Skip to main content
PLOS One logoLink to PLOS One
. 2013 Mar 21;8(3):e59468. doi: 10.1371/journal.pone.0059468

A Combinatorial Model of Malware Diffusion via Bluetooth Connections

Stefano Merler 1, Giuseppe Jurman 1,*
Editor: Vittoria Colizza2
PMCID: PMC3605460  PMID: 23555677

Abstract

We outline here the mathematical expression of a diffusion model for cellphones malware transmitted through Bluetooth channels. In particular, we provide the deterministic formula underlying the proposed infection model, in its equivalent recursive (simple but computationally heavy) and closed form (more complex but efficiently computable) expression.

Introduction

The spreading of malware, i.e., malicious self-replicating codes, has rapidly grown in the last few years, becoming a substantial threat to the wireless devices, and mobile (smart)phones represent nowadays the most appetible present and future target. Papers studying the problem from both theoretical and technical points of view already appeared in literature since 2005 [1][9], and nowadays a number of different approaches to modeling the virus diffusion are already available to the community. With the present work we want to contribute to this topic by proposing a more accurate model for the spread of a malware through the Bluetooth channel, providing both a recursive and a combinatorial equivalent deterministic formulation of the described solution.

The Model

The dynamics of the proposed model is the following: at a certain time Inline graphic, a number Inline graphic of infected mobiles Inline graphic come in contact with a number Inline graphic of clean (non-infected) cellphones Inline graphic; hereafter we will denote this configuration as Inline graphic.

All Inline graphic telephones are in the Bluetooth transmission range of each other and they all have their Bluetooth device on. Each infected mobile tries to establish a connection with another device, clearly not knowing whether it is trying to pair to a clean or to an infected phone. All these connections are established instantaneously at time Inline graphic. However, for the sake of simplicity we assume that the infected mobiles establish connections following a given sequence, starting from Inline graphic down to Inline graphic. In other words, Inline graphic is the first to try to establish a connection, Inline graphic is the last one. Moreover, each connection is chosen uniformly at random among all possible available choices. Connections between infected and clean mobiles deterministically result in infection transmission: when a clean mobile gets paired to an infected one, it becomes infected. All these events occur in the time interval Inline graphic, where Inline graphic is the minimal time allowing all infected mobiles to establish a connection and eventually transmit the virus: in practice, it may be considered of the order of a few tens of seconds. We assume that in this time interval clean cellphones do not try to establish any connections, e.g., for non-malware purposes. We also assume that in this time interval no other mobile enters the Bluetooth transmission range of the Inline graphic mobiles and, when a connection between two mobiles is established, the two mobiles remain connected for the whole time interval. Basically, we are assuming that the initial configuration Inline graphic is given and it does not change in the time interval Inline graphic. Note that, given the definition of Inline graphic, new infections do not result in configuration changes in the time interval Inline graphic.

All the aforementioned assumptions are reasonably realistic, due to the very short time-scale considered.

The task here is to discover the probability that, in this situation, a given clean mobile gets paired to an infected one, and thus it becomes itself infected.

Summarizing, the setup and the constraints of the model are the following:

Setup

Inline graphic infected mobiles Inline graphic and Inline graphic clean mobiles Inline graphic are in a room (i.e., in the Bluetooth transmission range of each other).

Dynamics

Starting from Inline graphic down to Inline graphic, each infected mobile tries to connect with a yet unconnected device, regardless of whether it is infected or not.

Constraint #1

Since the connection channel is Bluetooth, once a connection between two mobiles is established, these two devices become unavailable to further connection, or, in other words, each device can have at most one connection to another cellphone.

Constraint #2

For each Inline graphic, when it is Inline graphic's turn to choose, Inline graphic must connect to one of the still available devices, if any.

Let us consider the generic configuration Inline graphic with Inline graphic unpaired infected mobiles Inline graphic and Inline graphic unpaired clean mobiles Inline graphic. According to the setup, the first mobile establishing a connection is Inline graphic. In Fig. 1 a possible evolution is displayed starting from an initial configuration with Inline graphic infected and Inline graphic clean mobiles, together with an explanatory description of the occuring dynamics.

Figure 1. An example of model dynamics starting from the initial configuration (7,5).

Figure 1

In red, the pairing that it is established at each step. (a) At time Inline graphic, Inline graphic infected mobile phones Inline graphic and Inline graphic clean mobiles Inline graphic are all within their mutual Bluetooth connection range. (b) Inline graphic chooses a mobile among Inline graphic; it chooses Inline graphic establishing connection Inline graphic . (c) Now it Inline graphic's turn to choose, and Inline graphic and Inline graphic are not available anymore for pairing (marked by a grey circle ○ ). (d) Inline graphic connects to Inline graphic through pairingInline graphic . (e) The two mobiles Inline graphic and Inline graphic become unavailable for pairing, too and the next infected mobile in line Inline graphic pairs to Inline graphic via Inline graphic . (f) Only Inline graphic and Inline graphic remain available for pairing with Inline graphic, which chooses Inline graphic (connectionInline graphic ). (g) Now the last mobile Inline graphic must connect to the remaining unpaired clean phones Inline graphic: it chooses Inline graphic creating pairing Inline graphic . (h) There are no more unpaired infected mobiles: the process ends at time Inline graphic.

Due to the described dynamics, all the infected mobiles succeed in paring, with the exception of at most one Inline graphic, which can remain unpaired if there are no more available mobiles. This case can only happen when there are more infected mobiles than clean ones, their sum is odd and all the clean mobiles get paired:

graphic file with name pone.0059468.e063.jpg (†)

where Inline graphic is the number of pairings between two infected mobiles. Henceforth, the last choosing infected mobile Inline graphic cannot find any available device to pair to. In what follows, we will refer to this case as the case Inline graphic; an example of this situation in the initial configuration Inline graphic is shown in Fig. 2.

Figure 2. An example of the Inline graphic situation.

Figure 2

Starting from the initial configuration Inline graphic, Inline graphic infects the clean mobile Inline graphic, Inline graphic pairs to Inline graphic, Inline graphic infects Inline graphic and, finally, Inline graphic pairs to Inline graphic. Here the process ends, because there are no more mobiles available for pairing to Inline graphic which remains unconnected.

The model is completely described by computing the probability Inline graphic that a certain clean mobile, for instance Inline graphic, gets infected in the time interval Inline graphic.

Although Inline graphic could be stochastically approximated by running repeated simulations, in the following Sections we will derive two equivalent exact (deterministic) formulæ for Inline graphic in the aforementioned setup. The former is a simple recursive expression, which follows straightforwardly from the model dynamics, while the latter is its corresponding closed form (thus with no recursion involved), which has a more complex expression and it heavily relies on combinatorics. Other than their alternative mathematical nature, the two formulæ show different behaviours also from a computational point of view, as discussed in a dedicated Section.

The Recursive Formula

Recursively, the probability Inline graphic of a given susceptible mobile Inline graphic to get infected starting from a given initial configuration Inline graphic can be written by the following expression:

graphic file with name pone.0059468.e076.jpg (1)

where the trivial conditions Inline graphic, Inline graphic and Inline graphic initialize the recursion, thus covering all possible cases.

Since all clean mobiles share the same probability Inline graphic of getting infected, without loss of generality we may assume Inline graphic. The three terms Inline graphic, Inline graphic, and Inline graphic contributing to the general case of Inline graphic come from the three mutually exclusive cases which can occur starting from the initial configuration Inline graphic:

  1. Inline graphic establishes a pairing with Inline graphic. In this case Inline graphic gets infected and this event occurs with probability Inline graphic.

  2. Inline graphic establishes a pairing with one of the other Inline graphic clean mobiles Inline graphic. This event occurs with probability Inline graphic and of course Inline graphic does not get infected by Inline graphic. However, Inline graphic may be infected later by the remaining Inline graphic available infected phones (with only Inline graphic clean mobiles still available, because one clean mobile has been infected by Inline graphic), thus falling back to a Inline graphic configuration.

