浏览全部资源
扫码关注微信
1. 绍兴文理学院计算机科学与工程系,浙江 绍兴 312000
2. 浙江理工大学信息学院,浙江 杭州 310018
[ "叶晓彤(1978- ),男,绍兴文理学院计算机科学与工程系讲师,主要研究方向为无线传感器网络、物联网、网络空间安全、博弈论" ]
[ "孙文飞(1999- ),男,浙江理工大学信息学院硕士生,主要研究方向为物联网、网络空间安全" ]
[ "沈士根(1974- ),男,博士,绍兴文理学院计算机科学与工程系教授,主要研究方向为无线传感器网络、物联网、网络空间安全、博弈论" ]
网络出版日期:2021-04,
纸质出版日期:2021-04-20
移动端阅览
叶晓彤, 孙文飞, 沈士根. 基于扩展传染病模型和马尔可夫链的物联网可用度评估方法[J]. 电信科学, 2021,37(4):37-45.
Xiaotong YE, Wenfei SUN, Shigen SHEN. Availability evaluation method for extended epidemic model and Markov chain based IoT[J]. Telecommunications science, 2021, 37(4): 37-45.
叶晓彤, 孙文飞, 沈士根. 基于扩展传染病模型和马尔可夫链的物联网可用度评估方法[J]. 电信科学, 2021,37(4):37-45. DOI: 10.11959/j.issn.1000-0801.2021063.
Xiaotong YE, Wenfei SUN, Shigen SHEN. Availability evaluation method for extended epidemic model and Markov chain based IoT[J]. Telecommunications science, 2021, 37(4): 37-45. DOI: 10.11959/j.issn.1000-0801.2021063.
为反映恶意程序传播环境下物联网可用的状态,基于扩展的SEIRD传染病模型和马尔可夫链提出一种物联网可用度评估方法。根据物联网节点的实际状态,扩展经典传染病模型SIR建立SEIRD物联网节点状态转换模型。由物联网节点各个状态之间的动态变化过程,构建物联网节点处于5种状态的概率动力学方程,得到反映各状态转换的马尔可夫矩阵,进一步得到物联网节点的可用度计算方法。以典型的星形和簇形物联网拓扑结构为例,给出整个物联网可用度的评估方法。通过实验,为管理员如何合理部署正常工作节点数、路由数提供建议。研究成果对提高物联网可用度、促进物联网成功应用具有理论指导意义。
To reflect the availability status of the Internet of things (IoT) under malware diffusion
an availability evaluation method of IoT based on the extended epidemic model SEIRD and Markov chain was proposed.According to actual states of IoT nodes
the classic epidemic model SIR was extended to establish the node state transition model SEIRD.From the dynamic change process of each state of IoT nodes
the dynamic probability equations of IoT nodes belonging to five states were constructed
the Markov matrix reflecting the state transition was obtained
and an availability calculation method of an IoT node was achieved.Taking typical star and cluster IoT topologies as examples
the availability evaluation methods of the whole IoT with different topologies were given.Experiments provide suggestions for administrators how to reasonably deploy the number of normal working nodes and routes.The research results have theoretical significance for improving IoT availability and promoting the successful IoT applications.
SHEN S , HUANG L , ZHOU H , et al . Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in fog-cloud-based IoT networks [J ] . IEEE Internet of Things Journal , 2018 , 5 ( 2 ): 1043 - 1054 .
SHEN S , ZHOU H , FENG S , et al . HSIRD:a model for characterizing dynamics of malware diffusion in heterogeneous WSN [J ] . Journal of Network and Computer Applications , 2019 ( 146 ): 14 .
ZHOU H , SHEN S , LIU J . Malware propagation model in wireless sensor networks under attack-defense confrontation [J ] . Computer Communications , 2020 ( 162 ): 51 - 58 .
张红 , 沈士根 , 吴小军 , 等 . 基于元胞自动机和静态贝叶斯博弈的 WSN 恶意程序传染模型 [J ] . 电信科学 , 2019 , 35 ( 6 ): 60 - 69 .
ZHANG H , SHEN S G , WU X J , et al . WSN malware infection model based on cellular automaton and static Bayesian game [J ] . Telecommunications Science , 2019 , 35 ( 6 ): 60 - 69 .
周海平 , 沈士根 , 黄龙军 , 等 . 基于博弈论的无线传感器网络恶意程序传播模型 [J ] . 电信科学 , 2018 , 34 ( 11 ): 67 - 76 .
ZHOU H P , SHEN S G , HUANG L J , et al . Game theory-based malware propagation model for wireless sensor network [J ] . Telecommunications Science , 2018 , 34 ( 11 ): 67 - 76 .
沈士根 , 冯晟 , 周海平 , 等 . 基于云计算和动态贝叶斯博弈的 WSN 恶意程序传播优化抑制方法 [J ] . 电信科学 , 2018 , 34 ( 9 ): 78 - 86 .
SHEN S G , FENG S , ZHOU H P , et al . Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game [J ] . Telecommunications Science , 2018 , 34 ( 9 ): 78 - 86 .
邹青丙 , 何明 , 王琰 , 等 . 无线多跳网络可靠性评估方法研究 [J ] . 计算机工程与应用 , 2015 , 51 ( 5 ): 88 - 91 , 192 .
ZOU Q B , HE M , WANG Y , et al . Survey on reliability evaluating method of wireless multi-hop networks [J ] . Computer Engineering and Applications , 2015 , 51 ( 5 ): 88 - 91 , 192 .
何明 , 陈国华 , 赖海光 , 等 . 物联网感知层移动自组织网可靠性评估方法 [J ] . 计算机科学 , 2012 , 39 ( 6 ): 104 - 106 , 137 .
HE M , CHEN G H , LAI H G , et al . Methods for evaluating reliability of mobile Ad hoc networks in the perception layer of IoT [J ] . Computer Science , 2012 , 39 ( 6 ): 104 - 106 , 137 .
沈士根 , 黄龙军 , 范恩 , 等 . 受恶意程序传染的 WSNs 可生存性评估 [J ] . 传感技术学报 , 2016 , 29 ( 7 ): 1083 - 1089 .
SHEN S G , HUANG L J , FAN E , et al . Survivability evaluation for WSNs under malware infection [J ] . Chinese Journal of Sensors and Actuators , 2016 , 29 ( 7 ): 1083 - 1089 .
SHEN S G , MA H , FAN E , et al . A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion [J ] . Journal of Network and Computer Applications , 2017 , 91 : 26 - 35 .
沈士根 , 范恩 , 胡珂立 , 等 . 面向恶意程序传播的传感器网络可靠度评估 [J ] . 电子学报 , 2018 , 46 ( 1 ): 75 - 81 .
SHEN S G , FAN E , HU K L , et al . Reliability evaluation for WSNs with malware spread [J ] . Acta Electronica Sinica , 2018 , 46 ( 1 ): 75 - 81 .
沈士根 , 黄龙军 , 周海平 , 等 . 面向恶意程序传播的异质WSN 稳态可用度评估 [J ] . 传感技术学报 , 2017 , 30 ( 7 ): 1100 - 1105 .
SHEN S G , HUANG L J , ZHOU H P , et al . Steady-state availability evaluation for heterogeneous WSN under malware infection [J ] . Chinese Journal of Sensors and Actuators , 2017 , 30 ( 7 ): 1100 - 1105 .
金娟 , 曹奇英 , 沈士根 , 等 . 受恶意程序攻击的异质传感器网络节点可用度分析 [J ] . 计算机应用与软件 , 2018 , 35 ( 9 ): 167 - 172 .
JIN J , CAO Q Y , SHEN S G , et al . Nodes availability analysis of heterogeneous WSN attacked by malware [J ] . Computer Applications and Software , 2018 , 35 ( 9 ): 167 - 172 .
石琼 , 丁英华 , 秦丽 , 等 . 无线传感器网络可生存性评估研究 [J ] . 中北大学学报(自然科学版) , 2020 , 41 ( 5 ): 418 - 430 .
SHI Q , DING Y H , QIN L , et al . Survivability assessment for wireless sensor networks [J ] . Journal of North University of China (Natural Science Edition) , 2020 , 41 ( 5 ): 418 - 430 .
刘志锋 , 陈凯 , 李雷 , 等 . 一种多种攻击并发下的WSN生存性评估模型 [J ] . 计算机科学 , 2017 , 44 ( 8 ): 129 - 133 .
LIU Z F , CHEN K , LI L , et al . Survivability evaluation model for wireless sensor network under multiple attacks [J ] . Computer Science , 2017 , 44 ( 8 ): 129 - 133 .
李化邓 , 李雷 , 施化吉 , 等 . 无线传感器网络的生存性评估 [J ] . 计算机应用研究 , 2018 , 35 ( 8 ): 2450 - 2453 .
LI H D , LI L , SHI H J , et al . Survivability evaluation in wireless sensor network [J ] . Application Research of Computers , 2018 , 35 ( 8 ): 2450 - 2453 .
LIU J , JIANG X , NISHIYAMA H , et al . Reliability assessment for wireless mesh networks under probabilistic region failure model [J ] . IEEE Transactions on Vehicular Technology , 2011 , 60 ( 5 ): 2253 - 2264 .
HUANG J , CHEN G , CHENG B . A stochastic approach of dependency evaluation for IoT devices [J ] . Chinese Journal of Electronics , 2016 , 25 ( 2 ): 209 - 214 .
YUE Y , LI J , FAN H , et al . An efficient reliability evaluation method for industrial wireless sensor networks [J ] . Journal of Southeast University (English Edition) , 2016 , 32 ( 2 ): 195 - 200 .
FERRAZ JUNIOR N , SILVA A , GUELFI A , et al . IoT6Sec:reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis [J ] . Wireless Networks , 2019 , 25 ( 4 ): 1533 - 1556 .
HUANG C , HUANG D , LIN Y . Network reliability evaluation for a distributed network with edge computing [J ] . Computers and Industrial Engineering , 2020 ( 147 ): 106492 .
ANDRADE E , NOGUEIRA B . Dependability evaluation of a disaster recovery solution for IoT infrastructures [J ] . Journal of Supercomputing , 2020 , 76 ( 3 ): 1828 - 1849 .
XIANG S , YANG J . Reliability evaluation and reliability-based optimal design for wireless sensor networks [J ] . IEEE Systems Journal , 2020 , 14 ( 2 ): 1752 - 1763 .
0
浏览量
302
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构