浏览全部资源
扫码关注微信
[ "周海平(1977-),男,博士,绍兴文理学院计算机科学与工程系教授,主要研究方向为复杂网络、推荐算法、博弈论。" ]
[ "沈士根(1974-),男,博士,绍兴文理学院计算机科学与工程系教授,主要研究方向为无线传感器网络、物联网、博弈论。" ]
[ "黄龙军(1976-),男,博士,绍兴文理学院计算机科学与工程系讲师,主要研究方向为无线传感器网络、博弈论。" ]
[ "冯晟(1979-),男,博士,绍兴文理学院计算机科学与工程系讲师,主要研究方向为无线传感器网络、物联网、计算机视觉、智能机器人。" ]
网络出版日期:2018-11,
纸质出版日期:2018-11-20
移动端阅览
周海平, 沈士根, 黄龙军, 等. 基于博弈论的无线传感器网络恶意程序传播模型[J]. 电信科学, 2018,34(11):67-76.
Haiping ZHOU, Shigen SHEN, Longjun HUANG, et al. Game theory-based malware propagation model for wireless sensor network[J]. Telecommunications science, 2018, 34(11): 67-76.
周海平, 沈士根, 黄龙军, 等. 基于博弈论的无线传感器网络恶意程序传播模型[J]. 电信科学, 2018,34(11):67-76. DOI: 10.11959/j.issn.1000-0801.2018252.
Haiping ZHOU, Shigen SHEN, Longjun HUANG, et al. Game theory-based malware propagation model for wireless sensor network[J]. Telecommunications science, 2018, 34(11): 67-76. DOI: 10.11959/j.issn.1000-0801.2018252.
恶意程序传播是无线传感器网络(wireless sensor network,WSN)面临的一类重要安全问题。从博弈论的角度对WSN恶意程序传播的微观机理进行分析,建立了WSN的攻防博弈模型,求出了博弈模型的混合纳什均衡解,并根据博弈双方的混合纳什均衡策略确定恶意程序的传染概率,从而建立了WSN的恶意程序传播模型。通过使用元胞自动机方法对WSN的恶意程序传播过程进行模拟,揭示了恶意程序的传播速度与博弈参数之间的关系,研究结果对抑制WSN恶意程序传播具有理论指导意义。
Malware propagation is an important security problem faced by wireless sensor network (WSN).From the perspective of game theory
the microscopic mechanism of malware propagationin WSN was analyzed.The attack-defense game model of WSN was built
and the mixed Nash equilibrium solution of the model was obtained.With the solution
the infection probability of malware was determined and the theoretical model for the malware propagation in WSN was established.Meanwhile
a cellular automata model was proposed to simulate malware propagation process in WSN.Simulation experiments reveal the relationship between the propagation speed and the game parameters.The results of this study are of significance for people to formulate measures to reduce the propagation speed of malware.
张焕国 , 韩文报 , 来学嘉 , 等 . 网络空间安全综述 [J ] . 中国科学:信息科学 , 2016 , 46 ( 2 ): 125 - 164 .
ZHANG H G , HAN W B , LAI X J , et al . Surveyon cyberspace security [J ] . Scientia Sinica:Informationis , 2016 , 46 ( 2 ): 125 - 164 .
SHI H , WANG W , KWOK N , et al . Game theory for wireless sensor network:a survey [J ] . Sensors , 2012 , 12 ( 7 ): 113 - 122 .
沈士根 , 刘建华 , 曹奇英 . 博弈论与无线传感器网络安全 [M ] . 北京 : 清华大学出版社 , 2016 .
SHEN S G , LIU J H , CAO Q Y . Game theory meets wireless sensor network security [M ] . Beijing : Tsinghua University PressPress , 2016 .
ABDALZAHERM , SEDDIK K , ELSABROUTY M , et al . Game theory meets wireless sensor network security requirements and threats mitigation:asurvey [J ] . Sensors , 2016 , 16 ( 7 ): 1 - 27 .
沈士根 , 黄龙军 , 胡珂立 , 等 . 基于微分博弈的在线社交网络恶意程序传播优化控制方法 [J ] . 电信科学 , 2015 , 31 ( 10 ): 66 - 73 .
SHEN S G , HUANG L J , HU K L , et al . Differential game-based optimal control method for preventing malware propagation in online social network [J ] . Telecommunications Science , 2015 , 31 ( 10 ): 66 - 73 .
沈士根 , 冯晟 , 周海平 , 等 . 基于云计算和动态贝叶斯博弈的WSN恶意程序传播优化抑制方法 [J ] . 电信科学 , 2018 , 34 ( 9 ).
SHEN S G , FENG S , ZHOU H P , et al . Optimal approach to suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game [J ] . Telecommunications Science , 2018 , 34 ( 9 ).
沈士根 , 周海平 , 黄龙军 , 等 . 基于最优反应均衡的传感网恶意程序传播抑制方法 [J ] . 传感技术学报 , 2017 , 30 ( 10 ): 1589 - 1595 .
SHEN S G , ZHOU H P , HUANG L J , et al . Quanta response equilibrium-based method for preventing WSN malware infection [J ] . Chinese Journal of Sensors and Actuators , 2017 , 30 ( 10 ): 1589 - 1595 .
沈士根 , 黄龙军 , 周海平 , 等 . 面向恶意程序传播的异质WSN 稳态可用度评估 [J ] . 传感技术学报 , 2017 , 30 ( 7 ): 1100 - 1105 .
SHEN S G , HUANG L J , ZHOU H P , et al . Steady-state availability evaluation for heterogeneous WSN under malware infection [J ] . Chinese Journal of Sensors and Actuators , 2017 , 30 ( 7 ): 1100 - 1105 .
沈士根 , 范恩 , 胡珂立 , 等 . 面向恶意程序传播的传感网可靠度评估 [J ] . 电子学报 , 2018 , 46 ( 1 ): 75 - 81 .
SHEN S G , FAN E , HU K L , et al . Reliability evaluation for WSN with malware spread [J ] . Acta Electronica Sinica , 2018 , 46 ( 1 ): 75 - 81 .
庄克琛 , 张宏 , 张琨 , 等 . 无线传感器网络中的病毒传播动力学研究 [J ] . 计算机科学 , 2013 , 40 ( 3 ): 187 - 191 .
ZHUANG K C , ZHANG H , ZHANG K , et al . Analysis of spreading dynamics of virus in wireless sensor network [J ] . Computer Science , 2013 , 40 ( 3 ): 187 - 191 .
熊自立 , 韩兰胜 , 徐行波 , 等 . 基于博弈的无线传感器网络入侵检测模型 [J ] . 计算机科学 , 2017 , 44 ( S1 ): 326 - 332 .
XIONG Z L , HAN L S , XU H B , et al . Research on intrusion detection of wireless sensor network based on game theory [J ] . Computer Science , 2017 , 44 ( S1 ): 326 - 332 .
周伟伟 , 郁滨 . WSN 多阶段入侵检测博弈最优策略研究 [J ] . 电子与信息学报 , 2018 , 40 ( 1 ): 63 - 71 .
ZHOU W W , YU B . Optimal defense strategy in WSN based on the game of multi-stage intrusion detection [J ] . Journal of Electronics & Information Technology , 2018 , 40 ( 1 ): 63 - 71 .
CHENG Z . A differential game model between intrusion detection system and attackers for wireless sensor network [J ] . Wireless Personal Communications , 2016 , 90 ( 3 ): 1211 - 1219 .
SEDJELMACI H , SENOUCI S , ANSARI N . Intrusion detection and ejection framework against lethal attacks in UAV-aided network:a Bayesian game-theoretic methodology [J ] . IEEE Transactions on Intelligent Transportation Systems , 2017 , 18 ( 5 ): 1143 - 1153 .
王小明 , 李成博 , 李英姝 . 移动无线传感网恶意数据包传播随机模型 [J ] . 电子与信息学报 , 2013 , 35 ( 6 ): 1290 - 1297 .
WANG X M , LI C B , LI Y Z . A stochastic model of malicious data packet propagation in mobile wireless sensor network [J ] . Journal of Electronics & Information Technology , 2013 , 35 ( 6 ): 1290 - 1297 .
曹玉林 , 王小明 , 何早波 . 移动无线传感网中恶意软件传播的最优安全策略 [J ] . 电子学报 , 2016 , 44 ( 8 ): 1851 - 1857 .
CAO Y L , WANG X M , HE Z B . Optimal security strategy for malware propagation mobile wireless sensor network [J ] . Acta Electronica Sinica , 2016 , 44 ( 8 ): 1851 - 1857 .
SINGH A , AWASTHI A , SINGH K , et al . Modeling and analysis of worm propagation in wireless sensor network [J ] . Wireless Personal Communications , 2018 , 98 ( 3 ): 2535 - 2551 .
WANG T , WU Q , WEN S , et al . Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator network [J ] . Sensors , 2017 , 17 ( 12 ): 139 - 155 .
LIU W,LIU,C , YANG Z , et al . Modeling the propagation of mobile malware on complex network [J ] . Communications in Nonlinear Science and Numerical Simulation , 2016 ( 37 ): 249 - 264 .
CHRISTOPHE B , LIZA C , CORINNE T . Optimal design and defense of network under link attacks [J ] . Journal of Mathematical Economics , 2017 ( 68 ): 62 - 79 .
0
浏览量
498
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构