DocumentCode :
1574337
Title :
An intruder avoidance vulnerable path adjustment protocol for wireless mobile sensor networks
Author :
Shih, Kuei-Ping ; Li, Chun-Chih ; Chen, Yen-Da
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Tamkang Univ., Tamsui, Taiwan
fYear :
2009
Firstpage :
125
Lastpage :
130
Abstract :
The paper proposes a protocol to adjust the vulnerable path by using mobile sensor networks. The objective of vulnerable adjustment is to protect some important areas, named TBP (to-be-protected) areas in the paper, from being attacked. In the paper, Voronoi diagram is utilized to And a vulnerable path, which is a path that an intruder may pass through. While the vulnerable path passes over a TBP area, a backward tracing and critical sets selection schemes are used to move the fewest number of sensors such that the vulnerable path can be changed and the new vulnerable path will not pass over the TBP area. Moreover, a moving schemes is proposed to decide where mobile sensors shall move. Since sensor movement is the major resource of energy consumption, thus, in order not to cause much movement, the proposed mechanism can move the fewest number of sensors with the shortest distance. Simulation results also verify the advantages of the proposed mechanism.
Keywords :
computational geometry; mobile radio; wireless sensor networks; TBP; Voronoi diagram; energy consumption; intruder avoidance; sensor movement; vulnerable path adjustment protocol; wireless mobile sensor networks; Computer networks; Computer science; Energy consumption; Mobile computing; Monitoring; Paper technology; Protection; Surveillance; Wireless application protocol; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing (JCPC), 2009 Joint Conferences on
Conference_Location :
Tamsui, Taipei
Print_ISBN :
978-1-4244-5227-9
Electronic_ISBN :
978-1-4244-5228-6
Type :
conf
DOI :
10.1109/JCPC.2009.5420201
Filename :
5420201
Link To Document :
بازگشت