A Fault-Event Detection Model Using Trust Matrix in WSN

Similar documents
Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF SECURITY THREATS

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

ZigBee Routing Algorithm Based on Energy Optimization

Hole repair algorithm in hybrid sensor networks

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

A Fault-recovery Routing Approach for Loop-based Clustering WSN

Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving Multi-documents

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes

A Kind of Wireless Sensor Network Coverage Optimization Algorithm Based on Genetic PSO

Using SensorRanks for In-Network Detection of Faulty Readings in Wireless Sensor Networks

Research on Transmission Based on Collaboration Coding in WSNs

Mobility Control for Complete Coverage in Wireless Sensor Networks

A Secure Data Transmission Scheme in Wireless Sensor Networks

A REVIEW ON DATA AGGREGATION TECHNIQUES IN WIRELESS SENSOR NETWORKS

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM

An Authentication Scheme for Clustered Wireless Sensor Networks

Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network

Research on Ad Hoc-based Routing Algorithm for Wireless Body Sensor Network

Algorithms for minimum m-connected k-tuple dominating set problem

Integrated Routing and Query Processing in Wireless Sensor Networks

Prianka.P 1, Thenral 2

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

Trust-Based Intrusion Detection in Wireless Sensor Networks

An Improved Fusion Method of Fuzzy Logic Based on k-mean Clustering in WSN

TAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

WSN Routing Protocols

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Energy Efficient Clustering Protocol for Wireless Sensor Network

Improvement of Buffer Scheme for Delay Tolerant Networks

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Location-aware In-Network Monitoring in Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Cluster Validity Classification Approaches Based on Geometric Probability and Application in the Classification of Remotely Sensed Images

ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

MALICIOUS NODE DETECTION USING A DUAL THRESHOLD IN WIRELESS SENSOR NETWORKS

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Spoofing Detection in Wireless Networks

False Data Filtering Strategy in Wireless Sensor Network Based on Neighbor Node Monitoring

An Adaptive and Optimal Distributed Clustering for Wireless Sensor

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Virtual Interaction System Based on Optical Capture

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

An Improved KNN Classification Algorithm based on Sampling

Design of the Power Online Monitoring System Based on LabVIEW

An Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model. Zhang Ying-Hui

SPATIAL CORRELATION BASED CLUSTERING ALGORITHM FOR RANDOM AND UNIFORM TOPOLOGY IN WSNs

POWER SAVING AND ENERGY EFFFICIENT ROUTING PROTOCOLS IN WNS: A SURVEY

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

Searching Algorithm of Dormant Node in Wireless Sensor Networks

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

High Speed Data Collection in Wireless Sensor Network

A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s

Opportunistic Transmission Based QoS Topology Control. QoS; Wireless Sensor Networks

An Embedded Dynamic Security Networking Technology Based on Quick Jump and Trust

Research on Relative Coordinate Localization of Nodes Based on Topology Control

Reliable Mobile IP Multicast Based on Hierarchical Local Registration

Application of Theory and Technology of Wireless Sensor Network System for Soil Environmental Monitoring

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Sensors & Transducers Published by IFSA Publishing, S. L.,

MultiHop Routing for Delay Minimization in WSN

IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK

On QoS Mapping in TDMA Based Wireless Sensor Networks

Trust4All: a Trustworthy Middleware Platform for Component Software

Image Segmentation Based on Watershed and Edge Detection Techniques

An Energy Efficient Intrusion Detection System in MANET.

Model the P2P Attack in Computer Networks

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

NEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi

Robust Method of Power Saving Approach in Zigbee Connected WSN with TDMA

An Improved DV-Hop Algorithm for Resisting Wormhole Attack

Overview on Load Balanced Data Aggregation Tree in Wireless Sensor Network

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

Selective Forwarding Attacks Detection in WSNs

FEDA: Fault-tolerant Energy-Efficient Data Aggregation in Wireless Sensor Networks

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

On optimal placement of relay nodes for reliable connectivity in wireless sensor networks

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

The Research of Collision Detection Algorithm Based on Separating axis Theorem

A SECURE DOMAIN NAME SYSTEM BASED ON INTRUSION TOLERANCE

Transcription:

Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Fault-Event Detection Model Using Trust Matrix in WSN 1,2 Na WANG, 1 Yi-Xiang CHEN 1 Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, 200062, China 2 School of Computer and information, Shanghai Second Polytechnic University, Shanghai, 201209, China Tel.: 086+02150214252 E-mail: wnoffice@126.com Received: 18 September 2013 /Accepted: 25 October 2013 /Published: 30 November 2013 Abstract: Sensor nodes and wireless links are prone to failure, while the network is also open to various malicious attacks. When detecting faults, one of the most important tasks is to distinguish an event from fault with discarding irrelevant data by computing over the data as it flows through the sensors. We investigate a method of fault and event detection using trust model in WSN based on similarity matrix. We use similarity matrix to distinguish groups from each other in one cluster. Then cluster head sends the result to its parent where event nodes will be selected from abnormal set according to members in other sets from other cluster heads at the same level. Copyright 2013 IFSA. Keywords: Fault, Event, Similarity, Matrix, Trust model. 1. Introduction Wireless sensor networks comprising of thousands of inexpensive sensor nodes can be set up with relative ease by placing the nodes in predefined locations manually or through the use of robots, as well as by random deployment of self-organizing nodes. A large amount of applications ranging from health, home, environmental to military and defense make use of sensor nodes for collection of appropriate data. The sensor nodes comprising of data collecting, processing, and transmitting units are very small in size and can be densely deployed owing to their low cost. Meanwhile, the sensor nodes and wireless links are prone to failure, while the network is also open to various malicious attacks. So development of fault tolerance in this highly volatile scenario remains an interesting open research issue. Conventional fault tolerance and intrusion tolerance protocols do not translate well to the sensor network domain due to its large scale and the resource constraints on the sensor nodes. Then serials of new tolerance protocols have been proposed to detect various kinds of faults. When detecting faults, one of the most important tasks is aggregating data from multiple sensor nodes to decide if an event has occurred and determining the location of the event, with discarding irrelevant data by computing over the data as it flows through the sensors. The rest of the paper is organized as follows. The detailed trust model is depicted in Section 3. The mechanism of getting partition and merging sets is 190 Article number P_1483

