• DocumentCode
    160696
  • Title

    Greedy Flooding in Redoubtable Sensor Networks

  • Author

    Abdallah, Nesrine Ouled ; Jmaiel, Mohamed ; Mosbah, Mohamed ; Zemmari, A.

  • Author_Institution
    LaBRI Lab., Univ. of Bordeaux, Bordeaux, France
  • fYear
    2014
  • fDate
    13-16 May 2014
  • Firstpage
    899
  • Lastpage
    906
  • Abstract
    In Wireless Sensor Networks, flooding in one of the basic communication primitives. It is used to propagate informations from one node to the entire network. Every node, receiving a piece of information, has to flood it to all its neighborhood. As informations to spread are important, such as fire or intrusion alerts, communications should be secured. In this paper, we present a greedy flooding algorithm for Wireless Sensor Networks secured by a Random Key Pre-distribution model that make them redoubtable. We present two theoretical upper bounds of the time complexity of this algorithm that depend on the network structure. We then use the ViSiDiA platform to implement and simulate our algorithm to validate these theoretical results.
  • Keywords
    greedy algorithms; telecommunication security; wireless sensor networks; ViSiDiA platform; WSN; communication primitives; greedy flooding algorithm; network structure; random key predistribution model; redoubtable sensor networks; time complexity; wireless sensor networks; Base stations; Encryption; Public key; Time complexity; Wireless sensor networks; Yttrium; Greedy flooding; Random Key Pre-distribution; Secured Wireless Sensor Networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
  • Conference_Location
    Victoria, BC
  • ISSN
    1550-445X
  • Print_ISBN
    978-1-4799-3629-8
  • Type

    conf

  • DOI
    10.1109/AINA.2014.109
  • Filename
    6838759