Distributed Faulty Node Detection in Delay Tolerant Networks: Design and Analysis

Propagation of faulty data is a critical issue. In case of Delay Tolerant Networks (DTN) in particular, the rare meeting events require that nodes are efficient in propagating only correct information. For that purpose, mechanisms to rapidly identify possible faulty nodes should be developed. Distributed faulty node detection has been addressed in the literature in the context of sensor and vehicular networks, but already proposed solutions suffer from long delays in identifying and isolating nodes producing faulty data. This is unsuitable to DTNs where nodes meet only rarely. This paper proposes a fully distributed and easily implementable approach to allow each DTN node to rapidly identify whether its sensors are producing faulty data. The dynamical behavior of the proposed algorithm is approximated by some continuous-time state equations, whose equilibrium is characterized. The presence of misbehaving nodes, trying to perturb the faulty node detection process, is also taken into account. Detection and false alarm rates are estimated by comparing both theoretical and simulation results. Numerical results assess the effectiveness of the proposed solution and can be used to give guidelines for the algorithm design.

[1]  Thierry Turletti,et al.  Routing in Delay-Tolerant Networks Comprising Heterogeneous Node Populations , 2009, IEEE Transactions on Mobile Computing.

[2]  Adam Shwartz,et al.  Large Deviations For Performance Analysis , 2019 .

[3]  Gao Jian-Liang,et al.  Weighted-Median Based Distributed Fault Detection for Wireless Sensor Networks , 2007 .

[4]  Thomas G. Kurtz,et al.  The Central Limit Theorem for Markov Chains , 1981 .

[5]  Laura Galluccio,et al.  Sociality-Aided New Adaptive Infection Recovery Schemes for Multicast DTNs , 2016, IEEE Transactions on Vehicular Technology.

[6]  S. Banach Sur les opérations dans les ensembles abstraits et leur application aux équations intégrales , 1922 .

[7]  Sai Ji,et al.  Distributed Fault Detection for Wireless Sensor Based on Weighted Average , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[8]  Baochun Li,et al.  Stochastic analysis of network coding in epidemic routing , 2008, IEEE Journal on Selected Areas in Communications.

[9]  Juan-Carlos Cano,et al.  CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes , 2015, IEEE Transactions on Mobile Computing.

[10]  Mianxiong Dong,et al.  Congestion‐aware message forwarding in delay tolerant networks: a community perspective , 2015, Concurr. Comput. Pract. Exp..

[11]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[12]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[13]  Luc Jaulin,et al.  Applied Interval Analysis , 2001, Springer London.

[14]  Huijun Gao,et al.  A Survey on Distributed Filtering and Fault Detection for Sensor Networks , 2014 .

[15]  Erman Ayday,et al.  An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.

[16]  Tongtong Li,et al.  Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[17]  M. Newman Spread of epidemic disease on networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[18]  Alan Weiss,et al.  Large Deviations For Performance Analysis: Queues, Communication and Computing , 1995 .

[19]  Sophie Fosson,et al.  A Distributed Classification/Estimation Algorithm for Sensor Networks , 2014, SIAM J. Control. Optim..

[20]  Bing Zhu,et al.  Distributed faulty node detection and isolation in delay-tolerant vehicular sensor networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[21]  Eduardo F. Nakamura,et al.  Information fusion for wireless sensor networks: Methods, models, and classifications , 2007, CSUR.

[22]  Arun Somani,et al.  Distributed fault detection of wireless sensor networks , 2006, DIWANS '06.

[23]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[24]  Alessandro Chiuso,et al.  Gossip Algorithms for Simultaneous Distributed Estimation and Classification in Sensor Networks , 2011, IEEE Journal of Selected Topics in Signal Processing.

[25]  Minglu Li,et al.  Recognizing Exponential Inter-Contact Time in VANETs , 2010, 2010 Proceedings IEEE INFOCOM.

[26]  David R. Appleton,et al.  Modelling Biological Populations in Space and Time , 1993 .

[27]  Chiara Ravazzi,et al.  CONSENSUS-LIKE ALGORITHMS FOR ESTIMATION OF GAUSSIAN MIXTURES OVER LARGE SCALE NETWORKS , 2014 .

[28]  Eitan Altman,et al.  Tracking Message Spread in Mobile Delay Tolerant Networks , 2015, IEEE Transactions on Mobile Computing.

[29]  Mohsen Guizani,et al.  An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network , 2015, IEEE Transactions on Mobile Computing.

[30]  Zygmunt J. Haas,et al.  A new networking model for biological applications of ad hoc sensor networks , 2006, IEEE/ACM Transactions on Networking.

[31]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[32]  Jie Wu,et al.  Behavioral Malware Detection in Delay Tolerant Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[33]  Joel J. P. C. Rodrigues,et al.  GeoSpray: A geographic routing protocol for vehicular delay-tolerant networks , 2014, Inf. Fusion.

[34]  Pan Hui,et al.  CRAWDAD dataset cambridge/haggle (v.2009-05-29) , 2009 .

[35]  W. O. Kermack,et al.  A contribution to the mathematical theory of epidemics , 1927 .

[36]  K. Deimling Fixed Point Theory , 2008 .

[37]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[38]  Chadi Assi,et al.  Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges , 2012, IEEE Communications Surveys & Tutorials.

[39]  Joan Triay,et al.  From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks , 2012, IEEE Communications Surveys & Tutorials.

[40]  Davide Dardari,et al.  Defective Sensor Identification for WSNs Involving Generic Local Outlier Detection Tests , 2016, IEEE Transactions on Signal and Information Processing over Networks.

[41]  J. Norton,et al.  Bounding Approaches to System Identification , 1996 .

[42]  Manju Bala,et al.  Fault Diagnosis in Wireless Sensor Networks - A Survey , 2018, 2018 4th International Conference on Computing Sciences (ICCS).

[43]  Yue Liu,et al.  The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities , 2014, IEEE Transactions on Mobile Computing.

[44]  Pabitra Mohan Khilar,et al.  Distributed self fault diagnosis algorithm for large scale wireless sensor networks using modified three sigma edit test , 2015, Ad Hoc Networks.

[45]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .