CN106455138A - Wireless sensor network security patch distributing method based on cellular automaton - Google Patents
Wireless sensor network security patch distributing method based on cellular automaton Download PDFInfo
- Publication number
- CN106455138A CN106455138A CN201611046406.9A CN201611046406A CN106455138A CN 106455138 A CN106455138 A CN 106455138A CN 201611046406 A CN201611046406 A CN 201611046406A CN 106455138 A CN106455138 A CN 106455138A
- Authority
- CN
- China
- Prior art keywords
- node
- state
- security patch
- wireless sensor
- sensor network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a wireless sensor network security patch distributing method based on a cellular automaton, which is technically characterized by comprising the following steps of: establishing a wireless sensor network model, and partitioning wireless sensor network nodes in the wireless sensor network model into three node states: a state that the sensor nodes can normally work, but a security patch is not installed on the sensor nodes, a state that the sensor nodes are infected with viruses, and a state that the security patch is installed on the sensor nodes and the sensor nodes are immune to the viruses; and establishing a security patch distribution model CAS=(C, S, N, F) of the two-dimensional cellular automaton, and according to three different node states of the wireless sensor network nodes, carrying out distribution of the wireless sensor network security patch on the basis of the cellular automaton. According to the wireless sensor network security patch distributing method disclosed by the invention, the two-dimensional cellular automaton with a square grid structure is adopted, so that cells which cannot be covered in a communication distance are effectively removed, a real state of a wireless sensor network can be clearly described, and the problem of difficulty in distributing the security patch after the wireless sensor network is infected with the viruses is solved.
Description
Technical field
The invention belongs to wireless sensor network technology field, especially a kind of wireless senser based on cellular automata
Network security method for distributing patch.
Background technology
Wireless sensor network (Wireless Sensor Networks) is honest and clean in monitored area by being deployed in a large number
Valency microsensor node constitute and formed by wireless network transmissions mode a multi-hop ad hoc, adaptive intelligent network
Network system, its objective is cooperative to perceive, collect and process the information of network's coverage area, is sent to manager.At present, WSN
It is widely used in a lot of fields.
Virus is a severe safety problem for wireless sensor network.Generally using to meter in computer network
Calculation machine system is stamped the method for security patch to remove virus, but for wireless sensor network, as its deployment amount is big, section
Point is difficult to whole recovery, it is necessary to be considered as special security patch distribution method to remove virus.
Content of the invention
It is an object of the invention to overcoming the deficiencies in the prior art, a kind of wireless senser based on cellular automata is provided
Network security method for distributing patch, after solving the problems, such as wireless sensor network virus infection, security patch is difficult to distribute.
The present invention solves its technical problem and takes technical scheme below to realize:
A kind of wireless sensor network security method for distributing patch based on cellular automata, comprises the steps:
Step 1, wireless sensor network model is set up, and by the wireless sensor network in wireless sensor network model
Node division is three kinds of node states:Sensor node in energy normal work but does not stamp the state of security patch, sensor
State that node has been infected, stamp state of the security patch to virus immunity;
Step 2, security patch distribution model CAS=(C, S, N, F) of two dimensional cellular automaton is set up, according to wireless sensing
The different node states of three kinds of device network node, carry out dividing for the wireless sensor network security patch based on cellular automata
Send out;C in above-mentioned security patch distribution model represents cellular space, and S represents the state set of cellular, and N represents cellular neighborhood, F table
Show cellular evolution rule.
The wireless sensor network model of the step 1 is:Monitored area is a square area, and its length of side l, at this
It is n to include wireless sensor network node number in monitored area, and it is r that node density is the communication distance of ρ, node;The nothing
Line sensor network nodes are used for perceiving and gathering the data in monitored area and be transferred to base station by way of multi-hop;Described
Under wireless sensor network node original state, the ratio of infected node is that θ, node is properly received security patch probability for α,
It is β that security patch removes the probability of virus.
C, S, N, F in the security patch distribution model is expressed as:
(1) cellular space C represents the two-dimensional grid of l × l grid, if each unit at most only accommodates a wireless sensing
Device network node, wireless sensor network node position in space is using horizontal coordinate i in two-dimensional grid and vertically
Coordinate j is expressed as:
C=(i, j) | 1≤i≤l, 1≤j≤l }
(2) the state set S of cellular includes following two state sets:
State set SC is divided into three states for the state of wireless sensor network node, wireless sensor network node:
Immune state after normal node state, Infection Status and acquisition security patch;When wireless sensor network normal node is obtained
Immune state is directly entered after obtaining security patch, the virus for having infected node is eliminated time entrance immune state;State set SC leads to
Cross equation below to be indicated:
State set MAC considers the channel access principle in wireless sensor network transmission, adopts CSMA/ during distribution patch
CA mode:When certain wireless sensor network node listen to channel busy after again random back carry out data for a period of time afterwards and send out
Send, its field node can not all send when data are sent when a wireless sensor network node, only listen to channel sky
Can just attempt after spare time sending data;State set MAC is indicated by equation below:
(3) cellular neighborhood N
Arbitrary node CijCellular neighborhood as follows:
(4) the cellular state transfer function F of cellular evolution rule
State SC of wireless sensor network nodeijState SC in tij(t) be by t-1 moment wireless senser
State SC of network nodeij(t-1) and its neighborhood node state set SNijTogether decide on, then transfer function is by following public affairs
Formula represents:
SCj(t)=f (SCij(t-1), SNij(t-1))
If 1. wireless sensor network node is normal node state in the t-1 moment, its State Transferring letter is:
SCij T(t)=max (1, f1(SNij(t-1)))
In above formula, the maximum of two functions is state SC of wireless sensor network nodeij;
If 2. the normal node field has e to obtain security patch and the node in immune state sends security patch bag,
In this time interval, then there is 1- (1- α)eProbability receive service packs, when channel is in idle condition, then wireless senser
Network node enters immune state;Then the condition conversion function is:
If 3. wireless sensor node is Infection Status in the t-1 moment, state transition function is:
SCij v(t)=max (0, f2(SNij(t-1)))
In above formula, the maximum of two functions is state SC of nodeij;
If 4. this has e to obtain security patch the node transmission safety benefit in immune state in Infection Status node field
Fourth bag, in this time interval, has 1- (1- α)eProbability receive service packs, when channel be in idle condition, then node become
Work(receives service packs;After often receiving a service packs, the probability for having β enters immune state, then after receiving g security patch bag
The probability of healing is (1- (1- α)e)(1-(1-β)g);Wherein, g≤e;Then condition conversion function is:
If 5. node is in the t-1 moment already in immune state, state transition function is:
SCij m(t)=2
Now, immune state node maintains this state constant, only outwards continues distribution security patch.
The step 2 carries out the method for the wireless sensor network security patch distribution based on cellular automata:
In initialization, carry out the distribution of the wireless sensor network security patch based on cellular automata, including with
Lower step:
1., in l × l square area, in known infected wireless sensor network, one or several are chosen
Node takes the mode of artificial programming program to stamp security patch, enters the state to virus immunity for having stamped security patch;
1) selected start node is directed to, carries out dividing for the wireless sensor network security patch based on cellular automata
Send out:
1. outside distribution security patch by the way of two dimensional cellular automaton;
2. the node to virus immunity state for having stamped security patch, the position being calculated as follows in cellular space are in
C:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern
Mole type neighborhood, arbitrary node CijNeighborhood be:
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
(2) for the node for being infected state, the wireless sensor network security based on cellular automata is carried out
Patch is distributed, and comprises the following steps:
1. the node of Virus State has been infected by function SCij v(t)=max (0, f2(SNij(t-1))) oneself is calculated
Subsequent time state;
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send;If
This node field has e to obtain security patch the node in immune state, then send security patch bag, between this time
Every interior, the probability for having 1- (1- α) e receives service packs;After node often receives a service packs, β probability is had to enter immune state, then
The probability that cures after receiving g security patch bag is (1- (1- α)e)(1-(1-β)g);Wherein, g≤e;Virus State has been infected
3. node enters step if being cured, if the node for having infected Virus State is not cured, repeat step (2);
3. the node to virus immunity state for having stamped security patch, the position being calculated as follows in cellular space are in
C:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern
Mole type neighborhood, arbitrary node CijNeighborhood be:
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
(3) it is directed to normal work but the node of the state of security patch is not stamped, carries out based on the wireless of cellular automata
Sensor network security patch is distributed, and comprises the following steps:
1. normal work node passes through function SCij r(t)=max (1, f1(SNij(t-1))) oneself subsequent time shape is calculated
State.
