CN106455138A - Wireless sensor network security patch distributing method based on cellular automaton - Google Patents

Wireless sensor network security patch distributing method based on cellular automaton Download PDF

Info

Publication number
CN106455138A
CN106455138A CN201611046406.9A CN201611046406A CN106455138A CN 106455138 A CN106455138 A CN 106455138A CN 201611046406 A CN201611046406 A CN 201611046406A CN 106455138 A CN106455138 A CN 106455138A
Authority
CN
China
Prior art keywords
node
state
security patch
wireless sensor
sensor network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611046406.9A
Other languages
Chinese (zh)
Inventor
李冬辉
李林
王艺琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201611046406.9A priority Critical patent/CN106455138A/en
Publication of CN106455138A publication Critical patent/CN106455138A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a wireless sensor network security patch distributing method based on a cellular automaton, which is technically characterized by comprising the following steps of: establishing a wireless sensor network model, and partitioning wireless sensor network nodes in the wireless sensor network model into three node states: a state that the sensor nodes can normally work, but a security patch is not installed on the sensor nodes, a state that the sensor nodes are infected with viruses, and a state that the security patch is installed on the sensor nodes and the sensor nodes are immune to the viruses; and establishing a security patch distribution model CAS=(C, S, N, F) of the two-dimensional cellular automaton, and according to three different node states of the wireless sensor network nodes, carrying out distribution of the wireless sensor network security patch on the basis of the cellular automaton. According to the wireless sensor network security patch distributing method disclosed by the invention, the two-dimensional cellular automaton with a square grid structure is adopted, so that cells which cannot be covered in a communication distance are effectively removed, a real state of a wireless sensor network can be clearly described, and the problem of difficulty in distributing the security patch after the wireless sensor network is infected with the viruses is solved.

