A Distributed Efficient Algorithm for Self-Protection of Wireless Sensor Networks

Habib Mostafaei, Mohammad S. Obaidat

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)

Abstract

Wireless Sensor Networks (WSNs) have been widely leveraged for military and surveillance applications. Each node in a WSN plays a critical role and it can be targeted for the attackers of the network. Thus, it is required to preserve a certain level of protection for each node while exploiting the nodes for the global goals of the network. The self-protection problem focuses on scenarios that sensor nodes should protect themselves instead of protecting a set of event or objects in order to resist against any types of attacks to the nodes. Choosing a set of proper nodes to maintain self-protection requirements is an NP-Complete problem. In this paper, we devise a distributed learning automaton-based algorithm to select a subset of nodes in the network so that each node is under protection of at least one active node. The pooled simulation results validate the effectiveness of our algorithm in selecting nodes and prove that it acts better than state-of- the-art competing algorithms in term of efficiency by using a small number of nodes to provision the self-protection requirements.
Original languageEnglish
Title of host publication2018 IEEE International Conference on Communications (ICC)
PublisherIEEE/LEOS
Pages1-6
Number of pages6
ISBN (Print)978-1-5386-3181-2
DOIs
Publication statusPublished - 24 May 2018
Event2018 IEEE International Conference on Communications (ICC 2018) - Kansas City, MO, USA, Kansas City, United States
Duration: 20 May 201824 May 2018

Conference

Conference2018 IEEE International Conference on Communications (ICC 2018)
Country/TerritoryUnited States
CityKansas City
Period20/05/1824/05/18

Keywords

  • Wireless sensor networks
  • Learning automata
  • Monitoring
  • Automata
  • Security
  • Stochastic processes
  • Resists

Fingerprint

Dive into the research topics of 'A Distributed Efficient Algorithm for Self-Protection of Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this