• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Huang Yicai, Zhou Weiwei, Yu Bin. Optimal Suppression Algorithm Against Worm Propagation in Wireless Service System for IoT Based on Target Cost Function[J]. Journal of Computer Research and Development, 2018, 55(11): 2467-2481. DOI: 10.7544/issn1000-1239.2018.20170305
Citation: Huang Yicai, Zhou Weiwei, Yu Bin. Optimal Suppression Algorithm Against Worm Propagation in Wireless Service System for IoT Based on Target Cost Function[J]. Journal of Computer Research and Development, 2018, 55(11): 2467-2481. DOI: 10.7544/issn1000-1239.2018.20170305

Optimal Suppression Algorithm Against Worm Propagation in Wireless Service System for IoT Based on Target Cost Function

More Information
  • Published Date: October 31, 2018
  • With the adoption of the general standard of communication protocol, wireless service system (WSS) in IoT is proposed to achieve the real-time connection between person and things or things and things. According to the characteristics of IEEE 802.15.4, wireless sensor nodes are embedded in the devices for data collection and command broadcasting. However, the isomorphism of the sensor nodes makes the worm propagation an increasingly serious problem. Firstly, based on the classification of epidemiological models related to worm propagation and the analysis of the characteristics of various models, an epidemiological model is constructed, which specially introduces sleep state and quarantine state into state transition. The transition relationship of nodes is defined simultaneously. Secondly, according to the radio frequency, the number and range of infected nodes with actual transmission ability are determined. Thirdly, we introduce the target cost function between worm and wireless service system, and put forward a dynamic differential game with complete information based on the overall damage. Then, the existence of saddle-point solution is proved, which is solved by combining state parameters, cooperative state variables and Hamiltonian functions. The optimal defense algorithm is proposed to minimize target cost function. Finally, different algorithms are implemented and the performance evaluation is carried out by comparing the characteristics of nodes in each state and the corresponding overall damage. The experimental results show that the optimal defense algorithm based on improved epidemic model can suppress worm propagation in wireless service system effectively and efficiently.
  • Related Articles

    [1]Zeng Weixin, Zhao Xiang, Tang Jiuyang, Tan Zhen, Wang Wei. Iterative Entity Alignment via Re-Ranking[J]. Journal of Computer Research and Development, 2020, 57(7): 1460-1471. DOI: 10.7544/issn1000-1239.2020.20190643
    [2]Dai Chenchao, Wang Hongyuan, Ni Tongguang, Chen Shoubing. Person Re-Identification Based on Deep Convolutional Generative Adversarial Network and Expanded Neighbor Reranking[J]. Journal of Computer Research and Development, 2019, 56(8): 1632-1641. DOI: 10.7544/issn1000-1239.2019.20190195
    [3]Du Ruizhong, Li Mingyue, Tian Junfeng. Multi-keyword Ranked Ciphertext Retrieval Scheme Based on Clustering Index[J]. Journal of Computer Research and Development, 2019, 56(3): 555-565. DOI: 10.7544/issn1000-1239.2019.20170830
    [4]Guo Jiafeng, Fan Yixing. Exploration on Neural Information Retrieval Framework[J]. Journal of Computer Research and Development, 2018, 55(9): 1987-1999. DOI: 10.7544/issn1000-1239.2018.20180133
    [5]Zhong Qi, Wang Jing, Guan Xuetao, Huang Tao, Wang Keyi. Data Object Scale Aware Rank-Level Memory Allocation[J]. Journal of Computer Research and Development, 2014, 51(3): 672-680.
    [6]Liu Xiping, Wan Changxuan, and Liu Dexi. Effective XML Vague Content and Structure Retrieval and Scoring[J]. Journal of Computer Research and Development, 2010, 47(6): 1070-1078.
    [7]Xu Cunlu, Chen Yanqiu, Lu Hanqing. Statistical Landscape Features for Texture Retrieval[J]. Journal of Computer Research and Development, 2006, 43(4): 702-707.
    [8]Xing Qiang, Yuan Baozong, and Tang Xiaofang. A Fast Image Retrieval Method Based on Weighted Chromaticity Histogram[J]. Journal of Computer Research and Development, 2005, 42(11): 1903-1910.
    [9]Ru Liyun, Ma Shaoping, and Lu Jing. Feature Fusion Based on the Average Precision in Image Retrieval[J]. Journal of Computer Research and Development, 2005, 42(9): 1640-1646.
    [10]Zhang Min, Lin Chuan, and Ma Shaoping. Dynamic Parameter Learning Approach for Information Retrieval with Genetic Algorithm[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (1049) PDF downloads (403) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return