Author
Abstract
Wireless mesh networks (WMN) are characterized by multi-hop transmission and dynamic routing, enabling wide-area coverage and flexible communication. However, these same features also facilitate the rapid spread of malicious code, posing severe threats to device security and user privacy in Internet-connected environments. To address this challenge, this study proposes a joint defense mechanism based on the integration of cloud computing and wireless mesh networks (Cloud-WMN), combining cloud-side security analysis with frequent inter-node communications inherent to WMN. A core innovation of this work is the introduction of a warning state into the classical Susceptible-Infectious-Recovered (SIR) model, resulting in an enhanced Susceptible-Infectious-Recovered-Warning (SIR-W) model that more accurately captures the early detection and response phases of malicious code spread. Through analytical derivation, the propagation threshold and equilibrium points are obtained, and the stability of the system is rigorously verified using a Lyapunov function. Numerical simulations demonstrate that under continuous attack, the proposed SIR-W model reduces the number of infected nodes by 44.8% compared to the classical SIR model, 39.3% compared to a cloud-security-only model, and 9.9% compared to a point-to-group communication model lacking security detection. These results suggest that the proposed model enhances malicious code containment while offering a practical and scalable solution for real-world WMN, including smart cities, industrial IoT, and emergency networks where early warning and adaptive defense are vital.
Suggested Citation
Yafei Bie & Jianguo Ren, 2025.
"A model for malicious code propagation in wireless mesh networks based on cloud security defense,"
Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 88(4), pages 1-15, December.
Handle:
RePEc:spr:telsys:v:88:y:2025:i:4:d:10.1007_s11235-025-01355-2
DOI: 10.1007/s11235-025-01355-2
Download full text from publisher
As the access to this document is restricted, you may want to
for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:telsys:v:88:y:2025:i:4:d:10.1007_s11235-025-01355-2. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.