depicted in Section 4. The comparison and evaluation of our trust model with K-means and TAG are given in Sections 5. The related work and our conclusions are presented in Sections 2 and 6. 2. Related work As in any sensor networks problems, we require a great deal of related material to ensure that our model is helpful and necessary to data aggregation for fault detection. For data aggregation, in [1], authors present a distributed stochastic formulation of the K- Means clustering algorithm which is fully decentralized and intrinsically fault tolerant. And [2] propose the global k-means clustering algorithm, which constitutes a deterministic effective global clustering algorithm for the minimization of the clustering error that employs the k-means algorithm as a local search procedure. But the complexity of k- means algorithm is o (n*k*t) where n is the number of nodes, k is the number of groups and t is the iteration times. Except for the above method deduced form traditional clustering algorithm using in data aggregation, there are also new methods derived from dataset technology such as in [3]. TAG allows users to express simple, declarative queries and have them distributed and executed efficiently in networks of low-power, wireless sensors. They discuss various generic properties of aggregates, and show how those properties affect the performance of the approach. [4] puts forward a robust aggregation algorithm RAA (robust aggregation algorithm). RAA improves traditional aggregation query based on [3] using reading vector to judge whether a faulty or outlier has happened. With the application and development of trust, fresh methods to data aggregation and fault detection have been introduced in recent years. Ganeriwal, Balzano and Srivastava proposed a reputation-based framework for high integrity WSN named RFSN [5]. In the RFSN framework, a Bayesian formulation is employed to update reputation matrix. Trust Voting [7] is an efficient in-network voting algorithm to determine faulty sensor readings based on Sensor Rank by exploring Markov Chain. Xiao Wei proposed a fault tolerant scheme for data aggregation based event clustering called EFSA [6]. The event cluster was generated before the weighted average data were extracted as approximate event value by way of k-means algorithm. The confident rate of every node in the event cluster was computed and adjusted by iterative algorithm and the CR (trust value) functioned as the weighted value in aggregating data and the indicator of data fault from nodes. Obviously, there have been works to combine traditional method with trust model, but as in [6], Xiao computes nodes trust rank only based on its own value. In this condition, when event occurs, nodes detecting event may be considered as not trust so that their trust rank will decreased according to the definition TI = e-λv where TI is the trust value of node and λ is a proportionality constant that is application dependent. Variable v is maintained for each node at the CH. Each time a node makes a report deemed faulty by the CH its v is incremented by the expression 1-fr. Each time a node makes a report deemed to be correct by the CH its v is decreased by fr (natural error rate) if v is larger than zero. So it is reasonable to consider both nodes single trust and neighborhood trust. In this paper, we propose a model to compute neighborhood trust and a method to delete fault data and obtain event data. The contribution of our work is: 1. Create a neighborhood trust matrix according to neighbor data similarity in common cluster. 2. Get partition of the cluster with using the trust matrix. 3. Merge sets to determine event data and delete fault data. 4. Compare our model with TAG and K-means. 3. A Trust Model Based on Similarity 3.1. System Model All nodes in the network are identical and arranged into disjoint clusters, each with a set of cluster heads. The CH serves as the data sink for its particular cluster. The nodes in a cluster are within one hop communication of the CH. The CH is rotated over time and CH election is based on energy-related parameters of the constituent nodes. In each cluster, the node that is chosen to be the CH knows the topology of the cluster. Nodes that are within the detection range of an event are called event neighbors for that event. When an event occurs, all the event neighbors are expected to report the occurrence of the event to each other. Then, each node sends its neighbor s information to CH. The CH clusters neighbor s information and create a matrix according to similarity between node and its neighbors. After the creation of matrix, we compute the indirect similarity among all nodes in the cluster to makes a decision on whether the event has occurred and where are the faults. Traditionally, the process of CH making decision is as follows: When an event occurs, all the event neighbors are expected to report the occurrence of the event to the CH. The CH can create a matrix based on similarity between each pair nodes. But, there are some special cases such as shown in Fig. 1. It assumes that node A detects fire in region 1 and B detects fire in region 2. Since A and B are in the same cluster, their detected data is similar and the similarity value in the matrix is close to 1. When locate fire region, it may be considered that the region in border A to B is event occurrence. Here, A and B detect the same event in different regions. 191

Fig. 1. An example of fire detection region. 3.2. Trust Matrix When consider a cluster, we get a G = (V, E, s) consists of vertexes V, edges E and similarity weight s. Each vertex is a node and each edge is the connection of two neighbors. We compute the similarity among sensor nodes as: S = xx i j i, j 2 2 xi + xj xx i j where node i and node j is adjacent in location. Assume there is a G as shown in Fig. 2, its trust matrix is like Fig. 3. Trust (G, s): Input: G : a network of one cluster s: reference head v: nodes in cluster trust[s][]: value of similarity between current node and reference node w[u][v]: weight of an edge between u and v output: trust[s][]: new value of similarity between current node and reference node for each vertex v in V Trust[s][v] = 1 for each vertex v in V(exclude s) for each edge w[u][v] if trust[s][v] > trust[s][u] ϒ w[u][v]) trust[s][v] = trust[s][u] ϒ w[u][v] Fig. 4. Algorithm computing indirect trust value. In this algorithm, we define operator ϒ as: min( a, b) if a > t and b > t ar b=, a b else Fig. 2. An example of dual-weighted network. where t is the threshold of trust. It is considered that if node A and node B is adjacent and their sensor data are highly similar, we may decide they trust each other. Otherwise, we make the trust value decline sharply by plus them. As an example, the indirect trust value of node n1with four other nodes in figure 2 is (0.9, 0.09, 0.95, 0.98). Then the nodes can be divided into two sets n1, n2, n4, n5 and n3. When data in one set is close to normal value, the set will be regarded as normal set. Otherwise, it should be regarded as abnormal set in which the node may be event node or fault node. 4. Faulty-Event Detection Model Fig. 3. Trust matrix of Fig. 2. In order to make decision which node detect event and whether there are fault nodes in this cluster, different types of nodes must be divide into different sets. With conference to trust matrix, we only know trust character between neighbors but not all nodes. Next, an algorithm described in Fig. 4 is proposed to compute indirect trust value. 4.1. Detection After partition, how to prove whether a node is event node or fault is a crucial step. Both the above two sets are maintained by cluster head and will be sent to the parent node as a combination. It should be emphasized that the minority set includes the abnormal node s information and its neighbors list in its cluster. At the next iterating, abnormal data will search for its approximate data from other cluster head s value. Once there are approximate companies 192

and the companies are in its neighbor list, abnormal node will be identified as event node. Finally, sink node will get event nodes information and delete fault nodes in its topology. The algorithm is described in Fig. 5. Detect(D) F k : the kth fault set E k : the kth event set K: number of clusters m: number of nodes in abnormal set θ: a threshold of difference nei(i): neighbor list of node i for (i=0;i<m;i++) if ((Εd j ε F k ) d i -d j <θ && jεnei(i)) then delete d i from F k ; create E k ; merge d i into E k ; if ((Εd j ε E k ) d i -d j <θ && jεnei(i)) then delete d i from F k ; merge d i into E k ; send fault set and event set to its parent; 5. Simulation Our experiment uses ns3 to design. Fifty sensor nodes are distributed in a space of 500 700, and the communication radius is set as 60. Each node has two to five neighbors in the experiment and the node's location is already known. We only consider the communication overhead with ignoring calculation cost. It is also assumed that the route is reliable without considering the case of route failure. We consider the energy consumption and error detection rate for simulation. It is shown in Fig. 7 that, when data error rate is changed, trust model maintains an average of packets by 1000. But TAG algorithm gets an increased average of packets as the data error rate growing. This is because that trust model completes the process of aggregation and abnormality detection at the same time. While for TAG, the node that is abnormal need to be confirmed by neighbors voting. With the fault rate increasing, the number of votes also increased which resulting in more energy consumption. K-means algorithm maintains a little variable average of packets, as its energy mainly consumed on the information exchange when grouping and iterating. And the iteration number is deduced from data but not the fault rate. Fig. 5. Algorithm of fault detecting. For example, there is a network as shown in Fig. 6, since node A and node B are event nodes in different regions that are no fire, they will be considered as abnormal and set in F i. Then F 1 including A and F 2 including B are sent to ch1-1, meanwhile, E 3 from ch3 is sent to ch1-1 too. In ch1-1, algorithm of fault detecting is run to merge A and B into E 3. The followed levels are acted as so on till sink. Finally, there may be more than one event set since there are probably multi events in regions that are not adjacent. Moreover, the rest nodes in F i are fault nodes that will be deleted from the network. Fig. 7. Comparison of energy consumption. Fig. 6. A network example. Except for energy consumption, error detection rate is another important merit to measure a detection algorithm. We define error detection rate as fs/f, where fs is the number of fault nodes that have been detected and f is the total number of fault nodes. Simulation result is shown in Fig. 8 which indicates that the detection rate of matrix model is higher than TAG. Since TAG aggregates data according to its SQL sentences in which a parameter must be set to group, different parameters may deduce different result. So the selection of parameter is crucial to TAG which influence the detection rate. Matrix model uses similarity to group without any parameter and compares data in sets with normal data to decide the belonging of each set. Trust model is 193

