By Topic

Secure Coverage Control in Wireless Sensor Networks with Malicious Nodes Using Multi-agents

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Phuphanin, A. ; Sch. of Telecommun. Eng., Suranaree Univ. of Technol., NakhonRatchasima, Thailand ; Usaha, W.

In this paper, a multi-agent coverage control scheme in wireless sensor networks called the Distributed Value Function was integrated with a secure Topology Maintenance Protocol (DVF+TMP). The objective was to achieve a coverage control scheme which maximizes the coverage per unit energy consumed and countermeasures sleep deprivation, snooze and network substitution attacks in WSNs. Simulation results showed that our algorithm was more resilient by consistently attaining higher coverage per unit energy consumed, and achieving up to 75% and 10% of coverage greater than the original DVF algorithm under sleep deprivation and snooze attacks, respectively. Furthermore, the network substitution attack was studied where inaccurate information was exchanged between nodes. The proposed algorithm gained up to 12%, 25% and 8% of coverage than the DVF algorithm for the normal, sleep deprivation and snooze attack, respectively. The proposed algorithm also consistently achieved more average reward per unit energy consumed than the existing algorithm.

Published in:

Embedded and Ubiquitous Computing (EUC), 2011 IFIP 9th International Conference on

Date of Conference:

24-26 Oct. 2011