Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks
Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically be awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1957 |
---|---|
container_issue | |
container_start_page | 1953 |
container_title | |
container_volume | |
creator | Chunsheng Zhu Yang, L. T. Lei Shu Duong, T. Q. Nishio, S. |
description | Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically be awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC-CKN) algorithm focuses on not only the coverage of the resultant network, but also the network lifetime after sleep scheduling. However, all sleep scheduling processes ignore the fact that potential insider attacks actually can seriously affect or destroy proper sleep scheduling operations and properties. In this paper, we discuss these vulnerabilities and propose corresponding countermeasures for EC-CKN, i.e., secure neighborhood authentication. |
doi_str_mv | 10.1109/ICC.2012.6363680 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6363680</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6363680</ieee_id><sourcerecordid>6363680</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-42a9d39dca1cdfe82fe2cb623883b8c1101dccf2acc84de9b24f2e71db2b40b33</originalsourceid><addsrcrecordid>eNpVUMlOwzAUNJtEKb0jcfEPOHhJYvuIIgqVKjgA58rLS2pIk8pOVeXvCaIXNIeRZjSj9wahO0Yzxqh-WFVVxinjWSkmKHqGFloqlhdSclqI8hzNmBaKMKXExT-P68vJKwpKREnlNbpJ6Yv-yoLN0Os7uEMEj6GD2IzEHE0EnFqAPU5uC_7Qhq7Bpm36GIbtDocO-8MwEje6dool6FIfcQfDsY_f6RZd1aZNsDjxHH0unz6qF7J-e15Vj2sSmCwGknOjvdDeGeZ8DYrXwJ0tuZiOt8pNDzPvXM2Ncyr3oC3Paw6SecttTq0Qc3T_1xsAYLOPYWfiuDlNI34AlpVU6g</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chunsheng Zhu ; Yang, L. T. ; Lei Shu ; Duong, T. Q. ; Nishio, S.</creator><creatorcontrib>Chunsheng Zhu ; Yang, L. T. ; Lei Shu ; Duong, T. Q. ; Nishio, S.</creatorcontrib><description>Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically be awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC-CKN) algorithm focuses on not only the coverage of the resultant network, but also the network lifetime after sleep scheduling. However, all sleep scheduling processes ignore the fact that potential insider attacks actually can seriously affect or destroy proper sleep scheduling operations and properties. In this paper, we discuss these vulnerabilities and propose corresponding countermeasures for EC-CKN, i.e., secure neighborhood authentication.</description><identifier>ISSN: 1550-3607</identifier><identifier>ISBN: 9781457720529</identifier><identifier>ISBN: 1457720523</identifier><identifier>EISSN: 1938-1883</identifier><identifier>EISBN: 9781457720536</identifier><identifier>EISBN: 1457720531</identifier><identifier>EISBN: 1457720515</identifier><identifier>EISBN: 9781457720512</identifier><identifier>DOI: 10.1109/ICC.2012.6363680</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Base stations ; Duty-Cycle ; EC-CKN ; Network Lifetime ; Robot sensing systems ; Scheduling ; Scheduling algorithms ; Security ; Sensor Networks ; Sleep Scheduling ; Wireless sensor networks</subject><ispartof>2012 IEEE International Conference on Communications (ICC), 2012, p.1953-1957</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6363680$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6363680$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chunsheng Zhu</creatorcontrib><creatorcontrib>Yang, L. T.</creatorcontrib><creatorcontrib>Lei Shu</creatorcontrib><creatorcontrib>Duong, T. Q.</creatorcontrib><creatorcontrib>Nishio, S.</creatorcontrib><title>Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks</title><title>2012 IEEE International Conference on Communications (ICC)</title><addtitle>ICC</addtitle><description>Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically be awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC-CKN) algorithm focuses on not only the coverage of the resultant network, but also the network lifetime after sleep scheduling. However, all sleep scheduling processes ignore the fact that potential insider attacks actually can seriously affect or destroy proper sleep scheduling operations and properties. In this paper, we discuss these vulnerabilities and propose corresponding countermeasures for EC-CKN, i.e., secure neighborhood authentication.