Skip to main content

A Self-stabilizing Algorithm for Edge Monitoring Problem

  • Conference paper
Stabilization, Safety, and Security of Distributed Systems (SSS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8756))

Included in the following conference series:

Abstract

Self-monitoring is a simple and effective mechanism for the security of wireless sensor networks (WSNs), especially to cope against compromised nodes. A node v can monitor an edge e if both end-nodes of e are neighbors of v; i.e., e together with v forms a triangle in the graph. Moreover, some edges need more than one monitor. Finding a set of monitoring nodes satisfying all monitoring constraints is called the edge-monitoring problem. The minimum edge-monitoring problem is long known to be NP-complete. In this paper, we present a novel silent self-stabilizing algorithm for computing a minimal edge-monitoring set. Correctness and termination are proven for the unfair distributed daemon.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Benahmed, K., Merabti, M., Haffaf, H.: Distributed monitoring for misbehaviour detection in wireless sensor networks. Security & Com. Netw. 6(4), 388–400 (2013)

    Article  Google Scholar 

  2. Blair, J.R.S., Manne, F.: An efficient self-stabilizing distance-2 coloring algorithm. Theoretical Computer Science 444, 28–39 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  3. Dijkstra, E.W.: Self-stabilizing systems in spite of distributed control. Commun. ACM 17(11), 643–644 (1974)

    Article  MATH  Google Scholar 

  4. Dolev, S.: Self-stabilization. MIT Press (2000)

    Google Scholar 

  5. Dong, D., Liao, X., Liu, Y., Shen, C., Wang, X.: Edge self-monitoring for wireless sensor networks. IEEE Trans. on Parallel & Distr. Systems 22(3), 514–527 (2011)

    Article  Google Scholar 

  6. Dong, D., Liu, Y., Liao, X.: Self-monitoring for sensor networks. In: Proc. 9th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, New York, USA, pp. 431–440 (2008)

    Google Scholar 

  7. Dubois, S., Tixeuil, S.: A taxonomy of daemons in self-stabilization. CoRR, abs/1110.0334 (2011)

    Google Scholar 

  8. Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sen. Netw. 4(3), 15:1–15:37 (2008)

    Google Scholar 

  9. Hauck, B.: Time-and Space-Efficient Self-Stabilizing Algorithms. dissertation, Hamburg University of Technology (2012)

    Google Scholar 

  10. Khalil, I., Bagchi, S., Nina-Rotaru, C.: DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. In: First Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks, pp. 89–100 (2005)

    Google Scholar 

  11. Khalil, I., Bagchi, S., Shroff, N.: Liteworp: A lightweight countermeasure for the wormhole attack. In: Multihop Wireless Network, the International Conference on Dependable Systems and Networks (DSN), pp. 612–621 (2005)

    Google Scholar 

  12. Lian, S., Zhao, J., Zhao, X.: Near-optimal diagnosis system deployment in wireless sensor networks. Int. Journal of Distributed Sensor Networks (2013)

    Google Scholar 

  13. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265 (2000)

    Google Scholar 

  14. Suk-Bok, L., Yoon-Hwa, C.: A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks. In: Proc. 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, USA, pp. 59–70 (2006)

    Google Scholar 

  15. Turau, V.: Efficient transformation of distance-2 self-stabilizing algorithms. Journal of Parallel and Distributed Computing 72(4), 603–612 (2012)

    Article  MATH  Google Scholar 

  16. Wang, D., Zhang, Q., Liu, J.: The self-protection problem in wireless sensor networks. ACM Transaction Sensor Networks 3(4) (October 2007)

    Google Scholar 

  17. Wang, Y., Li, M., Zhang, Q.: Efficient algorithms for p-self-protection problem in static wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 19(10), 1426–1438 (2008)

    Article  Google Scholar 

  18. Wei, G., Zhu, Z., Mao, Y., Xiong, N.: A distributed node self-monitoring mechanism in wireless sensor networks. In: 2nd Int. Conf. on Information Science and Engineering, pp. 1684–1687 (December 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Neggazi, B., Haddad, M., Turau, V., Kheddouci, H. (2014). A Self-stabilizing Algorithm for Edge Monitoring Problem. In: Felber, P., Garg, V. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2014. Lecture Notes in Computer Science, vol 8756. Springer, Cham. https://doi.org/10.1007/978-3-319-11764-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11764-5_7

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11763-8

  • Online ISBN: 978-3-319-11764-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics