Comparision of p-self Protection Problem Algorithms for Static Wireless Sensor Networks Nikitha Gullapalli
Graduate Student, Dept. of Computer Science and Engineering, University of South Florida nikitha@mail.usf.edu Abstract — Wireless sensor networks are being widely used in many surveillance applications. Since sensor nodes are a critical part of sensor networks, certain level of protection needs to be provided to them. The self-protection problem focuses on using sensor nodes to provide protection to themselves instead of the target objects or certain target area so that the sensor nodes can resists the attacks targeting to them directly. In this paper we compare paper [1] and paper [2]. The key research question being asked, how
…show more content…
KEY RESEARCH QUESTIONS
1. How to determine the minimum set of sensors for covering problems of sensor networks?
Efficient centralized and distributed algorithms with constant approximation ratio for the minimum p-self-protection problem in sensor networks when all sensors have the same sensing radius.
2. Is finding minimum 1-self-protection a NP-complete?
Yes, it is proved that finding minimum 1-self-protection is NP-complete by reducing the minimum set cover problem.
3. If MIS is selected to provide certain protection to nodes, what happens after some rounds when it already has p-protections?
Purpose of selecting MIS is to provide certain protections to nodes that are not selected into the MIS. However, this may not be necessary after some rounds for some nodes when it already has p protections from selected active nodes Thus, for each node u, we again use p(u) to denote the protection level (i.e., the number of active sensors that can sense this node) that it already has achieved via previously activated sensors from MIS’s.
4. Is there a smarter way to select the nodes instead of randomly?
Instead of random selection of a sensor to cover each active sensor in MIS, we can use a smarter method to select the nodes to protect the MIS nodes with less than p protectors in the last steps of our algorithm.
5. As each sensor has limited power and resources, how to balance the energy consumption?
To balance the energy consumption, one simple method proposed in this paper is
In this section, we present the details of proposed protocol. Our protocol implements the idea of probabilities for cluster heads selection based on initial energy and residual energy of sensor nodes as well as the average energy of the sensor network.
3) Secure data aggregation: Fine grain sensing is one of the important compensation of a wireless sensor network which is provided by the large and dense sets of nodes .So to avoid overwhelming amounts of traffic, the sensed values must be aggregated and the aggregation may take place in many places in the network depending on the architecture of the wireless sensor network. For example, the system may average the temperature of a geographic region, combine sensor values to compute the location and velocity of a moving object, or aggregate data to avoid false alarms in real-world event detection. All aggregation locations must be secured [8].
Though characterizing herself as such, the United States was never absolutely neutral, and in a case like that of the Great War, it is nearly impossible to remain so. President Wilson attempted to boost the United States’ economy while avoiding suffering the consequences of becoming a nation at war. However, such a plan was easily seen through by the belligerents, and the approach actually backfired, as the belligerents began pestering the States about their interactions, and targeting American citizens and property.
In this scene, Raskolnikov takes the first step into redemption with the person who offers him the most hope. In her, he sees his redemptive qualities. When Raskolnikov confesses, he offers a range of reasoning for the comfort of Sonia and to help his mind. It is too difficult for Raskolnikov to accept that he murdered Alyona and her sister for selfish reasons so he has created a whole string of reasons to do it. And Sonia, being the pure and moral person she is, would probably not be so supportive if she realized Raskolnikov murdered the women because he wanted the power and justice he believed was in such an act.
The 2015 Texas legislature passed a bill to allow concealed handgun permit holders to begin carrying their handguns openly. You do not have to conceal your gun like you did in the past. The bill was signed into law on June 13, 2015, and was effect as of January 1, 2016. Handguns should be carried in a hip or shoulder holster when out in the open now. Businesses can in fact say no to guns on their sites, areas that were considered gun-free zones before this bill took effect remain gun-free zones today. If businesses decide to ban guns they have to post signs to let their customers know. Some of the businesses in Texas (and other states) that are banning open-carry include Whataburger, H-E-B, Whole Foods, Randall’s Food Markets, Torchy’s Tacos, Jimmy Changas and Gringo’s Mexican Kitchen. Ariana P Habich/shutterstock.com. www.keranews.org
Fiat money is money that a government declares is legal tender. Fiat refers to the government order. It’s from the Latin, like so many of our legal words, and it means “let it be done.”
