高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

无线传感网中移动式蠕虫的抑制与清理

王田 吴群 文晟 蔡奕侨 田晖 陈永红

王田, 吴群, 文晟, 蔡奕侨, 田晖, 陈永红. 无线传感网中移动式蠕虫的抑制与清理[J]. 电子与信息学报, 2016, 38(9): 2202-2207. doi: 10.11999/JEIT151311
引用本文: 王田, 吴群, 文晟, 蔡奕侨, 田晖, 陈永红. 无线传感网中移动式蠕虫的抑制与清理[J]. 电子与信息学报, 2016, 38(9): 2202-2207. doi: 10.11999/JEIT151311
WANG Tian, WU Qun, WEN Sheng, CAI Yiqiao, TIAN Hui, CHEN Yonghong. The Inhibition and Clearup of the Mobile Worm in Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2202-2207. doi: 10.11999/JEIT151311
Citation: WANG Tian, WU Qun, WEN Sheng, CAI Yiqiao, TIAN Hui, CHEN Yonghong. The Inhibition and Clearup of the Mobile Worm in Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2202-2207. doi: 10.11999/JEIT151311

无线传感网中移动式蠕虫的抑制与清理

doi: 10.11999/JEIT151311
基金项目: 

国家自然科学基金(61572206, 61202468, 61305085, 61370007, U1536115),福建省自然科学基金计划资助项目(2014J01240),华侨大学研究生科研创新能力培育计划资助项目(1400214020)

The Inhibition and Clearup of the Mobile Worm in Wireless Sensor Networks

Funds: 

The National Natural Science Foundation of China (61572206, 61202468, 61305085, 61370007, U1536115), The Project Supported by The Natural Science Foundation of Fujian Province, China (2014J01240), The Project Supported by Graduate Student Research and Innovation Ability Cultivation Plan Funded Projects of Huaqiao University (1400214020)

  • 摘要: 在无线传感器网络(Wireless Sensor Networks, WSNs)中引入移动节点可以极大地提升网络性能。然而,移动节点一旦被蠕虫感染则会大大加快蠕虫在WSNs中的传播。针对这一新的研究问题,该文分2步来抑制和清理移动蠕虫传播源。首先建立了移动蠕虫感染模型,设计启发式算法以确定移动感染区域的边界,通过挂起感染边界附近的高风险节点来阻断蠕虫的进一步传播。第2步设计定向扩散的良性蠕虫对网络中被感染的节点进行修复,以彻底清除蠕虫病毒。理论分析和仿真实验结果均表明,该文所提方法能够在付出较小的代价下达到较好的移动蠕虫清理效果,适合能量受限的无线传感器网络。
  • MISHRA B K and KESHRI N. Mathematical model on the transmission of worms in wireless sensor networks[J]. Applied Mathematical Modeling, 2013, 37(6): 4103-4111. doi: 10.1016/j.apm.2012.09.025.
    BUTUN I, MORGERA S D, and SANKAR R. A survey of intrusion detection systems in wireless sensor networks[J]. Communications Surveys Tutorials, 2014, 16(1): 266-282. doi: 10.1109/SURV.2013.050113.00191.
    MISHRA B K and TYAGI I. Defending against malicious threats in wireless Sensor network: A mathematical model[J]. International Journal of Information Technology and Computer Science, 2014, 6(3): 12-19. doi: 10.5815/ijitcs. 2014.03.02.
    WANG T, PENG Z, CHEN Y, et al. Continuous tracking for mobile targets with mobility nodes in WSNs[C]. 2014 International Conference on Smart Computing (SMARTCOMP), Hong Kong, 2014: 261-268. doi: 10.1109/ SMARTCOMP.2014.7043867.
    DI FRANCESCO M, DAS S K, and ANASTASI G. Data collection in wireless sensor networks with mobile elements: A survey[J]. ACM Transactions on Sensor Networks, 2011, 8(1): 7-38. doi: 10.1145/1993042.1993049.
    PENG Z, WANG T, BHUIYAN M Z A, et al. Dependable cascading target tracking in heterogeneous mobile camera sensor networks[C]. Algorithms and Architectures for Parallel Processing, Springer International Publishing, Zhangjiajie, 2015: 531-540. doi: 10.1007/978-3-319-27161-3_48.
    WANG T, PENG Z, LIANG J, et al. Detecting targets based on a realistic detection and decision model in wireless sensor networks[C]. Wireless Algorithms, Systems, and Applications, Springer International Publishing, Qufu, China, 2015: 836-844. doi: 10.1007/978-3-319-21837-3_82.
    WEN S, ZHOU W, ZHANG J, et al. Modeling propagation dynamics of social network worms[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(8): 1633-1643. doi: 10.1109/TPDS.2012.250.
    ZHOU H Y, LUO D Y, GAO Y, et al. Modeling of node energy consumption for wireless sensor networks[J]. Wireless Sensor Network, 2011, 3(1): 18-23. doi: 10.4236/wsn. 2011.31003.
    SHEN S, LI H, HAN R, et al. Differential game-based strategies for preventing malware propagation in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(11): 1962-1973. doi: 10.1109/TIFS.2014.2359333.
    ZHAO T, ZHANG G, and ZHANG L. An overview of mobile devices security issues and countermeasures[C]. 2014 International Conference on Wireless Communication and Sensor Network (WCSN), Wuhan, 2014: 439-443. doi: 10.1109/wcsn.2014.95.
    CASTANEDA F, SEZER E C, and XU J. Worm vs. worm: preliminary study of an active counter-attack mechanism[C]. Proceedings of the 2004 ACM workshop on Rapid malcode, New York, USA, 2004: 83-93. doi: 10.1145/1029618.1029631.
    YANG Y, ZHU S, and CAO G. Improving sensor network immunity under worm attacks: a software diversity approach[C]. Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, New York, USA, 2008: 149-158. doi: 10.1145/1374618. 1374640.
  • 期刊类型引用(7)

    1. 沈士根,杨淑敏,黄龙军,刘建华,吴国文,张红,曹奇英. 一种揭示异质无线传感器网络恶意程序传播的动力学模型. 传感技术学报. 2022(05): 683-691 . 百度学术
    2. 刘少锋,张红,和青青,沈士根,曹奇英. 考虑不同潜伏期的异质传感网络恶意程序传播建模与分析. 计算机应用与软件. 2021(11): 307-313 . 百度学术
    3. 王刚,陆世伟,胡鑫,马润年. “去二存一”混合机制下的病毒扩散模型及稳定性分析. 电子与信息学报. 2019(03): 709-716 . 本站查看
    4. 李冰. 基于改进局域网扼流法的移动网络蠕虫防御模型. 电脑迷. 2018(06): 243-244 . 百度学术
    5. 沈士根,周海平,黄龙军,范恩,胡珂立,曹奇英. 基于最优反应均衡的传感网恶意程序传播抑制方法. 传感技术学报. 2017(10): 1589-1595 . 百度学术
    6. 罗小娟,朱煜,黄如. 无线传感器网络病毒传播动力学模型研究. 物联网学报. 2017(02): 63-67 . 百度学术
    7. 蒋文贤,缪海星,王田,王成,赖永炫,梁俊斌. 时延受限的无线传感网中移动式能量补充. 西南交通大学学报. 2017(06): 1216-1223 . 百度学术

    其他类型引用(1)

  • 加载中
计量
  • 文章访问数:  1172
  • HTML全文浏览量:  116
  • PDF下载量:  474
  • 被引次数: 8
出版历程
  • 收稿日期:  2015-11-25
  • 修回日期:  2016-04-18
  • 刊出日期:  2016-09-19

目录

    /

    返回文章
    返回