无线传感器网络中无功干扰器定位的轻量级分散算法

G. Vinothkumar, G. Ramya, A. Rengarajan
{"title":"无线传感器网络中无功干扰器定位的轻量级分散算法","authors":"G. Vinothkumar, G. Ramya, A. Rengarajan","doi":"10.1109/ICOAC.2012.6416800","DOIUrl":null,"url":null,"abstract":"In wireless sensor network one of the most security threat is the reactive jammer because of the mass destruction to the sensor communication and it is difficult to disclose. So we have to deactivate the reactive jammers by identifying all the trigger nodes, because the transmission invokes the jammer. Such a trigger identification procedure can work as an application-layer service and benefit many existing reactive jamming defending schemes. In this paper, on the one hand, we leverage several optimization problems to provide a complete trigger-identification service framework for unreliable wireless sensor networks. On the other hand, we provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. theoretical analysis and simulation results are included to validate the performance of this framework.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Lightweight decentralized algorithm for localizing reactive jammers in wireless sensor network\",\"authors\":\"G. Vinothkumar, G. Ramya, A. Rengarajan\",\"doi\":\"10.1109/ICOAC.2012.6416800\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In wireless sensor network one of the most security threat is the reactive jammer because of the mass destruction to the sensor communication and it is difficult to disclose. So we have to deactivate the reactive jammers by identifying all the trigger nodes, because the transmission invokes the jammer. Such a trigger identification procedure can work as an application-layer service and benefit many existing reactive jamming defending schemes. In this paper, on the one hand, we leverage several optimization problems to provide a complete trigger-identification service framework for unreliable wireless sensor networks. On the other hand, we provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. theoretical analysis and simulation results are included to validate the performance of this framework.\",\"PeriodicalId\":286985,\"journal\":{\"name\":\"2012 Fourth International Conference on Advanced Computing (ICoAC)\",\"volume\":\"95 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fourth International Conference on Advanced Computing (ICoAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOAC.2012.6416800\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Advanced Computing (ICoAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOAC.2012.6416800","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

在无线传感器网络中,反应性干扰是最大的安全威胁之一,因为它对传感器通信具有大规模的破坏作用,并且难以被发现。所以我们必须通过识别所有触发节点来解除被动干扰器,因为传输会调用干扰器。这种触发识别过程可以作为一种应用层服务,使许多现有的无功干扰防御方案受益。在本文中,一方面,我们利用几个优化问题为不可靠的无线传感器网络提供了一个完整的触发识别服务框架。另一方面,针对两种复杂的干扰模型,提出了一种改进算法,以增强其对各种网络场景的鲁棒性。理论分析和仿真结果验证了该框架的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Lightweight decentralized algorithm for localizing reactive jammers in wireless sensor network
In wireless sensor network one of the most security threat is the reactive jammer because of the mass destruction to the sensor communication and it is difficult to disclose. So we have to deactivate the reactive jammers by identifying all the trigger nodes, because the transmission invokes the jammer. Such a trigger identification procedure can work as an application-layer service and benefit many existing reactive jamming defending schemes. In this paper, on the one hand, we leverage several optimization problems to provide a complete trigger-identification service framework for unreliable wireless sensor networks. On the other hand, we provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. theoretical analysis and simulation results are included to validate the performance of this framework.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信