چكيده به لاتين
The Wireless Sensor Networks (WSNs) is a phenomenon that has received a great deal of attention in recent years. Spread of malware on these networks, in addition to disrupting network services, can seriously damage devices due to limited energy and computing capacity, and the lack of a host-based defense mechanism such as traditional networks. Each type of attack follows a strategy in the networks, and each network needs to be evaluated against cyber attacks in accordance with its unique characteristics. Therefore, in order to defend against future attacks, it is important to understand how malware spreads and the impact of various attack strategies and dynamics. Due to the high cost of measuring and evaluating these attacks on networks with different characteristics, the use of analytical models and simulations is one of the common methods in predicting the conditions during the process of this type of attack.
Although the spread of malware on the Internet of Things and wireless sensor networks has been studied in some articles, most of these studies have not mentioned how to detect an attack and have not carefully considered the defense solutions of a WSNs network. Most of these studies have also focused on distributed denial-of-service attacks, which target the attacker with the most network spreads and the fewest deaths. Attacks such as permanent/plashing denial of service (PDoS), which directly target the network under attack, pursue the strategy of maximum spread and maximum death during the attack process. One of the motives of this study is to provide a model to describe these conditions in attacking wireless IoT networks in order to minimize the damage to them during such attacks.
Our goal in this study is to apply the concepts and tools of stochastic activity networks(SAN) to model and analyze malware propagation in wireless objects Internet networks. In similar studies, due to the inattention to issues such as propagation detection, impractical reporting by all nodes and not covering the cluster-based topology and the study of the dynamics of permanent denial of service attacks are some of the cases that have been tried in this study and present the simulation results performed by the Möbius tool.