2509001307
  • Open Access
  • Article

A Dynamic Countermeasure-Based Worm Propagation Model in Wireless Sensor Networks: Critical Threshold Analysis and Validation of Benign Worm Effectiveness

  • Liping Feng *,   
  • Yaojun Hao,   
  • Qinshan Zhao,   
  • Peng Wei

Received: 08 Jul 2025 | Revised: 02 Sep 2025 | Accepted: 15 Sep 2025 | Published: 24 Sep 2025

Abstract

Wireless sensor networks (WSNs) are widely used for environmental monitoring, industrial control, and smart agriculture, and “bad worm” outbreaks can lead to irreversible data loss, large-scale network failure, and even cascading damage to connected physical systems. In this paper, a novel i-SIR model is proposed to characterize the co-propagation dynamics of malicious worms (“bad worms”) and defensive worms (“good worms”) in wireless sensor networks (WSNs). Here, the “bad worm” refer to the malware that invades sensor nodes, steal data, disrupt communication, or paralyze network functions, while the “good worm” refers to the benign software that repairs infected nodes, blocks “bad worm” intrusion, and builds immune barriers. Th designed i-SIR model is able to comprehensively analyze worm spread and the corresponding countermeasures within a complex and resource-constrained WSN environment, especially capable of addressing the critical threat of “bad worms”. Through rigorous mathematical analysis, a basic reproduction number R0 (serving as a critical threshold to determine the extinction or persistence of worm propagation) is determined, and its sensitivity is further analyzed to key network parameters such as node density, communication range, and energy constraints. Numerical simulations demonstrate that the proposed i-SIR model is superior to classical statistical immune models in terms of speed and scale reducing rates of worm outbreak by 50% and 60%, respectively. Furthermore, by considering temporal variations in worm activity patterns, we investigate the impact from the infection rate ratio (between bad and good worms) on propagation dynamics. Such a ratio significantly suppresses the virulence and the scale of malicious worm spread, with more suppressing efficiency in densely deployed networks. This work provides a robust theoretical foundation for designing dynamic defense strategies in WSNs, and offers performable insights into time and density optimization of “good” worms in real-world WSNs.

References 

  • 1.

    Amutha, J.; Sharma, S.; Sharma, S. Strategies Based on Various Aspects of Clustering in Wireless Sensor Networks Using Classical, Optimization and Machine Learning Techniques: Review, Taxonomy, Research Findings, Challenges and Future Directions. Comput. Sci. Rev. 2021, 40, 100376. https://doi.org/10.1016/j.cosrev.2021.100376.

  • 2.

    Qamar, T. The Measurement and Monitoring of Quality of Service Based on Security Analysis in Wireless Sensor Network Using Deep Learning Architecture. Measurement 2023, 220, 113434.

  • 3.

    Shanmathi, M.; Sonker, A.; Hussain, Z.; et al. Enhancing Wireless Sensor Network Security and Efficiency with CNN-FL and NGO Optimization. Meas. Sens. 2024, 32, 101057.

  • 4.

    Zhang, H.; Madhusudanan, V.; Geetha, R.; et al. Dynamic Analysis of the e-SITR Model for Remote Wireless Sensor Network with Noise and Sokol-Howell Functional Response. Results Phys. 2022, 38, 105643.

  • 5.

    Wu, Y.; Pu, C.; Zhang, G.; et al. Epidemic Spreading in Wireless Sensor Networks with Node Sleep Scheduling. Phys. A Stat. Mech. Its Appl. 2023, 629, 12904.

  • 6.

    Dong, C.; Zhao, L. Sensor Network Security Defense Strategy Based on Attack Graph and Improved Binary PSO. Saf. Sci. 2019, 117, 81–87.

  • 7.

    Zhang, Z.; Zou, J.; Upadhyay, R. An Epidemic Model with Multiple Delays for the Propagation of Worms in Wireless Sensor Networks. Results Phys. 2020, 19, 103424. https://doi.org/10.1016/j.rinp.2020.103424.

  • 8.

    Dutta, K. Dynamic Optimization of Multi-Layered Defenses Inspired by Chakravyuh. Int. J. Crit. Infrastruct. Prot. 2025, 51, 100794.

  • 9.

    Kephart, J.O.; White, S.R. Measuring and Modeling Computer Virus Prevalence. In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 24–26 May 1993, pp. 2–15.

  • 10.

    Dong, N.P.; Long, H.V.; Son, N.T.K. The Dynamical Behaviors of Fractional-Order SE1E2IQR Epidemic Model for Malware Propagation on Wireless Sensor Network. Commun. Nonlinear Sci. Numer. Simul. 2022, 111, 106428.

