Optimization of Watchdog Selection in Wireless Sensor Networks

Application areas of wireless sensor networks (WSNs) are rapidly expanding these days. This also intensifies security concerns in extensively deployed WSNs. A watchdog system is one of the security enhancement methods. In such a system, a number of sensor nodes are selected as watchdogs that monitor their single hop neighbors. Thus, sensing operations lose resources to combat distrust. This letter develops models that optimize the selection of watchdogs in WSNs. It focuses on two major facts: 1) overlapping and 2) coverage. Overlapping occurs when a sensor node is monitored by multiple watchdogs. It causes additional consumption of resources. It is inevitable due to the propagation characteristics of wireless signals. The full coverage occurs when each sensor node in a WSN is either monitored by at least one watchdog or working as a watchdog. This letter presents three optimization models for watchdog selection in WSNs. It also evaluates the models through case studies for realistic WSN topologies. The presented models provide a better understanding of resource efficient watchdog deployment strategies.

[1]  Yu-Chee Tseng,et al.  The Coverage Problem in a Wireless Sensor Network , 2003, WSNA '03.

[2]  Hsiao-Hwa Chen,et al.  An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.

[3]  Rodrigo Roman,et al.  On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.

[4]  Tian He,et al.  Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks , 2010, IEEE Trans. Parallel Distributed Syst..

[5]  Fernando Boavida,et al.  GENSEN: A Topology Generator for Real Wireless Sensor Networks Deployment , 2007, SEUS.

[6]  Hanif D. Sherali,et al.  An improved linearization strategy for zero-one quadratic programming problems , 2006, Optim. Lett..

[7]  Georgios K. Ouzounis,et al.  Smart cities of the future , 2012, The European Physical Journal Special Topics.

[8]  Nitin H. Vaidya,et al.  When Watchdog Meets Coding , 2009, 2010 Proceedings IEEE INFOCOM.

[9]  Peng Zhou,et al.  Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Jalel Ben-Othman,et al.  Fair Election of Monitoring Nodes in WSNs , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[11]  Frank Y. Li,et al.  A Novel Approach to Trust Management in Unattended Wireless Sensor Networks , 2014, IEEE Transactions on Mobile Computing.

[12]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.