Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1950654.1950660guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

On supporting distributed collaboration in sensor networks

Published: 13 October 2003 Publication History

Abstract

In sensor networks, nodes may malfunction due to the hostile environment. Therefore, dealing with node failure is a very important research issue. In this paper, we study distributed cooperative failure detection techniques. In the proposed techniques, the nodes around a suspected node collaborate with each other to reach an agreement on whether the suspect is faulty or malicious. We first formalize the problem as how to construct a dominating tree to cover all the neighbors of the suspect and give the lower bound of the message complexity. Two tree-based propagation collection protocols are proposed to construct dominating trees and collect information via the tree structure. Instead of using the traditional flooding technique, we propose a coverage-based heuristic to improve the system performance. Theoretical analysis and simulation results show that the heuristic can help achieve a higher tree coverage with lower message complexity, lower delay and lower energy consumption.

References

[1]
C. Intanagonwiwat, R. Govindan and D. Estrin, "Directed Diffusion: A Scalable and Robust Communication," MobiCOM '00, August 2000.
[2]
I. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "Wireless Sensor Networks: A Survey," Computer Networks, March 2002.
[3]
B. Krishnamachari, D. Estrin and S. Wicker, "Modelling Data-Centric Routing in Wireless Sensor Networks," IEEE INFOCOM' 02, June 2002.
[4]
N. Bulusu, D. Estrin, L. Girod and J. Heidemann, "Scalable Coordination for Wireless Sensor Networks: Self-Configuring Localization Systems," ISCTA 2001, July 2001.
[5]
P. Chew and K. Marzullo, "Masking Failures of Multidimensional Sensors," Proc. of the 10th Symposium on Reliable Distributed Systems (SRDS'91), pp. 32-41, 1991.
[6]
B. Clark, C. Colbourn and D. Johnson, "Unit Disk graphs," Discrete Mathematics, pp. 165-177, 1990.
[7]
W. R. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor network," Proc. of the Hawaii International Conference on System Sciences, January 2000.
[8]
D. Jayasimha, "Fault Tolerance in a Multisensor Environment," Proc. of the 13th Symposium on Reliable Distributed Systems (SRDS'94), October 1994.
[9]
S. Marti, T. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," ACM MobiCom, Aug. 2000.
[10]
K. Marzullo, "Tolerating Failures of Continuous-valued Sensors," ACM Transactions on Computer Systems, November 1990.
[11]
D. Nicules and B. Nath, "Ad-hoc Positioning System using AoA," IEEE INFOCOM, 2003.
[12]
S. Ni, Y. Tseng, Y. Chen and J. Sheu, "The Broadcast Storm Problem in a Mobile Ad Hoc Network," ACM Mobicom, 1999.
[13]
T. S. Rappaport, "Wireless communications: principles and practice," 1996.
[14]
C. Shen, "Diagnosis of Sensor Networks," IEEE International Conference on Communications (ICC'01), June 2001.
[15]
Y. Xu, J. Heidemann and D. Estrin, "Geography Informed Energy Conservation for Ad Hoc Routing," ACM MOBICOM'01, July 2001.
[16]
W. Ye, J. Heidemann and D. Estrin, "An Energy-Efficient MAC Protocol for Wireless Sensor Networks," IEEE INFOCOM'02, June 2002.

Cited By

View all
  • (2018)Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4962-098:2(2037-2077)Online publication date: 1-Jan-2018
  • (2014)Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless NetworksACM Transactions on Sensor Networks10.1145/259477410:3(1-37)Online publication date: 6-May-2014
  • (2011)EDDKEURASIP Journal on Wireless Communications and Networking10.1155/2011/7651432011(1-11)Online publication date: 1-Jan-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
MILCOM'03: Proceedings of the 2003 IEEE conference on Military communications - Volume II
October 2003
727 pages
ISBN:0780381408

Publisher

IEEE Computer Society

United States

Publication History

Published: 13 October 2003

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4962-098:2(2037-2077)Online publication date: 1-Jan-2018
  • (2014)Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless NetworksACM Transactions on Sensor Networks10.1145/259477410:3(1-37)Online publication date: 6-May-2014
  • (2011)EDDKEURASIP Journal on Wireless Communications and Networking10.1155/2011/7651432011(1-11)Online publication date: 1-Jan-2011
  • (2011)Designing an efficient PCA based data model for wireless sensor networksProceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief10.1145/2185216.2185262(147-154)Online publication date: 18-Dec-2011
  • (2010)Improving robustness in an autonomous local sensor networkProceedings of the 7th IEEE conference on Consumer communications and networking conference10.5555/1834217.1834237(98-102)Online publication date: 9-Jan-2010
  • (2010)An authentication scheme for locating compromised sensor nodes in WSNsJournal of Network and Computer Applications10.1016/j.jnca.2009.06.00333:1(50-62)Online publication date: 1-Jan-2010
  • (2010)A note-based randomized and distributed protocol for detecting node replication attacks in wireless sensor networksProceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I10.1007/978-3-642-13119-6_49(559-570)Online publication date: 21-May-2010
  • (2009)Efficient detection of compromised nodes in a wireless sensor networkProceedings of the 2009 Spring Simulation Multiconference10.5555/1639809.1639908(1-5)Online publication date: 22-Mar-2009
  • (2009)Reporter node determination of replicated node detection in wireless sensor networksProceedings of the 3rd International Conference on Ubiquitous Information Management and Communication10.1145/1516241.1516340(566-573)Online publication date: 15-Feb-2009
  • (2009)Online data storage using implicit securityInformation Sciences: an International Journal10.1016/j.ins.2009.05.013179:19(3323-3331)Online publication date: 1-Sep-2009
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media