SlideShare a Scribd company logo
1 of 5
Download to read offline
ACEEE Int. J. on Communications, Vol. 03, No. 01, March 2012



   Sensor Node Failure or Malfunctioning Detection in
               Wireless Sensor Network
                                              Ravindra N Duche1,N.P.Sarwade2
                                  1
                                    Department of Electrical Engineering, VJTI, Mumbai, India
                                                Email:rnduche@rediffmail.com
                                  2
                                    Department of Electrical Engineering, VJTI, Mumbai, India
                                                Email: nishasarvade@vjti.org.in

Abstract— The rapid growth in electronics, sensors and                 and confidence factor to detect faulty sensor node. It suffers
communication technology has made it possible to construct             due non perfect planar wave fronts. Ref [5,7] measures the
the WSN consists of large number of portable sensors. Because          energy consumption of the node to detect the location.
of this measurement accuracy of various parameters in the
                                                                       Networked predictive control
field has been increased. It has increased the quality of WSN.
But due to the use of large numbers of portable sensor nodes
                                                                           Over the Internet using RTD explained in [14] is highly
in WSN, probability of sensor node failure gets increased. It          efficient, hence used in this proposed method.
has affected the reliability and efficiency of WSN. To maintain            The objective of proposed method is to detect the sensor
the high quality of WSN, detection of failed or malfunctioning         node failure or malfunctioning with the help of confidence
sensor node is essential. The failure of sensor node is either         factors. Confidence factor of round trip path in network is
because of communication device failure or battery,                    estimated by using the round trip delay (RTD) time [2,3].The
environment and sensor device related problems. To check               proposed method will detect the failure in sensor node for
the failed sensor node manually in such environment is                 symmetrical network conditions. In this way it helps to detect
troublesome. This paper presents a new method to detect the
                                                                       failed or malfunctioning sensor, which can be used to get
sensor node failure or malfunctioning in such environment.
The proposed method uses the round trip delay (RTD) time to
                                                                       correct data in WSN or the exact sensor node can be repaired
estimate the confidence factor of RTD path. Based on the               or working status (health) of the WSN can be checked [1,3].
confidence factor the failed or malfunctioning sensor node is          The time required for detection is in the range of sec; hence
detected. Hardware based simulation result indicates the easy          data loss can be avoided.
and optimized way of detecting failed or malfunctioning sensor             The remaining paper is organized into five sections. In
node in symmetrical WSN.                                               Section II, round trip delay time concept is described. In
                                                                       Section III, proposed method and its realization is explained
Index Terms — WSN, RTD, Portable Sensors, Confidence                   in detail. In Section IV, experimental work and related
factor, Look-up table.                                                 simulation results are presented. Result analysis is performed
                                                                       in section V. Conclusion and future work is stated in section
                       I. INTRODUCTION                                 VI.
    Wireless sensor network (WSN) consist of large number
portable sensors (small, low-power and cost) placed in field                            II. ROUND TRIP DELAY T IME
measuring field with the help of wireless communication                   Round-trip delay (RTD) also called as round-trip time
module. The advances in microelectronics and sensor tech-              (RTT) [2, 3, 14] is the time required for a signal to travel from
nology made it possible to have such portable sensors [1, 3,
5]. The purpose is to sense, collect and process the informa-
tion from all sensor nodes and then sending it to for analyz-
ing [1-3].
    The sensor node failure may occur in WSN due to
uncontrolled environment, battery related problem, failure in
communication device [1,2]. Failure detection is essential
because failed or malfunctioning sensor node may produce
incorrect analysis or detection of parameter [2,4]. Failed sensor
node may decrease the quality of service (QOS) of the entire
WSN [1]. Manually checking of such failed sensor node in
WSN is troublesome. To achieve the good quality of WSN                    Figure 1. WSN with four slave sensor nodes and master node
through accuracy, reliability and efficiency, detection of
                                                                       a specific source node through a path consisting other nodes
sensor node failure or malfunctioning is essential [1-3].
                                                                       and back again. The round trip delay time for the path
    Ref. [1] detects the faulty node by using neighbor-data
                                                                       consisting three sensors i,j and k as shown in Fig.1, is[2]
analysis method. In which node trust’s degree is calculated.
                                                                       expressed as
But the algorithm proposed is weak and not accurate. Ref. [2]
uses time delay based direction of arrival (DOA) estimation                                                                            (1)
© 2012 ACEEE                                                      57
DOI: 01.IJCOM.3.1.3_1
ACEEE Int. J. on Communications, Vol. 03, No. 01, March 2012


where τ(i,j) is time delay between the sensor pair (i, j). RTD            A. Estimation of maximum numbers of round trip paths.
time is a function of various parameters of the wireless net-                Consider the symmetrical wireless network as shown in
work [2,14] and it can be expressed as                                    Fig. 1.The maximum possible round trip paths in this
   RTD time = ƒ (speed, distance, medium, noise, nodes
                 In RTD path &request handled)
             = Ts + Td +Tm + Tn + TnRTD +Toreq                (2)
Thus round trip delay time is the summation of various time
delays associated with the respective parameters of the WSN.
This time can range from a few milliseconds to several seconds
[1].

                    III. PROPOSED METHOD
    In the proposed method sensor node failure or
                                                                                       Figure 2. Four round trip paths in WSN
malfunctioning detection is achieved with the help of
confidence factors of round trip paths in WSN [2,3]. The                  network is shown in the Fig.2.Round trip path in WSN will be
confidence factor of round trip path is computed with the                 formed with at least three sensor nodes including the source
help of threshold and instantaneous round trip delay time.                node. The number of sensor nodes in the path can be
Confidence factors of all round trip paths are stored in look-            increased to maximum as N-1.The range of sensor nodes in
up table. Then by analyzing the status of confidence factor               round trip path can be [8] expressed as follows
of all paths in the look-up table, failed or malfunctioning sensor                       3    m     (N-1)                          (3)
node is detected easily.
    In WSN if any sensor node fails or malfunctioning the                 here ‘N’ is the total number of sensor nodes present in WSN
time delays related to this sensor node will change. This will            and ‘m’ is the number of sensor nodes present in the round
introduce errors in estimating the round trip delay (RTD) times           trip path.
[2,6]. To determine the confidence factor, measurement of                     Let ‘nRTD’ be the maximum number of round trip paths
threshold and instantaneous round trip delay time of                      possible in WSN having N sensor nodes. It depends on
respective path is essential. The round trip delay time of                intermediate sensor nodes (m) in round trip path [8]. If less or
various round trip paths in WSN is measured for certain                   minimum (m=3) number of intermediate nodes are selected
sensor conditions (related to type of sensor, microcontroller             then round trip paths formed will be maximum. On the other
circuit and wireless modules used). The threshold value and               hand if intermediate nodes are increased to maximum (m=N-
confidence factor utilized here is a powerful tool for failure            1) then least number of round trip paths are formed. It is
detection [2].                                                            expressed by the equation
    Two algorithms are proposed here to detect the sensor                                         nRTD = N (N- m)                        (4)
node failure or malfunctioning. First algorithm is to estimate
the confidence factor of each round trip path in WSN and                      The four sensor nodes (i.e. N=4) are used here shown in
second is to analyze the look-up table to determine either                Fig. 1.Let the minimum number of sensor nodes used in each
sensor node is failed or malfunctioning.                                  path are 3 (i.e. m=3). The maximum possible number of round
Symmetrical Network Conditions: While implementing                        trip paths for round trip delay (RTD) measurement are found
proposed method it is necessary to apply the following                    by using (3), and is n RTD=4 paths. Hence this WSN have
symmetrical network conditions [8]. The WSN will be                       maximum four round trip paths. These four paths are shown
symmetrical if                                                            in Fig. 2. As the symmetrical WSN is considered here the
      1) All the sensor nodes are located at equal distance               round trip delay time for all four paths will be equal as,
           from each other.                                                                                                              (5)
      2) All sensor nodes have same sensitivity.
      3) Operating speed of all sensor nodes is equal.                    Where RTD-1, RTD-2, RTD-3and RTD-4 are the four round
      4) Same wireless communication module is for all sensor             trip paths.
           nodes                                                          B. Threshold round trip delay (RTD) time of path
      5) Location of all sensor nodes is fixed.
Otherwise it will be an asymmetrical network. In the proposed                 As round trip delay time is affected by several factors of
method it is essential to determine the maximum possible                  WSN, it is necessary to determine the proper maximum time.
round trip paths in the selected WSN. This is because the                 Also to place the sensor node at equidistance is not possible
size of look-up table depends upon this number. To optimize               in large network [7,14]. Because of it the delay time associated
the sensor node failure detection time it is necessary to reduce          with each sensor node and it will change the round trip delay
the size of look-up table. It can be achieved by reducing the             time too [2,3]. The maximum value of this time will be the
number of paths.                                                          threshold value of the corresponding path. The threshold
                                                                          time for respective round trip path is calculated as
© 2012 ACEEE                                                         58
DOI: 01.IJCOM.3.1. 3_1
ACEEE Int. J. on Communications, Vol. 03, No. 01, March 2012


                                                              (6)         D. Analysis of Look-Up Table
where        is the maximum time delay[2,6] between the two                   Look-up table contains instantaneous and threshold RTD
                                                                          time as well as the confidence factors of all round trip paths
selected sensor nodes i and j. To measure threshold value of
                                                                          of WSN. Analysis of look-up table can be done for two cases.
any round trip path in WSN, choose the round trip path and
                                                                          First case is for sensor node failure. In this case time delay
then by using (1), measure the RTD time. Repeat the
                                                                          associated with faulty senor node becomes infinity [2, 3].
measurement of time till we will get the constant maximum
                                                                          Because of this RTD time of path in which this sensor node is
value of RTD time.
                                                                          present will also become infinity. If instantaneous time is
    Continue above procedure for remaining round trip paths
                                                                          observed as infinity in look-up table then sensor node failure
in the WSN. Threshold values of all round trip paths in WSN
                                                                          is confirmed. In second case if instantaneous time is not
are now stored in look-up table.
                                                                          infinity, which means sensor node in WSN is malfunctioning.
C. Confidence Factor Estimation                                               The second algorithm proposed for the analysis of look-
    Confidence factor is estimated by comparing the                       up table is presented in the form of flowchart shown in Fig.3.
instantaneous and threshold round trip delay time. The                    The different cases of sensor node failure are considered
instantaneous value of round trip delay (RTD) time is                     and related results are presented in Table I. In first IV cases,
measured by using (1).Estimation of confidence factor is                  any one sensor node is assumed to be failed. Hence the
expressed as [2-4].                                                       confidence factors of round trip paths in which this sensor is
                                                                          present will be ‘0’, and is listed in Table I.
                                                              (7)

where τRTD-Tr is the threshold value of round trip delay
adjusted for the maximum value of time and Δ RTD is a
confidence factor for the selected round trip path in WSN.
Confidence factor will be either 0 or 1. If a sensor node fails,
all of its time delays will be corrupted. In addition, it may also
happen (due to noise) that time delays from one of the
properly operating sensors will get corrupt. In these cases
the instantaneous time will be more than threshold. The
respective round trip path has ‘0’ confidence factor in which
this sensor is present.
    If sensor nodes in the round trip path are working properly
then its instantaneous time will be less than threshold time.
Hence confidence factor of such round trip path will be
‘1’.The algorithm to determine the confidence factors of
various round trip paths in wireless sensor network is
explained as follows:
Algorithm: 1] Estimation of Confidence factors
1.          Initialize all Sensor nodes in the Network.
2.          Select 3 sensor nodes for round trip path (m=3).
3.          Determine the number of round paths in WSN
            (i.e. here nRTD = 4)
4.          Set the counter for round trip paths.
5.          Select the round trip path (e.g. Si-Sj-Sk-Si).
6.          Know calculate the instantaneous round trip delay
            (RTD) time of this path by using the equation


7.       Estimate confidence factor of respective round
        trip path by using following condition                                 Figure 3. Flowchart For the Analysis of Loo-Up Table
                                                                              In case V, all sensor nodes in network are assumed to be
                                                                          functioning properly then confidence factors of all paths will
                                                                          be ‘1’ only. This concludes that all sensor nodes in case V are
8. Go to step 4, decrement the counter for RTD path and                   working properly.
    repeat till step 7 to determine the confidence factor of all
    paths in the WSN.
9. Complete the look-up table entries for all RTD paths.
10. Stop.
© 2012 ACEEE                                                         59
DOI: 01.IJCOM.3.1. 3_1
ACEEE Int. J. on Communications, Vol. 03, No. 01, March 2012


          TABLE I. DIFFERENT C ASES OF SENSOR N ODE FAILURE          While performing this experiment the baud rate of ZigBee is
                                                                     set to 9600 bps and 11.0592 MHz crystal is used for ATMEGA
                                                                     16L.The transmission time required by ZigBee is near about
                                                                     4.6 sec and processing time taken by microcontroller is in the
                                                                     range of 0.3 to 0.4 s. The time delay between the sensor node
                                                                     pair will be approximately 4.8 sec. Hence theoretical round
                                                                     trip delay time will be 14.40 sec [14].
                                                                          The theoretically calculated and practical round trip delay
                                                                     times are not same. Hence it is necessary to measure the
                                                                     threshold value of RTD time. Threshold values of all round
                                                                     trip paths shown in Fig.4 are measured. Next experiment is
                                                                     performed to detect failure of sensor node in two cases as
                                                                     follows.
                   IV. EXPERIMENTAL DETAILS                          C. Detection of failed sensor node
                                                                         The wireless network shown in Fig.4 is simulated in real
A. Hardware Implementation
                                                                     time for this case. The simulation results of instantaneous
    Recently a new wireless communication standard based             RTD time of two paths with their respective confidence factor
on IEEE 802.15.4 radio interface–ZigBee[9-13] designed for           are presented in Table II.
automation purposes have emerged. The electronics for                    Here sensor node Sj is made faulty by switching it off.
ZigBee devices is much simpler than electronics of Bluetooth         Due to it time delays associated with it will become infinity
devices [13]. The existence of automation device profiles and        and round trip couldn’t be completed. This will set RTD time
low power consumption (compared to Bluetooth) makes the              as infinity of the path in which Sj is node is present.
ZigBee an ideal wireless interface for automation devices [3].       Confidence factor of round trip path 2 is ‘1’ and ‘0’ for
     Typical experimental setup consisting four                      remaining three paths in the selected WSN. Sensor nodes
microcontroller based sensor nodes with ZigBee wireless              belonging to round trip path          RTD-2 are not faulty (i.e
module is as shown in Fig.4.Each Sensor node in WSN for              nodes Si, Sk and Sl are not faulty). In remaining three round
the experimental purpose to verify the proposed method is            trip paths it is found that Sj sensor node is present. At the
designed using ATMEGA 16 L low- power, high-performance              same time the instantaneous RTD time for these paths is
CMOS 8-bit micro-controller and ZigBee (XBEE S2 by Digi              infinity. These two results conclude failure of sensor node
Key) wireless device.                                                Sj. Same procedure is repeated for senor node Sl.
B. Real Time Simulation Result                                       D. Detection of malfunctioning behavior of sensor node.
    Initially the RTD paths are defined by configuring the               One sensor node of the network shown in Fig.4, is made
sensor node using the X-CTU software. In this configuration          slow to check the malfunctioning behavior. This is done by
source and destination paths for each sensor is assigned for         adding a delay of 5 sec to the corresponding sensor node.
the particular path. The three sensor nodes are kept at equal        As all sensor nodes are kept at distance of 1 foot, here the
distance of 1 foot [5,13]. After configuring the sensor nodes,       threshold time is 14.624 sec.
whole network is simulated in real time by using the Dock
light V1.9 software. The network is simulated repeatedly for                   TABLE II. R ESULTS IN CASE OF SENSOR N ODE FAILURE
50 times to obtain the threshold round trip delay time.




       Figure 4. Experimental setup for symmetrical WSN
Different round trip delay times measured are 14.623, 14.623,
14.623, 14.624 and 14.623 sec [3,14].Finally the threshold time      For experimental purpose delay is added alternately to Sj and
for RTD-1 path is selected as 14.624 sec (maximum value of           Sl nodes respectively. Then WSN is simulated to find the
RTD time). Due to symmetrical network the threshold values           instantaneous RTD times for two cases. The results of
for all paths in WSN are same. Practical RTD time equals to          simulation of all round trip paths for two cases are listed in
14.624 sec.                                                          Table III. As the confidence factor of round trip path RTD-2
© 2012 ACEEE                                                    60
DOI: 01.IJCOM.3.1. 3_1
ACEEE Int. J. on Communications, Vol. 03, No. 01, March 2012

       TABLE III. RESULTS OF SENSOR N ODE MALFUNCTIONING CASE            nodes in the corresponding paths. This will reduce the
                                                                         detection time of faulty sensor node in WSN.

                                                                                                      REFERENCE
                                                                         [1] Peng Jiang, “A New Method for Node Fault Detection in
                                                                              Wireless Sensor Networks” Sensors, pp. 1282-1294, 2009.
                                                                         [2] T. W. Pirinen, J.Yli-Hietanen, P. Pertil and A. Visa, “Detection
                                                                              and compensation of Sensor malfunction in time delay based
                                                                              direction of arrival estimation “ IEEE Circuits and
                                                                              Systems,vol.4,pp.872-875,May 2004.
                                                                         [3] A. De Angelis, A. Moschitta, Peter Händel and Paolo Carbone,
                                                                              “Experimental Radio Indoor Positioning Systems Based on
                                                                              Round-Trip Time Measurement” Advances in Measurement
                                                                              Systems, pp.196-219,April 2010.
                                                                         [4] K. Varma, T. Ikuma, and A. A. Beex, “Robust TDE-based
                                                                              DOA-estimation for compact audio arrays,” in Proceedings
is ‘1’, the sensor nodes belonging to this path are not                       of the Second IEEE Sensor Array and Multichannel Signal
malfunctioning. Hence the sensor Sj which is not a part of                    Processing Workshop,pp.214–218, 2002.
this round trip path is marked as faulty. For the second case            [5] A.A.Boudhir,B.Mohamed and Ben A.Mohamed, “New
confidence factor of round trip path RTD-3 is ‘1, hence the                   Technique of Wireless Sensor Networks Localization based
sensor node S l is faulty here. Along with this the                           on Energy Consumption” International Journal of Computer
                                                                              Applications, Vol. 9–No.12,pp.25-28,Nov 2010.
instantaneous RTD times for above two cases are not infinity.
                                                                         [6] T. Pirinen, P. Pertil, and A. Visa, “Toward intelligent sensors
Therefore sensor node Sj and S l are concluded as                             - reliability for time delay based direction of arrival estimates,”
malfunctioning sensors.                                                       in Proceedings of the 2003 IEEE International Conference on
                                                                              Acoustics, Speech and Signal Processing (ICASSP’03), Volume
                       V. RESULT ANALYSIS                                     V, pp.197-200, 2003.
                                                                         [7] Chuan-Chin Pu, Chuan-Hsian Pu, and Hoon-Jae Lee, “Indoor
    The detection time of proposed method to detect faulty                    Location Tracking using Received Signal Strength Indicator”
sensor node is in the range of few sec. To minimize the                       Emerging Communications for Wireless Sensor
detection time of this proposed method, number of round                       Networks,pp.229-256,2010.
trip paths in wireless network has to be optimized. But there            [8] R.N. Duche, N.P. Sarwade, “Round Trip Delay Time as a
exists tradeoff between number of sensor nodes in round trip                  Linear Function of Distance between the Sensor Nodes in
path and maximum possible RTD paths.                                          Wireless Sensor Network” International Journal of Engineering
    It is difficult to judge the failure or malfunctioning of sensor          Sciences & Emerging Technology, Volume 1, Issue 2, pp: 20-
node more than one if they belong to same round trip path.                    26, Feb 2012.
                                                                         [9] Corral P, Pena E, Garcia R, Almenar V, C. Lima, “Distance
This is due to the reason that instantaneous RTD time for all
                                                                              Estimation System based on ZigBee” Proceedings of 11th IEEE
paths will be either infinity or more than threshold value.                   International Conference on Computational Science and
Which will tend to set the confidence factors of all round trip               Engineering Workshops, CSEWORKSHOPS ‘08, San
paths in WSN equal to ‘0’.Because of it look-up table analysis                Paulo,pp.405–411,July 2008.
will be failed. If the faulty sensor nodes belong to different           [10] Cho H, Kang M, Park J, Park B. & Kim H, “Performance
round trip paths in network then they will be detected by this                Analysis of Location Estimation Algorithm in ZigBee
method. This is because the confidence factors of all round                   Networks using Received Signal Strength” Proceeding of 21st
trip paths in WSN will not tend to be ‘0’.                                    IEEE International Conference on Advanced Information
                                                                              Networking                      and                 Applications
                                                                              Workshops,AINAW’07,NiagaraFalls, CA,2007.
              VI. CONCLUSION AND FUTURE WORK
                                                                         [11] Santinelli G, Giglietti R. & Moschitta A, “Self-calibrating indoor
    The proposed method requires few computations in case                     positioning system based on ZigBee Devices” Proceedings of
of symmetrical network conditions. Because of this it requires                the IEEE Inter. Instrum. & Measurement Techn. Conference
less time and has good accuracy. By using this method we                      (I2MTC),pp.1205– 1210,May 2009.
                                                                         [12] Schwarzer S, Vossiek M, Pichler M & Stelzer A, “Precise
can detect one faulty node present in any path in an easy
                                                                              distance measurement with IEEE 802.15.4 (ZigBee) devices”
and efficient way. Fault in terms of failure or malfunctioning                IEEE Radio and Wireless Symposium, Orlando, FL, pp. 779 –
is detected correctly by the proposed second algorithm.                       782, Jan 2008.
    The wireless device interfaced with sensor circuit plays a           [13] Harish R,B S Prabhu, Rajit Gadh, Asad M. Madni, “Wireless
major role in the measurement of round trip delay time. So                    Industrial Monitoring and Control using a Smart Sensor
selection of efficient wireless communication module is es-                   Platform” accepted for IEEE Sensor Journal 2007.
sential. For such detection scheme Bluetooth as well as ZigBee           [14] Wenshan Hu, G.Liu and D. Rees, “Networked Predictive
are best suited modules.                                                      Control over the Internet Using Round-Trip Delay
     Proposed method has to be modified to optimize the                       Measurement” IEEE Transactions On Instrumentation And
                                                                              Measurement, Vol.57, 10, pp. 2231-2240, October 2008.
number of round trip paths in WSN and the number of sensor
© 2012 ACEEE                                                   61
DOI: 01.IJCOM.3.1. 3_1

More Related Content

What's hot

Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolZac Darcy
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
CP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNCP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNIJAAS Team
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Journals
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Publishing House
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksHabibur Rahman
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
Performance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksPerformance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksIJMER
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 

What's hot (17)

Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocol
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
 
O026084087
O026084087O026084087
O026084087
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
CP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNCP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSN
 
A017520106
A017520106A017520106
A017520106
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 
V041203124126
V041203124126V041203124126
V041203124126
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Performance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksPerformance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor Networks
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 

Similar to Detecting Sensor Failures in Wireless Networks

Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
 
IRJET- Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA ClassifierIRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET- Flaw Detection in Wireless Sensor Network using a LDA ClassifierIRJET Journal
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...ieijjournal
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintainingIJCNCJournal
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...eSAT Publishing House
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksIJMER
 
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksA Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksIRJET Journal
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Comparative Analysis of Different Deployment Techniques in Wireless Sensor Ne...
Comparative Analysis of Different Deployment Techniques in Wireless Sensor Ne...Comparative Analysis of Different Deployment Techniques in Wireless Sensor Ne...
Comparative Analysis of Different Deployment Techniques in Wireless Sensor Ne...IJEACS
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkIISRT
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...IISRTJournals
 

Similar to Detecting Sensor Failures in Wireless Networks (20)

K010526570
K010526570K010526570
K010526570
 
[IJET V2I5P3] Authors: A RAJENDRA BABU, SHIVA MURTHY.G
[IJET V2I5P3] Authors: A RAJENDRA BABU, SHIVA MURTHY.G [IJET V2I5P3] Authors: A RAJENDRA BABU, SHIVA MURTHY.G
[IJET V2I5P3] Authors: A RAJENDRA BABU, SHIVA MURTHY.G
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
IRJET- Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA ClassifierIRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET- Flaw Detection in Wireless Sensor Network using a LDA Classifier
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor Networks
 
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksA Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Comparative Analysis of Different Deployment Techniques in Wireless Sensor Ne...
Comparative Analysis of Different Deployment Techniques in Wireless Sensor Ne...Comparative Analysis of Different Deployment Techniques in Wireless Sensor Ne...
Comparative Analysis of Different Deployment Techniques in Wireless Sensor Ne...
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Detecting Sensor Failures in Wireless Networks

  • 1. ACEEE Int. J. on Communications, Vol. 03, No. 01, March 2012 Sensor Node Failure or Malfunctioning Detection in Wireless Sensor Network Ravindra N Duche1,N.P.Sarwade2 1 Department of Electrical Engineering, VJTI, Mumbai, India Email:rnduche@rediffmail.com 2 Department of Electrical Engineering, VJTI, Mumbai, India Email: nishasarvade@vjti.org.in Abstract— The rapid growth in electronics, sensors and and confidence factor to detect faulty sensor node. It suffers communication technology has made it possible to construct due non perfect planar wave fronts. Ref [5,7] measures the the WSN consists of large number of portable sensors. Because energy consumption of the node to detect the location. of this measurement accuracy of various parameters in the Networked predictive control field has been increased. It has increased the quality of WSN. But due to the use of large numbers of portable sensor nodes Over the Internet using RTD explained in [14] is highly in WSN, probability of sensor node failure gets increased. It efficient, hence used in this proposed method. has affected the reliability and efficiency of WSN. To maintain The objective of proposed method is to detect the sensor the high quality of WSN, detection of failed or malfunctioning node failure or malfunctioning with the help of confidence sensor node is essential. The failure of sensor node is either factors. Confidence factor of round trip path in network is because of communication device failure or battery, estimated by using the round trip delay (RTD) time [2,3].The environment and sensor device related problems. To check proposed method will detect the failure in sensor node for the failed sensor node manually in such environment is symmetrical network conditions. In this way it helps to detect troublesome. This paper presents a new method to detect the failed or malfunctioning sensor, which can be used to get sensor node failure or malfunctioning in such environment. The proposed method uses the round trip delay (RTD) time to correct data in WSN or the exact sensor node can be repaired estimate the confidence factor of RTD path. Based on the or working status (health) of the WSN can be checked [1,3]. confidence factor the failed or malfunctioning sensor node is The time required for detection is in the range of sec; hence detected. Hardware based simulation result indicates the easy data loss can be avoided. and optimized way of detecting failed or malfunctioning sensor The remaining paper is organized into five sections. In node in symmetrical WSN. Section II, round trip delay time concept is described. In Section III, proposed method and its realization is explained Index Terms — WSN, RTD, Portable Sensors, Confidence in detail. In Section IV, experimental work and related factor, Look-up table. simulation results are presented. Result analysis is performed in section V. Conclusion and future work is stated in section I. INTRODUCTION VI. Wireless sensor network (WSN) consist of large number portable sensors (small, low-power and cost) placed in field II. ROUND TRIP DELAY T IME measuring field with the help of wireless communication Round-trip delay (RTD) also called as round-trip time module. The advances in microelectronics and sensor tech- (RTT) [2, 3, 14] is the time required for a signal to travel from nology made it possible to have such portable sensors [1, 3, 5]. The purpose is to sense, collect and process the informa- tion from all sensor nodes and then sending it to for analyz- ing [1-3]. The sensor node failure may occur in WSN due to uncontrolled environment, battery related problem, failure in communication device [1,2]. Failure detection is essential because failed or malfunctioning sensor node may produce incorrect analysis or detection of parameter [2,4]. Failed sensor node may decrease the quality of service (QOS) of the entire WSN [1]. Manually checking of such failed sensor node in WSN is troublesome. To achieve the good quality of WSN Figure 1. WSN with four slave sensor nodes and master node through accuracy, reliability and efficiency, detection of a specific source node through a path consisting other nodes sensor node failure or malfunctioning is essential [1-3]. and back again. The round trip delay time for the path Ref. [1] detects the faulty node by using neighbor-data consisting three sensors i,j and k as shown in Fig.1, is[2] analysis method. In which node trust’s degree is calculated. expressed as But the algorithm proposed is weak and not accurate. Ref. [2] uses time delay based direction of arrival (DOA) estimation (1) © 2012 ACEEE 57 DOI: 01.IJCOM.3.1.3_1
  • 2. ACEEE Int. J. on Communications, Vol. 03, No. 01, March 2012 where τ(i,j) is time delay between the sensor pair (i, j). RTD A. Estimation of maximum numbers of round trip paths. time is a function of various parameters of the wireless net- Consider the symmetrical wireless network as shown in work [2,14] and it can be expressed as Fig. 1.The maximum possible round trip paths in this RTD time = ƒ (speed, distance, medium, noise, nodes In RTD path &request handled) = Ts + Td +Tm + Tn + TnRTD +Toreq (2) Thus round trip delay time is the summation of various time delays associated with the respective parameters of the WSN. This time can range from a few milliseconds to several seconds [1]. III. PROPOSED METHOD In the proposed method sensor node failure or Figure 2. Four round trip paths in WSN malfunctioning detection is achieved with the help of confidence factors of round trip paths in WSN [2,3]. The network is shown in the Fig.2.Round trip path in WSN will be confidence factor of round trip path is computed with the formed with at least three sensor nodes including the source help of threshold and instantaneous round trip delay time. node. The number of sensor nodes in the path can be Confidence factors of all round trip paths are stored in look- increased to maximum as N-1.The range of sensor nodes in up table. Then by analyzing the status of confidence factor round trip path can be [8] expressed as follows of all paths in the look-up table, failed or malfunctioning sensor 3 m (N-1) (3) node is detected easily. In WSN if any sensor node fails or malfunctioning the here ‘N’ is the total number of sensor nodes present in WSN time delays related to this sensor node will change. This will and ‘m’ is the number of sensor nodes present in the round introduce errors in estimating the round trip delay (RTD) times trip path. [2,6]. To determine the confidence factor, measurement of Let ‘nRTD’ be the maximum number of round trip paths threshold and instantaneous round trip delay time of possible in WSN having N sensor nodes. It depends on respective path is essential. The round trip delay time of intermediate sensor nodes (m) in round trip path [8]. If less or various round trip paths in WSN is measured for certain minimum (m=3) number of intermediate nodes are selected sensor conditions (related to type of sensor, microcontroller then round trip paths formed will be maximum. On the other circuit and wireless modules used). The threshold value and hand if intermediate nodes are increased to maximum (m=N- confidence factor utilized here is a powerful tool for failure 1) then least number of round trip paths are formed. It is detection [2]. expressed by the equation Two algorithms are proposed here to detect the sensor nRTD = N (N- m) (4) node failure or malfunctioning. First algorithm is to estimate the confidence factor of each round trip path in WSN and The four sensor nodes (i.e. N=4) are used here shown in second is to analyze the look-up table to determine either Fig. 1.Let the minimum number of sensor nodes used in each sensor node is failed or malfunctioning. path are 3 (i.e. m=3). The maximum possible number of round Symmetrical Network Conditions: While implementing trip paths for round trip delay (RTD) measurement are found proposed method it is necessary to apply the following by using (3), and is n RTD=4 paths. Hence this WSN have symmetrical network conditions [8]. The WSN will be maximum four round trip paths. These four paths are shown symmetrical if in Fig. 2. As the symmetrical WSN is considered here the 1) All the sensor nodes are located at equal distance round trip delay time for all four paths will be equal as, from each other. (5) 2) All sensor nodes have same sensitivity. 3) Operating speed of all sensor nodes is equal. Where RTD-1, RTD-2, RTD-3and RTD-4 are the four round 4) Same wireless communication module is for all sensor trip paths. nodes B. Threshold round trip delay (RTD) time of path 5) Location of all sensor nodes is fixed. Otherwise it will be an asymmetrical network. In the proposed As round trip delay time is affected by several factors of method it is essential to determine the maximum possible WSN, it is necessary to determine the proper maximum time. round trip paths in the selected WSN. This is because the Also to place the sensor node at equidistance is not possible size of look-up table depends upon this number. To optimize in large network [7,14]. Because of it the delay time associated the sensor node failure detection time it is necessary to reduce with each sensor node and it will change the round trip delay the size of look-up table. It can be achieved by reducing the time too [2,3]. The maximum value of this time will be the number of paths. threshold value of the corresponding path. The threshold time for respective round trip path is calculated as © 2012 ACEEE 58 DOI: 01.IJCOM.3.1. 3_1
  • 3. ACEEE Int. J. on Communications, Vol. 03, No. 01, March 2012 (6) D. Analysis of Look-Up Table where is the maximum time delay[2,6] between the two Look-up table contains instantaneous and threshold RTD time as well as the confidence factors of all round trip paths selected sensor nodes i and j. To measure threshold value of of WSN. Analysis of look-up table can be done for two cases. any round trip path in WSN, choose the round trip path and First case is for sensor node failure. In this case time delay then by using (1), measure the RTD time. Repeat the associated with faulty senor node becomes infinity [2, 3]. measurement of time till we will get the constant maximum Because of this RTD time of path in which this sensor node is value of RTD time. present will also become infinity. If instantaneous time is Continue above procedure for remaining round trip paths observed as infinity in look-up table then sensor node failure in the WSN. Threshold values of all round trip paths in WSN is confirmed. In second case if instantaneous time is not are now stored in look-up table. infinity, which means sensor node in WSN is malfunctioning. C. Confidence Factor Estimation The second algorithm proposed for the analysis of look- Confidence factor is estimated by comparing the up table is presented in the form of flowchart shown in Fig.3. instantaneous and threshold round trip delay time. The The different cases of sensor node failure are considered instantaneous value of round trip delay (RTD) time is and related results are presented in Table I. In first IV cases, measured by using (1).Estimation of confidence factor is any one sensor node is assumed to be failed. Hence the expressed as [2-4]. confidence factors of round trip paths in which this sensor is present will be ‘0’, and is listed in Table I. (7) where τRTD-Tr is the threshold value of round trip delay adjusted for the maximum value of time and Δ RTD is a confidence factor for the selected round trip path in WSN. Confidence factor will be either 0 or 1. If a sensor node fails, all of its time delays will be corrupted. In addition, it may also happen (due to noise) that time delays from one of the properly operating sensors will get corrupt. In these cases the instantaneous time will be more than threshold. The respective round trip path has ‘0’ confidence factor in which this sensor is present. If sensor nodes in the round trip path are working properly then its instantaneous time will be less than threshold time. Hence confidence factor of such round trip path will be ‘1’.The algorithm to determine the confidence factors of various round trip paths in wireless sensor network is explained as follows: Algorithm: 1] Estimation of Confidence factors 1. Initialize all Sensor nodes in the Network. 2. Select 3 sensor nodes for round trip path (m=3). 3. Determine the number of round paths in WSN (i.e. here nRTD = 4) 4. Set the counter for round trip paths. 5. Select the round trip path (e.g. Si-Sj-Sk-Si). 6. Know calculate the instantaneous round trip delay (RTD) time of this path by using the equation 7. Estimate confidence factor of respective round trip path by using following condition Figure 3. Flowchart For the Analysis of Loo-Up Table In case V, all sensor nodes in network are assumed to be functioning properly then confidence factors of all paths will be ‘1’ only. This concludes that all sensor nodes in case V are 8. Go to step 4, decrement the counter for RTD path and working properly. repeat till step 7 to determine the confidence factor of all paths in the WSN. 9. Complete the look-up table entries for all RTD paths. 10. Stop. © 2012 ACEEE 59 DOI: 01.IJCOM.3.1. 3_1
  • 4. ACEEE Int. J. on Communications, Vol. 03, No. 01, March 2012 TABLE I. DIFFERENT C ASES OF SENSOR N ODE FAILURE While performing this experiment the baud rate of ZigBee is set to 9600 bps and 11.0592 MHz crystal is used for ATMEGA 16L.The transmission time required by ZigBee is near about 4.6 sec and processing time taken by microcontroller is in the range of 0.3 to 0.4 s. The time delay between the sensor node pair will be approximately 4.8 sec. Hence theoretical round trip delay time will be 14.40 sec [14]. The theoretically calculated and practical round trip delay times are not same. Hence it is necessary to measure the threshold value of RTD time. Threshold values of all round trip paths shown in Fig.4 are measured. Next experiment is performed to detect failure of sensor node in two cases as follows. IV. EXPERIMENTAL DETAILS C. Detection of failed sensor node The wireless network shown in Fig.4 is simulated in real A. Hardware Implementation time for this case. The simulation results of instantaneous Recently a new wireless communication standard based RTD time of two paths with their respective confidence factor on IEEE 802.15.4 radio interface–ZigBee[9-13] designed for are presented in Table II. automation purposes have emerged. The electronics for Here sensor node Sj is made faulty by switching it off. ZigBee devices is much simpler than electronics of Bluetooth Due to it time delays associated with it will become infinity devices [13]. The existence of automation device profiles and and round trip couldn’t be completed. This will set RTD time low power consumption (compared to Bluetooth) makes the as infinity of the path in which Sj is node is present. ZigBee an ideal wireless interface for automation devices [3]. Confidence factor of round trip path 2 is ‘1’ and ‘0’ for Typical experimental setup consisting four remaining three paths in the selected WSN. Sensor nodes microcontroller based sensor nodes with ZigBee wireless belonging to round trip path RTD-2 are not faulty (i.e module is as shown in Fig.4.Each Sensor node in WSN for nodes Si, Sk and Sl are not faulty). In remaining three round the experimental purpose to verify the proposed method is trip paths it is found that Sj sensor node is present. At the designed using ATMEGA 16 L low- power, high-performance same time the instantaneous RTD time for these paths is CMOS 8-bit micro-controller and ZigBee (XBEE S2 by Digi infinity. These two results conclude failure of sensor node Key) wireless device. Sj. Same procedure is repeated for senor node Sl. B. Real Time Simulation Result D. Detection of malfunctioning behavior of sensor node. Initially the RTD paths are defined by configuring the One sensor node of the network shown in Fig.4, is made sensor node using the X-CTU software. In this configuration slow to check the malfunctioning behavior. This is done by source and destination paths for each sensor is assigned for adding a delay of 5 sec to the corresponding sensor node. the particular path. The three sensor nodes are kept at equal As all sensor nodes are kept at distance of 1 foot, here the distance of 1 foot [5,13]. After configuring the sensor nodes, threshold time is 14.624 sec. whole network is simulated in real time by using the Dock light V1.9 software. The network is simulated repeatedly for TABLE II. R ESULTS IN CASE OF SENSOR N ODE FAILURE 50 times to obtain the threshold round trip delay time. Figure 4. Experimental setup for symmetrical WSN Different round trip delay times measured are 14.623, 14.623, 14.623, 14.624 and 14.623 sec [3,14].Finally the threshold time For experimental purpose delay is added alternately to Sj and for RTD-1 path is selected as 14.624 sec (maximum value of Sl nodes respectively. Then WSN is simulated to find the RTD time). Due to symmetrical network the threshold values instantaneous RTD times for two cases. The results of for all paths in WSN are same. Practical RTD time equals to simulation of all round trip paths for two cases are listed in 14.624 sec. Table III. As the confidence factor of round trip path RTD-2 © 2012 ACEEE 60 DOI: 01.IJCOM.3.1. 3_1
  • 5. ACEEE Int. J. on Communications, Vol. 03, No. 01, March 2012 TABLE III. RESULTS OF SENSOR N ODE MALFUNCTIONING CASE nodes in the corresponding paths. This will reduce the detection time of faulty sensor node in WSN. REFERENCE [1] Peng Jiang, “A New Method for Node Fault Detection in Wireless Sensor Networks” Sensors, pp. 1282-1294, 2009. [2] T. W. Pirinen, J.Yli-Hietanen, P. Pertil and A. Visa, “Detection and compensation of Sensor malfunction in time delay based direction of arrival estimation “ IEEE Circuits and Systems,vol.4,pp.872-875,May 2004. [3] A. De Angelis, A. Moschitta, Peter Händel and Paolo Carbone, “Experimental Radio Indoor Positioning Systems Based on Round-Trip Time Measurement” Advances in Measurement Systems, pp.196-219,April 2010. [4] K. Varma, T. Ikuma, and A. A. Beex, “Robust TDE-based DOA-estimation for compact audio arrays,” in Proceedings is ‘1’, the sensor nodes belonging to this path are not of the Second IEEE Sensor Array and Multichannel Signal malfunctioning. Hence the sensor Sj which is not a part of Processing Workshop,pp.214–218, 2002. this round trip path is marked as faulty. For the second case [5] A.A.Boudhir,B.Mohamed and Ben A.Mohamed, “New confidence factor of round trip path RTD-3 is ‘1, hence the Technique of Wireless Sensor Networks Localization based sensor node S l is faulty here. Along with this the on Energy Consumption” International Journal of Computer Applications, Vol. 9–No.12,pp.25-28,Nov 2010. instantaneous RTD times for above two cases are not infinity. [6] T. Pirinen, P. Pertil, and A. Visa, “Toward intelligent sensors Therefore sensor node Sj and S l are concluded as - reliability for time delay based direction of arrival estimates,” malfunctioning sensors. in Proceedings of the 2003 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’03), Volume V. RESULT ANALYSIS V, pp.197-200, 2003. [7] Chuan-Chin Pu, Chuan-Hsian Pu, and Hoon-Jae Lee, “Indoor The detection time of proposed method to detect faulty Location Tracking using Received Signal Strength Indicator” sensor node is in the range of few sec. To minimize the Emerging Communications for Wireless Sensor detection time of this proposed method, number of round Networks,pp.229-256,2010. trip paths in wireless network has to be optimized. But there [8] R.N. Duche, N.P. Sarwade, “Round Trip Delay Time as a exists tradeoff between number of sensor nodes in round trip Linear Function of Distance between the Sensor Nodes in path and maximum possible RTD paths. Wireless Sensor Network” International Journal of Engineering It is difficult to judge the failure or malfunctioning of sensor Sciences & Emerging Technology, Volume 1, Issue 2, pp: 20- node more than one if they belong to same round trip path. 26, Feb 2012. [9] Corral P, Pena E, Garcia R, Almenar V, C. Lima, “Distance This is due to the reason that instantaneous RTD time for all Estimation System based on ZigBee” Proceedings of 11th IEEE paths will be either infinity or more than threshold value. International Conference on Computational Science and Which will tend to set the confidence factors of all round trip Engineering Workshops, CSEWORKSHOPS ‘08, San paths in WSN equal to ‘0’.Because of it look-up table analysis Paulo,pp.405–411,July 2008. will be failed. If the faulty sensor nodes belong to different [10] Cho H, Kang M, Park J, Park B. & Kim H, “Performance round trip paths in network then they will be detected by this Analysis of Location Estimation Algorithm in ZigBee method. This is because the confidence factors of all round Networks using Received Signal Strength” Proceeding of 21st trip paths in WSN will not tend to be ‘0’. IEEE International Conference on Advanced Information Networking and Applications Workshops,AINAW’07,NiagaraFalls, CA,2007. VI. CONCLUSION AND FUTURE WORK [11] Santinelli G, Giglietti R. & Moschitta A, “Self-calibrating indoor The proposed method requires few computations in case positioning system based on ZigBee Devices” Proceedings of of symmetrical network conditions. Because of this it requires the IEEE Inter. Instrum. & Measurement Techn. Conference less time and has good accuracy. By using this method we (I2MTC),pp.1205– 1210,May 2009. [12] Schwarzer S, Vossiek M, Pichler M & Stelzer A, “Precise can detect one faulty node present in any path in an easy distance measurement with IEEE 802.15.4 (ZigBee) devices” and efficient way. Fault in terms of failure or malfunctioning IEEE Radio and Wireless Symposium, Orlando, FL, pp. 779 – is detected correctly by the proposed second algorithm. 782, Jan 2008. The wireless device interfaced with sensor circuit plays a [13] Harish R,B S Prabhu, Rajit Gadh, Asad M. Madni, “Wireless major role in the measurement of round trip delay time. So Industrial Monitoring and Control using a Smart Sensor selection of efficient wireless communication module is es- Platform” accepted for IEEE Sensor Journal 2007. sential. For such detection scheme Bluetooth as well as ZigBee [14] Wenshan Hu, G.Liu and D. Rees, “Networked Predictive are best suited modules. Control over the Internet Using Round-Trip Delay Proposed method has to be modified to optimize the Measurement” IEEE Transactions On Instrumentation And Measurement, Vol.57, 10, pp. 2231-2240, October 2008. number of round trip paths in WSN and the number of sensor © 2012 ACEEE 61 DOI: 01.IJCOM.3.1. 3_1