bullet Sensors & Transducers Journal

    (ISSN: 2306-8515, e-ISSN 1726-5479)


2008 e-Impact Factor

25 Top Downloaded Articles

Best Selling Articles 2012

Journal Subscription 2014

Editorial Calendar

Submit an Article

Editorial Board

Current Issue

S&T journal's cover

Sensors & Transducers Journal 2011

Sensors & Transducers Journal 2010

Sensors & Transducers Journal 2009

Sensors & Transducers Journal 2008

Sensors & Transducers Journal 2007

2000-2002 S&T e-Digest Contents

2003 S&T e-Digest Contents

2004 S&T e-Digest Contents

2005 S&T e-Digest Contents

2006 S&T e-Digest Contents


Best Articles 2011




Vol. 162, Issue 1, January 2014, pp. 85-93




Research on Propagation Model of Malicious Programs in Ad Hoc Wireless Network

1 Weimin GAO, 1 Lingzhi ZHU, 2 Junbin LIANG

1 School of Computer and Information Science, Hunan Institute of Technology, Hengyang 421002, China
2 School of Computer and Electronics Information, Guangxi University, Nanning 530004, China
1 Tel.: 86-734-3452102, fax: 86-734-3452222

E-mail: gwmhy@163.com


Received: 22 October 2013 /Accepted: 9 January 2014 /Published: 31 January 2014

Digital Sensors and Sensor Sysstems


Abstract: Ad Hoc wireless network faces more security threats than traditional network due to its P2P system structure and the limited node resources. In recent years, malicious program has become one of the most important researches on international network security and information security. The research of malicious programs on wireless network has become a new research hotspot in the field of malicious programs. This paper first analyzed the Ad Hoc network system structure, security threats, the common classification of malicious programs and the bionic propagation model. Then starting from the differential equations of the SEIR virus propagation model, the question caused by introducing the SEIR virus propagation model in Ad Hoc wireless network was analyzed. This paper improved the malicious program propagation model through introducing the network topology features and concepts such as immunization delay, and designed an improved algorithm combined with the dynamic evolution of malware propagation process. Considering of the network virus propagation characteristics, network characteristics and immunization strategy to improve simulation model experiment analysis, the experimental results show that both the immunization strategy and the degrees of node can affect the propagation of malicious program.


Keywords: Propagation models, Immune strategy, Malicious programs, Ad Hoc wireless network, Security threats.


Acrobat reader logo Click <here> or title of paper to download the full pages article in pdf format



Subscribe the full-page Sensors & Transducers journal in print (paper) or pdf formats

(shipping cost by standard mail for paper version is included)

(25 % discount for IFSA Members)




Alternatively we accept a money transfer to our bank account. Please contact for details: sales@sensorsportal.com



Download <here> the Library Journal Recommendation Form



Read more about Wireless Sensor Networks






1999 - 2014 Copyright , International Frequency Sensor Association (IFSA) Publishing, S.L. All Rights Reserved.

Home - News - Links - Archives - Tools - Voltage-to-Frequency Converters - Standardization - Patents - Marketplace - Projects - Wish List - e-Shop - Sensor Jobs - Membership - Videos - Publishing - Site Map - Subscribe - Search

 Members Area -Sensors Portal -Training Courses - S&T Digest - For advertisers - Bookstore - Forums - Polls - Submit Press Release - Submit White Paper - Testimonies - Twitter - Facebook - LinkedIn