淡江大學機構典藏:Item 987654321/73033
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62797/95867 (66%)
Visitors : 3751046      Online Users : 471
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/73033


    Title: An Intruder Avoidance Vulnerable Path Adjustment Protocol for Wireless Mobile Sensor Networks
    Authors: Shih, Kuei-ping;Li, Chun-chih;Chen, Yen-da
    Contributors: 淡江大學資訊工程學系
    Date: 2009-12
    Issue Date: 2011-10-24 11:25:29 (UTC+8)
    Publisher: Taipei : Institute of electrical and electronics engineers (IEEE)
    Abstract: The paper proposes a protocol to adjust the vulnerable path by using mobile sensor networks. The objective of vulnerable adjustment is to protect some important areas, named TBP (to-be-protected) areas in the paper, from being attacked. In the paper, Voronoi diagram is utilized to And a vulnerable path, which is a path that an intruder may pass through. While the vulnerable path passes over a TBP area, a backward tracing and critical sets selection schemes are used to move the fewest number of sensors such that the vulnerable path can be changed and the new vulnerable path will not pass over the TBP area. Moreover, a moving schemes is proposed to decide where mobile sensors shall move. Since sensor movement is the major resource of energy consumption, thus, in order not to cause much movement, the proposed mechanism can move the fewest number of sensors with the shortest distance. Simulation results also verify the advantages of the proposed mechanism.
    Relation: Proceedings of the 2009 joint conferences on pervasive computing, pp.373-376
    DOI: 10.1109/JCPC.2009.5420201
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Proceeding

    Files in This Item:

    File Description SizeFormat
    An Intruder Avoidance Vulnerable Path.pdf3542KbAdobe PDF334View/Open
    index.html0KbHTML339View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback