File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: On securing perimeter coverage in wireless sensor networks

TitleOn securing perimeter coverage in wireless sensor networks
Authors
Issue Date2009
Citation
2009 9Th International Symposium On Communications And Information Technology, Iscit 2009, 2009, p. 384-389 How to Cite?
AbstractThe coverage problem in which a set of sensors is required to collaborate so as to preserve the whole perimeter of a big object is known as the perimeter coverage problem. With the assumption that two sensors are neighbors and connected if they have overlapping cover ranges, we have developed distributed algorithms to find the set of sensors to cover the entire perimeter with the minimum size and the minimum cost previously. Unfortunately, this assumption is invalid when some security measures, such as a secret key management scheme, are applied to the sensors. In this paper, we are specifically interested in finding a set of sensors to monitor the target object with the minimum size and the minimum cost. At the same time, the sensors inside the set can communicate with its secure neighbors such that a secure communication path can be formed from any sensor inside the set to another sensor inside the same set. We first demonstrate why our previously proposed algorithms fail under this situation and further propose a modified model and algorithm so that the minimum size and minimum cost sets of sensors can be found. Finally, we simulate our proposed algorithm to demonstrate its effectiveness. ©2009 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/158617
References

 

DC FieldValueLanguage
dc.contributor.authorHung, KSen_US
dc.contributor.authorLui, KSen_US
dc.date.accessioned2012-08-08T09:00:30Z-
dc.date.available2012-08-08T09:00:30Z-
dc.date.issued2009en_US
dc.identifier.citation2009 9Th International Symposium On Communications And Information Technology, Iscit 2009, 2009, p. 384-389en_US
dc.identifier.urihttp://hdl.handle.net/10722/158617-
dc.description.abstractThe coverage problem in which a set of sensors is required to collaborate so as to preserve the whole perimeter of a big object is known as the perimeter coverage problem. With the assumption that two sensors are neighbors and connected if they have overlapping cover ranges, we have developed distributed algorithms to find the set of sensors to cover the entire perimeter with the minimum size and the minimum cost previously. Unfortunately, this assumption is invalid when some security measures, such as a secret key management scheme, are applied to the sensors. In this paper, we are specifically interested in finding a set of sensors to monitor the target object with the minimum size and the minimum cost. At the same time, the sensors inside the set can communicate with its secure neighbors such that a secure communication path can be formed from any sensor inside the set to another sensor inside the same set. We first demonstrate why our previously proposed algorithms fail under this situation and further propose a modified model and algorithm so that the minimum size and minimum cost sets of sensors can be found. Finally, we simulate our proposed algorithm to demonstrate its effectiveness. ©2009 IEEE.en_US
dc.languageengen_US
dc.relation.ispartof2009 9th International Symposium on Communications and Information Technology, ISCIT 2009en_US
dc.titleOn securing perimeter coverage in wireless sensor networksen_US
dc.typeConference_Paperen_US
dc.identifier.emailLui, KS:kslui@eee.hku.hken_US
dc.identifier.authorityLui, KS=rp00188en_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.doi10.1109/ISCIT.2009.5341221en_US
dc.identifier.scopuseid_2-s2.0-74549130437en_US
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-74549130437&selection=ref&src=s&origin=recordpageen_US
dc.identifier.spage384en_US
dc.identifier.epage389en_US
dc.identifier.scopusauthoridHung, KS=23008935900en_US
dc.identifier.scopusauthoridLui, KS=7103390016en_US

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats