D3: distributed approach for the detection of dumb nodes in wireless sensor networks

In this work, we propose D3—a distributed approach for the detection of ‘dumb’ nodes in a wireless sensor network (WSN). A dumb node can sense its surroundings, but is unable to transmit these sensed data to any other node, due to the sudden onset of adverse environmental effects. However, such a node resumes its normal operations with the resumption of favorable environmental conditions. Due to the presence of dumb nodes, the network is unable to provide the expected services. Therefore, it is prudent to re‐establish connectivity between dumb and other nodes, so that sensed data can be reliably transmitted to the sink. Before the re‐establishment of connectivity, a node needs to confirm its actual state of being dumb. Dumb behavior is dynamic in nature, and is, thus, distinct from the traditional node isolation problem considered in stationary WSNs. Therefore, the existing schemes for the detection of other misbehaviors are not applicable for detecting a dumb node in a WSN. Considering this temporal behavior of a dumb node, we propose an approach, D3, for the detection of dumb nodes. In the propose scheme, we uses cumulative sum test, which helps in detecting the dumb behavior. The simulation results show that there is 56% degradation in detection percentage with the increment in the detection threshold, whereas energy consumption and the message overhead increase by 40% with the increment in detection threshold.

[1]  Derek Bissell Statistical Methods for SPC and TQM , 1994 .

[2]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[3]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[4]  Giuseppe Anastasi,et al.  Performance measurements of motes sensor networks , 2004, MSWiM '04.

[5]  Giuseppe Anastasi,et al.  Performance Measurements of Mote Sensor Networks , 2004 .

[6]  S. Sitharama Iyengar,et al.  Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks , 2004, IEEE Transactions on Computers.

[7]  Shuangqing Wei,et al.  Analysis of communication vulnerability through misbehavior in wireless and sensor networks , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[8]  Ming Dong,et al.  On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.

[9]  Qin Wang,et al.  A Realistic Power Consumption Model for Wireless Sensor Network Devices , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[10]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[11]  S. Gupta,et al.  Wireless Sensor Networking for "Hot" Applications: Effects of Temperature on Signal Strength, Data Collection and Localization , 2008 .

[12]  E. Leitgeb,et al.  Comparing the Life Time of Terrestrial Wireless Sensor Networks by Employing Hybrid FSO/RF and Only RF Access Networks , 2009, 2009 Fifth International Conference on Wireless and Mobile Communications.

[13]  Rung Ching Chen,et al.  A new method for intrusion detection on hierarchical wireless sensor networks , 2009, ICUIMC '09.

[14]  Ramesh Govindan,et al.  Sensor faults: Detection methods and prevalence in real-world datasets , 2010, TOSN.

[15]  James Brown,et al.  The Impact of Temperature on Outdoor Industrial Sensornet Applications , 2010, IEEE Transactions on Industrial Informatics.

[16]  Subhash Suri,et al.  Catching elephants with mice: Sparse sampling for monitoring sensor networks , 2009, TOSN.

[17]  Marimuthu Palaniswami,et al.  Elliptical anomalies in wireless sensor networks , 2009, TOSN.

[18]  Jie Xu,et al.  Distributed service integration for disaster monitoring sensor systems , 2011, IET Commun..

[19]  Rajesh K. Gupta,et al.  Path Planning of Data Mules in Sensor Networks , 2011, TOSN.

[20]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[21]  Kanghee Lee,et al.  Noncooperative distributed MMSE relay schemes under jamming environment and node geometry in wireless relay networks , 2011, 2011 Wireless Telecommunications Symposium (WTS).

[22]  Sudip Misra,et al.  Localized policy-based target tracking using wireless sensor networks , 2012, TOSN.

[23]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[24]  Xu Huang,et al.  Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory , 2012, ICA3PP.

[25]  Hongwei Zhang,et al.  NetEye: a user-centered wireless sensor network testbed for high-fidelity, robust experimentation , 2012, Int. J. Commun. Syst..

[26]  Zhikui Chen,et al.  An energy efficient medium access control protocol for target tracking based on dynamic convey tree collaboration in wireless sensor networks , 2012, Int. J. Commun. Syst..

[27]  Mort Naraghi-Pour,et al.  Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes , 2013, IEEE Transactions on Information Forensics and Security.

[28]  Pawel Kulakowski,et al.  Performance study of wireless sensor and actuator networks in forest fire scenarios , 2013, Int. J. Commun. Syst..

[29]  John E. Mitchell,et al.  AS-MAC , 2013, ACM Trans. Sens. Networks.

[30]  Noureddine Boudriga,et al.  Game theory for misbehaving detection in wireless sensor networks , 2013, The International Conference on Information Networking 2013 (ICOIN).

[31]  Simon A. Dobson,et al.  Failure detection in wireless sensor networks: A sequence-based dynamic approach , 2014, TOSN.

[32]  Sudip Misra,et al.  Connectivity Re-establishment in the Presence of Dumb Nodes in Sensor-Cloud Infrastructure: A Game Theoretic Approach , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.

[33]  Sudip Misra,et al.  Detection of dumb nodes in a stationary wireless sensor network , 2014, 2014 Annual IEEE India Conference (INDICON).

[34]  Sudip Misra,et al.  Social choice considerations in cloud-assisted WBAN architecture for post-disaster healthcare: Data aggregation and channelization , 2014, Inf. Sci..

[35]  Hongbin Chen,et al.  An indicator kriging method for distributed estimation in wireless sensor networks , 2014, Int. J. Commun. Syst..

[36]  Mohammad S. Obaidat,et al.  Existence of dumb nodes in stationary wireless sensor networks , 2014, J. Syst. Softw..

[37]  Weihua Zhuang,et al.  Real-Time Misbehavior Detection in IEEE 802.11-Based Wireless Networks: An Analytical Approach , 2014, IEEE Transactions on Mobile Computing.

[38]  Sudip Misra,et al.  CURD: Controllable reactive jamming detection in underwater sensor networks , 2014, Pervasive Mob. Comput..

[39]  Sudip Misra,et al.  Distributed topology management for wireless multimedia sensor networks: exploiting connectivity and cooperation , 2015, Int. J. Commun. Syst..