{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:10:47Z","timestamp":1774541447491,"version":"3.50.1"},"reference-count":36,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61772018"],"award-info":[{"award-number":["61772018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2020,11]]},"abstract":"<jats:p>Wireless sensor networks, as a multi-hop self-organized network system formed by wireless communication, are vulnerable to malware diffusion by breaking the data confidentiality and service availability, owing to their low configuration and weak defense mechanism. To reveal the rules of malware diffusion in the really deployed wireless sensor networks, we propose a model called Malware Diffusion Based on Cellular Automaton to describe the dynamics of malware diffusion based on cellular automaton. According to the model, we first analyze and obtain the differential equations, which can reflect the various state dynamics of sensor nodes with cellular automaton. Then, we attain the equilibrium points of the model Malware Diffusion Based on Cellular Automaton to determine the threshold for whether malware will diffuse or die out in wireless sensor networks. Furthermore, we compute the basic regeneration number of the model Malware Diffusion Based on Cellular Automaton using the next-generation matrix and prove the stability of the equilibrium points. Finally, via experimental simulation, we verify the effectiveness of the model Malware Diffusion Based on Cellular Automaton, which can provide administrators with the theoretical guidance on suppressing malware diffusion in wireless sensor networks.<\/jats:p>","DOI":"10.1177\/1550147720972944","type":"journal-article","created":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T10:39:22Z","timestamp":1605091162000},"page":"155014772097294","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":19,"title":["Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton"],"prefix":"10.1177","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3607-0177","authenticated-orcid":false,"given":"Hong","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Donghua University, Shanghai, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7558-5379","authenticated-orcid":false,"given":"Shigen","family":"Shen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shaoxing University, Shaoxing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qiying","family":"Cao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Donghua University, Shanghai, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8519-104X","authenticated-orcid":false,"given":"Xiaojun","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Donghua University, Shanghai, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shaofeng","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Donghua University, Shanghai, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"key":"bibr1-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1864847"},{"key":"bibr2-1550147720972944","first-page":"1","volume":"16","author":"Patel H","year":"2020","journal-title":"Int J Distrib Sens N"},{"key":"bibr3-1550147720972944","first-page":"5618065","volume":"2017","author":"Gonz\u00e1lez AV","year":"2017","journal-title":"Wirel Commun Mob Com"},{"key":"bibr4-1550147720972944","first-page":"1","volume":"16","author":"Deng S","year":"2020","journal-title":"Int J Distrib Sens N"},{"key":"bibr5-1550147720972944","first-page":"1","volume":"12","author":"Xu H","year":"2016","journal-title":"Int J Distrib Sens N"},{"key":"bibr6-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4254701"},{"key":"bibr7-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3386-6"},{"key":"bibr8-1550147720972944","first-page":"1","volume":"11","author":"Jiang G","year":"2015","journal-title":"Int J Distrib Sens N"},{"key":"bibr9-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2756344"},{"key":"bibr10-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.04.020"},{"key":"bibr11-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.08.060"},{"key":"bibr12-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2882742"},{"key":"bibr13-1550147720972944","first-page":"12","volume-title":"2017 IEEE 13th international conference on wireless and mobile computing, networking and communications (WiMob)","author":"Yalew SD"},{"key":"bibr14-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2594130"},{"key":"bibr15-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100913.00195"},{"key":"bibr16-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2016.01.002"},{"key":"bibr17-1550147720972944","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i31\/98453"},{"key":"bibr18-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102420"},{"key":"bibr19-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2772787"},{"key":"bibr20-1550147720972944","doi-asserted-by":"publisher","DOI":"10.3390\/s16060855"},{"key":"bibr21-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1088\/1009-1963\/15\/6\/019"},{"key":"bibr22-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2017.0070"},{"key":"bibr23-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(84)90245-8"},{"key":"bibr24-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2303803"},{"key":"bibr25-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.01.038"},{"key":"bibr26-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2359333"},{"key":"bibr27-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.05.003"},{"key":"bibr28-1550147720972944","first-page":"1","volume":"15","author":"Jiang W","year":"2019","journal-title":"Int J Distrib Sens N"},{"key":"bibr29-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3745619"},{"key":"bibr30-1550147720972944","first-page":"810","volume":"23","author":"Wang X","year":"2014","journal-title":"Chin J Electron"},{"key":"bibr31-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.08.018"},{"key":"bibr32-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.12.010"},{"key":"bibr33-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1186\/1756-0500-7-234"},{"key":"bibr34-1550147720972944","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.amc.2006.06.126","volume":"186","author":"White SH","year":"2007","journal-title":"Appl Math Comput"},{"key":"bibr35-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1038\/311419a0"},{"key":"bibr36-1550147720972944","doi-asserted-by":"publisher","DOI":"10.1016\/S0025-5564(02)00108-6"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147720972944","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147720972944","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147720972944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T00:04:08Z","timestamp":1618358648000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147720972944"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11]]},"references-count":36,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["10.1177\/1550147720972944"],"URL":"https:\/\/doi.org\/10.1177\/1550147720972944","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11]]}}}