Skip to main content

Models for Assessing Vulnerability in Imperfect Sensor Networks

  • Conference paper
  • First Online:
Dynamics of Information Systems: Algorithmic Approaches

Part of the book series: Springer Proceedings in Mathematics & Statistics ((PROMS,volume 51))

Abstract

We examine a directed network on which sensors exist at a subset of the nodes. At each node, a target (e.g., an intruder in a physical network, a fire in a building, or a virus in a computer network) may or may not exist. Sensors detect the presence of these targets by monitoring the nodes at which they are located and all nodes adjacent from their positions. However, in practical settings a limited-cardinality subset of sensors might fail. A failed sensor may report false positives or negatives and, as a result, the network owner may not be able to ascertain whether or not targets exist at some nodes. If it is not possible to deduce whether or not a target exists at a node with a given set of sensor readings, then the node is said to be ambiguous. We show that a network owner must solve a series of combinatorial optimization problems to determine which nodes are ambiguous. Furthermore, we determine the worst-case number of ambiguous nodes by optimizing over the set of all sensor readings that could possibly arise. We also present mathematical programming formulations for these problems under varying assumptions on how sensors fail, and on what assumptions a network owner makes on how sensors fail. Our computational results illustrate how these varying assumptions impact the number of ambiguous nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. A. Abbasi and M. Younis. A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30:2826–2841, 2007.

    Article  Google Scholar 

  2. B. Balasundaram and S. Butenko. Graph domination, coloring and cliques in telecommunications. In M. G. C. Resende and P. M. Pardalos, editors, Handbook of Optimization in Telecommunications, pages 865–890. Springer, 2006.

    Google Scholar 

  3. N. Biggs. Perfect codes in graphs. Journal of Combinatorial Theory, Series B, 15(3):289–296, 1973.

    Article  MathSciNet  MATH  Google Scholar 

  4. E. Cockayne and S. Hedetniemi. Optimal domination in graphs. IEEE Transactions on Circuits and Systems, 22(11):855–857, 1975.

    Article  MathSciNet  Google Scholar 

  5. J. F. Fink and M. S. Jacobson. n-domination in graphs. In Y. Alavi, G. Chartrand, L. Lesniak, D. R. Lick, and C. E. Wall, editors, Graph Theory with Applications to Algorithms and Computer Science, pages 283–300. John Wiley & Sons, Inc., New York, 1985.

    Google Scholar 

  6. M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-completeness. W. H. Freeman & Co., Princeton, NJ, 1979.

    MATH  Google Scholar 

  7. F. Harary and R. A. Melter. On the metric dimension of a graph. Ars Combinatoria, 2:191–195, 1976.

    MathSciNet  MATH  Google Scholar 

  8. T. W. Haynes, S. T. Hedetniemi, and P. J. Slater. Fundamentals of Domination in Graphs. Pure and Applied Mathematics. Marcel Dekker, New York, NY, 1998.

    MATH  Google Scholar 

  9. S. T. Hedetniemi and R. C. Laskar. Topics on Domination, volume 48 of Annals of Discrete Mathematics. North Holland, Amsterdam, 1991.

    Google Scholar 

  10. J. Kennington, E. Olinick, and D. Rajan, editors. Wireless Network Design: Optimization Models and Solution Procedures, volume 158 of International Series in Operations Research & Management Science. Springer, New York, NY, 2011.

    Google Scholar 

  11. H. Lim and C. Kim. Flooding in wireless ad hoc networks. Computer Communications, 24(3):353–363, 2001.

    Article  Google Scholar 

  12. C. L. Liu. Introduction to Combinatorial Mathematics, volume 181. McGraw-Hill, New York, NY, 1968.

    MATH  Google Scholar 

  13. G. L. Nemhauser and L. A. Wolsey. Integer and Combinatorial Optimization. Wiley-Interscience, New York, NY, 1999.

    MATH  Google Scholar 

  14. O. Ore. Theory of Graphs, volume 38. American Mathematical Society, Providence, RI, Third edition, 1967.

    Google Scholar 

  15. D. Rajan and A. Atamturk. Survivable network design: Routing of flows and slacks. In G. Anandalingam and S. Raghavan, editors, Telecommunications Network Design and Management, pages 65–81. Kluwer, Norwell, MA, 2002.

    Google Scholar 

  16. M. G. C. Resende and P. M. Pardalos, editors. Handbook of Optimization in Telecommunications, volume 10. Springer, New York, NY, 2006.

    MATH  Google Scholar 

  17. S. Shen. Domination problems. In J. J. Cochran, editor, Wiley Encyclopedia of Operations Research and Management Science, pages 1470–1488. Wiley, Hoboken, NJ, 2010.

    Google Scholar 

  18. S. Shen and J.C. Smith. A decomposition approach for solving a broadcast domination network design problem. Annals of Operations Research, 1–28, Springer US, 2011.

    Google Scholar 

  19. P. J. Slater. Fault-tolerant locating-dominating sets. Discrete Mathematics, 249(1):179–189, 2002.

    Article  MathSciNet  MATH  Google Scholar 

  20. P. J. Slater. Liar’s domination. Networks, 54(2):70–74, 2009.

    Article  MathSciNet  MATH  Google Scholar 

  21. J. C. Smith, C. Lim, and F. Sudargho. Survivable network design under optimal and heuristic interdiction scenarios. Journal of Global Optimization, 38:181–199, 2007.

    Article  MathSciNet  MATH  Google Scholar 

  22. S. Soni, R. Gupta, and H. Pirkul. Survivable network design: The state of the art. Information Systems Frontiers, 1(3):303–315, 1999.

    Article  Google Scholar 

  23. H. von Stackelberg. The Theory of the Market Economy. William Hodge and Co., London, U.K., 1952.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Cole Smith .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Sonuç, S.B., Smith, J.C. (2013). Models for Assessing Vulnerability in Imperfect Sensor Networks. In: Sorokin, A., Pardalos, P. (eds) Dynamics of Information Systems: Algorithmic Approaches. Springer Proceedings in Mathematics & Statistics, vol 51. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7582-8_9

Download citation

Publish with us

Policies and ethics