Advertisement

A Self-stabilizing Algorithm for Edge Monitoring Problem

  • Brahim Neggazi
  • Mohammed Haddad
  • Volker Turau
  • Hamamache Kheddouci
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8756)

Abstract

Self-monitoring is a simple and effective mechanism for the security of wireless sensor networks (WSNs), especially to cope against compromised nodes. A node v can monitor an edge e if both end-nodes of e are neighbors of v; i.e., e together with v forms a triangle in the graph. Moreover, some edges need more than one monitor. Finding a set of monitoring nodes satisfying all monitoring constraints is called the edge-monitoring problem. The minimum edge-monitoring problem is long known to be NP-complete. In this paper, we present a novel silent self-stabilizing algorithm for computing a minimal edge-monitoring set. Correctness and termination are proven for the unfair distributed daemon.

Keywords

Edge-monitoring Self-stabilization Self-monitoring Security Sensor networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Benahmed, K., Merabti, M., Haffaf, H.: Distributed monitoring for misbehaviour detection in wireless sensor networks. Security & Com. Netw. 6(4), 388–400 (2013)CrossRefGoogle Scholar
  2. 2.
    Blair, J.R.S., Manne, F.: An efficient self-stabilizing distance-2 coloring algorithm. Theoretical Computer Science 444, 28–39 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Dijkstra, E.W.: Self-stabilizing systems in spite of distributed control. Commun. ACM 17(11), 643–644 (1974)CrossRefzbMATHGoogle Scholar
  4. 4.
    Dolev, S.: Self-stabilization. MIT Press (2000)Google Scholar
  5. 5.
    Dong, D., Liao, X., Liu, Y., Shen, C., Wang, X.: Edge self-monitoring for wireless sensor networks. IEEE Trans. on Parallel & Distr. Systems 22(3), 514–527 (2011)CrossRefGoogle Scholar
  6. 6.
    Dong, D., Liu, Y., Liao, X.: Self-monitoring for sensor networks. In: Proc. 9th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, New York, USA, pp. 431–440 (2008)Google Scholar
  7. 7.
    Dubois, S., Tixeuil, S.: A taxonomy of daemons in self-stabilization. CoRR, abs/1110.0334 (2011)Google Scholar
  8. 8.
    Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sen. Netw. 4(3), 15:1–15:37 (2008)Google Scholar
  9. 9.
    Hauck, B.: Time-and Space-Efficient Self-Stabilizing Algorithms. dissertation, Hamburg University of Technology (2012)Google Scholar
  10. 10.
    Khalil, I., Bagchi, S., Nina-Rotaru, C.: DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. In: First Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks, pp. 89–100 (2005)Google Scholar
  11. 11.
    Khalil, I., Bagchi, S., Shroff, N.: Liteworp: A lightweight countermeasure for the wormhole attack. In: Multihop Wireless Network, the International Conference on Dependable Systems and Networks (DSN), pp. 612–621 (2005)Google Scholar
  12. 12.
    Lian, S., Zhao, J., Zhao, X.: Near-optimal diagnosis system deployment in wireless sensor networks. Int. Journal of Distributed Sensor Networks (2013)Google Scholar
  13. 13.
    Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265 (2000)Google Scholar
  14. 14.
    Suk-Bok, L., Yoon-Hwa, C.: A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks. In: Proc. 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, USA, pp. 59–70 (2006)Google Scholar
  15. 15.
    Turau, V.: Efficient transformation of distance-2 self-stabilizing algorithms. Journal of Parallel and Distributed Computing 72(4), 603–612 (2012)CrossRefzbMATHGoogle Scholar
  16. 16.
    Wang, D., Zhang, Q., Liu, J.: The self-protection problem in wireless sensor networks. ACM Transaction Sensor Networks 3(4) (October 2007)Google Scholar
  17. 17.
    Wang, Y., Li, M., Zhang, Q.: Efficient algorithms for p-self-protection problem in static wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 19(10), 1426–1438 (2008)CrossRefGoogle Scholar
  18. 18.
    Wei, G., Zhu, Z., Mao, Y., Xiong, N.: A distributed node self-monitoring mechanism in wireless sensor networks. In: 2nd Int. Conf. on Information Science and Engineering, pp. 1684–1687 (December 2010)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Brahim Neggazi
    • 1
  • Mohammed Haddad
    • 1
  • Volker Turau
    • 2
  • Hamamache Kheddouci
    • 1
  1. 1.University of Lyon, LIRIS UMR5205 CNRS, Claude Bernard Lyon 1 UniversityVilleurbanneFrance
  2. 2.Institute of TelematicsHamburg University of TechnologyHamburgGermany

Personalised recommendations