dc.contributor.advisor |
Rahman, Dr. A. K. M. Ashikur |
|
dc.contributor.author |
Sayeed Hyder, Chowdhury |
|
dc.date.accessioned |
2015-12-15T09:44:29Z |
|
dc.date.available |
2015-12-15T09:44:29Z |
|
dc.date.issued |
2009-01 |
|
dc.identifier.uri |
http://lib.buet.ac.bd:8080/xmlui/handle/123456789/1538 |
|
dc.description.abstract |
One of the most fundamental problems in wireless sensor network is coverage problem.
Higher coverage contributes to improving the quality of services provided by a sensor
network. Many researchers are putting their efforts in finding and improving coverage
problem. In this thesis work, we have investigated the coverage problem in heterogeneous
sensor network from an intruder's point of view. We argue that a well covered area may
still be vulnerable to attack if there exist some paths that are not being monitored by any
sensor. Intruders that follow these paths cannot be detected by any sensors. In this work,
we have defined these vulnerable paths and weak entry points and also discussed their
properties in detail. We have also presented an efficient algorithm with O(nlogn) time
complexity to find the longest vulnerable path from a given weak point located on the
boundary. We claim that additional sensor deployment based on the algorithm reduces
vulnerability and improves the quality of service of the system. We present simulation
results to support our claim. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Department of Computer Science and Engineering, BUET |
en_US |
dc.subject |
Sensor networks |
en_US |
dc.title |
On the longest vulnerable path inside sensor networks from boundary regions |
en_US |
dc.type |
Thesis-MSc |
en_US |
dc.contributor.id |
100505019 P |
en_US |
dc.identifier.accessionNumber |
106091 |
|
dc.contributor.callno |
681.2/SAY/2009 |
en_US |