Hadi Madhloom Kurdi, H.M. Al-Aboudy, G. Sujatha, 2024, Augmenting Cybersecurity in WSN: AI-Based Clone Attacks Recognition Framework, 979-8-3503-6700-3, 1, 10.1109/ASIANComNet63184.2024.10811090
    3. Jyoti Mishra, Pramod Kumar Srivastava, Vineet Srivastava, Securing Wireless Sensor Network Against Multi-Malware Threats: A Comprehensive Modeling and Analysis Approach, 2025, 6, 2661-8907, 10.1007/s42979-024-03631-5
    4. Hai Anh Tran, Xuan Cho Do, Thanh Thuy Nguyen, Dual-SPIR model for predicting APT malware spread in organization networks, 2025, 123, 00457906, 110214, 10.1016/j.compeleceng.2025.110214
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(910) PDF downloads(65) Cited by(0)

Figures and Tables

Figures(12)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog