Loading...

Resourceful data Accretion in radiation in a Hefty WSN

Research Paper (undergraduate) 2019 6 Pages

Computer Science - Miscellaneous

Excerpt

Resourceful data Accretion in radiation in a Hefty WSN

Akash Manish Lad Vellore Institute of Technology Chennai

Abstract: Wireless Sensor Network is a distribution of nodes connected wirelessly to form a wireless topology. Having wide applications, these are prone to misconduct. The most prevalent misconduct is the ability of a node to send data under influence of radiation and such nodes are called defective nodes. The defective node affected due to radiation and a void is created due to this node in the network topology. Such defective nodes due to its inability to perform triggers loss of data. Many algorithms/techniques were proposed but none among those were capable for over thousand sensor nodes. More than thousand nodes are considered here. Sensor nodes with radio frequency mode and acoustic mode of communication are considered. Audio mode is implemented in nodes left out with voids and RF-mode is used in nodes located at the boundary of void-nodes. Transfer of defective nodes in a network can be foretold depending upon its past behaviour.

Keywords: Data Accretion, RF-Communication, Audio-Communication, defective nodes, Prediction technique, testing methods.

Introduction

With advancements in technology and miniaturization, wireless devices could communicate over very-small ranges and due to this wireless sensor networks came into play. Such devices are called as sensor nodes. These nodes are organized in a random fashion to form a topology network so as to cover large area possible geographically. There are large applications of sensor nodes such as sensing important information, sensing ranges and transmitting sensed information to any stations using single/multi hop communication. These nodes which receive and transmit information are connected wirelessly. In a general WSN network several nodes are connected to one another and it can be extended to over a few thousand nodes. WSN network trails IEEE 802.11 format for wireless local area network protocols. The sensor nodes detects , senses and then transmits the message to nearby station wirelessly.

The nodes in WSN are widely used in real-world applications due to its capability to sense various features like temperature , smoke, proportion of chemical substances and other physical quantities. Many other applications include predictions of natural disasters, weather predictions, air-pollution quality index, military application etc. In this technique the data loss is handled due to the presence of defective-nodes. The defective nodes caused due to excessive influence of radiation has been studied and few techniques have been presented. The main reason for data loss is mainly due to the effect of radiation.

The nature of the defective nodes are dynamic as these nodes are created mainly under the course of electromagnetic radiation when under an influence for a long time. The sensor nodes start sensing and transmit communication when the radiation is over. There are cases when the radiations lasts for shorter duration of time. Using the conventional Brute-force approach is not reliable as it involves removal of the defective nodes from a particular network and it is not a solution to the concerned problem. The maintenance cost, using such kinds of approach, is quite high and does not address to the solution of problem. To solve this problem, there is a method involving specialized nodes which communicate using RF and audio means. To obtain the information and details from affected area certain prediction algorithms are used. Most of the testing algorithms are very costly when in failure. One such way to solve the issue is by observing behavior of defective nodes and particular prediction techniques can be applied accordingly.

PREDICTION TECHNIQUE

In this paper, defective node has been incorporated with prediction logic which will predict that if a node is defective or not. The Sink have NET_INFO table which has tuple <node_id, initial_nbr_list, current_nbr_list> besides to every wireless node in observed network. Tuples having count of entries in current_nbr_list than in initial_nbr_list are interesting to sink. Sink looks for tuples in which initial_nbr_list > current_nbr_list, and node besides to this tuple is a boundary node. Sink tells this boundary node to switch to dual communication mode. Sensor nodes besides to tuples in which current_nbr_list is empty are candidates for transfaulty node. The algorithm employs testing techniques to find out communication failure nodes. The applied algorithm is a 2-phase algorithm namely,

i. finding of defective and boundary nodes.
ii. grouping of nodes using special algorithms and bringing out approximate information.

Predict transfaultyness of sensor nodes.

Abbildung in dieser Leseprobe nicht enthalten

Observation Phase:

Abbildung in dieser Leseprobe nicht enthalten

REFERENCES

1. H. M. Rehmani, M. Shadaram, S. Zeadally, and P. Bellavista, “Special issue on recent de- velopments in cognitive radio sensor networks,” Pervasive Mobile Comput., 2015.

2. I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” Commun. Mag., vol. 40, no. 8, pp. 102-114, Nov. 2002.

3. K. McCusker and N. E. O. Connor, “Low-energy symmetric key distribution in wireless sensor networks,” IEEE Trans. Depend. Secure Comput., vol. 8, no. 3, pp. 363-376, May/Jun. 2011.

4. C. Alippi, G. Anastasi, M. D. Francesco, and M. Roveri, “An adaptive sampling algorithm for effective energy management in wireless sensor networks with energy-hungry sen- sors,” IEEE Trans. Instrum. Meas., vol. 59, no. 2, pp. 335-344, Feb. 2010.

5. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A survey,” Comput. Netw., vol. 38, no. 4, pp. 393-422, 2002.

6. S. S. McClure et al., “Radiation effects in micro-electromechanical systems (MEMS): RF relays,” IEEE Trans. Nucl. Sci., vol. 49, no. 6, pp. 3197-3202, Dec. 2002.

7 H. R. Shea, “Radiation sensitivity of microelectromechanical system devices,” J. Mi- cro/ Nanolithogr. MEMS MOEMS, vol. 8, no. 3, pp. 1­11, Jul. 2009.

8. Pushpendu Kar, Sudip Misra, “Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes”, IEEE Transactions on Network and Ser- vice Management, Vol. 13, No. 1, March 2016

9. M. Ahmed, X. Huang, D. Sharma, and L. Shutao, “Wireless sensor network internal at- tacker identification with multiple evidence by dempster-shafer theory,” in Proc. 12th Int. Conf Algorithms Architect. Parallel Process., 2012, pp. 255-263.

10. R. R. Wilcox, Introduction to Robust Estimation and Hypothesis Testing, 3rd ed. Amster- dam, The Netherlands: Elsevier, 2012, ISBN: 978-0-12-386983-8.

11. T. Kanungo, D. M. Mount, N. S. Netanyahu, C. D. Piatko, R. Silverman, and A. Y. Wu, “An efficient k-means clustering algorithm: Analysis and implementation,” IEEE Trans. Patten Anal. Mach. Intell., vol. 24, no. 7, pp. 881-892, Jul. 2002.

12. S. Rajasegarar, C. Leckie, and M. Palaniswam, “Hyperspherical cluster based distributed anomaly detection in wireless sensor networks,” J. Parallel Distrib. Comput., vol. 74, no. 1, pp. 1833­1847, 2014.

13. H. Huangshui and Q. Guihe, “Fault management frameworks in wireless sensor networks,” in Proc. Intell. Comput. Technol. Autom., Guangdong, China, March 2011, vol. 2, pp. 1093-1096.

14. C. A. Kamhoua, N. Pissinou, J. Miller, and S. K. Makki, “Mitigating routing misbehavior in multi-hop networks using evolutionary game theory,” in Proc. GLOBECOM Workshops Adv. Commun. Netw., 2010, pp. 1957-1962.

15. E. Soltanmohammadi, M. Orooji, and M. Naraghi-Pour, “Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes,” IEEE Trans. Inf Fo- rensics Secur., vol. 8, no. 1, pp. 205-215, Jan. 2013.

16. S. Khan, D. Turgut, and L. Boloni, “Bridge protection algorithms-A technique for fault- tolerance in sensor networks,” Ad Hoc Netw., vol. 24, pp. 186-199, Jan. 2015.

17 A. Munir, J. Antoon, and A. R. Gordon, “Modeling and analysis of fault detection and fault tolerance in wireless sensor networks,”

ACM Trans. Embedded Comput. Syst., vol. 14, no. 1, pp. 1-42, Jan. 2015.

T. Vladimirova et al., “Characterising wireless sensor motes for space applications,” in Proc. 2nd NASA/ESA Conf Adapt. Hardware Syst., Edinburgh, U.K., Aug. 2007, pp. 43- 50.

Details

Pages
6
Year
2019
Language
English
Catalog Number
v505950
Institution / College
VIT University – Vellore Institute of Technology
Grade
9.1
Tags
resourceful accretion hefty

Author

Share

Previous

Title: Resourceful data Accretion in radiation in a Hefty WSN