DocumentCode :
2764479
Title :
On the longest vulnerable path inside a sensor network from boundary regions
Author :
Hyder, Chowdhury Sayeed ; Rahman, Ashikur ; Hasan, Masud
Author_Institution :
Dept. of Comput. Sci. & Eng., Bangladesh Univ. of Eng. & Technol., Dhaka, Bangladesh
fYear :
2009
fDate :
17-19 March 2009
Firstpage :
1
Lastpage :
7
Abstract :
One of the most fundamental problems in wireless sensor network is coverage problem. Higher coverage contributes to improving the quality of services provided by a sensor network. In this paper, we have investigated the coverage problem in heterogeneous sensor network from an intruder´s point of view. We argue that a well covered area may still be vulnerable if there exist some paths that can be traversed without being discovered by any sensors. After defining vulnerable paths and weak points and demonstrating their properties we present an efficient algorithm with O(n log n) time complexity to find the longest vulnerable path from a given boundary point in non overlapping sensing regions. We claim that further sensor deployment based on the algorithm reduces vulnerability of the system and improves the quality of service significantly. We present simulation results to support our claim.
Keywords :
computational complexity; quality of service; wireless sensor networks; coverage problem; heterogeneous sensor network; quality of services; time complexity; wireless sensor network; Complexity theory; Quality of service; Security; Sensors; Simulation; Surveillance;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
GCC Conference & Exhibition, 2009 5th IEEE
Conference_Location :
Kuwait City
Print_ISBN :
978-1-4244-3885-3
Type :
conf
DOI :
10.1109/IEEEGCC.2009.5734313
Filename :
5734313
Link To Document :
بازگشت