You are on page 1of 3

VULNERABILITIES OF VORONOI-BASED APPROACHES TO MOBILE SENSOR

DEPLOYMENT
ABSTRACT
Mobile sensor networks are the most promising solution to cover an Area of Interest
(AoI) in safety critical scenarios. Mobile devices can coordinate with each other according to a
distributed deployment algorithm, without resorting to human supervision for device positioning
and network conguration. In this paper, we focus on the vulnerabilities of the deployment
algorithms based on Voronoi diagrams to coordinate mobile sensors and guide their movements.
given a geometric characterization of possible attack conguration, proving that a simple attack
consisting of a barrier of few compromised sensors can severely reduce network coverage. On
the basis of the above characterization, it proposed two new secure deployment algorithms,
named SecureVor and SSD (Secure Swap Deployment). These algorithms allow a sensor to
detect compromised nodes by analyzing their movements, under different and complementary
operative setting. The proposed algorithms are effective in defeating a barrier OM attack, and
both have guaranteed termination. It performs extensive simulations to study the performance of
the two algorithms and compare them with the original approach. Results show that SecureVor
and SSD have better robustness and exibility, excellent coverage capabilities and deployment
time, even in the presence of an attack.

Aim & Objectives

To improve the robustness and flexibility, excellent coverage capabilities.

To reduce the overhead.

#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com

EXISTING SYSTEM
Previous solutions for deploying mobile sensors fall in to one of three major families:
approaches based on virtual force models on the formation of patterns or on computational
geometry techniques Only recently, the vulnerabilities of the virtual force approach for sensor
deployment have been considered This work introduced a simple attack tailored for mobile
sensor deployment algorithms, called the Opportunistic Movement (OM) attack. Using a small
set of malicious sensors, the attacker can inuence the deployment of legitimate sensors by
exploiting the coordination mechanism of the self-deployment approach Malicious nodes may
coordinate with each other to reduce the area in which the justifiable sensors are deployed, thus
creating a non-monitored zone.

DISADVANTAGES
Where manual positioning of static sensors is not feasible. These devices can
autonomously deploy over an Area of Interest (AoI). Coordination among the sensors is
obtained by means of a deployment algorithm.
Besides the security problems typical of ad hoc networks, such as communication issues
false position claims Sybil and node replication attacks, mobile sensor networks suffer
from other vulnerabilities.

PROPOSED SYSTEM
Project proposed two new secure deployment algorithms, named SecureVor and SSD
(Secure Swap Deployment). These algorithms allow a sensor to detect compromised nodes by
analysing their movements, under different and complementary operative settings. We show that
the proposed algorithms are effective in defeating a barrier attack, and both have guaranteed
termination. We perform extensive simulations to study the performance of the two algorithms
and compare them with the original approach. Results show that SecureVor and SSD have better
robustness and flexibility, excellent coverage capabilities and deployment time, even in the
presence of an attack.

#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com

ADVANTAGES
Mobile sensors usually lack tamper-proof hardware, thus an adversary may capture
several nodes, extract their cryptographic material and reprogram them according to its
malicious goal. The reprogrammed sensors, hereafter called malicious sensors, may
perform several attacks to damage the network, exploiting the specific vulnerabilities of
the deployment algorithm in use.
Using a small set of malicious sensors, the attacker can influence the deployment of
legitimate sensors by exploiting the coordination mechanism of the self-deployment
approach. Malicious nodes may coordinate with each other to reduce the area in which
the legitimate sensors are deployed, thus creating a non-monitored zone.

#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com

You might also like