Description

A kind of wireless sensor network security method for distributing patch based on cellular automata
Technical field
The invention belongs to wireless sensor network technology field, especially a kind of wireless senser based on cellular automata Network security method for distributing patch.
Background technology
Wireless sensor network (Wireless Sensor Networks) is honest and clean in monitored area by being deployed in a large number Valency microsensor node constitute and formed by wireless network transmissions mode a multi-hop ad hoc, adaptive intelligent network Network system, its objective is cooperative to perceive, collect and process the information of network's coverage area, is sent to manager.At present, WSN It is widely used in a lot of fields.
Virus is a severe safety problem for wireless sensor network.Generally using to meter in computer network Calculation machine system is stamped the method for security patch to remove virus, but for wireless sensor network, as its deployment amount is big, section Point is difficult to whole recovery, it is necessary to be considered as special security patch distribution method to remove virus.
Content of the invention
It is an object of the invention to overcoming the deficiencies in the prior art, a kind of wireless senser based on cellular automata is provided Network security method for distributing patch, after solving the problems, such as wireless sensor network virus infection, security patch is difficult to distribute.
The present invention solves its technical problem and takes technical scheme below to realize:
A kind of wireless sensor network security method for distributing patch based on cellular automata, comprises the steps:
Step 1, wireless sensor network model is set up, and by the wireless sensor network in wireless sensor network model Node division is three kinds of node states:Sensor node in energy normal work but does not stamp the state of security patch, sensor State that node has been infected, stamp state of the security patch to virus immunity;
Step 2, security patch distribution model CAS=(C, S, N, F) of two dimensional cellular automaton is set up, according to wireless sensing The different node states of three kinds of device network node, carry out dividing for the wireless sensor network security patch based on cellular automata Send out;C in above-mentioned security patch distribution model represents cellular space, and S represents the state set of cellular, and N represents cellular neighborhood, F table Show cellular evolution rule.
The wireless sensor network model of the step 1 is:Monitored area is a square area, and its length of side l, at this It is n to include wireless sensor network node number in monitored area, and it is r that node density is the communication distance of ρ, node;The nothing Line sensor network nodes are used for perceiving and gathering the data in monitored area and be transferred to base station by way of multi-hop;Described Under wireless sensor network node original state, the ratio of infected node is that θ, node is properly received security patch probability for α, It is β that security patch removes the probability of virus.
C, S, N, F in the security patch distribution model is expressed as:
(1) cellular space C represents the two-dimensional grid of l × l grid, if each unit at most only accommodates a wireless sensing Device network node, wireless sensor network node position in space is using horizontal coordinate i in two-dimensional grid and vertically Coordinate j is expressed as:
C=(i, j) | 1≤i≤l, 1≤j≤l }
(2) the state set S of cellular includes following two state sets:
State set SC is divided into three states for the state of wireless sensor network node, wireless sensor network node: Immune state after normal node state, Infection Status and acquisition security patch;When wireless sensor network normal node is obtained Immune state is directly entered after obtaining security patch, the virus for having infected node is eliminated time entrance immune state;State set SC leads to Cross equation below to be indicated:
State set MAC considers the channel access principle in wireless sensor network transmission, adopts CSMA/ during distribution patch CA mode:When certain wireless sensor network node listen to channel busy after again random back carry out data for a period of time afterwards and send out Send, its field node can not all send when data are sent when a wireless sensor network node, only listen to channel sky Can just attempt after spare time sending data;State set MAC is indicated by equation below:
(3) cellular neighborhood N
Arbitrary node CijCellular neighborhood as follows:
(4) the cellular state transfer function F of cellular evolution rule
State SC of wireless sensor network nodeijState SC in tij(t) be by t-1 moment wireless senser State SC of network nodeij(t-1) and its neighborhood node state set SNijTogether decide on, then transfer function is by following public affairs Formula represents:
SCj(t)=f (SCij(t-1), SNij(t-1))
If 1. wireless sensor network node is normal node state in the t-1 moment, its State Transferring letter is:
SCij T(t)=max (1, f1(SNij(t-1)))
In above formula, the maximum of two functions is state SC of wireless sensor network nodeij
If 2. the normal node field has e to obtain security patch and the node in immune state sends security patch bag, In this time interval, then there is 1- (1- α)eProbability receive service packs, when channel is in idle condition, then wireless senser Network node enters immune state;Then the condition conversion function is:
If 3. wireless sensor node is Infection Status in the t-1 moment, state transition function is:
SCij v(t)=max (0, f2(SNij(t-1)))
In above formula, the maximum of two functions is state SC of nodeij
If 4. this has e to obtain security patch the node transmission safety benefit in immune state in Infection Status node field Fourth bag, in this time interval, has 1- (1- α)eProbability receive service packs, when channel be in idle condition, then node become Work(receives service packs;After often receiving a service packs, the probability for having β enters immune state, then after receiving g security patch bag The probability of healing is (1- (1- α)e)(1-(1-β)g);Wherein, g≤e;Then condition conversion function is:
If 5. node is in the t-1 moment already in immune state, state transition function is:
SCij m(t)=2
Now, immune state node maintains this state constant, only outwards continues distribution security patch.
The step 2 carries out the method for the wireless sensor network security patch distribution based on cellular automata:
In initialization, carry out the distribution of the wireless sensor network security patch based on cellular automata, including with Lower step:
1., in l × l square area, in known infected wireless sensor network, one or several are chosen Node takes the mode of artificial programming program to stamp security patch, enters the state to virus immunity for having stamped security patch;
1) selected start node is directed to, carries out dividing for the wireless sensor network security patch based on cellular automata Send out:
1. outside distribution security patch by the way of two dimensional cellular automaton;
2. the node to virus immunity state for having stamped security patch, the position being calculated as follows in cellular space are in C:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern Mole type neighborhood, arbitrary node CijNeighborhood be:
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
(2) for the node for being infected state, the wireless sensor network security based on cellular automata is carried out Patch is distributed, and comprises the following steps:
1. the node of Virus State has been infected by function SCij v(t)=max (0, f2(SNij(t-1))) oneself is calculated Subsequent time state;
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send;If This node field has e to obtain security patch the node in immune state, then send security patch bag, between this time Every interior, the probability for having 1- (1- α) e receives service packs;After node often receives a service packs, β probability is had to enter immune state, then The probability that cures after receiving g security patch bag is (1- (1- α)e)(1-(1-β)g);Wherein, g≤e;Virus State has been infected 3. node enters step if being cured, if the node for having infected Virus State is not cured, repeat step (2);
3. the node to virus immunity state for having stamped security patch, the position being calculated as follows in cellular space are in C:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern Mole type neighborhood, arbitrary node CijNeighborhood be:
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
(3) it is directed to normal work but the node of the state of security patch is not stamped, carries out based on the wireless of cellular automata Sensor network security patch is distributed, and comprises the following steps:
1. normal work node passes through function SCij r(t)=max (1, f1(SNij(t-1))) oneself subsequent time shape is calculated State.
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send;If This node field has e to obtain security patch and the node in immune state sends security patch bag, in this time interval Interior, there is 1- (1- α)eProbability receive service packs;After receiving service packs, normal node carries out safety upgrade, immune virus infraction, Subsequently enter step 3., repeat step (3) if do not receive service packs;
3. the node to virus immunity state for having stamped security patch, the position being calculated as follows in cellular space are in C:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern Mole type neighborhood, arbitrary node CijNeighborhood be:
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
4. V (t) is made to represent the quantity accounting of the state sensor node being infected in t, R (t) represents in t Moment in energy normal work but does not stamp the quantity accounting of the sensor node of security patch state, and M (t) represents in t Quantity accounting of the security patch to the sensor node of virus immunity state is stamped, has been expressed as:
Wherein, V (t)+R (t)+M (t)=1.
Advantages of the present invention and good effect are:
The security patch for receiving is distributed to its yuan using the two dimensional cellular automaton of square net, node by the present invention Other nodes in born of the same parents' neighborhood, so as to fast and effeciently be distributed to whole wireless sensor nodes, wireless senser by security patch Network node neighborhood adopts improved extended pattern mole field, effectively eliminates the cellular that cannot cover in communication distance, can The time of day of wireless sensor network is clearly described, is solved for security patch hardly possible after wireless sensor network virus infection With the problem that distributes.
Description of the drawings
Fig. 1 is common cellular automata mole type neighborhood schematic diagram;
Fig. 2 is the modified model cellular automata mole type neighborhood schematic diagram that the present invention is adopted;
Fig. 3 is V (t) after stamping security patch, R (t), the curve chart of M (t);
Fig. 4 is β=0.2 and V (t) curve chart under β=0.6;
Fig. 5 is β=0.2 and M (t) curve chart under β=0.6;
Fig. 6 is θ=0.4 and V (t) curve chart under θ=0.8;
Fig. 7 is θ=0.4 and M (t) curve chart under θ=0.8;
Fig. 8 is M (t) curve chart from diverse location distribution security patch.
Specific embodiment
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail:
A kind of wireless sensor network security method for distributing patch based on cellular automata, comprises the steps:
Step 1, wireless sensor network model is set up, and root is by the wireless sensor network in wireless sensor network model Network node is divided into tri- kinds of node states of r, v, m according to the characteristic of node.
In the present embodiment, the monitored area of wireless sensor network model is a square area, its length of side l, It is n to include wireless sensor network node number in monitored area, and node density is that ρ, node is evenly distributed in two dimension at random In region, node signal maximum launch range is that r, which can communicated in r.Above-mentioned wireless sensor network node It is responsible for perceiving and gathering the data in monitored area and be transferred to base station by way of multi-hop.If wireless sensor network node Under original state, the ratio of infected node is that θ, node is properly received security patch probability α, and security patch removes the general of virus Rate is β.
Wireless sensor network model is divided into following three kinds of states according to the characteristic of node, as shown in table 1.
1 wireless sensor node state parameter table of table
R representative sensor node in energy normal work but does not stamp the state of security patch;V representative sensor node is The state being infected;M is represented and has been stamped state of the security patch to virus immunity;
Then have:R (t)+v (t)+m (t)=n.
Step 2, the security patch distribution model of two dimensional cellular automaton is set up, three kinds of wireless sensor network node are not Same node state, carries out the distribution of the wireless sensor network security patch based on cellular automata.
Two dimensional cellular automaton is simple structure but can produce the discrete dynamical system of complicated self-organizing behavior, with mould Intend the ability of complication system temporal-spatial evolution process.The two dimensional cellular automaton is made up of the cellular object of limited random distribution Discrete dynamic system, each cellular has a state, and it is become according to rule change in the state of each time step Change.
The security patch distribution model of the two dimensional cellular automaton of the present invention is represented by following four-tuple formula (1):
CAS=(C, S, N, F) (1)
In above formula, C represents cellular space;S represents the state set of cellular;N represents cellular neighborhood;F represents that cellular develops and advises Then.
Separately below each element in the four-tuple formula (1) is described in detail:
(1) cellular space C:The two-dimensional grid of l × l grid is represented, if each unit at most only accommodates a wireless biography Sensor network node.The two-dimensional grid as shown in formula (2) can be used in wireless sensor network node position in space In horizontal coordinate i and vertical coordinate j represent:
C=(i, j) | 1≤i≤l, 1≤j≤l } (2)
(2) the state set S of cellular:SC and MAC is respectively comprising two state sets in which;
Wherein, SC is the state of wireless sensor network node, and wireless sensor network node is divided into three states:Just Normal node state r (wireless sensor node in energy normal work but does not stamp the state of security patch), Infection Status v Immune state m after (state that wireless sensor network node has been infected) and acquisition security patch (has stamped safety State of the patch to virus immunity).
Immune state is directly entered after wireless sensor network normal node obtains security patch, has infected the disease of node Poison is eliminated time and enters immune state.Specifically as shown in formula (3):
State set MAC considers the channel access principle in wireless sensor network transmission, adopts CSMA/ during distribution patch CA mode:When certain wireless sensor network node listen to channel busy after again random back carry out data for a period of time afterwards and send out Send, its field node can not all send when data are sent when a wireless sensor network node, only listen to channel sky Can just attempt after spare time sending data.Specifically as shown in formula (4):
(3) cellular neighborhood N:
Common mole type neighborhood is cellular neighborhood of the Lycoperdon polymorphum Vitt shown in Fig. 1 for k node, but due to single wireless sensor network The communication overlay of network node is circle, it is impossible to clearly describe the time of day of network.The wireless sensor network node of the present invention Neighborhood adopts improved extended pattern mole field, eliminates the cellular that cannot cover in communication distance, as shown in Fig. 2 each biography The transmitting range of sensor node maximum is r, therefore arbitrary node CijCellular neighborhood concrete as shown in formula (5):
In the security patch distribution model of the two dimensional cellular automaton of the present invention, only belong to the node in contiguous range Can just be in communication with each other.
(4) the cellular state transfer function F of cellular evolution rule
State SC of wireless sensor network nodeijState SC in tij(t) be by t-1 moment wireless senser State SC of network nodeij(t-1) and its neighborhood node state set SNijTogether decide on, then transfer function can be by public affairs Formula (6) represents:
SCij(t)=f (SCij(t-1), SNij(t-1)) (6)
If 1. wireless sensor network node is normal node state in the t-1 moment, its state transition function such as formula (7) shown in:
SCij r(t)=max (1, f1(SNij(t-1))) (7)
In above formula, the maximum of two functions is state SC of wireless sensor network nodeij
If 2. the normal node field has e to obtain security patch and the node in immune state sends security patch bag, In this time interval, then there is 1- (1- α)eProbability receive service packs, when channel is in idle condition, then wireless senser Network node enters immune state.
Then the condition conversion function is represented by formula (8):
If 3. wireless sensor node is Infection Status in the t-1 moment, shown in state transition function such as formula (9):
SCij v(t)=max (0, f2(SNij(t-1))) (9)
In above formula, the maximum of two functions is state SC of nodeij
If 4. this has e to obtain security patch the node transmission safety benefit in immune state in Infection Status node field Fourth bag, in this time interval, has 1- (1- α)eProbability receive service packs, when channel be in idle condition, then node become Work(receives service packs.After often receiving a service packs, the probability for having β enters immune state, then after receiving g security patch bag The probability of healing is (1- (1- α)e)(1-(1-β)g), wherein g≤e;
Then condition conversion function is represented by formula (10):
If 5. node is in the t-1 moment already in immune state, state transition function is represented by formula (11):
SCij m(t)=2 (11)
Now, node maintains this state constant, only outwards continues distribution security patch.
According to the security patch distribution model of above-mentioned two dimensional cellular automaton, carry out wireless sensor network security patch and divide Send out method be:
In an initial condition, the distribution of the wireless sensor network security patch based on cellular automata is carried out.
Under original state, wireless sensor node state includes two kinds:Sensor node in energy normal work but is not stamped State r of security patch;State v that sensor node has been infected;
In l × l square area, one or several sections are chosen in known infected wireless sensor network Point takes the mode of artificial programming program to stamp security patch, and no matter what state node is before, all enters and stamps safety The state to virus immunity of patch;
(1) selected start node is directed to, carries out wireless sensor network security patch based on cellular automata Distribution.
1. outside distribution security patch by the way of two dimensional cellular automaton;
2. be in stamped the node to virus immunity state of security patch can be by the two-dimentional cellular of the step 2 The formula (1) of the security patch distribution model of automat calculates the state of oneself:
CAS=(C, S, N, F) (1)
In above formula, C is the position in cellular space, and the level in two-dimensional grid can be used in node position in space Coordinate i and vertical coordinate j are expressed as the formula (2) of the step 2
C=(i, j) | 1≤i≤l, 1≤j≤l } (2)
Wireless sensor network node its node state after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, communicated with the node in neighborhood, section Neighborhood of a point is improved extended pattern mole type neighborhood, is calculated by the formula (3) of the step 2, each sensor node maximum Transmitting range be r, therefore, arbitrary node CijNeighborhood be:
This node state SC subsequentij mT ()=2 take the channel in neighborhood, state SC of this node oneselfij m(t)= 2.
(2) for the node of viral Infection Status, the wireless sensor network security patch based on cellular automata is carried out Distribute, concrete grammar is:
1. pass through function SC for the node for infecting Virus Stateij v(t)=max (0, f2(SNij(t-1))) calculate certainly Oneself subsequent time state;
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send;If This node field has e to obtain security patch and the node in immune state sends security patch bag, in this time interval Interior, there is 1- (1- α)eProbability receive service packs;After often receiving a service packs, the probability for having β enters immune state, then receive The probability that cures after g security patch bag is (1- (1- α)e)(1-(1-β)g);Wherein, g≤e.
2. step that the node of Virus State if be cured if enter " start node " in has been infected, if having infected viral shape The node of state is not cured, then repeat this step.
(3) for the node of normal operating conditions, the wireless sensor network security patch based on cellular automata is carried out The concrete steps of distribution method include:
1. normal work node passes through function SCij r(t)=max (1, f1(SNij(t-1))) oneself subsequent time shape is calculated State.
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send.If This node field has e to obtain security patch and the node in immune state sends security patch bag, in this time interval Interior, there is 1- (1- α)eProbability receive service packs;After receiving service packs, normal node carries out safety upgrade, immune virus infraction, Subsequently enter step in " start node " 2., repeat this step if service packs is not received.
3. V (t) is made to represent the quantity accounting of the state sensor node being infected in t, R (t) represents in t Moment in energy normal work but does not stamp the quantity accounting of the sensor node of security patch state, and M (t) represents in t Quantity accounting of the security patch to the sensor node of virus immunity state is stamped, has been represented by formula (4):
Wherein, V (t)+R (t)+M (t)=1
Through after a while, showing can using a kind of security patch distribution method based on cellular automata of the present invention The distribution of contact security patch is finished, after security patch distribution is finished, all node states are:Security patch has been stamped to disease State m of poison immunity.
Below based on the security patch distribution method of cellular automata, emulation experiment is carried out to the present invention, for verifying this The reliability of method.
The emulation experiment network environment arranges as follows:Monitored area is a square area, its length of side l=200m, In monitored area comprising node number be n, node density be ρ, the communication distance of node is initial infected node r, in network Ratio be θ, node is properly received security patch probability α, and it is β that security patch removes the probability of virus, in the often wheel unit interval 10 communication is inside carried out.
In this emulation experiment, we study security patch distribution effect under the different parameters of wireless senser, initially Value node number n=20000, node density is ρ=0.5, communication distance r=10m, initially infected ratio θ=0.4, node Security patch probability α=0.8 is properly received, when security patch removes the probability of virus for β=0.6, coordinate is (100,100) Node stamp security patch after V (t), R (t), M (t) curve as shown in Figure 3.Experiment shows all nodes after the 23rd wheel Security patch has all been stamped, and the method that this invention is adopted is very efficient.
We investigate the patch when security patch removing virus capable is poor and distribute effect, take β=0.2.Fig. 4 represents not V (t) curve under same value, Fig. 5 represents M (t) curve under different values.The experiment shows the β when Scavenging activity is poor When=0.2, the method remains to, in the 30th wheel, all nodes are stamped patch, and the method is still efficient.
Patch distribution effect when initially the ratio of infected node is higher in a network is investigated, takes θ=0.8.Fig. 6 represents not V (t) curve under same value, Fig. 7 represents M (t) curve under different values.The experiment shows when infection node is in initially quilt Infection node patch is higher, and when 80% node is all infected by the virus, all nodes can be stamped patch in the 25th wheel by the method, Still there is high efficiency.
Investigate the method different coordinate position start nodes distribution effect, respectively from (100,100), (50,50) and (10,10) position starts distribution security patch, and Fig. 8 represents M (t) curve under different values.This experiment shows the closer to region Center, the speed of node distribution patch is faster.But the method remains to divide patch in 36 wheels in the position of edges of regions (10,10) Distribute complete, it was demonstrated that in the method selection region, any node finally all will quickly can be mended as start node distribution security patch Fourth distribution is finished.
It is emphasized that embodiment of the present invention is illustrative rather than determinate, therefore bag of the present invention The embodiment for being not limited to described in specific embodiment is included, every by those skilled in the art's technology according to the present invention scheme The other embodiment for drawing, also belongs to the scope of protection of the invention.

Claims (4)

1. a kind of wireless sensor network security method for distributing patch based on cellular automata, it is characterised in that:Including as follows Step:
Step 1, wireless sensor network model is set up, and by the wireless sensor network node in wireless sensor network model It is divided into three kinds of node states:Sensor node in energy normal work but does not stamp the state of security patch, sensor node The state that has been infected, stamp state of the security patch to virus immunity;
Step 2, security patch distribution model CAS=(C, S, N, F) of two dimensional cellular automaton is set up, according to wireless sensor network The different node states of three kinds of network node, carry out the distribution of the wireless sensor network security patch based on cellular automata;On State the C in security patch distribution model and represent cellular space, S represents the state set of cellular, N represents cellular neighborhood, F represents cellular Evolution rule.
2. a kind of wireless sensor network security method for distributing patch based on cellular automata according to claim 1, It is characterized in that:The wireless sensor network model of the step 1 is:Monitored area is a square area, its length of side l, It is n to include wireless sensor network node number in the monitored area, and it is r that node density is the communication distance of ρ, node;Institute Wireless sensor network node is stated for perceiving and gathering data in monitored area and base station is transferred to by way of multi-hop; Under the wireless sensor network node original state, the ratio of infected node is that θ, node is properly received security patch probability For α, it is β that security patch removes the probability of virus.
3. a kind of wireless sensor network security patch distributor based on cellular automata according to claim 1 and 2 Method, it is characterised in that:C, S, N, F in the security patch distribution model is expressed as:
(1) cellular space C represents the two-dimensional grid of l × l grid, if each unit at most only accommodates a wireless sensor network Network node, wireless sensor network node position in space is using horizontal coordinate i in two-dimensional grid and vertical coordinate j It is expressed as:
C=(i, j) | 1≤i≤l, 1≤j≤l }
(2) the state set S of cellular includes following two state sets:
State set SC is divided into three states for the state of wireless sensor network node, wireless sensor network node:Normally Immune state after node state, Infection Status and acquisition security patch;When wireless sensor network normal node obtains peace Immune state is directly entered after full patch, the virus for having infected node is eliminated time entrance immune state;State set SC is by such as Lower formula is indicated:
State set MAC considers the channel access principle in wireless sensor network transmission, adopts CSMA/CA side during distribution patch Formula:When certain wireless sensor network node listen to channel busy after again random back carry out data is activation for a period of time afterwards, when One wireless sensor network node its field node when data are sent can not all send, and only listen to ability after channel idle Can attempt sending data;State set MAC is indicated by equation below:
(3) cellular neighborhood N
Arbitrary node CijCellular neighborhood as follows:
N i j = ( x - i ) 2 + ( y - j ) 2 ≤ r , ( x , y ) ∈ C
(4) the cellular state transfer function F of cellular evolution rule
State SC of wireless sensor network nodeijState SC in tij(t) be by t-1 moment wireless sensor network section State SC of pointij(t-1) and its neighborhood node state setTogether decide on, then transfer function is by equation below table Show:
SCij(t)=f (5Cij(t-1), SNij(t-1))
If 1. wireless sensor network node is normal node state in the t-1 moment, its State Transferring letter is:
SCij r(t)=max (1, f1(SNij(t-1)))
In above formula, the maximum of two functions is state SC of wireless sensor network nodeij
If 2. the normal node field has e to obtain security patch and the node in immune state sends security patch bag, at this In individual time interval, then there is 1- (1- α)eProbability receive service packs, when channel is in idle condition, then wireless sensor network Node enters immune state;Then the condition conversion function is:
If 3. wireless sensor node is Infection Status in the t-1 moment, state transition function is:
SCij v(t)=max (0, f2(SNij(t-1)))
In above formula, the maximum of two functions is state SC of nodeij
If 4. this has e to obtain security patch the node transmission security patch in immune state in Infection Status node field Bag, in this time interval, has 1- (1- α)eProbability receive service packs, when channel be in idle condition, then node success Receive service packs;After often receiving a service packs, the probability for having β enters immune state, then control after receiving g security patch bag More probability is (1- (1- α)e)(1-(1-β)g);Wherein, g≤e;Then condition conversion function is:
If 5. node is in the t-1 moment already in immune state, state transition function is:
SCij m(t)=2
Now, immune state node maintains this state constant, only outwards continues distribution security patch.
4. a kind of wireless sensor network security patch distributor based on cellular automata according to claim 1 and 2 Method, it is characterised in that:The step 2 carries out the method that the wireless sensor network security patch based on cellular automata is distributed For:
In l × l square area, one or several nodes are chosen in known infected wireless sensor network and adopt The mode for taking artificial programming program stamps security patch, enters the state to virus immunity for having stamped security patch;
(1) selected start node is directed to, carries out the distribution of the wireless sensor network security patch based on cellular automata:
1. outside distribution security patch by the way of two dimensional cellular automaton;
2. the node to virus immunity state for having stamped security patch is in, the position C being calculated as follows in cellular space:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern mole Type neighborhood, arbitrary node CijNeighborhood be:
N i j = ( x - i ) 2 + ( y - j ) 2 ≤ r , ( x , y ) ∈ C
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
(2) for the node for being infected state, the wireless sensor network security patch based on cellular automata is carried out Distribution, comprises the following steps:
1. the node of Virus State has been infected by function SCij v(t)=max (0, f2(SNij(t-1))) the next of oneself is calculated Moment state;
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send;If this Node field has e to obtain security patch the node in immune state, then send security patch bag, in this time interval Interior, there is 1- (1- α)eProbability receive service packs;After node often receives a service packs, there is β probability that immune state is entered, then receive The probability that cures to after g security patch bag is 1- (1- α)e)(1-(1-β)g);Wherein, g≤e;The section of Virus State has been infected 3. point enters step if being cured, if the node for having infected Virus State is not cured, repeat step (2);
3. the node to virus immunity state for having stamped security patch is in, the position C being calculated as follows in cellular space:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern mole Type neighborhood, arbitrary node CijNeighborhood be:
N i j = ( x - i ) 2 + ( y - j ) 2 ≤ r , ( x , y ) ∈ C
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
(3) it is directed to normal work but the node of the state of security patch is not stamped, carries out the wireless sensing based on cellular automata Device network security patch is distributed, and comprises the following steps:
1. normal work node passes through function SCij r(t)=max (1, f1(SNij(t-1))) oneself subsequent time state is calculated.
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send;If this Node field has e to obtain security patch and the node in immune state sends security patch bag, in this time interval, has 1-(1-α)eProbability receive service packs;After receiving service packs, normal node carries out safety upgrade, immune virus infraction, subsequently Enter step 3., repeat step (3) if do not receive service packs;
3. the node to virus immunity state for having stamped security patch is in, the position C being calculated as follows in cellular space:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern mole Type neighborhood, arbitrary node CijNeighborhood be:
N i j = ( x - i ) 2 + ( y - j ) 2 ≤ r , ( x , y ) ∈ C
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
4. V (t) is made to represent the quantity accounting of the state sensor node being infected in t, R (t) represents in t It is in energy normal work but the quantity accounting of the sensor node of security patch state is not stamped, M (t) expression is beaten in t Quantity accounting of the upper security patch to the sensor node of virus immunity state, is expressed as:
V ( t ) = Σ i , j ( S C i j = 0 ) / N R ( t ) = Σ i , j ( S C i j = 1 ) / N M ( t ) = Σ i , j ( S C i j = 2 ) / N
Wherein, V (t)+R (t)+M (t)=1.
CN201611046406.9A 2016-11-23 2016-11-23 Wireless sensor network security patch distributing method based on cellular automaton Pending CN106455138A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611046406.9A CN106455138A (en) 2016-11-23 2016-11-23 Wireless sensor network security patch distributing method based on cellular automaton

