A model for malicious code propagation in wireless mesh networks based on cloud security defense
Yafei Bie () and
Jianguo Ren ()
Additional contact information
Yafei Bie: Jiangsu Normal University
Jianguo Ren: Jiangsu Normal University
Telecommunication Systems: Modelling, Analysis, Design and Management, 2025, vol. 88, issue 4, No 7, 15 pages
Abstract:
Abstract Wireless mesh networks (WMN) are characterized by multi-hop transmission and dynamic routing, enabling wide-area coverage and flexible communication. However, these same features also facilitate the rapid spread of malicious code, posing severe threats to device security and user privacy in Internet-connected environments. To address this challenge, this study proposes a joint defense mechanism based on the integration of cloud computing and wireless mesh networks (Cloud-WMN), combining cloud-side security analysis with frequent inter-node communications inherent to WMN. A core innovation of this work is the introduction of a warning state into the classical Susceptible-Infectious-Recovered (SIR) model, resulting in an enhanced Susceptible-Infectious-Recovered-Warning (SIR-W) model that more accurately captures the early detection and response phases of malicious code spread. Through analytical derivation, the propagation threshold and equilibrium points are obtained, and the stability of the system is rigorously verified using a Lyapunov function. Numerical simulations demonstrate that under continuous attack, the proposed SIR-W model reduces the number of infected nodes by 44.8% compared to the classical SIR model, 39.3% compared to a cloud-security-only model, and 9.9% compared to a point-to-group communication model lacking security detection. These results suggest that the proposed model enhances malicious code containment while offering a practical and scalable solution for real-world WMN, including smart cities, industrial IoT, and emergency networks where early warning and adaptive defense are vital.
Keywords: Wireless mesh network; Cloud security; Malicious code; Sharing mechanism; Stability analysis (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s11235-025-01355-2 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:88:y:2025:i:4:d:10.1007_s11235-025-01355-2
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235
DOI: 10.1007/s11235-025-01355-2
Access Statistics for this article
Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan
More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().