The document proposes techniques to estimate and characterize the impact of network hacking and source node failure in wireless sensor networks. It aims to enable problem-free data transfer through routing. The proposed approach uses constrained random routing and greedy techniques to constantly change the next hop instead of using a fixed route, confusing attackers from analyzing routes and tracing back to the source node. It formulates the traffic allocation problem using portfolio selection theory to optimize throughput performance while incorporating empirical jamming impact. Simulation results show the proposal can achieve high routing efficiency in multi-path transmission while preventing data loss from network attacks.
Related topics: