Skip to main content

RE2-CD: Robust and Energy Efficient Cut Detection in Wireless Sensor Networks

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5682))

Abstract

Reliable network connectivity in wireless sensor networks (WSN) is difficult to achieve. Harsh, unattended, low-security environments and resource-constrained nodes exacerbate the problem. An ability to detect connectivity disruptions, due to either security or environmental problems, allows WSN to conserve power and memory while reducing network congestion. We propose RE2-CD, an integrated solution incorporating both robustness to attack and energy-efficiency. To enhance security, a robust outlier detection algorithm assists nodes in detecting a specific threat in their environment. To improve energy-efficiency, a cluster-based cut detection algorithm recognizes and reacts to disrupted connectivity. Extensive simulations across a range of network sizes and densities indicate that energy-efficiency can be improved by an order of magnitude in denser networks while malicious nodes are detected at deviations of 1% from expected behavior.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barooah, P.: Distributed cut detection in sensor networks. In: Proc of IEEE Conf. on Decision and Control (2008)

    Google Scholar 

  2. Mahoney, M.V., Chan, P.K.: Learning nonstationary models of normal network traffic for detecting novel attacks. In: Proc. of Conf. on Knowledge discovery and data mining (2002)

    Google Scholar 

  3. Knorr, E., Ng, R., Tucakov, V.: Distance-based outliers: algorithms and applications. VLDB Jrnl (2000)

    Google Scholar 

  4. Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proc. of Conf. on Management of data (2000)

    Google Scholar 

  5. Zhang, J., Wang, H.: Detecting outlying subspaces for high-dimensional data: the new task, algorithms, and performance. Knowledge and Information Systems (2006)

    Google Scholar 

  6. Breunig, M., Kriegel, H., Ng, R., Sander, J.: LOF: identifying density-based local outliers. In: SIGMOD (2000)

    Google Scholar 

  7. Papadimitriou, S., Kitagawa, H., Gibbons, P., Faloutsos, C.: LOCI: Fast outlier detection using the local correlation integral. In: Proc. of Conf. on Data Engineering (2003)

    Google Scholar 

  8. Park, V., Corson, M.: A highly adaptive distributed routing algorithm for mobile wireless networks. In: INFOCOM 1997. Sixteenth Annual Joint Conf. of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 3, pp. 1405–1413 (1997)

    Google Scholar 

  9. Chong, C.Y., Kumar, S.: Sensor networks: evolution, opportunities, and challenges. Proc. of the IEEE (2003)

    Google Scholar 

  10. Cerpa, A., Estrin, D.: ASCENT: Adaptive self-configuring sensor networks topologies. IEEE Trans. on Mobile Computing (2004)

    Google Scholar 

  11. Kleinberg, J.: Detecting a network failure. Internet Mathematics (2004)

    Google Scholar 

  12. Ritter, H., Winter, R., Schiller, J.: A partition detection system for mobile ad-hoc networks. In: Proc. of IEEE Conf. on Sensor and Ad Hoc Communications and Networks (SECON) (2004)

    Google Scholar 

  13. Shrivastava, N., Suri, S., Tóth, C.: Detecting cuts in sensor networks. ACM Trans. on Sensor Netwks (2008)

    Google Scholar 

  14. Stoleru, R., He, T., Stankovic, J.A.: Range-free localization. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 30 (2007)

    Google Scholar 

  15. Malpani, N., Welch, J.L., Vaidya, N.: Leader election algorithms for mobile ad hoc networks. In: Proc. of Workshop on Discrete algorithms and methods for mobile computing and communications (2000)

    Google Scholar 

  16. Karp, B., Kung, H.T.: GPSR: Greedy perimeter stateless routing for wireless networks. In: Proc. of Conf. on Mobile Computing and Networking (MobiCom) (2000)

    Google Scholar 

  17. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for networked sensors. In: Proc. of Conf. on Architectural support for programming languages and operating systems (2000)

    Google Scholar 

  18. Levis, P., Lee, N., Welsh, M., Culler, D.: Tossim: accurate and scalable simulation of entire tinyos applications. In: SenSys 2003: Proc. of the 1st Int. Conf. on Embedded networked sensor systems, pp. 126–137. ACM, New York (2003)

    Google Scholar 

  19. Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 382–401 (1982)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Won, M., George, S.M., Stoleru, R. (2009). RE2-CD: Robust and Energy Efficient Cut Detection in Wireless Sensor Networks. In: Liu, B., Bestavros, A., Du, DZ., Wang, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2009. Lecture Notes in Computer Science, vol 5682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03417-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03417-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03416-9

  • Online ISBN: 978-3-642-03417-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics