{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T07:21:07Z","timestamp":1767165667290,"version":"build-2238731810"},"reference-count":18,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T00:00:00Z","timestamp":1546473600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2019,1,3]]},"abstract":"<jats:p>The Narrowband Internet of Things (NB-IoT) is a main stream technology based on mobile communication system. The combination of NB-IoT and WSNs can active the application of WSNs. In order to evaluate the influence of node heterogeneity on malware propagation in NB-IoT based Heterogeneous Wireless Sensor Networks, we propose a node heterogeneity model based on node distribution and vulnerability differences, which can be used to analyze the availability of nodes. We then establish the node state transition model by epidemic theory and Markov chain. Further, we obtain the dynamic equations of the transition between nodes and the calculation formula of node availability. The simulation result is that when the degree of node is small and the node vulnerability function is a power function, the node availability is the highest; when the degree of node is large and the node vulnerability function satisfies the exponential function and the power function, the node availability is high. Therefore, when constructing a NBIOT-HWSNs network, node protection is implemented according to the degree of node, so that when the node vulnerability function satisfies the power function, all nodes can maintain high availability, thus making the entire network more stable.<\/jats:p>","DOI":"10.1155\/2019\/4392839","type":"journal-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T18:31:47Z","timestamp":1546540307000},"page":"1-9","source":"Crossref","is-referenced-by-count":8,"title":["Nodes Availability Analysis of NB-IoT Based Heterogeneous Wireless Sensor Networks under Malware Infection"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8519-104X","authenticated-orcid":true,"given":"Xiaojun","family":"Wu","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Donghua University, Shanghai 201620, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qiying","family":"Cao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Donghua University, Shanghai 201620, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Juan","family":"Jin","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Donghua University, Shanghai 201620, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuanjie","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Management, Shanghai Lixin University of Accounting and Finance, Shanghai 201620, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hong","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Donghua University, Shanghai 201620, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2632128"},{"issue":"3","key":"2","first-page":"190","volume":"43","year":"2016","journal-title":"Journal of XIAN University"},{"issue":"6","key":"3","first-page":"1425","volume":"36","year":"2015","journal-title":"Computer Engineering and Design"},{"issue":"2","key":"4","first-page":"1","volume":"48","year":"2015","journal-title":"ACM Computing Surveys"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.10.002"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.7004521"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03200-9_24"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.12.077"},{"issue":"28","key":"9","volume":"9","year":"2017","journal-title":"International Journal of Modern Physics C"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2012.09.025"},{"issue":"7","key":"11","first-page":"1083","volume":"29","year":"2016","journal-title":"Chinese Journal of Sensors and Actuators"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2017.2712667"},{"issue":"1","key":"13","first-page":"1539","volume":"14","year":"2015","journal-title":"ACM Transactions on Embedded Computing Systems"},{"issue":"3","key":"14","first-page":"210","volume":"36","year":"2016","journal-title":"Journal of Guilin University of Electronic Technology"},{"issue":"4","key":"15","first-page":"235","year":"2011","journal-title":"Journal of Yunnan University (Natural Science)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2399925"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.05.003"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jart.2015.06.016"}],"updated-by":[{"DOI":"10.1155\/2021\/3847016","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000}}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2019\/4392839.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2019\/4392839.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2019\/4392839.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T18:31:52Z","timestamp":1546540312000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/wcmc\/2019\/4392839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,3]]},"references-count":18,"alternative-id":["4392839","4392839"],"URL":"https:\/\/doi.org\/10.1155\/2019\/4392839","relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,3]]}}}