An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies
IEEE Transactions on Mobile Computing
HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks
IEEE Transactions on Mobile Computing
SNPD-SAWN '05 Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks
Topology control in wireless ad hoc and sensor networks
ACM Computing Surveys (CSUR)
Distributed protocols for ensuring both coverage and connectivity of a wireless sensor network
ACM Transactions on Sensor Networks (TOSN)
A fault tolerant topology control in wireless sensor networks
AICCSA '05 Proceedings of the ACS/IEEE 2005 International Conference on Computer Systems and Applications
Self-Configuration of Network Security
EDOC '07 Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference
Towards Survivable Sensor Networks Using Self-Regenerative Rejuvenation and Reconfiguration
CISW '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops
Robust topology control for indoor wireless sensor networks
Proceedings of the 6th ACM conference on Embedded network sensor systems
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Fault and intrusion tolerance of wireless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Fault management in wireless sensor networks
IEEE Wireless Communications
An application-specific protocol architecture for wireless microsensor networks
IEEE Transactions on Wireless Communications
Energy aware based fault tolerance approach for topology control in distributed sensor networks
Journal of High Speed Networks
Hi-index | 0.00 |
Wireless sensor networks are often deployed in hostile and unattended environments. The nodes will be failure by fault, intrusion, and the battery exhaustion. Node-failure tolerance is an acceptable method to improve the networks' lifetime. Then two key problems for topology control are presented: first, how to get a node-failure topology when there is intrusion from the nodes of hostile enemies? second, how to sustain this node-failure topology with all deployed nodes being exhausted ultimately? We propose a novel approach for topology control and prove that it is node-failure tolerant. The approach contains three phases: topology discovery, topology update, and topology regeneration. A tricolor-based method is proposed to build architecture with high tolerance ability and some security protocols are employed to preclude the hostile nodes in discovery phase. In update and regeneration phases, the newly deployed nodes are regarded as renewable resource to fill in the consumed energy, enhance the debased node-failure tolerance ability, and prolong network lifetime, and a security protocol with forward and backward secrecy is devised to adapt the topology changed by node failure and node joining. Some attributes of the presented method are shown by simulations, and differences are given by comparison with related work.