Existence of dumb nodes in stationary wireless sensor networks

Wireless sensor networks (WSNs), which are typically autonomous and unattended, require energy-efficient and fault-tolerant protocols to maximize the network lifetime and operations. In this work, we consider a previously unexplored aspect of the sensing nodes - dumb behavior. A sensor node is termed as ''dumb'', when it can sense its surroundings, but cannot communicate with its neighbors due to shrinkage in communication range attributed to adverse environmental effects and can behave normally in the presence of favorable environment. As a result of this temporary behavior, a node may get isolated from the network when adverse environmental effects are present, but re-connects with the network with the resumption of favorable environmental conditions. We consider the effects of dumb nodes on the, otherwise, energy-efficient stationary WSNs having complete network coverage achieved using sufficient number of activated sensor nodes. While the presence of redundancy in the deployment of nodes, or the number of active nodes can guarantee communication opportunities, such deployment is not necessarily energy-efficient and cost-effective. The dumb behavior of nodes results in wastage of power, thereby reducing the lifetime of a network. Such effects can be detrimental to the performance of WSN applications. The simulation results exhibit that the network performance degrades in the presence of dumb nodes in stationary WSNs.

[1]  Shashidhar Gandham,et al.  STCP: a generic transport layer protocol for wireless sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..

[2]  Vivek Tiwari,et al.  Lacas: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks , 2009, IEEE Journal on Selected Areas in Communications.

[3]  Mohammad S. Obaidat,et al.  A probabilistic zonal approach for swarm-inspired wildfire detection using sensor networks , 2008, Int. J. Commun. Syst..

[4]  Elizabeth M. Belding-Royer,et al.  AODV routing protocol implementation design , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[5]  Xin He,et al.  The Optimized Deployment Scheme to Maintain Connectivity in Wireless Sensor Networks , 2010, 2010 International Conference on Machine Vision and Human-machine Interface.

[6]  Xin Liu Coverage with Connectivity in Wireless Sensor Networks , 2006, 2006 3rd International Conference on Broadband Communications, Networks and Systems.

[7]  Jeff Frolik,et al.  Effects of natural propagation environments on wireless sensor network coverage area , 2003, Proceedings of the 35th Southeastern Symposium on System Theory, 2003..

[8]  Sneha Kumar Kasera,et al.  Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.

[9]  Mohammad S. Obaidat,et al.  An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks , 2009, Secur. Commun. Networks.

[10]  Sudip Misra,et al.  Localized policy-based target tracking using wireless sensor networks , 2012, TOSN.

[11]  Mohammad S. Obaidat,et al.  Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks , 2011, Comput. Commun..

[12]  Madjid Merabti,et al.  Monitoring connectivity in wireless sensor networks , 2009, 2009 IEEE Symposium on Computers and Communications.

[13]  Antonio Alfredo Ferreira Loureiro,et al.  Fault management in event-driven wireless sensor networks , 2004, MSWiM '04.

[14]  Mort Naraghi-Pour,et al.  Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes , 2013, IEEE Transactions on Information Forensics and Security.

[15]  Sudip Misra,et al.  REEP: data-centric, energy-efficient and reliable routing protocol for wireless sensor networks , 2008, IET Commun..

[16]  B. John Oommen,et al.  Random Early Detection for Congestion Avoidance in Wired Networks: A Discretized Pursuit Learning-Automata-Like Solution , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[17]  Sudip Misra,et al.  Policy controlled self-configuration in unattended wireless sensor networks , 2011, J. Netw. Comput. Appl..

[18]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[19]  Qi Han,et al.  Journal of Network and Systems Management ( c ○ 2007) DOI: 10.1007/s10922-007-9062-0 A Survey of Fault Management in Wireless Sensor Networks , 2022 .

[20]  Hongwei Zhang,et al.  Reliable bursty convergecast in wireless sensor networks , 2005, MobiHoc '05.

[21]  Qin Guihe,et al.  Fault Management Frameworks in Wireless Sensor Networks , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.

[22]  Stefano Chessa,et al.  The Effects of Weather on the Life Time of Wireless Sensor Networks Using FSO/RF Communication , 2010 .

[23]  Qi Han,et al.  Dealing with Faults in Wireless Sensor Networks , 2007 .

[24]  Niki Pissinou,et al.  Mitigating routing misbehavior in multi-hop networks using evolutionary game theory , 2010, 2010 IEEE Globecom Workshops.

[25]  Mohammad Reza Aref,et al.  Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[26]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[27]  Ding-Zhu Du,et al.  Improving Wireless Sensor Network Lifetime through Power Aware Organization , 2005, Wirel. Networks.

[28]  P. Venkata Krishna,et al.  An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks , 2010, Comput. Math. Appl..

[29]  Mohammad S. Obaidat,et al.  A probabilistic zonal approach for swarm-inspired wildfire detection using sensor networks , 2008 .

[30]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[31]  Giuseppe Anastasi,et al.  Performance measurements of motes sensor networks , 2004, MSWiM '04.

[32]  Helena Szczerbicka,et al.  AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.

[33]  Sudip Misra,et al.  Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks , 2010, Comput. Electr. Eng..

[34]  Daniel Brissaud,et al.  An environmental assessment method for wireless sensor networks , 2012 .

[35]  Mohammad S. Obaidat,et al.  EEAODR: An energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks , 2009 .

[36]  Shuangqing Wei,et al.  Analysis of communication vulnerability through misbehavior in wireless and sensor networks , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[37]  Ian F. Akyildiz,et al.  A scalable approach for reliable downstream data delivery in wireless sensor networks , 2004, MobiHoc '04.

[38]  Xiaohong Guan,et al.  Reliable Transport with Memory Consideration in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.

[39]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[40]  Chenyang Lu,et al.  SPEED: a stateless protocol for real-time communication in sensor networks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[41]  S. Gupta,et al.  Wireless Sensor Networking for "Hot" Applications: Effects of Temperature on Signal Strength, Data Collection and Localization , 2008 .

[42]  Yoon-Hwa Choi,et al.  Neighbor-Based Malicious Node Detection in Wireless Sensor Networks , 2012 .

[43]  Hongwei Zhang,et al.  Reliable bursty convergecast in wireless sensor networks , 2007, Comput. Commun..

[44]  Mohammad S. Obaidat,et al.  FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks , 2008, Comput. Commun..

[45]  P. Venkata Krishna,et al.  LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.

[46]  James Brown,et al.  The Impact of Temperature on Outdoor Industrial Sensornet Applications , 2010, IEEE Transactions on Industrial Informatics.