Hidden Gaussian Markov model for distributed fault detection in wireless sensor networks

2017 ◽  
Vol 40 (6) ◽  
pp. 1788-1798 ◽  
Author(s):  
Marwa Saihi ◽  
Ahmed Zouinkhi ◽  
Boumedyen Boussaid ◽  
Mohamed Naceur Abdelkarim ◽  
Guillaume Andrieux

Wireless sensor networks are based on a large number of sensor nodes used to measure information like temperature, acceleration, displacement, or pressure. The measurements are used to estimate the state of the monitored system or area. However, the quality of the measurements must be guaranteed to ensure the reliability of the estimated state of the system. Actually, sensors can be used in a hostile environment such as, on a battle field in the presence of fires, floods, earthquakes. In these environments as well as in normal operation, sensors can fail. The failure of sensor nodes can also be caused by other factors like: the failure of a module (such as the sensing module) due to the fabrication process models, loss of battery power and so on. A wireless sensor network must be able to identify faulty nodes. Therefore, we propose a probabilistic approach based on the Hidden Markov Model to identify faulty sensor nodes. Our proposed approach predicts the future state of each node from its actual state, so the fault could be detected before it occurs. We use an aided judgment of neighbour sensor nodes in the network. The algorithm analyses the correlation of the sensors’ data with respect to its neighbourhood. A systematic approach to divide a network on cliques is proposed to fully draw the neighbourhood of each node in the network. After drawing the neighbourhood of each node (cliques), damaged cliques are identified using the Gaussian distribution theorem. Finally, we use the Hidden Markov Model to identify faulty nodes in the identified damaged cliques by calculating the probability of each node to stay in its normal state. Simulation results demonstrate our algorithm is efficient even for a huge wireless sensor network unlike previous approaches.

Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4281
Author(s):  
Ngoc-Thanh Dinh ◽  
Younghan Kim

Wireless sensor network (WSN) studies have been carried out for multiple years. At this stage, many real WSNs have been deployed. Therefore, configuration and updating are critical issues. In this paper, we discuss the issues of configuring and updating a wireless sensor network (WSN). Due to a large number of sensor nodes, in addition to the limited resources of each node, manual configuring turns out to be impossible. Therefore, various auto-configuration approaches have been proposed to address the above challenges. In this survey, we present a comprehensive review of auto-configuration mechanisms with the taxonomy of classifications of the existing studies. For each category, we discuss and compare the advantages and disadvantages of related schemes. Lastly, future works are discussed for the remaining issues in this topic.


Author(s):  
Saloni Dhiman ◽  
Deepti Kakkar ◽  
Gurjot Kaur

Wireless sensor networks (WSNs) consist of several sensor nodes (SNs) that are powered by battery, so their lifetime is limited, which ultimately affects the lifespan and hence performance of the overall networks. Till now many techniques have been developed to solve this problem of WSN. Clustering is among the effective technique used for increasing the network lifespan. In this chapter, analysis of multi-hop routing protocol based on grid clustering with different selection criteria is presented. For analysis, the network is divided into equal-sized grids where each grid corresponds to a cluster and is assigned with a grid head (GH) responsible for collecting data from each SN belonging to respective grid and transferring it to the base station (BS) using multi-hop routing. The performance of the network has been analyzed for different position of BS, different number of grids, and different number of SNs.


2019 ◽  
Vol 29 (09) ◽  
pp. 2050141 ◽  
Author(s):  
Muhammed Enes Bayrakdar

In this paper, a monitoring technique based on the wireless sensor network is investigated. The sensor nodes used for monitoring are developed in a simulation environment. Accordingly, the structure and workflow of wireless sensor network nodes are designed. Time-division multiple access (TDMA) protocol has been chosen as the medium access technique to ensure that the designed technique operates in an energy-efficient manner and packet collisions are not experienced. Fading channels, i.e., no interference, Ricean and Rayleigh, are taken into consideration. Energy consumption is decreased with the help of ad-hoc communication of sensor nodes. Throughput performance for different wireless fading channels and energy consumption are evaluated. The simulation results show that the sensor network can quickly collect medium information and transmit data to the processing center in real time. Besides, the proposed technique suggests the usefulness of wireless sensor networks in the terrestrial areas.


Wireless sensor network consists of various sensor nodes connected through wireless media. Sensor nodes are tiny devices having lesser energy capabilities. Sensor nodes are either ad-hoc or mobile in their environment. Wireless sensor network route of transmission media is discovered by routing protocols and responsible for secure communication between sensor nodes. Energy is a precious resource of sensor nodes, and the entire lifetime of WSNs is depending on the energy capability of the sensor nodes. The fundamental problem is how to organize topology of WSN for deployed sensor nodes with lesser power consumption as possible. Major problems in wireless sensor networks which consume extra energy are interference, control message overhead, packet delay, unnecessary transmission, and bandwidth utilization. Therefore, energy efficient techniques are needed to overcome these problems. Hierarchical routing is the best routing method for finding optimal path between sensor nodes which enhance the lifetime of the network. This paper focuses towards various hierarchical energy efficient routing in wireless sensor networks and analyzes various features of WSN that should consider during designing of routing protocols.


In part years wireless sensor networks (WSNs) have shown great improvement and also have become trusted areas in research. A wireless sensor networks (WSNs) is made up of many wireless sensor nodes that provides the source field and sink of a wireless network. The ability to sense the surrounding nodes, computing and connecting to other nodes wirelessly provide the wireless sensor network s(WSNs).the application of WSN is seen in many areas like military application, tracking, monitoring remote environment, surveillance, healthcare department and so on. Because of wide application the challenges for better developed technology and improvement have increased .this paper discuss some of the recent and future trends of Wireless sensor network. [1],[ 3],[5]


21st century is considered as the era of communication, and Wireless Sensor Networks (WSN) have assumed an extremely essential job in the correspondence period. A wireless sensor network is defined as a homogeneous or heterogeneous system contains a large number of sensors, namely called nodes used to monitor different environments in cooperatives. WSN is composed of sensor nodes (S.N.), base stations (B.S.), and cluster head (C.H.). The popularity of wireless sensor networks has been increased day by day exponentially because of its wide scope of utilizations. The applications of wireless sensor networks are air traffic control, healthcare systems, home services, military services, industrial & building automation, network communications, VAN, etc. Thus the wide range of applications attracts attackers. To secure from different types of attacks, mainly intruder, intrusion detection based on dynamic state context and hierarchical trust in WSNs (IDSHT) is proposed. The trust evaluation is carried out in hierarchical way. The trust of sensor nodes is evaluated by cluster head (C.H.), whereas the trust of the cluster head is evaluated by a neighbor cluster head or base station. Hence the content trust, honest trust, and interactive trust are put forward by combining direct evaluation and feedback based evaluation in the fixed hop range. In this way, the complexity of trust management is carried in a hierarchical manner, and trust evaluation overhead is minimized.


Author(s):  
Gaurav Kumar Nigam ◽  
Chetna Dabas

Background & Objective: Wireless sensor networks are made up of huge amount of less powered small sensor nodes that can audit the surroundings, collect meaningful data, and send it base station. Various energy management plans that pursue to lengthen the endurance of overall network has been proposed over the years, but energy conservation remains the major challenge as the sensor nodes have finite battery and low computational capabilities. Cluster based routing is the most fitting system to help for burden adjusting, adaptation to internal failure, and solid correspondence to draw out execution parameters of wireless sensor network. Low energy adaptive clustering hierarchy is an efficient clustering based hierarchical protocol that is used to enhance the lifetime of sensor nodes in wireless sensor network. It has some basic flaws that need to be overwhelmed in order to reduce the energy utilization and inflating the nodes lifetime. Methods : In this paper, an effective auxiliary cluster head selection is used to propose a new enhanced GC-LEACH algorithm in order to minimize the energy utilization and prolonged the lifespan of wireless sensor network. Results & Conclusion: Simulation is performed in NS-2 and the outcomes show that the GC-LEACH outperforms conventional LEACH and its existing versions in the context of frequent cluster head rotation in various rounds, number of data packets collected at base station, as well as reduces the energy consumption 14% - 19% and prolongs the system lifetime 8% - 15%.


Author(s):  
Manni Kumar ◽  
Osho Gupta ◽  
Shikha Rani

In this technological arena, a firewall is a major tool for network security system to predetermine its basic rules so that it can control and monitor incoming and outgoing network traffic. The firewall generally restricts the faulty and unusual data entering the system. It can be categorized as host-based firewalls and network-based firewalls. There are various applications of firewall and how these firewalls can help the underwater wireless sensor network (UWSN) in protecting the sensor nodes where a huge amount of sensitive data is communicated among different countries. Firewall mainly aims to secure the network from different attacking devices and the attackers in a very efficient way. Firewall creates a barrier in which only the authorized data can be passed through after continuously checking by the firewall policies. To protect a local system and network of system from threats which are generally network based firewall is the most effective way. The design of the firewall is required to be accurate as it acts as a filter at higher protocol layer and some levels of IP-packets.


Sign in / Sign up

Export Citation Format

Share Document