Node energy based virus propagation model for bluetooth
Title | Node energy based virus propagation model for bluetooth |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Nallusamy, T., Ravi, R. |
Conference Name | 2017 International Conference on Communication and Signal Processing (ICCSP) |
Keywords | Bluetooth, Bluetooth network, bluetooth security, composability, Computational modeling, computer network security, computer viruses, E-mail worm Propagation model, Electronic mail, Grippers, Human Behavior, human factor, mobile based Wireless technologies, Mobile communication, mobile computing, NBV model works, network traffic, node capacity, Node Energy Based Virus Propagation, Node energy based virus propagation model, optimal control, pubcrawl, resilience, Resiliency, security measures, smart phones, smart-phone Era, Virus Propagation, Viruses (medical) |
Abstract | With the continuous development of mobile based Wireless technologies, Bluetooth plays a vital role in smart-phone Era. In such scenario, the security measures are needed to be enhanced for Bluetooth. We propose a Node Energy Based Virus Propagation Model (NBV) for Bluetooth. The algorithm works with key features of node capacity and node energy in Bluetooth network. This proposed NBV model works along with E-mail worm Propagation model. Finally, this work simulates and compares the virus propagation with respect to Node Energy and network traffic. |
URL | https://ieeexplore.ieee.org/document/8286699/ |
DOI | 10.1109/ICCSP.2017.8286699 |
Citation Key | nallusamy_node_2017 |
- mobile computing
- Viruses (medical)
- Virus Propagation
- smart-phone Era
- smart phones
- security measures
- Resiliency
- resilience
- pubcrawl
- optimal control
- Node energy based virus propagation model
- Node Energy Based Virus Propagation
- node capacity
- network traffic
- NBV model works
- composability
- Mobile communication
- mobile based Wireless technologies
- human factor
- Human behavior
- Grippers
- Electronic mail
- E-mail worm Propagation model
- computer viruses
- computer network security
- Computational modeling
- Bluetooth
- Bluetooth network
- bluetooth security