浏览全部资源
扫码关注微信
1. 东华大学,上海 201620
2. 绍兴文理学院,浙江 绍兴 312000
[ "张红(1984- ),女,东华大学计算机科学与技术学院博士生,主要研究方向为无线传感器网络、网络空间安全、博弈论。" ]
[ "沈士根(1974- ),男,博士,绍兴文理学院计算机科学与工程系教授,主要研究方向为无线传感器网络、物联网、博弈论。" ]
[ "吴小军(1978- ),男,东华大学信息科学与技术学院博士生,主要研究方向为无线传感器网络、智能系统。" ]
[ "曹奇英(1960- ),男,博士,东华大学计算机科学与技术学院教授、博士生导师,主要研究方向为普适计算、智能信息处理。" ]
网络出版日期:2019-06,
纸质出版日期:2019-06-20
移动端阅览
张红, 沈士根, 吴小军, 等. 基于元胞自动机和静态贝叶斯博弈的WSN恶意程序传染模型[J]. 电信科学, 2019,35(6):60-69.
Hong ZHANG, Shigen SHEN, Xiaojun WU, et al. WSN malware infection model based on cellular automaton and static Bayesian game[J]. Telecommunications science, 2019, 35(6): 60-69.
张红, 沈士根, 吴小军, 等. 基于元胞自动机和静态贝叶斯博弈的WSN恶意程序传染模型[J]. 电信科学, 2019,35(6):60-69. DOI: 10.11959/j.issn.1000-0801.2019147.
Hong ZHANG, Shigen SHEN, Xiaojun WU, et al. WSN malware infection model based on cellular automaton and static Bayesian game[J]. Telecommunications science, 2019, 35(6): 60-69. DOI: 10.11959/j.issn.1000-0801.2019147.
基于元胞自动机理论和静态贝叶斯博弈,研究无线传感器网络(WSN)中恶意程序的传染模型。首先,依据元胞自动机理论,建立了WSN中恶意程序的传染模型。然后,基于静态贝叶斯博弈预测恶意程序的传染行为,得到博弈双方基于贝叶斯纳什均衡(Bayesian Nash equilibrium,BNE)确定的最优行动,并将其应用到上述传染模型,从而揭示恶意程序在WSN中的传染动力学特征。研究结果表明,该模型能揭示恶意程序在WSN中的传染行为,得到各种状态传感节点的数量随时间变化的动态演化趋势,对有效抑制WSN恶意程序传染有理论指导意义。
The theoretical model for the malware infection in wireless sensor networks (WSN) based on cellular automaton and static Bayesian game was studied.Firstly
the malware infection model of WSN based on cellular automaton was built.Secondly
the malware infection dynamics in WSN was predicted based on the static Bayesian game
through which malware and WSN systems would determine their optimal actions by Bayesian Nash equilibrium (BEN).Then the BEN was applied to the malware infection model to study the spatiotemporal dynamics characteristics of malware infection.Research results show that the proposed model can effectively predict the infection dynamics propagation process of malware in WSN
and the evolution trend of sensor nodes in various states with time
which are of significance for people to formulate measures to reduce the propagation speed of malware.
沈士根 , 黄龙军 , 周海平 , 等 . 面向恶意程序传播的异质WSN 稳态可用度评估 [J ] . 传感技术学报 , 2017 , 30 ( 7 ): 1100 - 1105 .
SHEN S G , HUANG L J , ZHOU H P , et al . Steady-state availability evaluation for heterogeneous WSN under malware infection [J ] . Chinese Journal of Sensors and Actuators , 2017 , 30 ( 7 ): 1100 - 1105 .
沈士根 , 周海平 , 黄龙军 , 等 . 基于最优反应均衡的传感网恶意程序传播抑制方法 [J ] . 传感技术学报 , 2017 , 30 ( 10 ): 1589 - 1595 .
SHEN S G , ZHOU H P , HUANG L J , et al . Quantal response equilibrium-based method for preventing WSN malware infection [J ] . Chinese Journal of Sensors and Actuators , 2017 , 30 ( 10 ): 1589 - 1595 .
沈士根 , 范恩 , 胡珂立 , 等 . 面向恶意程序传播的传感网可靠度评估 [J ] . 电子学报 , 2018 , 46 ( 1 ): 75 - 81 .
SHEN S G , FAN E , HU K L , et al . Reliability evaluation for WSN with malware spread [J ] . Acta Electronica Sinica , 2018 , 46 ( 1 ): 75 - 81 .
沈士根 , 冯晟 , 周海平 , 等 . 基于云计算和动态贝叶斯博弈的 WSN 恶意程序传播优化抑制方法 [J ] . 电信科学 , 2018 , 34 ( 9 ): 78 - 86 .
SHEN S G , FENG S , ZHOU H P , et al . Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game [J ] . Telecommunications Science , 2018 , 34 ( 9 ): 78 - 86 .
ZHU L , ZHAO H . Dynamical analysis and optimal control for a malware propagation model in an information network [J ] . Neurocomputing , 2015 ( 149 ): 1370 - 1386 .
WANG Y , WEN S , XIANG Y , et al . Modeling the propagation of worms in networks:a survey [J ] . IEEE Communications Surveys & Tutorials , 2014 , 16 ( 2 ): 942 - 960 .
HOSSEINI S , AZGOMI M A , RAHMANI A T . Malware propagation modeling considering software diversity and immunization [J ] . Journal of Computational Science , 2016 ( 13 ): 49 - 67 .
MOHI M , MOVAGHAR A , ZADEH P M . A Bayesian game approach for preventing DoS attacks in wireless sensor networks [C ] // 2009 WRI International Conference on Communications and Mobile Computing,Jan 6-8,2009,Kunming,China . Piscataway:IEEE Press , 2009 : 507 - 511 .
沈士根 , 刘建华 , 曹奇英 . 博弈论与无线传感器网络安全 [M ] . 北京 : 清华大学出版社 , 2016 .
SHEN S G , LIU J H , CAO Q Y . Game theory and wireless sensor network security [M ] . Beijing : Tsinghua University PressPress , 2016 .
SHEN S , LI H , HAN R , et al . Differential game-based strategies for preventing malware propagation in wireless sensor networks [J ] . IEEE Transactions on Information Forensics and Security , 2014 , 9 ( 11 ): 1962 - 1973 .
王晋东 , 余定坤 , 张恒巍 , 等 . 静态贝叶斯博弈主动防御策略选取方法 [J ] . 西安电子科技大学学报 , 2016 ( 1 ): 144 - 150 .
WANG J D , YU D K , ZHANG H W , et al . Active defense strategy based on the static Bayesian game [J ] . Journal of Xidian University , 2016 ( 1 ): 144 - 150 .
CHENG Z . A differential game model between intrusion detection system and attackers for wireless sensor networks [J ] . Wireless Personal Communications , 2016 , 90 ( 3 ): 1211 - 1219 .
CHEN Z , QIAO C , QIU Y , et al . Dynamics stability in wireless sensor networks active defense model [J ] . Journal of Computer and System Sciences , 2014 , 80 ( 8 ): 1534 - 1548 .
SEDJELMACI H , SENOUCI S , ANSARI N . Intrusion detection and ejection framework against lethal attacks in UAV-aided network:a Bayesian game-theoretic methodology [J ] . IEEE Transactions on Intelligent Transportation Systems , 2017 , 18 ( 5 ): 1143 - 1153 .
沈士根 , 黄龙军 , 范恩 , 等 . 受恶意程序传染的WSN可生存性评估 [J ] . 传感技术学报 , 2016 , 29 ( 7 ): 1083 - 1089 .
SHEN S G , HUANG L J , FAN E , et al . Survivability evaluation for WSN under malware infection [J ] . Chinese Journal of Sensors and Actuators , 2016 , 29 ( 7 ): 1083 - 1089 .
SINGH A , AWASTHI A , SINGH K , et al . Modeling and analysis of worm propagation in wireless sensor network [J ] . Wireless Personal Communications , 2018 , 98 ( 3 ): 2535 - 2551 .
王小明 , 李成博 , 李英殊 . 移动无线传感网恶意数据包传染随机模型 [J ] . 电子与信息学报 , 2013 , 35 ( 6 ): 1290 - 1297 .
WANG X M , LI C B , LI Y S . A stochastic model of malicious data packet propagation in mobile wireless sensor networks [J ] . Journal of Electronics & Information Technology , 2013 , 35 ( 6 ): 1290 - 1297 .
宋玉蓉 , 蒋国平 , 徐加刚 . 一种基于元胞自动机的自适应网络病毒传播模型 [J ] . 物理学报 , 2011 ( 12 ): 115 - 124 .
SONG Y R , JIANG G P , XU J G . An epidemic spreading modelin adaptive networks based on cellular automata [J ] . Acta Physica Sinica , 2011 ( 12 ): 115 - 124 .
WANG Y , LI D , DONG N . Cellular automata malware propagation model for WSN based on multi-player evolutionary game [J ] . IET Networks , 2018 , 7 ( 3 ): 129 - 135 .
FENG L , SONG L , ZHAO Q , et al . Modeling and stability analysis of worm propagation in wireless sensor network [J ] . Mathematical Problems in Engineering , 2015 : 1 - 8 .
曹玉林 , 赵焱鑫 , 王小明 . 基于元胞自动机的自适应网络断边重连策略研究 [J ] . 计算机应用研究 , 2016 ( 8 ): 2475 - 2478 .
CAO Y L , ZHAO Y X , WANG X M . Research on reconnecting strategy of adaptive networks based on cellular automata [J ] . Application Research of Computers , 2016 ( 8 ): 2475 - 2478 .
赵金皓 , 曹奇英 , 沈士根 . 受到恶意程序攻击的 MWSN 节点状态时空动力学分析 [J ] . 计算机应用与软件 , 2018 ( 6 ): 122 - 128 .
ZHAO J H , CAO Q Y , SHEN S G . Spatiotemporal dynamics analyses of mobile sensor nodes attacked by malware [J ] . Computer Applications and Software , 2018 ( 6 ): 122 - 128 .
SAYAD H M , WEN S , XIANG Y , et al . On the race of worms and patches:modeling the spread of information in wireless sensor networks [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 12 ): 2854 - 2865 .
BYUN H , YU J . Cellular-automaton-based node scheduling control for wireless sensor networks [J ] . IEEE Transactions on Vehicular Technology , 2014 , 63 ( 8 ): 3892 - 3899 .
刘玉岭 , 冯登国 , 吴丽辉 , 等 . 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估 [J ] . 软件学报 , 2012 ( 3 ): 712 - 723 .
LIU Y L , FENG D G , WU L H , et al . Performance evaluation of worm attack and defense strategies based on static Bayesian game [J ] . Journal of Software , 2012 ( 3 ): 712 - 723 .
0
浏览量
236
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构