Energy cost of mitigating physical attacks in wireless sensor networks

Davut Incebacak*, Kemal Bicakci, Bulent Tavli

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Physical attacks, which aim to render one or more sensor nodes non-operational by physically capturing and destroying them, are among the most serious security threats in Wireless Sensor Networks (WSNs). In case of dense deployment (a desirable property in the design of WSNs) multiple sensor nodes acquire redundant (highly correlated) data. As a result, even if some nodes are dead, the remaining nodes can successfully complete the sensing task. However, as the number of nodes in the network decreases, the remaining nodes are burdened with the extra load (energy dissipation). In this study, we investigate the energy cost of survivability in the presence of physical attacks through a novel Linear Programming framework. We explore the energy dissipation characteristics of the network for different physical attack scenarios.

Original languageEnglish
Title of host publication2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event2012 5th International Conference on New Technologies, Mobility and Security, NTMS 2012 - Istanbul, Turkey
Duration: 7 May 201210 May 2012

Publication series

Name2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops

Conference

Conference2012 5th International Conference on New Technologies, Mobility and Security, NTMS 2012
Country/TerritoryTurkey
CityIstanbul
Period7/05/1210/05/12

Keywords

  • energy efficiency
  • linear programming
  • network lifetime
  • physical attacks
  • wireless sensor networks

Fingerprint

Dive into the research topics of 'Energy cost of mitigating physical attacks in wireless sensor networks'. Together they form a unique fingerprint.

Cite this