Edge Self-Monitoring for Wireless Sensor Networks

被引:21
作者
Dong, Dezun [1 ]
Liao, Xiangke [1 ]
Liu, Yunhao [2 ]
Shen, Changxiang [3 ]
Wang, Xinbing [4 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China
[2] Tsinghua Univ, Sch Software, TNLIST, Beijing 100084, Peoples R China
[3] Naval Inst Comp Technol, Beijing, Peoples R China
[4] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
Sensor networks; self-monitoring; security; NP-complete; AD HOC NETWORKS; DOMINATING SET; SECURITY;
D O I
10.1109/TPDS.2010.72
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry out monitoring operations. Such an assumption, however, is often difficult for a large-scale sensor network. In this work, we focus on designing an efficient scheme integrated with good self-monitoring capability as well as providing an infrastructure for various security protocols using local monitoring. To the best of our knowledge, we are the first to present the formal study on optimizing network topology for edge self-monitoring in WSNs. We show that the problem is NP-complete even under the unit disk graph (UDG) model and give the upper bound on the approximation ratio in various graph models. We provide polynomial-time approximation scheme (PTAS) algorithms for the problem in some specific graphs, for example, the monitoring-set-bounded graph. We further design two distributed polynomial algorithms with provable approximation ratio. Through comprehensive simulations, we evaluate the effectiveness of our design.
引用
收藏
页码:514 / 527
页数:14
相关论文
共 25 条
[1]  
[Anonymous], 2000, P ACM MOBICOM
[2]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[3]  
[Anonymous], 2003, COMBINATORIAL OPTIMI
[4]  
Buchegger S., 2002, P ACM MOBIHOC
[5]   Security and privacy in sensor networks [J].
Chan, HW ;
Perrig, A .
COMPUTER, 2003, 36 (10) :103-105
[6]  
DONG D, 2008, P ACM MOBIHOC
[7]   Reputation-based framework for high integrity sensor networks [J].
Ganeriwal, Saurabh ;
Balzano, Laura K. ;
Srivastava, Mani B. .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (03)
[8]   Security in wireless sensor networks [J].
Giruka, Venkata C. ;
Singhal, Mukesh ;
Royalty, James ;
Varanasi, Srilekha .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01) :1-24
[9]   APPROXIMATION SCHEMES FOR COVERING AND PACKING PROBLEMS IN IMAGE-PROCESSING AND VLSI [J].
HOCHBAUM, DS ;
MAASS, W .
JOURNAL OF THE ACM, 1985, 32 (01) :130-136
[10]  
HOCHBAUM DS, 1997, APPROXIMATION ALGORI, pCH3