ISCP: Inter State Changing Problem in Wireless Sensor Network with Dumb-Behaving Nodes

Pushpendu Kar, Subhabrata Barman, Subhransu Das

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

In a wireless sensor network (WSN), different types of nodes (i.e., active, misbehaving, dead) may coexist. To ensure seamless performance of the network, network administrators often use several mechanisms to recover misbehaving or faulty nodes. As it is impossible for a node to predict the state of another node, the recovery attempts may not be successful every time. Such unsuccessful attempts may bring detrimental effects to the network. In this paper, we introduce three of such problems which occur due to change in state (such as dumb to dead, etc.) with such attempts. We name the problems as Recovery Attempt for Dead (RAD) node, Insecure Recovery Attempt (IRA), and Data Burst (DB). The detrimental effects of these problems are evaluated using network simulator 3 (ns3) simulations. Additionally, this paper also suggests some solution guidelines for these problems. The analysis and simulation experiments led us to enlist some open research issues in the concluding section.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Computing and Communication Systems : $$b I3CS 2016, NEHU, Shillong, India
Editors J. K. Mandal, Goutam Saha, Debdatta Kandar, Arnab Kumar Maji
Place of PublicationSingapore
PublisherSpringer
Pages15-23
Number of pages9
ISBN (Print)9789811068904
DOIs
Publication statusPublished - 2018
Externally publishedYes

Publication series

NameLecture Notes in Networks and Systems
Volume24
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Keywords

  • DB
  • IRA
  • Misbehaving nodes
  • RAD
  • WSN

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Signal Processing
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'ISCP: Inter State Changing Problem in Wireless Sensor Network with Dumb-Behaving Nodes'. Together they form a unique fingerprint.

Cite this