MOBILITY AND SECURITY MODELS FOR WIRELESS SENSOR NETWORKS USING VORONOI TESSELLATIONS

Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga

Abstract

Recent advances in integrated electronic devices motivated the use of wireless sensor networks in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee and optimal event detection rate. This paper proposes a high-level Voronoi-based technique to assess the area coverage based on information available locally for each sensor node. We show that the proposed technique can be used to implement a coverage-preserving mobility process to enhance the initial sensor deployment. We also highlight other potential applications of our approach.

References

  1. C. Gui and P. Mohapatra, ”Power Conservation and Quality of Surveillance in Target Tracking Sensor Networks,” Proc. ACM MobiCom 7804, pp. 129-143, Sept. 2004.
  2. M. Hamdi, N. Boudriga, M. S. Obaidat, WHOMoVeS: An optimized broadband sensor network for military vehicle tracking, International Journal of Communication Systems, Vol. 21 , Issue 3, pp. 277-300, ISSN:1074-5351, 2008.
  3. L. Wang, H. Shen, Z. Chen, and Y. Lin, Voronoi Tessellation Based Rapid Coverage Decision Algorithm for Wireless Sensor Networks, Lecture Notes in Computer Science, Ubiquitous Intelligence and Computing, Springer, 2007.
  4. I. Stojmenovic, A. K. Ruhil, D.K. Lobiyal, Voronoi Diagram and Convex Hull Based Geocasting and Routing in Wireless Networks, Proceedings of the Eighth IEEE International Symposium on Computers and Communication (ISCC03), KEMER - ANTALYA, Turkey, 2003.
  5. Marcos Augusto M. Vieira, Luiz Filipe M. Vieira, Linnyer B. Ruiz, Antonio A. F. Loureiro, Antonio O. Fernandes, Nogueira Nogueira, Scheduling Nodes in Wireless Sensor Networks: A Voronoi Approach, lcn, p. 423, 28th Annual IEEE International Conference on Local Computer Networks (LCN'03), 2003.
  6. W. Wang, V. Srinivasan, and K-C. Chua, Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks, MobiCom07, September 914, 2007, Montral, Qubec, Canada.
  7. M. Sliti, M. Hamdi, N. Boudriga. An Elliptic Threshold Signature Framework for k-Security in Wireless Sensor Networks, ICECS, 2008.
  8. V. Shoup, Practical Threshold Signatures Proc, Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT 7800), 2000.
  9. D. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer, 2004.
  10. Standards for Efficient Cryptography, SEC 1: Elliptic Curve Cryptography, Version 1.0, September 2000.
Download


Paper Citation


in Harvard Style

Abdelkader M., Hamdi M. and Boudriga N. (2010). MOBILITY AND SECURITY MODELS FOR WIRELESS SENSOR NETWORKS USING VORONOI TESSELLATIONS . In Proceedings of the International Conference on Data Communication Networking and Optical Communication Systems - Volume 1: DCNET, (ICETE 2010) ISBN 978-989-8425-25-6, pages 104-113. DOI: 10.5220/0002989501040113


in Bibtex Style

@conference{dcnet10,
author={Manel Abdelkader and Mohamed Hamdi and Noureddine Boudriga},
title={MOBILITY AND SECURITY MODELS FOR WIRELESS SENSOR NETWORKS USING VORONOI TESSELLATIONS},
booktitle={Proceedings of the International Conference on Data Communication Networking and Optical Communication Systems - Volume 1: DCNET, (ICETE 2010)},
year={2010},
pages={104-113},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002989501040113},
isbn={978-989-8425-25-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Data Communication Networking and Optical Communication Systems - Volume 1: DCNET, (ICETE 2010)
TI - MOBILITY AND SECURITY MODELS FOR WIRELESS SENSOR NETWORKS USING VORONOI TESSELLATIONS
SN - 978-989-8425-25-6
AU - Abdelkader M.
AU - Hamdi M.
AU - Boudriga N.
PY - 2010
SP - 104
EP - 113
DO - 10.5220/0002989501040113