survey on fault localization techniques in wireless networks

B.Usha Ranjini,T.Ravichandran

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:3         Issue:1         Year: 26 June,2014         Pages:263-271

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Wireless sensor networks (WNS) are widely used distributed networks to contact with the real world in various applications such as Environmental Monitoring, Vehicle Tracking and Mapping, and Emergency Response. The main problem in such application is to identify the node position; challenges in wireless sensor network are to have communication between the nodes under limited resources and processing noisy data without any reduction. So the methods for localization using range based techniques are calculated. These techniques will limit the fixed and mobile nodes for effective communication. Similarity Hashing Function and an Identity based Combined Signature allows nodes to check incoming encoded packets, and introduces an efficient mechanism to reduce the computation overhead and protect from effluence attack. Performance evaluation of various localization techniques are analyzed in terms of fault detection efficiency, communication overhead, average error rate, time consumption and packet loss rate.

Kewords

Localization, Anomalies, Protocols, Analysis, Parameters

Reference

[1] Lyudmila Mihaylova., Donka Angelova., David R. Bull., and Nishan Canagarajah, “Localization of Mobile Nodes in Wireless Networks with Correlated in Time Measurement Noise,” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL 10, NO 1, JANUARY 2011 [2] Peter Szilagyi., and Szabolcs Novaczki., “An Automatic Detection and Diagnosis Framework for Mobile Communication Systems,” IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 9, NO. 2, JUNE 2012 [3] Daojing He., Chun Chen., Sammy Chan., Jiajun Bu., and Laurence T. Yang., “Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks,” IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 11, NOVEMBER 2013 [4] Xiangyun Zhou., Radha Krishna Ganti and Jeffrey G. Andrews., “Secure Wireless Network Connectivity with Multi-Antenna Transmission,” IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION., 2010 [5] Rongxing Lu., Xiaodong Lin., Tom H. Luan., Xiaohui Liang., and Xuemin (Sherman) Shen., “Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANET,” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 1, JANUARY 2012 [6] Joey Wilson and Neal Patwari., “See-Through Walls: Motion Tracking Using Variance-Based Radio Tomography Networks,” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, MAY 2011 [7] Hamid Al-Hamadi., and Ing-Ray Chen., “Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks,” IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 10, NO. 2, JUNE 2013 [8] Haiying Shen., and Lianyu Zhao., “ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs,” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 6, JUNE 2013 [9] Chih-Kuang Lin., Vladimir I. Zadorozhny., Prashant V. Krishnamurthy., Ho-Hyun Park, and Chan-Gun Lee., “A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks,” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 5, APRIL 2011 [10] Hailun Tan., John Zic., Sanjay K. Jha., and Diethelm Ostry., “Secure Multihop Network Programming with Multiple One-Way Key Chains,” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 1, JANUARY 2011 [11] Tansu Alpcan., and Sonja Buchegger., “Security Games for Vehicular Networks,” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 2, FEBRUARY 2011 [12] Kassem Fawaz., and Hassan Artail., “DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks,” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 4, APRIL 2013