A Self-stabilizing Algorithm for Edge Monitoring Problem
Self-monitoring is a simple and effective mechanism for the security of wireless sensor networks (WSNs), especially to cope against compromised nodes. A node v can monitor an edge e if both end-nodes of e are neighbors of v; i.e., e together with v forms a triangle in the graph. Moreover, some edges need more than one monitor. Finding a set of monitoring nodes satisfying all monitoring constraints is called the edge-monitoring problem. The minimum edge-monitoring problem is long known to be NP-complete. In this paper, we present a novel silent self-stabilizing algorithm for computing a minimal edge-monitoring set. Correctness and termination are proven for the unfair distributed daemon.
KeywordsEdge-monitoring Self-stabilization Self-monitoring Security Sensor networks
Unable to display preview. Download preview PDF.
- 4.Dolev, S.: Self-stabilization. MIT Press (2000)Google Scholar
- 6.Dong, D., Liu, Y., Liao, X.: Self-monitoring for sensor networks. In: Proc. 9th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, New York, USA, pp. 431–440 (2008)Google Scholar
- 7.Dubois, S., Tixeuil, S.: A taxonomy of daemons in self-stabilization. CoRR, abs/1110.0334 (2011)Google Scholar
- 8.Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sen. Netw. 4(3), 15:1–15:37 (2008)Google Scholar
- 9.Hauck, B.: Time-and Space-Efficient Self-Stabilizing Algorithms. dissertation, Hamburg University of Technology (2012)Google Scholar
- 10.Khalil, I., Bagchi, S., Nina-Rotaru, C.: DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. In: First Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks, pp. 89–100 (2005)Google Scholar
- 11.Khalil, I., Bagchi, S., Shroff, N.: Liteworp: A lightweight countermeasure for the wormhole attack. In: Multihop Wireless Network, the International Conference on Dependable Systems and Networks (DSN), pp. 612–621 (2005)Google Scholar
- 12.Lian, S., Zhao, J., Zhao, X.: Near-optimal diagnosis system deployment in wireless sensor networks. Int. Journal of Distributed Sensor Networks (2013)Google Scholar
- 13.Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265 (2000)Google Scholar
- 14.Suk-Bok, L., Yoon-Hwa, C.: A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks. In: Proc. 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, USA, pp. 59–70 (2006)Google Scholar
- 16.Wang, D., Zhang, Q., Liu, J.: The self-protection problem in wireless sensor networks. ACM Transaction Sensor Networks 3(4) (October 2007)Google Scholar
- 18.Wei, G., Zhu, Z., Mao, Y., Xiong, N.: A distributed node self-monitoring mechanism in wireless sensor networks. In: 2nd Int. Conf. on Information Science and Engineering, pp. 1684–1687 (December 2010)Google Scholar