2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing 2011
DOI: 10.1109/euc.2011.61
|View full text |Cite
|
Sign up to set email alerts
|

Secure Coverage Control in Wireless Sensor Networks with Malicious Nodes Using Multi-agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…c) Physical Damage This attack may result to a denial of service, it occurs when the attacker physically damages components of the IoT system. d) Sleep Denial Attack Most nodes are powered by replaceable batteries and program to sleep when not utilise, this prevents energy wastage and increases the life of the battery [19]. During the attack the attacker prevents the node entering the sleep mode by feeding fake input to the node or supplying the node with a large amount of power which cause a shutdown of the node.…”
Section: Physical Layer Attacks A) Node Temperingmentioning
confidence: 99%
“…c) Physical Damage This attack may result to a denial of service, it occurs when the attacker physically damages components of the IoT system. d) Sleep Denial Attack Most nodes are powered by replaceable batteries and program to sleep when not utilise, this prevents energy wastage and increases the life of the battery [19]. During the attack the attacker prevents the node entering the sleep mode by feeding fake input to the node or supplying the node with a large amount of power which cause a shutdown of the node.…”
Section: Physical Layer Attacks A) Node Temperingmentioning
confidence: 99%
“…The security vulnerabilities of topology maintenance schemes (PEAS, ASCENT, and CCP) in WSNs are studied [16], [17]. The authors considered three types of attacks-sleep deprivation, snooze, and network substitution.…”
Section: Related Workmentioning
confidence: 99%
“…Gabrielli et al [16] proposed key management techniques to maintain coverage and connectivity by using a subset of nodes in an active or awake state in an adversarial environment. Phuphanin and Usaha [17] proposed coverage control scheme to maximize the sensing coverage per unit energy consumption in an adversarial environment. However, topology maintenance using trust-based scheme was not considered here.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Backup nodes provide additional support to the 1-coverage nodes in event detection and maintain fault tolerance. Backup nodes improve energy efficiency by reducing the communication as they only report when 1-coverage nodes fail to detect the event [9][10].…”
Section: Fig 3: Constrained Delaunay Triangulationmentioning
confidence: 99%