CN105959262B - A kind of control method for inhibiting rogue program to propagate in wireless sensor network - Google Patents

A kind of control method for inhibiting rogue program to propagate in wireless sensor network Download PDF

Info

Publication number
CN105959262B
CN105959262B CN201610255831.2A CN201610255831A CN105959262B CN 105959262 B CN105959262 B CN 105959262B CN 201610255831 A CN201610255831 A CN 201610255831A CN 105959262 B CN105959262 B CN 105959262B
Authority
CN
China
Prior art keywords
node
network
state
wireless sensor
sensitization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610255831.2A
Other languages
Chinese (zh)
Other versions
CN105959262A (en
Inventor
于秦
洪明龙
杨鲲
胡杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201610255831.2A priority Critical patent/CN105959262B/en
Publication of CN105959262A publication Critical patent/CN105959262A/en
Application granted granted Critical
Publication of CN105959262B publication Critical patent/CN105959262B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses the control methods for inhibiting rogue program to propagate in a kind of wireless sensor network, consider the sleeping/waking mechanism of wireless sensor network, the influence that the faith mechanism of wireless sensor network and the time lag time delay of network propagate rogue program in wireless sensor network, a kind of propagation model of new rogue program is constructed, propagation of the rogue program in wireless sensor network is preferably described.Simultaneously, using network to the immunization rate of self killing of rogue program and network as optimal control variable, cost functional is introduced, Optimal Control Model is established, so that infecting the quantity minimum of node and the safety measure cost minimization for resisting rogue program propagation in network at any time.

Description

A kind of control method for inhibiting rogue program to propagate in wireless sensor network
Technical field
The invention belongs to technical field of communication network, and in particular to the propagation of rogue program in a kind of wireless sensor network The design of model.
Background technique
Wireless sensor network (Wireless Sensor Network, WSN) is by largely with the sensing of specific function Device node) it is in communication with each other by way of self-organizing, the ad hoc network system of various functions is completed in collaboration.It combines sensing The multiple technologies such as device technology, embedded technology, the communication technology, distributed information processing can pass through various micro sensings Device cooperation, real-time monitoring, the information of perception and the various environment of acquisition or monitoring object.Since it has low cost, low-power etc. Characteristic has been obtained and is more and more widely used.
Rogue program is a kind of special program, it is by being embedded into code in the case where not detectable another section of journey In sequence, so that reaching operation has invasive or destructive program, destroys the safety of infected data and the mesh of integrality 's.It is several that rogue program by its circulation way can be divided into computer virus, wooden horse, worm, mobile code and multipartite virus etc. Kind.Broad development and application with wireless sensor network, have greatly attracted the interest of rogue program author, wireless to pass Sensor network has become rogue program new attack target, and more and more rogue programs are begun to appear in wireless sense network, Great threat is constituted to the safety of wireless network.
Some rogue program attacks such as worm and virus on Internet (internet) have been widely studied, especially Complex Networks Theory is introduced to the propagation problem research in the various network environments such as Internet, community network, bio-networks One completely new perspective in research, these researchs facilitate the propagation of rogue program in WSN.In recent years, many people combine classics The characteristics of Epidemic Model and wireless sensor network, studies the model that rogue program is propagated in wireless sensor network, There is biggish development.
However, the existing research to the propagation model of rogue program in wireless sensor network seldom considers wireless sensing Sleeping/waking mechanism in device network, this prevents the network model proposed from correctly describing rogue program in wireless sensing The dissemination of device network, to the attack of rogue program cannot be defendd to provide correct opinion very well.Moreover, currently to evil The influence of faith mechanism in wireless sensor and actor networks is not considered in the propagation model research of meaning program, faith mechanism can make to have felt The node of dye rogue program loses the ability communicated with surroundings nodes, cannot infect surroundings nodes.In addition, existing model also compared with Influence of the time-lag effect to rogue program propagation model is considered less.
Summary of the invention
The present invention is in order to solve the above technical problems, propose the control for inhibiting rogue program to propagate in a kind of wireless sensor network Method processed, it is contemplated that the sleeping/waking mechanism of wireless sensor network, the faith mechanism of network, internetwork time-lag effect (net When time-lag effect between network is mainly manifested in node of the Node of Infection Status in network for isolation, have certain Time delay τ), the propagation model of rogue program, more closer to reality are constructed, can be to resist rogue program in wireless sensor network It propagates and extends efficient help in network.
The technical solution adopted by the present invention is that: the controlling party for inhibiting rogue program to propagate in a kind of wireless sensor network Method, comprising:
S1, the network model for determining wireless sensor: determining node total number, and node is evenly distributed on the two dimension of known area In region, and assume to will increase equal number health node replacement dead node within the set time;
S2, by the node division in wireless sensor network are as follows: sensitization node (S), Infection Status node (I), every From state node (Q), immune state node (R), dormant state node (P) and dead state node (D);
S3, according to the mutual conversion between each state node, obtain state transfer equation;
S4, according to the quantity of Infection Status node (I), wireless sensor network in network to Infection Status node (I) Killing rate and objective function is constructed to the immunization rate of sensitization node (S), with the killing rate of Infection Status node (I) and easily The immunization rate of state node (S) is felt as control variable;And using the state transfer equation that step S2 is obtained as the first constraint item Part solves optimum control variable.
Further, the step S1 further include: when node maximum transmitted radius be r, then node can only with the section Node of the point distance less than r communicates.
Further, between each state node of step S3 it is mutual conversion include it is following step by step:
1), the sensitization node (S) is converted into Infection Status node (I) with the first ratio, sensitization node (S) Immune state node (R) is converted into the second ratio;
2), the Infection Status node (I) is converted into immune state node (R) with third ratio, Infection Status node (I) Isolation node (Q) is converted into the 4th ratio;
3), the isolation node (Q) is converted into immune state node (R) with the 5th ratio;
4), the sensitization node (S) or immune state node (R) are converted into dormant state node with the 6th ratio (P);The dormant state node (P) is converted into sensitization node (S) or immune state node (R) with the 7th ratio;
5), the sensitization node (S) or Infection Status node (I) or isolation node (Q) or immune state section Point (R) or dormant state node (P) are converted into dead state node (D) with the 8th ratio.
Further, the step S4 include it is following step by step:
S41, by wireless sensor network to the killing rate of Infection Status node (I) and to sensitization node (S) Immunization rate obtains domination set as control variable;
S42, objective function;
Wherein, J (u) indicates objective function, ε1Indicate the cost parameter of network killing infection node, ε2Indicate that network is immune The propagation cost parameter of susceptible node, and ε1、ε2For constant, I (t) indicates the quantity of Infection Status node, and α (t) indicates infection shape The killing rate of state node (I), μ (t) indicates the immune ratio of sensitization node (S), and the value range of α (t) and μ (t) is 0 Between 1;
S43, according to the objective function of step S42, define the Lagrangian of optimization object function;
S44, Hamilton letter is defined according to the state transfer equation that the Lagrangian and step S3 of step S43 obtain Number;
S45, the domination set obtained with step S41 are by hamilton's function it can be concluded that optimal for the second constraint condition Control variable so that in network infect node it is minimum, resist rogue program propagation cost it is minimum.
Beneficial effects of the present invention: the controlling party for inhibiting rogue program to propagate in a kind of wireless sensor network of the invention Method considers wireless sensor network by the way that dormant state node (P) is added in the node state by wireless sensor network Sleeping/waking mechanism;By the way that isolation node (Q) is added, the faith mechanism of network is considered;Internetwork time-lag effect, structure The propagation model of rogue program, more closer to reality are built, can be propagated in wireless sensor network to resist rogue program and be provided It is effective to help;Meanwhile considering the influence of the immunization rate of network and the killing rate of infection node, cost functional is introduced, is established Optimal Control Model finds out an optimal solution so that in wireless sensor network malicious node minimum number, and reduce malice It is minimum that node consumes low number of nodes.
Detailed description of the invention
Fig. 1 is the solution of the present invention flow chart.
Fig. 2 is the state for the control method for inhibiting rogue program to propagate in a kind of wireless sensor network provided by the invention Conversion figure.
Specific embodiment
For convenient for those skilled in the art understand that technology contents of the invention, with reference to the accompanying drawing to the content of present invention into one Step is illustrated.
As shown in Figure 1 it is the solution of the present invention flow chart, inhibits to dislike in a kind of wireless sensor network proposed by the present invention The control method of meaning program circulation, exactly in order to preferably go to resist propagation of the rogue program in wireless sensor network, i.e., The quantity of Infection Status node (I) in network is reduced, while also to reduce the cost for resisting rogue program propagation, is i.e. reduction network Immune cost and killing cost, be to reduce the killing rate of Infection Status node (I) and exempting from for sensitization node (S) at all Epidemic disease rate.
Technical solution of the present invention the following steps are included:
S1, the network model for determining wireless sensor, specifically: determine node total number, the node is evenly distributed on face In the long-pending 2 dimensional region for being L × L, and assume to will increase b healthy node replacement dead node within the set time.
And node is propagated follow path loss model in a network, even the maximum transmitted radius of node is r, then the node It can only be with being communicated with its node of distance less than r.
S20: the attribute of the characteristics of the application further includes determining wireless sensor network and rogue program;
The characteristics of wireless sensor network: after malicious node sends infection data packet constantly into network, network Trust Management Mechanism to judge out the node be a unsafe node, can be to distrust node, net by the vertex ticks Other nodes can abandon the data packet of malicious node transmission in network, will not send and communicate with it.
The attribute of the rogue program specifically: after rogue program successfully infects normal node, the infected node Rogue program will be constantly sent, attempts to infect other nodes.
The propagation model of rogue program in S2, building wireless sensor network: the node state in wireless sensor network It include: sensitization node (S), Infection Status node (I), immune state node (R) and dead state node (D).
Due to the finite energy ground characteristic of wireless sensor network, sleeping/waking mechanism is introduced, therefore in rogue program A new state, dormant state state node (P) are introduced in propagation model;The trust of wireless sensor network is considered simultaneously Administrative mechanism introduces isolation node (Q) concept.
S3, the conversion of each state node are as shown in Figure 2, wherein S (t), I (t), Q (t), R (t), P (t), D (t) are respectively For t moment sensitization node (S), Infection Status node (I), isolation node (Q), immune state node (R), suspend mode shape The quantity of state node (P) and dead state node (D).
Mutually converting between each state node is specific as follows:
1) it, for sensitization node (S), is evenly distributed in due to N number of node in the 2 dimensional region that area is L × L, The maximum transmitted radius of node is r, therefore the sensitization node that an Infection Status node (I) can infect within the unit time (S) quantity isIt is θ (when the node of a sensitization receives malice journey that Infection Status node (I), which infects success rate, Sequence has θ probability and is converted into Infection Status node, there is 1- θ probability or sensitization), it enablesTherefore when unit It is interior to there is the sensitization node (S) of the first ratio lambda to be converted into Infection Status node (I), i.e. a sensitization section of λ S (t) I (t) Point (S) is converted into Infection Status node (I).
The susceptible Node for having the second ratio μ simultaneously is immune node (R);Here the second ratio μ is from reality Rogue program infection network in come out, it is assumed that at a certain moment have in network for the network of rogue program infection N1A node in easy infection state, M is carved at this1The Node of a easy infection state is immune state, then μ=M1/ N1
2), for Infection Status node (I), in the unit time, λ S (t) I (t) sensitization node (S) is converted into sense It contaminates state node (I);
Due to the killing of network, the Infection Status node (I) for having third ratio α is converted into immune state node (R), together The third ratio α of reason here is come out from the network that actual rogue program infects, it is assumed that for rogue program sense The network of dye, it is assumed that network has N in sometime2A node in Infection Status, then be carved with M at this2A infection shape The Node of state is the node of immune state, wherein α=M2/N2);
Due to the presence of the Trust Management Mechanism of wireless sensor network, infect node can with the 4th be converted into than γ every From state node (Q);γ ratio is abstracted according to actual research network and rogue program situation, different network and evil Meaning program have different values, according to the actual situation depending on, it is assumed that for rogue program infection network, at a certain moment, network In have N3A node in Infection Status, and M is carved at this3The node of a Infection Status be converted into after time τ every Node from state, wherein γ=M3/N3.Assuming that having N in time instant τ3The node of a Infection Status, and M is carved in t+ τ3A sense Contaminating Node is isolation node, so, γ=M3/N3, that is to say, that M3A Infection Status Node is isolation node The delay for having τ is the N being directed to apart from τ before the moment3For a Infection Status node.
3), for isolation node (Q), within the unit time, immune state node can be converted into the 5th ratio beta (R), the 5th ratio beta here is come out from the network that actual rogue program infects, it is assumed that for rogue program The network of infection has N at a certain moment4A node in isolation, then be carved with M at this4The node of a isolation turns The node of immune state is turned to, wherein β=M4/N4
4), due to the characteristic of the finite energy of wireless sensor network, sleeping/waking mechanism is introduced, therefore in malice journey A new state, suspend mode shape node (P), while only sensitization node (S) and immune shape are introduced in the propagation model of sequence State node (R) can be with the 6th ratio lambdaSIt is converted into dormant state node (P);Suspend mode node can be with the 7th ratio lambdaWIt is converted into simultaneously Sensitization node (S) and immune state node (R).
Similarly, λSRatio and λWRatio has different values from rogue program in different networks, according to the actual situation and It is fixed;λSWith λWRatio is abstracted according to actual research network and rogue program situation, different network and rogue program meeting Have different values, according to the actual situation depending on, for λSRatio, it is assumed that for the network of rogue program infection, at a certain moment, net There is N in network5A sensitization node (S) or immune state node (R), and M is carved at this5A sensitization node (S) and M5A immune state node (R) is converted into dormant state node (P) simultaneously, wherein λS=M5/N5.Certainly in actual network, The quantity of sensitization node (S) and immune state node (R) is simultaneously unequal, but they can be simultaneously with identical λSRatio turns Turn to dormant state node (P).
5), in a network, in the unit time, the node of other states can be converted into dead state node with the 8th ratio η (D)();Similarly, η ratio has different values from rogue program in different networks, according to the actual situation depending on.Here its His state node includes: sensitization node (S), Infection Status node (I), immune state node (R), dormant state node (P) and isolation node (Q).
S (t), I (t), Q (t), R (t), P (t), D (t) are respectively the susceptible node of t moment, infection node, isolation node, exempt from The quantity of epidemic disease node, suspend mode node, death nodes, by foregoing description can must do well between transfer equation:
S4, according to the quantity of Infection Status node (I), wireless sensor network in network to Infection Status node (I) Killing rate and objective function is constructed to the immunization rate of sensitization node (S);And the state transfer equation obtained with step S2 As the first constraint condition, the least cost of defence rogue program infection wireless sensor network is acquired.
Specifically include it is following step by step:
S41, in order to realize above-mentioned optimization aim, above-mentioned ask is solved using the theory of optimal control of Pontryagin Topic.Define ε1The cost parameter of node, ε are infected for network killing2The propagation cost parameter of susceptible node is immunized for network, uses ε1α2(t) and ε2μ2(t) cost that network carries out killing malicious node cost and immune programme, ε are respectively indicated1、ε2For constant.
Domination set is determined first, due to selecting the killing rate α (t) of Infection Status node (I) and sensitization node (S) Immune ratio μ (t) is as control variable, therefore the value range of α (t) and μ (t) is between 0 and 1.Therefore domination set are as follows: U={ u =(α, μ) | 0≤α (t)≤1,0≤μ (t)≤1 }, wherein α is killing rate of the network to malicious node, and μ is the immune of network Rate.
S42, the objective function being defined as follows:
Its domination set is the U in S41, meanwhile, the state of step S3 Equation is another constraint of objective function.
S43, the Lagrangian for defining optimization object function: the objective function defined by step S42, available drawing Ge Lang function: L (I, u)=I (t)+ε1α2(t)+ε2μ2(t);
S44, the hamilton's function that the optimization aim is defined by the state equation of Lagrangian and model built, It is specific as follows:
H (t)=L (I, u)+λ1(t)(b-λS(t)I(t)-μ(t)S(t)-λsS(t)+λwP(t)-ηS(t))
2(t)(λS(t)I(t)-α(t)I(t)-γI(t-τ)-ηI(t))
3(t)(γI(t-τ)-βQ(t)-ηQ(t))
4(t)(α(t)I(t)+μ(t)S(t)+βQ(t)+λwP(t)-λsR(t)-ηR(t))
5(t)(λsS(t)+λsR(t)-2λwP(t)-ηP(t))
λ in S45, above-mentioned hamilton's functioni(t) it is adjoint variable, adjoint variable meets the following conditions:
And for above-mentioned adjoint variable, transversality condition λi(T)=0, i=1,2,3,4,5.
According to hamilton's function, optimum control variable u can be obtained*=(α*(t),μ*(t)), so that minJ (u)=J (u*), J (u) known to from step S42 indicates objective function, that is, cost function, and wherein u is dependent variable, and u=(α (t), μ (t)), an object of the application is exactly to acquire a suitable u=u*So that J (u) is minimum.
By seeking hamilton's function the local derviation of α (t) Yu μ (t), governing equation is obtained:
By the domination set U of step S41, available following optimal control pair:
While the quantity of node can obviously be infected in reducing network by the technical solution of the application, minimum allelopathic Contaminate state node (I) killing rate α (t) and sensitization node immune ratio μ (t), reduce defence rogue program propagate at This.
Those of ordinary skill in the art will understand that the embodiments described herein, which is to help reader, understands this hair Bright principle, it should be understood that protection scope of the present invention is not limited to such specific embodiments and embodiments.For ability For the technical staff in domain, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made Any modification, equivalent substitution, improvement and etc. should be included within scope of the presently claimed invention.

