Provable configuration planning for wireless sensor networks

  • Qi Duan*
  • , Saeed Al-Haj
  • , Ehab Al-Shaer
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Wireless Sensor Networks (WSNs) provide a flexible communication infrastructure for sensing and control. However, maintaining coverage is one of the most challenging tasks in configuring and deploying WSNs. Although there has been a significant amount research on providing coverage, most of the existing solutions focus on the coverage problem without giving attention to new sensing capabilities and dependability (security and reliability) requirements of WSN. Nevertheless, most of the existing techniques show limited scalability with the increasing number of sensors. In this paper, we present novel Satisfiability Modulo Theories (SMT) based formalizations to find the satisfying coverage configurations considering various practical security and reliability constraints. The presented approaches were implemented using Yices SMT Solver and evaluated extensively to show the feasibility and scalability of deploying our solutions in real-life WSN.

Original languageEnglish
Title of host publicationProceedings of the 2012 8th International Conference on Network and Service Management, CNSM 2012
Pages316-321
Number of pages6
StatePublished - 2012
Externally publishedYes
Event2012 8th International Conference on Network and Service Management, CNSM 2012 - Las Vegas, NV, United States
Duration: 22 Oct 201226 Oct 2012

Publication series

NameProceedings of the 2012 8th International Conference on Network and Service Management, CNSM 2012

Conference

Conference2012 8th International Conference on Network and Service Management, CNSM 2012
Country/TerritoryUnited States
CityLas Vegas, NV
Period22/10/1226/10/12

Keywords

  • Formal Methods
  • Network Management
  • SMT
  • Wireless Sensor Network

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Provable configuration planning for wireless sensor networks'. Together they form a unique fingerprint.

Cite this