Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Research on Redundant Channel Model Based on Spatial Correlation in IOT

  • Conference paper
Trustworthy Computing and Services (ISCTCS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 320))

Included in the following conference series:

  • 3206 Accesses

Abstract

With the widely discussion of IOT (Internet of Things) in many applications recently, more and more attentions have been paid to the security of its security. In this paper, we present a redundant channel model based on spatial correlation in IOT. The proposed model is mainly for attacks which could increase the traffic of the network such as DDos. Firstly, redundant channel is introduced systematically, including the spatial correlation. Then, a control mechanism is put forward for the model. A Matlab simulation is performed to test the availability of the model at last. And the results verify that this model is feasible to a certain degree.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Clouqueur, T., Phipatanasuphorn, V., Ramanathan, P., Saluja, K.: Sensor deployment strategy for target detection. In: Proceedings of the ACM WSNA 2002, Atlanta, USA (September 2002)

    Google Scholar 

  2. Meguerdichian, S., Koushanfar, F., Potkonjak, M., Srivastava, M.B.: Coverage problems in wireless ad-hoc sensor networks. In: Proceedings of the IEEE INFOCOM 2001, Anchorage, AK (April 2001)

    Google Scholar 

  3. Berger, J.O., de Oliviera, V., Sanso, B.: Objective Bayesian analysis of spatially correlated data. Journal of the American Statistical Association 96, 1361–1374 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  4. Li, N., Liu, Y., Wu, F., Tang, B.: WSN Data Distortion Analysis and Correlation Model Based on Spatial Locations. Journal of Networks 5 (December 2010)

    Google Scholar 

  5. Song, J.-G., Jung, S., Kim, J.H., Seo, D.I., Kim, S.: Research on a Denial of Service (DoS) Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment. Sensors 10, 10376–10386 (2010)

    Article  Google Scholar 

  6. Guo, W., Zhai, L., Guo, L., Shi, J.: Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network. In: Wang, H., Zou, L., Huang, G., He, J., Pang, C., Zhang, H.L., Zhao, D., Yi, Z. (eds.) APWeb 2012 Workshops. LNCS, vol. 7234, pp. 68–77. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Hossain, A., Biswas, P.K., Chakrabarti, S.: Sensing Models and Its Impact on Network Coverage in Wireless Sensor Network. In: IEEE Region 10 and the Third International Conference on Industrial and Information Systems (ICIIS 2008), Kharagpur, December 8-10, pp. 1–5 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, F., Guo, W., Yang, J., Yuan, F., Zhai, L. (2013). Research on Redundant Channel Model Based on Spatial Correlation in IOT. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_84

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35795-4_84

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35794-7

  • Online ISBN: 978-3-642-35795-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics