A stochastic model of malicious data packet propagation in Mobile Wireless Sensor Networks

被引:0
作者
Wang, Xiao-Ming [1 ]
Li, Cheng-Bo [1 ]
Li, Ying-Shu [2 ,3 ]
机构
[1] School of Computer Science, Shaanxi Normal University
[2] Department of Computer Science, Georgia State University
[3] School of Computer Science and Technology, Harbin Institute of Technology
来源
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | 2013年 / 35卷 / 06期
关键词
Malicious data packet; Mobile Wireless Sensor Networks (MWSN); Propagation model; Stochastic cellular automaton;
D O I
10.3724/SP.J.1146.2012.00945
中图分类号
学科分类号
摘要
This paper investigates the propagation pattern of malicious data packets in Mobile Wireless Sensor Networks (MWSN) through employing the stochastic cellular automata. The corresponding network model, channel allocation mechanism, signal interference model and malicious packet propagation model are designed based on information communication characteristics of MWSN. The new cellular space, neighborhood and states as well as state transition rules are defined. Then a stochastic cellular automaton model for modeling the propagation process of malicious packets in MWSN is proposed to study the spatial-temporal behavior characteristics of malicious data packet propagation in the uncertain environment. The results show that the proposed model can efficiently predict the propagation trend and the spatial distribution state of malicious data packets in MWSN, and overcome the disadvantages that no one of the Markov Random Field, the differential equation and the difference equation can describe the spatial distribution state of malicious data packet propagation in MWSN.
引用
收藏
页码:1290 / 1297
页数:7
相关论文
共 16 条
[11]  
Wang X.-M., Li Y.-S., An improved sir model for analyzing the dynamics of worm propagation in wireless sensor networks, Chinese Journal of Electronics, 18, 1, pp. 8-12, (2009)
[12]  
Sun B., Yan G., Xiao Y., Et al., Self-propagating mal-packets in wireless sensor networks: dynamics and defense implications, Ad hoc Networks, 7, 4, pp. 1489-1500, (2009)
[13]  
Gu Q., Ferguson C., Noorani R., A study of selfpropagation mal-packets in sensor networks: attacks and defenses, Computers & Security, 30, 1, pp. 13-27, (2011)
[14]  
Khouzani M.H.R., Sarkar S., Dynamic malware attack in energy-constrained mobile wireless networks, IEEE Conference on Computing & Processing, pp. 1-11, (2010)
[15]  
De P., Liu Y., Das S.K., An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks, IEEE Transactions on Mobile Computing, 8, 3, pp. 413-425, (2009)
[16]  
Wolfram S., Cellular automata as models of complexity, Nature, 311, pp. 419-424, (1984)