Self-Configuration Management towards Fix-Distributed Byzantine Sensors for Clustering Schemes in Wireless Sensor Networks
Abstract
:1. Introduction
2. Related Works
3. Self-Configuration Management (SCM)
3.1. Network Model & Problem Sanrio Preliminaries
3.2. Data and Radio Model
- ➊
- Phase 1: Distributed soft fault detection model (DFD)
Algorithm 1. Distributed system fault detection (DSFD) method at the CH level. |
Input: Sensor position, Dx distance, transmission rang Rt, M. |
Output: system fault status of sensor (fsystem) |
Initialization phase |
|
Radio phase |
For i = 1 to S do |
|
Fault detection phase |
For i = 1 to S |
If S fails to respond within transfer time ti |
CH set H2 in its memory |
Sfaulty = fsystem + Sfaulty |
End else |
If M is incorrect information signals |
CH set H2 in its memory |
Sfaulty = fsystem + Sfaulty |
End else |
CH set H1 in its memory |
Shealthy = S + Shealthy |
End |
End |
- ➋
- Phase 2: Self-Configuration Model
- ▪
- Cluster head level
- Sensor ID and its distance;
- Sensor Mac address;
- Sensor energy level;
- Activity mode (idle, active, sleep).
- ▪
- Byzantine sensor level:
- Sensor SFI receives a configure notification from CH.
- SFI knows that there is a software packet going from CH that comes out through the communication port established among them.
- SFI opens the communication channels/sessions within the receiver module (R) for passing the packet, ensuring they remain open and functional while data is being transferred, and closing them when communication ends.
- The receiver module (R) listens to the request packet through its amplifier.
- R dispatches the setup request packet to the processor unit (P).
- P takes delivery of the setup request packet and then installs the software packet based on the forthcoming basic configuration.
4. Simulation and Analytical Results
4.1. Communication-Initialization Phase
4.2. System Fault Correction-Management
4.2.1. Fault Detection Method
4.2.2. Fault Configuration Method
- The alarm system sends an alert message M1 enclosed by heartbeat status within each round to the cluster head (primary node); one message exchange (M1).
- The primary (leading) node transmits the heartbeat status report M1 and a software delivery request (replicas) M2 to the receiving node (Sink node); two message exchange (M1 + M2).
- The sink node accepts the sent service request and then sends replicas in a prepared message to each other, including the primary nodes (cluster head); and message exchange (M1 × M2).
- The primary nodes forward all replicas and direct commit messages M3 to each faulty node; message exchange ((M1 × M2) + M3).
- All nodes send a reply message M4 to their cluster head node to confirm their configuration of them. The head sends a memo to the sink after diffusion and fixes rounds periodically for message exchange (M4 + 1).
- ▪
- Startup time (t): the time spent sending and getting nodes;
- ▪
- Transfer time per bit (tb): This period includes all overhead costs that are determined by message length, error checking, and correction;
- ▪
- Transit time per hop (th): This period includes parameters like detection latency and network transmission delays.
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
SCM | Self-Configuration Management |
CPU | Central Processing Unit |
WSN | Wireless Sensor Network |
BFT | Byzantine Fault Tolerance |
GPBFT | Global Practical Byzantine Fault Tolerance |
IoT | Internet of Things |
RT | Radio Transferring |
PBFT | Practical Byzantine Fault Tolerance |
APBFT | Adaptive Practical Byzantine Fault Tolerance |
FCBFT | Feature Clustering Byzantine Fault Tolerance |
MCS | Mobile Crowd Detection |
RF | Radio Frequency |
DSFD | Distributed System Fault Detection model |
BS | Base Station |
CH | Cluster Head |
IRIS | International Resource Identifier System |
HRQ | Head Request Query |
SFCM | System Fault Correction-Management |
SEDA | System Error Detection Alarm |
DA | Detection Accuracy |
References
- Antony, S.N.F.M.A.; Bahari, M.F.A. Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology. J. Sens. Actuator Netw. 2023, 12, 15. [Google Scholar] [CrossRef]
- Heinzelman, W.C.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. J. IEEE Trans. Wirel. Commun. 2022, 4, 660–700. [Google Scholar] [CrossRef]
- Lamport, L.; Shostak, R. The Byzantine Generals Problem. J. ACM Trans. Program. Lang. Syst. 2021, 4, 382–401. [Google Scholar] [CrossRef]
- Li, X.Y.; Wan, P.J.; Frieder, O. Coverage in wireless ad hoc sensor networks. J. IEEE Trans. Comput. 2003, 52, 753–763. [Google Scholar] [CrossRef]
- Xiaosheng, Y.J.Q.; Peng, C. GPBFT: A Practical Byzantine Fault-Tolerant Consensus Algorithm Based on Dual Administrator Short Group Signatures. J. Secur. Commun. Netw. 2022, 2022, 270–285. [Google Scholar]
- Adday, S.; Ghaihab, H.; Subramaniam, K.; Zuriati, A.Z.; Normalia, S. Fault Tolerance Structures in Wireless Sensor Networks (WSNs): Survey, Classification, and Future Directions. J. Sens. 2022, 22, 6041. [Google Scholar] [CrossRef] [PubMed]
- Chang, J.; Liu, F. A Byzantine Sensing Network Based on Majority-Consensus Data Aggregation Mechanism. J. Sens. 2022, 21, 248. [Google Scholar] [CrossRef] [PubMed]
- Cotroneo, D.; Simone, L.D.; Natella, R. ThorFI: A Novel Approach for Network Fault Injection as a Service. J. Netw. Comput. Appl. Bp. Hung. 2022, 201, 10334. [Google Scholar] [CrossRef]
- Jin, H.; Nengroo, S.H.; Kim, I.; Har, D. Special Issue on Advanced Wireless Sensor Networks for Emerging Applications. Appl. Sci. 2022, 12, 7315. [Google Scholar] [CrossRef]
- Gouda, B.S.; Panda, M.; Panigrahi, T. Distributed Intermittent Fault Diagnosis in Wireless Sensor Network Using Likelihood Ratio Test. IEEE Access 2023, 11, 6958–6972. [Google Scholar] [CrossRef]
- Goud, B.H.; Anitha, R. RAFT to Improve Failure Recovery in Wireless Sensor Networks. Int. J. Intell. Syst. Appl. Eng. 2023, 12, 222–227. [Google Scholar]
- Sariga, A.; Uthayakumar, J. Type 2 Fuzzy Logic based Unequal Clustering algorithm for multi-hop wireless sensor networks. Int. J. Wirel. Ad Hoc Commun. 2020, 1, 33–46. [Google Scholar] [CrossRef]
- Taurshia, A.; Kathrine, J.W.; Venkatesan, V. Software Defined Network aided cluster key management system for secure fusion multicast communication in Internet of Vehicles. Fusion Pract. Appl. 2023, 12, 38–52. [Google Scholar] [CrossRef]
- Crossbow Technology, Inc. IRIS-Wireless Measurement System. 2001. Available online: http://www.nr2.ufpr.br/~adc/documentos/iris_datasheet.pdf (accessed on 1 May 2023).
