scholarly journals A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks

Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1108 ◽  
Author(s):  
Jihun Lim ◽  
Dooho Keum ◽  
Young-Bae Ko

In tactical wireless sensor networks, tactical sensors are increasingly expected to be exploited for information collection in battlefields or dangerous areas on behalf of soldiers. The main function of these networks is to use sensors to measure radiation, nuclear, and biochemical values for the safety of allies and also to monitor and carry out reconnaissance of enemies. These tactical sensors require a network traffic flow that sends various types of measured information to the gateway, which needs high reliability. To ensure reliability, it must be able to detect malicious nodes that perform packet-dropping attacks to disrupt the network traffic flow, and energy-constrained sensors require energy-efficient methods to detect them. Therefore, in this paper, we propose a stepwise and hybrid trust evaluation scheme for locating malicious nodes that perform packet-dropping attacks in a tree-based network. Sensors send a query to the gateway by observing the traffic patterns of their child nodes. Moreover, depending on the situation, the gateway detects malicious nodes by choosing between gateway-assisted trust evaluation and gateway-independent trust evaluation. We implemented and evaluated the proposed scheme with the OPNET simulator, and the results showed that a higher packet delivery ratio can be achieved with significantly lower energy consumption.

The fundamental capacity of a sensor system is to accumulate and forward data to the destination. It is crucial to consider the area of gathered data, which is utilized to sort information that can be procured using confinement strategy as a piece of Wireless Sensor Networks (WSNs).Localization is a champion among the most basic progressions since it agreed as an essential part in various applications, e.g., target tracking. If the client can't gain the definite area information, the related applications can't be skillful. The crucial idea in most localization procedures is that some deployed nodes with known positions (e.g., GPS-equipped nodes) transmit signals with their coordinates so as to support other nodes to localize themselves. This paper mainly focuses on the algorithm that has been proposed to securely and robustly decide thelocation of a sensor node. The algorithm works in two phases namely Secure localization phase and Robust Localization phase. By "secure", we imply that malicious nodes should not effectively affect the accuracy of the localized nodes. By “robust”, we indicate that the algorithm works in a 3D environment even in the presence of malicious beacon nodes. The existing methodologies were proposed based on 2D localization; however in this work in addition to security and robustness, exact localization can be determined for 3D areas by utilizing anefficient localization algorithm. Simulation results exhibit that when compared to other existing algorithms, our proposed work performs better in terms of localization error and accuracy.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Zhiming Zhang ◽  
Yu Yang ◽  
Wei Yang ◽  
Fuying Wu ◽  
Ping Li ◽  
...  

The current detection schemes of malicious nodes mainly focus on how to detect and locate malicious nodes in a single path; however, for the reliability of data transmission, many sensor data are transmitted by multipath in wireless sensor networks. In order to detect and locate malicious nodes in multiple paths, in this paper, we present a homomorphic fingerprinting-based detection and location of malicious nodes (HFDLMN) scheme in wireless sensor networks. In the HFDLMN scheme, using homomorphic fingerprint and coding technology, the original data is divided into n packets and sent to the base station along n paths, respectively; the base station determines whether there are malicious nodes in each path by verifying the validity of the packets; if there are malicious nodes in one or more paths, the location algorithm of the malicious node is implemented to locate the specific malicious nodes in the path; if all the packets are valid, the original data is recovered. The HFDLMN scheme does not need any complex evaluation model to evaluate and calculate the trust value of the node, nor any monitoring nodes. Theoretical analysis results show that the HFDLMN scheme is secure and effective. The simulation results demonstrate promising outcomes with respect to key parameters such as the detection probability of the malicious path and the locating probability of the malicious node.


Author(s):  
Yousef S. Kavian ◽  
Hadi Rasouli

The energy efficiency is a main challenging issue for employing wireless sensor networks (WSNs) in extreme environments where the media access progress consumes the main part of network energy. The IEEE 802.15.4 is adopted in low complexity, ultra-low power and low data rate wireless sensor applications where the energy consumption of nodes should be managed carefully in harsh and inaccessible environments. The beacon-enabled mode of the IEEE 802.15.4 provides a power management scheme. When the network traffic is variable, this mode does not work as well and the coordinator is not capable for estimating the network traffic and adjusting proper duty cycle dynamically. In this chapter an approach for estimating network traffic in star topology is proposed to overcome this issue where the coordinator could estimate the network traffic and dynamically adjusts duty cycle proportion to the variation of network traffic. The simulation results demonstrate the superiority of proposed approach for improving the energy consumption, throughput and delay in comparison with the IEEE 802.15.4 under different traffic conditions.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Haji Said Fimbombaya ◽  
Nerey H. Mvungi ◽  
Ndyetabura Y. Hamisi ◽  
Hashimu U. Iddi

Traffic flow monitoring involves the capturing and dissemination of real-time traffic flow information for a road network. When a vehicle, a ferromagnetic object, travels along a road, it disturbs the ambient Earth’s magnetic field, causing its distortion. The resulting distortion carries vehicle signature containing traffic flow related information such as speed, count, direction, and classification. To extract such information in chaotic cities, a novel algorithm based on the resulting magnetic field distortion was developed using nonintrusive sensor localization. The algorithm extracts traffic flow information from resulting magnetic field distortions sensed by magnetic wireless sensor nodes located on the sides of the road. The model magnetic wireless sensor networks algorithm for local Earth’s magnetic field performance was evaluated through simulation using Dar es Salaam City traffic flow conditions. Simulation results for vehicular detection and count showed 93% and 87% success rates during normal and congested traffic states, respectively. Travel Time Index (TTI) was used as a congestion indicator, where different levels of congestion were evaluated depending on the traffic state with a performance of 87% and 88% success rates during normal and congested traffic flow, respectively.


Sign in / Sign up

Export Citation Format

Share Document