Abstract
The network-based security defined by International Telecommunication Union (ITU) has specific features for Ubiquitous Sensor Networks (USN). An enormous number of sensor nodes and hard energy constraints define specific network-based security features of USNs. The network-based security features of USNs are considered based on ITU-T Recommendation X.1311. A new type of attacks on the energy system of a USN is proposed, which is based on the spurious flows generation. The sensor nodes respond to the spurious flows and the sensor network life-time decreases. The mobile sensor network behavior in case of spurious flows intrusion is investigated in the paper. A homogenous mobile sensor network and the LEACH-M cluster head selection algorithm are used in this study. The effect of Poisson and deterministic spurious flows intrusion is investigated. The sensor node moving speed influence on the sensor network life-time is analyzed too.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Recommendation Y.2701. Security Requirements for NGN release 1. ITU-T, Geneva (April 2007)
Recommendation Y. 2012. Functional requirements and architecture of the NGN. ITU (2010)
Recommendation X.1311 Security Framework for Ubiquitous Sensor Networks. ITU-T, Geneva (February 2011)
Younis, O., Fahmy, S.: Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach. In: Proceedings, IEEE INFOCOM, Hong Kong, China (2004)
Andreev, S., Galinina, O., Koucheryavy, Y.: Energy-Efficient Client Relay Scheme for Machine-to-Machine Communication. In: IEEE Globecom 2011, Houston, TX, USA,
Aziz, A., Salim, A., Osamy, W.: Adaptive and Efficient Compressive Sensing based Technique for Routing in Wireless Sensor Networks. In: Proceedings, INTHITEN (IoT and its Enablers) Conference, June 3-4, St.Petersburg, State University of Telecommunication (2013)
Koucheryavy, A., Salim, A.: Prediction-based Clustering Algorithm for Mobile Wireless Sensor Networks. In: Proceedings, International Conference on Advanced Communication Technology, ICACT 2010, Phoenix Park, Korea (2010)
Bhattasali, T., Chaki, R.: A survey of recent intrusion detection systems for wireless sensor network. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) CNSA 2011. CCIS, vol. 196, pp. 268–280. Springer, Heidelberg (2011)
Bhattassali, T., Chaki, R., Sanyal, S.: Sleep Deprivation Attack Detection in Wireless Sensor Networks. International Journal of Computer Applications 40(15) (February 2012)
Sorensen, L., Skouby, K.E.: Use scenarios 2020 – a worldwide wireless future. Visions and research directions for the Wireless World. Outlook. Wireless World Research Forum. 4 (July 2009)
Recommendation Y.2062. Framework of object-to-object communication using ubiquitous networking in NGN. ITU-T, Geneva (February 2012)
Kim, B.-T.: Broadband convergence Network (BcN) for Ubiquitous Korea Vision. In: Proceedings of the 7th International Conference on Advanced Communication Technology, ICACT 2005, Phoenix Park, Korea, February 21-23 (2005)
Marrocco, G.: Pervasive Electromagnetics: Sensing Paradigms by Passive RFID Technology. IEEE Wireless Communications 17(6) (December 2010)
Gorlatova, M., et al.: Energy Harvesting Active Networked Tags (EnHants) for Ubiquitous Object Networking. IEEE Wireless Communications 17(6) (December 2010)
Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings 33rd Hawaii International Conference on System Sciences (HICSS), Wailea Maui, Hawaii, USA (January 2000)
Kim, D., Chung, Y.: Self-Organization Routing Protocol Supporting Mobile Nodes for Wireless Sensor Network. In: Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences, vol. 2 (2006)
Koucheryavy, A., Salim, A.: Cluster head selection for homogeneous Wireless Sensor Networks. In: Proceedings of the International Conference on Advanced Communication Technology, ICACT 2009, Phoenix Park, Korea (2009)
Moltchanov, D., Koucheryavy, Y., Harju, J.: Performance response of wireless channels for quantitatively different loss and arrival statistics. Performance Evaluation 67(1), 1–27 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Koucheryavy, A., Bogdanov, I., Paramonov, A. (2013). The Mobile Sensor Network Life-Time under Different Spurious Flows Intrusion. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networking. ruSMART NEW2AN 2013 2013. Lecture Notes in Computer Science, vol 8121. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40316-3_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-40316-3_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40315-6
Online ISBN: 978-3-642-40316-3
eBook Packages: Computer ScienceComputer Science (R0)