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send;If
This node field has e to obtain security patch and the node in immune state sends security patch bag, in this time interval
Interior, there is 1- (1- α)eProbability receive service packs;After receiving service packs, normal node carries out safety upgrade, immune virus infraction,
Subsequently enter step 3., repeat step (3) if do not receive service packs;
3. the node to virus immunity state for having stamped security patch, the position being calculated as follows in cellular space are in
C:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern
Mole type neighborhood, arbitrary node CijNeighborhood be:
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
4. V (t) is made to represent the quantity accounting of the state sensor node being infected in t, R (t) represents in t
Moment in energy normal work but does not stamp the quantity accounting of the sensor node of security patch state, and M (t) represents in t
Quantity accounting of the security patch to the sensor node of virus immunity state is stamped, has been expressed as:
Wherein, V (t)+R (t)+M (t)=1.
Advantages of the present invention and good effect are:
The security patch for receiving is distributed to its yuan using the two dimensional cellular automaton of square net, node by the present invention
Other nodes in born of the same parents' neighborhood, so as to fast and effeciently be distributed to whole wireless sensor nodes, wireless senser by security patch
Network node neighborhood adopts improved extended pattern mole field, effectively eliminates the cellular that cannot cover in communication distance, can
The time of day of wireless sensor network is clearly described, is solved for security patch hardly possible after wireless sensor network virus infection
With the problem that distributes.
Description of the drawings
Fig. 1 is common cellular automata mole type neighborhood schematic diagram;
Fig. 2 is the modified model cellular automata mole type neighborhood schematic diagram that the present invention is adopted;
Fig. 3 is V (t) after stamping security patch, R (t), the curve chart of M (t);
Fig. 4 is β=0.2 and V (t) curve chart under β=0.6;
Fig. 5 is β=0.2 and M (t) curve chart under β=0.6;
Fig. 6 is θ=0.4 and V (t) curve chart under θ=0.8;
Fig. 7 is θ=0.4 and M (t) curve chart under θ=0.8;
Fig. 8 is M (t) curve chart from diverse location distribution security patch.
Specific embodiment
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail:
A kind of wireless sensor network security method for distributing patch based on cellular automata, comprises the steps:
Step 1, wireless sensor network model is set up, and root is by the wireless sensor network in wireless sensor network model
Network node is divided into tri- kinds of node states of r, v, m according to the characteristic of node.
In the present embodiment, the monitored area of wireless sensor network model is a square area, its length of side l,
It is n to include wireless sensor network node number in monitored area, and node density is that ρ, node is evenly distributed in two dimension at random
In region, node signal maximum launch range is that r, which can communicated in r.Above-mentioned wireless sensor network node
It is responsible for perceiving and gathering the data in monitored area and be transferred to base station by way of multi-hop.If wireless sensor network node
Under original state, the ratio of infected node is that θ, node is properly received security patch probability α, and security patch removes the general of virus
Rate is β.
Wireless sensor network model is divided into following three kinds of states according to the characteristic of node, as shown in table 1.
1 wireless sensor node state parameter table of table
R representative sensor node in energy normal work but does not stamp the state of security patch;V representative sensor node is
The state being infected;M is represented and has been stamped state of the security patch to virus immunity;
Then have:R (t)+v (t)+m (t)=n.
Step 2, the security patch distribution model of two dimensional cellular automaton is set up, three kinds of wireless sensor network node are not
Same node state, carries out the distribution of the wireless sensor network security patch based on cellular automata.
Two dimensional cellular automaton is simple structure but can produce the discrete dynamical system of complicated self-organizing behavior, with mould
Intend the ability of complication system temporal-spatial evolution process.The two dimensional cellular automaton is made up of the cellular object of limited random distribution
Discrete dynamic system, each cellular has a state, and it is become according to rule change in the state of each time step
Change.
The security patch distribution model of the two dimensional cellular automaton of the present invention is represented by following four-tuple formula (1):
CAS=(C, S, N, F) (1)
In above formula, C represents cellular space;S represents the state set of cellular;N represents cellular neighborhood;F represents that cellular develops and advises
Then.
Separately below each element in the four-tuple formula (1) is described in detail:
(1) cellular space C:The two-dimensional grid of l × l grid is represented, if each unit at most only accommodates a wireless biography
Sensor network node.The two-dimensional grid as shown in formula (2) can be used in wireless sensor network node position in space
In horizontal coordinate i and vertical coordinate j represent:
C=(i, j) | 1≤i≤l, 1≤j≤l } (2)
(2) the state set S of cellular:SC and MAC is respectively comprising two state sets in which;
Wherein, SC is the state of wireless sensor network node, and wireless sensor network node is divided into three states:Just
Normal node state r (wireless sensor node in energy normal work but does not stamp the state of security patch), Infection Status v
Immune state m after (state that wireless sensor network node has been infected) and acquisition security patch (has stamped safety
State of the patch to virus immunity).
Immune state is directly entered after wireless sensor network normal node obtains security patch, has infected the disease of node
Poison is eliminated time and enters immune state.Specifically as shown in formula (3):
State set MAC considers the channel access principle in wireless sensor network transmission, adopts CSMA/ during distribution patch
CA mode:When certain wireless sensor network node listen to channel busy after again random back carry out data for a period of time afterwards and send out
Send, its field node can not all send when data are sent when a wireless sensor network node, only listen to channel sky
Can just attempt after spare time sending data.Specifically as shown in formula (4):
(3) cellular neighborhood N:
Common mole type neighborhood is cellular neighborhood of the Lycoperdon polymorphum Vitt shown in Fig. 1 for k node, but due to single wireless sensor network
The communication overlay of network node is circle, it is impossible to clearly describe the time of day of network.The wireless sensor network node of the present invention
Neighborhood adopts improved extended pattern mole field, eliminates the cellular that cannot cover in communication distance, as shown in Fig. 2 each biography
The transmitting range of sensor node maximum is r, therefore arbitrary node CijCellular neighborhood concrete as shown in formula (5):
In the security patch distribution model of the two dimensional cellular automaton of the present invention, only belong to the node in contiguous range
Can just be in communication with each other.
(4) the cellular state transfer function F of cellular evolution rule
State SC of wireless sensor network nodeijState SC in tij(t) be by t-1 moment wireless senser
State SC of network nodeij(t-1) and its neighborhood node state set SNijTogether decide on, then transfer function can be by public affairs
Formula (6) represents:
SCij(t)=f (SCij(t-1), SNij(t-1)) (6)
If 1. wireless sensor network node is normal node state in the t-1 moment, its state transition function such as formula
(7) shown in:
SCij r(t)=max (1, f1(SNij(t-1))) (7)
In above formula, the maximum of two functions is state SC of wireless sensor network nodeij;
If 2. the normal node field has e to obtain security patch and the node in immune state sends security patch bag,
In this time interval, then there is 1- (1- α)eProbability receive service packs, when channel is in idle condition, then wireless senser
Network node enters immune state.
Then the condition conversion function is represented by formula (8):
If 3. wireless sensor node is Infection Status in the t-1 moment, shown in state transition function such as formula (9):
SCij v(t)=max (0, f2(SNij(t-1))) (9)
In above formula, the maximum of two functions is state SC of nodeij;
If 4. this has e to obtain security patch the node transmission safety benefit in immune state in Infection Status node field
Fourth bag, in this time interval, has 1- (1- α)eProbability receive service packs, when channel be in idle condition, then node become
Work(receives service packs.After often receiving a service packs, the probability for having β enters immune state, then after receiving g security patch bag
The probability of healing is (1- (1- α)e)(1-(1-β)g), wherein g≤e;
Then condition conversion function is represented by formula (10):
If 5. node is in the t-1 moment already in immune state, state transition function is represented by formula (11):
SCij m(t)=2 (11)
Now, node maintains this state constant, only outwards continues distribution security patch.
According to the security patch distribution model of above-mentioned two dimensional cellular automaton, carry out wireless sensor network security patch and divide
Send out method be:
In an initial condition, the distribution of the wireless sensor network security patch based on cellular automata is carried out.
Under original state, wireless sensor node state includes two kinds:Sensor node in energy normal work but is not stamped
State r of security patch;State v that sensor node has been infected;
In l × l square area, one or several sections are chosen in known infected wireless sensor network
Point takes the mode of artificial programming program to stamp security patch, and no matter what state node is before, all enters and stamps safety
The state to virus immunity of patch;
(1) selected start node is directed to, carries out wireless sensor network security patch based on cellular automata
Distribution.