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611046406.9A CN106455138A (en) 2016-11-23 2016-11-23 Wireless sensor network security patch distributing method based on cellular automaton

Publications (1)

Publication Number Publication Date
CN106455138A true CN106455138A (en) 2017-02-22

Family

ID=58218228

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611046406.9A Pending CN106455138A (en) 2016-11-23 2016-11-23 Wireless sensor network security patch distributing method based on cellular automaton

Country Status (1)

Country Link
CN (1) CN106455138A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108965287A (en) * 2018-07-09 2018-12-07 陕西师范大学 It is a kind of temporarily to delete the viral transmission control method on side based on limited
CN117892225A (en) * 2024-03-15 2024-04-16 西北工业大学 Virus propagation dynamics modeling method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300208A (en) * 2011-06-21 2011-12-28 常州艾可泰自动化设备有限公司 Optimized protection strategy against dissemination of malicious software of wireless sensor network
CN105959262A (en) * 2016-04-22 2016-09-21 电子科技大学 Control method for inhibiting propagation of malicious programs in wireless sensor network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300208A (en) * 2011-06-21 2011-12-28 常州艾可泰自动化设备有限公司 Optimized protection strategy against dissemination of malicious software of wireless sensor network
CN105959262A (en) * 2016-04-22 2016-09-21 电子科技大学 Control method for inhibiting propagation of malicious programs in wireless sensor network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
宋玉蓉,蒋国平,徐加刚: "一种基于元胞自动机的自适应网络病毒传播模型", 《物理学报》 *
宋玉蓉,蒋国平: "无线传感器网络中恶意软件传播研究", 《南京邮电大学学报》 *
胡金涛: "无线传感器网络中恶意软件传播及控制策略研究", 《中国优秀硕士学位论文全文数据库》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108965287A (en) * 2018-07-09 2018-12-07 陕西师范大学 It is a kind of temporarily to delete the viral transmission control method on side based on limited
CN108965287B (en) * 2018-07-09 2021-04-13 陕西师范大学 Virus propagation control method based on limited temporary edge deletion
CN117892225A (en) * 2024-03-15 2024-04-16 西北工业大学 Virus propagation dynamics modeling method and device
CN117892225B (en) * 2024-03-15 2024-05-24 西北工业大学 Virus propagation dynamics modeling method and device

Similar Documents

Publication Publication Date Title
CN104838597B (en) Adaptive channel reuse mechanism in communication network
CN105979598B (en) A kind of LTE-D2D car networking resource allocation methods based on traffic flow Dynamic Packet
CN102223412B (en) Machine type communication method and device
CN102724764B (en) Self-adaptive media access control (MAC) protocol for vehicle-mounted wireless self-organized network
CN103281704A (en) Method for deploying wireless sensor network in deterministic space based on three-dimensional sensing
CN105472761A (en) User equipment access method and device
CN106470449A (en) A kind of data transmit-receive, trunking method, device and communication system
Centenaro et al. A study on M2M traffic and its impact on cellular networks
CN109890085A (en) One kind point priority machine type communication random access backoff parameter determines method
CN106455138A (en) Wireless sensor network security patch distributing method based on cellular automaton
Kim et al. Data aggregation and packet bundling of uplink small packets for monitoring applications in LTE
CN104219778A (en) Wireless sensor network contention access method based on energy harvesting rate
CN107231427A (en) MAC protocol recognition methods based on SVMs
CN107484255A (en) Preferred channels number determines method in a kind of multichannel CSMA agreements based on frequency packet
CN103857059A (en) EDCA mechanism optimizing method of IEEE 802.11P vehicle-mounted ad hoc network protocol
Le et al. Approximate queuing analysis for IEEE 802.15. 4 sensor network
CN102752760B (en) Frequency spectrum collaboration sharing method in cognitive radio
Dasgupta et al. Congestion avoidance topology in wireless sensor network using Karnaugh map
CN112929901B (en) Adaptive configuration method, device and equipment of gateway and readable storage medium
CN101772125B (en) Method and device for network link management
Xu et al. How well does CSMA/CN work in WLANs?
Özgüner et al. A simulation study of an intersection collision warning system
CN106993306A (en) Wireless network MAC layer distributed coordination system and its construction method based on FPGA
CN104394599A (en) Design method of CSMA/CA protocol for M2M network
Korzhuk et al. The model of the attack implementation on wireless sensor networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222

RJ01 Rejection of invention patent application after publication