LOF: identifying density-based local outliers
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Efficient algorithms for mining outliers from large data sets
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Leader election algorithms for mobile ad hoc networks
DIALM '00 Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Distance-based outliers: algorithms and applications
The VLDB Journal — The International Journal on Very Large Data Bases
Learning nonstationary models of normal network traffic for detecting novel attacks
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
FOCS '00 Proceedings of the 41st Annual Symposium on Foundations of Computer Science
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Trajectory based forwarding and its applications
Proceedings of the 9th annual international conference on Mobile computing and networking
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
Network failure detection and graph connectivity
SODA '04 Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms
Distributed Computing: Fundamentals, Simulations and Advanced Topics
Distributed Computing: Fundamentals, Simulations and Advanced Topics
ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies
IEEE Transactions on Mobile Computing
Range-free localization and its impact on large scale sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
VigilNet: An integrated sensor network system for energy-efficient surveillance
ACM Transactions on Sensor Networks (TOSN)
Detecting outlying subspaces for high-dimensional data: the new task, algorithms, and performance
Knowledge and Information Systems
Detecting cuts in sensor networks
ACM Transactions on Sensor Networks (TOSN)
A building block approach to sensornet systems
Proceedings of the 6th ACM conference on Embedded network sensor systems
RE2-CD: Robust and Energy Efficient Cut Detection in Wireless Sensor Networks
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
IEEE Communications Magazine
Context-aware wireless sensor networks for assisted living and residential monitoring
IEEE Network: The Magazine of Global Internetworking
Handling large-scale node failures in mobile sensor/robot networks
Journal of Network and Computer Applications
On optimal connectivity restoration in segmented sensor networks
EWSN'13 Proceedings of the 10th European conference on Wireless Sensor Networks
Hi-index | 0.00 |
Reliable, full network connectivity in wireless sensor networks (WSN) is difficult to maintain. Awareness of the state of network connectivity is similarly challenging. Harsh, unattended, low-security environments and resource-constrained nodes exacerbate these problems. An ability to detect connectivity disruptions, also known as cut detection, allows WSN to conserve power and memory while reducing network congestion. We propose ER-CD and LR-CD, protocols that detect cuts while providing energy-efficiency and robustness to attack. Using distributed, cluster-based algorithms, ER-CD recognizes and determines the scope of disrupted connectivity while examining available data for evidence of an attack. For more resource-constrained networks, LR-CD enhances security through the use of a robust outlier detection algorithm. Extensive simulations and a hardware implementation provide experimental validation across a range of network sizes and densities. Results indicate that energy-efficiency can be improved by an order of magnitude in denser networks while malicious nodes are detected at deviations of 1% from expected behavior.