期刊文献+

无线传感网中移动式蠕虫的抑制与清理 被引量:6

The Inhibition and Clearup of the Mobile Worm in Wireless Sensor Networks
下载PDF
导出
摘要 在无线传感器网络(Wireless Sensor Networks,WSNs)中引入移动节点可以极大地提升网络性能。然而,移动节点一旦被蠕虫感染则会大大加快蠕虫在WSNs中的传播。针对这一新的研究问题,该文分2步来抑制和清理移动蠕虫传播源。首先建立了移动蠕虫感染模型,设计启发式算法以确定移动感染区域的边界,通过挂起感染边界附近的高风险节点来阻断蠕虫的进一步传播。第2步设计定向扩散的良性蠕虫对网络中被感染的节点进行修复,以彻底清除蠕虫病毒。理论分析和仿真实验结果均表明,该文所提方法能够在付出较小的代价下达到较好的移动蠕虫清理效果,适合能量受限的无线传感器网络。 The network performance of WSNs (Wireless Sensor Networks) can be improved significantly by injecting mobile elements. However, the infection process of worm will be greatly accelerated once the mobile element has been captured and become the new infection source. To cope with this new threat, this paper first proposes the infection model for the networks with the mobile worm and designs a heuristic algorithm to identify the boundary of infected area. High risk nodes near the boundary can be found and switched to sleeping states to block the further spreading of the worm. Second, an algorithm with directed-diffusion based anti-worm is designed to repair those infected sensors. Theoretical analysis and experimental results show that the proposed methods can achieve better worm cleaning effect with low cost, which can be applied to energy-limited wireless sensor networks.
出处 《电子与信息学报》 EI CSCD 北大核心 2016年第9期2202-2207,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61572206 61202468 61305085 61370007 U1536115) 福建省自然科学基金计划资助项目(2014J01240) 华侨大学研究生科研创新能力培育计划资助项目(1400214020)~~
关键词 无线传感器网络 移动蠕虫传播源 感染边界 良性蠕虫 Wireless Sensor Networks (WSNs) Mobile worm source Infected area boundaries Anti-worm
  • 相关文献

参考文献13

  • 1MISHRA B K and KESHRI N. Mathematical model on the transmission of worms in wireless sensor networks[J]. Applied Mathematical Modeling, 2013, 37(6): 4103-4111. doi: 10.1016/j.apm.2012.09.025. 被引量:1
  • 2BUTUN I, MORGERA S D, and SANKAR R. A survey of intrusion detection systems in wireless sensor networks[J]. Communications Surveys & Tutorials, 2014, 16(1): 266-282. doi: 10.1109/SURV.2013.050113.00191. 被引量:1
  • 3MISHRA B K and TYAGI I. Defending against malicious threats in wireless Sensor network: A mathematical model[J]. International Journal of Information Technology and Computer Science, 2014, 6(3): 12-19. doi: 10.5815/ijitcs. 2014.03.02. 被引量:1
  • 4WANG T, PENG Z, CHEN Y, et al. Continuous tracking for mobile targets with mobility nodes in WSNs[C]. 2014 International Conference on Smart Computing (SMARTCOMP), Hong Kong, 2014: 261-268. doi: 10.1109/ SMARTCO MP.2014. 7043867. 被引量:1
  • 5DI FRANCESCO M, DAS S K, and ANASTASI G. Data collection in wireless sensor networks with mobile elements: A survey[J]. A CM Transactions on Sensor Networks, 2011, 8(1): 7-38. doi: 10.1145/1993042.1993049. 被引量:1
  • 6PENG Z, WANG T, BHUIYAN M Z A, et al. Dependable cascading target tracking in heterogeneous mobile camera sensor networks[C]. Algorithms and Architectures for Parallel Processing, Springer International Publishing, Zhangjiajie, 2015: 531-540. doi: 10.1007/978-3-319-27161-348. 被引量:1
  • 7WANG T, PENG Z, LIANG J, et al. Detecting targets based on a realistic detection and decision model in wireless sensor networks[C]. Wireless Algorithms, Systems, and Applications Springer International Publishing, Qufu, China, 2015: 836-844. doi: 10.1007/978-3-319-21837-3_82. 被引量:1
  • 8WEN S, ZHOU W, ZHANG J, et al. Modeling propagation dynamics of social network worms[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(8): 1633-1643. doi:10.1109/TPDS.2012.250. 被引量:1
  • 9ZHOU H Y, LUO D Y, GAO Y, et al. Modeling of node energy consumption for wireless sensor networks[J]. Wireless Sensor Network, 2011, 3(1): 18-23. doi: 10.4236/wsn. 2011.31003. 被引量:1
  • 10SHEN S, LI H, HAN R, et al. Differential game-based strategies for preventing malware propagation in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(11): 1962-1973. doi: 10.1109/TIFS.2014.2359333. 被引量:1

同被引文献47

引证文献6

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部