  3. Inline graphic establishes a pairing with one of the other Inline graphic unpaired infected mobiles Inline graphic. This event occurs with probability Inline graphic and of course Inline graphic does not get infected by Inline graphic. However, similarly to the previous situation, Inline graphic may be infected later by the remaining Inline graphic unpaired infected phones, thus falling back to a Inline graphic configuration.

A worked out example illustrating the construction of Eq. 1 is shown in Fig. 3. The formula in Eq. 1 for Inline graphic relies on a recursive equation of second order with non constant coefficients, for which no general method is known to derive the corresponding non-recursive (closed) expression. Moreover, as detailed in a later Section, calculating Inline graphic by using Eq. 1 is computationally heavy. However, we will obtain the equivalent time-saving closed form solution in the next Section using combinatorial arguments.

Figure 3. Construction of the general case of the recursive formula Eq. 1.

Figure 3

Starting from the initial configuration Inline graphic, we want to compute the probability Inline graphic that a clean mobile (Inline graphic without loss of generality) gets infected in the proposed model. At time Inline graphic, the first infected mobile Inline graphic tries to establish a pairing, and only one of the three following alternatives can occur. In green, the case when Inline graphic immediately infects Inline graphic (with probability Inline graphic) and we are done. In blue, the case when Inline graphic pairs to one of the remaining another Inline graphic infected mobiles Inline graphic with probability Inline graphic; then Inline graphic and Inline graphic becomes unavailable for pairing with the following choosing mobile Inline graphic, and we are moved into the case of computing the probability that Inline graphic gets infected when there are Inline graphic unlinked infected mobiles and Inline graphic clean ones, i.e., Inline graphic. Finally, in orange, the case when Inline graphic pairs to one of the other Inline graphic clean mobiles Inline graphic (with Inline graphic) with probability Inline graphic; then Inline graphic and Inline graphic becomes unavailable for pairing with the following choosing mobile Inline graphic, and we are moved into the case of computing the probability that Inline graphic gets infected when there are Inline graphic unlinked infected mobiles and Inline graphic unlinked clean ones, i.e., Inline graphic. The general case Inline graphic is obtained by summing the contributions of all three alternative cases described above.

The Combinatorial Formula

To construct the explicit formula equivalent to Eq. 1, we need to employ a few combinatorial considerations. The key observation is that we can count all wirings (lists of pairings) that can occur at the end of the pairing process. Clearly, the fact that there is an order in setting up the connections between the mobiles heavily influences the probability that a given wiring can occur: in particular, this probability depends on the number Inline graphic of pairings between infected mobiles (bb-pairings, for short). As background material, we recall some definitions and results from combinatorics in the box in Fig. 4, together with the two following functions:

Figure 4. Basic definitions, examples and facts on dispositions, combinations and permutations.

Figure 4

  • the Heaviside step function

graphic file with name pone.0059468.e157.jpg
  • the Kronecker delta function

graphic file with name pone.0059468.e158.jpg

As an example, the following indicator function can be written in the two equivalent formulations:

graphic file with name pone.0059468.e159.jpg

where Inline graphic is the Euclidean remainder function, so Inline graphic is zero for even Inline graphic and one for odd Inline graphic.

Suppose now we are starting from an initial configuration Inline graphic; then define the following quantities:

  • Inline graphic: the minimum number of bb-pairings in a wiring;

  • Inline graphic: the probability that a wiring with exactly Inline graphic bb-pairings occurs;

  • Inline graphic: the number of all possible ways to select Inline graphic bb-pairings;

  • Inline graphic: the number of all possible wirings with a given list of Inline graphic bb-pairings when a (generic) clean mobile gets paired;

  • Inline graphic: the number of all possible wirings with a given list of Inline graphic bb-pairings and where the clean mobile Inline graphic is paired;

  • Inline graphic: the number of all possible wirings with Inline graphic bb-pairings when a (generic) clean mobile gets paired;

  • Inline graphic: the number of all possible wirings with Inline graphic bb-pairings where the clean mobile Inline graphic is paired;

  • Inline graphic: in the Inline graphic case, with Inline graphic, the number of possible wirings with Inline graphic unpaired, for Inline graphic.

In the above notations, the (non recursive) closed form expression equivalent to Eq. 1 for the probability Inline graphic of a given susceptible mobile Inline graphic to get infected in a given initial configuration Inline graphic can be written as follows:

graphic file with name pone.0059468.e188.jpg (2)

Eq. 2 has its roots on the following counting argument: the probability that a given clean mobile Inline graphic gets infected is the sum over all admissible values of Inline graphic of all possible wirings with Inline graphic bb-pairings weighted by the probability that a wiring with exactly Inline graphic bb-pairings occurs:

graphic file with name pone.0059468.e193.jpg (3)

where Inline graphic is the minimum number of Inline graphic-pairings that can be established in an initial configuration Inline graphic.

The rationale of summing over the number of Inline graphic-pairings to compute Inline graphic relies on the observation that the probability of Inline graphic of getting infected depends on the number of available infected mobiles that will pair with clean mobiles, that is exactly the number of infected mobiles which are not already paired to another infected mobile, i.e., that are not involved in a bb-pairing.

In particular, the three terms between brackets in Eq. 2 match respectively the three factors in Eq. 3, while the term between double brackets (Inline graphic to enhance readability) corresponds to Inline graphic.

In what follows we will show that the expansion of the right-hand member of Eq. 3 coincides with Eq 2. The expansions of all terms will be carried out first by separately considering all occurring cases, and then providing an unique closed form formula (without conditional expressions) by using the Heaviside step and the Kronecker delta functions.

Lemma 1

Given an initial configuration Inline graphic, the minimum number Inline graphic of bb-pairings in a wiring is the following:

graphic file with name pone.0059468.e233.jpg

while the maximum number is Inline graphic.

In fact, while when Inline graphic it is possible not to have any bb-pairing, when Inline graphic they cannot be less than Inline graphic or Inline graphic respectively when Inline graphic is even or odd. This is due to the constraint #1 imposing that an infected mobile Inline graphic must connect to another device whenever available, when it is its turn to choose.

Lemma 2

Given a Inline graphic configuration, the probability Inline graphic that a wiring with exactly Inline graphic bb-pairings between two infected mobiles occurs is the following:

graphic file with name pone.0059468.e251.jpg

In fact, when there are Inline graphic bb-pairings in the admissible range, all possible wirings depend on the choice of Inline graphic infected devices Inline graphic and Inline graphic clean devices Inline graphic, i.e. Inline graphic elements from the original sets of Inline graphic. The first element has probability Inline graphic to be chosen, the second Inline graphic, the third Inline graphic and so on.

Lemma 3

Given an initial configuration Inline graphic in the Inline graphic case with Inline graphic, then the number Inline graphic of possible wirings with Inline graphic unpaired, for Inline graphic, is:

graphic file with name pone.0059468.e268.jpg

The idea is that all the Inline graphic infected mobiles Inline graphic must be part of a bb-pairing, so they must be connected to one of the Inline graphic. Once they have been chosen, the remaining Inline graphic bb-pairings must be selected among the mobiles Inline graphic that are yet unpaired. Both considerations can be exploited in terms of combinations using the definitions and the properties of Fig. 4.

