SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012



         On-line Fault diagnosis of Arbitrary Connected
                           Networks
                                      Arunanshu Mahapatro1, Pabitra Mohan Khilar2
                              Department of Comp. Sc. & Engg, NIT, Rourkela, India, Pin-769008
                                    Email: 1arun227@gmail.com, 2khilarpm@yahoo.com


Abstract— This paper proposes an on-line two phase fault                The specific contributions of this paper are listed as follows:
diagnosis algorithm for arbitrary connected networks. The               1. Proposes a generic diagnosis scheme that identifies crash
algorithm addresses a realistic fault model considering crash           and value faults with high accuracy by maintaining low time,
and value faults in the nodes. Fault diagnosis is achieved by           message and energy overhead.
comparing the heartbeat message generated by neighboring
                                                                        2. Presents both analytical and simulation analysis to prove
nodes and dissemination of decision made at each node.
Theoretical analysis shows that time and message complexity
                                                                        the correctness and completeness of the algorithm.
of the diagnosis scheme is O(n) for a n-node network. The
message and time complexity are comparable to the existing                                   II. RELATED WORKS
state of art approaches and thus well suited for design of
                                                                            System-level fault diagnosis was introduced by Preparata,
different fault tolerant wireless communication networks..
                                                                        Metze and Chien in 1967 [3], as a technique intended to
Index Terms— On-line diagnosis, two phase diagnosis, value              diagnose faults in a wired inter connected system. Previously
faults, dynamic fault environment.                                      developed distributed diagnosis algorithms were designed
                                                                        for wired networks [1–4] and hence not well suited for wireless
                        I. INTRODUCTION                                 networks. The problem of fault detection and diagnosis in
                                                                        wireless networks is extensively studied in literatures [5–11].
    The distributed arbitrary connected networks such as                The problem of identifying faulty nodes (crashed) in WSN
mobile ad hoc network and sensor network are becoming                   has been studied in [5]. This article proposes the WINdiag
popular due to their extensive use in social, commercial and            diagnosis protocol which creates a spanning tree (ST) for
scientific applications. These networks may be deployed in              dissemination of diagnostic information. Thomas et al. [6]
unattended and possibly hostile environments. The hostile               have investigated the problem of target detection by a sensor
environment affects the monitoring infrastructure and nodes             network deployed in a region to be monitored. The
become more susceptible to component failures.                          performance comparison was performed both in the presence
Incorporating correct and timely fault diagnosis capability to          and in the absence of faulty nodes. Elhadef et al. have
the system with less overhead is essential to improve the               proposed a distributed fault identification protocol called
system reliability and availability. An important element for           Dynamic-DSDP for MANETs which uses a ST and a gossip
the timeliness of online diagnosis is the ability to execute            style dissemination strategy [7]. In [8], a localized fault
diagnostic tests without interrupting system operation, that            diagnosis algorithm for WSN is proposed that executes in
is, without explicit testing capabilities. A well-known solution        tree-like networks. The approach proposed is based on local
is the comparison approach, where multiple nodes execute                comparisons of sensed data and dissemination of the test
the same task, and the outcomes are compared by other nodes             results to the remaining sensors. In [9] the authors present a
[1][2]. The agreements and the disagreements among the                  distributed fault detection algorithm for wireless sensor
nodes are the basis for identifying the faults. This paper              networks where each sensor node identifies its own state
follows this diagnosis approach where heartbeat messages                based on local comparisons of sensed data against some
are broadcasted periodically. In distributed self-diagnosis,            thresholds and dissemination of the test results. The fault
every node in the network needs to record the status of all             detection accuracy of a detection algorithm would decrease
other nodes.                                                            rapidly when the number of neighbour nodes to be diagnosed
    Motivated by the need a two-phase on-line distributed               is small and the nodes failure ratio is high. Krishnamachari et
diagnosis approach for arbitrary connected networks is                  al. have presented a Bayesian fault recognition algorithm to
proposed. A synchronous system model is chosen for                      solve the fault-event disambiguation problem in sensor
simplicity of presentation where a distributed system                   networks [10].
framework by using a round-based (synchronous) message                                III.SYSTEM AND FAULT MODEL
dispersal protocol is considered. The diagnostic latency and
message complexity is used as the performance measure in                A. System Model
order to evaluate the proposed fault diagnosis algorithm. A             The communication network is assumed to be error-free, and
typical scalar wireless sensor network is considered as an              deliver messages reliably. We consider a round-based
arbitrary network and the performance of the proposed                   communication model, which implies that periodically, i.e., at
algorithm is evaluated by simulation.                                   the period boundaries, messages are sent by system nodes.

© 2012 ACEEE                                                       10
DOI: 01.IJNS.03.01.88
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


The system under consideration accommodates n number of                  are those messages which are correctly delivered but disagree
nodes. Each node occupies a position (x, y) inside of a fixed            with xi, the result of vi’s own voting process on messages
geographic area (l×l m2) and are initially uniformly distributed.        received. A formal description of the detection algorithm is
Two nodes vi and vj are within transmission range Rtx, if the            presented in Algorithm 1.
Euclidean distance d(vi ,vj) is less than Rtx. The topology              Algorithm 1: Detection algorithm
graph G = (V,E) consists of a set of vertices V representing             First phase
the nodes of the network and the set E of undirected edges               1. Broadcast the test message
corresponding to communication links between nodes. Each                 2. Set timer for Tout
node in the network maintains a neighbor table N(.) which                3. If Tout = true then
stores IDs of 1-hop neighbors. All nodes execute the same                4. Detect unreported nodes as hard faulty.
workload (For example temperature sensing from the                       5. Obtain the sensor readings of all neighbours.
environment) and determine the output value xi. This value               6. If vi agrees with vj (vj is element of N(vi)).
is communicated to all other nodes. An arbitrary network                 7. Detect vj fault free.
with connectivity k has been assumed. Every node is assigned             8. Repeat step 6 and 7 for all vj, j=1,..,| N(vi)| and generate
with a node-ID, and can detect the absence or time deviance              local fault table.
for an expected message.                                                 9. Broadcast this local fault table.
                                                                         Second phase
B. FAULT MODEL
                                                                         10. Upon receiving the local fault tables from 1-hop neighbors
We consider crash and value faults in nodes. Links are                   vi compares the local fault tables.
assumed to be fault free. A crash-faulty node is unable to               11. If more than half of the reported nodes mark vj faulty then
communicate with the rest of the network, whereas a node                 vi finally detect vj faulty.
with value fault continues to operate and communicate with                  ______________________________________________
unpredicted behavior. These malfunctioning (value faulty)                Out of the two phases of the algorithm, during the first phase
sensors could participate in the network activities since still          each node periodically execute the diagnostic work load and
they are capable of routing information.                                 initiates the results by a round of message transmissions to
C. TIME SYNCHRONIZATION                                                  all other nodes. A node detects a crash or missing message
                                                                         fault without receiving a test message before Tout. If the
The proposed algorithm needs to synchronize since sensor
                                                                         message delivery and its arrival at a receiving node is valid
readings at diagnosis interval are exchanged to establish a
                                                                         but incorrect (i.e., readings does not match with its own read-
protocol for correct and complete diagnosis. One of the key
                                                                         ing), the message is recorded as improper logical message
lightweight time synchronization in WSNs is Timing-sync
                                                                         and the node is value faulty. This phase of diagnosis we call
Protocol for Sensor Networks (TPSN)[12]. TPSN generates
                                                                         local diagnosis phase. In this phase a node identifies 1-hop
time synchronization with periodic time synchronization
                                                                         neighbor node’s validity by comparing its own message with
messages. TPSN maintains a global time in the network by
                                                                         that of received message.The comparison need not seek for
organizing the system into levels. Level discovery is
                                                                         an exact value in the message rather can choose to consider
performed at the initial time when the network is deployed.
                                                                         range or deviance check. If the received message is well within
The sink is the root of the network. It is assigned a level 0. A
                                                                         the range of its own value, it accepts as a correct message
node at lower level accepts the time sync packets from nodes
                                                                         otherwise records as incorrect message. An adversary node
in the upper level and drops all other time sync packets from
                                                                         may also send an erroneous message in its header, which
its lower level and the peers in the same level. Finally the
                                                                         may not be detectable during this phase. We show that, these
whole WSN will follow the clock of the sink.
                                                                         faults are detected by the second phase of diagnosis. In the
This work has modified the original TPSN for diagnosis
                                                                         second phase these local results available at each node are
settings. This work uses UDG-NNT algorithm [13] to construct
                                                                         further exchanged with other nodes and a counter main-
a ST where each node is assigned a rank. The sink node has
                                                                         tained at every node is incremented by one for every posi-
the highest rank in the network. Each node vi, except sink
                                                                         tive diagnosis. If the counter value at a particular node for
node, selects the nearest node vj among its neighbor nodes
                                                                         another node is greater than half of the nodes, it means that
such that rank(vi) < rank(vj) and sends a connect message
                                                                         more number of nodes detected that node as faulty and all
to vj to inform that (vi, vj) an edge in the ST. This work
                                                                         othernodes that recorded this event as fault free is accused
introduces a level maintenance phase which ensures a
                                                                         as faulty. If the accusation against a node is recorded as
connected ST. Therefore, creating and maintaining a
                                                                         faulty in the previous round, this node is considered as faulty
hierarchical structure should not be considered as an
                                                                         in the current round. Both the phases of two-phase diagno-
overhead exclusive to the diagnosis algorithm.
                                                                         sis procedure are executed in a pipelined manner to improve
                                                                         diagnostic latency.
                    IV. THE ALGORITHM
                                                                         The primary fault table of a node vi, FTp(vi), represents the
This work considers two fault categories: 1) The set of missing          union of test outcomes due to improper logical message
messages, are those messages which node vi believes node vj              andmissing message in first phase. The table entry
failed to issue and 2) The set of improper logical messages,             corresponding to any node vj Î N(vi) is a binary input: 0
© 2012 ACEEE                                                        11
DOI: 01.IJNS.03.01. 88
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


