Detection of dumb nodes in a stationary wireless sensor network

A sensor node is termed as “dumb” [1], if at a certain time instant it can sense its surroundings, but is unable to communicate with any of its neighbors due to the shrinkage in communication range. Such isolation occurs because of the presence of adverse environmental effects. However, the node starts its normal operation with the resumption of favorable environmental conditions. Thus, the detection of dumb nodes is essential in order to re-establish network connectivity. However, the temporal behavior of a dumb node in a network makes the detection of such a node challenging. In the present work, we address a plausible solution to this problem by taking into account the evidences from neighboring nodes.

[1]  Mohammad S. Obaidat,et al.  Existence of dumb nodes in stationary wireless sensor networks , 2014, J. Syst. Softw..

[2]  Mort Naraghi-Pour,et al.  Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes , 2013, IEEE Transactions on Information Forensics and Security.

[3]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[4]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[5]  Rung Ching Chen,et al.  A new method for intrusion detection on hierarchical wireless sensor networks , 2009, ICUIMC '09.

[6]  Sudip Misra,et al.  Distributed topology management for wireless multimedia sensor networks: exploiting connectivity and cooperation , 2015, Int. J. Commun. Syst..

[7]  Xu Huang,et al.  Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory , 2012, ICA3PP.

[8]  Marimuthu Palaniswami,et al.  Elliptical anomalies in wireless sensor networks , 2009, TOSN.

[9]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[10]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[11]  Simon A. Dobson,et al.  Failure detection in wireless sensor networks: A sequence-based dynamic approach , 2014, TOSN.

[12]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[13]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[14]  Qin Wang,et al.  A Realistic Power Consumption Model for Wireless Sensor Network Devices , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[15]  Shuangqing Wei,et al.  Analysis of communication vulnerability through misbehavior in wireless and sensor networks , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[16]  James Brown,et al.  The Impact of Temperature on Outdoor Industrial Sensornet Applications , 2010, IEEE Transactions on Industrial Informatics.

[17]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.