Lemma 4

In the Inline graphic configuration, the number of all possible ways to select Inline graphic bb-pairings is:

graphic file with name pone.0059468.e276.jpg

Apart from the Inline graphic case, selecting Inline graphic bb-pairings is equivalent to consecutively choosing Inline graphic unordered pairs Inline graphic from the original set of Inline graphic infected mobiles. The first pair can be chosen in Inline graphic ways, the second pair in Inline graphic and so on. The division by Inline graphic is motivated by the fact that the particular ordering in which the Inline graphic pairs are chosen is irrelevant: the list Inline graphic is undistinguishable from the list Inline graphic. The number of these different ordering is precisely Inline graphic by definition of permutations. In the Inline graphic case, if Inline graphic there is only one way to choose Inline graphic bb-pairings, while if Inline graphic the unpaired infected mobile can only be Inline graphic, so from Inline graphic we have to subtract the case where the only bb-pairing involves Inline graphic, which is impossible. Finally, in the Inline graphic case with Inline graphic the unpaired infected mobile can be any Inline graphic with Inline graphic, and the total number of cases (which coincides with the number of cases where Inline graphic is selected, since all the clean mobiles are connected in these situations) is the sum of all cases with Inline graphic.

Lemma 5

In the Inline graphic configuration, with Inline graphic bb-pairings, the number of all possible cases when a particular Inline graphic is chosen is:

graphic file with name pone.0059468.e305.jpg

The result follows immediately from the cardinality equations in Fig. 4, in particular from the fact that among all combinations of Inline graphic objects in groups of Inline graphic elements, a particular element is selected exactly Inline graphic times. When Inline graphic is even and Inline graphic we follow the convention Inline graphic for Inline graphic. In case Inline graphic, since all the non infected mobiles are selected, the possible ways to select them are exactly their permutations.

This completes the expansion of Eq. 3 into Eq. 2.

Equivalence between the recursive and the closed formula can be proven by showing that Eq. 2 satisfies the recursive relations of Eq. 1. The analytical proof of the equivalence involves working out a large number of cumbersome identities of binomial coefficients and factorials: in the last Section, we will briefly outline a sketch of the proof in the simple case Inline graphic. Numerically, the differences between the two formulæ are below machine precision for Inline graphic.

We conclude the Section with the observation that the sum of the total number of cases weighted by their corresponding probabilities adds up correctly to one:

graphic file with name pone.0059468.e316.jpg

because of the following counting lemma.

Lemma 6

In the Inline graphic configuration with Inline graphic bb-pairings, the number Inline graphic of all possible ways to select the remaining clean mobiles for pairing is:

graphic file with name pone.0059468.e320.jpg

Apart from the Inline graphic case, when there are Inline graphic bb-pairings, Inline graphic infected mobiles remain to be connected with Inline graphic clean devices. This is equivalent to compute the number of possible sets of Inline graphic elements from an initial set of Inline graphic clean mobiles: since here the ordering matters, this is the definition of dispositions (see Fig. 4) of Inline graphic elements from an original set of Inline graphic.

Note that, since in the case Inline graphic all the clean mobiles are selected, the two quantities Inline graphic and Inline graphic coincide.

Analytical and Computational Notes

Although defined only for positive integer values of Inline graphic and Inline graphic, it is possible to provide a graphical sketch of the shape of the function Inline graphic by linear interpolation on the non integer real values. In Fig. 5 we show both the tridimensional surface of Inline graphic and its corresponding contourplot for values of Inline graphic and Inline graphic ranging between 1 and 100. Asymptotically, the function Inline graphic converges to the following limits:

graphic file with name pone.0059468.e339.jpg (4)

Figure 5. Tridimensional surface (a) and corresponding levelplot (b) of Inline graphic for Inline graphic, linearly interpolated on the real non integer values.

Figure 5

Graphical examples of the behaviour stated in Eq. 4 are provided in Fig. 6, where a few curves of Inline graphic are plotted when one of the two parameters is kept constant (and equal to 10, 50, 100) and the other ranges between 0 and 100, together with the curve corresponding to Inline graphic for Inline graphic. When one of the two parameter is equal to a constant Inline graphic, the smaller is Inline graphic, the faster Inline graphic converges to the limits in Eq. 4.

Figure 6. Plot of curves of Inline graphic for different configurations Inline graphic.

Figure 6

In blue, we show three curves of Inline graphic for constant Inline graphic (Inline graphic solid line, Inline graphic dashed line and Inline graphic dotted line) and Inline graphic ranging from 0 to 100. All three curves approach the asymptotic value 0 for increasing Inline graphic, more rapidly for smaller values of Inline graphic. In black, we show the symmetric cases obtained keeping Inline graphic constant (Inline graphic solid line, Inline graphic dashed line and Inline graphic dotted line) and letting Inline graphic range from 0 to 100. Again, all three curves approach the asymptotic value 1 for increasing Inline graphic, more rapidly for smaller values of Inline graphic. The sawtooth shape of the curve Inline graphic for Inline graphic is due to the effect of the Inline graphic case, which induces abrupt differences in Inline graphic for consecutive values of Inline graphic (changing from even to odd). Finally, the dotted-dashed red line shows the curve of Inline graphic for Inline graphic ranging between 0 and 100: in this case, the curve gets very close to its asymptotic value 0.5 even with small values of Inline graphic; for instance, Inline graphic and Inline graphic.

Apart from its intrinsic theoretical relevance, the non recursive closed formula is essential for numerically compute Inline graphic. In fact, the computational cost is notably different by using either the recursive formula Eq. 3 or its closed form counterpart Eq. 2: namely, the explicit formula is much faster, as shown by the values reported in Table 1 and the curves plotted in Fig. 7. For the recursive formula the computing time shows an exponentially growing trends for increasing values of Inline graphic and Inline graphic, while for the non recursive formula the computing time is very small and minimally growing for Inline graphic and Inline graphic ranging between 0 and 100. Actually, the average time over 10 values using a Python implementation of the non recursive formula on a 24 core Intel Xeon E5649 CPU 2.53GHz Linux workstation with 47 GB RAM is 11 milliseconds for Inline graphic and 60 milliseconds for Inline graphic, with very limited standard deviation. On the same hardware, a Python implementation of the recursive formula took about 12 milliseconds for Inline graphic, 2.4 seconds for Inline graphic, 6 minutes for Inline graphic and more than 9 hours for Inline graphic, which was the largest tested value.

Table 1. Computing times (in seconds) required to compute Inline graphic by the recursive formula in Eq. 1 and the equivalent closed formula in Eq. 2, for different values of the number of infected (I) and susceptible (S).

I = S Recursive Closed Form
Min Mean Max Min Mean Max
5 0.012 0.012 0.013 0.011 0.011 0.012
10 0.012 0.013 0.013 0.011 0.012 0.012
15 0.013 0.013 0.014 0.011 0.011 0.012
20 0.031 0.031 0.032 0.011 0.011 0.012
25 0.223 0.229 0.235 0.011 0.011 0.012
30 2.365 2.449 2.491 0.012 0.012 0.012
35 26.203 26.757 27.419 0.012 0.013 0.013
40 361.621 362.351 362.894 0.014 0.014 0.014
45 3225.718 3287.492 3333.242 0.015 0.015 0.015
50 34336.694 34433.664 34555.204 0.016 0.015 0.016
55 0.018 0.018 0.019
60 0.020 0.021 0.021
65 0.023 0.023 0.023
70 0.026 0.027 0.027
75 0.030 0.030 0.030
80 0.035 0.035 0.035
85 0.039 0.040 0.040
90 0.046 0.046 0.046
95 0.052 0.052 0.052
100 0.060 0.060 0.061

In particular, Inline graphic, and only the closed formula was used for Inline graphic (due to the excessively long runtimes: e.g., computing Inline graphic by the recursive formula took more than 9 hours). Mean, maximum (Max) and minimum (Min) values for 10 replicates of each experiment are reported. All simulations were run on a 24 core Intel Xeon E5649 CPU 2.53GHz workstation with 47 GB RAM, Linux 2.6.32 (Red Hat 4.4.6), with software written in Python 2.6.6.

Figure 7. Plot of the computing times (in Inline graphic scale) needed to compute Inline graphic for different values of Inline graphic as listed in Table 1 .

Figure 7

Error bars range between minimum and maximum, while lines connect mean values; all values refer to 10 replicates. Solid line represents computing times obtained by using the recursive formula Eq. 1, while dotted line corresponds to the values produced by using the closed formula Eq. 2.

Proof of Equivalence in the Case Inline graphic

In this Section we show the kind of arguments involved in proving the equivalence between Eq. 1 and Eq. 2 by outlining the main steps of the proof in a simple case, i.e., when there as many infected as clean mobiles, and their numnber is even. Clearly, the general case is computationally far more complex, but it used the same ideas.

Proving the equivalence between the recursive and the combinatorial formula requires substituting the explicit expression for Inline graphic of Eq. 2 in its three occurrences in Eq. 1. We are assuming Inline graphic, thus in this case the identity we need to prove reads as follows:

graphic file with name pone.0059468.e360.jpg

or, equivalently:

graphic file with name pone.0059468.e361.jpg (5)

The expression for Inline graphic becomes:

graphic file with name pone.0059468.e363.jpg

where the upper bound is Inline graphic since the right-hand member vanishes for Inline graphic and the product symbols were eliminated by using the factorial and double factorial notations:

graphic file with name pone.0059468.e366.jpg

.

Analogously, the expansions for Inline graphic and Inline graphic become respectively:

graphic file with name pone.0059468.e369.jpg

Then the left-hand member of Eq. 5 reads as follows:

graphic file with name pone.0059468.e370.jpg

which, collecting common factors, reduces to:

graphic file with name pone.0059468.e371.jpg

Now, expanding the double factorial by the identity:

graphic file with name pone.0059468.e372.jpg

and carrying the terms not involving Inline graphic outside the summation symbol, the above quantity becomes:

graphic file with name pone.0059468.e374.jpg (6)

Now, applying the following identity

graphic file with name pone.0059468.e375.jpg

to Eq. 6 with Inline graphic, we obtain that

graphic file with name pone.0059468.e377.jpg

as claimed.

Acknowledgments

The authors thank two anonymous referees for their precious suggestions and notes, which helped in greatly improving the paper.

Funding Statement

The authors acknowledge funding by the EU FP7 Project EPIWORK. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript

References

  • 1. Wang P, González M, Hidalgo C, Barabási AL (2009) Understanding the spreading patterns of mobile phones viruses. Science 324: 1071–1076. [DOI] [PubMed] [Google Scholar]
  • 2.Nguyen HN, Shinoda Y (2009) A novel analytical framework to model malware diffusion in heterogeneous wireless networks. In: Proceedings of IEEE WoWMoM 09. IEEE, 1–10. [Google Scholar]
  • 3. Zanero S (2009) Wireless Malware Propagation: A Reality Check. IEEE Security & Privacy 7: 70–74. [Google Scholar]
  • 4. Guanhua Y, Eidenbenz S (2009) Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). IEEE Transactions on Mobile Computing 8: 353–368. [Google Scholar]
  • 5.Shuai F, Chang-Guang W, Li-Jing B, Qing-Yang H, Jian-Feng M (2009) Modeling and Analysis Malware Spread in Short-Range Wireless Networks. In: Proceedings of WiCom 09. IEEE, 1–4. [Google Scholar]
  • 6.Khouzani M (2011) Optimal control of mobile malware epidemics. Ph.D. thesis, University of Pennsylvania. [Google Scholar]
  • 7.Ghallali M, El Ouadghiri D, Essaaidi M, Boulmalf M (2011) Mobile phones security: the spread of malware via MMS and Bluetooth, prevention methods. In: Proceedings of MoMM 11. ACM, 256–259. [Google Scholar]
  • 8.La Polla M, Martinelli F, Sgandurra D (2012) A Survey on Security for Mobile Devices. IEEE Communications Surveys & Tutorials PP: 1–26. [Google Scholar]
  • 9. Ghallali M, El Ouahidi B (2012) Designing a new framework in order to limit the spread of malware in mobile phones. Int J EnCoTe 1: 1–8. [Google Scholar]

Articles from PLoS ONE are provided here courtesy of PLOS

RESOURCES