期刊文献+

基于能量有限型无线传感网的恶意软件攻防优化策略 被引量:3

An Optimal Strategy on Malware Attack and Defense in Energy-Constrained Wireless Sensor Networks
下载PDF
导出
摘要 本文针对目前无线传感网络中恶意软件模型化工作的不足,从攻击与防御角度出发,考虑了攻击扫描速率对于攻防优化策略的不同意义,同时考虑了无线传感节点能量有限的特征,在传统恶意软件传播模型的基础上提出了一种改进的无线传感网络恶意软件攻防优化模型。该模型在传统SIR传播模型基础上进行扩展,考虑了免疫与修复的不同因素,最终给出了攻防优化评估方案。通过仿真实验表明,该攻防优化评估方案能够高效地描述攻击扫描参数对恶意软件在无线传感网络中攻击与防御各自效果最大化的关键影响。 As for the shortcomings of the research on malware modeling in wireless sensor networks the paper starts from the attack and defense perspectives,and considers the impact under the scanning rate on the optimal strategy of attack or defense,and takes the energy-constrained property in wireless sensor networks into account.Then an paper novelly proposes an optimal model on malware attack and defense in WSNs based on the traditional malware propagation models.The model is extended from the traditional SIR propagation model and the immunization and healing factors are also concerned.Finally,an optimal solution to evaluating the effectiveness of attack and defense is given.The simulation experiment indicates that this optimal evaluation strategy is able to effectively depict the scanning rate's key impact on the maximal results for both attack's and defense's point of view.
出处 《计算机工程与科学》 CSCD 北大核心 2011年第5期22-26,共5页 Computer Engineering & Science
基金 江苏省高校自然科学基础研究基金项目(08kjd520002) 常州工学院自然科学基金项目(YN0809 YN0903)
关键词 无线传感网络 模型化 恶意软件 优化策略 WSN modeling malware optimal strategy
  • 相关文献

参考文献7

  • 1Hu Y, Perrig A, Johnson D. Packet Leashes:A Defense A- gainst Wormhole Attacks in Wireless Networks[C]//Proc of the Twenty Second Annual Joint Conf of the IEEE Computer and Communications Societies, 2003 :1976-1986.
  • 2Karlof C,Wagner D. Secure Routing in Wireless Sensor Net- works: Attacks and Countermeasures [J]. Ad Hoc Net- works, 2003,1(2- 3) :293-315.
  • 3Douceur J. The Sybil Attack[C]//Proc of the First lnt'l Workshop on Peer-to Peer Systems, 2002:251-260.
  • 4Daley D,Gani J. Epidemic Modelling: An Introduction[M]. Cambridge Universily Press, 2001.
  • 5Tanachaiwiwat S H A. Encounter-Based Worms: Analysis and Defense[J]. Ad Hoc Networks, 2009,7(7):1414-1430.
  • 6Zou C, Gong W, Towsley D. Worm Propagation Modeling and Analysis Under Dynamic Quarantine Defense[C]//Proc of the 2003 ACM Workshop on Rapid Malcode, 2003:51- 60.
  • 7Karyotis V, Papavassiliou S. Risk-Based Attack Strategies for Mobile Ad Hoe Networks Under Probabilistic Attack Modeling Framework[J]. Computer Networks, 2007,51 (9) : 2397-2410.

同被引文献20

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部