Volume 28, Issue 4 pp. 1134-1144
Special Issue Paper

Worm propagation model in mobile network

Zhide Chen

Corresponding Author

Zhide Chen

Key Lab of Network Security and Cryptography, School of Mathematics and Computer Science, Fujian Normal University, Fujian Province Fuzhou, China

Correspondence to: Zhide Chen, Key Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fujian Province Fuzhou, China.

E-mail: [email protected]

Search for more papers by this author
Meng Wang

Meng Wang

Key Lab of Network Security and Cryptography, School of Mathematics and Computer Science, Fujian Normal University, Fujian Province Fuzhou, China

Search for more papers by this author
Li Xu

Li Xu

Key Lab of Network Security and Cryptography, School of Mathematics and Computer Science, Fujian Normal University, Fujian Province Fuzhou, China

Search for more papers by this author
Wei Wu

Wei Wu

Key Lab of Network Security and Cryptography, School of Mathematics and Computer Science, Fujian Normal University, Fujian Province Fuzhou, China

Search for more papers by this author
First published: 05 June 2015
Citations: 4

Summary

With the popularity of mobile smart devices and functional diversification, the infection ways of mobile smartphones worm also become diverse. In mobile networks, mobile devices are suffering from the threat of worms all the time. Once the worm outbreaks, it will bring huge losses to mobile phone users and mobile network operators. Researches on mobile worm propagation model allow us to control and detect potential worm threat, according to the characteristics of worm's outbreak. In the paper, we put forward a worm propagation model based on the mobile network environment. After analyzing the model, we then give the simulation for controlling factors affecting worm propagation. This model allows us to have a certain understanding for the spread on the size and speed of the mobile worm and provide effective methods to control the spread of the mobile worm. Copyright © 2015 John Wiley & Sons, Ltd.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.