corresponds to a fault-free input received from vj as perceived       The upper bound time complexity is expressed in terms an
by vi, and 1 represents a fault being perceived by vi. In the         upper bound on the time (Tp) needed to propagate a message
second phase this work defines a function fvi(vj) = |U FTp(vi)|       between sensor nodes.
where vi Î N(vj). This function is used to count the number of
accusations on a processor vj by all other. Thus f(vj) is an          Theorem2. (Completeness).The diagnosis algorithm
integer where 0 ÂŁ f(vj) ÂŁ (n-1).                                      terminates before a bounded delay T complexity =(2n-
The local diagnostic views are disseminated to obtain a global        1)Tp+2Tout+Tprocessing
diagnostic view of the network. Once ST maintenance is
completed the leaf nodes in ST start dissemination phase by           Proof. The detection phase takes at most 2Tout+Tprocesses time
sending their local diagnostic view to their parent. Once sink        in obtaining the local diagnostic view. Tprocesses is the time
node has the global diagnosis view the synchronization phase          taken by nodes to process the diagnosis massage. In ST
is triggered and the global view is embedded in the time sync         maintenance phase, the node with faulty parent needs at
packet of sink node. Thus, at the end of synchronization              most 3Tp time to get connected with ST. In at most dstTp, the
phase all nodes in the network have the global view of the            sink node obtains the global diagnostic view of the network
network.                                                              where dst is the depth of ST. The sink node disseminates this
              IV. BASIC ANALYSIS OF ALGORITHM                         view that reaches the farthest node in at most dstTp. In worst
                                                                      case dst = n “ 1. Now, the upper bound time complexity can
The formal analysis of algorithm involves satisfying the two
                                                                      be expressed as
important properties as follows:
                                                                      Tcomplexity =(2n-1)Tp+2Tout+Tprocessing
Correctness: every node diagnosed to be faulty by a non-
faulty node is indeed faulty.
                                                                      Theorem3. The proposed algorithm has a worst-case message
                                                                      exchange complexity O(n) in the network.

                                                                      Proof: In the first phase each node sends the diagnostic
                                                                      message to its neighbors, costing one message per node i.e.
                                                                      n messages in the network. Similarly, in the second phase n
                                                                      number of diagnostic messages is exchanged.
                                                                      Building the ST with sink as root costs at most 2n message
                                                                      exchange. Each node, excluding the sink, sends one local
             (a)                             (b)                      diagnostic message. Each node, excluding the leaf node, sends
       Fig1. Example to show correctness of the algorithm             one global diagnostic message and in worst case depth of
Completeness: Every faulty node is identified.                        ST is n-1. Thus, message cost for disseminating diagnostic
First, we consider correctness, which states that if a good           messages is 2(n-1). So, the total number of exchanged
processor accuses some other processor, the accused                   messages is
processor is indeed faulty.                                           Mcost = 6n-2 = O(n)
                                                                                          V. SIMULATION RESULTS
Theorem1. (Correctness). If a node vi is faulty, then all fault       The performance of the proposed scheme via simulations is
free nodes diagnose vi as faulty.                                     presented in this section. This work uses OMNET++ as the
                                                                      simulation tool where all simulations are conducted on
Proof. The only situation in the algorithm that a good node vi        networks using the IEEE 802.15.4 at the MAC layer. The set
could declare another node faulty when fvi(vj) Âł[|N(vi)               of simulation parameters are summarized in Table 1.
 N(vj)|/2]. For easy understanding of the proof we consider
an example shown in Fig.1. Let node 6 represents vi and                           TABLE1. SIMULATION PRAMETERS
node-7 represents vj. Fig1.a assumes all neighbor nodes of
node-6 and node-7 are fault free. These two nodes share
node-11 and node-12 as their common neighbors.Here node-
6 correctly detects node-7 as fault free since f6(7) ï‚łï€ ï›|N(6) )
     (7)|/2] .In scenario as depicted in Fig.1.b node-6 receives
positive remarks only from node-7 and thus f6(7) < [|N(6) )”
N(7)|/2]. Thus node-6 incorrectly detects node-7 as
faulty.However, node-1 detects node-7 as fault free since f1(7)       Fig. 2 shows the communication complexity of the proposed
Âł [Ă©|N(1) )” N(7)|/2] . In the dissemination phase each node          protocol. From the simulation result it is evident that the
sends its local diagnostics to the node in upper level.Thus           communication complexity of this work outperforms
the incorrect decisions taken by nodes are taken care by the          thepresent state of art schemes. Energy consumption by each
nodes at the higher level and finally the diagnostic information      node is proportional to the amount of traffic it generates or
in sink node at the end of local dissemination contains the           receives. Thus, the energy overhead of the proposed scheme
exact set of fault set.                                               is less which in turn improves the network lifetime of a WSN.
© 2012 ACEEE                                                     12
DOI: 01.IJNS.03.01.88
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


