preview

Comparision Of P Self Protection Problem Algorithms For Static Wireless Sensor Networks

Decent Essays

Comparision of p-self Protection Problem Algorithms for Static Wireless Sensor Networks Nikitha Gullapalli
Graduate Student, Dept. of Computer Science and Engineering, University of South Florida nikitha@mail.usf.edu Abstract — Wireless sensor networks are being widely used in many surveillance applications. Since sensor nodes are a critical part of sensor networks, certain level of protection needs to be provided to them. The self-protection problem focuses on using sensor nodes to provide protection to themselves instead of the target objects or certain target area so that the sensor nodes can resists the attacks targeting to them directly. In this paper we compare paper [1] and paper [2]. The key research question being asked, how …show more content…

KEY RESEARCH QUESTIONS
1. How to determine the minimum set of sensors for covering problems of sensor networks?
Efficient centralized and distributed algorithms with constant approximation ratio for the minimum p-self-protection problem in sensor networks when all sensors have the same sensing radius.
2. Is finding minimum 1-self-protection a NP-complete?
Yes, it is proved that finding minimum 1-self-protection is NP-complete by reducing the minimum set cover problem.
3. If MIS is selected to provide certain protection to nodes, what happens after some rounds when it already has p-protections?
Purpose of selecting MIS is to provide certain protections to nodes that are not selected into the MIS. However, this may not be necessary after some rounds for some nodes when it already has p protections from selected active nodes Thus, for each node u, we again use p(u) to denote the protection level (i.e., the number of active sensors that can sense this node) that it already has achieved via previously activated sensors from MIS’s.
4. Is there a smarter way to select the nodes instead of randomly?
Instead of random selection of a sensor to cover each active sensor in MIS, we can use a smarter method to select the nodes to protect the MIS nodes with less than p protectors in the last steps of our algorithm.
5. As each sensor has limited power and resources, how to balance the energy consumption?
To balance the energy consumption, one simple method proposed in this paper is

Get Access