Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4759
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ruj, Sushmita | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:35:24Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:35:24Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | Reddy, S. K. V. L., Ruj, S., & Nayak, A. (2012). Distributed data survivability schemes in mobile unattended wireless sensor networks. Paper presented at the GLOBECOM - IEEE Global Telecommunications Conference, 979-984. doi:10.1109/GLOCOM.2012.6503240 | en_US |
dc.identifier.isbn | 9781467309219 | - |
dc.identifier.other | EID(2-s2.0-84877673431) | - |
dc.identifier.uri | https://doi.org/10.1109/GLOCOM.2012.6503240 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/4759 | - |
dc.description.abstract | In a mobile Unattended Wireless Sensor Network (UWSN), a trusted sink visits each sensor node periodically to collect data. Data has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN with mobile nodes is a challenging task.We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We analyze memory overheads and communication costs both mathematically and using simulations. In existing schemes, sensors remain static between visits from the sink, whereas in our scheme sensors can move between successive visits from the sink. We show that our approaches perform better than known schemes in terms of communication overheads. © 2012 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.source | GLOBECOM - IEEE Global Telecommunications Conference | en_US |
dc.subject | Data survivabilities | en_US |
dc.subject | Proactive adversary | en_US |
dc.subject | Reactive Adversary | en_US |
dc.subject | Security | en_US |
dc.subject | Unattended wireless sensor networks | en_US |
dc.subject | Communication | en_US |
dc.subject | Data acquisition | en_US |
dc.subject | Sensors | en_US |
dc.subject | Sensor nodes | en_US |
dc.title | Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: