[0004] Said. Hayam et al. Using
signal processing technology to establish a worm propagation model in wireless sensor networks [J]. IEEE
Signal Processing Journal, 2006, 23(2): 164-169. A method using
signal processing is proposed. Technology establishes a topology-aware worm propagation model to analyze worm propagation characteristics from the perspective of time and space, but the epidemic model of worms is not considered enough
[0005] Pradeep. De et al. Modeling Node Compromise in
Wireless Sensor Networks Using Contagion Theory [C]. 2006 International Symposium on
Wireless, Mobile and
Multimedia Networks World IEEE Proceedings, pp.237-243. The potential node compromise problem, using the epidemic theory to study the node damage propagation process in the
wireless sensor network, and then established a random graph-based model, pointed out the key reasons for determining the
virus outbreak, but still in describing the dynamics of
malware propagation behavior There are deficiencies
[0006] Song Yurong, Jiang Guoping. Using Cellular Automata to Model
Malware Propagation in Wireless Sensor Networks [C]. IEEE International Conference on Neural Networks and
Signal Processing, Zhejiang, China, 2008.6:623-627 Using Cellular Automata to Establish The propagation model of malicious programs in wireless sensor networks, which reflects the spatio-temporal characteristics of the propagation process of malicious programs, but the model lacks the research on the differences of nodes in wireless sensor networks
[0007] Yang Xiong et al. Research on the propagation model of
malware in wireless sensor networks based on node difference[J]. Computer Applied Research, 2012,29(1):316-321. On the basis of two-dimensional cellular automata, a node difference is proposed The malicious program propagation model, which introduces the MAC wireless
channel contention mechanism and the neighborhood communication distance factor, describes the influence of node difference on the spread of malicious
software in wireless sensor networks. However, the
prevalence of malicious programs in the
research process The state of the
disease model is not considered enough
[0008] Fu Shuai et al.
Malware Propagation Model in Wireless Sensor Networks [J].
Computer Engineering, 2011, 37(3): 129-131. Based on the epidemiological theory, a sleep and wake-up mechanism was added, and a wireless sensor The SIR / WS model of malicious program propagation in the network, which improves the
immunity rate of the network and reduces the
infection rate of the network, but this model only describes the overall network and lacks an effective reflection of the local and micro spatio-temporal characteristics
[0009] Feng Liping et al. Worm Propagation Modeling and Stability Analysis in Wireless Sensor Networks[J].
Engineering Mathematics Issues, 2015, paper number: 129598, 8 pages. An improved epidemic based on worm propagation communication
radius and node distribution density is proposed This model uses the differential dynamic theory to analyze the dynamic process of worm propagation in wireless sensor networks. However, this model does not consider the differences of nodes, nor does it introduce
link layer access conflicts and MAC avoidance mechanisms into the research.
[0010] Shen Shigen et al. A strategy to prevent malicious transmission in wireless sensor networks based on differential games [J]. IEEE Information Forensics and Security, 2014, 9(11): 1962-1972. An improved epidemic model was proposed, using
differential game theory to When the malicious program spreads in the wireless sensor network, the decision-making problem between the wireless sensor network
system and the malicious program is regarded as an
optimal control problem. On the premise that the malicious program dynamically changes its strategy, the
optimal control strategy of the wireless sensor network
system is obtained, but this The model still does not consider the differences of nodes, and has limitations on the spatio-temporal characteristics of the network
[0011] In addition, there are three literatures on the propagation of malicious programs in
mobile wireless sensor networks. Among them, Wang Xiaoming et al. Reaction
Diffusion Model of
Malware Propagation in
Mobile Wireless Sensor Networks [J].
Information Science, 2013, 56:1-18. Proposed A reaction-
diffusion equation-theoretical
malware propagation model for
mobile wireless sensor networks is proposed, which effectively predicts the time-dependent dynamic behavior and
spatial distribution of malware propagation in order to facilitate targeted immunization at infected nodes. Measures, the model makes up for the existing malware propagation models that can only predict the temporal dynamic behavior, but cannot predict the
time distribution of malware propagation;