</description><subject>Authentication</subject><subject>Base stations</subject><subject>Duty-Cycle</subject><subject>EC-CKN</subject><subject>Network Lifetime</subject><subject>Robot sensing systems</subject><subject>Scheduling</subject><subject>Scheduling algorithms</subject><subject>Security</subject><subject>Sensor Networks</subject><subject>Sleep Scheduling</subject><subject>Wireless sensor networks</subject><issn>1550-3607</issn><issn>1938-1883</issn><isbn>9781457720529</isbn><isbn>1457720523</isbn><isbn>9781457720536</isbn><isbn>1457720531</isbn><isbn>1457720515</isbn><isbn>9781457720512</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVUMlOwzAUNJtEKb0jcfEPOHhJYvuIIgqVKjgA58rLS2pIk8pOVeXvCaIXNIeRZjSj9wahO0Yzxqh-WFVVxinjWSkmKHqGFloqlhdSclqI8hzNmBaKMKXExT-P68vJKwpKREnlNbpJ6Yv-yoLN0Os7uEMEj6GD2IzEHE0EnFqAPU5uC_7Qhq7Bpm36GIbtDocO-8MwEje6dool6FIfcQfDsY_f6RZd1aZNsDjxHH0unz6qF7J-e15Vj2sSmCwGknOjvdDeGeZ8DYrXwJ0tuZiOt8pNDzPvXM2Ncyr3oC3Paw6SecttTq0Qc3T_1xsAYLOPYWfiuDlNI34AlpVU6g</recordid><startdate>201206</startdate><enddate>201206</enddate><creator>Chunsheng Zhu</creator><creator>Yang, L. T.</creator><creator>Lei Shu</creator><creator>Duong, T. Q.</creator><creator>Nishio, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201206</creationdate><title>Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks</title><author>Chunsheng Zhu ; Yang, L. T. ; Lei Shu ; Duong, T. Q. ; Nishio, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-42a9d39dca1cdfe82fe2cb623883b8c1101dccf2acc84de9b24f2e71db2b40b33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Authentication</topic><topic>Base stations</topic><topic>Duty-Cycle</topic><topic>EC-CKN</topic><topic>Network Lifetime</topic><topic>Robot sensing systems</topic><topic>Scheduling</topic><topic>Scheduling algorithms</topic><topic>Security</topic><topic>Sensor Networks</topic><topic>Sleep Scheduling</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Chunsheng Zhu</creatorcontrib><creatorcontrib>Yang, L. T.</creatorcontrib><creatorcontrib>Lei Shu</creatorcontrib><creatorcontrib>Duong, T. Q.</creatorcontrib><creatorcontrib>Nishio, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chunsheng Zhu</au><au>Yang, L. T.</au><au>Lei Shu</au><au>Duong, T. Q.</au><au>Nishio, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks</atitle><btitle>2012 IEEE International Conference on Communications (ICC)</btitle><stitle>ICC</stitle><date>2012-06</date><risdate>2012</risdate><spage>1953</spage><epage>1957</epage><pages>1953-1957</pages><issn>1550-3607</issn><eissn>1938-1883</eissn><isbn>9781457720529</isbn><isbn>1457720523</isbn><eisbn>9781457720536</eisbn><eisbn>1457720531</eisbn><eisbn>1457720515</eisbn><eisbn>9781457720512</eisbn><abstract>Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically be awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC-CKN) algorithm focuses on not only the coverage of the resultant network, but also the network lifetime after sleep scheduling. However, all sleep scheduling processes ignore the fact that potential insider attacks actually can seriously affect or destroy proper sleep scheduling operations and properties. In this paper, we discuss these vulnerabilities and propose corresponding countermeasures for EC-CKN, i.e., secure neighborhood authentication.</abstract><pub>IEEE</pub><doi>10.1109/ICC.2012.6363680</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1550-3607 |
ispartof | 2012 IEEE International Conference on Communications (ICC), 2012, p.1953-1957 |
issn | 1550-3607 1938-1883 |
language | eng |
recordid | cdi_ieee_primary_6363680 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Base stations Duty-Cycle EC-CKN Network Lifetime Robot sensing systems Scheduling Scheduling algorithms Security Sensor Networks Sleep Scheduling Wireless sensor networks |
title | Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T04%3A14%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Secured%20energy-aware%20sleep%20scheduling%20algorithm%20in%20duty-cycled%20sensor%20networks&rft.btitle=2012%20IEEE%20International%20Conference%20on%20Communications%20(ICC)&rft.au=Chunsheng%20Zhu&rft.date=2012-06&rft.spage=1953&rft.epage=1957&rft.pages=1953-1957&rft.issn=1550-3607&rft.eissn=1938-1883&rft.isbn=9781457720529&rft.isbn_list=1457720523&rft_id=info:doi/10.1109/ICC.2012.6363680&rft_dat=%3Cieee_6IE%3E6363680%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781457720536&rft.eisbn_list=1457720531&rft.eisbn_list=1457720515&rft.eisbn_list=9781457720512&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6363680&rfr_iscdi=true |