Voronoi-based deployment of mobile sensors in the face of adversaries

Novella Bartolini, G. Bongiovanni, Thomas F. La Porta, S. Silvestri, F. Vincenti

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Mobile sensor networks enable the monitoring of remote and hostile environments without requiring human supervision. Several approaches have been proposed in the literature to let mobile sensors self-deploy over a region of interest. In this paper we study, for the first time, the vulnerabilities of one of the most referenced approaches to mobile sensor deployment, namely the Voronoi-based approach. We show that, by compromising a small number of sensors, an attacker can influence the sensor deployment causing a significant reduction of the monitoring capability of the network. We propose a secure deployment algorithm called SecureVOR. We formally prove that SecureVOR has guaranteed termination and that it allows legitimate sensors to detect the malicious behavior of compromised nodes. We also show by extensive simulations that SecureVOR is able to fulfill the network monitoring goals even in presence of an attack, at the expense of a small performance overhead.

Original languageEnglish (US)
Title of host publication2014 IEEE International Conference on Communications, ICC 2014
PublisherIEEE Computer Society
Pages532-537
Number of pages6
ISBN (Print)9781479920037
DOIs
StatePublished - Jan 1 2014
Event2014 1st IEEE International Conference on Communications, ICC 2014 - Sydney, NSW, Australia
Duration: Jun 10 2014Jun 14 2014

Publication series

Name2014 IEEE International Conference on Communications, ICC 2014

Other

Other2014 1st IEEE International Conference on Communications, ICC 2014
CountryAustralia
CitySydney, NSW
Period6/10/146/14/14

Fingerprint

Sensors
Monitoring
Sensor networks
Wireless networks

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Cite this

Bartolini, N., Bongiovanni, G., La Porta, T. F., Silvestri, S., & Vincenti, F. (2014). Voronoi-based deployment of mobile sensors in the face of adversaries. In 2014 IEEE International Conference on Communications, ICC 2014 (pp. 532-537). [6883373] (2014 IEEE International Conference on Communications, ICC 2014). IEEE Computer Society. https://doi.org/10.1109/ICC.2014.6883373
Bartolini, Novella ; Bongiovanni, G. ; La Porta, Thomas F. ; Silvestri, S. ; Vincenti, F. / Voronoi-based deployment of mobile sensors in the face of adversaries. 2014 IEEE International Conference on Communications, ICC 2014. IEEE Computer Society, 2014. pp. 532-537 (2014 IEEE International Conference on Communications, ICC 2014).
@inproceedings{8095edb656694aa89aaabbee226c1eb2,
title = "Voronoi-based deployment of mobile sensors in the face of adversaries",
abstract = "Mobile sensor networks enable the monitoring of remote and hostile environments without requiring human supervision. Several approaches have been proposed in the literature to let mobile sensors self-deploy over a region of interest. In this paper we study, for the first time, the vulnerabilities of one of the most referenced approaches to mobile sensor deployment, namely the Voronoi-based approach. We show that, by compromising a small number of sensors, an attacker can influence the sensor deployment causing a significant reduction of the monitoring capability of the network. We propose a secure deployment algorithm called SecureVOR. We formally prove that SecureVOR has guaranteed termination and that it allows legitimate sensors to detect the malicious behavior of compromised nodes. We also show by extensive simulations that SecureVOR is able to fulfill the network monitoring goals even in presence of an attack, at the expense of a small performance overhead.",
author = "Novella Bartolini and G. Bongiovanni and {La Porta}, {Thomas F.} and S. Silvestri and F. Vincenti",
year = "2014",
month = "1",
day = "1",
doi = "10.1109/ICC.2014.6883373",
language = "English (US)",
isbn = "9781479920037",
series = "2014 IEEE International Conference on Communications, ICC 2014",
publisher = "IEEE Computer Society",
pages = "532--537",
booktitle = "2014 IEEE International Conference on Communications, ICC 2014",
address = "United States",

}

Bartolini, N, Bongiovanni, G, La Porta, TF, Silvestri, S & Vincenti, F 2014, Voronoi-based deployment of mobile sensors in the face of adversaries. in 2014 IEEE International Conference on Communications, ICC 2014., 6883373, 2014 IEEE International Conference on Communications, ICC 2014, IEEE Computer Society, pp. 532-537, 2014 1st IEEE International Conference on Communications, ICC 2014, Sydney, NSW, Australia, 6/10/14. https://doi.org/10.1109/ICC.2014.6883373

Voronoi-based deployment of mobile sensors in the face of adversaries. / Bartolini, Novella; Bongiovanni, G.; La Porta, Thomas F.; Silvestri, S.; Vincenti, F.

2014 IEEE International Conference on Communications, ICC 2014. IEEE Computer Society, 2014. p. 532-537 6883373 (2014 IEEE International Conference on Communications, ICC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Voronoi-based deployment of mobile sensors in the face of adversaries

AU - Bartolini, Novella

AU - Bongiovanni, G.

AU - La Porta, Thomas F.

AU - Silvestri, S.

AU - Vincenti, F.

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Mobile sensor networks enable the monitoring of remote and hostile environments without requiring human supervision. Several approaches have been proposed in the literature to let mobile sensors self-deploy over a region of interest. In this paper we study, for the first time, the vulnerabilities of one of the most referenced approaches to mobile sensor deployment, namely the Voronoi-based approach. We show that, by compromising a small number of sensors, an attacker can influence the sensor deployment causing a significant reduction of the monitoring capability of the network. We propose a secure deployment algorithm called SecureVOR. We formally prove that SecureVOR has guaranteed termination and that it allows legitimate sensors to detect the malicious behavior of compromised nodes. We also show by extensive simulations that SecureVOR is able to fulfill the network monitoring goals even in presence of an attack, at the expense of a small performance overhead.

AB - Mobile sensor networks enable the monitoring of remote and hostile environments without requiring human supervision. Several approaches have been proposed in the literature to let mobile sensors self-deploy over a region of interest. In this paper we study, for the first time, the vulnerabilities of one of the most referenced approaches to mobile sensor deployment, namely the Voronoi-based approach. We show that, by compromising a small number of sensors, an attacker can influence the sensor deployment causing a significant reduction of the monitoring capability of the network. We propose a secure deployment algorithm called SecureVOR. We formally prove that SecureVOR has guaranteed termination and that it allows legitimate sensors to detect the malicious behavior of compromised nodes. We also show by extensive simulations that SecureVOR is able to fulfill the network monitoring goals even in presence of an attack, at the expense of a small performance overhead.

UR - http://www.scopus.com/inward/record.url?scp=84907000989&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84907000989&partnerID=8YFLogxK

U2 - 10.1109/ICC.2014.6883373

DO - 10.1109/ICC.2014.6883373

M3 - Conference contribution

AN - SCOPUS:84907000989

SN - 9781479920037

T3 - 2014 IEEE International Conference on Communications, ICC 2014

SP - 532

EP - 537

BT - 2014 IEEE International Conference on Communications, ICC 2014

PB - IEEE Computer Society

ER -

Bartolini N, Bongiovanni G, La Porta TF, Silvestri S, Vincenti F. Voronoi-based deployment of mobile sensors in the face of adversaries. In 2014 IEEE International Conference on Communications, ICC 2014. IEEE Computer Society. 2014. p. 532-537. 6883373. (2014 IEEE International Conference on Communications, ICC 2014). https://doi.org/10.1109/ICC.2014.6883373