Abstract
Wireless sensor networks (WSNs) are deployed in numerous mission critical applications in which the network needs to remain active for as long as possible while delivering quality information to a base station. However, WSNs suffer from a wide range of attacks due to their limited processing and energy capabilities. Their resiliency, however, depends on fast recovery from such attacks being achieved. In recent work, the authors developed and implemented clustering, reprogramming and authentication protocols involved in recovering stationary WSNs with low resources. In this paper, we determine the additional resources required in implementing these protocols in a mobile WSN.
We present recovery protocols on TinyOS motes for a low-resourced, mobile deployment. We describe the issues we encountered in the implementation. We present times, RAM and ROM needed to run the recovery protocols and compare these with the stationary case, demonstrating that the additional cost of reprogramming in a mobile WSN is less than 25% of that in a stationary WSN and the additional cost of re-clustering in a mobile WSN is less than 9% of that in a stationary WSN. Authentication has an insignificant cost increase.
Suported by NSST grant 070030.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Li, B., Doss, R., Batten, L., Schott, W.: Fast Recovery from Node Compromise in Wireless Sensor Networks. In: NTMS 2009, pp. 186–191 (2009)
Li, M., Liu, Y.: Underground structure monitoring with wireless sensor networks. In: IPSN 2007, Cambridge, Mass., pp. 69–78 (2007)
Johnson, D.: Routing in ad hoc networks of mobile hosts. In: Proceedings of Mobile Computing Systems and Applications, pp. 158–163. IEEE Computer Society, Los Alamitos (1994)
Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, ch. 5, vol. 353, pp. 153–181. Kluwer Academic Publishers, Dordrecht (1996)
Wang, Q., Zhu, Y., Cheng, L.: Reprogramming wireless sensor networks: Challenges and approaches. IEEE Network Magazine 20(3), 48–55 (2006)
Kansal, A., Kaiser, W., Pottie, G., Srivastava, M., Sukhatme, G.: Reconfiguration methods for mobile sensor networks. ACM Transactions on Sensor networks 3, Article 22, 1–28 (2007)
Zou, Y., Chakrabarty, K.: Distributed mobility management for target tracking in mobile sensor networks. IEEE Transactions on Mobile Computing 6, 872–887 (2007)
Eriksson, K., Girod, L., Hull, B., Newton, R., Madden, S., Balakrishnan, H.: The pothole patrol: using a mobile sensor network for road surface monitoring. In: Proceedings of MobiSys 2008, Colorado, pp. 29–39 (2008)
Alparslan, D., Sohraby, K.: A generalized random mobility model for wireless and ad hoc networks and its analysis: one-dimensional case. IEEE/ACM Transactions on Networking 15, 602–615 (2007)
Hyytia, E., Virtamo, J.: Random waypoint mobility model in cellular networks. Wireless Networks 13, 177–188 (2007)
Hu, L., Evans, D.: Localization for mobile sensor networks. In: Proceedings of MobiCom 2004, Pennsylvania, pp. 45–57 (2004)
Ma, M., Yang, Y.: Adaptive triangular deployment algorithm for unattended mobile sensor networks. In: Prasanna, V.K., Iyengar, S.S., Spirakis, P.G., Welsh, M. (eds.) DCOSS 2005. LNCS, vol. 3560, pp. 20–34. Springer, Heidelberg (2005)
Wu, J.: An enhanced approach to determine a small forward node set based on multipoint relay. In: Proc. IEEE Conference VTC 2003, pp. 2774–2777 (2003)
Wu, J., Lou, W., Dai, F.: Extended multipoint relays to determine connected dominating sets in MANETs. In: Proceedings of IEEE SECON 2004, vol. 55, pp. 334–347 (2004)
Hu, L., Li, Y., Chen, Q., Liu, J., Long, K.: A New Energy-Aware Routing Protocol for Wireless Sensor Networks. In: Proceedings of WiCom 2007, pp. 2444–2447 (2007)
National Institute of Standards and Technology: ‘Secure hash standard’, FIPS Publication 180–2. 32 pages (2002)
Rabin, M.: Digitalized Signatures and Public-Key Functions as Intractable as Factorization. MIT Laboratory for Computer Science, 16 pages (January 1979)
Shamir, A.: SQUASH – A new MAC with provable security properties for highly constrained devices such as RFID tags. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 144–157. Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Li, B., Batten, L.M., Doss, R. (2010). Network Resilience in Low-Resource Mobile Wireless Sensor Networks. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 47. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17502-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-17502-2_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17501-5
Online ISBN: 978-3-642-17502-2
eBook Packages: Computer ScienceComputer Science (R0)