“…Some WSNs reliability evaluation methods are used in published articles [11][12][13][14]. S. Shen et al [11] proposed an effective method for estimating the steady availability of heterogeneous sensor networks for malicious program propagation in order to predict the available performance of heterogeneous sensor networks.…”
Section: Related Workmentioning
confidence: 99%
“…S. Shen et al [11] proposed an effective method for estimating the steady availability of heterogeneous sensor networks for malicious program propagation in order to predict the available performance of heterogeneous sensor networks. Combined with the use of complete information static game, Markov chain, and reliability theory into a method to evaluate the survivability of cluster heterogeneity sensor networks under malicious program propagation environment, O. Kabadurmus et al [12] proposed a new indicator that combines network reliability and network resiliency to assess network reliability. M. Arslan et al [13] established the Markov model for effective data detection and fault tolerance of wireless sensor network nodes and conducted simulation analysis.…”
The Narrowband Internet of Things (NB-IoT) is a main stream technology based on mobile communication system. The combination of NB-IoT and WSNs can active the application of WSNs. In order to evaluate the influence of node heterogeneity on malware propagation in NB-IoT based Heterogeneous Wireless Sensor Networks, we propose a node heterogeneity model based on node distribution and vulnerability differences, which can be used to analyze the availability of nodes. We then establish the node state transition model by epidemic theory and Markov chain. Further, we obtain the dynamic equations of the transition between nodes and the calculation formula of node availability. The simulation result is that when the degree of node is small and the node vulnerability function is a power function, the node availability is the highest; when the degree of node is large and the node vulnerability function satisfies the exponential function and the power function, the node availability is high. Therefore, when constructing a NBIOT-HWSNs network, node protection is implemented according to the degree of node, so that when the node vulnerability function satisfies the power function, all nodes can maintain high availability, thus making the entire network more stable.
“…Some WSNs reliability evaluation methods are used in published articles [11][12][13][14]. S. Shen et al [11] proposed an effective method for estimating the steady availability of heterogeneous sensor networks for malicious program propagation in order to predict the available performance of heterogeneous sensor networks.…”
Section: Related Workmentioning
confidence: 99%
“…S. Shen et al [11] proposed an effective method for estimating the steady availability of heterogeneous sensor networks for malicious program propagation in order to predict the available performance of heterogeneous sensor networks. Combined with the use of complete information static game, Markov chain, and reliability theory into a method to evaluate the survivability of cluster heterogeneity sensor networks under malicious program propagation environment, O. Kabadurmus et al [12] proposed a new indicator that combines network reliability and network resiliency to assess network reliability. M. Arslan et al [13] established the Markov model for effective data detection and fault tolerance of wireless sensor network nodes and conducted simulation analysis.…”
The Narrowband Internet of Things (NB-IoT) is a main stream technology based on mobile communication system. The combination of NB-IoT and WSNs can active the application of WSNs. In order to evaluate the influence of node heterogeneity on malware propagation in NB-IoT based Heterogeneous Wireless Sensor Networks, we propose a node heterogeneity model based on node distribution and vulnerability differences, which can be used to analyze the availability of nodes. We then establish the node state transition model by epidemic theory and Markov chain. Further, we obtain the dynamic equations of the transition between nodes and the calculation formula of node availability. The simulation result is that when the degree of node is small and the node vulnerability function is a power function, the node availability is the highest; when the degree of node is large and the node vulnerability function satisfies the exponential function and the power function, the node availability is high. Therefore, when constructing a NBIOT-HWSNs network, node protection is implemented according to the degree of node, so that when the node vulnerability function satisfies the power function, all nodes can maintain high availability, thus making the entire network more stable.
“…Some WSN reliability evaluation methods are used in published articles [11][12][13][14]. Shen et al [11] proposed an effective method for estimating the steady availability of heterogeneous sensor networks for malicious program propagation in order to predict the available performance of heterogeneous sensor networks.…”
“…These sub-functions can be substitute into (16a) to get the equivalent expression (11) and its mean (12).…”
Section: Examplementioning
confidence: 99%
“…The aim of this paper is to show that correctness of reliability expressions for flow networks can be proved in a systematic way, though indeed for long expressions it is a formidable task. Lee [1] extended the concept of terminal-pair reliability to cover the case of a flow network, namely, a network that is good if and only if a specified amount of flow can be transmitted from the input node to the output node [2][3][4][5][6][7][8][9][10][11][12][13]. Terminal-pair reliability expressions for flow or capacitated networks can be checked by any of the three exhaustive tests given in Section 4.…”
Checking a symbolic reliability expression for a flow network is useful for detecting faults in hand derivations and for debugging computer programs. This checking can be achieved in a systematic way, though it may be a formidable task. Three exhaustive tests are given when a reliability system or network has a flow constraint. These tests apply to unreliability and reliability expressions for non-coherent as well as coherent systems, and to cases when both nodes and branches are unreliable. Further properties of reliability expressions derived through various methods are discussed. All the tests and other pertinent results are proved and illustrated by examples.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.