• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2011, Vol. 33 ›› Issue (5): 22-26.

• 论文 • 上一篇    下一篇

基于能量有限型无线传感网的恶意软件攻防优化策略

杨雄1,2,查志琴1,朱宇光1,徐则中1,2   

  1. (1.常州工学院计算机信息工程学院通信工程系,江苏 常州 213002)
    (2.江苏省常州市软件技术研究与应用重点实验室,江苏 常州 213002)
  • 收稿日期:2010-04-06 修回日期:2010-08-12 出版日期:2011-05-25 发布日期:2011-05-25
  • 作者简介:杨雄(1980),男,江苏无锡人,硕士,讲师,研究方向为网络安全和无线传感器网络。
  • 基金资助:

    江苏省高校自然科学基础研究基金项目(08kjd520002);常州工学院自然科学基金项目(YN0809,YN0903)

An Optimal Strategy on Malware Attack and Defense in EnergyConstrained Wireless Sensor Networks

YANG Xiong1,2,ZHA Zhiqin1,ZHU Yuguang1,XU Zezhong1,2   

  1. (1.School of Computer and Information Engineering,Changzhou Institute of Technology,Changzhou 213002;
    2.Key Laboratory of Changzhou Software Technology Research and Application,Changzhou 213002,China)
  • Received:2010-04-06 Revised:2010-08-12 Online:2011-05-25 Published:2011-05-25

摘要:

本文针对目前无线传感网络中恶意软件模型化工作的不足,从攻击与防御角度出发,考虑了攻击扫描速率对于攻防优化策略的不同意义,同时考虑了无线传感节点能量有限的特征,在传统恶意软件传播模型的基础上提出了一种改进的无线传感网络恶意软件攻防优化模型。该模型在传统SIR传播模型基础上进行扩展,考虑了免疫与修复的不同因素,最终给出了攻防优化评估方案。通过仿真实验表明,该攻防优化评估方案能够高效地描述攻击扫描参数对恶意软件在无线传感网络中攻击与防御各自效果最大化的关键影响。

关键词: 无线传感网络, 模型化, 恶意软件, 优化策略

Abstract:

As for the shortcomings of  the research on malware modeling in wireless sensor networks the paper starts from the attack and defense perspectives, and considers the impact under the scanning rate on the optimal strategy of attack or defense, and takes the energyconstrained property in wireless sensor networks into account. Then an paper novelly proposes an optimal model on malware attack and defense in WSNs based on the traditional malware propagation models. The model is extended from the  traditional SIR propagation model and the immunization and healing factors are also concerned. Finally, an optimal solution to evaluating the effectiveness of attack and defense is given. The simulation experiment  indicates that this optimal evaluation strategy is able to effectively depict the scanning rate’s key impact on the maximal results for both attack’s and defense’s point of view.

Key words: WSN;modeling;malware;optimal strategy