TY - GEN
T1 - Self-protection for wireless sensor networks
AU - Wang, Dan
AU - Zhang, Qian
AU - Liu, Jiangchuan
PY - 2006/12/1
Y1 - 2006/12/1
N2 - Wireless sensor networks have recently been suggested for many surveillance applications such as object monitoring, path protection, or area coverage. Since the sensors themselves are important and critical objects in the network, a natural question is whether they need certain level of protection, so as to resist the attacks targeting on them directly. If this is necessary, then who should provide this protection, and how it can be achieved? We refer to the above problem as self-protection, as we believe the sensors themselves are the best (and often the only) candidate to provide such protection. In this paper, we for the first time present a formal study on the self-protection problem in wireless sensor networks. We show that, if we simply focus on the quality of field or object covering, the sensors might not necessarily be self-protected, which in turn makes the system vulnerable. We then investigate different farms of self-protections, and show that the problems are generally NP-complete. We develop efficient approximation algorithms for centrally-controlled sensors. We then extend the algorithms to fully distributed implementation, and introduce a smart sleep-scheduling algorithm that minimize the energy consumption.
AB - Wireless sensor networks have recently been suggested for many surveillance applications such as object monitoring, path protection, or area coverage. Since the sensors themselves are important and critical objects in the network, a natural question is whether they need certain level of protection, so as to resist the attacks targeting on them directly. If this is necessary, then who should provide this protection, and how it can be achieved? We refer to the above problem as self-protection, as we believe the sensors themselves are the best (and often the only) candidate to provide such protection. In this paper, we for the first time present a formal study on the self-protection problem in wireless sensor networks. We show that, if we simply focus on the quality of field or object covering, the sensors might not necessarily be self-protected, which in turn makes the system vulnerable. We then investigate different farms of self-protections, and show that the problems are generally NP-complete. We develop efficient approximation algorithms for centrally-controlled sensors. We then extend the algorithms to fully distributed implementation, and introduce a smart sleep-scheduling algorithm that minimize the energy consumption.
UR - http://www.scopus.com/inward/record.url?scp=33947708396&partnerID=8YFLogxK
U2 - 10.1109/ICDCS.2006.75
DO - 10.1109/ICDCS.2006.75
M3 - Conference article published in proceeding or book
AN - SCOPUS:33947708396
SN - 0769525407
SN - 9780769525402
T3 - Proceedings - International Conference on Distributed Computing Systems
BT - 26th IEEE Internationa26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006
T2 - 26th IEEE Internationa26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006
Y2 - 4 July 2006 through 7 July 2006
ER -