期刊文献+

移动无线传感网恶意数据包传播随机模型 被引量:11

A Stochastic Model of Malicious Data Packet Propagation in Mobile Wireless Sensor Networks
在线阅读 下载PDF
导出
摘要 该文基于随机元胞自动机理论研究移动无线传感器网络中恶意数据包的传播行为。依据移动无线传感器网络的信息扩散机制,设计节点移动模型、无线信道分配算法、信号干扰模型和恶意数据包传播模型,定义移动传感器网络环境下的元胞空间、元胞邻域、元胞状态以及状态转换规则,提出移动无线传感器网络中恶意数据包传播的随机元胞自动机模型,研究在不确定环境下恶意数据包传播的时空特征。研究结果表明该模型能够有效预测恶意数据包传播的趋势和空间分布状态,有效克服基于马尔科夫随机场理论、常微分方程或差分方程建立的恶意数据包传播模型而无法描述恶意数据包传播的空间分布状态的不足。 This paper investigates the propagation pattern of malicious data packets in Mobile Wireless Sensor Networks (MWSN) through employing the stochastic cellular automata. The corresponding network model, channel allocation mechanism, signal interference model and malicious packet propagation model are designed based on information communication characteristics of MWSN. The new cellular space, neighborhood and states as well as state transition rules are defined. Then a stochastic cellular automaton model for modeling the propagation process of malicious packets in MWSN is proposed to study the spatial-temporal behavior characteristics of malicious data packet propagation in the uncertain environment. The results show that the proposed model can efficiently predict the propagation trend and the spatial distribution state of malicious data packets in MWSN, and overcome the disadvantages that no one of the Markov Random Field, the differential equation and the difference equation can describe the spatial distribution state of malicious data packet propagation in MWSN.
出处 《电子与信息学报》 EI CSCD 北大核心 2013年第6期1290-1297,共8页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60970054 61173094)资助课题
关键词 移动无线传感器网络 恶意数据包 元胞自动机 传播模型 Mobile Wireless Sensor Networks (MWSN) Malicious data packet Stochastic cellular automaton Propagation model
作者简介 通信作者:王小明wangxm@snnu.edu.cn王小明:男,1964年生,教授,博士,博士生导师,主要研究方向为无线传感器网络、信息系统安全、智能算法等. 李成博:男,1986年生,硕士,研究方向为无线传感器网络. 李英姝:女,1978年生,副教授,博士,主要研究方向为无线传感器网络.
  • 相关文献

参考文献16

  • 1Yick J, Mukherjee B, and Ghosal D. Wireless sensor network survey[J]. Computer Networks, 2008, 52(12): 2292-2330.
  • 2Kevin L M. A brief survey of self-organization in wireless sensor networks[J]. Wireless Communications and Mobile Computing, 2007, 7(7): 823-834.
  • 3Martin J C, Burge L L III, Gill J I, et al.. Modeling the spread of mobile malware[J]. InteT"national Journal of Computer Aided Engineering and Technology, 2010, 1(2): 3-14.
  • 4杨庚,王安琪,陈正宇,许建,王海勇.一种低耗能的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800. 被引量:58
  • 5Khouzani M H R, Sarkar S, and Altman E. Saddle-point strategies in malware attack[J]. IEEE Journal of Selected Areas in Communications, 2012, 30(1): 1-13.
  • 6Tripathy S and Nandi S. Defense against outside attacks in wireless sensor networks[J]. Computer Communications, 2008, 31(4): 818-826.
  • 7宋玉蓉,蒋国平,徐加刚.一种基于元胞自动机的自适应网络病毒传播模型[J].物理学报,2011,60(12):110-119. 被引量:17
  • 8Cheng S M, Ao W C, Chen P Y, et al.. On modeling malware propagation in generalized social networks[J]. IEEE Communications Letters, 2011, 15(1): 25-27.
  • 9Bettstetter C. Mobility modeling in wireless networks categorization, smooth movement, and border effects[J] Mobile Computing and Communications Review, 2001, 5(3) 55-66.
  • 10Wang Xiao-ming, Li Qiao-liang, and Li Ying-shu. EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks[J]. Journal of Combinatorial Optimization, 2010, 20(1): 47-62.

二级参考文献16

  • 1Bista R,Yoo H K,Chang J W.A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks//Proceedings of the 10th IEEE International Conference on Computer and Information Technology.Bradford,UK,2010.2463-2470.
  • 2Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks//Proceedings of the 9th ACM Conference on Computer and Communications Security.Washington,USA,2002:41-47.
  • 3Levis P,Lee N,Welsh M,Culler D.TOSSIM:Accurate and scalable simulation of entire TinyOS applications//Proeeedings of the 1st International Conference on Embedded Networked Sensor Systems.Los Angeles,USA,2003:126-137.
  • 4Szewcayk R,Ferencz A.Energy implications of network sensor designs.Berkeley:Berkeley Wireless Research Center Report,2000.
  • 5Intanagonwiwat C,Govindan R,Estrin D.Directed diffusion:A scalable and robust communication paradigm for sensor networks//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston,USA,2000:56-67.
  • 6Madden S,Franklin M J,Hellerstein J M.TAG:A tiny aggregation service for ad-hoc sensor networks//Proceedings of the 5th Symposium on Operating Systems Design and Implementation.New York,USA,2002:131-146.
  • 7He W,Liu X,Nguyen H,Nahrstedt K,Abdelzaher T.PDA:Privacy-preserving data aggregation in wireless sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications.Anchorage,AK,2007:2045-2053.
  • 8He W,Nguyen H,Liu X,Nahrstedt K,Abdelzaher T.iPDA:An integrity-protecting private dgta aggregation scheme for wireless sensor networks//Proceedings of the Military Communications Conference.San Diego,CA,2008:1-7.
  • 9He W,Liu X,Nguyen H,Nahrstedt K.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation//Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops.Montreal,QC,2009:14-19.
  • 10Girao J,Westhoff D,Schneider M.CDA:Concealed data aggregation for reverse multicast traffic in Wireless Sensor Networks//Proceedings of the 40th International Conference on Communications.Seoul,Korea,2005:3044-3049.

共引文献87

同被引文献113

  • 1徐鑫鑫,王玲,张衡阳.无线移动Ad hoc网络移动模型研究[J].计算机应用研究,2009,26(3):804-808. 被引量:7
  • 2艾森克,基恩.认知心理学[M].5版.上海:华东师范大学出版社,2009.
  • 3LIEN Y N, LIN Y S. Placement of control network for mobile agents over opportunistic networks [ C ]//Proc of IEEE International Confe- rence on Pervasive Computing and Communications Workshops. 2012 : 631-636.
  • 4LIU Shu, STRIEGEL A D. Exploring the potential in practice for op- portunistic networks amongst smart mobile devices [ C ]//Proc of the 19th Annum International Conference on Mobile Computing & Networ- king. New York:ACM Press,2013:315-326.
  • 5ZENG Yuan-yuan, XIANG Kai, LI De-shi, et al. Directional routing and scheduling for green vehicular delay tolerant networks [ J]. Wire- less networks,2013,19 ( 2 ) : 161-173.
  • 6ZHAO Lai-jun, WANG Qin, CHENG Jing-jing,et al. The impact of authorities' media and rumor dissemination on the evolution of emer- gency [ J]. Physica A: Statistical Mechanics and its Applica- tions,2012,391 ( 15 ) :39?8-3987.
  • 7ZHAO Lai-jun, WANG Jia-jia, CHEN Yu-cheng, et al. SIHR rumor spreading model in social networks[J]. Physica A:Statistieal Me- chanics and its Applications,2012,391 (7) : 2444-2453.
  • 8HUO Liang-an, HUANG Pei-qing, FANG Xing. An interplay model for authorities' actions and rumor spreading in emergency event [ J ]. Physica A: Statistical Mechanics and its Applications, 2011,390 ( 20 ) : 3267- 3274.
  • 9YAO Cui-you. The application study of simulation model based on cel- lular automata in the evolution of Interuet public opinion [ J ]. Applied Mechanics and Materials,2012,198:828-832.
  • 10DAADAA Y, FLOCCHINI P, ZAGUIA N. Decontamination with tem- poral immunity by mobile cellular automata [ C ]//Proc of International Conference on Scientific Computing. 2011 : 172-178.

引证文献11

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部