{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:47:24Z","timestamp":1753886844331,"version":"3.41.2"},"reference-count":36,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,5,15]],"date-time":"2018-05-15T00:00:00Z","timestamp":1526342400000},"content-version":"vor","delay-in-days":134,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602376","U1334211","U1534208","61602374","61702411"],"award-info":[{"award-number":["61602376","U1334211","U1534208","61602374","61702411"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Natural Science Foundation of Shanxi Province","doi-asserted-by":"publisher","award":["2017JQ6020"],"award-info":[{"award-number":["2017JQ6020"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009103","name":"Education Department of Shaanxi Province","doi-asserted-by":"publisher","award":["16JK1573"],"award-info":[{"award-number":["16JK1573"]}],"id":[{"id":"10.13039\/501100009103","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009021","name":"Xi'an University of Technology","doi-asserted-by":"publisher","award":["112-256081504","112-451016007"],"award-info":[{"award-number":["112-256081504","112-451016007"]}],"id":[{"id":"10.13039\/501100009021","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Mobile botnet has recently evolved due to the rapid growth of smartphone technologies. Unlike legacy botnets, mobile devices are characterized by limited power capacity, calculation capabilities, and wide communication methods. As such, the logical topology structure and communication mode have to be redesigned for mobile botnets to narrow energy gap and lower the reduction speed of nodes. In this paper, we try to design a novel Gini\u2010based energy balancing scheme (Gleer) for the atomic network, which is a fundamental component of the heterogeneous multilayer mobile botnet. Firstly, for each operation cycle, we utilize the dynamic energy threshold to categorize atomic network into two groups. Then, the Gini coefficient is introduced to estimate botnet energy gap and to regulate the probability for each node to be picked as a region C&amp;C server. Experimental results indicate that our proposed method can effectively prolong the botnet lifetime and prevent the reduction of network size. Meanwhile, the stealthiness of botnet with Gleer scheme is analyzed from users\u2019 perspective, and results show that the proposed scheme works well in the reduction of user\u2019 detection awareness.<\/jats:p>","DOI":"10.1155\/2018\/7805408","type":"journal-article","created":{"date-parts":[[2018,5,15]],"date-time":"2018-05-15T23:31:52Z","timestamp":1526427112000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Gleer: A Novel Gini\u2010Based Energy Balancing Scheme for Mobile Botnet Retopology"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6575-1954","authenticated-orcid":false,"given":"Yichuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yefei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenjiang","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2507-5143","authenticated-orcid":false,"given":"Yanxiao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,5,15]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15877-3_7"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44318-8_8"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501659"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14215-4_4"},{"key":"e_1_2_11_5_2","doi-asserted-by":"crossref","unstructured":"ZengY. ShinK. G. andHuX. Design of SMS commanded-and-controlled and P2P-structured mobile botnets Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks WiSec\u203212 April 2012 usa 137\u2013148 2-s2.0-84860677644 https:\/\/doi.org\/10.1145\/2185448.2185467.","DOI":"10.1145\/2185448.2185467"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40253-6_2"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2012.013012.00028"},{"key":"e_1_2_11_8_2","doi-asserted-by":"crossref","unstructured":"CaoL.andQiuX. ASP2P: An advanced botnet based on social networks over hybrid P2P Proceedings of the 22nd Wireless and Optical Communications Conference WOCC 2013 May 2013 chn 677\u2013682 2-s2.0-84893300446 https:\/\/doi.org\/10.1109\/WOCC.2013.6676460.","DOI":"10.1109\/WOCC.2013.6676460"},{"key":"e_1_2_11_9_2","doi-asserted-by":"crossref","unstructured":"MalatrasA. FreyssinetE. andBeslayL. Mobile Botnets Taxonomy and Challenges Proceedings of the European Intelligence and Security Informatics Conference EISIC 2015 September 2015 gbr 149\u2013152 2-s2.0-84964691706 https:\/\/doi.org\/10.1109\/EISIC.2015.13.","DOI":"10.1109\/EISIC.2015.13"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.03.007"},{"key":"e_1_2_11_11_2","first-page":"385","article-title":"A Survey of Localization in Wireless Sensor