Discrete Mathematics - Topics on domination
Tolerating failures of continuous-valued sensors
ACM Transactions on Computer Systems (TOCS)
The broadcast storm problem in a mobile ad hoc network
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Geography-informed energy conservation for Ad Hoc routing
Proceedings of the 7th annual international conference on Mobile computing and networking
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Distributed collaboration for event detection in wireless sensor networks
MPAC '05 Proceedings of the 3rd international workshop on Middleware for pervasive and ad-hoc computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Securing distributed data storage and retrieval in sensor networks
Pervasive and Mobile Computing
Attack distribution modeling and its applications in sensor network security
EURASIP Journal on Wireless Communications and Networking
Improving fault-tolerant scheme for a time-sensitive autonomous local wireless sensor network
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Reporter node determination of replicated node detection in wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A key management protocol with robust continuity for sensor networks
Computer Standards & Interfaces
Online data storage using implicit security
Information Sciences: an International Journal
An authentication scheme for locating compromised sensor nodes in WSNs
Journal of Network and Computer Applications
Efficient detection of compromised nodes in a wireless sensor network
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
A fault-tolerant scheme for an autonomous local wireless sensor network
Computer Standards & Interfaces
A hierarchical composition of LU matrix-based key distribution scheme for sensor networks
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
A stream-data oriented secure routing protocol in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
Improving robustness in an autonomous local sensor network
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
MICAI'06 Proceedings of the 5th Mexican international conference on Artificial Intelligence
Locating compromised sensor nodes through incremental hashing authentication
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
Designing an efficient PCA based data model for wireless sensor networks
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
An effective secure routing for false data injection attack in wireless sensor network
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Hi-index | 0.00 |
In sensor networks, nodes may malfunction due to the hostile environment. Therefore, dealing with node failure is a very important research issue. In this paper, we study distributed cooperative failure detection techniques. In the proposed techniques, the nodes around a suspected node collaborate with each other to reach an agreement on whether the suspect is faulty or malicious. We first formalize the problem as how to construct a dominating tree to cover all the neighbors of the suspect and give the lower bound of the message complexity. Two tree-based propagation collection protocols are proposed to construct dominating trees and collect information via the tree structure. Instead of using the traditional flooding technique, we propose a coverage-based heuristic to improve the system performance. Theoretical analysis and simulation results show that the heuristic can help achieve a higher tree coverage with lower message complexity, lower delay and lower energy consumption.