Threshold sensitive Energy Efficient sensor Network protocol (TEEN) [31] was the first protocol that was developed for reactive networks. In this protocol, at every cluster change time, in addition to the attributes, the cluster-head broadcasts to its members. It uses two thresholds namely hard and soft thresholds. The hard threshold is a threshold value for the sensed attribute, it is the absolute value of the attribute beyond which, the node senses this value must switch on its transmitter and report to its cluster head. The soft threshold is a minute change in the value of the sensed attribute that triggers the node to switch on its transmitter and transmit. The nodes sense their environment continuously. The first time a parameter from the attribute set reaches its hard threshold value, the node switches on its transmitter and sends the sensed data. The sensed value is stored in an internal variable in the node, known as the sensed value. The nodes will next transmit data in the current cluster period, only when both the following conditions are
With the furtherance of computer networks extending boundaries and joining distant locations, wireless sensor networks (WSN) emerged as the new frontier in developing opportunities in order to collect and process data from remote locations. A wireless sensor network is a collection of nodes organized in a cooperative manner. Multiple sensor nodes arranged in proximity to sense an event and subsequently transmit sensed and collected information to a remote processing unit or base station. The nodes are able to communicate wirelessly and often self-organize after being deployed in an ad hoc fashion. More than 1000s or even 10,000 nodes are expected. Currently, wireless sensor
The remote sensor system is framed by vast number of sensor hubs. Sensor hubs may be homogeneous or heterogeneous. These systems are much conveyed and comprise of numerous number of less cost, less power, less memory and self-arranging sensor hubs. The sensor hubs have the capacity of detecting the temperature, weight, vibration, movement, mugginess, and sound as in and so on. Because of a requirement for heartiness of checking, remote sensor systems (WSN) are normally excess. Information from various sensors is totaled at an aggregator hub which then advances to the base station just the total qualities. Existing framework just concentrate on recognition of Attack in the system. This paper locations investigation of Attack Prevention furthermore gives a thought to how to conquer the issues.
The centralized approach is to recognize the most frequently used approach and to diagnose abnormal data readouts caused by a monitoring process, malfunctions of the components of the sensor node, or environmental events. In the centralized failure detection, each sensor node periodically collects its read and sends a packet on the radio to the central base node responsible for identifying faulty sensor nodes in WSN. In this concern, there are many research activities were reported. Gupta and Younis tried to provide a tolerant grouping mechanism to fail to provide the sensor by performing a sensor recovery in the runes in which the bridge has recovered. The mechanism is separated into two phases: 1) detection step for detecting whether or
By dividing the WSN into fixed WSN and mobile WSN, it proposes a measure to identify and deal with the sensor node faults. Additionally, it suggested a mechanism for the prediction of the energy consumption of sensor networks.
Abstract: In Cyber-Physical Networked Systems (CPNS), the antagonist can inject false measurements into the controller through compromised sensor nodes, which not only threaten the security of the system, but also consume network resources. To deal with this issue, a number of en-route filtering schemes have been designed for wireless sensor networks. However, these schemes either lack resilience to the number of compromised nodes or depend on the statically configured routes and node localization, which are not suitable for CPNS. In this research, we propose a system, which can filter false inoculated data effectively and achieve a high resilience to the number of compromised nodes without relying on static routes and node localization. This adopts polynomials instead of Message Authentication Codes (MACs) for endorsing measurement reports to achieve resilience to attacks. Each node stores two types of polynomials: authentication polynomial and check polynomial, derived from the primitive polynomial, and used for recommending and verifying the measurement reports. Through extensive theoretical analysis and experiments, our data shows that our system will achieves better filtering capacity and resilience to the large number of compromised nodes in appraisal to the existing schemes. The Polynomial based Compromise Resilient En-route Scheme against False Data Attacks Networked Systems done by using OM Net Simulator.
As the number of systems to be monitored increases and the chances of attacks increase we
It is interesting that the biologically inspired approaches to network security because of their similarities between network security and human body resistant to pathogenic attacks. Wireless sensor network is based on low cost and low energy sensor nodes which are connected to physical signals. Such networks are made up of sensors and gateways the data to the end user. This paper used the wireless sensor network nodes and machine learning techniques to distinguish between fake and genuine nodes then desired the inspiration from the human immune system to prevent the role of virtual anti-bodies in system to avoid the fake nodes.
The primary objective with this paper deals with how network security systems protect, detect, adapt, recover and/or reconfigured from anomalies in order to provide some desired level of security services. This paper is a strategy for the development of a general security mechanism/countermeasure valuation scheme. The general objective addresses the question, "Given the value of information to be protected and the threat environment, how strong and assured should security mechanism(s) be to provide desired security services(s)?" [DEL98]