Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks

Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically be awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Chunsheng Zhu, Yang, L. T., Lei Shu, Duong, T. Q., Nishio, S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1957
container_issue
container_start_page 1953
container_title
container_volume
creator Chunsheng Zhu
Yang, L. T.
Lei Shu
Duong, T. Q.
Nishio, S.
description Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically be awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC-CKN) algorithm focuses on not only the coverage of the resultant network, but also the network lifetime after sleep scheduling. However, all sleep scheduling processes ignore the fact that potential insider attacks actually can seriously affect or destroy proper sleep scheduling operations and properties. In this paper, we discuss these vulnerabilities and propose corresponding countermeasures for EC-CKN, i.e., secure neighborhood authentication.
doi_str_mv 10.1109/ICC.2012.6363680
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6363680</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6363680</ieee_id><sourcerecordid>6363680</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-42a9d39dca1cdfe82fe2cb623883b8c1101dccf2acc84de9b24f2e71db2b40b33</originalsourceid><addsrcrecordid>eNpVUMlOwzAUNJtEKb0jcfEPOHhJYvuIIgqVKjgA58rLS2pIk8pOVeXvCaIXNIeRZjSj9wahO0Yzxqh-WFVVxinjWSkmKHqGFloqlhdSclqI8hzNmBaKMKXExT-P68vJKwpKREnlNbpJ6Yv-yoLN0Os7uEMEj6GD2IzEHE0EnFqAPU5uC_7Qhq7Bpm36GIbtDocO-8MwEje6dool6FIfcQfDsY_f6RZd1aZNsDjxHH0unz6qF7J-e15Vj2sSmCwGknOjvdDeGeZ8DYrXwJ0tuZiOt8pNDzPvXM2Ncyr3oC3Paw6SecttTq0Qc3T_1xsAYLOPYWfiuDlNI34AlpVU6g</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chunsheng Zhu ; Yang, L. T. ; Lei Shu ; Duong, T. Q. ; Nishio, S.</creator><creatorcontrib>Chunsheng Zhu ; Yang, L. T. ; Lei Shu ; Duong, T. Q. ; Nishio, S.</creatorcontrib><description>Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically be awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC-CKN) algorithm focuses on not only the coverage of the resultant network, but also the network lifetime after sleep scheduling. However, all sleep scheduling processes ignore the fact that potential insider attacks actually can seriously affect or destroy proper sleep scheduling operations and properties. In this paper, we discuss these vulnerabilities and propose corresponding countermeasures for EC-CKN, i.e., secure neighborhood authentication.</description><identifier>ISSN: 1550-3607</identifier><identifier>ISBN: 9781457720529</identifier><identifier>ISBN: 1457720523</identifier><identifier>EISSN: 1938-1883</identifier><identifier>EISBN: 9781457720536</identifier><identifier>EISBN: 1457720531</identifier><identifier>EISBN: 1457720515</identifier><identifier>EISBN: 9781457720512</identifier><identifier>DOI: 10.1109/ICC.2012.6363680</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Base stations ; Duty-Cycle ; EC-CKN ; Network Lifetime ; Robot sensing systems ; Scheduling ; Scheduling algorithms ; Security ; Sensor Networks ; Sleep Scheduling ; Wireless sensor networks</subject><ispartof>2012 IEEE International Conference on Communications (ICC), 2012, p.1953-1957</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6363680$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6363680$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chunsheng Zhu</creatorcontrib><creatorcontrib>Yang, L. T.</creatorcontrib><creatorcontrib>Lei Shu</creatorcontrib><creatorcontrib>Duong, T. Q.</creatorcontrib><creatorcontrib>Nishio, S.</creatorcontrib><title>Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks</title><title>2012 IEEE International Conference on Communications (ICC)</title><addtitle>ICC</addtitle><description>Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically be awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC-CKN) algorithm focuses on not only the coverage of the resultant network, but also the network lifetime after sleep scheduling. However, all sleep scheduling processes ignore the fact that potential insider attacks actually can seriously affect or destroy proper sleep scheduling operations and properties. In this paper, we discuss these vulnerabilities and propose corresponding countermeasures for EC-CKN, i.e., secure neighborhood authentication.