期刊文献+

车载蠕虫传播建模与仿真 被引量:1

Modeling and Simulating Epidemics of Vehicular Worms
下载PDF
导出
摘要 通过对移动模式、通信信道、媒质访问控制和蠕虫传播等环节的建模,分析了蠕虫在车载自组网城市场景稳态下的理论传播结果,大量的蒙特卡洛实验揭示了最小至最大的传输半径、自由流至拥塞流的移动速度、稀疏态至密集态的节点密度等网络状态和媒质访问控制机制对蠕虫传播的影响。通过大量的网络仿真实验研究了蠕虫在相同场景动态下的实际传播结果,讨论了理论值与实际值的关联性,并分析了导致局部差异的原因,指出了感染概率与其他网络参数之间的内在联系,研究结果有助于为工程人员设计智能和自动的无线蠕虫检测和控制措施提供帮助。 The theoretic spreading results under an urban scenario with equilibrium traffic are analyzed through modeling mobility pattern, communication channel, medium access control, worm propagation, and others. The extensive Monte Carlo simulations uncover the effects of the transmission range (from a typical minimum to a maximum), the minimum velocity and the maximum velocity (from the free flow to the congested traffic), and the vehicle density (from a sparse topology to a dense spatial relation) on epidemic spreading of such worms in vehicular ad hoe networks. Further, the wireless worm propagation in the same scenario with dynamic traffic is simulated by using network simulation software, the correlation between theoretic results and practical outcome is discussed, and the reasons resulting in the local differences are also analyzed.
作者 梁广民 任安
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2013年第2期277-282,共6页 Journal of University of Electronic Science and Technology of China
基金 中国博士后科学基金(2011M500614)
关键词 移动模式 网络安全 传播模型 车载自组网 蠕虫 mobility pattern network security propagation model vehicular Ad-hoc networks WOrmS
  • 相关文献

参考文献16

  • 1KLEINBER(3 J. The wireless EPIDEMIC[J]. Nature, 2007, 449(7160): 287-288.
  • 2TANACHAIWIWAT S, HELMY A. Encounter-based worms: Analysis and defense[J]. Ad hoc Networks, 2009, 7(7): 1414-1430.
  • 3熊永平,孙利民,牛建伟,刘燕.机会网络[J].软件学报,2009,20(1):124-137. 被引量:324
  • 4COULL S E, SZYMANSKI B K. On the development of an intemetwork-centrie defense for scanning worms[J]. Computers & Security, 2009, 28(7): 637-647.
  • 5STEPHENSON B, SIKDAR B. A Quasi-Species model for the propagation and containment of polymorphic worms[J]. IEEE Transactions on Computers, 2009, 58(9): 1289-1296.
  • 6WANG J, LIU Y H, TIAN D X, et al. Intemet worm early detection and response mechanism[J]. Journal of China Universities of Posts and Telecommunications, 2007, 14(3): 79-84.
  • 7RHODESA C J, NEKOVEE M. The opportunistic transmission of wireless worms between mobile devices[J]. Physica A, 2008, 387(27): 6837-6844.
  • 8H,--MYERS'S, CC)LIZZA V, et al. Wi-Fi epidemiology: Can your neighbors router make yours sick?[J]. Proceedings of the National Academy of Sciences, 2009, 106(5): 1318- 1323.
  • 9SCNEWS. Lexus computers infected Via bluetooth[EB/OL]. [2005-01-26]. http://it.slashdot.org/it/05/01/26/188224.shtml? tid=220&tid=172&fid=193&tid=190&tid---218.
  • 10WANG Pu, GONZflLEZ M C, HIDALGO C A, et al. Understanding the spreading patterns of mobile phone viruses[J]. Science, 2009, 324(5930): 1071-I076.

二级参考文献67

  • 1Hull B, Bychkovsky V, Zhang Y, Chen K, Goraczko M, Miu A, Shih E, Balakrishnan H, Madden S. CarTel: A distributed mobile sensor computing system. In: Proc. of the 4th Int'l Conf. on Embedded Networked Sensor Systems. Boulder: ACM, 2006. 125-138.
  • 2Pan H, Chaintreau A, Scott J, Gass R, Crowcroft J, Diot C. Pocket switched networks and human mobility in conference environments. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM. 2005. 244-251.
  • 3Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D. Energy-Efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In: Proc. of the 10th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2002.96-107. DO1=http://doi.acm.org/10.1145/605397.605408
  • 4Pelusi L, Passarella A, Conti M. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, 2006,44(11): 134-141.
  • 5Conti M, Giordano S. Multihop ad hoe networking: The reality. Communications Magazine, 2007,45(4):88-95.
  • 6Fall K. A delay-tolerant network architecture for challenged Internets. In: Proc. of the 2003 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe: ACM, 2003.27-34.
  • 7Akyildiz IF, Akan B, Chert C, Fang J, Su W. InterPlaNetary Intemet: State-of-the-Art and research challenges. Computer Networks, 2003,43(2):75-112.
  • 8Gupta P, Kumar P. The capacity of wireless networks. IEEE Trans. on Information Theory, 2000,46(2):388-404.
  • 9Grossglauser M, Tse DNC. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. on Networking, 2002, 10(4):477-486.
  • 10Small T, Haas ZJ. The shared wireless infostation model: A new ad hoc networking paradigm (or where there is a whale, there is a way). In: Proc. of the 4th ACM Int'l Symp. on Mobile Ad Hoc Networking. Annapolis: ACM, 2003. 233-244.

共引文献323

同被引文献13

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部