Skip to main content

Sensor Network Configuration Under Physical Attacks

  • Conference paper
Networking and Mobile Computing (ICCNMC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3619))

Included in the following conference series:

Abstract

Sensor networks typically operate in hostile outdoor environments. In such environments, sensor networks are highly susceptible to physical attacks that can result in physical node destructions. In this paper, we study the impacts of physical attacks on sensor network configuration. Lifetime is an important metric during configuration for many sensor applications. While lifetime is constrained by limited energies and has been addressed before, prior results cannot be directly applied in the presence of physical attacks. In this paper, we define a practical lifetime problem in sensor networks under a representative physical attack model that we define. We develop an anlytical approach to derive the minimum number and deployment plan of sensors to meet lifetime requirement under physical attacks. We make several observations in this paper. One of our important observations is the high sensitivity of lifetime to physical attacks highlighting the significance of our study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and coun-termeaures. In: IEEE International Workshop on Sensor Networks (May 2003)

    Google Scholar 

  2. Wood, A., Stankovic, J.: Denial of service in sensor networks. IEEE Computer, 54–62 (2002)

    Google Scholar 

  3. Bhardwaj, M., Chandrakasan, A., Garnett, T.: Upper bounds on the lifetime of sensor networks. In: Proc. IEEE ICC 2001, pp. 785–790 (2001)

    Google Scholar 

  4. Bhardwaj, M., Chandrakasan, A.: Bounding the lifetime of sensor networks via opti mal role assignment. In: Proc. IEEE Infocom 2002, pp. 1587–1596 (2002)

    Google Scholar 

  5. Hu, Z., Li, B.: On the fundamental capacity and lifetime of energy-constrained wireless sensor networks. In: Proc. IEEE RTAS 2004, pp. 38–47 (2004)

    Google Scholar 

  6. Hu, Z., Li, B.: Fundamental performance limits of wireless sensor networks. In: Xian, Y., Pan, Y. (eds.) To appear in Ad Hoc and Sensor Networks. Nova Science Publishers, Bombay (2004)

    Google Scholar 

  7. Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: International Conference on System Sciences (January 2000)

    Google Scholar 

  8. Kochal, M., Schwiebert, L., Gupta, S.: Role-based Hierarchical Self Organization for Wireless Ad hoc Sensor Networks. In: Proc. ACM WSNA 2003, pp. 98–107 (2003)

    Google Scholar 

  9. Reason, J., Rabaey, J.: A study of energy consumption and reliability in a multi-hop sensor network. ACM SIGMOBILE Mobile Computing and Communications Review 8(1), 84–97 (2004)

    Article  Google Scholar 

  10. Wang, X., Gu, W., Schosek, K., Chellappan, S., Xuan, D.: Sensor Network Configura-tion under Physical Attacks, Tech. Report (OSU-CISRC-7/04-TR45), Department of CSE, The Ohio State University (November 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, X., Gu, W., Schosek, K., Chellappan, S., Xuan, D. (2005). Sensor Network Configuration Under Physical Attacks. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_5

Download citation

  • DOI: https://doi.org/10.1007/11534310_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28102-3

  • Online ISBN: 978-3-540-31868-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics