Detouring dynamic routing holes in stationary wireless sensor networks in the presence of temporarily misbehaving nodes

Summary In this work, we propose a scheme, named BRIDGE, to bypass dynamic routing holes arising in stationary wireless sensor networks in the presence of temporarily misbehaving nodes such as dumb [1, 2] or transfaulty nodes. The affected nodes behave normally after the resumption of favorable environmental conditions. Therefore, both dumb and transfaulty behaviors of sensor nodes are dynamic in nature. The nodes in these networks get temporarily isolated from the network, when they behave as dumb or transfaulty. Because of the presence of nodes with such behavior, dynamic communication holes may occur in the network, which are formed or removed and thus increase or decrease in size with time. Connectivity re-establishment procedures can mitigate holes by re-connecting isolated nodes with the network after activating the intermediate sleep nodes, adjusting the communication range of intermediate nodes, or by using an alternative communication mode. However, such procedures cannot always re-establish connectivity because of the lack of neighbor nodes in reduced or adjusted communication range. Therefore, routing schemes using greedy forwarding approaches need to bypass holes to avoid the data packets from getting stuck at the boundary nodes and efficiently delivering them to the sink. However, the existing hole avoidance schemes consider holes as static. The proposed scheme, BRIDGE, detects hole boundary and bypasses routing traffics in the dynamic hole scenario. In the proposed scheme, a boundary node selects the next hop based on the minimum distance from all the neighbor nodes to the destination node, although this minimum distance is more than the distance to the destination from the node itself. Simulation results show that the performance of the proposed scheme degrades with the increase in hole area. Copyright © 2015 John Wiley & Sons, Ltd.

[1]  S. Gupta,et al.  Wireless Sensor Networking for "Hot" Applications: Effects of Temperature on Signal Strength, Data Collection and Localization , 2008 .

[2]  Herbert Shea,et al.  Radiation sensitivity of microelectromechanical system devices , 2009 .

[3]  L. D. Edmonds,et al.  Radiation effects in micro-electromechanical systems (MEMS): RF relays , 2002 .

[4]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[5]  Andy Hopper,et al.  A new location technique for the active office , 1997, IEEE Wirel. Commun..

[6]  Helena Szczerbicka,et al.  AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.

[7]  J. Barth,et al.  Space, atmospheric, and terrestrial radiation environments , 2003 .

[8]  Minyi Guo,et al.  Hole Avoiding in Advance Routing in Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[9]  Giuseppe Anastasi,et al.  Energy management in wireless sensor networks with energy-hungry sensors , 2009, IEEE Instrumentation & Measurement Magazine.

[10]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[11]  Mohammad S. Obaidat,et al.  Existence of dumb nodes in stationary wireless sensor networks , 2014, J. Syst. Softw..

[12]  Noel E. O'Connor,et al.  Low-Energy Symmetric Key Distribution in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[13]  Weili Wu,et al.  Energy-efficient target coverage in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[14]  Azzedine Boukerche,et al.  Localized Routing Approach to Bypass Holes in Wireless Sensor Networks , 2014, IEEE Transactions on Computers.

[15]  Haojun Huang,et al.  Energy‐aware geographic routing in wireless sensor networks with anchor nodes , 2013, Int. J. Commun. Syst..

[16]  Ye Tian,et al.  Efficient Hole Detour Scheme for Geographic Routing in Wireless Sensor Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[17]  Jang-Ping Sheu,et al.  Hole detection and boundary recognition in wireless sensor networks , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[18]  Rajashekhar C. Biradar,et al.  Secured routing in wireless sensor networks using fault‐free and trusted nodes , 2016, Int. J. Commun. Syst..

[19]  James Brown,et al.  The Impact of Temperature on Outdoor Industrial Sensornet Applications , 2010, IEEE Transactions on Industrial Informatics.

[20]  Mani B. Srivastava,et al.  Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.

[21]  Sanjay Jha,et al.  The holes problem in wireless sensor networks: a survey , 2005, MOCO.

[22]  Ramesh Govindan,et al.  Sensor faults: Detection methods and prevalence in real-world datasets , 2010, TOSN.

[23]  R.R. Selmic,et al.  Wireless Sensor Network Modeling Using Modified Recurrent Neural Networks: Application to Fault Detection , 2008, 2007 IEEE International Conference on Networking, Sensing and Control.

[24]  Mohammad S. Obaidat,et al.  A probabilistic zonal approach for swarm-inspired wildfire detection using sensor networks , 2008 .

[25]  Leonidas J. Guibas,et al.  Locating and bypassing routing holes in sensor networks , 2004, IEEE INFOCOM 2004.

[26]  Sudip Misra,et al.  Distributed topology management for wireless multimedia sensor networks: exploiting connectivity and cooperation , 2015, Int. J. Commun. Syst..

[27]  Naixue Xiong,et al.  An energy-efficient scheme in next-generation sensor networks , 2010 .

[28]  Ing-Ray Chen,et al.  Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[29]  Jun Zheng,et al.  Geographic hole-bypassing forwarding protocol for wireless sensor networks , 2011, IET Commun..

[30]  Shiow-Fen Hwang,et al.  Energy efficient hole bypassing routing in wireless sensor networks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[31]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[32]  Mohammad S. Obaidat,et al.  D3: distributed approach for the detection of dumb nodes in wireless sensor networks , 2017, Int. J. Commun. Syst..

[33]  Subhash Suri,et al.  Catching elephants with mice: Sparse sampling for monitoring sensor networks , 2009, TOSN.

[34]  László Czap,et al.  Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes , 2011, IEEE Transactions on Dependable and Secure Computing.

[35]  Vaios Lappas,et al.  Characterising Wireless Sensor Motes for Space Applications , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).