{"title":"基于元胞自动机的无线传感器网络抗毁性分析","authors":"Xiuwen Fu, Xiaolin He, Yongsheng Yang","doi":"10.1109/ICHMS49158.2020.9209541","DOIUrl":null,"url":null,"abstract":"Network invulnerability is widely considered as one of the main bottlenecks restricting the widespread application of wireless sensor networks (WSNs). Therefore, in this work, we present a 2-D cellular automata model to mimic the failure process of WSNs. In this model, we consider five failure events of sensor nodes (i.e., energy exhaustion, hardware/software malfunctions, intentional attacks, random attacks and isolation from the sink node). The experimental results have shown that the invulnerability of WSNs under random attacks is better than that under intentional attacks. In addition, through composition analysis of failed sensor nodes, we observe that energy exhaustion is mainly responsible for node failures in the case of random attacks. Isolation from the sink node is the main cause of node failures under intentional attacks. The obtained results can provide theoretical guidance to build a more invulnerable WSN.","PeriodicalId":132917,"journal":{"name":"2020 IEEE International Conference on Human-Machine Systems (ICHMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Invulnerability Analysis of Wireless Sensor Networks based on Cellular Automata\",\"authors\":\"Xiuwen Fu, Xiaolin He, Yongsheng Yang\",\"doi\":\"10.1109/ICHMS49158.2020.9209541\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network invulnerability is widely considered as one of the main bottlenecks restricting the widespread application of wireless sensor networks (WSNs). Therefore, in this work, we present a 2-D cellular automata model to mimic the failure process of WSNs. In this model, we consider five failure events of sensor nodes (i.e., energy exhaustion, hardware/software malfunctions, intentional attacks, random attacks and isolation from the sink node). The experimental results have shown that the invulnerability of WSNs under random attacks is better than that under intentional attacks. In addition, through composition analysis of failed sensor nodes, we observe that energy exhaustion is mainly responsible for node failures in the case of random attacks. Isolation from the sink node is the main cause of node failures under intentional attacks. The obtained results can provide theoretical guidance to build a more invulnerable WSN.\",\"PeriodicalId\":132917,\"journal\":{\"name\":\"2020 IEEE International Conference on Human-Machine Systems (ICHMS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Human-Machine Systems (ICHMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICHMS49158.2020.9209541\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Human-Machine Systems (ICHMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICHMS49158.2020.9209541","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Invulnerability Analysis of Wireless Sensor Networks based on Cellular Automata
Network invulnerability is widely considered as one of the main bottlenecks restricting the widespread application of wireless sensor networks (WSNs). Therefore, in this work, we present a 2-D cellular automata model to mimic the failure process of WSNs. In this model, we consider five failure events of sensor nodes (i.e., energy exhaustion, hardware/software malfunctions, intentional attacks, random attacks and isolation from the sink node). The experimental results have shown that the invulnerability of WSNs under random attacks is better than that under intentional attacks. In addition, through composition analysis of failed sensor nodes, we observe that energy exhaustion is mainly responsible for node failures in the case of random attacks. Isolation from the sink node is the main cause of node failures under intentional attacks. The obtained results can provide theoretical guidance to build a more invulnerable WSN.