Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

CHAPTER 11 Node Compromise Detection in Wireless Sensor Networks 299 2. 3. Gaussian distribution will be used for the group deployment model. Please derive three- dimensional Gaussian distribution by refer- ring to Eq. (11-1). The SPRT takes the samples with type of H 0 with equal weight to the ones of type of H 1 . For some applications in which the decision on H 1 is required to be quickly done. The sam- ples with type of H 1 might need to be taken into the SPRT in more weight than the ones of H 0 . How can this biased sampling strategy be designed and implemented in the SPRT? Random Trip Mobility (RTM) model can be thought of as a generic random movement mobility model. This means that any type of random movement mobility model can be represented as an RTM model. Please rewrite the definition of Random Waypoint model in accordance with the definition of RTM model. [3] A.D. Wood, J.A. Stankovic, Denial of service in sensor networks, IEEE Comput. 35 (10) (2002) 54­62. [4] J. Ho, M. Wright, S.K. Das, ZoneTrust: fast zone-based node compromise detection and revocation in sensor networks using sequential analysis, in: IEEE Symposium on Reliable Distributed Systems, SRDS, Niagara Falls, New York, USA, September 2009, pp. 217­223. [5] J. Ho. Mobile malicious node detection, in: Chapter 4: A framework for robust detection and prevention of wide-spread node compromise in wireless sensor networks. Ph.D. Thesis, University of Texas at Arlington, April 2010. [6] J. Ho, D. Liu, M.Wright, S.K. Das, Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks, Elsevier Ad Hoc Netw. J 7 (8) (2009) 1476­1488. [7] J. Ho, M. Wright, S.K. Das, Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing, IEEE Trans. Mob. Comput. 10 (6) (2011) 767­782.