Title :
Voronoi-based deployment of mobile sensors in the face of adversaries
Author :
Bartolini, Novella ; Bongiovanni, Giancarlo ; La Porta, Tom ; Silvestri, Stefano ; Vincenti, F.
Author_Institution :
Dept. of Comput. Sci., Sapienza Univ. of Rome, Rome, Italy
Abstract :
Mobile sensor networks enable the monitoring of remote and hostile environments without requiring human supervision. Several approaches have been proposed in the literature to let mobile sensors self-deploy over a region of interest. In this paper we study, for the first time, the vulnerabilities of one of the most referenced approaches to mobile sensor deployment, namely the Voronoi-based approach. We show that, by compromising a small number of sensors, an attacker can influence the sensor deployment causing a significant reduction of the monitoring capability of the network. We propose a secure deployment algorithm called SecureVOR. We formally prove that SecureVOR has guaranteed termination and that it allows legitimate sensors to detect the malicious behavior of compromised nodes. We also show by extensive simulations that SecureVOR is able to fulfill the network monitoring goals even in presence of an attack, at the expense of a small performance overhead.
Keywords :
computational geometry; mobile radio; telecommunication security; wireless sensor networks; SecureVOR; Voronoi-based deployment; adversaries; compromised nodes; hostile environments; legitimate sensors; malicious behavior; mobile sensor deployment; mobile sensor networks; monitoring capability; network monitoring; remote monitoring; secure deployment; Ad hoc networks; Computer science; Educational institutions; Mobile communication; Mobile computing; Security; Sensors;
Conference_Titel :
Communications (ICC), 2014 IEEE International Conference on
Conference_Location :
Sydney, NSW
DOI :
10.1109/ICC.2014.6883373