skip to main content
research-article

Connectivity Reestablishment in Self-Organizing Sensor Networks with Dumb Nodes

Authors Info & Claims
Published:13 January 2016Publication History
Skip Abstract Section

Abstract

In this work, we propose a scheme, named CoRAD, for the reestablishment of lost connectivity using sensor nodes with adjustable communication range in stationary wireless sensor networks (WSNs), when “dumb” behavior occurs some of the nodes. Due to the occurrence of such behavior, there may be temporary loss of connectivity between among the nodes. Such a phenomenon is different from the commonly known node isolation problem in stationary WSNs. The mere activation of intermediate sleep nodes cannot guarantee reestablishment of connectivity, because there may not exist neighbor nodes of the isolated nodes. On the contrary, the increase in communication range of a single sensor node may make it die quickly. Including this, a sensor node has maximum limit of increase in communication range that may not be sufficient to reestablish connectivity. Therefore, considering all these factors for self-organization of the network and isolated node re-connection, we propose a price-based scheme, which addresses the issue by activating intermediate sleep nodes or by adjusting the communication range of some of the other nodes in the network. The scheme also deactivates the additional activated nodes and reduces the increased communication range when the dumb nodes resume their normal behavior, upon the return of favorable environmental conditions. To implement the proposed scheme, CoRAD it is required to construct the network using GPS-enabled adjustable communication range sensor nodes. Through simulation we compare our proposed scheme with the existing topology management schemes -- LETC and A1 -- in the same scenario by considering the number of activated nodes, message overhead, and energy consumption. We find that the proposed scheme shows improved performance compared to the existing topology management schemes.

References

  1. A. Abduvaliyev, A. S. K. Pathan, J. Zhou, R. Roman, and W. C. Wong. 2013. On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials 15, 3, 1223--1237.Google ScholarGoogle ScholarCross RefCross Ref
  2. N. Ahmed, S. S. Kanhere, and S. Jha. 2005. The holes problem in wireless sensor networks: A survey. ACM Mobile Computing and Communications Review 9, 2, 4--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. 2002a. Wireless sensor networks: A survey. Computer Networks. 38, 4, 393--422. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, and E. Cayirci. 2002b. A survey on sensor networks. IEEE Communications Magazine, 40, 8, 102--114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. Anastasi, A. Falchi, A. Passarella, M. Conti, and E. Gregori. 2004. Performance measurements of motes sensor networks. In Proceedings of the 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, 174--181. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Bagci, I. Korpeoglu, and A. Yazici. 2014. A distributed fault-tolerant topology control algorithm for heterogeneous wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems.Google ScholarGoogle Scholar
  7. K. Bannister, G. Giorgetti, and S. Gupta. 2008. Wireless sensor networking for hot applications: Effects of temperature on signal strength, data collection and localization. In Proceedings of the 5th Workshop on Embedded Networked Sensors.Google ScholarGoogle Scholar
  8. C. A. Boano, N. Tsiftes, T. Voigt, J. Brown, and U. Roedig. 2010. The impact of temperature on outdoor industrial sensornet applications. IEEE Transactions on Industrial Informatics 6, 3, 451--459.Google ScholarGoogle ScholarCross RefCross Ref
  9. J. Bonvoisin, A. Lelah, F. Mathieux, and D. Brissaud. 2011. Environmental impact assessment model for wireless sensor networks. In Proceedings of the 18th CIRP International Conference on Life Cycle Engineering. 124--129.Google ScholarGoogle Scholar
  10. C. W. Chen, K. F. Ssu, and H. C. Jiau. 2007. Fault-tolerant topology control with adjustable transmission ranges in wireless sensor networks. In Proceedings of 13th Pacific Rim International Symposium on Dependable Computing. Melbourne, Australia, 131--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. K. Dhurandher, S. Misra, M. S. Obaidat, and N. Gupta. 2009. An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks. Security and Communication Networks 2, 2, 215--224.Google ScholarGoogle ScholarCross RefCross Ref
  12. G. Dini, M. Pelagatti, and I. M. Savino. 2008. An algorithm for reconnecting wireless sensor network partitions. In Proceedings of the 5th European Conference on Wireless Sensor Networks. 253--267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Drozda, S. Schaust, and H. Szczerbicka. 2007. AIS for misbehavior detection in wireless sensor networks: Performance and design principles. In Proceedings of IEEE Congress on Evolutionary Computation. Singapore, 25--28.Google ScholarGoogle Scholar
  14. N. Edalat, X. Wendong, T. C. Khong, E. Keikha, and O. L. Ling. 2009. A price-based adaptive task allocation for wireless sensor network. In 6th International Conference on Mobile Adhoc and Sensor Systems. 888--893.Google ScholarGoogle Scholar
  15. A. Fanimokun and J. Frolik. 2003. Effects of natural propagation environments on wireless sensor network coverage area. In Proceedings of the 35th Southeastern Symposium on System Theory. 16--20.Google ScholarGoogle Scholar
  16. D. Herbert, V. Sundaram, Y. H. Lu, S. Bagchi, and Z. Li. 2007. Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking. ACM Transactions on Autonomous and Adaptive Systems 2, 3, 1--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. D. Jose, Jin Wang, and I. J. de Dieu. 2011. Adjustable range routing algorithm based on position for wireless sensor networks. In Proceedings of the 2nd International Conference on Next Generation Information Technology. Gyeongju, Korea, 72--77.Google ScholarGoogle Scholar
  18. P. Kar, S. Misra, A. Roy, and M. S. Obaidat. 2015. Energy-efficient connectivity re-establishment in WSN in the presence of dumb nodes. In Proceedings of IEEE ICC 2015 4th IEEE International Workshop on Smart Communication Protocols and Algorithms (SCPA). London, UK, 1470--1475.Google ScholarGoogle Scholar
  19. P. Kar and S. Misra. 2015. Detouring dynamic routing holes in stationary wireless sensor networks in the presence of temporarily misbehaving nodes. International Journal of Communication Systems. DOI: 10.1002/dac.3009.Google ScholarGoogle Scholar
  20. E. Karapistoli, P. Sarigiannidis, and A. A. Economides. 2013. SRNET: A real-time, cross-based anomaly detection and visualization system for wireless sensor networks. In ACM 10th Workshop on Visualization for Cyber Security. New York, NY, 49--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Khelifa, H. Haffaf, M. Madjid, and D. L. Jones. 2009. Monitoring connectivity in wireless sensor networks. In IEEE Symposium on Computers and Communications. Sousse, 507--512.Google ScholarGoogle Scholar
  22. C. A. Levis. 2005. Encyclopedia of RF and Microwave Engineering. Wiley, Hoboken, NJ.Google ScholarGoogle Scholar
  23. H. Liu and B. Krishnamachari. 2006. A price-based reliable routing game in wireless networks. In Proceeding on 1st Workshop Game Theory for Communications and Networks (GameNets). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. X. Mao, S. Tang, X. Xu, X. Y. Li, and H. Ma. 2011. Energy efficient opportunistic routing in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 22, 11, 1934--1942. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Z. H. Mir and Y. B. Ko. 2008. A topology management framework for wireless sensor networks via power control. In Proceedings of IEEE INFOCOM Workshops. Phoenix, AZ.Google ScholarGoogle Scholar
  26. S. Misra and A. Jain. 2011. Policy controlled self-configuration in unattended wireless sensor networks. Journal of Networks and Computer Applications 34, 5, 1530--1544. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. Misra, P. Kar, A. Roy, and M. S. Obaidat. 2014. Existence of dumb nodes in stationary wireless sensor networks. Journal of Systems and Software 91, 135--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. S. Misra, M. P. Kumar, and M. S. Obaidat. 2011. Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks. Computer Communications 34, 12, 1484--1491. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Misra, B. J. Oommen, S. Yanamandra, and M. S. Obaidat. 2010. Random early detection for congestion avoidance in wired networks: The discretized pursuit learning. IEEE Transactions on Systems, Man and Cybernetics Part B 40, 1, 66--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. S. Misra, V. Tiwari, and M. S. Obaidat. 2009. LACAS: Learning automata-based congestion avoidance scheme for healthcare wireless sensor networks. IEEE Journal on Selected Areas in Communications 27, 4, 466--479. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. F. Nadeem, S. Chessa, E. Leitgeb, and S. Zaman. 2010. Effects of weather on the life time of wireless sensor networks using FSO/RF communication. Radio Engineering 19, 2, 262--270.Google ScholarGoogle Scholar
  32. L. Paradis and Q. Han. 2007. Dealing with faults in wireless sensor networks. Network and Systems Management 15, 171--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. R. Rajagopalan and P. K. Varshney. 2009. Connectivity analysis of wireless sensor networks with regular topologies in the presence of channel fading. IEEE Transactions on Wireless Communications 8, 7, 3475--3483. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. S. Rizvi, H. K. Qureshi, S. A. Khayam, V. Rakocevic, and M. Rajarajan. 2012. A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks. Journal of Network and Computer Applications 35, 2, 597--605. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. A. Roy, P. Kar, and S. Misra. 2014a. Detection of dumb nodes in a stationary wireless sensor network. In Proceedings of 11th IEEE India Conference. Pune, India, 1--6.Google ScholarGoogle Scholar
  36. A. Roy, P. Kar, S. Misra, and M. S. Obaidat. 2014b. D3: Distributed approach for the detection of dumb nodes in wireless sensor networks. International Journal of Communication Systems. DOI:10.1002/dac.2913.Google ScholarGoogle Scholar
  37. A. Roy, A. Mondal, and S. Misra. 2014c. Connectivity re-establishment in the presence of dumb nodes in sensor-cloud infrastructure: A game theoretic approach. In Proceedings of 6th International Conference on Cloud Computing Technology and Science. Singapore, 847--852. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. L. B. Ruiz, I. G. Siqueira, L. B. e Oliveira, H. C. Wong, J. M. S. Nogueira, and A. A. F. Loureiro. 2004. Fault management in event-driven wireless sensor networks. In Proceedings of the 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, 149--156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. F. Senel, M. F. Younis, and K. Akkaya. 2011. Bio-inspired relay node placement heuristics for repairing damaged wireless sensor networks. IEEE Transactions on Vehicular Technology 60, 4, 1835--1848.Google ScholarGoogle ScholarCross RefCross Ref
  40. J. S. Seybold. 2005. Introduction to RF Propagation. Wiley, Hoboken, NJ.Google ScholarGoogle Scholar
  41. Y. Sun, M. Shen, L. Zhou, F. Ma, X. Lin, and Y. Xiong. 2010. Design of a wireless sensor network for farmland monitoring. In 5th International Conference on Frontier of Computer Science and Technology. Changchun, China, 370--375. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. J. A. Torkestani. 2013. An energy-efficient topology construction algorithm for wireless sensor networks. Computer Networks 57, 7, 1714--1725. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. D. Wu, Y. Cai, L. Zhou, and J. Wang. 2012. A cooperative communication scheme based on coalition formation game in clustered wireless sensor networks. IEEE Transactions on Wireless Communications 11, 3, 1190--1200.Google ScholarGoogle ScholarCross RefCross Ref
  44. F. Yu, E. Lee, Y. Choi, S. Park, D. Lee, Y. Tian, and S. H. Kim. 2007. A modeling for hole problem in wireless sensor networks. In International Conference on Wireless Communications and Mobile Computing. New York, NY, 370--375. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. H. Zhang and J. C. Hou. 2005. Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc & Sensor Wireless Networks 1, 1--2, 89--124.Google ScholarGoogle Scholar

Index Terms

  1. Connectivity Reestablishment in Self-Organizing Sensor Networks with Dumb Nodes

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Autonomous and Adaptive Systems
      ACM Transactions on Autonomous and Adaptive Systems  Volume 10, Issue 4
      Special Section on Best Papers from SEAMS 2014 and Regular Articles
      February 2016
      211 pages
      ISSN:1556-4665
      EISSN:1556-4703
      DOI:10.1145/2872308
      Issue’s Table of Contents

      Copyright © 2016 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 January 2016
      • Revised: 1 June 2015
      • Accepted: 1 June 2015
      • Received: 1 August 2014
      Published in taas Volume 10, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!