Date of Award

Fall 2006

Document Type

Thesis

Degree Name

Master of Science (MS)

Department

Electrical & Computer Engineering

Program/Concentration

Computer Engineering

Committee Director

Lee A. Belfore II

Committee Member

Min Song

Committee Member

Vijayan Asari

Call Number for Print

Special Collections LD4331.E55 B53 2006

Abstract

Wireless sensor networks face many reliability challenges. The networks are deployed in open, hostile environments, making them easily susceptible to network failure. As a result, there are countless faults that can occur in sensor networks, from component failure to outside attacks. Outside attacks take place when an adversary gains control over a node or set of nodes in the network. Outside attackers can destroy a network in numerous ways such as random attacks, clustering attacks, search-based attacks, etc. The method and strategy used in each of these attacks directly affects the network's reliability. Understanding how these adversaries are positioned is critical to developing a reliable, fault-tolerant sensor network. Many routing protocols have been designed to make sensor networks more resilient to faults. However, none of them consider various fault distributions and their effect on the network's performance. Various fault arrangements were implemented on a sensor network model. This paper presents how this implementation was achieved as well as the results. Four analyses are performed: the effect of adversary growth, adversary distance from the sink, adversary proximity, and adversary adjacency. Simulations show that these fault distributions directly affect the network in terms of message delivery percentage and sensor node energy cost. The results of this experiment can be used in the future to create routing protocols with these fault distributions in mind.

Rights

In Copyright. URI: http://rightsstatements.org/vocab/InC/1.0/ This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).

DOI

10.25777/94kb-me78

Share

COinS