DSpace Repository

On the longest vulnerable path inside sensor networks from boundary regions

Show simple item record

dc.contributor.advisor Rahman, Dr. A. K. M. Ashikur
dc.contributor.author Sayeed Hyder, Chowdhury
dc.date.accessioned 2015-12-15T09:44:29Z
dc.date.available 2015-12-15T09:44:29Z
dc.date.issued 2009-01
dc.identifier.uri http://lib.buet.ac.bd:8080/xmlui/handle/123456789/1538
dc.description.abstract One of the most fundamental problems in wireless sensor network is coverage problem. Higher coverage contributes to improving the quality of services provided by a sensor network. Many researchers are putting their efforts in finding and improving coverage problem. In this thesis work, we have investigated the coverage problem in heterogeneous sensor network from an intruder's point of view. We argue that a well covered area may still be vulnerable to attack if there exist some paths that are not being monitored by any sensor. Intruders that follow these paths cannot be detected by any sensors. In this work, we have defined these vulnerable paths and weak entry points and also discussed their properties in detail. We have also presented an efficient algorithm with O(nlogn) time complexity to find the longest vulnerable path from a given weak point located on the boundary. We claim that additional sensor deployment based on the algorithm reduces vulnerability and improves the quality of service of the system. We present simulation results to support our claim. en_US
dc.language.iso en en_US
dc.publisher Department of Computer Science and Engineering, BUET en_US
dc.subject Sensor networks en_US
dc.title On the longest vulnerable path inside sensor networks from boundary regions en_US
dc.type Thesis-MSc en_US
dc.contributor.id 100505019 P en_US
dc.identifier.accessionNumber 106091
dc.contributor.callno 681.2/SAY/2009 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search BUET IR


Advanced Search

Browse

My Account