1. outside distribution security patch by the way of two dimensional cellular automaton;
2. be in stamped the node to virus immunity state of security patch can be by the two-dimentional cellular of the step 2
The formula (1) of the security patch distribution model of automat calculates the state of oneself:
CAS=(C, S, N, F) (1)
In above formula, C is the position in cellular space, and the level in two-dimensional grid can be used in node position in space
Coordinate i and vertical coordinate j are expressed as the formula (2) of the step 2
C=(i, j) | 1≤i≤l, 1≤j≤l } (2)
Wireless sensor network node its node state after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, communicated with the node in neighborhood, section
Neighborhood of a point is improved extended pattern mole type neighborhood, is calculated by the formula (3) of the step 2, each sensor node maximum
Transmitting range be r, therefore, arbitrary node CijNeighborhood be:
This node state SC subsequentij mT ()=2 take the channel in neighborhood, state SC of this node oneselfij m(t)=
2.
(2) for the node of viral Infection Status, the wireless sensor network security patch based on cellular automata is carried out
Distribute, concrete grammar is:
1. pass through function SC for the node for infecting Virus Stateij v(t)=max (0, f2(SNij(t-1))) calculate certainly
Oneself subsequent time state;
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send;If
This node field has e to obtain security patch and the node in immune state sends security patch bag, in this time interval
Interior, there is 1- (1- α)eProbability receive service packs;After often receiving a service packs, the probability for having β enters immune state, then receive
The probability that cures after g security patch bag is (1- (1- α)e)(1-(1-β)g);Wherein, g≤e.
2. step that the node of Virus State if be cured if enter " start node " in has been infected, if having infected viral shape
The node of state is not cured, then repeat this step.
(3) for the node of normal operating conditions, the wireless sensor network security patch based on cellular automata is carried out
The concrete steps of distribution method include:
1. normal work node passes through function SCij r(t)=max (1, f1(SNij(t-1))) oneself subsequent time shape is calculated
State.
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send.If
This node field has e to obtain security patch and the node in immune state sends security patch bag, in this time interval
Interior, there is 1- (1- α)eProbability receive service packs;After receiving service packs, normal node carries out safety upgrade, immune virus infraction,
Subsequently enter step in " start node " 2., repeat this step if service packs is not received.
3. V (t) is made to represent the quantity accounting of the state sensor node being infected in t, R (t) represents in t
Moment in energy normal work but does not stamp the quantity accounting of the sensor node of security patch state, and M (t) represents in t
Quantity accounting of the security patch to the sensor node of virus immunity state is stamped, has been represented by formula (4):
Wherein, V (t)+R (t)+M (t)=1
Through after a while, showing can using a kind of security patch distribution method based on cellular automata of the present invention
The distribution of contact security patch is finished, after security patch distribution is finished, all node states are:Security patch has been stamped to disease
State m of poison immunity.
Below based on the security patch distribution method of cellular automata, emulation experiment is carried out to the present invention, for verifying this
The reliability of method.
The emulation experiment network environment arranges as follows:Monitored area is a square area, its length of side l=200m,
In monitored area comprising node number be n, node density be ρ, the communication distance of node is initial infected node r, in network
Ratio be θ, node is properly received security patch probability α, and it is β that security patch removes the probability of virus, in the often wheel unit interval
10 communication is inside carried out.
In this emulation experiment, we study security patch distribution effect under the different parameters of wireless senser, initially
Value node number n=20000, node density is ρ=0.5, communication distance r=10m, initially infected ratio θ=0.4, node
Security patch probability α=0.8 is properly received, when security patch removes the probability of virus for β=0.6, coordinate is (100,100)
Node stamp security patch after V (t), R (t), M (t) curve as shown in Figure 3.Experiment shows all nodes after the 23rd wheel
Security patch has all been stamped, and the method that this invention is adopted is very efficient.
We investigate the patch when security patch removing virus capable is poor and distribute effect, take β=0.2.Fig. 4 represents not
V (t) curve under same value, Fig. 5 represents M (t) curve under different values.The experiment shows the β when Scavenging activity is poor
When=0.2, the method remains to, in the 30th wheel, all nodes are stamped patch, and the method is still efficient.
Patch distribution effect when initially the ratio of infected node is higher in a network is investigated, takes θ=0.8.Fig. 6 represents not
V (t) curve under same value, Fig. 7 represents M (t) curve under different values.The experiment shows when infection node is in initially quilt
Infection node patch is higher, and when 80% node is all infected by the virus, all nodes can be stamped patch in the 25th wheel by the method,
Still there is high efficiency.
Investigate the method different coordinate position start nodes distribution effect, respectively from (100,100), (50,50) and
(10,10) position starts distribution security patch, and Fig. 8 represents M (t) curve under different values.This experiment shows the closer to region
Center, the speed of node distribution patch is faster.But the method remains to divide patch in 36 wheels in the position of edges of regions (10,10)
Distribute complete, it was demonstrated that in the method selection region, any node finally all will quickly can be mended as start node distribution security patch
Fourth distribution is finished.
It is emphasized that embodiment of the present invention is illustrative rather than determinate, therefore bag of the present invention
The embodiment for being not limited to described in specific embodiment is included, every by those skilled in the art's technology according to the present invention scheme
The other embodiment for drawing, also belongs to the scope of protection of the invention.
Claims (4)
1. a kind of wireless sensor network security method for distributing patch based on cellular automata, it is characterised in that:Including as follows
Step:
Step 1, wireless sensor network model is set up, and by the wireless sensor network node in wireless sensor network model
It is divided into three kinds of node states:Sensor node in energy normal work but does not stamp the state of security patch, sensor node
The state that has been infected, stamp state of the security patch to virus immunity;
Step 2, security patch distribution model CAS=(C, S, N, F) of two dimensional cellular automaton is set up, according to wireless sensor network
The different node states of three kinds of network node, carry out the distribution of the wireless sensor network security patch based on cellular automata;On
State the C in security patch distribution model and represent cellular space, S represents the state set of cellular, N represents cellular neighborhood, F represents cellular
Evolution rule.
2. a kind of wireless sensor network security method for distributing patch based on cellular automata according to claim 1,
It is characterized in that:The wireless sensor network model of the step 1 is:Monitored area is a square area, its length of side l,
It is n to include wireless sensor network node number in the monitored area, and it is r that node density is the communication distance of ρ, node;Institute
Wireless sensor network node is stated for perceiving and gathering data in monitored area and base station is transferred to by way of multi-hop;
Under the wireless sensor network node original state, the ratio of infected node is that θ, node is properly received security patch probability
For α, it is β that security patch removes the probability of virus.
3. a kind of wireless sensor network security patch distributor based on cellular automata according to claim 1 and 2
Method, it is characterised in that:C, S, N, F in the security patch distribution model is expressed as:
(1) cellular space C represents the two-dimensional grid of l × l grid, if each unit at most only accommodates a wireless sensor network
Network node, wireless sensor network node position in space is using horizontal coordinate i in two-dimensional grid and vertical coordinate j
It is expressed as:
C=(i, j) | 1≤i≤l, 1≤j≤l }
(2) the state set S of cellular includes following two state sets:
State set SC is divided into three states for the state of wireless sensor network node, wireless sensor network node:Normally
Immune state after node state, Infection Status and acquisition security patch;When wireless sensor network normal node obtains peace
Immune state is directly entered after full patch, the virus for having infected node is eliminated time entrance immune state;State set SC is by such as
Lower formula is indicated:
State set MAC considers the channel access principle in wireless sensor network transmission, adopts CSMA/CA side during distribution patch
Formula:When certain wireless sensor network node listen to channel busy after again random back carry out data is activation for a period of time afterwards, when
One wireless sensor network node its field node when data are sent can not all send, and only listen to ability after channel idle
Can attempt sending data;State set MAC is indicated by equation below:
(3) cellular neighborhood N
Arbitrary node CijCellular neighborhood as follows:
(4) the cellular state transfer function F of cellular evolution rule
State SC of wireless sensor network nodeijState SC in tij(t) be by t-1 moment wireless sensor network section
State SC of pointij(t-1) and its neighborhood node state setTogether decide on, then transfer function is by equation below table
Show:
SCij(t)=f (5Cij(t-1), SNij(t-1))
If 1. wireless sensor network node is normal node state in the t-1 moment, its State Transferring letter is:
SCij r(t)=max (1, f1(SNij(t-1)))
In above formula, the maximum of two functions is state SC of wireless sensor network nodeij;
If 2. the normal node field has e to obtain security patch and the node in immune state sends security patch bag, at this
In individual time interval, then there is 1- (1- α)eProbability receive service packs, when channel is in idle condition, then wireless sensor network
Node enters immune state;Then the condition conversion function is:
If 3. wireless sensor node is Infection Status in the t-1 moment, state transition function is:
SCij v(t)=max (0, f2(SNij(t-1)))
In above formula, the maximum of two functions is state SC of nodeij;
If 4. this has e to obtain security patch the node transmission security patch in immune state in Infection Status node field
Bag, in this time interval, has 1- (1- α)eProbability receive service packs, when channel be in idle condition, then node success
Receive service packs;After often receiving a service packs, the probability for having β enters immune state, then control after receiving g security patch bag
More probability is (1- (1- α)e)(1-(1-β)g);Wherein, g≤e;Then condition conversion function is:
If 5. node is in the t-1 moment already in immune state, state transition function is:
SCij m(t)=2
Now, immune state node maintains this state constant, only outwards continues distribution security patch.
4. a kind of wireless sensor network security patch distributor based on cellular automata according to claim 1 and 2
Method, it is characterised in that:The step 2 carries out the method that the wireless sensor network security patch based on cellular automata is distributed
For:
In l × l square area, one or several nodes are chosen in known infected wireless sensor network and adopt
The mode for taking artificial programming program stamps security patch, enters the state to virus immunity for having stamped security patch;
(1) selected start node is directed to, carries out the distribution of the wireless sensor network security patch based on cellular automata:
1. outside distribution security patch by the way of two dimensional cellular automaton;
2. the node to virus immunity state for having stamped security patch is in, the position C being calculated as follows in cellular space:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern mole
Type neighborhood, arbitrary node CijNeighborhood be:
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
(2) for the node for being infected state, the wireless sensor network security patch based on cellular automata is carried out
Distribution, comprises the following steps:
1. the node of Virus State has been infected by function SCij v(t)=max (0, f2(SNij(t-1))) the next of oneself is calculated
Moment state;
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send;If this
Node field has e to obtain security patch the node in immune state, then send security patch bag, in this time interval
Interior, there is 1- (1- α)eProbability receive service packs;After node often receives a service packs, there is β probability that immune state is entered, then receive
The probability that cures to after g security patch bag is 1- (1- α)e)(1-(1-β)g);Wherein, g≤e;The section of Virus State has been infected
3. point enters step if being cured, if the node for having infected Virus State is not cured, repeat step (2);
3. the node to virus immunity state for having stamped security patch is in, the position C being calculated as follows in cellular space:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern mole
Type neighborhood, arbitrary node CijNeighborhood be:
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
(3) it is directed to normal work but the node of the state of security patch is not stamped, carries out the wireless sensing based on cellular automata
Device network security patch is distributed, and comprises the following steps:
1. normal work node passes through function SCij r(t)=max (1, f1(SNij(t-1))) oneself subsequent time state is calculated.
2. the channel status in detection neighborhood, if channel idle, receives the service packs that in neighborhood, these nodes send;If this
Node field has e to obtain security patch and the node in immune state sends security patch bag, in this time interval, has
1-(1-α)eProbability receive service packs;After receiving service packs, normal node carries out safety upgrade, immune virus infraction, subsequently
Enter step 3., repeat step (3) if do not receive service packs;
3. the node to virus immunity state for having stamped security patch is in, the position C being calculated as follows in cellular space:
C=(i, j) | 1≤i≤l, 1≤j≤l }
Node state of the wireless sensor network node after security patch is obtained is SCij=2;
To the node distribution security patch being in the cellular neighborhood of this node, the section neighborhood of a point is improved extended pattern mole
Type neighborhood, arbitrary node CijNeighborhood be:
In above formula, r is the transmitting range of each sensor node maximum;
Subsequent node state SCij mT ()=2 simultaneously take the channel in neighborhood;
4. V (t) is made to represent the quantity accounting of the state sensor node being infected in t, R (t) represents in t
It is in energy normal work but the quantity accounting of the sensor node of security patch state is not stamped, M (t) expression is beaten in t
Quantity accounting of the upper security patch to the sensor node of virus immunity state, is expressed as:
Wherein, V (t)+R (t)+M (t)=1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611046406.9A CN106455138A (en) | 2016-11-23 | 2016-11-23 | Wireless sensor network security patch distributing method based on cellular automaton |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611046406.9A CN106455138A (en) | 2016-11-23 | 2016-11-23 | Wireless sensor network security patch distributing method based on cellular automaton |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106455138A true CN106455138A (en) | 2017-02-22 |
Family
ID=58218228
