Abstract
Wireless sensor networks may be destroyed by targets in field surveillance. Self-protection technology focuses on using sensor nodes to protect themselves so as to resist attacks. Selecting protecting nodes has been proved to be a NP-complete problem. In this paper, we propose a new distributed layered negotiation based approximation algorithm to find a protecting set using local topology information. Experimental result manifests the feasibility and efficiency of our algorithms proposed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Raymond, D.R., Midkiff, S.F.: Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Chin, T., Clouqueur, T., Ramanathan, P., Saluja, K.K.: Vulnerability of surveillance networks to faults. Int. J. Distrib. Sens. Netw. 3, 289–311 (2006)
Ma, J., Lou, W., Wu, Y., Li, M.: Energy efficient TDMA sleep scheduling in wireless sensor networks. In: IEEE INFOCOM 2009, pp. 630–638
Wang, D., Zhang, Q., Liu, J.: Self-protection for wireless sensor networks. In: Proceedings of 26th IEEE Inter national Conference on Distributed Computing Systems (ICDCS) (2006)
Wang, Y., Li, X., Zhang, Q.: Efficient algorithms for the p-self-protection problem in static wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 19(10), 1426–1438 (2008)
Cheng, J., Zhang, W., Yang, J.: Local optimum algorithms for self-protection in wireless sensor networks. In: Proceedings of the 5th IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MSN), December 2009
Harutyunyan, L., Narayanan, L.: Minimum 2-connected distance-k p-dominating set in wireless sensor networks. In: IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1–6 (2012)
Dong, D., Liao, X., Liu, Y., Shen, C.: Edge self-monitoring for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(3), 514–527 (2011)
Acknowledgment
This work is supported in part by the National Science Foundation of China (No. 61070169) and Natural Science Research Plan of Jiangsu Province College (No. 10KJB520017).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, W. (2015). Layered Negotiation-Based Self-protection for Wireless Sensor Networks. In: Sun, L., Ma, H., Fang, D., Niu, J., Wang, W. (eds) Advances in Wireless Sensor Networks. CWSN 2014. Communications in Computer and Information Science, vol 501. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46981-1_29
Download citation
DOI: https://doi.org/10.1007/978-3-662-46981-1_29
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-46980-4
Online ISBN: 978-3-662-46981-1
eBook Packages: Computer ScienceComputer Science (R0)