more precise than TAG in grouping so as to make higher detection rate. Project (No. ZF1213). The authors would like to thank the referees for their invaluable comments and suggestions. References Fig. 8. Comparison of fault detection rate. 6. Conclusions In this paper, we investigate a method of faulty and event detection using trust model in WSN based on similarity matrix. We use similarity matrix to distinguish groups from each other in clusters. Then cluster head send the result to its parent where event nodes are selected from abnormal set according to members in other sets from other cluster heads at the same level. This model can successfully detect fault nodes and event nodes. We did a series of simulations to test the performance of our proposed model. The simulation results have showed that fault detection rate is sensitive to node density, and the performance of our model is better than TAG [3] in terms of fault detection rate and energy consumption. Acknowledgements This work is supported by the National High- Tech Research & Development Program of China (Grant No. 2011AA010101), the National Basic Research Program of China (Grant No. 2011CB302802) and the National Natural Science Foundation of China (Grant Nos. 610211004, 61370100). Chen acknowledges the part support by Shanghai Knowledge Service Platform [1]. Giuseppe Di Fatta, Francesco Blasa, Simone Cafiero, Giancarlo Fortino, Fault tolerant decentralised K-Means clustering for asynchronous large-scale networks, Journal of Parallel and Distributed Computing, Vol. 73, Issue 3, March 2013, pp. 317-329. [2]. Aristidis Likas, Nikos Vlassis, Jakob J. Verbeek, The global k-means clustering algorithm, Pattern Recognition, Vol. 36, Issue 2, February 2003, pp. 451-461. [3]. S. R. Madden, M. J. Franklin, J. M. Hellerstein, W. Hong, TAG: A tiny aggregation service for ad-hoc sensor networks, in Proceedings of the 5 th Symposium on Operating Systems Design and Implementation, Vol. 36, Issue SI, 2002, pp. 131-146. [4]. Zhong-Bo Wu, Chong-Sheng Zhang, Robust aggregation algorithm in sensor networks, Journal of Software, Vol. 20, No. 7, July 2009. [5]. S. Ganeriwal, L. Balzano, M. Srivastava, Reputationbased framework for high integrity sensor networks, ACM Transactions on Sensor Networks, Vol. 4, No. 3, May 1, 2008. [6]. Wei XIAO, Min Xu, Fault tolerant scheme for data aggregation in event cluster over wireless sensor networks, Journal on Communications, Vol. 31, No. 6, June 2010, pp. 112-118. [7]. Guoxing Zhana, Weisong Shi, Julia Deng, SensorTrust: A resilient trust model for wireless sensing systems, Pervasive and Mobile Computing, Vol. 7, No. 4, August 2011, pp. 509-522. [8]. Yanli Yu, Keqiu Li, Wanlei Zhou, Ping Li, Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures, Journal of Network and Computer Applications, Vol. 35, No. 3, May 2012, pp. 867-880. [9] Mark Krasniewski, Padma Varadharajan, Bryan Rabeler, Saurabh Bagchi, TIBFIT: trust index based fault tolerance for arbitrary data faults in sensor networks, in Proceedings of the International Conference on Dependable Systems and Networks, 2005, pp. 672-681. [10]. Yan-Ming Chen, Yong-Jun Xu, Qiu-Guang Wang, Lei Xie, An adaptive fault-tolerant scheme for wireless sensor networks, in Proceedings of the WRI International Conference on Communications and Mobile Computing (CMC' 2009), Vol. 2, 2009, pp. 32-36. 2013 Copyright, International Frequency Sensor Association (IFSA). All rights reserved. (http://www.sensorsportal.com) 194