scholarly journals Data Reliability Analysis of Wireless Sensor Nodes considering Perturbation

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Shukun Jin ◽  
Yawen Xie ◽  
Yanzi Gao ◽  
Guohui Zhou ◽  
Wei Zhang ◽  
...  

Wireless Sensor Network (WSN) is widely used in precision engineering, which requires strict data accuracy. Therefore, it is of practical value to evaluate the reliability of WSN data. Considering the complexity of the real environment, the sensor is bound to be affected by the disturbance factors. Currently, the research result of WSN data disturbance is not ideal. Because the results of reliability analysis are not necessarily credible under a disturbance environment. Thus, it is necessary to judge the reliability of sensor nodes in the disturbance environment. Therefore, disturbance analysis is introduced. In this paper, the temporal correlation and spatial correlation of measured data of WSN nodes are taken as reliability indicators. Through the disturbance analysis method to simulate the disturbance in the working process of nodes, a data reliability evaluation model of WSN nodes is proposed, which is based on the evidence reasoning (ER) rule in the disturbance environment. Based on the wireless sensor experiment of the Intel Berkeley research laboratory, the rationality of the model is explained in this paper. ER rule considering disturbance provides an effective method to analyze the reliability of WSN data.

2013 ◽  
Vol 846-847 ◽  
pp. 442-445
Author(s):  
Chun Lin He

The fault diagnosis technology have emerged and developed rapidly with the development of wireless sensor networks and requirements of applications improve. This paper describes two commonly used sensor network fault modeling. What is more, in order to solve this problem that sensor nodes are vulnerable and therefore produce wrong data, the paper proposes a distributed fault detecting algorithm based on spatio-temporal correlation among data of adjacent nodes. The simulation experiment shows that the algorithm can efficiently detect errors in the network and very few errors are introduced.


Information ◽  
2018 ◽  
Vol 9 (9) ◽  
pp. 236 ◽  
Author(s):  
Nengsong Peng ◽  
Weiwei Zhang ◽  
Hongfei Ling ◽  
Yuzhao Zhang ◽  
Lixin Zheng

A key issue in wireless sensor network applications is how to accurately detect anomalies in an unstable environment and determine whether an event has occurred. This instability includes the harsh environment, node energy insufficiency, hardware and software breakdown, etc. In this paper, a fault-tolerant anomaly detection method (FTAD) is proposed based on the spatial-temporal correlation of sensor networks. This method divides the sensor network into a fault neighborhood, event and fault mixed neighborhood, event boundary neighborhood and other regions for anomaly detection, respectively, to achieve fault tolerance. The results of experiment show that under the condition that 45% of sensor nodes are failing, the hit rate of event detection remains at about 97% and the false negative rate of events is above 92%.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Jingsha He ◽  
Jing Xu ◽  
Xingye Zhu ◽  
Yuqiang Zhang ◽  
Ting Zhang ◽  
...  

Location information of sensor nodes in wireless sensor networks (WSNs) is very important, for it makes information that is collected and reported by the sensor nodes spatially meaningful for applications. Since most current sensor localization schemes rely on location information that is provided by beacon nodes for the regular sensor nodes to locate themselves, the accuracy of localization depends on the accuracy of location information from the beacon nodes. Therefore, the security and reliability of the beacon nodes become critical in the localization of regular sensor nodes. In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. In our proposed scheme, the reputation of each beacon node is evaluated based on a reputation evaluation model so that regular sensor nodes can get credible location information from highly reputable beacon nodes to accomplish localization. We also perform a set of simulation experiments to demonstrate the effectiveness of the proposed reputation-based security scheme. And our simulation results show that the proposed security scheme can enhance the security and, hence, improve the accuracy of sensor localization in hostile or untrusted environments.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 411
Author(s):  
Saba Awan ◽  
Nadeem Javaid ◽  
Sameeh Ullah ◽  
Asad Ullah Khan ◽  
Ali Mustafa Qamar ◽  
...  

In this paper, an encryption and trust evaluation model is proposed on the basis of a blockchain in which the identities of the Aggregator Nodes (ANs) and Sensor Nodes (SNs) are stored. The authentication of ANs and SNs is performed in public and private blockchains, respectively. However, inauthentic nodes utilize the network’s resources and perform malicious activities. Moreover, the SNs have limited energy, transmission range and computational capabilities, and are attacked by malicious nodes. Afterwards, the malicious nodes transmit wrong information of the route and increase the number of retransmissions due to which the SNs’ energy is rapidly consumed. The lifespan of the wireless sensor network is reduced due to the rapid energy dissipation of the SNs. Furthermore, the throughput increases and packet loss increase with the presence of malicious nodes in the network. The trust values of SNs are computed to eradicate the malicious nodes from the network. Secure routing in the network is performed considering residual energy and trust values of the SNs. Moreover, the Rivest–Shamir–Adleman (RSA), a cryptosystem that provides asymmetric keys, is used for securing data transmission. The simulation results show the effectiveness of the proposed model in terms of high packet delivery ratio.


2005 ◽  
Vol 4 (2) ◽  
pp. 713-721 ◽  
Author(s):  
Santhosh Simon ◽  
K Paulose Jacob

Wireless sensor networks (WSNs) can be meritoriously used in several application areas like agriculture, military surveillance, environmental monitoring, forest fire detection etc. Since they are used to monitor large geographic areas numerous sensor nodes are to be deployed and their radio range is also very short. Hence they depend on the cooperative effort of these densely deployed sensor nodes for reporting the sensed data. Any changes in environment or an event of interest may be initially observed in a particular area. In other words, they are correlated in space domain. Many nodes in that area may detect the event and report the same event. This redundant information is of no use to system and also depletes the precious energy of the intermediate sensor nodes. Sensor nodes are having very limited energy and needs to be conserved for attaining maximum network life time. Data aggregation is an effective technique for conserving energy by reducing the packet transmissions. Many aggregation systems are available, but when employed for large scale wireless sensor networks they are less effective. In this paper we propose a scheme for large scale WSNs which effectively uses the spatial correlation and temporal correlation of the data for effective aggregation and thereby preserving precious energy.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1011 ◽  
Author(s):  
M. K. Alam ◽  
Azrina Abd Aziz ◽  
S. A. Latif ◽  
Azlan Awang

A wireless sensor network (WSN) deploys hundreds or thousands of nodes that may introduce large-scale data over time. Dealing with such an amount of collected data is a real challenge for energy-constraint sensor nodes. Therefore, numerous research works have been carried out to design efficient data clustering techniques in WSNs to eliminate the amount of redundant data before transmitting them to the sink while preserving their fundamental properties. This paper develops a new error-aware data clustering (EDC) technique at the cluster-heads (CHs) for in-network data reduction. The proposed EDC consists of three adaptive modules that allow users to choose the module that suits their requirements and the quality of the data. The histogram-based data clustering (HDC) module groups temporal correlated data into clusters and eliminates correlated data from each cluster. Recursive outlier detection and smoothing (RODS) with HDC module provides error-aware data clustering, which detects random outliers using temporal correlation of data to maintain data reduction errors within a predefined threshold. Verification of RODS (V-RODS) with HDC module detects not only random outliers but also frequent outliers simultaneously based on both the temporal and spatial correlations of the data. The simulation results show that the proposed EDC is computationally cheap, able to reduce a significant amount of redundant data with minimum error, and provides efficient error-aware data clustering solutions for remote monitoring environmental applications.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Sign in / Sign up

Export Citation Format

Share Document