期刊文献+

基于节点差异性的无线传感网恶意软件传播模型研究 被引量:1

Investigation of malware propagation model over wireless sensor network based on nodes' diversity
下载PDF
导出
摘要 针对目前无线传感网络中恶意软件模型化工作的不足,在二维元胞自动机基础上提出了节点差异性的恶意软件传播模型。该模型引入了MAC无线信道争用机制和邻域通信距离因素,描述了节点差异度对恶意软件在无线传感网传播扩散的影响。分析仿真实验表明,大规模无线传感网络的节点差异度、无线信道争用机制都对传播行为产生了重要影响,降低了恶意软件的传播速度。与传统传播模型相比,该模型更能够准确描述恶意软件在无线传感网络环境下的传播行为,为无线传感网络安全防御研究提供基础。 With the research on malware modeling in wireless sensor network is immature,this paper proposed the malware propagation model with the nodes' diversity based on the 2D cellular automata.It introduced the wireless channel MAC mechanism and the factor of the adjacent communication range into this model.Also depicted the impact of nodes' diversity on the malware spreading over the wireless sensor network.The analysis and simulation indicate that nodes' diversity of the large scale WSN and wireless channel MAC mechanism make the important influence on the spread of the malware and reduce the propagation speed.Compared with the traditional spreading model,this model can more accurately describe the dynamic behaviour of the malware propagation over the WSN,and produces the research foundation for security defense on WSN.
出处 《计算机应用研究》 CSCD 北大核心 2012年第1期316-318,321,共4页 Application Research of Computers
基金 江苏省高校自然科学基础研究基金资助项目(10kjd520007) 江苏省常州市社会发展科技计划资助项目(CS20100013)
关键词 无线传感网络 节点差异性 恶意软件 元胞自动机 模型化 wireless sensor networks(WSN) nodes' diversity malware cellular automata modeling
  • 相关文献

参考文献10

  • 1STAN I S, PAXSON V, WEAVER N. How to own the Intemet in your spare time[ C ]//Proc of the 11th USENIX Security Symposium. 2002 : 149-167.
  • 2ZOU C C, TOWSLEY D, GONG W B. Modeling and simulation study of the propagation and defense of Internet e-mail worms [ J ]. IEEE Trans on Dependable and Secure Computing, 2007,4(2) :105-118.
  • 3ZOU C C, GONG W, TOWSLEY D. Code red worm propagation modeling and analysis [ C ]//Proc of the 9th ACM Conference on Computer and Communications Security. 2002 : 138-147.
  • 4PASTOR-SATORRAS R, VESP I I A. Epidemic spreading in scale free networks [ J ]. Physical Review Letters,2001,86 (14) : 3200- 3203.
  • 5NEWMAN M E J, FORREST S, BALTHROP J. E-mail networks and the spread of computer viruses [ J ]. Physical Review E, 2002,66 (3) :35101.
  • 6KHAYAM S A, RADHA H. Using signal processing techniques to model worm propagation over wireless sensor networks [ J ]. IEEE Signal Processing Magazine, 2006,23 (2) : 164-169.
  • 7DE P, LIU Y, DAS S K. Modeling node compromise spread in wireless sensor networks using epidemic theory[ C ]//Proc of International Symposium on World of Wireless, Mobile and Multimedia Networks. 2006 : 237 - 243.
  • 8TANACHAIWIWAT S, HELMY A. Encounter-based worms : analysis and defense[ J]. Ad hoe Networks ,2009,7 (7) : 1414-1430.
  • 9OLINKY R, STONE L. Unexpected epidemic thresholds in heterogeneous networks [J]. Physical Review E,2004,70(3 ) :30902.
  • 10宋玉蓉,蒋国平.节点抗攻击存在差异的无尺度网络恶意软件传播研究[J].物理学报,2010,59(2):705-711. 被引量:7

二级参考文献2

共引文献6

同被引文献21

  • 1艾森克,基恩.认知心理学[M].5版.上海:华东师范大学出版社,2009.
  • 2LIEN Y N, LIN Y S. Placement of control network for mobile agents over opportunistic networks [ C ]//Proc of IEEE International Confe- rence on Pervasive Computing and Communications Workshops. 2012 : 631-636.
  • 3LIU Shu, STRIEGEL A D. Exploring the potential in practice for op- portunistic networks amongst smart mobile devices [ C ]//Proc of the 19th Annum International Conference on Mobile Computing & Networ- king. New York:ACM Press,2013:315-326.
  • 4ZENG Yuan-yuan, XIANG Kai, LI De-shi, et al. Directional routing and scheduling for green vehicular delay tolerant networks [ J]. Wire- less networks,2013,19 ( 2 ) : 161-173.
  • 5ZHAO Lai-jun, WANG Qin, CHENG Jing-jing,et al. The impact of authorities' media and rumor dissemination on the evolution of emer- gency [ J]. Physica A: Statistical Mechanics and its Applica- tions,2012,391 ( 15 ) :39?8-3987.
  • 6ZHAO Lai-jun, WANG Jia-jia, CHEN Yu-cheng, et al. SIHR rumor spreading model in social networks[J]. Physica A:Statistieal Me- chanics and its Applications,2012,391 (7) : 2444-2453.
  • 7HUO Liang-an, HUANG Pei-qing, FANG Xing. An interplay model for authorities' actions and rumor spreading in emergency event [ J ]. Physica A: Statistical Mechanics and its Applications, 2011,390 ( 20 ) : 3267- 3274.
  • 8YAO Cui-you. The application study of simulation model based on cel- lular automata in the evolution of Interuet public opinion [ J ]. Applied Mechanics and Materials,2012,198:828-832.
  • 9DAADAA Y, FLOCCHINI P, ZAGUIA N. Decontamination with tem- poral immunity by mobile cellular automata [ C ]//Proc of International Conference on Scientific Computing. 2011 : 172-178.
  • 10DAADAA Y. Network decontamination with temporal immunity [ D ]. Ottawa: University of Ottawa,2012.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部