  • 11.

    Kumar, P.M.; Shahwar, T.; Gokulnath, G. Improved Sensor Localization with Intelligent Trust Model in Heterogeneous Wireless Sensor Network in Internet of Things (IoT) Environment. Sustain. Comput. Inform. Syst. 2025, 46, 101122.

  • 12.

    Tang, W.; Yang, H.; Pi, J.; et al. Network Virus Propagation and Security Situation Awareness Based on Hidden Markov Model. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 101840.

  • 13.

    Yang, L.-X.; Li, P.; Yang, X.; et al. Simultaneous Benefit Maximization of Conflicting Opinions: Modeling and Analysis. IEEE Syst. J. 2020, 14, 1623–1634. https://doi.org/10.1109/JSYST.2020.2964004.

  • 14.

    Jafar, M.T.; Yang, L.-X.; Li, G.; et al. Malware Containment with Immediate Response in IoT Network: An Optimal Control Approach. Comput. Commun. 2024, 228, 107951.

  • 15.

    Dong, N.P.; Long, H.V.; Giang, N.L. The Fuzzy Fractional SIQR Model of Computer Virus Propagation in Wireless Sensor Network Using Caputo Atangana-Baleanu Derivatives. Fuzzy Sets Syst. 2022, 429, 28–59.

  • 16.

    Liu, G.; Peng, Z.L.; Tian, T.T.; et al. Malware Attack and Defense Game in Fractional-Order Internet of Underwater Things: Model-Based and Model-Free Approaches. Eng. Appl. Artif. Intell. 2025, 161, 111970.

  • 17.

    Lv, W.; Ke, Q.; Li, K. Dynamic Stability of An SIVS Epidemic Model with Imperfect Vaccination on Scale-Free Networks and Its Control Strategy. J. Frankl. Inst. 2020, 357, 7092–7121.

  • 18.

    Ahmad, I.; Bakar, A.A.; Jan, R.; et al. Dynamic Behaviors of A Modified Computer Virus Model: Insights into Parameters and Network Attributes. Alex. Eng. J. 2024, 103, 266–277.

  • 19.

    Angurala, M.; Bala, M. Bamber. Implementing MRCRLB Technique on Modulation Schemes in Wireless Rechargeable Sensor Networks. Egypt. Inform. J. 2021, 22, 473–478. https://doi.org/10.1016/j.eij.2021.03.002.

  • 20.

    Premkumar, M.; Sundararajan, T. DLDM: Deep Learning-Based Defense Mechanism for Denial of Service Attacks in Wireless Sensor Networks. Microprocess. Microsyst. 2020, 79, 103278. https://doi.org/10.1016/j.micpro.2020.103278.

  • 21.

    Moslehi, M.M. Exploring Coverage and Security Challenges in Wireless Sensor Networks: A Survey. Comput. Netw. 2025, 260, 111096.

  • 22.

    Acarali, D.; Rajarajan, M.; Komninos, N.; et al. Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Secur. Commun. Netw. 2019, 2019, 3745619.

  • 23.

    Yuan, Y.; Shen, X.; Sun, L.; et al. Modeling Cascading Failures and Invulnerability Analysis of Underwater Acoustic Sensor Networks Based on Complex Network. IEEE Sens. J. 2024, 5, 6942–6952.

  • 24.

    Bailey, N.T.J. The Mathematical Theory of Infectious Diseases and Its Applications, 2nd ed.; Charles Griffin & Co. Ltd.: London, UK, 1975.

  • 25.

    Yuan, H.; Chen, G.; Wu, J.; et al. Towards Controlling Virus Propagation in Information Systems with Point-To-Group Information Sharing. Decis. Support Syst. 2009, 48, 57–68.

  • 26.

    Yuan, H.; Chen, G. Network Virus-Epidemic Model with the Point-To-Group Information Propagation. Appl. Math. Comput. 2008, 206, 357–367.

  • 27.

    Zou, C.C.; Gong, W.B.; Towsley, D.; et al. Code Red Worm Propagation Modeling and Analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002.

Share this article:
How to Cite
Feng, L.; Hao, Y.; Zhao, Q.; Wei, P. A Dynamic Countermeasure-Based Worm Propagation Model in Wireless Sensor Networks: Critical Threshold Analysis and Validation of Benign Worm Effectiveness. Journal of Machine Learning and Information Security 2025, 1 (1), 2. https://doi.org/10.53941/jmlis.2025.100002.
RIS
BibTex
Copyright & License
article copyright Image
Copyright (c) 2025 by the authors.