Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Network Resilience in Low-Resource Mobile Wireless Sensor Networks

  • Conference paper
Security and Privacy in Mobile Information and Communication Systems (MobiSec 2010)

Abstract

Wireless sensor networks (WSNs) are deployed in numerous mission critical applications in which the network needs to remain active for as long as possible while delivering quality information to a base station. However, WSNs suffer from a wide range of attacks due to their limited processing and energy capabilities. Their resiliency, however, depends on fast recovery from such attacks being achieved. In recent work, the authors developed and implemented clustering, reprogramming and authentication protocols involved in recovering stationary WSNs with low resources. In this paper, we determine the additional resources required in implementing these protocols in a mobile WSN.

We present recovery protocols on TinyOS motes for a low-resourced, mobile deployment. We describe the issues we encountered in the implementation. We present times, RAM and ROM needed to run the recovery protocols and compare these with the stationary case, demonstrating that the additional cost of reprogramming in a mobile WSN is less than 25% of that in a stationary WSN and the additional cost of re-clustering in a mobile WSN is less than 9% of that in a stationary WSN. Authentication has an insignificant cost increase.

Suported by NSST grant 070030.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Li, B., Doss, R., Batten, L., Schott, W.: Fast Recovery from Node Compromise in Wireless Sensor Networks. In: NTMS 2009, pp. 186–191 (2009)

    Google Scholar 

  2. Li, M., Liu, Y.: Underground structure monitoring with wireless sensor networks. In: IPSN 2007, Cambridge, Mass., pp. 69–78 (2007)

    Google Scholar 

  3. Johnson, D.: Routing in ad hoc networks of mobile hosts. In: Proceedings of Mobile Computing Systems and Applications, pp. 158–163. IEEE Computer Society, Los Alamitos (1994)

    Google Scholar 

  4. Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, ch. 5, vol. 353, pp. 153–181. Kluwer Academic Publishers, Dordrecht (1996)

    Chapter  Google Scholar 

  5. Wang, Q., Zhu, Y., Cheng, L.: Reprogramming wireless sensor networks: Challenges and approaches. IEEE Network Magazine 20(3), 48–55 (2006)

    Article  Google Scholar 

  6. Kansal, A., Kaiser, W., Pottie, G., Srivastava, M., Sukhatme, G.: Reconfiguration methods for mobile sensor networks. ACM Transactions on Sensor networks 3, Article 22, 1–28 (2007)

    Article  Google Scholar 

  7. Zou, Y., Chakrabarty, K.: Distributed mobility management for target tracking in mobile sensor networks. IEEE Transactions on Mobile Computing 6, 872–887 (2007)

    Article  Google Scholar 

  8. Eriksson, K., Girod, L., Hull, B., Newton, R., Madden, S., Balakrishnan, H.: The pothole patrol: using a mobile sensor network for road surface monitoring. In: Proceedings of MobiSys 2008, Colorado, pp. 29–39 (2008)

    Google Scholar 

  9. Alparslan, D., Sohraby, K.: A generalized random mobility model for wireless and ad hoc networks and its analysis: one-dimensional case. IEEE/ACM Transactions on Networking 15, 602–615 (2007)

    Article  Google Scholar 

  10. Hyytia, E., Virtamo, J.: Random waypoint mobility model in cellular networks. Wireless Networks 13, 177–188 (2007)

    Article  Google Scholar 

  11. Hu, L., Evans, D.: Localization for mobile sensor networks. In: Proceedings of MobiCom 2004, Pennsylvania, pp. 45–57 (2004)

    Google Scholar 

  12. Ma, M., Yang, Y.: Adaptive triangular deployment algorithm for unattended mobile sensor networks. In: Prasanna, V.K., Iyengar, S.S., Spirakis, P.G., Welsh, M. (eds.) DCOSS 2005. LNCS, vol. 3560, pp. 20–34. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Wu, J.: An enhanced approach to determine a small forward node set based on multipoint relay. In: Proc. IEEE Conference VTC 2003, pp. 2774–2777 (2003)

    Google Scholar 

  14. Wu, J., Lou, W., Dai, F.: Extended multipoint relays to determine connected dominating sets in MANETs. In: Proceedings of IEEE SECON 2004, vol. 55, pp. 334–347 (2004)

    Google Scholar 

  15. Hu, L., Li, Y., Chen, Q., Liu, J., Long, K.: A New Energy-Aware Routing Protocol for Wireless Sensor Networks. In: Proceedings of WiCom 2007, pp. 2444–2447 (2007)

    Google Scholar 

  16. National Institute of Standards and Technology: ‘Secure hash standard’, FIPS Publication 180–2. 32 pages (2002)

    Google Scholar 

  17. Rabin, M.: Digitalized Signatures and Public-Key Functions as Intractable as Factorization. MIT Laboratory for Computer Science, 16 pages (January 1979)

    Google Scholar 

  18. Shamir, A.: SQUASH – A new MAC with provable security properties for highly constrained devices such as RFID tags. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 144–157. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Li, B., Batten, L.M., Doss, R. (2010). Network Resilience in Low-Resource Mobile Wireless Sensor Networks. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 47. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17502-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17502-2_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17501-5

  • Online ISBN: 978-3-642-17502-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics