Trawling the Web for emerging cyber-communities
WWW '99 Proceedings of the eighth international conference on World Wide Web
On power-law relationships of the Internet topology
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
The Mathematics of Infectious Diseases
SIAM Review
Mining the network value of customers
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
IEEE Internet Computing
Measuring and Modeling Computer Virus Prevalence
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Modeling epidemic spreading in mobile environments
Proceedings of the 4th ACM workshop on Wireless security
Bluetooth worm propagation: mobility pattern matters!
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Epidemic thresholds in real networks
ACM Transactions on Information and System Security (TISSEC)
Analytical Models for Epidemics in Mobile Networks
WIMOB '07 Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
Proceedings of the 2008 ACM/IEEE conference on Supercomputing
IEEE/ACM Transactions on Networking (TON)
Virus propagation on time-varying networks: theory and immunization algorithms
ECML PKDD'10 Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part III
The impact of the power law exponent on the behavior of a dynamic epidemic type process
Proceedings of the twenty-fourth annual ACM symposium on Parallelism in algorithms and architectures
Understanding and managing cascades on large graphs
Proceedings of the VLDB Endowment
Gelling, and melting, large graphs by edge manipulation
Proceedings of the 21st ACM international conference on Information and knowledge management
Modified SIS epidemic model for analysis of virus spread in wireless sensor networks
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
Short-range, point-to-point communications for mobile users enjoy increasing popularity, particularly with the rise in Bluetooth -equippedmobile devices.Unfortunately, virus writers have begun exploiting lax security in many mobile devices and subsequently developed malware exploiting proximity-based propagation mechanisms (e.g. Cabir or CommWarrior). So, if given an ad-hoc network of such mobile users, will a proximity-spreading virus survive or die out; that is, can we determine the "tipping point" between survival and die out? What effect does the average user velocity have on such spread? We answer the initial questions and more. Our contributions in this paper are: (a) we present a framework for analyzing epidemic spreading processes on mobile ad hoc networks, (b) using our framework, we are the first to derive the epidemic threshold for any mobility model under the SIS model, and (c) we show that the node velocity in mobility models does not affect the epidemic threshold. Additionally, we introduce a periodic mobility model and provide evaluation via our framework. We validate our theoretical predictions using a combination of simulated and synthetic mobility data, showing ultimately, our predictions accurately estimate the epidemic threshold of such systems.