期刊文献+

无线传感器网络中恶意程序的传播模型 被引量:3

Malware Propagation Model in Wireless Sensor Network
在线阅读 下载PDF
导出
摘要 由复杂网络理论得出一种无线传感器网络的模型,结合IEEE 802.15.4标准及流行病学理论,综合考虑目前传感器网络通过节点休眠与唤醒机制来节约能耗,提出一种无线传感器网络中恶意程序传播的SIR/WS模型。该模型描述了感染节点以广播方式传播恶意程序的过程,发现提高免疫率及降低传染率均可抑制恶意程序在无线传感器网络中的传播。仿真结果表明,该模型能较好地描述无线传感器网络中恶意程序的传播特性。 A SIR/WS model of malware propagation in Wireless Sensor Network(WSN) is proposed after the model of WSN is obtained. Based on IEEE 802.15.4 and epidemic theories, the model considers the mechanism of saving energy and describes the broadcasting process of malware in the WSN. It is found that the propagation of malware in the WSN can be restrained by increasing the recovery rate and decreasing the infection rate. Simulation results show that the model works well.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第3期129-131,共3页 Computer Engineering
基金 国家自然科学基金资助项目"自组织可重构的空间信息网安全组网技术研究"(60872041) 河北省教育厅科研基金资助项目"移动自组网环境下蠕虫的建模与检测技术研究"(2010257) 河北师范大学博士基金资助项目(L2009B04)
关键词 无线传感器网络 休眠/唤醒 恶意程序 传播模型 仿真 Wireless Sensor Network(WSN) sleep/wake-up malware propagation model simulation
  • 相关文献

参考文献7

  • 1Akyildiz L F,Wang Su.Wireless Sensor Networks:A Survey[J].Computer Networks,2002,38(4):393-422.
  • 2王长广,沈玉龙,马建峰.一种蓝牙环境下恶意程序的传播模型[J].西安电子科技大学学报,2009,36(1):94-98. 被引量:2
  • 3De P,Liu Yonghe,Das S K.Modeling Node Compromise Spreading in Wireless Sensor Networks Using Epidemic Theory[C]//Proc.of IEEE WoWMoM'06.Buffalo-Niagara Falls,USA:[s.n.],2006.
  • 4冯朝胜,邓婕,秦志光,刘霞,劳伦斯.库珀特.即时通信蠕虫传播建模[J].计算机工程,2010,36(5):143-145. 被引量:5
  • 5Mickens J W,Noble B D.Modeling Epidemic Spreading in Mobile Envimnments[C]//Proc.of the 4th ACM Workshop on Wireless Secudty.Cologne,Germany:ACM Press,2005:77-86.
  • 6Sun Bo,Yah Guanhua,Xiao Yang.Self-propagating Mal-packets in Wireless Sensor Network:Dynamics and Defense Implicarlons[J].Ad Hoe Networks,2009,7(8):1489-1500.
  • 7陈白,杜硕,刘彬,郝晓辰.WSN中基于能量的分布式覆盖控制算法[J].计算机工程,2010,36(14):102-104. 被引量:1

二级参考文献20

共引文献5

同被引文献31

  • 1王长广.无线环境下恶意程序的传播机制研究[D].西安:电子科技大学,2006.
  • 2Royer E,Melliar-Smith P M,Moser L.An analysis of optimum node density for ad Hoc mobile networks[C]//Proc.IEEE.ICC,June 2001:857-861.
  • 3Yoon J,Liu Ming-yan,Noble B.Random waypoint considered harmful[C]//Twenty-Second Annual Joint Conference of the IEEE Computer and Communications.2003:1312-1321.
  • 4Bettstetter C,Krause O.On border effects in modeling mo simulation of wireless ad hoc networks[C]// The 3rd IEEE International Conference on Mobile and Wireless Communication Networks.August 2001.
  • 5Bettstetter C,Resta G,Santi P.The node distribution of the random waypoint mobility mobility for wireless ad hoc networks[J].IEEE Transactions on Mobile Computing,2003,2 (3):257-269.
  • 6方宝平.复杂网络的病毒传播及免疫策略[D].合肥:安徽大学,2011.
  • 7Perrig A, Stankovic, Wagner D. Security in wireless sensor networks [ J ]. Communications of the ACM ,2004 ,47 (6) :53 - 57.
  • 8Khosroshahy M, Ali M K M, D Y Qiu. The SIC botnet lifecycle model:A step beyond traditionalepidemiological models [ J ]. Computer Networks ,2013,57 (2) :404 - 421.
  • 9T Chen, XS Zhang,Y Wu. FPM :Four- factor propagation model for passive P2P worms [ J ]. Future generation Computer Sys- tem,2014,36(7) : 133 - 141.
  • 10Mills K L. A Brief Survey of Self- Organization in Wireless Sensor Networks [ J ]. WirelessCommunications and Mobile Compu- ting,2007,7 (7) : 823 - 834.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部