- Ossama, H. Embarak, Raed Abu Zitar, Securing Wireless Sensor Networks Against DoS attacks in Industrial 4.0. J. Intell. Syst. Internet Things 2023, 87, 66–74. [Google Scholar] [CrossRef]
- Mazloomi, N.; Gholipour, M.; Zaretalab, A. Efficient configuration for multi-objective QoS optimization in wireless sensor network. J. Ad Hoc Netw. 2022, 125, 399–423. [Google Scholar] [CrossRef]
- Xing, X.W.G.; Zhang, Y.; Lu, C.; Pless, R.; Gill, C. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks. In Proceedings of the SenSys ‘03: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, New York, NY, USA, 4–7 November 2018; pp. 28–39. [Google Scholar]
Symbol | Explanation |
---|---|
S | Set of sensor nodes in sensor networks |
Si | A sensor node distributed on Pi(xi, yi) |
N | Number of deployed sensor nodes |
PR | Likelihood of faulty sensor nodes in sensor networks |
S1 | Set of sensor nodes experiencing error-free deadlocks in sensor networks, S1 ∈ S |
S2 | Set of sensor nodes where deadlocks occur when sensor networks fail, S2 ∈ S |
S3 | Set of sensor nodes experiencing random failures in sensor networks. S3 ⊂ S |
NCONF. | The number of faulty sensor nodes that were configured, NCONF. < N |
SF | Set of faulty sensor nodes in sensor networks, SF ⊂ S |
SH | Set of error-free sensor nodes in sensor networks, SH ⊂ S |
CTi | Table of clustering of si which contains all the information about each sensor node and its neighbors. |
SFI | Failure status of sensor node Si. |
DTr | Distance range will be covered by a predefined transfer rate |
CI | The cluster supervisor is in charge of the configuration mode and is usually the head of the group. |
C (bps) | Channel throughput capacity (bandwidth), measured in bits per second. |
B | The frequency bandwidth in Hertz, and |
M | the number of levels a single signal can take on. |
SNR | Desired signal-to-noise ratio at the receiving node. |
NR | Receiver signal-to-noise ratio. |
Gant | Transmit antenna gain. |
ET | Consumed energy in bit transfers. |
Encnode | Encoder power consumption. |
Nb | Total number of bits transmitted. |
Etb | Energy consumption when transmitting a single bit from a node. |
Erb | Energy consumption when a single bit is received by a node. |
Parameter | Value |
---|---|
Deploy Area | 220 × 220 m2 |
Initial Energy | 2.0 J |
Broadcast Time (Between Succession Packets) | 300 µs. |
Packet Size | 256 byte |
Size of Tiny OS replica | 400 bytes |
The Ratio of Dispatch Energy Cost ET | 60% of the battery size |
The Ratio of Receipt Energy Cost ER | 30% of battery size |
The Ratio of Dissipated Energy Cost Ei | 10% of battery size |
Heartbeat Message | “00000000” |
Round # | Cluster # | Mac Address | Heartbeat Data | Elapsed Diffusion Time (μ) | Neighboring Data | D (m2) | Status | E * |
---|---|---|---|---|---|---|---|---|
R5 | C3 | 192.168.3.1 | “10000000”(29) | 300 | (24,41,31) | 25 | Traffic | 1.0 |
192.168.3.2 | “11000000” | (29,24,41,31) | CH | 1.66 | ||||
192.168.3.3 | “11100000”(24) | 260 | (29,41,31) | 30 | Traffic | 1.2 | ||
192.168.3.4 | “11110000”(41) | 300 | (29,24,31) | 40 | Offbeat | 1.0 | ||
192.168.3.5 | “11111000”(31) | 99 | (29,24,41) | 15 | Traffic | 1.48 | ||
RC | 80% | |||||||
R10 | C12 | 192.168.12.1 | “10000000”(29) | 298 | (32,30,18) | 50 | Traffic | 0.77 |
192.168.12.2 | “11000000”(32) | 430 | (29,30,18) | 35 | offbeat | 0.90 | ||
192.168.12.3 | “11100000”(30) | 287 | (29,32,18) | 45 | Traffic | 0.84 | ||
192.168.12.4 | “11110000”(18) | 296 | (29,32,30) | 10 | offbeat | 0.92 | ||
192.168.12.5 | “11111000” | (29,32,30,18) | CH | 1.0 | ||||
RC | 60% | |||||||
R15 | C20 | 192.168.20.1 | “10000000”(35) | (35,29,41,38,37) | CH | 0.73 | ||
192.168.20.2 | “11000000”(29,41) | 264, 299 | (35,38,37) | 40 | Offbeat | 0.52 | ||
192.168.20.3 | “11100000”(38) | 274 | (35,29,41,37) | 30 | Traffic | 0.55 | ||
192.168.20.4 | “11110000”(-) | (35,29,41,38,37) | 20 | Fail-Stop | 0.62 | |||
192.168.20.5 | “11111000”(37) | 182 | (35,29,41,38) | 40 | Traffic | 0.67 | ||
RC | 60% |
Alarm | Incoming Reading | Inward Passed Time | Mac Address | Status | CH Alert | Heartbeat Rank |
---|---|---|---|---|---|---|
Alarm ON | 29 | 257 | 192.168.16.1 | Normal | ||
Alarm ON | 29 | 253 | 192.168.3.2 | Normal | ||
Alarm ON | 41 | 255 | 192.168.5.3 | Ab Normal | 0 | 11100000-5 |
Alarm ON | 38 | 255 | 192.168.3.2 | Normal | 000-000 | |
Alarm ON | 29 | 253 | 192.168.3.5 | Normal | ||
Alarm ON | 42 | 252 | 192.168.10.1 | Ab Normal | 0 | 10000000-10 |
Alarm ON | 30 | 317 | 192.168.12.2 | Ab Normal | 000 | 11000000-12 |
Alarm ON | 30 | 316 | 192.168.11.3 | Ab Normal | 000 | 11100000-11 |
Alarm ON | 29 | 316 | 192.168.9.4 | Ab Normal | 000 | 11110000-9 |
Alarm ON | 29 | 214 | 192.168.2.2 | Normal | ||
Alarm ON | 42 | 314 | 192.168.20.1 | Ab Normal | 000 | 10000000-20 |
Alarm ON | 42 | 312 | 192.168.2.2 | Ab Normal | 000-000 | 11000000-2 |
Alarm ON | 29 | 246 | 192.168.16.3 | Normal | ||
Alarm ON | 29 | 257 | 192.168.20.4 | Normal | ||
Alarm ON | 29 | 255 | 192.168.14.5 | Normal |
Address | Sf Heartbeat | TC | TE | CPi | CPd | Memo | Status |
---|---|---|---|---|---|---|---|
192.168.16.1 | Talk | Normal | |||||
192.168.3.2 | Talk | Normal | |||||
192.168.5.3 | 11100000 | 170 | 84 | 249 | 415.60 | M4 | Configured |
192.168.3.5 | Talk | Normal | |||||
192.168.10.1 | 10000000 | 101 | 98 | 195 | 293.98 | M4 | Configured |
192.168.12.2 | 11000000 | 257 | 79 | 329 | 580.86 | M4 | Configured |
192.168.11.3 | 11100000 | 182 | 56 | 233 | 411.36 | M4 | Configured |
192.168.9.4 | 11110000 | 162 | 39 | 250 | 408.71 | M4 | Configured |
192.168.17.2 | Talk | Normal | |||||
192.168.20.1 | 10000000 | 200 | 66 | 261 | 457 | M4 | Configured |
192.168.2.2 | 11000000 | 128 | 95 | 219 | 344.44 | M4 | Configured |
192.168.16.3 | Talk | Normal | |||||
192.168.20.4 | Talk | Normal | |||||
192.168.14.5 | Talk | Normal |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Elsayed, W.M.; El-Shafeiy, E.; Elhoseny, M.; Hassan, M.K. Self-Configuration Management towards Fix-Distributed Byzantine Sensors for Clustering Schemes in Wireless Sensor Networks. J. Sens. Actuator Netw. 2023, 12, 74. https://doi.org/10.3390/jsan12050074
Elsayed WM, El-Shafeiy E, Elhoseny M, Hassan MK. Self-Configuration Management towards Fix-Distributed Byzantine Sensors for Clustering Schemes in Wireless Sensor Networks. Journal of Sensor and Actuator Networks. 2023; 12(5):74. https://doi.org/10.3390/jsan12050074
Chicago/Turabian StyleElsayed, Walaa M., Engy El-Shafeiy, Mohamed Elhoseny, and Mohammed K. Hassan. 2023. "Self-Configuration Management towards Fix-Distributed Byzantine Sensors for Clustering Schemes in Wireless Sensor Networks" Journal of Sensor and Actuator Networks 12, no. 5: 74. https://doi.org/10.3390/jsan12050074
APA StyleElsayed, W. M., El-Shafeiy, E., Elhoseny, M., & Hassan, M. K. (2023). Self-Configuration Management towards Fix-Distributed Byzantine Sensors for Clustering Schemes in Wireless Sensor Networks. Journal of Sensor and Actuator Networks, 12(5), 74. https://doi.org/10.3390/jsan12050074