Unlock instant, AI-driven research and patent intelligence for your innovation.

A Modeling Method for Malicious Program Propagation in Heterogeneous Sensor Networks

A malicious program and modeling method technology, applied in the field of communication, can solve problems such as not reflecting the energy exhaustion of sensor nodes

Active Publication Date: 2021-04-06
SHAOXING UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (2) It cannot reflect the state that the sensor nodes in the heterogeneous sensor network will lose all functions when they are exhausted or physically damaged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Modeling Method for Malicious Program Propagation in Heterogeneous Sensor Networks
  • A Modeling Method for Malicious Program Propagation in Heterogeneous Sensor Networks
  • A Modeling Method for Malicious Program Propagation in Heterogeneous Sensor Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] like figure 1 As shown, in order to solve the technical problems in the prior art, an embodiment of the present invention provides a heterogeneous sensor network malicious program propagation modeling method, including the following steps:

[0075] (1) Divide the state of heterogeneous sensor nodes;

[0076] According to the characteristics of heterogeneous sensor nodes, when a heterogeneous sensor node has system vulnerabilities but is not infected by malicious programs, its state belongs to B. When a heterogeneous sensor node has been infected by a malicious program and can infect its communicating nodes by transmitting data and control information, its state belongs to C. When a heterogeneous sensor node is immune to the current malicious program after installing the patch, its state belongs to P. When a heterogeneous sensor node loses all functions due to energy depletion or physical damage, its state belongs to D.

[0077] (2) Determine the conversion r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for modeling the propagation of malicious programs in heterogeneous sensor networks. The method includes dividing the state categories of heterogeneous sensor nodes and determining the conversion relationship between each state category; constructing a model for the propagation of malicious programs in heterogeneous sensor networks ;Calculate the stable point where each state change rate of the heterogeneous sensor network malicious program propagation model is 0; according to the new change rate matrix and state transition rate matrix of the heterogeneous sensor nodes at the stable point, calculate the basic reproduction number. The invention realizes the modeling of malicious program propagation in heterogeneous sensor networks, reflects the dynamic change process of heterogeneous sensor node states with different degrees, obtains the stable point representing malicious programs that will eventually become extinct or popular, and provides Distinguish the conditions of the stable state of malicious program propagation in heterogeneous sensor networks, and provide guidance for administrators to suppress the propagation of malicious programs in heterogeneous sensor networks.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a modeling method for malicious program propagation in a heterogeneous sensor network. Background technique [0002] In a homogeneous sensor network, all sensor nodes are required to have the same energy, communication and computing capabilities, while in a heterogeneous sensor network, the computing resources of sensor nodes can be different. Therefore, a heterogeneous sensor network is the main Way. In comparison, heterogeneous sensor networks have better performance in terms of network lifetime, network stability, and network reliability. Therefore, sensor networks in smart cities, smart medical care, smart agriculture, and smart factories are widely used. Heterogeneous sensor network. [0003] However, due to the limited computing resources of sensor nodes, it is impossible to configure high-strength security defense measures, making it easy for malicious programs to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/1433H04L63/145
Inventor 沈士根刘建华周海平冯晟胡珂立
Owner SHAOXING UNIVERSITY