高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

无线传感网中移动式蠕虫的抑制与清理

王田 吴群 文晟 蔡奕侨 田晖 陈永红

王田, 吴群, 文晟, 蔡奕侨, 田晖, 陈永红. 无线传感网中移动式蠕虫的抑制与清理[J]. 电子与信息学报, 2016, 38(9): 2202-2207. doi: 10.11999/JEIT151311
引用本文: 王田, 吴群, 文晟, 蔡奕侨, 田晖, 陈永红. 无线传感网中移动式蠕虫的抑制与清理[J]. 电子与信息学报, 2016, 38(9): 2202-2207. doi: 10.11999/JEIT151311
WANG Tian, WU Qun, WEN Sheng, CAI Yiqiao, TIAN Hui, CHEN Yonghong. The Inhibition and Clearup of the Mobile Worm in Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2202-2207. doi: 10.11999/JEIT151311
Citation: WANG Tian, WU Qun, WEN Sheng, CAI Yiqiao, TIAN Hui, CHEN Yonghong. The Inhibition and Clearup of the Mobile Worm in Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2202-2207. doi: 10.11999/JEIT151311

无线传感网中移动式蠕虫的抑制与清理

doi: 10.11999/JEIT151311
基金项目: 

国家自然科学基金(61572206, 61202468, 61305085, 61370007, U1536115),福建省自然科学基金计划资助项目(2014J01240),华侨大学研究生科研创新能力培育计划资助项目(1400214020)

The Inhibition and Clearup of the Mobile Worm in Wireless Sensor Networks

Funds: 

The National Natural Science Foundation of China (61572206, 61202468, 61305085, 61370007, U1536115), The Project Supported by The Natural Science Foundation of Fujian Province, China (2014J01240), The Project Supported by Graduate Student Research and Innovation Ability Cultivation Plan Funded Projects of Huaqiao University (1400214020)

  • 摘要: 在无线传感器网络(Wireless Sensor Networks, WSNs)中引入移动节点可以极大地提升网络性能。然而,移动节点一旦被蠕虫感染则会大大加快蠕虫在WSNs中的传播。针对这一新的研究问题,该文分2步来抑制和清理移动蠕虫传播源。首先建立了移动蠕虫感染模型,设计启发式算法以确定移动感染区域的边界,通过挂起感染边界附近的高风险节点来阻断蠕虫的进一步传播。第2步设计定向扩散的良性蠕虫对网络中被感染的节点进行修复,以彻底清除蠕虫病毒。理论分析和仿真实验结果均表明,该文所提方法能够在付出较小的代价下达到较好的移动蠕虫清理效果,适合能量受限的无线传感器网络。
  • MISHRA B K and KESHRI N. Mathematical model on the transmission of worms in wireless sensor networks[J]. Applied Mathematical Modeling, 2013, 37(6): 4103-4111. doi: 10.1016/j.apm.2012.09.025.
    BUTUN I, MORGERA S D, and SANKAR R. A survey of intrusion detection systems in wireless sensor networks[J]. Communications Surveys Tutorials, 2014, 16(1): 266-282. doi: 10.1109/SURV.2013.050113.00191.
    MISHRA B K and TYAGI I. Defending against malicious threats in wireless Sensor network: A mathematical model[J]. International Journal of Information Technology and Computer Science, 2014, 6(3): 12-19. doi: 10.5815/ijitcs. 2014.03.02.
    WANG T, PENG Z, CHEN Y, et al. Continuous tracking for mobile targets with mobility nodes in WSNs[C]. 2014 International Conference on Smart Computing (SMARTCOMP), Hong Kong, 2014: 261-268. doi: 10.1109/ SMARTCOMP.2014.7043867.
    DI FRANCESCO M, DAS S K, and ANASTASI G. Data collection in wireless sensor networks with mobile elements: A survey[J]. ACM Transactions on Sensor Networks, 2011, 8(1): 7-38. doi: 10.1145/1993042.1993049.
    PENG Z, WANG T, BHUIYAN M Z A, et al. Dependable cascading target tracking in heterogeneous mobile camera sensor networks[C]. Algorithms and Architectures for Parallel Processing, Springer International Publishing, Zhangjiajie, 2015: 531-540. doi: 10.1007/978-3-319-27161-3_48.
    WANG T, PENG Z, LIANG J, et al. Detecting targets based on a realistic detection and decision model in wireless sensor networks[C]. Wireless Algorithms, Systems, and Applications, Springer International Publishing, Qufu, China, 2015: 836-844. doi: 10.1007/978-3-319-21837-3_82.
    WEN S, ZHOU W, ZHANG J, et al. Modeling propagation dynamics of social network worms[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(8): 1633-1643. doi: 10.1109/TPDS.2012.250.
    ZHOU H Y, LUO D Y, GAO Y, et al. Modeling of node energy consumption for wireless sensor networks[J]. Wireless Sensor Network, 2011, 3(1): 18-23. doi: 10.4236/wsn. 2011.31003.
    SHEN S, LI H, HAN R, et al. Differential game-based strategies for preventing malware propagation in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(11): 1962-1973. doi: 10.1109/TIFS.2014.2359333.
    ZHAO T, ZHANG G, and ZHANG L. An overview of mobile devices security issues and countermeasures[C]. 2014 International Conference on Wireless Communication and Sensor Network (WCSN), Wuhan, 2014: 439-443. doi: 10.1109/wcsn.2014.95.
    CASTANEDA F, SEZER E C, and XU J. Worm vs. worm: preliminary study of an active counter-attack mechanism[C]. Proceedings of the 2004 ACM workshop on Rapid malcode, New York, USA, 2004: 83-93. doi: 10.1145/1029618.1029631.
    YANG Y, ZHU S, and CAO G. Improving sensor network immunity under worm attacks: a software diversity approach[C]. Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, New York, USA, 2008: 149-158. doi: 10.1145/1374618. 1374640.
  • 加载中
计量
  • 文章访问数:  1139
  • HTML全文浏览量:  105
  • PDF下载量:  474
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-11-25
  • 修回日期:  2016-04-18
  • 刊出日期:  2016-09-19

目录

    /

    返回文章
    返回