Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








58 Hits in 4.2 sec

Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks

Roberto Di Pietro, Nino Vincenzo Verde
2011 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks  
In this paper, we provide a preliminary assessment of epidemic-domain inspired approaches to model the information survivability in UWSN.  ...  In particular, we show that epidemic models can be used to set up the parameters that allow the information to survive, once estimated the maximal compromising power of the attacker.  ...  ACKNOWLEDGMENTS The authors would like to thank Riccardo Mariani for his contribution to numerical simulations.  ... 
doi:10.1109/wowmom.2011.5986165 dblp:conf/wowmom/PietroV11 fatcat:s5xensuydrfprmv7yektwvm624

Epidemiological Approach for Data Survivability in Unattended Wireless Sensor Networks [article]

Jacques M. Bahi, Christophe Guyeux, Mourad Hakem, Abdallah Makhoul
2016 arXiv   pre-print
In this paper, we first introduce an epidemic-domain inspired approach to model the information survivability in UWSN.  ...  Unattended Wireless Sensor Networks (UWSNs) are Wireless Sensor Networks characterized by sporadic sink presence and operation in hostile settings.  ...  Let us now explain how to extend such a compartmental study for data survivability in wireless sensor networks to well-known SIS models.  ... 
arXiv:1608.05951v1 fatcat:674iqklvwbfojoxok3ftceqtsu

Using an epidemiological approach to maximize data survival in the internet of things [article]

Abdallah Makhoul and Christophe Guyeux and Mourad Hakem and Jacques M. Bahi
2016 arXiv   pre-print
In this paper, we have developed a compartmental e-Epidemic SIR (Susceptible-Infectious-Recovered) model to save the data in the network and let it survive after attacks.  ...  High failure rates lead to significant loss of data. Therefore, data survivability is a main challenge of the IoT.  ...  Unattended Wireless Sensor Networks (UWSNs), have been introduced by Di Pietro et al. in [5] , where adversaries can compromise some sensor nodes and selectively destroy data.  ... 
arXiv:1608.07443v1 fatcat:trmjyeviwfgzdo2prcdc26ms3i

Analysis of virus spread in wireless sensor networks: An epidemic model

Shensheng Tang, Brian L. Mark
2009 2009 7th International Workshop on Design of Reliable Communication Networks  
We study the potential threat for virus spread in wireless sensor networks (WSNs).  ...  By introducing a maintenance mechanism in the sleep mode of WSNs, the SIR-M model can improve the network's anti-virus capability and enable the network to adapt flexibly to different types of viruses,  ...  In this paper, we study the potential threat for virus spread in wireless sensor networks.  ... 
doi:10.1109/drcn.2009.5340022 fatcat:edcrejd5mrbw5e54fwzin2l2oa

A survey on bio-inspired networking

Falko Dressler, Ozgur B. Akan
2010 Computer Networks  
in-body molecular communication networks [5] , unattended ground, air, and underwater sensor networks [6], self-organizing sensor and actor networks [7, 8] and locally intelligent and self-cognitive devices  ...  networks, their dynamic nature, resource constraints, heterogeneous architectures, absence or impracticality of centralized control and infrastructure, need for survivability, and unattended resolution  ...  The autonomous behavior of artificial immune systems may be a good model for the design of effective algorithms for unattended and autonomous communication in sensor networks [28] .  ... 
doi:10.1016/j.comnet.2009.10.024 fatcat:hkc3vn42pfdfddkwxff7ojwrzu

Energy Aware Compressive Sensing Assisted Secure Data Survivability and Data Collection in Unattended Wireless Sensor Networks

2022 International Journal of Intelligent Engineering and Systems  
Mobile sink-based sensor networks deployed in unattended environment are characterized by infrequent sink visits.  ...  Data collection in unattended environment must also be energy efficient to prolong the life time of the network.  ...  energy consumption in unattended wireless sensor networks.  ... 
doi:10.22266/ijies2022.0831.06 fatcat:evf4dcbq3jeijb3of5izxjokkq

Design and Analysis of Modified SIQRS Model for Performance Study of Wireless Sensor Network

Rudra Pratap Ojha, Goutam Sanyal, Pramod Kumar Srivastava, Kavita Sharma
2017 Scalable Computing : Practice and Experience  
The dynamics of worm propagation in the Wireless Sensor Networks (WSNs) is one of the fundamental challenge due to critical operational constraints.  ...  In this paper we propose a modified Susceptible-Infectious-Quarantined-Recovered-Susceptible (SIQRS) model based on epidemic theory.  ...  [23] proposed an epidemic model for information survivability in unattended WSNs to ensure the quality of service and node energy in presence of attacker.  ... 
doi:10.12694/scpe.v18i3.1303 fatcat:hg7vzu6aj5fgjgsi2gvgkpaj7e

Human-centric wireless sensor networks to improve information availability during urban search and rescue activities

Sergio F. Ochoa, Rodrigo Santos
2015 Information Fusion  
To address this challenge, this article introduces the concept of a human-centric wireless sensor network, as an infrastructure that supports the capture and delivery of shared information in the field  ...  These activities are often improvised by first responders, stemming from the lack of communication and information support needed for making decisions in the field.  ...  Acknowledgments The authors want to thank the Ñuñoa Command Center and also the 2nd and 6th Fire Company of Ñuñoa (in Santiago, Chile) for the support to this research work.  ... 
doi:10.1016/j.inffus.2013.05.009 fatcat:jxtnuuzx25btrlc7ezgujhj4ke

Assisting an Elderly with Early Dementia Using Wireless Sensors Data in Smarter Safer Home [chapter]

Qing Zhang, Ying Su, Ping Yu
2014 IFIP Advances in Information and Communication Technology  
The technology used includes wireless sensor network and broadband network connectivity.  ...  The plan for the testing and implementation of the technology and commercial roll out is also briefly outlined.  ...  Scientific Data Sharing Platform for Population and Health.  ... 
doi:10.1007/978-3-642-55355-4_41 fatcat:dottowa4r5hqzf3newvos5dcay

Wireless Sensor Networks (WSNs): New trends in Secure Routing Techniques

Norhan Abdel-hamid, Labib M., Abdelhameed Ibrahim, Hesham A.
2018 International Journal of Computer Applications  
Wireless Sensor Networks (WSNs), considered as one of the successfully distributed applications that are currently used to acquire knowledge and collect information from the wirelessly devices seamlessly  ...  help in bridging the divide between user requirements and technologies.  ...  costs across the entire network and enhance the robustness Improving the model with the presence of epidemic threshold to avoid an unpredicted result.  ... 
doi:10.5120/ijca2018917969 fatcat:6krkbywfdrberg7u3i4qzaq2je

Improving sensor network immunity under worm attacks: A software diversity approach

Yi Yang, Sencun Zhu, Guohong Cao
2016 Ad hoc networks  
We call the malicious code that exploits a buffer-overflow vulnerability in a sensor program sensor worm.  ...  Inspired by the survivability through heterogeneity philosophy, we then explore the technique of software diversity to combat sensor worms.  ...  Acknowledgments We are grateful to Piotr Berman for inspiring discussion on graph coloring. We also thank the anonymous reviewers for their helpful comments.  ... 
doi:10.1016/j.adhoc.2016.04.011 fatcat:ww2ogvskxrh4zf7mkxsatu42ga

Improving sensor network immunity under worm attacks

Yi Yang, Sencun Zhu, Guohong Cao
2008 Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '08  
We call the malicious code that exploits a buffer-overflow vulnerability in a sensor program sensor worm.  ...  Inspired by the survivability through heterogeneity philosophy, we then explore the technique of software diversity to combat sensor worms.  ...  Acknowledgments We are grateful to Piotr Berman for inspiring discussion on graph coloring. We also thank the anonymous reviewers for their helpful comments.  ... 
doi:10.1145/1374618.1374640 dblp:conf/mobihoc/YangZC08 fatcat:onfhjgxvdje33hlrx5luwywhie

Bio-inspired networking: from theory to practice

Falko Dressler, Ozgur Akan
2010 IEEE Communications Magazine  
, unattended operation, and robustness.  ...  This article aims to give an overview to the general field of bio-inspired networking, introducing the key concepts and methodologies.  ...  system behavior (self) Activation and self-learning process Immune System Wireless Sensor Networks (WSN) B-cells Sensor nodes Antibody Sensor data Antibody density Reporting frequency rate f T-cells  ... 
doi:10.1109/mcom.2010.5621985 fatcat:jg54t7k3vzdd5fadu4gmn42nli

Bilateral routing in emergency response networks

Panayiotis Kolios, Andreas Pitsillides, Osnat Mokryn
2013 ICT 2013  
The latter, search through reachable network nodes to retrieve new and unattended help requests.  ...  The strategy takes into account both centrality and battery power of each node, to increase survivability and allow for a subsequent detection of help-requests by response units.  ...  Duty cycling, originally proposed within wireless sensor networks, has been well studied and so does synchronization (detailed above).  ... 
doi:10.1109/ictel.2013.6632102 dblp:conf/ict/KoliosPM13 fatcat:6brwkbgwyjczteuk2g24izmn2q

Integrated Sensor Systems and Data Fusion for Homeland Protection [chapter]

Alfonso Farina, Luciana Ortenzi, Branko Ristic, Alex Skvortsov
2014 Academic Press Library in Signal Processing: Volume 2 - Communications and Radar Signal Processing  
Real applications of this kind of sensor networks are described in Sections 2.22.8 and 2.22.9, respectively for the border control problem and the forecasting and estimation of an epidemics.  ...  The first data fusion algorithms employed in real systems in the radar field go back to the early seventies, when they had been developed for multi-radar tracking (MRT) for netted sensors.  ...  Graziano (SELEX Sistemi Integrati) for the continuous and fruitful cooperation on the many topics described in the Chapter for years.  ... 
doi:10.1016/b978-0-12-396500-4.00022-3 fatcat:gwnm3a2l5nh4dhheaxc7su5eni
« Previous Showing results 1 — 15 out of 58 results