Epidemic data survivability in unattended wireless sensor networks

Roberto Di Pietro, Nino Vincenzo Verde

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations


A recent research thread focused on Unattended Wireless Sensor Networks (UWSNs), that are characterized by the intermittent presence of the sink. An adversary can take advantage of this behavior trying to erase a piece of information sensed by the network before the sink collects it. Therefore, without a mechanism in place to assure data availability, the sink will not ever know that a datum has been compromised. In this paper, we adopt data replication to assure data survivability in UWSNs. In particular, we revisit an epidemic model and show that, even if the data replication process can be modelled as the spreading of a disease in a finite population, new problems that have not been discovered before arise: optimal parameters choice for the model do not assure the intended data survivability. The problem is complicated by the fact that it is driven by two conflicting parameters: On the one hand the flooding of the datum has to be avoided - due to the sensor resource constraints -, while on the other hand data survivability depends on the data replication rate. Using advanced probabilistic tools we achieve a theoretically sound result that assures at the same time: Data survivability, an optimal usage of sensors resources, and a fast and predictable collecting time. These results have been achieved in both the full visibility and the geometrical model. Finally, extensive simulation results support our findings. Copyright © 2011 ACM.
Original languageEnglish (US)
Title of host publicationWiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security
Number of pages12
StatePublished - Aug 25 2011
Externally publishedYes

Bibliographical note

Generated from Scopus record by KAUST IRTS on 2023-09-20


Dive into the research topics of 'Epidemic data survivability in unattended wireless sensor networks'. Together they form a unique fingerprint.

Cite this