Blocking Vulnerable Paths of Wireless Sensor Networks

被引:0
|
作者
Zhou, Shu [1 ]
Wu, Min-You [2 ]
Shu, Wei [1 ]
机构
[1] Univ New Mexico, Albuquerque, NM 87131 USA
[2] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this work, we study the topology enhancement problem of wireless sensor networks. Our research focuses on reducing the path-based vulnerability. The objective is to get as much information as possible for any target moving out of the surveillance area. We study intelligent targets that have the knowledge of existing sensor distribution. Under such assumption, we find the vulnerable paths that rational targets would like to take and block these paths to enhance the network detection performance. Simulation shows that by adding only a few numbers of new sensors on specific positions, we can greatly decrease the vulnerability of a randomly deployed sensor network.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Coverage and exposure paths in wireless sensor networks
    Huang, Liu-Sheng
    Xu, Hong-Li
    Wang, Yang
    Wu, Jun-Min
    Li, Hong
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2006, 21 (04) : 490 - 495
  • [2] Coverage and Exposure Paths in Wireless Sensor Networks
    Liu-Sheng Huang
    Hong-Li Xu
    Yang Wang
    Jun-Min Wu
    Hong Li
    Journal of Computer Science and Technology, 2006, 21 : 490 - 495
  • [3] Study on blind paths in wireless sensor networks
    Han Peng
    Chen Xun
    Chen Haiguang
    Gao Chuanshan
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1101 - 1104
  • [4] Mitigating False Blocking Problem in Wireless Sensor Networks
    Kheong, Chong Wai
    Drieberg, Micheal
    Jeoti, Varun
    2012 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT AND ADVANCED SYSTEMS (ICIAS), VOLS 1-2, 2012, : 253 - 258
  • [5] Finding sensing coverage and breach paths in wireless sensor networks
    Onur, E
    Ersoy, C
    Deliç, H
    PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, : 692 - 695
  • [6] A localized algorithm for finding disjoint paths in wireless sensor networks
    Hou, Ronghui
    Shi, Haoshan
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (12) : 807 - 809
  • [7] An adaptive multi-paths algorithm for wireless sensor networks
    Wu, Zhendong
    Li, Shanping
    EMBEDDED SOFTWARE AND SYSTEMS, PROCEEDINGS, 2007, 4523 : 686 - +
  • [8] Worst and best information exposure paths in wireless sensor networks
    Wang, B
    Chua, KC
    Wang, W
    Srinivasan, V
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 52 - 62
  • [9] Finding sensing coverage and breach paths in surveillance wireless sensor networks
    Onur, E
    Ersoy, C
    Deliç, H
    2004 IEEE 15TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 984 - 988
  • [10] Tree-based modelling of redundancy and paths in wireless sensor networks
    Boucetta C.
    Idoudi H.
    Azouz Saidane L.
    Elbiaze H.
    International Journal of Information and Communication Technology, 2016, 8 (2-3) : 212 - 234