The impact of disabling suspicious node communications on network lifetime in wireless ad hoc sensor networks

The impact of disabling suspicious node communications on network lifetime in wireless ad hoc sensor networks

In wireless sensor networks (WSNs), the data observed by different nodes must be relayed safely to the base station over intermediate nodes. In the network environment, some sensor nodes can act suspiciously when they enter someone else s control or due to other equipment failure. Data packets that are sent through suspicious nodes may be randomly dropped or may be not delivered as desired. In this paper, we investigate the impact of disabling suspicious nodes communications on network lifetime through a linear programming framework. We build a mathematical programming framework and perform comprehensive numerical analysis. Our results show that the decrease in WSN lifetime is less than 8.0% if the number of suspicious nodes is not higher than 10%.

___

  • [1] ˙Incebacak D, Bicakci K, Tavli B. Evaluating energy cost of route diversity for security in wireless sensor networks. Comp Stand Inter 2015; 39: 44-57.
  • [2] Cardei M, Wu J, Lu M, Pervaiz M. Maximum network lifetime in wireless sensor networks with adjustable sensing ranges. In: International Conference on Wireless and Mobile Computing, Networking and Communications; 22–24 August 2005. pp. 438-445.
  • [3] Reddy YB. A game theory approach to detect malicious nodes in wireless sensor networks. In: International Conference on Sensor Technologies and Applications; 18–23 June 2009; Athens, Greece. pp. 462-468.
  • [4] Liu CX, Liu Y, Zhang ZH, Cheng ZY. High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks. Int J Commun Syst 2012; 26: 380-394.
  • [5] Ye F, Luo H, Luand S, Zhang L. Statistical en-route filtering of injected false data in sensor networks. IEEE J Sel Area Comm 2005; 23: 839-850.
  • [6] Liu G, Xu B, Chen H. An indicator kriging method for distributed estimation in wireless sensor networks. Int J Comm Syst 2014; 27: 68-80.
  • [7] Batmaz AU, Yildiz HU, Tavli B. DDRP: Role of unidirectionality and reverse path length on wireless sensor network lifetime. IEEE Sens J 2014; 14: 3971-3982.
  • [8] Cheng Z, Perillo M, Heinzelman W. General network lifetime and cost models for evaluating sensor network deployment strategies. IEEE T Mobile Comput 2008; 7: 484-497.
  • [9] Pala Z, Bicakci K, Turk M. Effects of node mobility on energy balancing in wireless networks. Comput Electr Eng 2015; 41: 314-324.
  • [10] Pala Z. Effects of mica2-based discrete energy levels on lifetime of cooperation neighbor sensor networks. Turk J Elec Eng & Comp Sci 2016; 24: 2671-2678.
  • [11] Yuksel A, Uzun E, Tavli B. The impact of elimination of the most critical node on wireless sensor network lifetime. In: IEEE Sensors Applications Symposium; 13–15 April 2015. pp. 1-5.
  • [12] Rajasegarar S, Leckie C, Palaniswami M. Anomaly detection in wireless sensor networks. IEEE Wirel Commun 2008; 15: 34-40.
  • [13] Jabeura N, Sahlib N, Khanc IM. Survey on sensor holes: a cause-effect-solution perspective. Procedia Computer Science 2013; 19: 1074-1080.
  • [14] Zhou Y, Cai X. An approach to detect sensor node anomaly in wireless sensor network. In: Computer Network and Multimedia Technology Symposium; 18–20 January 2009; Wuhan, China. pp. 1-4.
  • [15] Yu B, Xiao B. Detecting selective forwarding attacks in wireless sensor networks. In: IEEE Parallel and Distributed Processing Symposium; 25–29 April 2006.
  • [16] Ngai ECH, Liu J, Lyu MR. On the intruder detection for sinkhole attack in wireless sensor networks. In: IEEE International Conference on Communications; June 2006; ˙Istanbul, Turkey. pp. 3383-3389.
  • [17] Pires WR, de Paula Figueiredo TH, Wong HC, Loureiro AAF. Malicious node detection in wireless sensor networks. In: IEEE Parallel and Distributed Processing Symposium; 26–30 April 2004.
  • [18] Usman M, Muthukkumarasamy V, Xin-Wen Wu, Khanum S. Wireless smart home sensor networks: mobile agent based anomaly detection. In: Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing; 4–7 September 2012; Fukuoka, Japan. pp. 322-329.
  • [19] Curiac DI, Banias O, Dragan F, Volosencu C, Dranga O. Malicious node detection in wireless sensor networks using an autoregression technique. In: Third International Conference on Networking and Services; 19–25 June 2007; Athens, Greece. pp. 83-88.
  • [20] Du W, Fang L, Ning P. LAD: Localization anomaly detection for wireless sensor networks. In: IEEE Parallel and Distributed Processing Symposium; 4–8 April 2005. p. 41a.
  • [21] Agrawal N, Mishra N. RTT based wormhole detection using NS-3. In: Computational Intelligence and Communication Networks, International Conference; 14–16 November 2014; Bhopal, India. pp. 861-866.
  • [22] Wu B. A hierarchical authentication scheme in wireless sensor networks. In: Mobile Ad Hoc and Sensor Systems, IEEE 11th International Conference; 28–30 October 2014; Philadelphia, PA, USA. pp. 630-635.
  • [23] Cui B, Yang SJ. NRE: Suppress selective forwarding attacks in wireless sensor networks. In: Communications and Network Security, IEEE Conference; 29–31 October 2014; San Francisco, CA, USA. pp. 229-237.
  • [24] Li W. Wireless sensor network placement algorithm. In: International Conference on Wireless Communications, Networking and Mobile Computing; 24–26 September 2009; Beijing, China. pp. 1-4.
  • [25] Lee SJ, Chun IG, Kim WT, Park SM. Control method for the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks. In: International Conference on Information and Communication Technology; 17–19 November 2010; Jeju, Korea. pp. 537-538.
  • [26] Newsome J, Shi E, Song D, Perrig A. The Sybil attack in sensor networks: analysis and defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks; 26–27 April 2004. pp. 259-268.
  • [27] Tahir H, Shah S. Wireless sensor networks-a security perspective. In: Proceedings of the 12th IEEE International Multi-Topic Conference; 23–24 December 2008, Karachi, Pakistan. pp. 189-193.
  • [28] Saihi M, Boussaid B, Zouinkhi A, Abdelkrim MN. WSN implementation of DFD algorithm on SOFREL S550/WAVENIS unit. In: Sciences and Techniques of Automatic Control and Computer Engineering, 15th International Conference; 21–23 December 2014; Hammamet, Tunisia. pp. 219-224.
  • [29] Rosenthal RE. GAMS: A User’s Guide. Washington, DC, USA: GAMS Development Corporation, 2015.