DocumentCode
160696
Title
Greedy Flooding in Redoubtable Sensor Networks
Author
Abdallah, Nesrine Ouled ; Jmaiel, Mohamed ; Mosbah, Mohamed ; Zemmari, A.
Author_Institution
LaBRI Lab., Univ. of Bordeaux, Bordeaux, France
fYear
2014
fDate
13-16 May 2014
Firstpage
899
Lastpage
906
Abstract
In Wireless Sensor Networks, flooding in one of the basic communication primitives. It is used to propagate informations from one node to the entire network. Every node, receiving a piece of information, has to flood it to all its neighborhood. As informations to spread are important, such as fire or intrusion alerts, communications should be secured. In this paper, we present a greedy flooding algorithm for Wireless Sensor Networks secured by a Random Key Pre-distribution model that make them redoubtable. We present two theoretical upper bounds of the time complexity of this algorithm that depend on the network structure. We then use the ViSiDiA platform to implement and simulate our algorithm to validate these theoretical results.
Keywords
greedy algorithms; telecommunication security; wireless sensor networks; ViSiDiA platform; WSN; communication primitives; greedy flooding algorithm; network structure; random key predistribution model; redoubtable sensor networks; time complexity; wireless sensor networks; Base stations; Encryption; Public key; Time complexity; Wireless sensor networks; Yttrium; Greedy flooding; Random Key Pre-distribution; Secured Wireless Sensor Networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
Conference_Location
Victoria, BC
ISSN
1550-445X
Print_ISBN
978-1-4799-3629-8
Type
conf
DOI
10.1109/AINA.2014.109
Filename
6838759
Link To Document