Network","volume":"1","author":"Chu","year":"2012","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2412971"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2653109"},{"key":"e_1_2_11_14_2","doi-asserted-by":"crossref","unstructured":"RatheeM.andKumarS. Quantum inspired genetic algorithm for multi-hop energy balanced unequal clustering in wireless sensor networks Proceedings of the 9th International Conference on Contemporary Computing IC3 2016 August 2016 ind 2-s2.0-85018492378 https:\/\/doi.org\/10.1109\/IC3.2016.7880239.","DOI":"10.1109\/IC3.2016.7880239"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"e_1_2_11_16_2","unstructured":"SmaragdakisG. IbrahimM. andBestavrosA. SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks Proceedings of the International workshop in San Patrignano 2004 Citeseer."},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.41"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1785-9"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3986"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.1.235-243"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pisc.2015.11.006"},{"key":"e_1_2_11_22_2","doi-asserted-by":"crossref","unstructured":"JiyeY. ShenJ. YeH. WangY. LiJ. CuicuiJ. andLiW. Gini coefficient constraint method for making monthly trade schedule of directly dispatched thermal power generation units Proceedings of the 2016 IEEE PES Asia Pacific Power and Energy Engineering Conference APPEEC 2016 October 2016 chn 2000\u20132006 2-s2.0-85009961951 https:\/\/doi.org\/10.1109\/APPEEC.2016.7779884.","DOI":"10.1109\/APPEEC.2016.7779884"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1080\/23737484.2015.1044050"},{"key":"e_1_2_11_24_2","first-page":"275","article-title":"An convenient method to calculate Gini coefficient","volume":"6","author":"Jianhua Z.","year":"2007","journal-title":"Journal of Shanxi Agricultural University: Social Science Edition"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510385"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.4236\/ojs.2013.33018"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1248.2011.00134"},{"key":"e_1_2_11_28_2","doi-asserted-by":"crossref","unstructured":"TremblayO. DessaintL.-A. andDekkicheA.-I. A generic battery model for the dynamic simulation of hybrid electric vehicles Proceedings of the IEEE Vehicle Power and Propulsion Conference (VPPC \u203207) September 2007 Arlington Va USA IEEE 284\u2013289 https:\/\/doi.org\/10.1109\/vppc.2007.4544139 2-s2.0-51649131481.","DOI":"10.1109\/VPPC.2007.4544139"},{"key":"e_1_2_11_29_2","doi-asserted-by":"crossref","unstructured":"PrasadS. G. R. VivekR. MungaraJ. andSebastianE. J. NS3 simulation studies for optimized neighbour discovery in 6LoWPAN networks Proceedings of the 3rd IEEE International Symposium on Wireless Systems within the IEEE International Conferences on Intelligent Data Acquisition and Advanced Computing Systems IDAACS-SWS 2016 September 2016 deu 15\u201318 2-s2.0-85014302391 https:\/\/doi.org\/10.1109\/IDAACS-SWS.2016.7805777.","DOI":"10.1109\/IDAACS-SWS.2016.7805777"},{"key":"e_1_2_11_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2580571"},{"key":"e_1_2_11_31_2","doi-asserted-by":"publisher","DOI":"10.1149\/1.2423659"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.288"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2290197"},{"key":"e_1_2_11_34_2","doi-asserted-by":"crossref","unstructured":"YanQ. ZhengY. JiangT. LouW. andHouY. T. PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis Proceedings of the 34th IEEE Annual Conference on Computer Communications and Networks IEEE INFOCOM 2015 May 2015 hkg 316\u2013324 2-s2.0-84954215650 https:\/\/doi.org\/10.1109\/INFOCOM.2015.7218396.","DOI":"10.1109\/INFOCOM.2015.7218396"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_13"},{"key":"e_1_2_11_36_2","doi-asserted-by":"crossref","unstructured":"OhT. JadhavS. andKimY. H. Android botnet categorization and family detection based on behavioural and signature data Proceedings of the 6th International Conference on Information and Communication Technology Convergence ICTC 2015 October 2015 kor 647\u2013652 2-s2.0-84964807369 https:\/\/doi.org\/10.1109\/ICTC.2015.7354630.","DOI":"10.1109\/ICTC.2015.7354630"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/7805408.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/7805408.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/7805408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:28:25Z","timestamp":1723012105000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/7805408"}},"subtitle":[],"editor":[{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/7805408"],"URL":"https:\/\/doi.org\/10.1155\/2018\/7805408","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-03-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7805408"}}