Claims (2)

1. the control method for inhibiting rogue program to propagate in a kind of wireless sensor network characterized by comprising
S1, the network model for determining wireless sensor: determining node total number, and node is evenly distributed on the 2 dimensional region of known area It is interior, and assume to will increase equal number health node replacement dead node within the set time;
S2, by the node division in wireless sensor network are as follows: sensitization node (S), Infection Status node (I), barrier-like State node (Q), immune state node (R), dormant state node (P) and dead state node (D);
S3, according to the mutual conversion between each state node, obtain state transfer equation;Between each state node of step S3 It is mutual conversion include it is following step by step:
1), the sensitization node (S) is converted into Infection Status node (I) with the first ratio, and sensitization node (S) is with Two ratios are converted into immune state node (R);
2), the Infection Status node (I) is converted into immune state node (R) with third ratio, and Infection Status node (I) is with Four ratios are converted into isolation node (Q);
3), the isolation node (Q) is converted into immune state node (R) with the 5th ratio;
4), the sensitization node (S) or immune state node (R) are converted into dormant state node (P) with the 6th ratio;Institute It states dormant state node (P) and sensitization node (S) or immune state node (R) is converted into the 7th ratio;
5), the sensitization node (S) or Infection Status node (I) or isolation node (Q) or immune state node (R) Or dormant state node (P) is converted into dead state node (D) with the 8th ratio;
S4, the killing according to the quantity, wireless sensor network of Infection Status node (I) in network to Infection Status node (I) Rate and objective function is constructed to the immunization rate of sensitization node (S), with the killing rate of Infection Status node (I) and susceptible shape The immunization rate of state node (S) is as control variable;And the state transfer equation obtained using step S2 is asked as the first constraint condition Solve optimum control variable;The step S4 include it is following step by step:
S41, by wireless sensor network to the killing rate of Infection Status node (I) and sensitization node (S) is immunized Rate obtains domination set as control variable;
S42, objective function;
Wherein, J (u) indicates objective function, ε1Indicate the cost parameter of network killing infection node, ε2It is susceptible to indicate that network is immunized The propagation cost parameter of node, and ε1、ε2For constant, I (t) indicates the quantity of Infection Status node, and α (t) indicates Infection Status section The killing rate of point (I), μ (t) indicates the immune ratio of sensitization node (S), and the value range of α (t) and μ (t) is in 0 and 1 Between;
S43, according to the objective function of step S42, define the Lagrangian of optimization object function;
S44, hamilton's function is defined according to the state transfer equation that the Lagrangian and step S3 of step S43 obtain;
S45, the domination set obtained with step S41 is the second constraint conditions, by hamilton's function it can be concluded that optimal control Variable processed, so that infecting in network, node is minimum, and the cost for resisting rogue program propagation is minimum.
2. the control method for inhibiting rogue program to propagate in a kind of wireless sensor network according to claim 1, special Sign is, the step S1 further include: when the maximum transmitted radius of node is r, then node only with the nodal distance less than r's Node communication.
CN201610255831.2A 2016-04-22 2016-04-22 A kind of control method for inhibiting rogue program to propagate in wireless sensor network Active CN105959262B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610255831.2A CN105959262B (en) 2016-04-22 2016-04-22 A kind of control method for inhibiting rogue program to propagate in wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610255831.2A CN105959262B (en) 2016-04-22 2016-04-22 A kind of control method for inhibiting rogue program to propagate in wireless sensor network

Publications (2)

Publication Number Publication Date
CN105959262A CN105959262A (en) 2016-09-21
CN105959262B true CN105959262B (en) 2019-02-01

Family

ID=56916042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610255831.2A Active CN105959262B (en) 2016-04-22 2016-04-22 A kind of control method for inhibiting rogue program to propagate in wireless sensor network

Country Status (1)

