Proactive Stealthiness for Wireless Sensor Networks

Wenzhe Zhang, Yihuai Wang, Y. Li, Minglu Li
{"title":"Proactive Stealthiness for Wireless Sensor Networks","authors":"Wenzhe Zhang, Yihuai Wang, Y. Li, Minglu Li","doi":"10.1109/ISISE.2010.62","DOIUrl":null,"url":null,"abstract":"Field surveillance is one of the most important applications for wireless sensor networks. Many sensors are deployed in a region of concern to detect any potential targets. On the contrary, intelligent target finds out the deployed sensors to destroy for fear of being detected and leads to defunct surveillance. Due to the importance of sensor nodes, it is necessary to hide them from the scope of target. In this paper, we introduce Proactive Stealthiness as the natural immune system covered on sensor networks. We model the stealthiness problem, and propose a distributed marking algorithm based on Breadth-First Spanning Tree. Different from previous works which only introduce self protection to wireless sensor networks, we not only maintain the connectivity of all dominating sensors but achieve the minimum hops of urgent message to gateway. This makes the method proposed more practical and sensible. Extensive simulation confirms the performance of algorithms proposed and Experimental result manifests the feasibility and efficiency.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"146 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Third International Symposium on Information Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISISE.2010.62","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Field surveillance is one of the most important applications for wireless sensor networks. Many sensors are deployed in a region of concern to detect any potential targets. On the contrary, intelligent target finds out the deployed sensors to destroy for fear of being detected and leads to defunct surveillance. Due to the importance of sensor nodes, it is necessary to hide them from the scope of target. In this paper, we introduce Proactive Stealthiness as the natural immune system covered on sensor networks. We model the stealthiness problem, and propose a distributed marking algorithm based on Breadth-First Spanning Tree. Different from previous works which only introduce self protection to wireless sensor networks, we not only maintain the connectivity of all dominating sensors but achieve the minimum hops of urgent message to gateway. This makes the method proposed more practical and sensible. Extensive simulation confirms the performance of algorithms proposed and Experimental result manifests the feasibility and efficiency.
无线传感器网络的主动隐身
现场监控是无线传感器网络最重要的应用之一。许多传感器被部署在一个关注的区域,以探测任何潜在的目标。相反,智能目标由于害怕被发现而发现部署的传感器并将其摧毁,从而导致监视失效。由于传感器节点的重要性,有必要将其隐藏在目标范围之外。在本文中,我们将主动隐身作为覆盖在传感器网络中的自然免疫系统。对隐身性问题进行建模,提出了一种基于广度优先生成树的分布式标记算法。与以往在无线传感器网络中只引入自我保护的工作不同,我们不仅保持了所有主导传感器的连通性,而且实现了紧急消息到网关的最小跳数。这使得所提出的方法更加实用和合理。大量的仿真验证了算法的性能,实验结果表明了算法的可行性和有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信