无线传感器网络安全数学模型设计的一种方法

IF 0.2 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC
Y. Kotukh, V. Lyubchak, O. Strakh
{"title":"无线传感器网络安全数学模型设计的一种方法","authors":"Y. Kotukh, V. Lyubchak, O. Strakh","doi":"10.30837/rt.2021.4.207.08","DOIUrl":null,"url":null,"abstract":"The current level of development of engineering and technology is characterized by a constant expansion of the variety and complexity of mechanical and controlled objects, the operation of which occurs in a continuous-discrete time mode. One of these objects is the process of spreading malicious software in wireless sensor networks, the constant growth of trends towards which is due to their use as a single type of self-organized data transmission network with the least labor intensity and low cost. \nThe concept of building sensor networks has not been formed at all. Therefore, the study of certain properties of such networks is very important for both domestic and world science. Moreover, for the strategically important sectors of the country, in particular defense, the protection of wireless sensor networks is a very important component. \nA new model of malware distribution is proposed, which is described by some boundary value problem for an impulsive dynamical system on a time scale.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"52 1","pages":""},"PeriodicalIF":0.2000,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"One approach to the design of individual mathematical models of security in wireless sensor networks\",\"authors\":\"Y. Kotukh, V. Lyubchak, O. Strakh\",\"doi\":\"10.30837/rt.2021.4.207.08\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The current level of development of engineering and technology is characterized by a constant expansion of the variety and complexity of mechanical and controlled objects, the operation of which occurs in a continuous-discrete time mode. One of these objects is the process of spreading malicious software in wireless sensor networks, the constant growth of trends towards which is due to their use as a single type of self-organized data transmission network with the least labor intensity and low cost. \\nThe concept of building sensor networks has not been formed at all. Therefore, the study of certain properties of such networks is very important for both domestic and world science. Moreover, for the strategically important sectors of the country, in particular defense, the protection of wireless sensor networks is a very important component. \\nA new model of malware distribution is proposed, which is described by some boundary value problem for an impulsive dynamical system on a time scale.\",\"PeriodicalId\":41675,\"journal\":{\"name\":\"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia\",\"volume\":\"52 1\",\"pages\":\"\"},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2021-12-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30837/rt.2021.4.207.08\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30837/rt.2021.4.207.08","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

当前工程和技术发展水平的特点是机械和控制对象的种类和复杂性不断扩大,其操作发生在连续-离散时间模式中。其中一个目标是在无线传感器网络中传播恶意软件的过程,这一趋势的不断增长是由于无线传感器网络作为一种单一类型的自组织数据传输网络,具有最小的劳动强度和低成本。构建传感器网络的概念还没有形成。因此,研究此类网络的某些性质对国内外的科学研究都是非常重要的。此外,对于国家的战略重要部门,特别是国防,无线传感器网络的保护是一个非常重要的组成部分。提出了一种新的恶意软件分布模型,该模型用时间尺度上脉冲动力系统的边值问题来描述。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
One approach to the design of individual mathematical models of security in wireless sensor networks
The current level of development of engineering and technology is characterized by a constant expansion of the variety and complexity of mechanical and controlled objects, the operation of which occurs in a continuous-discrete time mode. One of these objects is the process of spreading malicious software in wireless sensor networks, the constant growth of trends towards which is due to their use as a single type of self-organized data transmission network with the least labor intensity and low cost. The concept of building sensor networks has not been formed at all. Therefore, the study of certain properties of such networks is very important for both domestic and world science. Moreover, for the strategically important sectors of the country, in particular defense, the protection of wireless sensor networks is a very important component. A new model of malware distribution is proposed, which is described by some boundary value problem for an impulsive dynamical system on a time scale.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia ENGINEERING, ELECTRICAL & ELECTRONIC-
自引率
33.30%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信