bullet Sensors & Transducers Journal

    (ISSN: 2306-8515, e-ISSN 1726-5479)

205.767

2008 e-Impact Factor

25 Top Downloaded Articles

Best Selling Articles 2012

Journal Subscription 2014

Editorial Calendar

Submit an Article

Editorial Board

Current Issue

S&T journal's cover

Sensors & Transducers Journal 2011

Sensors & Transducers Journal 2010

Sensors & Transducers Journal 2009

Sensors & Transducers Journal 2008

Sensors & Transducers Journal 2007

2000-2002 S&T e-Digest Contents

2003 S&T e-Digest Contents

2004 S&T e-Digest Contents

2005 S&T e-Digest Contents

2006 S&T e-Digest Contents

 

Best Articles 2011

 

 

 

Vol. 162, Issue 1, January 2014, pp. 85-93

 

Bullet

 

Research on Propagation Model of Malicious Programs in Ad Hoc Wireless Network
 

1 Weimin GAO, 1 Lingzhi ZHU, 2 Junbin LIANG

1 School of Computer and Information Science, Hunan Institute of Technology, Hengyang 421002, China
2 School of Computer and Electronics Information, Guangxi University, Nanning 530004, China
1 Tel.: 86-734-3452102, fax: 86-734-3452222

E-mail: gwmhy@163.com

 

Received: 22 October 2013 /Accepted: 9 January 2014 /Published: 31 January 2014

Digital Sensors and Sensor Sysstems

 

Abstract: Ad Hoc wireless network faces more security threats than traditional network due to its P2P system structure and the limited node resources. In recent years, malicious program has become one of the most important researches on international network security and information security. The research of malicious programs on wireless network has become a new research hotspot in the field of malicious programs. This paper first analyzed the Ad Hoc network system structure, security threats, the common classification of malicious programs and the bionic propagation model. Then starting from the differential equations of the SEIR virus propagation model, the question caused by introducing the SEIR virus propagation model in Ad Hoc wireless network was analyzed. This paper improved the malicious program propagation model through introducing the network topology features and concepts such as immunization delay, and designed an improved algorithm combined with the dynamic evolution of malware propagation process. Considering of the network virus propagation characteristics, network characteristics and immunization strategy to improve simulation model experiment analysis, the experimental results show that both the immunization strategy and the degrees of node can affect the propagation of malicious program.

 

Keywords: Propagation models, Immune strategy, Malicious programs, Ad Hoc wireless network, Security threats.

 

Acrobat reader logo Click <here> or title of paper to download the full pages article in pdf format

 

 

Subscribe the full-page Sensors & Transducers journal in print (paper) or pdf formats

(shipping cost by standard mail for paper version is included)

(25 % discount for IFSA Members)

 

 

 

Alternatively we accept a money transfer to our bank account. Please contact for details: sales@sensorsportal.com

 

 

Download <here> the Library Journal Recommendation Form

 

 

Read more about Wireless Sensor Networks

 

 

 

 

 


1999 - 2014 Copyright , International Frequency Sensor Association (IFSA) Publishing, S.L. All Rights Reserved.


Home - News - Links - Archives - Tools - Voltage-to-Frequency Converters - Standardization - Patents - Marketplace - Projects - Wish List - e-Shop - Sensor Jobs - Membership - Videos - Publishing - Site Map - Subscribe - Search

 Members Area -Sensors Portal -Training Courses - S&T Digest - For advertisers - Bookstore - Forums - Polls - Submit Press Release - Submit White Paper - Testimonies - Twitter - Facebook - LinkedIn