期刊文献+

一种具有GAF分簇结构的无线传感器网络中恶意软件传播模型 被引量:2

A Malware Propagation Model With GAF-Based Clustering in Wireless Sensor Network
下载PDF
导出
摘要 传输环境和部署环境的开放性使无线传感器网络(WSN)的安全问题变得尤为重要,基于二维元胞自动机提出恶意软件SIR(susceptible-infected-recovered)传播模型,研究具有GAF分簇结构的WSN中恶意软件的传播动力学特征。研究结果表明:分簇的无线传感器网络仍然具有空间局域化结构特征,分簇不但能够降低各传感节点的能量消耗,也能够有效抑制恶意软件的传播,降低了病毒大规模传播的风险。但同时发现,簇头选举期间病毒传播速度有加速趋势。 Wireless sensor network(WSN) is often deployed in open environment,and uses wireless channel for data transmission,so the security in the network is very important.A SIR(susceptible-infected-recovered) model for malware propagation based on 2-Dcellular automata is proposed.Malware propagation in GAF-based clustering WSN is discussed.Analysis and simulation results show that the clustering WSN still process spatial localization,and clustering can reduce the energy consumption of each sensor node at the same time effectively restrain the malware propagation.It also shows that malware propagation will be accelerated in the cluster head selecting period.
出处 《电信科学》 北大核心 2011年第8期33-38,共6页 Telecommunications Science
基金 国家自然科学基金资助项目(No.60872057) 江苏省自然科学基金资助项目(No.BK2010526) 浙江省自然科学基金资助项目(No.Y107759 No.R1090244 No.Y1101237)
关键词 无线传感器网络 GAF 恶意软件传播 元胞自动机 wireless sensor network GAF malware propagation cellular automata
  • 相关文献

参考文献4

二级参考文献33

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2刘权兴,靳祯.Cellular automata modelling of SEIRS[J].Chinese Physics B,2005,14(7):1370-1377. 被引量:2
  • 3许丹,李翔,汪小帆.复杂网络病毒传播的局域控制研究[J].物理学报,2007,56(3):1313-1317. 被引量:63
  • 4Peeters J, Dyson P. Cost-effective security. IEEE Security and Privacy Magazine, May June 2007, 5(3): 85-87.
  • 5Pastor-Satorras R, Vespignani A. Epidemics and Immunization in Scale-Free Network. Handbook of Graphs and Networks: From the Genome to the Internet, Bornholdt S, Schuster H (eds.), Berlin: Wiley-VCH, 2002, pp.113-132.
  • 6Chen Z, Gao L, Kwiat K. Modeling the spread of active worms. In Proc. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Vol. Ⅲ, San Francisco, CA, USA, March April 2003, 1890-1900.
  • 7Zou C C, Gong W, Towsley D. Code red worm propagation modeling and analysis. In Proc. the 9th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, November 2002, pp.138-147.
  • 8Zou C C, Gong W, Towsley D, Gao L. The monitoring and early detection of Internet worms. IEEE//ACM Trans. Networking, October 2005, 13(5): 961-974.
  • 9Rohloff K, Basar T. Stochastic behavior of random constant scanning worms. In Proc. the 14th International Conference on Computer Communications and Networks ( ICCCN), San Diego, CA, USA, October 2005, pp.339-344.
  • 10Garetto M, Gong W, Towsley D. Modeling malware spreading dynamics. In Proc. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Vol. Ⅲ, San Francisco, CA, USA, March-April 2003, pp.1869- 1879.

共引文献47

同被引文献12

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部