Telecommunications Science ›› 2018, Vol. 34 ›› Issue (11): 67-76.doi: 10.11959/j.issn.1000-0801.2018252
• research and development • Previous Articles Next Articles
Haiping ZHOU,Shigen SHEN,Longjun HUANG,Sheng FENG
Revised:
2018-09-09
Online:
2018-11-01
Published:
2018-12-06
Supported by:
CLC Number:
Haiping ZHOU,Shigen SHEN,Longjun HUANG,Sheng FENG. Game theory-based malware propagation model for wireless sensor network[J]. Telecommunications Science, 2018, 34(11): 67-76.
[1] | 张焕国, 韩文报, 来学嘉 ,等. 网络空间安全综述[J]. 中国科学:信息科学, 2016,46(2): 125-164. |
ZHANG H G , HAN W B , LAI X J ,et al. Surveyon cyberspace security[J]. Scientia Sinica:Informationis, 2016,46(2): 125-164. | |
[2] | SHI H , WANG W , KWOK N ,et al. Game theory for wireless sensor network:a survey[J]. Sensors, 2012,12(7): 113-122. |
[3] | 沈士根, 刘建华, 曹奇英 . 博弈论与无线传感器网络安全[M]. 北京: 清华大学出版社, 2016. |
SHEN S G , LIU J H , CAO Q Y . Game theory meets wireless sensor network security[M]. Beijing: Tsinghua University PressPress, 2016. | |
[4] | ABDALZAHERM , SEDDIK K , ELSABROUTY M ,et al. Game theory meets wireless sensor network security requirements and threats mitigation:asurvey[J]. Sensors, 2016,16(7): 1-27. |
[5] | 沈士根, 黄龙军, 胡珂立 ,等. 基于微分博弈的在线社交网络恶意程序传播优化控制方法[J]. 电信科学, 2015,31(10): 66-73. |
SHEN S G , HUANG L J , HU K L ,et al. Differential game-based optimal control method for preventing malware propagation in online social network[J]. Telecommunications Science, 2015,31(10): 66-73. | |
[6] | 沈士根, 冯晟, 周海平 ,等. 基于云计算和动态贝叶斯博弈的WSN恶意程序传播优化抑制方法[J]. 电信科学, 2018,34(9). |
SHEN S G , FENG S , ZHOU H P ,et al. Optimal approach to suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game[J]. Telecommunications Science, 2018,34(9). | |
[7] | 沈士根, 周海平, 黄龙军 ,等. 基于最优反应均衡的传感网恶意程序传播抑制方法[J]. 传感技术学报, 2017,30(10): 1589-1595. |
SHEN S G , ZHOU H P , HUANG L J ,et al. Quanta response equilibrium-based method for preventing WSN malware infection[J]. Chinese Journal of Sensors and Actuators, 2017,30(10): 1589-1595. | |
[8] | 沈士根, 黄龙军, 周海平 ,等. 面向恶意程序传播的异质WSN 稳态可用度评估[J]. 传感技术学报, 2017,30(7): 1100-1105. |
SHEN S G , HUANG L J , ZHOU H P ,et al. Steady-state availability evaluation for heterogeneous WSN under malware infection[J]. Chinese Journal of Sensors and Actuators, 2017,30(7): 1100-1105. | |
[9] | 沈士根, 范恩, 胡珂立 ,等. 面向恶意程序传播的传感网可靠度评估[J]. 电子学报, 2018,46(1): 75-81. |
SHEN S G , FAN E , HU K L ,et al. Reliability evaluation for WSN with malware spread[J]. Acta Electronica Sinica, 2018,46(1): 75-81. | |
[10] | 庄克琛, 张宏, 张琨 ,等. 无线传感器网络中的病毒传播动力学研究[J]. 计算机科学, 2013,40(3): 187-191. |
ZHUANG K C , ZHANG H , ZHANG K ,et al. Analysis of spreading dynamics of virus in wireless sensor network[J]. Computer Science, 2013,40(3): 187-191. | |
[11] | 熊自立, 韩兰胜, 徐行波 ,等. 基于博弈的无线传感器网络入侵检测模型[J]. 计算机科学, 2017,44(S1): 326-332. |
XIONG Z L , HAN L S , XU H B ,et al. Research on intrusion detection of wireless sensor network based on game theory[J]. Computer Science, 2017,44(S1): 326-332. | |
[12] | 周伟伟, 郁滨 . WSN 多阶段入侵检测博弈最优策略研究[J]. 电子与信息学报, 2018,40(1): 63-71. |
ZHOU W W , YU B . Optimal defense strategy in WSN based on the game of multi-stage intrusion detection[J]. Journal of Electronics & Information Technology, 2018,40(1): 63-71. | |
[13] | CHENG Z . A differential game model between intrusion detection system and attackers for wireless sensor network[J]. Wireless Personal Communications, 2016,90(3): 1211-1219. |
[14] | SEDJELMACI H , SENOUCI S , ANSARI N . Intrusion detection and ejection framework against lethal attacks in UAV-aided network:a Bayesian game-theoretic methodology[J]. IEEE Transactions on Intelligent Transportation Systems, 2017,18(5): 1143-1153. |
[15] | 王小明, 李成博, 李英姝 . 移动无线传感网恶意数据包传播随机模型[J]. 电子与信息学报, 2013,35(6): 1290-1297. |
WANG X M , LI C B , LI Y Z . A stochastic model of malicious data packet propagation in mobile wireless sensor network[J]. Journal of Electronics & Information Technology, 2013,35(6): 1290-1297. | |
[16] | 曹玉林, 王小明, 何早波 . 移动无线传感网中恶意软件传播的最优安全策略[J]. 电子学报, 2016,44(8): 1851-1857. |
CAO Y L , WANG X M , HE Z B . Optimal security strategy for malware propagation mobile wireless sensor network[J]. Acta Electronica Sinica, 2016,44(8): 1851-1857. | |
[17] | SINGH A , AWASTHI A , SINGH K ,et al. Modeling and analysis of worm propagation in wireless sensor network[J]. Wireless Personal Communications, 2018,98(3): 2535-2551. |
[18] | WANG T , WU Q , WEN S ,et al. Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator network[J]. Sensors, 2017,17(12): 139-155. |
[19] | LIU W,LIU,C , YANG Z ,et al. Modeling the propagation of mobile malware on complex network[J]. Communications in Nonlinear Science and Numerical Simulation, 2016(37): 249-264. |
[20] | CHRISTOPHE B , LIZA C , CORINNE T . Optimal design and defense of network under link attacks[J]. Journal of Mathematical Economics, 2017(68): 62-79. |
[1] | Cheng DING, Jinrong CHEN, Xiaodong CAO, Yi WANG. Quality of service based hierarchical resource allocation algorithm [J]. Telecommunications Science, 2022, 38(1): 102-111. |
[2] | Yongyan LI,Jianping WU. Wireless sensor node localization based on IPSO-MC [J]. Telecommunications Science, 2020, 36(3): 11-18. |
[3] | Haoran LIU,Xingqi WANG,Yujing DENG,Yuhua QIN. Evaluation model of node importance in directed scale-free network based on cascade failure [J]. Telecommunications Science, 2020, 36(2): 43-51. |
[4] | Ruifeng CHEN,Ming NI,Chunjie XU,Hao HU. Communication performance analysis of wireless sensor network for railway environmental monitoring [J]. Telecommunications Science, 2019, 35(5): 70-77. |
[5] | Ying ZHOU,Lihua YANG,Longxiang YANG,Meng NI. Energy-efficient data gathering scheme based on Kalman prediction and compressed sensing [J]. Telecommunications Science, 2019, 35(1): 74-80. |
[6] | Shigen SHEN,Sheng FENG,Haiping ZHOU,Longjun HUANG,Keli HU,Qiying CAO. Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game [J]. Telecommunications Science, 2018, 34(9): 78-86. |
[7] | Haibo YANG,Yourong CHEN,Banteng LIU,Yunkai ZHU,Ziyi SU. Coverage scheduling algorithm of mobile sensor nodes for optimizing network lifetime [J]. Telecommunications Science, 2018, 34(5): 39-49. |
[8] | Shihua CAO,Keyong HU,Lidong WANG,Qihui WANG. Distributed hue recognition based k connectivity path detection in WSN [J]. Telecommunications Science, 2018, 34(2): 65-73. |
[9] | Lijun LI,Fuquan ZHANG,Hongfei LIU. Data transmission algorithm for mobile wireless sensor network based on power loss equalization control mechanism [J]. Telecommunications Science, 2018, 34(11): 1-9. |
[10] | Kai ZHOU. Nodes deployment strategy for underwater wireless sensors networks based on grids [J]. Telecommunications Science, 2018, 34(11): 48-58. |
[11] | Deyue MENG,Errong PEI,Youlin HUANG. Design of MAC protocol and performance analysis for heterogeneous nodes separating CRSN [J]. Telecommunications Science, 2017, 33(8): 107-119. |
[12] | Jianhua LIU,Minglu LI,Dazhi LI,Luqun LI. Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud [J]. Telecommunications Science, 2017, 33(6): 86-96. |
[13] | Guoyong DAI,Weiyuan SHI,Kezhen YING,Qingzhang CHEN,Keji MAO. Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN [J]. Telecommunications Science, 2017, 33(6): 97-104. |
[14] | Qi WANG,Zheng’an XIAO,Huaixing WANG. Polynomial time algorithm for solving k-coverage problem in wireless sensor networks [J]. Telecommunications Science, 2017, 33(12): 91-98. |
[15] | Yanzhi ZHANG,Xiaoqin YE. Detection of sybil attacks based on periodic ultra wide band distance information in WSN [J]. Telecommunications Science, 2016, 32(8): 110-117. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|