scispace - formally typeset
Journal ArticleDOI

ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks

Reads0
Chats0
TLDR
ROSE, a novel robustness enhancing algorithm for scale-free WSNs, is proposed, which exploits the position and degree information of nodes to rearrange the edges to resemble an onion-like structure, which has been proven to be robust against malicious attacks.
Abstract
Due to the recent proliferation of cyber-attacks, improving the robustness of wireless sensor networks (WSNs), so that they can withstand node failures has become a critical issue. Scale-free WSNs are important, because they tolerate random attacks very well; however, they can be vulnerable to malicious attacks, which particularly target certain important nodes. To address this shortcoming, this paper first presents a new modeling strategy to generate scale-free network topologies, which considers the constraints in WSNs, such as the communication range and the threshold on the maximum node degree. Then, ROSE, a novel robustness enhancing algorithm for scale-free WSNs, is proposed. Given a scale-free topology, ROSE exploits the position and degree information of nodes to rearrange the edges to resemble an onion-like structure, which has been proven to be robust against malicious attacks. Meanwhile, ROSE keeps the degree of each node in the topology unchanged such that the resulting topology remains scale-free. The extensive experimental results verify that our new modeling strategy indeed generates scale-free network topologies for WSNs, and ROSE can significantly improve the robustness of the network topologies generated by our modeling strategy. Moreover, we compare ROSE with two existing robustness enhancing algorithms, showing that ROSE outperforms both.

read more

Citations
More filters
Journal ArticleDOI

Survey on fog computing

TL;DR: Fog computing extends the cloud services to the edge of network, and makes computation, communication and storage closer to edge devices and end-users, which aims to enhance low-latency, mobility, network bandwidth, security and privacy.
Journal ArticleDOI

How Can Heterogeneous Internet of Things Build Our Future: A Survey

TL;DR: A four-layer HetIoT architecture consisting of sensing, networking, cloud computing, and applications is proposed, including self-organizing, big data transmission, privacy protection, data integration and processing in large-scale Het IoT.
Journal ArticleDOI

Robustness Optimization Scheme With Multi-Population Co-Evolution for Scale-Free Wireless Sensor Networks

TL;DR: This paper proposes a Robustness Optimization scheme with multi-population Co-evolution for scale-free wireless sensor networKS (ROCKS), and shows that ROCKS roughly doubles the robustness of initial scale- free WSNs, and outperforms two existing algorithms by about 16% when the network size is large.
Journal ArticleDOI

Topology optimization against cascading failures on wireless sensor networks using a memetic algorithm

TL;DR: A memetic algorithm MA-TOSCA is proposed to help WSNs resist cascading failures via topology optimization, in which the local search operator is designed based on a new network balancing metric “sink-oriented betweenness entropy”.
Journal ArticleDOI

A Robust Time Synchronization Scheme for Industrial Internet of Things

TL;DR: R-Sync is presented, a robust time synchronization scheme for IIoT that makes all the nodes get synchronized and gets the better performance in terms of accuracy and energy consumption, compared with three existing time synchronization algorithms TPSN, GPA, STETS.
References
More filters
Journal ArticleDOI

Mean-field theory for scale-free random networks

TL;DR: A mean-field method is developed to predict the growth dynamics of the individual vertices of the scale-free model, and this is used to calculate analytically the connectivity distribution and the scaling exponents.
Book

Complex Networks: Structure, Robustness and Function

TL;DR: This chapter discusses random network models, which are based on the Erdos-Renyi models, and their application in the context of complex networks, where distances in scale-free networks are small and distances in complex networks are large.
Journal ArticleDOI

Mitigation of malicious attacks on networks

TL;DR: It is shown that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically whereas their functionality remains unchanged and is useful not only for improving significantly with low cost the robustity of existing infrastructures but also for designing economically robust network systems.
Journal ArticleDOI

Robustness of interdependent networks under targeted attack.

TL;DR: It is found that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc = 0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero.
Journal ArticleDOI

Joint Resource Partitioning and Offloading in Heterogeneous Cellular Networks

TL;DR: It is shown that load balancing is insufficient, and resource partitioning is required in conjunction with offloading to improve the rate of cell edge users in co-channel heterogeneous networks.
Related Papers (5)