Optimization Model Research on WSNs Intrusion Tolerance with Scale-Free Topology

Article Preview

Abstract:

This paper proposes a new scale-free network BA Improved Model (BAIM) for the scale-free topology of WSNs intrusion tolerance issues. Through analyzing the power law index of the network invulnerability and topology of fault tolerance, the results of BAIM in the topology of the network survivability maximize the optimal network topology. Simulation results show that BAIM can not only keep the scale-free network robust to random failures, and but also improve the scale-free network vulnerability against intentional attacks and prolong the network lifetime.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1049-1050)

Pages:

2059-2062

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] X. L. FAN, F.F. Du, and J. Guo, Lifetime Optimization Algorithm for Mobile Sink in Wireless Sensor Network, Journal of Computational Information Systems, 2014, 10(5): 1841–1848.

Google Scholar

[2] H. Wang, N. Agoulmine, and M. Ma, Network life time optimization in wireless sensor networks, IEEE Journal on Selected Areas in Communications, vol. 28, no. 7, pp.1127-1137, July, (2010).

DOI: 10.1109/jsac.2010.100917

Google Scholar

[3] Y. Wang, C. W. Yi, M. S. Huang, and et al, Three-dimensional greedy routing in large-scale random wireless sensor networks, Ad Hoc Networks, vol. 11 n. 4, pp.1331-1344, April, (2013).

DOI: 10.1016/j.adhoc.2010.10.003

Google Scholar

[4] H. L. Zhu, H. Luo, H. Peng, and et al, Complex networks-based energy-efficient evolution model for wireless sensor networks. Chaos, Solitons and Fractals, vol. 41, no. 4, pp.1828-1835, April, (2009).

DOI: 10.1016/j.chaos.2008.07.032

Google Scholar

[5] J. Wu, TY. J. Tan, H. Z. Deng, and et al, Some properties of Scale-Free Networks with scaling exponent λ≤2. Journal of Systems Science and Mathematical Sciences, vol. 28, no. 7, pp.811-821, July, (2008).

Google Scholar

[6] O. Younis, S. Fahmy, A Hybrid, Energy Efficient, Distributed Clustering Approach for Ad-Hoc sensor Networks[J], IEEE Trans on Mobile Computing, 2004, 3(4): 660-669.

DOI: 10.1109/tmc.2004.41

Google Scholar

[7] R . Cohen, K. Erez, B. A. Daniel, and et al, Breakdown of the Internet under intentional attack, Physical Review Letters, vol. 86, no. 16, pp.3682-3685, August, (2001).

DOI: 10.1103/physrevlett.86.3682

Google Scholar