150 research outputs found
Distributed Intermittent Fault Diagnosis in Wireless Sensor Network Using Likelihood Ratio Test
In current days, sensor nodes are deployed in hostile environments for various military and commercial applications. Sensor nodes are becoming faulty and having adverse effects in the network if they are not diagnosed and inform the fault status to other nodes. Fault diagnosis is difficult when the nodes behave faulty some times and provide good data at other times. The intermittent disturbances may be random or kind of spikes either in regular or irregular intervals. In literature, the fault diagnosis algorithms are based on statistical methods using repeated testing or machine learning. To avoid more complex and time consuming repeated test processes and computationally complex machine learning methods, we proposed a one shot likelihood ratio test (LRT) here to determine the fault status of the sensor node. The proposed method measures the statistics of the received data over a certain period of time and then compares the likelihood ratio with the threshold value associated with a certain tolerance limit. The simulation results using a real time data set shows that the new method provides better detection accuracy (DA) with minimum false positive rate (FPR) and false alarm rate (FAR) over the modified three sigma test. LRT based hybrid fault diagnosis method detecting the fault status of a sensor node in wireless sensor network (WSN) for real time measured data with 100% DA, 0% FAR and 0% FPR if the probability of the data from faulty node exceeds 25%
Graded Reliance Based Routing Scheme for Wireless Sensor Networks
In this paper Graded Reliance based routing algorithm is proposed to deal with defective nodes in Wireless Sensor Networks (WSN’s).The algorithm is intended to validated or build evidence that, by dynamically learning from previous experience and adapting the changes in the operational environment the application performance can be maximized and also enhance operative agility. Quality of service and social network measures are used to evaluate the confidence score of the sensor node. A dynamic model-based analysis is formulated for best reliance composition, aggregation, and formation to maximize routing performance. The results indicate that reliance based routing approaches yields better performance in terms of message delivery ratio and message delay without incurring substantial message overhead
Machine Learning Methods for Monitoring of Quasi-Periodic Traffic in Massive IoT Networks
One of the central problems in massive Internet of Things (IoT) deployments
is the monitoring of the status of a massive number of links. The problem is
aggravated by the irregularity of the traffic transmitted over the link, as the
traffic intermittency can be disguised as a link failure and vice versa. In
this work we present a traffic model for IoT devices running quasi-periodic
applications and we present both supervised and unsupervised machine learning
methods for monitoring the network performance of IoT deployments with
quasi-periodic reporting, such as smart-metering, environmental monitoring and
agricultural monitoring. The unsupervised methods are based on the Lomb-Scargle
periodogram, an approach developed by astronomers for estimating the spectral
density of unevenly sampled time series
Ensuring the resilience of wireless sensor networks to malicious data injections through measurements inspection
Malicious data injections pose a severe threat to the systems based on \emph{Wireless Sensor Networks} (WSNs) since they give the attacker control over the measurements, and on the system's status and response in turn. Malicious measurements are particularly threatening when used to spoof or mask events of interest, thus eliciting or preventing desirable responses. Spoofing and masking attacks are particularly difficult to detect since they depict plausible behaviours, especially if multiple sensors have been compromised and \emph{collude} to inject a coherent set of malicious measurements.
Previous work has tackled the problem through \emph{measurements inspection}, which analyses the inter-measurements correlations induced by the physical phenomena. However, these techniques consider simplistic attacks and are not robust to collusion. Moreover, they assume highly predictable patterns in the measurements distribution, which are invalidated by the unpredictability of events.
We design a set of techniques that effectively \emph{detect} malicious data injections in the presence of sophisticated collusion strategies, when one or more events manifest.
Moreover, we build a methodology to \emph{characterise} the likely compromised sensors.
We also design \emph{diagnosis} criteria that allow us to distinguish anomalies arising from malicious interference and faults.
In contrast with previous work, we test the robustness of our methodology with automated and sophisticated attacks, where the attacker aims to evade detection. We conclude that our approach outperforms state-of-the-art approaches. Moreover, we estimate quantitatively the WSN degree of resilience and provide a methodology to give a WSN owner an assured degree of resilience by automatically designing the WSN deployment.
To deal also with the extreme scenario where the attacker has compromised most of the WSN, we propose a combination with \emph{software attestation techniques}, which are more reliable when malicious data is originated by a compromised software, but also more expensive, and achieve an excellent trade-off between cost and resilience.Open Acces
DESIGN OF MOBILE DATA COLLECTOR BASED CLUSTERING ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
Wireless Sensor Networks (WSNs) consisting of hundreds or even thousands of
nodes, canbe used for a multitude of applications such as warfare intelligence or to
monitor the environment. A typical WSN node has a limited and usually an
irreplaceable power source and the efficient use of the available power is of utmost
importance to ensure maximum lifetime of eachWSNapplication. Each of the nodes
needs to transmit and communicate sensed data to an aggregation point for use by
higher layer systems. Data and message transmission among nodes collectively
consume the largest amount of energy available in WSNs. The network routing
protocols ensure that every message reaches thedestination and has a direct impact on
the amount of transmissions to deliver messages successfully. To this end, the
transmission protocol within the WSNs should be scalable, adaptable and optimized
to consume the least possible amount of energy to suite different network
architectures and application domains. The inclusion of mobile nodes in the WSNs
deployment proves to be detrimental to protocol performance in terms of nodes
energy efficiency and reliable message delivery. This thesis which proposes a novel
Mobile Data Collector based clustering routing protocol for WSNs is designed that
combines cluster based hierarchical architecture and utilizes three-tier multi-hop
routing strategy between cluster heads to base station by the help of Mobile Data
Collector (MDC) for inter-cluster communication. In addition, a Mobile Data
Collector based routing protocol is compared with Low Energy Adaptive Clustering
Hierarchy and A Novel Application Specific Network Protocol for Wireless Sensor
Networks routing protocol. The protocol is designed with the following in mind:
minimize the energy consumption of sensor nodes, resolve communication holes
issues, maintain data reliability, finally reach tradeoff between energy efficiency and
latency in terms of End-to-End, and channel access delays. Simulation results have
shown that the Mobile Data Collector based clustering routing protocol for WSNs
could be easily implemented in environmental applications where energy efficiency of
sensor nodes, network lifetime and data reliability are major concerns
A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks
In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs
- …