基于时滞的无线传感网恶意软件传播模型
Malware Propagation Model Based on Time Delay in Wireless Sensor Networks
作者:张琳(南京邮电大学 计算机学院, 江苏 南京 210003);李麟俊(江苏省公安厅交通警察总队, 江苏 南京 210049);李丽(南京邮电大学 计算机学院, 江苏 南京 210003);张昀(南京邮电大学 电子科学与工程学院, 江苏 南京 210003);王汝传(南京邮电大学 计算机学院, 江苏 南京 210003)
Author:ZHANG Lin(School of Computer Sci., Nanjing Univ. of Posts and Telecommunications, Nanjing 210003, China);LI Linjun(Jiangsu Provincial Public Security Dept. Traffic Police Corps, Nanjing 210049, China);LI Li(School of Computer Sci., Nanjing Univ. of Posts and Telecommunications, Nanjing 210003, China);ZHANG Yun(College of Electronic Sci. and Eng., Nanjing Univ. of Posts and Telecommunications, Nanjing 210003, China);WANG Ruchuan(School of Computer Sci., Nanjing Univ. of Posts and Telecommunications, Nanjing 210003, China)
收稿日期:2018-09-24 年卷(期)页码:2019,51(3):167-174
期刊名称:工程科学与技术
Journal Name:Advanced Engineering Sciences
关键字:无线传感网;传染病模型;时滞;Lyapunov稳定性;恶意软件
Key words:wireless sensor network;epidemic model;time delay;Lyapunov stability;malware
基金项目:国家自然科学基金项目(61872194;61402241);江苏省自然科学优秀青年基金项目(BK20160089);江苏省高校自然科学研究面上项目(17KJB520026);南京邮电大学科研基金项目(NY217050);江苏省政府海外留学奖学金项目
中文摘要
为了深入研究无线传感网中恶意软件程序的传播过程,探讨存在时间滞留的情况下恶意软件的传播模型并分析其传播行为,建立了基于时滞的无线传感网恶意软件传播模型。该模型引入传染病学理论,结合传感器节点能量有限、存在时延等特性,对传播过程和特征进行了具体的分析,并对模型系统中状态转换关系、平衡点的存在性以及局部和全局稳定性进行了正确性和完备性分析证明。基于理论分析,建立仿真模型,设置相应的传播比率,对传播过程中各状态节点数量的变化进行仿真实验,进行了系统稳定性分析;对传播过程中时滞的取值和变化进行仿真,进行了系统时滞影响的分析和阈值的确定;与具有代表性的稳定的延迟网络蠕虫传播模型进行对比,给出了不同传播模型的数据分析。实验验证了稳定性理论分析的正确性,确定了影响传播稳定性的参数阈值及其对传播的影响,与其他模型进行了比较,分析了时滞对系统的影响。提出的模型为恶意软件的传播和控制提供了分析和研究思路,对于建立遏制恶意程序在移动无线传感网中扩散传播的安全策略具有指导意义。
英文摘要
In order to deeply study the propagation process of malicious software programs in wireless sensor networks, discuss propagation models of malicious software in the presence of time lag and analyze their propagation behaviors, a delay-based malicious software propagation model for wireless sensor networks was established based on the existing research on the security issues of wireless sensor networks. Based on the theory of infectious diseases and the characteristics of sensor nodes such as limited energy and delay, the dissemination process and characteristics of sensor nodes were analyzed in detail. The correctness and completeness of the state transition relationship, the existence of equilibrium point, the local stability and global stability in the model system were analyzed and proved. Based on theoretical analysis, a simulation model was established, in which the corresponding propagating ratio was set up, the simulation experiments were carried out on the changes of the number of nodes in each state during the propagating process, and the stability analysis of the system was provided. The values and changes of the time delay in the propagating process were simulated, and the influence of the time delay and the determination of the threshold were analyzed. At the same time, the comparative analysis of different propagation models was provided between the typical stable delay network worm propagation models and the proposed model. Experiments verified the validity of the theoretical stability analysis, determined the parameter threshold which affects the stability of the propagation and its impact on the propagation. The proposed model was compared with other models, and the influence of time delay on the system was analyzed. The proposed model has provided the analysis and research ideas for the spread and control of malicious software and has the guiding significance for the establishment of a security strategy to curb the spread of malicious programs in mobile wireless sensor networks.
【关闭】