                                                                      The global view is severely affected since the network gets
                                                                      partitioned. The message and time complexity of the proposed
                                                                      model is O(n) which is significantly low compared to present
                                                                      state of art approaches. Due to low message and time
                                                                      complexity the model could be integrated to fault tolerant
                                                                      systems.
                                                                                               REFERENCES
                                                                      [1] M. Malek, “A comparison connection assignment for diagnosis
                                                                      of multiprocessor systems.” ACM, 1980, pp. 31 – 36.
                                                                      [2] A. Sengupta and A. Dahbura, “On self-diagnosable
                                                                      multiprocessor systems: diagnosis by the comparison approach” ,
                                                                      IEEE Transactions on Computers,, vol. 41, no. 11, pp. 1386 –
                                                                      1396, nov. 1992.
     Fig2. Message complexity of proposed algorithm                   [3] F. P. Preparata, G. Metze, and R. T. Chien, “On the connection
                                                                      assignment problem of diagnosable systems,” IEEE Transactions
                                                                      on Electronic Computers, vol .EC-16, no. 6, pp. 848 –854, dec.
                                                                      1967.
                                                                      [4] A. Subbiah and D. Blough, “Distributed diagnosis in dynamic
                                                                      fault environments,”IEEE Transactions on Parallel and Distributed
                                                                      Systems, vol. 15, no. 5, pp. 453 – 467, may 2004.
                                                                      [5] S. Chessa and P. Santi, “Crash faults identification in wireless
                                                                      sensor networks, Computer Communications, vol. 25, no. 14, pp.
                                                                      1273 – 1282, 2002.
                                                                      [6] M. Elhadef, A. Boukerche, and H. Elkadiki, “A distributed fault
                                                                      identification protocol
                                                                      [7] for wireless and mobile ad hoc networks,” Journal of Parallel
                                                                      and Distributed Computing, vol. 68, no. 3, pp. 321 – 335, 2008.
                                                                      [8] X. Xu,W. Chen, J. Wan, and R. Yu, “Distributed fault diagnosis
                                                                      of wireless sensor networks,” in ICCT, nov. 2008, pp. 148 –151
                                                                      [9] M.-H. Lee and Y.-H. Choi, “Fault detection of wireless sensor
        Fig3. Time complexity of proposed algorithm                   networks,” Computer Communications, vol. 31, no. 14, pp. 3469
                                                                      – 3475, 2008.
Fig. 3 demonstrates the time complexity of the proposed               [10] B. Krishnamachari and S. Iyengar, “Distributed bayesian
scheme. From Theorem 2 it is obvious that dissemination of            algorithms for faulttolerant event region detection in wireless sensor
diagnostics contributes more to diagnosis latency. The depth          networks,” IEEE Transactions on Computers, vol. 53, no. 3, pp.
of the ST decides the diagnosis latency, as it is used to             241 – 250, mar. 2004.
disseminate diagnostics. Thus, as expected the time required          [11] J. Chen, S. Kher, and A. Somani, “Distributed fault detection
to diagnose the WSN increases almost linearly with increase           of wireless sensor networks,” in DIWANS. ACM, 2006, pp. 65–
of number of nodes.                                                   72.
                                                                      [12] Ganeriwal, S.; Kumar, R.; Srivastava, M.B. Timing-Sync
                        CONCLUSIONS
                                                                      Protocol for Sensor Networks. In Proceedings of the 1st
This paper presents a diagnosis scheme to address the                 International Conference on Embedded Networked Sensor Systems,
fundamental problem of identifying faulty (value and                  SenSys 2003, Los Angeles, CA, USA, 5–7 November 2003; pp.
crash)nodes in a arbitrary connected network. The proposed            138-149.
                                                                      [13] M. Khan, G. Pandurangan, and V.S. Anil Kumar. Distributed
work assumes that at most α number of nodes are faulty at
                                                                      algorithms for constructing approximate minimum spanning trees
any time t where α is connectivity of the network. However, if        in wireless sensor networks. IEEE Transactions on Parallel and
more than α number of nodes are faulty then detection                 Distributed Systems, 20(1):124 –139, 2009.
accuracy in obtaining local view is less affected.




© 2012 ACEEE                                                     13
DOI: 01.IJNS.03.01. 88

Weitere Àhnliche Inhalte

Was ist angesagt?

Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkIJERA Editor
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999IJRAT
 
Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkIJMTST Journal
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...IDES Editor
 
O026084087
O026084087O026084087
O026084087ijceronline
 
Distributed fault tolerant event
Distributed fault tolerant eventDistributed fault tolerant event
Distributed fault tolerant eventijscai
 
Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614IJERA Editor
 
CP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNCP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNIJAAS Team
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksIDES Editor
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...eSAT Publishing House
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...IJERA Editor
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
Energy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using KerberosEnergy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using KerberosEditor IJCATR
 
Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkShamika Ganesan
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 

Was ist angesagt? (20)

Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor Network
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999
 
Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor Network
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
 
O026084087
O026084087O026084087
O026084087
 
Distributed fault tolerant event
Distributed fault tolerant eventDistributed fault tolerant event
Distributed fault tolerant event
 
Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614
 
CP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNCP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSN
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Energy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using KerberosEnergy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using Kerberos
 
Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention Network
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 

Andere mochten auch

Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...IDES Editor
 
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...IDES Editor
 
Customized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration ProtocolCustomized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration ProtocolIDES Editor
 
Extending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent MobilityExtending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent MobilityIDES Editor
 
The Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC ConverterThe Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC ConverterIDES Editor
 
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...IDES Editor
 
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...IDES Editor
 
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationPrototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationIDES Editor
 

Andere mochten auch (8)

Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...
 
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
 
Customized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration ProtocolCustomized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration Protocol
 
Extending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent MobilityExtending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent Mobility
 
The Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC ConverterThe Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC Converter
 
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
 
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
 
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationPrototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
 

Ähnlich wie On-line Fault diagnosis of Arbitrary Connected Networks

Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...IISRTJournals
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkIISRT
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
 
A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks ijwmn
 
Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...iosrjce
 
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc NetworkModified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc NetworkCSEIJJournal
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
 

Ähnlich wie On-line Fault diagnosis of Arbitrary Connected Networks (20)

Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks
 
B017370915
B017370915B017370915
B017370915
 
Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...
 
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc NetworkModified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
398 .docx
398                                                             .docx398                                                             .docx
398 .docx
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
K010526570
K010526570K010526570
K010526570
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 

KĂŒrzlich hochgeladen

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

KĂŒrzlich hochgeladen (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

On-line Fault diagnosis of Arbitrary Connected Networks

  • 1. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 On-line Fault diagnosis of Arbitrary Connected Networks Arunanshu Mahapatro1, Pabitra Mohan Khilar2 Department of Comp. Sc. & Engg, NIT, Rourkela, India, Pin-769008 Email: 1arun227@gmail.com, 2khilarpm@yahoo.com Abstract— This paper proposes an on-line two phase fault The specific contributions of this paper are listed as follows: diagnosis algorithm for arbitrary connected networks. The 1. Proposes a generic diagnosis scheme that identifies crash algorithm addresses a realistic fault model considering crash and value faults with high accuracy by maintaining low time, and value faults in the nodes. Fault diagnosis is achieved by message and energy overhead. comparing the heartbeat message generated by neighboring 2. Presents both analytical and simulation analysis to prove nodes and dissemination of decision made at each node. Theoretical analysis shows that time and message complexity the correctness and completeness of the algorithm. of the diagnosis scheme is O(n) for a n-node network. The message and time complexity are comparable to the existing II. RELATED WORKS state of art approaches and thus well suited for design of System-level fault diagnosis was introduced by Preparata, different fault tolerant wireless communication networks.. Metze and Chien in 1967 [3], as a technique intended to Index Terms— On-line diagnosis, two phase diagnosis, value diagnose faults in a wired inter connected system. Previously faults, dynamic fault environment. developed distributed diagnosis algorithms were designed for wired networks [1–4] and hence not well suited for wireless I. INTRODUCTION networks. The problem of fault detection and diagnosis in wireless networks is extensively studied in literatures [5–11]. The distributed arbitrary connected networks such as The problem of identifying faulty nodes (crashed) in WSN mobile ad hoc network and sensor network are becoming has been studied in [5]. This article proposes the WINdiag popular due to their extensive use in social, commercial and diagnosis protocol which creates a spanning tree (ST) for scientific applications. These networks may be deployed in dissemination of diagnostic information. Thomas et al. [6] unattended and possibly hostile environments. The hostile have investigated the problem of target detection by a sensor environment affects the monitoring infrastructure and nodes network deployed in a region to be monitored. The become more susceptible to component failures. performance comparison was performed both in the presence Incorporating correct and timely fault diagnosis capability to and in the absence of faulty nodes. Elhadef et al. have the system with less overhead is essential to improve the proposed a distributed fault identification protocol called system reliability and availability. An important element for Dynamic-DSDP for MANETs which uses a ST and a gossip the timeliness of online diagnosis is the ability to execute style dissemination strategy [7]. In [8], a localized fault diagnostic tests without interrupting system operation, that diagnosis algorithm for WSN is proposed that executes in is, without explicit testing capabilities. A well-known solution tree-like networks. The approach proposed is based on local is the comparison approach, where multiple nodes execute comparisons of sensed data and dissemination of the test the same task, and the outcomes are compared by other nodes results to the remaining sensors. In [9] the authors present a [1][2]. The agreements and the disagreements among the distributed fault detection algorithm for wireless sensor nodes are the basis for identifying the faults. This paper networks where each sensor node identifies its own state follows this diagnosis approach where heartbeat messages based on local comparisons of sensed data against some are broadcasted periodically. In distributed self-diagnosis, thresholds and dissemination of the test results. The fault every node in the network needs to record the status of all detection accuracy of a detection algorithm would decrease other nodes. rapidly when the number of neighbour nodes to be diagnosed Motivated by the need a two-phase on-line distributed is small and the nodes failure ratio is high. Krishnamachari et diagnosis approach for arbitrary connected networks is al. have presented a Bayesian fault recognition algorithm to proposed. A synchronous system model is chosen for solve the fault-event disambiguation problem in sensor simplicity of presentation where a distributed system networks [10]. framework by using a round-based (synchronous) message III.SYSTEM AND FAULT MODEL dispersal protocol is considered. The diagnostic latency and message complexity is used as the performance measure in A. System Model order to evaluate the proposed fault diagnosis algorithm. A The communication network is assumed to be error-free, and typical scalar wireless sensor network is considered as an deliver messages reliably. We consider a round-based arbitrary network and the performance of the proposed communication model, which implies that periodically, i.e., at algorithm is evaluated by simulation. the period boundaries, messages are sent by system nodes. © 2012 ACEEE 10 DOI: 01.IJNS.03.01.88
  • 2. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 The system under consideration accommodates n number of are those messages which are correctly delivered but disagree nodes. Each node occupies a position (x, y) inside of a fixed with xi, the result of vi’s own voting process on messages geographic area (l×l m2) and are initially uniformly distributed. received. A formal description of the detection algorithm is Two nodes vi and vj are within transmission range Rtx, if the presented in Algorithm 1. Euclidean distance d(vi ,vj) is less than Rtx. The topology Algorithm 1: Detection algorithm graph G = (V,E) consists of a set of vertices V representing First phase the nodes of the network and the set E of undirected edges 1. Broadcast the test message corresponding to communication links between nodes. Each 2. Set timer for Tout node in the network maintains a neighbor table N(.) which 3. If Tout = true then stores IDs of 1-hop neighbors. All nodes execute the same 4. Detect unreported nodes as hard faulty. workload (For example temperature sensing from the 5. Obtain the sensor readings of all neighbours. environment) and determine the output value xi. This value 6. If vi agrees with vj (vj is element of N(vi)). is communicated to all other nodes. An arbitrary network 7. Detect vj fault free. with connectivity k has been assumed. Every node is assigned 8. Repeat step 6 and 7 for all vj, j=1,..,| N(vi)| and generate with a node-ID, and can detect the absence or time deviance local fault table. for an expected message. 9. Broadcast this local fault table. Second phase B. FAULT MODEL 10. Upon receiving the local fault tables from 1-hop neighbors We consider crash and value faults in nodes. Links are vi compares the local fault tables. assumed to be fault free. A crash-faulty node is unable to 11. If more than half of the reported nodes mark vj faulty then communicate with the rest of the network, whereas a node vi finally detect vj faulty. with value fault continues to operate and communicate with ______________________________________________ unpredicted behavior. These malfunctioning (value faulty) Out of the two phases of the algorithm, during the first phase sensors could participate in the network activities since still each node periodically execute the diagnostic work load and they are capable of routing information. initiates the results by a round of message transmissions to C. TIME SYNCHRONIZATION all other nodes. A node detects a crash or missing message fault without receiving a test message before Tout. If the The proposed algorithm needs to synchronize since sensor message delivery and its arrival at a receiving node is valid readings at diagnosis interval are exchanged to establish a but incorrect (i.e., readings does not match with its own read- protocol for correct and complete diagnosis. One of the key ing), the message is recorded as improper logical message lightweight time synchronization in WSNs is Timing-sync and the node is value faulty. This phase of diagnosis we call Protocol for Sensor Networks (TPSN)[12]. TPSN generates local diagnosis phase. In this phase a node identifies 1-hop time synchronization with periodic time synchronization neighbor node’s validity by comparing its own message with messages. TPSN maintains a global time in the network by that of received message.The comparison need not seek for organizing the system into levels. Level discovery is an exact value in the message rather can choose to consider performed at the initial time when the network is deployed. range or deviance check. If the received message is well within The sink is the root of the network. It is assigned a level 0. A the range of its own value, it accepts as a correct message node at lower level accepts the time sync packets from nodes otherwise records as incorrect message. An adversary node in the upper level and drops all other time sync packets from may also send an erroneous message in its header, which its lower level and the peers in the same level. Finally the may not be detectable during this phase. We show that, these whole WSN will follow the clock of the sink. faults are detected by the second phase of diagnosis. In the This work has modified the original TPSN for diagnosis second phase these local results available at each node are settings. This work uses UDG-NNT algorithm [13] to construct further exchanged with other nodes and a counter main- a ST where each node is assigned a rank. The sink node has tained at every node is incremented by one for every posi- the highest rank in the network. Each node vi, except sink tive diagnosis. If the counter value at a particular node for node, selects the nearest node vj among its neighbor nodes another node is greater than half of the nodes, it means that such that rank(vi) < rank(vj) and sends a connect message more number of nodes detected that node as faulty and all to vj to inform that (vi, vj) an edge in the ST. This work othernodes that recorded this event as fault free is accused introduces a level maintenance phase which ensures a as faulty. If the accusation against a node is recorded as connected ST. Therefore, creating and maintaining a faulty in the previous round, this node is considered as faulty hierarchical structure should not be considered as an in the current round. Both the phases of two-phase diagno- overhead exclusive to the diagnosis algorithm. sis procedure are executed in a pipelined manner to improve diagnostic latency. IV. THE ALGORITHM The primary fault table of a node vi, FTp(vi), represents the This work considers two fault categories: 1) The set of missing union of test outcomes due to improper logical message messages, are those messages which node vi believes node vj andmissing message in first phase. The table entry failed to issue and 2) The set of improper logical messages, corresponding to any node vj Î N(vi) is a binary input: 0 © 2012 ACEEE 11 DOI: 01.IJNS.03.01. 88
  • 3. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 corresponds to a fault-free input received from vj as perceived The upper bound time complexity is expressed in terms an by vi, and 1 represents a fault being perceived by vi. In the upper bound on the time (Tp) needed to propagate a message second phase this work defines a function fvi(vj) = |U FTp(vi)| between sensor nodes. where vi Î N(vj). This function is used to count the number of accusations on a processor vj by all other. Thus f(vj) is an Theorem2. (Completeness).The diagnosis algorithm integer where 0 ÂŁ f(vj) ÂŁ (n-1). terminates before a bounded delay T complexity =(2n- The local diagnostic views are disseminated to obtain a global 1)Tp+2Tout+Tprocessing diagnostic view of the network. Once ST maintenance is completed the leaf nodes in ST start dissemination phase by Proof. The detection phase takes at most 2Tout+Tprocesses time sending their local diagnostic view to their parent. Once sink in obtaining the local diagnostic view. Tprocesses is the time node has the global diagnosis view the synchronization phase taken by nodes to process the diagnosis massage. In ST is triggered and the global view is embedded in the time sync maintenance phase, the node with faulty parent needs at packet of sink node. Thus, at the end of synchronization most 3Tp time to get connected with ST. In at most dstTp, the phase all nodes in the network have the global view of the sink node obtains the global diagnostic view of the network network. where dst is the depth of ST. The sink node disseminates this IV. BASIC ANALYSIS OF ALGORITHM view that reaches the farthest node in at most dstTp. In worst case dst = n “ 1. Now, the upper bound time complexity can The formal analysis of algorithm involves satisfying the two be expressed as important properties as follows: Tcomplexity =(2n-1)Tp+2Tout+Tprocessing Correctness: every node diagnosed to be faulty by a non- faulty node is indeed faulty. Theorem3. The proposed algorithm has a worst-case message exchange complexity O(n) in the network. Proof: In the first phase each node sends the diagnostic message to its neighbors, costing one message per node i.e. n messages in the network. Similarly, in the second phase n number of diagnostic messages is exchanged. Building the ST with sink as root costs at most 2n message exchange. Each node, excluding the sink, sends one local (a) (b) diagnostic message. Each node, excluding the leaf node, sends Fig1. Example to show correctness of the algorithm one global diagnostic message and in worst case depth of Completeness: Every faulty node is identified. ST is n-1. Thus, message cost for disseminating diagnostic First, we consider correctness, which states that if a good messages is 2(n-1). So, the total number of exchanged processor accuses some other processor, the accused messages is processor is indeed faulty. Mcost = 6n-2 = O(n) V. SIMULATION RESULTS Theorem1. (Correctness). If a node vi is faulty, then all fault The performance of the proposed scheme via simulations is free nodes diagnose vi as faulty. presented in this section. This work uses OMNET++ as the simulation tool where all simulations are conducted on Proof. The only situation in the algorithm that a good node vi networks using the IEEE 802.15.4 at the MAC layer. The set could declare another node faulty when fvi(vj) Âł[|N(vi) of simulation parameters are summarized in Table 1. N(vj)|/2]. For easy understanding of the proof we consider an example shown in Fig.1. Let node 6 represents vi and TABLE1. SIMULATION PRAMETERS node-7 represents vj. Fig1.a assumes all neighbor nodes of node-6 and node-7 are fault free. These two nodes share node-11 and node-12 as their common neighbors.Here node- 6 correctly detects node-7 as fault free since f6(7) ï‚łï€ ï›|N(6) ) (7)|/2] .In scenario as depicted in Fig.1.b node-6 receives positive remarks only from node-7 and thus f6(7) < [|N(6) )” N(7)|/2]. Thus node-6 incorrectly detects node-7 as faulty.However, node-1 detects node-7 as fault free since f1(7) Fig. 2 shows the communication complexity of the proposed Âł [Ă©|N(1) )” N(7)|/2] . In the dissemination phase each node protocol. From the simulation result it is evident that the sends its local diagnostics to the node in upper level.Thus communication complexity of this work outperforms the incorrect decisions taken by nodes are taken care by the thepresent state of art schemes. Energy consumption by each nodes at the higher level and finally the diagnostic information node is proportional to the amount of traffic it generates or in sink node at the end of local dissemination contains the receives. Thus, the energy overhead of the proposed scheme exact set of fault set. is less which in turn improves the network lifetime of a WSN. © 2012 ACEEE 12 DOI: 01.IJNS.03.01.88
  • 4. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 The global view is severely affected since the network gets partitioned. The message and time complexity of the proposed model is O(n) which is significantly low compared to present state of art approaches. Due to low message and time complexity the model could be integrated to fault tolerant systems. REFERENCES [1] M. Malek, “A comparison connection assignment for diagnosis of multiprocessor systems.” ACM, 1980, pp. 31 – 36. [2] A. Sengupta and A. Dahbura, “On self-diagnosable multiprocessor systems: diagnosis by the comparison approach” , IEEE Transactions on Computers,, vol. 41, no. 11, pp. 1386 – 1396, nov. 1992. Fig2. Message complexity of proposed algorithm [3] F. P. Preparata, G. Metze, and R. T. Chien, “On the connection assignment problem of diagnosable systems,” IEEE Transactions on Electronic Computers, vol .EC-16, no. 6, pp. 848 –854, dec. 1967. [4] A. Subbiah and D. Blough, “Distributed diagnosis in dynamic fault environments,”IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 5, pp. 453 – 467, may 2004. [5] S. Chessa and P. Santi, “Crash faults identification in wireless sensor networks, Computer Communications, vol. 25, no. 14, pp. 1273 – 1282, 2002. [6] M. Elhadef, A. Boukerche, and H. Elkadiki, “A distributed fault identification protocol [7] for wireless and mobile ad hoc networks,” Journal of Parallel and Distributed Computing, vol. 68, no. 3, pp. 321 – 335, 2008. [8] X. Xu,W. Chen, J. Wan, and R. Yu, “Distributed fault diagnosis of wireless sensor networks,” in ICCT, nov. 2008, pp. 148 –151 [9] M.-H. Lee and Y.-H. Choi, “Fault detection of wireless sensor Fig3. Time complexity of proposed algorithm networks,” Computer Communications, vol. 31, no. 14, pp. 3469 – 3475, 2008. Fig. 3 demonstrates the time complexity of the proposed [10] B. Krishnamachari and S. Iyengar, “Distributed bayesian scheme. From Theorem 2 it is obvious that dissemination of algorithms for faulttolerant event region detection in wireless sensor diagnostics contributes more to diagnosis latency. The depth networks,” IEEE Transactions on Computers, vol. 53, no. 3, pp. of the ST decides the diagnosis latency, as it is used to 241 – 250, mar. 2004. disseminate diagnostics. Thus, as expected the time required [11] J. Chen, S. Kher, and A. Somani, “Distributed fault detection to diagnose the WSN increases almost linearly with increase of wireless sensor networks,” in DIWANS. ACM, 2006, pp. 65– of number of nodes. 72. [12] Ganeriwal, S.; Kumar, R.; Srivastava, M.B. Timing-Sync CONCLUSIONS Protocol for Sensor Networks. In Proceedings of the 1st This paper presents a diagnosis scheme to address the International Conference on Embedded Networked Sensor Systems, fundamental problem of identifying faulty (value and SenSys 2003, Los Angeles, CA, USA, 5–7 November 2003; pp. crash)nodes in a arbitrary connected network. The proposed 138-149. [13] M. Khan, G. Pandurangan, and V.S. Anil Kumar. Distributed work assumes that at most α number of nodes are faulty at algorithms for constructing approximate minimum spanning trees any time t where α is connectivity of the network. However, if in wireless sensor networks. IEEE Transactions on Parallel and more than α number of nodes are faulty then detection Distributed Systems, 20(1):124 –139, 2009. accuracy in obtaining local view is less affected. © 2012 ACEEE 13 DOI: 01.IJNS.03.01. 88