首页> 外文期刊>Security and Communications Networks >Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks
【24h】

Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks

机译:多源无线传感器网络受漏洞约束的多个最小成本路径

获取原文
获取原文并翻译 | 示例

摘要

In wireless sensor networks, one of the primary requirements is that sensor data acquired from the physical world can be interchanged with all interested collaborative entities in a secure, reliable manner. Because of highly unpredictable nature of the environments caused by malicious attacks or potential threats, minimizing transmission cost between source and sink nodes with jointly considering the security of the whole network is a critical issue. This paper considers two optimization problems of deriving the minimum cost paths from multiple source nodes to the sink node under the guaranteed level of the vulnerability. The link or node vulnerability is defined as a metric, which characterizes the degree of link or node sharing among paths. With the defined link vulnerability, the link vulnerability-constrained minimum cost paths problem is first formulated, and two polynomial-time algorithms are developed for deriving the optimal paths. For the node-vulnerability-constrained minimum cost paths problem, we adopt the network conversion and then achieve the optimal solution with previous proposed algorithms. The necessary condition for solution existence, the optimality of the proposed algorithms, and the related properties of tree network are further theoretically analyzed. Extensive simulations show the significant performance improvements achieved by our proposed algorithms.Copyright (c) 2014 John Wiley & Sons, Ltd.
机译:在无线传感器网络中,主要要求之一是可以以安全,可靠的方式与所有感兴趣的协作实体交换从物理世界获取的传感器数据。由于恶意攻击或潜在威胁所导致的环境的高度不可预测性,因此,在综合考虑整个网络的安全性的情况下,最小化源节点和宿节点之间的传输成本是至关重要的问题。本文考虑了两个优化问题,即在漏洞保证水平下得出从多个源节点到宿节点的最小成本路径。链接或节点漏洞定义为度量标准,它表征路径之间的链接或节点共享程度。利用定义的链接漏洞,首先制定了受链接漏洞约束的最小成本路径问题,并开发了两种多项式时间算法来推导最佳路径。对于受节点漏洞约束的最小成本路径问题,我们采用网络转换,然后使用先前提出的算法实现最优解决方案。从理论上进一步分析了解存在的必要条件,所提出算法的最优性以及树网络的相关性质。大量的仿真显示了我们提出的算法所实现的显着性能提升。(c)2014 John Wiley&Sons,Ltd.

著录项

  • 来源
    《Security and Communications Networks》 |2016年第9期|862-873|共12页
  • 作者单位

    Chinese Acad Sci, IOA, High Performance Network Lab, Beijing 100190, Peoples R China;

    Chinese Acad Sci, IOA, High Performance Network Lab, Beijing 100190, Peoples R China|Univ Nebraska Lincoln, Dept CEEN, Omaha, NE 68182 USA;

    Cisco Syst Inc, Austin, TX 78731 USA;

    Chinese Acad Sci, IOA, High Performance Network Lab, Beijing 100190, Peoples R China;

    Chinese Acad Sci, IOA, High Performance Network Lab, Beijing 100190, Peoples R China;

    Chinese Acad Sci, IOA, High Performance Network Lab, Beijing 100190, Peoples R China;

    Chinese Acad Sci, IOA, High Performance Network Lab, Beijing 100190, Peoples R China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    wireless sensor networks; vulnerability; minimum cost path;

    机译:无线传感器网络;脆弱性;最小成本路径;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号