Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks

In wireless sensor networks, one of the primary requirements is that sensor data acquired from the physical world can be interchanged with all interested collaborative entities in a secure, reliable manner. Because of highly unpredictable nature of the environments caused by malicious attacks or potential threats, minimizing transmission cost between source and sink nodes with jointly considering the security of the whole network is a critical issue. This paper considers two optimization problems of deriving the minimum cost paths from multiple source nodes to the sink node under the guaranteed level of the vulnerability. The link or node vulnerability is defined as a metric, which characterizes the degree of link or node sharing among paths. With the defined link vulnerability, the link vulnerability-constrained minimum cost paths problem is first formulated, and two polynomial-time algorithms are developed for deriving the optimal paths. For the node-vulnerability-constrained minimum cost paths problem, we adopt the network conversion and then achieve the optimal solution with previous proposed algorithms. The necessary condition for solution existence, the optimality of the proposed algorithms, and the related properties of tree network are further theoretically analyzed. Extensive simulations show the significant performance improvements achieved by our proposed algorithms.Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[2]  Amir Hossein Mohajerzadeh,et al.  Energy Efficient Spanning Tree for Data Aggregation in Wireless Sensor Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.

[3]  Haohong Wang,et al.  Cross-layer optimization for video summary transmission over wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[4]  Albert Y. Zomaya,et al.  Security Issues in Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).

[5]  Refael Hassin,et al.  Approximation Schemes for the Restricted Shortest Path Problem , 1992, Math. Oper. Res..

[6]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[7]  Wei An,et al.  The Maximized Relay Capacity and Optimal Data Transmission for Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[8]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[9]  Sang Hyuk Son,et al.  RDDS: A Real-Time Data Distribution Service for Cyber-Physical Systems , 2012, IEEE Transactions on Industrial Informatics.

[10]  J. Storer An Introduction to Data Structures and Algorithms , 2002, Birkhäuser Boston.

[11]  Guoliang Xue,et al.  Constrained shortest link-disjoint paths selection: a network programming based approach , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[12]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[13]  Keith J. Blow,et al.  Radio range adjustment for energy efficient wireless sensor networks , 2006, Ad Hoc Networks.

[14]  Jan M. Rabaey,et al.  Energy aware routing for low energy ad hoc sensor networks , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).

[15]  Sungyoung Lee,et al.  Securing Distributed Wireless Sensor Networks: Issues and Guidelines , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[16]  Harry Leib,et al.  Performance of truncated type-II hybrid ARQ schemes with noisy feedback over block fading channels , 2000, IEEE Trans. Commun..

[17]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[18]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[19]  Mei Yang,et al.  Minimum cost paths subject to minimum vulnerability for reliable communications , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).

[20]  Amir Hossein Mohajerzadeh,et al.  Tree Based Energy and Congestion Aware Routing Protocol for Wireless Sensor Networks , 2010, Wirel. Sens. Netw..

[21]  Lui Sha,et al.  Cyber-Physical Systems: A New Frontier , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[22]  Kenneth Steiglitz,et al.  Combinatorial Optimization: Algorithms and Complexity , 1981 .

[23]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[24]  Mohit Saxena,et al.  SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .

[25]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[26]  Wei An,et al.  Importance-based data transmission optimization in multi-source single-sink wireless sensor networks , 2014, Wirel. Commun. Mob. Comput..

[27]  Xiangtong Qi,et al.  Dual-homing multicast protection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[28]  Kaoru Sezaki,et al.  ABS-2-9 TREE-BASED DATA DISSEMINATION IN WIRELESS SENSOR NETWORKS(ABS-2. センサネットワーク技術, 基礎・境界) , 2005 .

[29]  Songwu Lu,et al.  A scalable solution to minimum cost forwarding in large sensor networks , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).

[30]  Yong Fan,et al.  A distributed relay node placement strategy based on balanced network lifetime for wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.