• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2011, Vol. 33 ›› Issue (5): 22-26.

• 论文 • Previous Articles     Next Articles

An Optimal Strategy on Malware Attack and Defense in EnergyConstrained Wireless Sensor Networks

YANG Xiong1,2,ZHA Zhiqin1,ZHU Yuguang1,XU Zezhong1,2   

  1. (1.School of Computer and Information Engineering,Changzhou Institute of Technology,Changzhou 213002;
    2.Key Laboratory of Changzhou Software Technology Research and Application,Changzhou 213002,China)
  • Received:2010-04-06 Revised:2010-08-12 Online:2011-05-25 Published:2011-05-25

Abstract:

As for the shortcomings of  the research on malware modeling in wireless sensor networks the paper starts from the attack and defense perspectives, and considers the impact under the scanning rate on the optimal strategy of attack or defense, and takes the energyconstrained property in wireless sensor networks into account. Then an paper novelly proposes an optimal model on malware attack and defense in WSNs based on the traditional malware propagation models. The model is extended from the  traditional SIR propagation model and the immunization and healing factors are also concerned. Finally, an optimal solution to evaluating the effectiveness of attack and defense is given. The simulation experiment  indicates that this optimal evaluation strategy is able to effectively depict the scanning rate’s key impact on the maximal results for both attack’s and defense’s point of view.

Key words: WSN;modeling;malware;optimal strategy