File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/ISCIT.2009.5341221
- Scopus: eid_2-s2.0-74549130437
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: On securing perimeter coverage in wireless sensor networks
Title | On securing perimeter coverage in wireless sensor networks |
---|---|
Authors | |
Issue Date | 2009 |
Citation | 2009 9Th International Symposium On Communications And Information Technology, Iscit 2009, 2009, p. 384-389 How to Cite? |
Abstract | The coverage problem in which a set of sensors is required to collaborate so as to preserve the whole perimeter of a big object is known as the perimeter coverage problem. With the assumption that two sensors are neighbors and connected if they have overlapping cover ranges, we have developed distributed algorithms to find the set of sensors to cover the entire perimeter with the minimum size and the minimum cost previously. Unfortunately, this assumption is invalid when some security measures, such as a secret key management scheme, are applied to the sensors. In this paper, we are specifically interested in finding a set of sensors to monitor the target object with the minimum size and the minimum cost. At the same time, the sensors inside the set can communicate with its secure neighbors such that a secure communication path can be formed from any sensor inside the set to another sensor inside the same set. We first demonstrate why our previously proposed algorithms fail under this situation and further propose a modified model and algorithm so that the minimum size and minimum cost sets of sensors can be found. Finally, we simulate our proposed algorithm to demonstrate its effectiveness. ©2009 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/158617 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hung, KS | en_US |
dc.contributor.author | Lui, KS | en_US |
dc.date.accessioned | 2012-08-08T09:00:30Z | - |
dc.date.available | 2012-08-08T09:00:30Z | - |
dc.date.issued | 2009 | en_US |
dc.identifier.citation | 2009 9Th International Symposium On Communications And Information Technology, Iscit 2009, 2009, p. 384-389 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/158617 | - |
dc.description.abstract | The coverage problem in which a set of sensors is required to collaborate so as to preserve the whole perimeter of a big object is known as the perimeter coverage problem. With the assumption that two sensors are neighbors and connected if they have overlapping cover ranges, we have developed distributed algorithms to find the set of sensors to cover the entire perimeter with the minimum size and the minimum cost previously. Unfortunately, this assumption is invalid when some security measures, such as a secret key management scheme, are applied to the sensors. In this paper, we are specifically interested in finding a set of sensors to monitor the target object with the minimum size and the minimum cost. At the same time, the sensors inside the set can communicate with its secure neighbors such that a secure communication path can be formed from any sensor inside the set to another sensor inside the same set. We first demonstrate why our previously proposed algorithms fail under this situation and further propose a modified model and algorithm so that the minimum size and minimum cost sets of sensors can be found. Finally, we simulate our proposed algorithm to demonstrate its effectiveness. ©2009 IEEE. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | 2009 9th International Symposium on Communications and Information Technology, ISCIT 2009 | en_US |
dc.title | On securing perimeter coverage in wireless sensor networks | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Lui, KS:kslui@eee.hku.hk | en_US |
dc.identifier.authority | Lui, KS=rp00188 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1109/ISCIT.2009.5341221 | en_US |
dc.identifier.scopus | eid_2-s2.0-74549130437 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-74549130437&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.spage | 384 | en_US |
dc.identifier.epage | 389 | en_US |
dc.identifier.scopusauthorid | Hung, KS=23008935900 | en_US |
dc.identifier.scopusauthorid | Lui, KS=7103390016 | en_US |