Skip to main content

Layered Negotiation-Based Self-protection for Wireless Sensor Networks

  • Conference paper
  • First Online:
  • 1267 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 501))

Abstract

Wireless sensor networks may be destroyed by targets in field surveillance. Self-protection technology focuses on using sensor nodes to protect themselves so as to resist attacks. Selecting protecting nodes has been proved to be a NP-complete problem. In this paper, we propose a new distributed layered negotiation based approximation algorithm to find a protecting set using local topology information. Experimental result manifests the feasibility and efficiency of our algorithms proposed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Raymond, D.R., Midkiff, S.F.: Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)

    Article  Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  3. Chin, T., Clouqueur, T., Ramanathan, P., Saluja, K.K.: Vulnerability of surveillance networks to faults. Int. J. Distrib. Sens. Netw. 3, 289–311 (2006)

    Article  Google Scholar 

  4. Ma, J., Lou, W., Wu, Y., Li, M.: Energy efficient TDMA sleep scheduling in wireless sensor networks. In: IEEE INFOCOM 2009, pp. 630–638

    Google Scholar 

  5. Wang, D., Zhang, Q., Liu, J.: Self-protection for wireless sensor networks. In: Proceedings of 26th IEEE Inter national Conference on Distributed Computing Systems (ICDCS) (2006)

    Google Scholar 

  6. Wang, Y., Li, X., Zhang, Q.: Efficient algorithms for the p-self-protection problem in static wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 19(10), 1426–1438 (2008)

    Article  Google Scholar 

  7. Cheng, J., Zhang, W., Yang, J.: Local optimum algorithms for self-protection in wireless sensor networks. In: Proceedings of the 5th IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MSN), December 2009

    Google Scholar 

  8. Harutyunyan, L., Narayanan, L.: Minimum 2-connected distance-k p-dominating set in wireless sensor networks. In: IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1–6 (2012)

    Google Scholar 

  9. Dong, D., Liao, X., Liu, Y., Shen, C.: Edge self-monitoring for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(3), 514–527 (2011)

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported in part by the National Science Foundation of China (No. 61070169) and Natural Science Research Plan of Jiangsu Province College (No. 10KJB520017).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenzhe Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, W. (2015). Layered Negotiation-Based Self-protection for Wireless Sensor Networks. In: Sun, L., Ma, H., Fang, D., Niu, J., Wang, W. (eds) Advances in Wireless Sensor Networks. CWSN 2014. Communications in Computer and Information Science, vol 501. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46981-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46981-1_29

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46980-4

  • Online ISBN: 978-3-662-46981-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics