| dc.contributor.advisor | Rahman, Dr. A. K. M. Ashikur | |
| dc.contributor.author | Sayeed Hyder, Chowdhury | |
| dc.date.accessioned | 2015-12-15T09:44:29Z | |
| dc.date.available | 2015-12-15T09:44:29Z | |
| dc.date.issued | 2009-01 | |
| dc.identifier.uri | http://lib.buet.ac.bd:8080/xmlui/handle/123456789/1538 | |
| dc.description.abstract | One of the most fundamental problems in wireless sensor network is coverage problem. Higher coverage contributes to improving the quality of services provided by a sensor network. Many researchers are putting their efforts in finding and improving coverage problem. In this thesis work, we have investigated the coverage problem in heterogeneous sensor network from an intruder's point of view. We argue that a well covered area may still be vulnerable to attack if there exist some paths that are not being monitored by any sensor. Intruders that follow these paths cannot be detected by any sensors. In this work, we have defined these vulnerable paths and weak entry points and also discussed their properties in detail. We have also presented an efficient algorithm with O(nlogn) time complexity to find the longest vulnerable path from a given weak point located on the boundary. We claim that additional sensor deployment based on the algorithm reduces vulnerability and improves the quality of service of the system. We present simulation results to support our claim. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Department of Computer Science and Engineering, BUET | en_US |
| dc.subject | Sensor networks | en_US |
| dc.title | On the longest vulnerable path inside sensor networks from boundary regions | en_US |
| dc.type | Thesis-MSc | en_US |
| dc.contributor.id | 100505019 P | en_US |
| dc.identifier.accessionNumber | 106091 | |
| dc.contributor.callno | 681.2/SAY/2009 | en_US |