Blocking Vulnerable Paths of Wireless Sensor Networks

被引:0
|
作者
Zhou, Shu [1 ]
Wu, Min-You [2 ]
Shu, Wei [1 ]
机构
[1] Univ New Mexico, Albuquerque, NM 87131 USA
[2] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this work, we study the topology enhancement problem of wireless sensor networks. Our research focuses on reducing the path-based vulnerability. The objective is to get as much information as possible for any target moving out of the surveillance area. We study intelligent targets that have the knowledge of existing sensor distribution. Under such assumption, we find the vulnerable paths that rational targets would like to take and block these paths to enhance the network detection performance. Simulation shows that by adding only a few numbers of new sensors on specific positions, we can greatly decrease the vulnerability of a randomly deployed sensor network.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] An Energy-efficient Multiple Paths Routing Algorithm for Wireless Sensor Networks
    Cai, Kang
    Xiong, Shangkun
    Shi, Jinglun
    Wei, Gang
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1688 - +
  • [22] Sink Location Service Based on Circle and Line Paths in Wireless Sensor Networks
    Lee, Euisin
    Yu, Fucai
    Park, Soochang
    Kim, Sang-Ha
    IEEE COMMUNICATIONS LETTERS, 2010, 14 (08) : 710 - 712
  • [23] Energy-constrained paths for optimization of energy consumption in Wireless Sensor Networks
    Hoang, Doan B.
    Kamyabpour, Najmeh
    2013 FOURTH INTERNATIONAL CONFERENCE ON NETWORKING AND DISTRIBUTED COMPUTING (ICNDC), 2013, : 9 - 13
  • [24] Blocking Avoidance in Wireless Networks
    Zhou, Shanyu
    Seferoglu, Hulya
    Koyuncu, Erdem
    2016 INFORMATION THEORY AND APPLICATIONS WORKSHOP (ITA), 2016,
  • [25] Wireless Sensor Networks (WSNs) The Shortcomings of Wireless Sensor Networks
    Pinar, Yasaroglu
    Zuhair, Abduljabbar
    Hamad, Alotaibi
    Resit, Akcam
    Shiva, Kadavarthi
    Omar, Abuzaghleh
    2016 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2016,
  • [26] Detection quality of border surveillance wireless sensor networks in the existence of trespassers' favorite paths
    Komar, Can
    Donmez, Mehmet Yunus
    Ersoy, Cem
    COMPUTER COMMUNICATIONS, 2012, 35 (10) : 1185 - 1199
  • [27] Best and worst-case coverage problems for arbitrary paths in wireless sensor networks
    Lee, Chunseok
    Shin, Donghoon
    Bae, Sang Won
    Choi, Sunghee
    AD HOC NETWORKS, 2013, 11 (06) : 1699 - 1714
  • [28] Finding breach paths using the watershed segmentation algorithm in surveillance wireless sensor networks
    Onur, E
    Ersoy, C
    Deliç, H
    Akarun, L
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2004, PROCEEDINGS, 2004, 3280 : 363 - 372
  • [29] DFDP: A Distributed Algorithm for Finding Disjoint Paths in Wireless Sensor Networks with Correctness Guarantee
    Zhang, Kejia
    Yin, Guisheng
    Han, Qilong
    Lin, Junyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [30] A Potential Field Approach to Finding Minimum-Exposure Paths in Wireless Sensor Networks
    Ferrari, S.
    Foderaro, G.
    2010 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA), 2010, : 335 - 341