Country Link
CN (1) CN105959262B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106455138A (en) * 2016-11-23 2017-02-22 天津大学 Wireless sensor network security patch distributing method based on cellular automaton
CN107104965B (en) * 2017-04-25 2020-12-25 成都瑞沣信息科技有限公司 Malicious program propagation control method based on mobile immunity
CN108769939A (en) * 2018-05-15 2018-11-06 重庆三峡学院 A kind of wireless sensor network multipath transmitting fault-tolerance approach
CN109246106B (en) * 2018-09-17 2022-05-24 平安科技(深圳)有限公司 Method, device, equipment and storage medium for inhibiting worm virus program
CN111343178B (en) * 2020-02-25 2022-05-06 广州大学 Attack and defense method of multistage wireless chargeable sensor network on malicious programs
CN111343180B (en) * 2020-02-25 2022-03-22 广州大学 Multi-type malicious program attack and defense method based on nonlinear chargeable sensor network model
CN112469041B (en) * 2020-11-30 2022-11-04 广州大学 Malicious program isolation and control method based on wireless sensor network
CN113015169B (en) * 2021-02-24 2022-08-09 广州大学 Optimal control method, device and medium for malicious program propagation of charging wireless sensor network
CN115002777A (en) * 2022-04-22 2022-09-02 广州大学 Optimal control method for malicious software propagation in smart fishery underwater acoustic sensor network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300208A (en) * 2011-06-21 2011-12-28 常州艾可泰自动化设备有限公司 Optimized protection strategy against dissemination of malicious software of wireless sensor network
US20120151588A1 (en) * 2010-12-09 2012-06-14 At&T Intellectual Property I, L.P. Malware Detection for SMS/MMS Based Attacks
CN104091123A (en) * 2014-06-27 2014-10-08 华中科技大学 Community network level virus immunization method
CN104361231A (en) * 2014-11-11 2015-02-18 电子科技大学 Method for controlling rumor propagation in complicated network
CN105357200A (en) * 2015-11-09 2016-02-24 河海大学 Network virus transmission behavior modeling method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120151588A1 (en) * 2010-12-09 2012-06-14 At&T Intellectual Property I, L.P. Malware Detection for SMS/MMS Based Attacks
CN102300208A (en) * 2011-06-21 2011-12-28 常州艾可泰自动化设备有限公司 Optimized protection strategy against dissemination of malicious software of wireless sensor network
CN104091123A (en) * 2014-06-27 2014-10-08 华中科技大学 Community network level virus immunization method
CN104361231A (en) * 2014-11-11 2015-02-18 电子科技大学 Method for controlling rumor propagation in complicated network
CN105357200A (en) * 2015-11-09 2016-02-24 河海大学 Network virus transmission behavior modeling method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Dynamical analysis and optimal control for a malware propagation model in an information network;Linhe Zhu等;《Neurocomputing, 2015》;20151231;第1370-1386页 *

Also Published As

Publication number Publication date
CN105959262A (en) 2016-09-21

Similar Documents

Publication Publication Date Title
CN105959262B (en) A kind of control method for inhibiting rogue program to propagate in wireless sensor network
Abdalzaher et al. Game theory meets wireless sensor networks security requirements and threats mitigation: A survey
Yousefpoor et al. A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
Hu et al. Global dynamics of an SIRS model with demographics and transfer from infectious to susceptible on heterogeneous networks
He et al. Inferring privacy information from social networks
Dimakis et al. Gossip algorithms for distributed signal processing
López et al. An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks
Khalid et al. Secure Iot integration in daily lives: A review
Bouij-Pasquier et al. A security framework for internet of things
Raj et al. Chaotic whale crow optimization algorithm for secure routing in the IoT environment
Shi et al. Information-aware secure routing in wireless sensor networks
Yang et al. The effect of infected external computers on the spread of viruses: a compartment modeling study
Mahalle et al. Object classification based context management for identity management in internet of things
Liu et al. Detecting malicious nodes via gradient descent and support vector machine in Internet of Things
Huang Artificial infectious disease optimization: A SEIQR epidemic dynamic model-based function optimization algorithm
Li et al. Suboptimal control and targeted constant control for semi-random epidemic networks
Qiu et al. Active defense model of wireless sensor networks based on evolutionary game theory
Liu et al. Defense strategy selection model based on multistage evolutionary game theory
Saleem et al. Secure transfer of environmental data to enhance human decision accuracy
Hosseinzadeh et al. A cluster-tree-based trusted routing algorithm using Grasshopper Optimization Algorithm (GOA) in Wireless Sensor Networks (WSNs)
Li et al. Enhancing trust-based medical smartphone networks via blockchain-based traffic sampling
Bistritz et al. Controlling contact network topology to prevent measles outbreaks
Mishra et al. Stability analysis of a predator–prey model in wireless sensor network
Neerugatti et al. Detection and prevention of black hole attack in RPL protocol based on the threshold value of nodes in the internet of things networks
She et al. Epidemics spread over networks: Influence of infrastructure and opinions

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant