D. Turgut, B. Turgut, and L. Bölöni

Stealthy dissemination in intruder tracking sensor networks


Cite as:

D. Turgut, B. Turgut, and L. Bölöni. Stealthy dissemination in intruder tracking sensor networks. In Proceedings of IEEE Local Computer Networks (LCN'09), pp. 22–29, October 2009.

Download:

Download 

Abstract:

Many sensor networks are deployed to detect and track intruders. If the existence and location of sensor nodes is disclosed to the opponent, the nodes can be easily disabled or compromised. Wireless transmissions in the presence of the opponent are an important source of disclosure. In this paper, we first describe a way to quantify the stealthiness of the sensor node, with a numerical stealthiness metric. Then, we introduce a local model based dissemination protocol, Try and Bounce (TAB) which takes into account stealth considerations while reporting and forwarding observation reports. In an experimental study comparing TAB to the widely used directed diffusion dissemination protocol, we find that TAB achieves significantly higher stealth for equivalent tracking accuracy, or, alternatively, lower tracking error for equivalent stealth expenditure.

BibTeX:

@inproceedings{Turgut-2009-LCN,
  author = "D. Turgut and B. Turgut and L. B{\"o}l{\"o}ni",
  title = "Stealthy dissemination in intruder tracking sensor networks",
  booktitle = "Proceedings of IEEE Local Computer Networks (LCN'09)",
  year = "2009",
  month = "October",
  pages = "22-29",
  location = "Z{\"u}rich, Switzerland",
  abstract = {
    Many sensor networks are deployed to detect and track intruders. If the
    existence and location of sensor nodes is disclosed to the opponent, the
    nodes can be easily disabled or compromised. Wireless transmissions in the
    presence of the opponent are an important source of disclosure.
    In this paper, we first describe a way to quantify the stealthiness of the
    sensor node, with a numerical stealthiness metric. Then, we introduce a
    local model based dissemination protocol, Try and Bounce (TAB) which takes
    into account stealth considerations while reporting and forwarding
    observation reports.
    In an experimental study comparing TAB to the widely used directed diffusion
    dissemination protocol, we find that TAB achieves significantly higher
    stealth for equivalent tracking accuracy, or, alternatively, lower tracking
    error for equivalent stealth expenditure.
  },
}

Generated by bib2html.pl (written by Patrick Riley, Lotzi Boloni ) on Tue Nov 07, 2017 13:11:27