Adaptive Immunity through Differential Elasticity

Malicious attacks are often targeted to affect the most vulnerable or most critical resources of a system. In sensor networks, because of the large amount of inherent redundancy, the most serious threats are the ones attacking critical paths in the network attempting to break them thus disrupting the overall function of the network. In this paper we define a set of graph properties that characterize the level of vulnerability of specific links. We use these properties to define a bio-inspired model of self-organization and adaptive reorganization that impart networks with resilience in the face of a variety of scenarios from simple power depletion to targeted malicious attacks. Keywordsfault-tolerance; managing redundancy; kconnectedness; differential k-connectedness; elasticity.

[1]  Dong Xuan,et al.  On Deploying Wireless Sensors to Achieve Both Coverage and Connectivity , 2006, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[2]  Jennifer C. Hou,et al.  Maintaining Sensing Coverage and Connectivity in Large Sensor Networks , 2005, Ad Hoc Sens. Wirel. Networks.

[3]  Yingshu Li,et al.  Construction algorithms for k-connected m-dominating sets in wireless sensor networks , 2008, MobiHoc '08.

[4]  Guoliang Xing,et al.  Integrated coverage and connectivity configuration for energy conservation in sensor networks , 2005, TOSN.

[5]  Stefan Schmid,et al.  Algorithmic models for sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[6]  Erik D. Demaine,et al.  Deploying sensor networks with guaranteed capacity and fault tolerance , 2005, MobiHoc '05.

[7]  Ali Mili Self-Stabilizing Programs: The Fault-Tolerant Capability of Self-Checking Programs , 1982, IEEE Transactions on Computers.

[8]  Madjid Merabti,et al.  Monitoring connectivity in wireless sensor networks , 2009, 2009 IEEE Symposium on Computers and Communications.

[9]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[10]  Xiaohua Jia,et al.  Power Assignment for k-Connectivity in Wireless Ad Hoc Networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[11]  Sajal K. Das,et al.  Fault tolerance measures for large-scale wireless sensor networks , 2009, TAAS.

[12]  Peng-Jun Wan,et al.  Message-optimal connected dominating sets in mobile ad hoc networks , 2002, MobiHoc '02.

[13]  Santiago Felici,et al.  Exploiting Mobility for Efficient Coverage in Sparse Wireless Sensor Networks , 2010, Wirel. Pers. Commun..