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611046406.9A Pending CN106455138A (en) | 2016-11-23 | 2016-11-23 | Wireless sensor network security patch distributing method based on cellular automaton |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106455138A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108965287A (en) * | 2018-07-09 | 2018-12-07 | 陕西师范大学 | It is a kind of temporarily to delete the viral transmission control method on side based on limited |
CN117892225A (en) * | 2024-03-15 | 2024-04-16 | 西北工业大学 | Virus propagation dynamics modeling method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102300208A (en) * | 2011-06-21 | 2011-12-28 | 常州艾可泰自动化设备有限公司 | Optimized protection strategy against dissemination of malicious software of wireless sensor network |
CN105959262A (en) * | 2016-04-22 | 2016-09-21 | 电子科技大学 | Control method for inhibiting propagation of malicious programs in wireless sensor network |
-
2016
- 2016-11-23 CN CN201611046406.9A patent/CN106455138A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102300208A (en) * | 2011-06-21 | 2011-12-28 | 常州艾可泰自动化设备有限公司 | Optimized protection strategy against dissemination of malicious software of wireless sensor network |
CN105959262A (en) * | 2016-04-22 | 2016-09-21 | 电子科技大学 | Control method for inhibiting propagation of malicious programs in wireless sensor network |
Non-Patent Citations (3)
Title |
---|
宋玉蓉,蒋国平,徐加刚: "一种基于元胞自动机的自适应网络病毒传播模型", 《物理学报》 * |
宋玉蓉,蒋国平: "无线传感器网络中恶意软件传播研究", 《南京邮电大学学报》 * |
胡金涛: "无线传感器网络中恶意软件传播及控制策略研究", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108965287A (en) * | 2018-07-09 | 2018-12-07 | 陕西师范大学 | It is a kind of temporarily to delete the viral transmission control method on side based on limited |
CN108965287B (en) * | 2018-07-09 | 2021-04-13 | 陕西师范大学 | Virus propagation control method based on limited temporary edge deletion |
CN117892225A (en) * | 2024-03-15 | 2024-04-16 | 西北工业大学 | Virus propagation dynamics modeling method and device |
CN117892225B (en) * | 2024-03-15 | 2024-05-24 | 西北工业大学 | Virus propagation dynamics modeling method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104838597B (en) | Adaptive channel reuse mechanism in communication network | |
CN105979598B (en) | A kind of LTE-D2D car networking resource allocation methods based on traffic flow Dynamic Packet | |
CN102223412B (en) | Machine type communication method and device | |
CN102724764B (en) | Self-adaptive media access control (MAC) protocol for vehicle-mounted wireless self-organized network | |
CN103281704A (en) | Method for deploying wireless sensor network in deterministic space based on three-dimensional sensing | |
CN105472761A (en) | User equipment access method and device | |
CN106470449A (en) | A kind of data transmit-receive, trunking method, device and communication system | |
Centenaro et al. | A study on M2M traffic and its impact on cellular networks | |
CN109890085A (en) | One kind point priority machine type communication random access backoff parameter determines method | |
CN106455138A (en) | Wireless sensor network security patch distributing method based on cellular automaton | |
Kim et al. | Data aggregation and packet bundling of uplink small packets for monitoring applications in LTE | |
CN104219778A (en) | Wireless sensor network contention access method based on energy harvesting rate | |
CN107231427A (en) | MAC protocol recognition methods based on SVMs | |
CN107484255A (en) | Preferred channels number determines method in a kind of multichannel CSMA agreements based on frequency packet | |
CN103857059A (en) | EDCA mechanism optimizing method of IEEE 802.11P vehicle-mounted ad hoc network protocol | |
Le et al. | Approximate queuing analysis for IEEE 802.15. 4 sensor network | |
CN102752760B (en) | Frequency spectrum collaboration sharing method in cognitive radio | |
Dasgupta et al. | Congestion avoidance topology in wireless sensor network using Karnaugh map | |
CN112929901B (en) | Adaptive configuration method, device and equipment of gateway and readable storage medium | |
CN101772125B (en) | Method and device for network link management | |
Xu et al. | How well does CSMA/CN work in WLANs? | |
Özgüner et al. | A simulation study of an intersection collision warning system | |
CN106993306A (en) | Wireless network MAC layer distributed coordination system and its construction method based on FPGA | |
CN104394599A (en) | Design method of CSMA/CA protocol for M2M network | |
Korzhuk et al. | The model of the attack implementation on wireless sensor networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |
|
RJ01 | Rejection of invention patent application after publication |