Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1229285.1229294acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

Bluetooth worm propagation: mobility pattern matters!

Published: 20 March 2007 Publication History

Abstract

The alarm that worms start to spread on increasingly popular mobile devices calls for an in-depth investigation of their propagation dynamics. In this paper, we study how mobility patterns affect Bluetooth worm spreading speeds. We find that the impact of mobility patterns is substantial over a large set of of changing Bluetooth and worm parameters. For instance, a mobility model under which devices move among a fixed set of activity locations can result in worm propagation speeds four times faster than a classical mobility model such as the random walk model. Our investigation reveals that the key factors affecting Bluetooth worm propagation speeds include spatial distributions of nodes, link duration distributions, degrees to which devices are mixed together, and even the burstiness of successive links.

References

[1]
The Network Simulator - ns-2. http://www.isi.edu/nsnam/ns/index.html.
[2]
UCBT - Bluetooth Extention for NS2 at the University of Cincinnati. http://www.ececs.uc.edu/ cdmc/ucbt/ucbt.html.
[3]
E. Anderson, K. Eustice, S. Markstrum, M. Hansen, and P. Reiher. Mobile contagion: Simulation of infection and defense. In Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation, pages 80--87, 2005.
[4]
F. Bai, N. Sadagopan, and A. Helmy. IMPORTANT: A framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks. In Proceedings of IEEE Infocom'03, 2003.
[5]
C. Bettstetter. Smooth is better than sharp: A random mobility model for simulation of wireless networks. In Proceedings of ACM Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pages 19--27, 2001.
[6]
A. Bose and K. G. Shin. On mobile viruses exploiting messaging and bluetooth services. In Proceedings of the Second International Conference on Security and Privacy in Communication Networks, 2006.
[7]
J. Bray and C. Sturman. Bluetooth: Connect Without Cables. Prentice Hall, December 2000.
[8]
T. Camp, J. Boleng, and V. Davies. A survey of mobility models for ad hoc network research. Wireless Communication & Mobile Computing (WCMC): Special Issue on Mobile Ad Hoc Networking: Research, Trends and Applications, 2(5):483--502, 2002.
[9]
P. Ferrie, P. Szor, R. Stanev, and R. Mouritzen. Security responses: Symbos.cabir. Symantec Corporation, 2004.
[10]
B. Hoh and M. Gruteser. Computer ecology: Responding to mobile worms with location-based quarantine boundaries. In Proceedings of International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks, 2006.
[11]
J. P. Lynch Jr. Co-channel interference in bluetooth piconets. Master's thesis, Virginia Polytechnic Institute and State University, 2002.
[12]
S. A. Khayam and H. Radha. A topologically-aware worm propagation model for wireless sensor networks. In Proceedings of The 2nd International Workshop on Security in Distributed Computing Systems (SDCS-2005), June 2005.
[13]
M. Lactaotao. Security information: Virus encyclopedia: Symbos_comwar.a: Technical details. Trend Micro Incorporated, 2005.
[14]
J. W. Mickens and B. D. Noble. Modeling epidemic spreading in mobile environments. In Proceedings of the 4th ACM workshop on Wireless security, pages 77--86, September 2005.
[15]
S. Souissi and E. F. Meihofer. Performance evaluation of a bluetooth network in the presence of adjacent and co-channel interference. In Proceedings of IEEE Emerging Technologies Symposium on Broadband Wireless Internet Access, 2000.
[16]
C. Taylor and N. Mawston. Bluetooth market doubles: CSR still gaining momentum. http://www.strategyanalytics.net/, December 2005.
[17]
G. Yan and S. Eidenbenz. Bluetooth worms: Models, dynamics, and defense implications. Proceedings of the 22nd Annual Computer Security Applications Conference, 2006.
[18]
J. Yoon, M. Liu, and B. Noble. Random waypoint considered harmful. In Proceedings of IEEE Infocom'03, 2003.
[19]
Q. Zheng, X. Hong, and S. Ray. Recent advances in mobility modeling for mobile ad hoc network research. In Proceedings of the 42nd annual Southeast regional conference, 2004.
[20]
J. Zyren. Intersil corporation - prism products. White Paper, June 1999.

Cited By

View all
  • (2020)Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread ModelingIEEE Access10.1109/ACCESS.2020.30442778(228818-228830)Online publication date: 2020
  • (2016)On the Evolution and Impact of Mobile Botnets in Wireless NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2015.249254515:9(2304-2316)Online publication date: 1-Sep-2016
  • (2016)Bluetooth Worm Propagation in Mobile Networks2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)10.1109/ICMETE.2016.132(235-239)Online publication date: Sep-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
March 2007
323 pages
ISBN:1595935746
DOI:10.1145/1229285
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 March 2007

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

Asia CCS07
Sponsor:

Acceptance Rates

ASIACCS '07 Paper Acceptance Rate 33 of 180 submissions, 18%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread ModelingIEEE Access10.1109/ACCESS.2020.30442778(228818-228830)Online publication date: 2020
  • (2016)On the Evolution and Impact of Mobile Botnets in Wireless NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2015.249254515:9(2304-2316)Online publication date: 1-Sep-2016
  • (2016)Bluetooth Worm Propagation in Mobile Networks2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)10.1109/ICMETE.2016.132(235-239)Online publication date: Sep-2016
  • (2016)ReferencesMalware Diffusion Models for Wireless Complex Networks10.1016/B978-0-12-802714-1.00025-6(283-292)Online publication date: 2016
  • (2015)Hop-by-Hop Worm Propagation with Carryover Epidemic Model in Mobile Sensor NetworksComputers10.3390/computers40402834:4(283-292)Online publication date: 20-Oct-2015
  • (2014)Reasoning about mobile malware using high performance computing based population scale modelsProceedings of the 2014 Winter Simulation Conference10.5555/2693848.2694232(3048-3059)Online publication date: 7-Dec-2014
  • (2014)Mobile Worms and VirusesInformation Security in Diverse Computing Environments10.4018/978-1-4666-6158-5.ch011(206-229)Online publication date: 2014
  • (2014)Emergent Properties & SecurityProceedings of the 2014 New Security Paradigms Workshop10.1145/2683467.2683468(1-14)Online publication date: 15-Sep-2014
  • (2014)Reasoning about mobile malware using high performance computing based population scale modelsProceedings of the Winter Simulation Conference 201410.1109/WSC.2014.7020143(3048-3059)Online publication date: Dec-2014
  • (2013)Building a Cloud-Based Mobile Application TestbedIT Policy and Ethics10.4018/978-1-4666-2919-6.ch040(879-899)Online publication date: 2013
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media