</description><subject>Authentication</subject><subject>Base stations</subject><subject>Duty-Cycle</subject><subject>EC-CKN</subject><subject>Network Lifetime</subject><subject>Robot sensing systems</subject><subject>Scheduling</subject><subject>Scheduling algorithms</subject><subject>Security</subject><subject>Sensor Networks</subject><subject>Sleep Scheduling</subject><subject>Wireless sensor networks</subject><issn>1550-3607</issn><issn>1938-1883</issn><isbn>9781457720529</isbn><isbn>1457720523</isbn><isbn>9781457720536</isbn><isbn>1457720531</isbn><isbn>1457720515</isbn><isbn>9781457720512</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVUMlOwzAUNJtEKb0jcfEPOHhJYvuIIgqVKjgA58rLS2pIk8pOVeXvCaIXNIeRZjSj9wahO0Yzxqh-WFVVxinjWSkmKHqGFloqlhdSclqI8hzNmBaKMKXExT-P68vJKwpKREnlNbpJ6Yv-yoLN0Os7uEMEj6GD2IzEHE0EnFqAPU5uC_7Qhq7Bpm36GIbtDocO-8MwEje6dool6FIfcQfDsY_f6RZd1aZNsDjxHH0unz6qF7J-e15Vj2sSmCwGknOjvdDeGeZ8DYrXwJ0tuZiOt8pNDzPvXM2Ncyr3oC3Paw6SecttTq0Qc3T_1xsAYLOPYWfiuDlNI34AlpVU6g</recordid><startdate>201206</startdate><enddate>201206</enddate><creator>Chunsheng Zhu</creator><creator>Yang, L. T.</creator><creator>Lei Shu</creator><creator>Duong, T. Q.</creator><creator>Nishio, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201206</creationdate><title>Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks</title><author>Chunsheng Zhu ; Yang, L. T. ; Lei Shu ; Duong, T. Q. ; Nishio, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-42a9d39dca1cdfe82fe2cb623883b8c1101dccf2acc84de9b24f2e71db2b40b33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Authentication</topic><topic>Base stations</topic><topic>Duty-Cycle</topic><topic>EC-CKN</topic><topic>Network Lifetime</topic><topic>Robot sensing systems</topic><topic>Scheduling</topic><topic>Scheduling algorithms</topic><topic>Security</topic><topic>Sensor Networks</topic><topic>Sleep Scheduling</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Chunsheng Zhu</creatorcontrib><creatorcontrib>Yang, L. T.</creatorcontrib><creatorcontrib>Lei Shu</creatorcontrib><creatorcontrib>Duong, T. Q.</creatorcontrib><creatorcontrib>Nishio, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chunsheng Zhu</au><au>Yang, L. T.</au><au>Lei Shu</au><au>Duong, T. Q.</au><au>Nishio, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks</atitle><btitle>2012 IEEE International Conference on Communications (ICC)</btitle><stitle>ICC</stitle><date>2012-06</date><risdate>2012</risdate><spage>1953</spage><epage>1957</epage><pages>1953-1957</pages><issn>1550-3607</issn><eissn>1938-1883</eissn><isbn>9781457720529</isbn><isbn>1457720523</isbn><eisbn>9781457720536</eisbn><eisbn>1457720531</eisbn><eisbn>1457720515</eisbn><eisbn>9781457720512</eisbn><abstract>Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically be awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC-CKN) algorithm focuses on not only the coverage of the resultant network, but also the network lifetime after sleep scheduling. However, all sleep scheduling processes ignore the fact that potential insider attacks actually can seriously affect or destroy proper sleep scheduling operations and properties. In this paper, we discuss these vulnerabilities and propose corresponding countermeasures for EC-CKN, i.e., secure neighborhood authentication.</abstract><pub>IEEE</pub><doi>10.1109/ICC.2012.6363680</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1550-3607
ispartof 2012 IEEE International Conference on Communications (ICC), 2012, p.1953-1957
issn 1550-3607
1938-1883
language eng
recordid cdi_ieee_primary_6363680
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Authentication
Base stations
Duty-Cycle
EC-CKN
Network Lifetime
Robot sensing systems
Scheduling
Scheduling algorithms
Security
Sensor Networks
Sleep Scheduling
Wireless sensor networks
title Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T04%3A14%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Secured%20energy-aware%20sleep%20scheduling%20algorithm%20in%20duty-cycled%20sensor%20networks&rft.btitle=2012%20IEEE%20International%20Conference%20on%20Communications%20(ICC)&rft.au=Chunsheng%20Zhu&rft.date=2012-06&rft.spage=1953&rft.epage=1957&rft.pages=1953-1957&rft.issn=1550-3607&rft.eissn=1938-1883&rft.isbn=9781457720529&rft.isbn_list=1457720523&rft_id=info:doi/10.1109/ICC.2012.6363680&rft_dat=%3Cieee_6IE%3E6363680%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781457720536&rft.eisbn_list=1457720531&rft.eisbn_list=1457720515&rft.eisbn_list=9781457720512&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6363680&rfr_iscdi=true