By Topic

Information Theoretic Approach to Detecting Systematic Node Destructions in Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Arifler, D. ; Dept. of Comput. Eng., Eastern Mediterranean Univ., Famagusta

Hazards such as fires and floods may destroy and prevent nodes of a wireless sensor network from functioning properly and reporting measurements of interest. Destructions by hazardous events are systematic and hence different from random node and link failures, which are very common in wireless sensor networks due to the fragility of devices and the intermittent degradation in wireless link quality. An information theoretic approach is presented that may be used for detecting systematic node destructions in dense sensor deployments wherein detection by visual inspection of the destroyed sensors on a "sensor map" at a central monitoring station is hard, if not impossible. It is shown that the information theoretic approach combined with the statistical methodology presented can effectively be used for automated triggering of alarms in decision support systems to rapidly contain hazards. It is also shown that as few as approximately 20 close-proximity sensor failures could be considered "unusual" enough to detect a systematic destruction with 90% confidence in dense sensor deployments, and this is observed to be independent of deployment density. Simulations also indicate that connectivity, which is critical in wireless sensor networks for relaying measured data, is with high probability not compromised before detection takes place.

Published in:

Wireless Communications, IEEE Transactions on  (Volume:7 ,  Issue: 11 )