scholarly journals Research on Pseudo-Node Detection Algorithm in Wireless Sensor Networks

2017 ◽  
Vol 13 (03) ◽  
pp. 113
Author(s):  
Wenjin Yu ◽  
Yong Li ◽  
Yuangeng Xu

<span style="font-family: 'Times New Roman',serif; font-size: 12pt; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;">With the wide application of the wireless sensor network, the security of the sensor network is becoming increasingly important. In this paper, based on node ranging, a new intrusion node detection algorithm has been proposed for external pseudo-node detection in wireless sensor networks. The presence of the nodes under copying-attack and the pseudo-nodes in the network can be detected through inter-node ranging with appropriate use of various sensors of nodes themselves and comprehensive analysis of ranging results. Operating in a stand-alone or embedded manner, this method has remedied the defects in the traditional principle of attack detection. The simulation results show that the proposed method has excellent applicability in wireless sensor security detection.</span>

2012 ◽  
Vol 2012 ◽  
pp. 1-13 ◽  
Author(s):  
Arunanshu Mahapatro ◽  
Pabitra Mohan Khilar

This paper presents a parametric fault detection algorithm which can discriminate the persistence (permanent, intermittent, and transient) of faults in wireless sensor networks. The main characteristics of these faults are the amount the fault appears. We adopt this state-holding time to discriminate transient from intermittent faults. Neighbor-coordination-based approach is adopted, where faulty sensor nodes are detected based on comparisons between neighboring nodes and dissemination of the decision made at each node. Simulation results demonstrate the robustness of the work at varying transient fault rate.


Author(s):  
Gang Wang

There are a large number of sensor nodes in wireless sensor network, whose main function is to process data scientifically, so that it can better sense and cooperate. In the network coverage, it can comprehensively collect the main information of the monitoring object, and send the monitoring data through short-range wireless communication to the gateway. Although there are many applications in WSNs, a multi-Target tracking and detection algorithm and the optimization problem of the wireless sensor networks are discussed in this paper. It can be obviously seen from the simulation results that this node cooperative program using particle CBMeMBer filtering algorithm can perfectly handle multi-target tracking, even if the sensor model is seriously nonlinear. Simulation results show that the tracking - forecasting data association scheme applying GM-CBMeMBer, which is proposed in this paper, runs well in identifying multiple target state, and can improve the estimation accuracy of multiple target state.


Author(s):  
Tao Yang ◽  
Gjergji Mino ◽  
Leonard Barolli ◽  
Makoto Ikeda ◽  
Fatos Xhafa ◽  
...  

In this paper, the authors investigate how the sensor network performs when the event moves with special movement path. Simulation results are compared with four scenarios: when the event is stationary, moving randomly, moving with simple 4 path, and boids path. The simulation results show that for the case when the event is moving randomly, the performance is the worst in the four scenarios. The characteristic of goodput decreases with the increase of number of sensor nodes. In the case of the boids model, the goodput is unstable when the is lower than 10 pps. The consumed energy characteristic increases with the increase of Simulation results show that the consumed energy of random movement is the worst among the four scenarios. The consumed energy of boids model is the lowest in four cases. This shows that the event movement with boids model can decrease the consumed energy in large scale WSNs.


2021 ◽  
Vol 2113 (1) ◽  
pp. 012023
Author(s):  
Xinghua Lu ◽  
Jiahao Huang ◽  
Guohua Luo

Abstract By optimizing the data detection performance of distributed wireless sensor networks, the data sensing and collecting ability of wireless sensor networks can be improved. Traditional methods adopt statistical characteristic parameter detection algorithm for distributed wireless sensor network data detection. Distributed wireless sensor network data has strong time-frequency coupling, so it is difficult to realize frequency domain spatial parameter clustering in frequency domain, and the detection performance is not good. A distributed wireless sensor network data detection algorithm based on non-stationary filtering and high-order statistical feature peak retrieval is proposed. The data model of distributed wireless sensor network is constructed under the interference of color noise. The weak vibration signal is subjected to time-frequency analysis and noise separation by non-stationary filtering, and the spectral peak of distributed wireless sensor network data is searched by the fourth-order cumulant slice post-operator to realize the optimal detection of signals. The simulation results show that the algorithm has a high probability of accurate detection, and has a good ability of suppressing noise and noise sidelobe information interference, which improves the probability of accurate detection of distributed wireless sensor network data under low signal-to-noise ratio.


2011 ◽  
Vol 2 (3) ◽  
pp. 49-63 ◽  
Author(s):  
Tao Yang ◽  
Gjergji Mino ◽  
Leonard Barolli ◽  
Makoto Ikeda ◽  
Fatos Xhafa ◽  
...  

In this paper, the authors investigate how the sensor network performs when the event moves with special movement path. Simulation results are compared with four scenarios: when the event is stationary, moving randomly, moving with simple 4 path, and boids path. The simulation results show that for the case when the event is moving randomly, the performance is the worst in the four scenarios. The characteristic of goodput decreases with the increase of number of sensor nodes. In the case of the boids model, the goodput is unstable when the is lower than 10 pps. The consumed energy characteristic increases with the increase of . Simulation results show that the consumed energy of random movement is the worst among the four scenarios. The consumed energy of boids model is the lowest in four cases. This shows that the event movement with boids model can decrease the consumed energy in large scale WSNs.


Author(s):  
Sara Hebal ◽  
Lemia Louail ◽  
Saad Harous

Protocols for wireless sensor networks are generally designed following the layered protocol stack where layers are independent. Uncorrelated decisions coming from different layers may affect certain metrics such as the latency of communications, the energy consumption, etc. Cross-layer approaches overcome this problem by exploiting the dependencies between the layers. In this article, the authors propose latency and energy mac-aware routing for wireless sensor networks (LEMAR-WSN), a new cross-layer routing approach using information of the TDMA schedule and exploiting the information of the energy consumed by each node in order to optimize the latency of communications and the energy consumption when relaying information to the sink in a wireless sensor network. Simulation results show that the proposed approach improves the average latency of communications up to 20% and the average.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Qiaolin Yu ◽  
Xiaofei Liu ◽  
Sihui Li ◽  
Lei Hou ◽  
Chengdong Zhu ◽  
...  

The wireless sensor network has developed rapidly in recent years. It is formed by the intersection of multiple disciplines. It integrates embedded technology, sensor technology, distributed technology, wireless communication technology, and modern networks. It is a brand new information acquisition platform. The characteristics of sensor networks determine that information fusion technology is a hot spot in the research of wireless sensor networks. Information fusion can achieve high performance and low cost in terms of energy and communication, which is of great significance to the research of sensor networks. This paper is aimed at studying the semantic-based sports music information fusion and retrieval research in wireless sensor networks. WSNs may face various attacks including eavesdropping attacks, replay attacks, Sybil attacks, and DOS attacks. Therefore, they are designing sensor network solutions. It is necessary to consider the network security issues. This article summarizes and analyzes the existing WSN security data fusion solutions for this issue and compares them by classification. This paper proposes methods and theories such as the spatial correlation detection algorithm, CBA algorithm, FTD algorithm, and DFWD algorithm, which enriches the research of information fusion and retrieval in wireless sensor networks, which is of exploratory significance, and it also establishes this problem. The model was studied, and reliable data was obtained. The experimental results of this paper show that when using these methods to diagnose faults in WSN, the correct rate of model diagnosis is higher than 77%.


2013 ◽  
Vol 1 (6) ◽  
pp. 4
Author(s):  
Jakub Kraus ◽  
Petr Fajčík ◽  
Peter Vittek ◽  
Tomáš Duša

<span style="line-height: 115%; font-family: 'Times New Roman','serif'; font-size: 9pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-GB; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-theme-font: minor-latin;" lang="EN-GB">This article focuses on the use of wireless sensor networks for airport security, respectively using sensor networks as a replacement or add-on to existing security measures. The article describes the sensor network and its possible application to various airport objects and financial analysis of the perimeter security with wireless sensor network.<strong> </strong></span>


Author(s):  
Dr. Akhilesh A. Waoo ◽  
◽  
Mr. Virendra Tiwari ◽  

Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to monitor the physical conditions and communicate information among the various nodes without requiring any physical medium. Over the last few years, with the rapid advancements in information technology, there has been an increasing interest of various organizations in making the use of wireless sensor networks (WSN’s). The sensor nodes in WSN having limited energy detects an event, collect data and forward this collected data to the base node, called sink node, for further processing and assessment. Few attributes of WSN’s like the energy consumption and lifetime can be impacted by the design and placement of the Sink node. Despite various useful characteristics WSN’s is being considered vulnerable and unprotected. There is a large class of various security attacks that may affect the performance of the system among which sinkhole an adversary attack puts dreadful threats to the security of such networks. Out of various attacks, a sinkhole attack is one of the detrimental types of attacks that brings a compromised node or fabricated node in the network which keeps trying to lures network traffic by advertising its wrong and fake routing update. Sinkhole attacks may have some other serious harmful impacts to exploit the network by launching few other attacks. Some of these attacks are forwarding attacks, selective acknowledge spoofing attacks, and they may drop or modify routing information too. It can also be used to send fake or false information to the base station. This study is analyzing the challenges with sinkhole attacks and exploring the existing available solutions by surveying comparatively which used to detect and mitigate sinkhole attacks in the wireless sensor network.


Sign in / Sign up

Export Citation Format

Share Document