The mobile sensor network life-time under different spurious flows intrusion

11Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The network-based security defined by International Telecommunication Union (ITU) has specific features for Ubiquitous Sensor Networks (USN). An enormous number of sensor nodes and hard energy constraints define specific network-based security features of USNs. The network-based security features of USNs are considered based on ITU-T Recommendation X.1311. A new type of attacks on the energy system of a USN is proposed, which is based on the spurious flows generation. The sensor nodes respond to the spurious flows and the sensor network life-time decreases. The mobile sensor network behavior in case of spurious flows intrusion is investigated in the paper. A homogenous mobile sensor network and the LEACH-M cluster head selection algorithm are used in this study. The effect of Poisson and deterministic spurious flows intrusion is investigated. The sensor node moving speed influence on the sensor network life-time is analyzed too. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Koucheryavy, A., Bogdanov, I., & Paramonov, A. (2013). The mobile sensor network life-time under different spurious flows intrusion. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8121 LNCS, pp. 312–317). https://doi.org/10.1007/978-3-642-40316-3_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free