Skip to main content

The Mobile Sensor Network Life-Time under Different Spurious Flows Intrusion

  • Conference paper
Internet of Things, Smart Spaces, and Next Generation Networking (ruSMART 2013, NEW2AN 2013)

Abstract

The network-based security defined by International Telecommunication Union (ITU) has specific features for Ubiquitous Sensor Networks (USN). An enormous number of sensor nodes and hard energy constraints define specific network-based security features of USNs. The network-based security features of USNs are considered based on ITU-T Recommendation X.1311. A new type of attacks on the energy system of a USN is proposed, which is based on the spurious flows generation. The sensor nodes respond to the spurious flows and the sensor network life-time decreases. The mobile sensor network behavior in case of spurious flows intrusion is investigated in the paper. A homogenous mobile sensor network and the LEACH-M cluster head selection algorithm are used in this study. The effect of Poisson and deterministic spurious flows intrusion is investigated. The sensor node moving speed influence on the sensor network life-time is analyzed too.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Recommendation Y.2701. Security Requirements for NGN release 1. ITU-T, Geneva (April 2007)

    Google Scholar 

  2. Recommendation Y. 2012. Functional requirements and architecture of the NGN. ITU (2010)

    Google Scholar 

  3. Recommendation X.1311 Security Framework for Ubiquitous Sensor Networks. ITU-T, Geneva (February 2011)

    Google Scholar 

  4. www.zigbee.org

  5. Younis, O., Fahmy, S.: Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach. In: Proceedings, IEEE INFOCOM, Hong Kong, China (2004)

    Google Scholar 

  6. Andreev, S., Galinina, O., Koucheryavy, Y.: Energy-Efficient Client Relay Scheme for Machine-to-Machine Communication. In: IEEE Globecom 2011, Houston, TX, USA,

    Google Scholar 

  7. Aziz, A., Salim, A., Osamy, W.: Adaptive and Efficient Compressive Sensing based Technique for Routing in Wireless Sensor Networks. In: Proceedings, INTHITEN (IoT and its Enablers) Conference, June 3-4, St.Petersburg, State University of Telecommunication (2013)

    Google Scholar 

  8. Koucheryavy, A., Salim, A.: Prediction-based Clustering Algorithm for Mobile Wireless Sensor Networks. In: Proceedings, International Conference on Advanced Communication Technology, ICACT 2010, Phoenix Park, Korea (2010)

    Google Scholar 

  9. Bhattasali, T., Chaki, R.: A survey of recent intrusion detection systems for wireless sensor network. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) CNSA 2011. CCIS, vol. 196, pp. 268–280. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  10. Bhattassali, T., Chaki, R., Sanyal, S.: Sleep Deprivation Attack Detection in Wireless Sensor Networks. International Journal of Computer Applications 40(15) (February 2012)

    Google Scholar 

  11. Sorensen, L., Skouby, K.E.: Use scenarios 2020 – a worldwide wireless future. Visions and research directions for the Wireless World. Outlook. Wireless World Research Forum. 4 (July 2009)

    Google Scholar 

  12. Recommendation Y.2062. Framework of object-to-object communication using ubiquitous networking in NGN. ITU-T, Geneva (February 2012)

    Google Scholar 

  13. Kim, B.-T.: Broadband convergence Network (BcN) for Ubiquitous Korea Vision. In: Proceedings of the 7th International Conference on Advanced Communication Technology, ICACT 2005, Phoenix Park, Korea, February 21-23 (2005)

    Google Scholar 

  14. Marrocco, G.: Pervasive Electromagnetics: Sensing Paradigms by Passive RFID Technology. IEEE Wireless Communications 17(6) (December 2010)

    Google Scholar 

  15. Gorlatova, M., et al.: Energy Harvesting Active Networked Tags (EnHants) for Ubiquitous Object Networking. IEEE Wireless Communications 17(6) (December 2010)

    Google Scholar 

  16. Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings 33rd Hawaii International Conference on System Sciences (HICSS), Wailea Maui, Hawaii, USA (January 2000)

    Google Scholar 

  17. Kim, D., Chung, Y.: Self-Organization Routing Protocol Supporting Mobile Nodes for Wireless Sensor Network. In: Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences, vol. 2 (2006)

    Google Scholar 

  18. Koucheryavy, A., Salim, A.: Cluster head selection for homogeneous Wireless Sensor Networks. In: Proceedings of the International Conference on Advanced Communication Technology, ICACT 2009, Phoenix Park, Korea (2009)

    Google Scholar 

  19. Moltchanov, D., Koucheryavy, Y., Harju, J.: Performance response of wireless channels for quantitatively different loss and arrival statistics. Performance Evaluation 67(1), 1–27 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koucheryavy, A., Bogdanov, I., Paramonov, A. (2013). The Mobile Sensor Network Life-Time under Different Spurious Flows Intrusion. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networking. ruSMART NEW2AN 2013 2013. Lecture Notes in Computer Science, vol 8121. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40316-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40316-3_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40315-6

  • Online ISBN: 978-3-642-40316-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics