期刊文献+

基于SMP的无线传感器网络拓扑容侵定量评估 被引量:6

Quantitative evaluation of topology intrusion tolerance in wireless sensor networks based on semi-Markov process
下载PDF
导出
摘要 提出了基于半马尔可夫过程(SMP)的拓扑容侵定量评估模型。因节点计算、存储能力等限制,在入侵结果统一层面上建模,简化了模型设计。利用内嵌DTMC求解出拓扑可用性、稳定性和服务率指标,提出贝叶斯网络指标推理方法,提高了容侵能力评估的准确性。分析了模型对参数的敏感性,通过实例剖析和比较,验证了拓扑容侵定量评估模型的有效性。 Based on semi-Markov process (SMP) a quantitative evaluation model was proposed to estimate ability of the topology intrusion-tolerance.For some limitations of node computation ability and storage ability the model was set up on the uniform intruding results to simplify the design.Using the DTMC embedded in SMP to solve attributes describing intrusion-tolerance,thus such attributes of the topology as availability,stability and servicing rate could be obtained.A Bayes network reasoning model was proposed to enhance accuracy of evaluation of intrusion tolerance ability.Sensitivity of parameters in the model was analyzed.It confirms validity of the quantitative evaluating model of topology intrusion tolerance through examples analysis and comparison.
出处 《通信学报》 EI CSCD 北大核心 2010年第7期24-32,共9页 Journal on Communications
基金 国家自然科学基金资助项目(60703115) 国家博士后科学基金资助项目(20070420955) 江苏省自然科学基金资助项目(BK2007560) 江苏省博士后科学基金资助项目(0702003B) 江苏省研究生创新计划基金资助项目(CX09B_203Z) 国家社会科学基金资助项目(09CTJ006)~~
关键词 无线传感器网络 半马尔可夫过程 拓扑容侵 贝叶斯网络 定量评估 wireless sensor networks semi-Markov process topology intrusion tolerance Bayes network quantitative evaluation
  • 相关文献

参考文献16

  • 1MOHSEN R,MOHAMMADTAGHI H,VAHAB S M.Fault-tolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks[J].Wireless Networks,2006,12:179-188.
  • 2JORGIC M,GOEL N,KALAICHEVAN K,et al.Localized detection of k-connectivity in wireless ad hoc actuator and sensor networks[A].Proc of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN07)[C].Hawaii,2007.33-38.
  • 3王良民,马建峰,王超.无线传感器网络拓扑的容错度与容侵度[J].电子学报,2006,34(8):1446-1451. 被引量:22
  • 4MA R,XING L,MICHEL H E.Fault-intrusion tolerant techniques in wireless sensor networks[A].Proceedings of the 2nd IEEE International Symposium on Dependable,Autonomic and Secure Computing (DASC'06)[C].Indianapolis,2006.85-94.
  • 5王良民,马建峰.基于再生技术的无线传感器网络容侵拓扑控制方法[J].计算机研究与发展,2009,46(10):1678-1685. 被引量:3
  • 6ALBERT R,JEONG H,BARABASI A L.Error and attack tolerance of complex networks[J].Nature,2000,406(27):378-382.
  • 7裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:94
  • 8MADANA B B,POPSTOJANOVA K G,VAIDYANATHAN K,et al.A method for modeling and quantifying the security attributes of intrusion tolerant systems[J].Performance Evaluation,2004,56(1~4):167-186.
  • 9TRIVEDI K S.Probability and Statistics with Reliability,Queuing,and Computer Science Applications[M].New York:Wiley Press,2001.
  • 10刘东,张春元,邢维艳,李瑞.基于贝叶斯网络的多阶段系统可靠性分析模型[J].计算机学报,2008,31(10):1814-1825. 被引量:14

二级参考文献143

共引文献173

同被引文献49

  • 1李军,刘君华.多传感器融合系统的可靠性模型研究[J].西安交通大学学报,2004,38(8):775-778. 被引量:8
  • 2殷丽华,方滨兴.入侵容忍系统安全属性分析[J].计算机学报,2006,29(8):1505-1512. 被引量:27
  • 3王良民,马建峰,王超.无线传感器网络拓扑的容错度与容侵度[J].电子学报,2006,34(8):1446-1451. 被引量:22
  • 4Granjal J, Monteiro E, Silva J S. Security in the Integration of Low-Power Wireless Sensor Networks with the Internet : A Survey [J]. Ad Hoc Networks,2015,24(A) :264-287.
  • 5Winkler T, Rinner B. Security and Privacy Protection in Visual Sensor Networks : A Survey [J]. ACM Computing Surveys, 2014, 47(1):2,42.
  • 6Wang Y, Wen S, Xiang Y, et al. Modeling the Propagation of Worms in Networks: A Survey[J]. IEEE Communications Surveys and Tutorials, 2014,16 ( 2 ) : 942 -960.
  • 7Parvin S, Hussain F K, Park J S, et al. A Survivability Model in Wireless Sensor Networks [ J ]. Computers & Mathematics with Ap- plications, 2012,64(12) : 3666-3682.
  • 8Petridou S, Basagiannis S, Roumeliotis M. Survivability Analysis Using Probabilistic Model Checking: A Study on Wireless Sensor Networks[J]. IEEE Systems Journal, 2013,7( 1 ) :4-12.
  • 9Zhang L, Liu T, Guo L, et al. The Survivability Analysis Method of Wireless Sensor Network Based on SPN [J]. Journal of Informa- tion and Computational Science, 2014,11 (6) : 1983-1994.
  • 10Cai J, Song X, Wang J, et al. Reliability Analysis for a Data Flow in Event-Driven Wireless Sensor Networks [J]. Wireless Personal Communications, 2014,78 ( 1 ) : 151-169.

引证文献6

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部