Learn More
In this paper, we study the issue of sensor networks deployment using limited mobility sensors. By limited mobility, we mean that the maximum distance that sensors are capable of moving to is limited. Given an initial deployment of limited mobility sensors in a field clustered into multiple regions, our deployment problem is to determine a movement plan for(More)
—In this paper, we address a Resource Constrained Lifetime Problem in sensor networks in an operating environment subject to physical node destructions. Specifically, given a limited number of sensors, our goal is to maximize the network lifetime and derive the deployment plan of the nodes to maximize the lifetime under physical node destructions. The(More)
— In this paper, we study the issue of mobility based sensor networks deployment. The distinguishing feature of our work is that the sensors in our model have limited mobilities. More specifically, the mobility in the sensors we consider is restricted to a flip, where the distance of the flip is bounded. Given an initial deployment of sensors in a field,(More)
—An important phase of sensor networks operation is deployment of sensors in the field of interest. Critical goals during sensor networks deployment include coverage, connectivity, load balancing, etc. A class of work has recently appeared, where mobility in sensors is leveraged to meet deployment objectives. In this paper, we study deployment of sensor(More)
Sensor networks typically operate in hostile outdoor environments. In such environments, sensor networks are highly susceptible to physical attacks that can result in physical node destructions. In this paper, we study the impacts of physical attacks on sensor network configuration. Lifetime is an important metric during configuration for many sensor(More)
Keywords: P2P systems Active worm attacks Internet security a b s t r a c t Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromise hosts in the Internet. Due to the recent surge of peer-to-peer (P2P) systems with large numbers of users(More)
—Recent active worm propagation events show that active worms can spread in an automated fashion and flood the Internet in a very short period of time. Due to the recent surge of Peer-to-Peer (P2P) systems with large numbers of users, P2P systems can be a potential vehicle for the active worms to achieve fast worm propagation in the Internet. In this paper,(More)
—Many wireless sensor network (WSN) applications demand secure communications. The random key predistribution ðRKP Þ protocol has been well accepted in achieving secure communications in WSNs. A host of key management protocols have been proposed based on the RKP protocol. However, due to the randomness in key distribution and strong constraint in key path(More)
— The small form factor of the sensors, coupled with the unattended and distributed nature of their deployment expose sensors to Physical Attacks that physically destroy sensors in the network. In this paper, we study the modeling and analysis of Search-based Physical Attacks in sensor networks. We define a search-based physical attack model, where the(More)