Energy-efficient node position identification through payoff matrix and variability analysis

Applications for mobile ad-hoc networks are heavily dependent on information about the nodes positions. Since the network may include malicious nodes providing bogus data (e.g., fake positions), the reliability of this information is critical. Although this problem has been addressed by some predictive models, challenges still exist regarding (a) the accuracy/security of such models, (b) the potential advantages of combining different prediction models, (c) the power consumption resulting from the simultaneous application of multiple models, and (d) the lack of strategic approaches in the analysis of information aiming to find the most advantageous data and balance divergent results. To address these issues, we analyze in this paper the performance of two prediction methods: linear regression and Grey model. We have evaluated their corresponding energy costs for reliably identifying each node position. The results, obtained via simulations, are added to independent vectors and statistical indicators are gathered to create a game theory payoff matrix. The proposed model allows the evaluation of the predictive methods either individually or collectively, facilitating the identification of the best parameters for a target energy saving profile.

[1]  Yunhao Liu,et al.  Perpendicular Intersection: Locating Wireless Sensors With Mobile Beacon , 2010 .

[2]  Ling Huang,et al.  Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression , 2010, NIPS.

[3]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[4]  Xuemin Shen,et al.  EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[5]  Aihua Yu,et al.  Research into Positioning of the Least Square Support Vector Machine based on Fisher Fishing in WSN , 2016 .

[6]  Sarit Kraus,et al.  On Self-Interested Agents in Vehicular Networks With Car-to-Car Gossiping , 2008, IEEE Transactions on Vehicular Technology.

[7]  Wenjing Yang,et al.  CMTG: A Content-Based Mobile Tendency Geocast Routing Protocol in Urban Vehicular Networks , 2015, Int. J. Distributed Sens. Networks.

[8]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[9]  Pedro A. Morettin,et al.  Previsão de séries temporais , 1985 .

[10]  Tommy Svensson,et al.  Spatial Wireless Channel Prediction under Location Uncertainty , 2015, IEEE Transactions on Wireless Communications.

[11]  Jingsha He,et al.  Reputation-Based Secure Sensor Localization in Wireless Sensor Networks , 2014, TheScientificWorldJournal.

[12]  Fang-Mei Tseng,et al.  Applied Hybrid Grey Model to Forecast Seasonal Time Series , 2001 .

[13]  Farouk Kamoun,et al.  Microsoft Word-V1-I1-P95-101 , 2010 .

[14]  Jean-Michel Dricot,et al.  A modular framework for user localization and tracking using machine learning techniques in wireless sensor networks , 2008 .

[15]  Qi Han,et al.  A RSSI-Based Distributed Weighted Search Localization Algorithm for WSNs , 2015, Int. J. Distributed Sens. Networks.

[16]  H. Bierman,et al.  Game theory with economic applications , 1993 .

[17]  Athanasios V. Vasilakos,et al.  Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks , 2015, IEEE Transactions on Computers.

[18]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[19]  Okyay Kaynak,et al.  Grey system theory-based models in time series prediction , 2010, Expert Syst. Appl..

[20]  Nei Kato,et al.  A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[21]  Ishfaq Ahmad,et al.  A Cooperative Game Theoretical Technique for Joint Optimization of Energy Consumption and Response Time in Computational Grids , 2009, IEEE Transactions on Parallel and Distributed Systems.

[22]  Dan Pescaru,et al.  Anchor Node Localization for Wireless Sensor Networks Using Video and Compass Information Fusion , 2014, Sensors.

[23]  Qingzhang Chen,et al.  Collaborative Localization and Location Verification in WSNs , 2015, Sensors.

[24]  Lars C. Wolf,et al.  Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[25]  Sergio Takeo Kofuji,et al.  Grey model and polynomial regression for identifying malicious nodes in MANETs , 2014, 2014 IEEE Global Communications Conference.

[26]  Antonio Liotta,et al.  Spatial anomaly detection in sensor networks using neighborhood information , 2017, Inf. Fusion.

[27]  S. P. Shantharajah,et al.  Energy efficient Localization Technique in Wireless Sensor Network , 2013 .

[28]  Dhadesugoor R. Vaman,et al.  Distributed Position Localization and Tracking (DPLT) of Malicious Nodes in Cluster Based Mobile Ad hoc Networks (MANET) , 2012, ArXiv.

[29]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[30]  Thomas C. Henderson,et al.  Target Localization and Autonomous Navigation Using Wireless Sensor Networks—A Pseudogradient Algorithm Approach , 2014, IEEE Systems Journal.

[31]  Simin Nadjm-Tehrani,et al.  Geographical Routing With Location Service in Intermittently Connected MANETs , 2011, IEEE Transactions on Vehicular Technology.

[32]  Pierre L'Ecuyer,et al.  Good Parameters and Implementations for Combined Multiple Recursive Random Number Generators , 1999, Oper. Res..

[33]  J. Deng,et al.  Introduction to Grey system theory , 1989 .

[34]  Ashwin Rao,et al.  Performance of Node-Eviction Schemes in Vehicular Networks , 2010, IEEE Transactions on Vehicular Technology.

[35]  M. B. Nirmala,et al.  Enhanced Voting based Secure Localization for Wireless Sensor Networks , 2015 .

[36]  Nicola Basilico,et al.  Security Games for Node Localization through Verifiable Multilateration , 2014, IEEE Transactions on Dependable and Secure Computing.

[37]  Li-yun Su,et al.  Prediction of multivariate chaotic time series with local polynomial fitting , 2010, Comput. Math. Appl..

[38]  Silvia Santini,et al.  Adaptive model selection for time series prediction in wireless sensor networks , 2007, Signal Process..

[39]  N. Draper,et al.  Applied Regression Analysis , 1966 .

[40]  X. H. Tan,et al.  Allocation of transmission loss cost using cooperative game theory in the context of open transmission access , 2001, 2001 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.01CH37194).

[41]  Uday B. Desai,et al.  Distributed Power Allocation for Secondary Users in a Cognitive Radio Scenario , 2012, IEEE Transactions on Wireless Communications.

[42]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[43]  Vikrant Bhateja,et al.  Proceedings of the Second International Conference on Computer and Communication Technologies , 2016 .

[44]  L. Yann-Ael,et al.  Round Robin Cycle for Predictions in Wireless Sensor Networks , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[45]  L. El Ghaoui,et al.  Convex position estimation in wireless sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[46]  Lei Shi,et al.  A Multicontroller Load Balancing Approach in Software-Defined Wireless Networks , 2015, Int. J. Distributed Sens. Networks.

[47]  Yunhao Liu,et al.  Understanding Node Localizability of Wireless Ad Hoc and Sensor Networks , 2012, IEEE Transactions on Mobile Computing.

[48]  Xiaohong Jiang,et al.  Reliability Assessment for Wireless Mesh Networks Under Probabilistic Region Failure Model , 2011, IEEE Transactions on Vehicular Technology.

[49]  Donggang Liu,et al.  Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.

[50]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[51]  Xiong Luo,et al.  A novel data fusion scheme using grey model and extreme learning machine in wireless sensor networks , 2015 .

[52]  Silan Zhang,et al.  On the System of Diophantine Equations x 2 − 6y 2 = −5 and x = az 2 − b , 2014, TheScientificWorldJournal.

[53]  Prasanta K. Jana,et al.  Genetic Algorithm for k-Connected Relay Node Placement in Wireless Sensor Networks , 2016 .