Transmission cost minimization with vulnerability constraint in wireless sensor networks

In wireless sensor networks, one of the primary requirements is that sensor data derived from the physical world can be interchanged with all interested collaborative entities in a secure and reliable manner. Due to highly unpredictable environments where sensor nodes are usually deployed, minimizing the transmission cost with jointly taking into account the security of the whole network poses a challenging task. With this end, this paper considers an optimization problem of deriving the minimum cost paths from multiple source nodes, which are deployed in the area of interest, to the sink node under the constraint that the vulnerability of the whole network is under the given level. The vulnerability is defined as a metric which characterizes the degree of edge and node sharing among different paths. With the defined vulnerability, vulnerability-constrained minimum cost paths problem is formulated and two polynomial-time algorithms are developed for deriving the optimal paths. The necessary condition for the existence of the optimal solution, and the optimality of the proposed algorithms are analyzed in the theoretical. Extensive simulations show the significant performance enhancements achieved by our proposed algorithms.

[1]  Kenneth Steiglitz,et al.  Combinatorial Optimization: Algorithms and Complexity , 1981 .

[2]  Guoliang Xue,et al.  Constrained shortest link-disjoint paths selection: a network programming based approach , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[3]  Yee Wei Law,et al.  Key management and link-layer security of wireless sensor networks : Energy-efficient attack and defense , 2005 .

[4]  Harry Leib,et al.  Performance of truncated type-II hybrid ARQ schemes with noisy feedback over block fading channels , 2000, IEEE Trans. Commun..

[5]  Jan M. Rabaey,et al.  Energy aware routing for low energy ad hoc sensor networks , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).

[6]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[7]  Sungyoung Lee,et al.  Securing Distributed Wireless Sensor Networks: Issues and Guidelines , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[8]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[9]  Wei An,et al.  The Maximized Relay Capacity and Optimal Data Transmission for Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[10]  Keith J. Blow,et al.  Radio range adjustment for energy efficient wireless sensor networks , 2006, Ad Hoc Networks.

[11]  Mei Yang,et al.  Minimum cost paths subject to minimum vulnerability for reliable communications , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).

[12]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[13]  C. Gupta,et al.  SECURITY ISSUES IN WIRELESS SENSOR NETWORK , 2011 .

[14]  Songwu Lu,et al.  A scalable solution to minimum cost forwarding in large sensor networks , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).

[15]  Yong Fan,et al.  A distributed relay node placement strategy based on balanced network lifetime for wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[16]  Haohong Wang,et al.  Cross-layer optimization for video summary transmission over wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[17]  Wei An,et al.  Importance-based data transmission optimization in multi-source single-sink wireless sensor networks , 2014, Wirel. Commun. Mob. Comput..

[18]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[19]  Xiangtong Qi,et al.  Dual-homing multicast protection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[20]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[21]  Mohit Saxena,et al.  SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .

[22]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[23]  Refael Hassin,et al.  Approximation Schemes for the Restricted Shortest Path Problem , 1992, Math. Oper. Res..

[24]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.