By Topic

Topology Control for Secured Coverage in Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Zhen Jiang ; Computer Sci. Dept., West Chester University, West Chester, PA 19383, USA, zjiang@wcupa.edu ; Jie Wu ; Afrand Agah ; Bin Lu

In this paper, we present a new control method that makes some node adjustments in local areas in an effort to cover the "holes" in wireless sensor networks. Many security applications often face the problem of holes when some sensor nodes are disabled from the collaboration due to their failures and misbehavior. Affected by malicious attacks, these holes may occur dynamically and such a problem cannot be solved completely by simply deploying more redundant sensors. We propose a snake-like cascading replacement process in a local area in order to fill in the vacant area with trusted nodes. Only 1-hop neighborhood is used in our approach. Its implementations under both a passive model and an active model are discussed. The simulation results of our new control method show substantial improvements in total moving distance, total number of moves, and process converging speeds, compared with the best result known to date.

Published in:

2007 IEEE International Conference on Mobile Adhoc and Sensor Systems

Date of Conference:

8-11 Oct. 2007