期刊文献+

无线传感器网络中的病毒传播动力学研究 被引量:7

Analysis of Spreading Dynamics of Virus in Wireless Sensor Networks
下载PDF
导出
摘要 从无线传感器网络的基本特征出发,结合传感器病毒感染过程的具体特点,对无线传感器网络上的病毒传播动力学进行研究。分别使用均匀随机分布、簇分布、二维高斯分布、随机格状分布方法来建立平面无线传感器网络模型;结合传染病理论,考虑了无线传感器网络的传播特征以及不同的MAC机制对传感器网络中病毒传播的影响,建立了无线传感网中病毒传播模型。仿真实验表明,有局部聚集的节点散布方式会加快病毒的传播,而采用休眠唤醒机制的通信方式能够限制病毒传播的速度,降低病毒在传感器网络中快速扩散的风险。 The spreading dynamics of wireless sensor networks (WSN) was analyzed by considering the basic charac- teristics of WSN and the characteristics of sensor virus infection process. The different WSN models were established by employing different sensor deployment patterns, which include uniform random deployment, clustered deployment, group Gaussian deployment and random grid deployment. A virus spreading model was established based on infectious disease theory by considering the propagation characteristics of WSN and the impact of different MAC mechanism on virus spreading in WSN. The simulations show that the local group node deployment pattern would speed up the sprea- ding of virus in WSN, while the sleep/wake up communication mechanism would slow down the spreading of virus, re- duce the risk of the virus rapidly spreading in WSN.
出处 《计算机科学》 CSCD 北大核心 2013年第3期187-191,共5页 Computer Science
基金 国家自然科学基金(61003210) 江苏省自然科学基金(BK2011023 BK2011370) 江苏省"六大人才高峰项目"(11-C-028)资助
关键词 无线传感器网络 病毒传播模型 休眠唤醒模式 Wireless sensor networks(WSN), Virus spreading model, Sleep/wake-up mechanism
  • 相关文献

参考文献8

  • 1Yang Yi,Zhu Sen-cun,Cao Guo-hong.Improving sensor network immunity under worm attacks:a software diversity approach[C] //Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing.2008:149-158.
  • 2Gu Qi-jun,Noorani R.Towards self-propagate mal-packets in sensor networks[C] //Proceedings of the first ACM Conference on Wireless Network Security.2008.
  • 3Khayam S A,Radha H.Using Signal Processing Techniques to Model Worm Propagation over Wireless Sensor Networks[J].IEEE Signal Processing Magazine,2006,23(2):164-169.
  • 4Khayam S A,Radha H.A topologically-aware worm propagation model for wireless sensor networks[C] // Distributed Computing Systems Workshops.2005.25th IEEE International Conference.2005:210-216.
  • 5De P,Liu Yong-he,Das S K.Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory[J].ACM Transactions on Sensor Networks,2009,5 (3):413-425.
  • 6Bo Sun,Yan Guan-hua,Yang Xiao.Self-propagating mal-packets in wireless sensor network:Dynamics and Defense Implications[J].Ad Hoc Networks,2009,7 (8):1489-1500.
  • 7WANG Xiaoming,LI Yingshu.An Improved SIR Model for Analyzing the Dynamics of Worm Propagation in Wireless Sensor Networks[J].Chinese Journal of Electronics,2009,18(1):8-12. 被引量:15
  • 8宋玉蓉,蒋国平.无线传感器网络中恶意软件传播研究[J].南京邮电大学学报(自然科学版),2009,29(4):1-7. 被引量:2

二级参考文献4

共引文献15

同被引文献61

  • 1Modi C,Patel D,Borisaniya B,et al.A survey of intrusion detection techniques in cloud [J].Journal of Network and Computer Applications,2013,36(1):42-57.
  • 2Pradhan M,Pradhan S K,Sahu S K.A Survey on Detection Methods in Intrusion Detection System [J].International Journal of Computer Application,2012,3(2):81-90.
  • 3Teng Shao-hua,Du Hong-le,Wu Nai-qi,et al.A cooperative network intrusion detection based on fuzzy SVMs [J].Journal of Networks,2010,5(4):475-483.
  • 4Teng Shao-hua,Zhang Wei,Fu Xiu-fen,et al.Cooperative intrusion detection model based on state transition analysis[J].Lecture Notes in Computer Science,2008,5236:419-431.
  • 5Dolgikh A,Nykodym T,Skormin V,et al.Colored Petri nets as the enabling technology in intrusion detection systems [C]∥Proc.of the 2011 Military Communications Conference.IEEE,2011:1297-1301.
  • 6Kumar S.Classification and detection of computer intrusions[D].The degree of Doctor of Philosophy,Purdue University,1995.
  • 7Slagell M.The Design and Implementation of MAIDS (Mobile Agents for Intrusion Detection System) [D].The degree of Doctor of Philosophy,Iowa State University,2001.
  • 8Helmer G,Wong J,Slagell M,et al.Software fault tree and coloured petri net-based specification,design and implementation of agent-based intrusion detection systems [J].International Journal of Information and Computer Security,2007,1(1):109-142.
  • 9El Bouchti A,Haqiq A.Malicious Insider Attacks Based Colored Petri Nets Approach [J].International Journal of Engineering & Technology,2013,1(4):177-191.
  • 10Zhao W,Wang P,Zhang F.Extended Petri Net-Based Advanced Persistent Threat Analysis Model [C]∥Proc.of the 2013 3rd International Conference on Computer Engineering and Network.2013:429-434.

引证文献7

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部