MARKOV MODEL OF WIRELESS SENSOR NETWORK AVAILABILITY
Keywords:Wireless sensor network, Forest fire monitoring, Availability function, Coverage availability factor, Model-based testing
The use of wireless sensor networks (WSN) in industry and for forest fire detection has recently become increasingly popular. Assessment of the availability of such networks is an important task, since they perform essential functions in critical situations. Sensor networks can be used to prevent and detect forest fires, and they must meet high availability requirements. Various options for organizing the WSN system are considered - with and without recovery. For such systems, the paper evaluates the probability of no-failure operation, as well as the readiness function, taking into account the network coverage ratio. In the paper the Markov WSN model for evaluating its availability function is developed taking into account the network coverage area. The obtained graphical dependencies allow us to evaluate how a change in the failure rate of sensors or system equipment affects the availability function value. The goal of this paper is to obtain metrics to assess the availability of system for monitoring forest by WSN and the availability function of a network using the Markov models. A special metric, so-called coverage availability factor is suggested in this paper taking into account different combinations of sensor failures which influence on completeness of monitoring forest fires.
A.N. Zelenin, V.A. Vlasova “Analysis of the power cycles of the nodes of wireless sensor networks,” East European Journal of Advanced Technologies, vol. 3, issue 9 (57), рр. 13-17, 2012.
P. Galkin, “Model of reducing the power consumption for node of wireless sensor network in embedded control systems,” Proceedings of the 2018 IEEE International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), October 2018, pp. 252-256.
T.V. Sudarshan, B.N. Manjesh, “A survey on heterogeneous wireless sensor networks,” International Journal of Engineering Research & Technology (IJERT). vol. 4, issue 4, pp. 1303-1306, 2015.
S. Mishra, L. Jena, A. Pradhan, “Fault tolerance in wireless sensor networks,” International Journal of Advanced Research in Computer Science and Software Engineering Research Paper, vol. 2, issue 10, pp. 146-152, 2012.
E.M. Shakshuki, N. Kang, T.R. Sheltami, “EAACK – A secure intrusion-detection system for MANETs,” Proceedings of IEEE Transactions on Industrial Electronics, vol. 60, issue 3, pp. 1089-1098, March 2013.
K. Liu, J. Deng, P. K. Varshney, K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” Proceedings of IEEE Transactions on Mobile Computing, vol. 6, issue 5, pp. 536–550, May 2007.
S. Marti, T.J. Giuli, K. Lai, M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceedings of the 6th ACM International Conference on Mobile Computing and Networking, Boston, MA, 2000, pp. 255–265.
T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video transmission enhancement in presence of misbehaving nodes in MANETs,” Proceedings of the International Conference on Multimedia Systems, vol. 15, issue 5, October 2009, pp. 273–282.
R. Balakrishnan, “An acknowledgement based approach for the detection of routing misbehavior in MANETs,” IEEE Transactions on Mobile Computing, vol. 6, issue 5, May 2007, pp. 536–550.
V. Desai, N. Shekokar, “Performance evaluation of OLSR protocol in MANET under the influence of routing attack,” Proceedings of the 2014 IEEE Global Conference on Wireless Computing and Networking (GCWCN), December 2014, pp. 138-143.
K. Kumar, V. Laxmi, K. Srinivasa Rao, “Identifying the behavior: Nodes, route and collusion attack’s in MANET,” Proceedings of the 2014 IEEE International Conference on Contemporary Computing and Informatics (IC3I), Mysore, India, November 2014, pp. 124-129.
Sukiswo, M. R. Rifquddin, “Performance of AOMDV routing protocol under rushing and flooding attacks in MANET,” Proceedings of the 20l5 2nd International Conference on Information Technology, Computer and Electrical Engineering (ICITACEE), Semarang, Indonesia, October 2015, pp. 386–390.
S. Rani, “Performance analysis of security attacks and improvements of routing protocols in MANET,” Proceedings of the 2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM), Lodz, Poland, September 2015, pp. 163-169.
R. Kamal Kapur, S. Kumar Khatri, “Analysis of attacks on routing protocols in MANETs,” Proceedings of the 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA), Ghaziabad, India, March 2015, pp. 791-798.
A. Chandra, S. Thakur, “Performance evaluation of hybrid routing protocols against network layer attacks in MANET,” Proceedings of the 2015 1st International Conference on Next Generation Computing Technologies (NGCT-2015), Dehradun, India, 2015, pp. 207-211.
S. R. Deshmukh, P. N. Chatur, N. B. Bhople, “AODV-based secure routing against black hole attack in MANET,” Proceedings of the IEEE International Conference on Recent Trends in Electronics Information Communication Technology, India, May 2016, pp. 1960-1964.
L. Mejaeleov, E. O. Ochola, “Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols,” Proceedings of the Information Security for South Africa (ISSA), Johannesburg, South Africa, August 2016, pp. 62-68.
H. Moudni, M. Er-Rouidi, H. Mouncif, B. El Hadadi, “Performance analysis of AODV routing protocol in MANET under the influence of routing attacks,” Proceedings of the 2016 International Conference on Electrical and Information Technologies (ICEIT 2016), Tangiers, Morocco, 2016, pp. 191-196.
J. S. Pati, K. V. N. Sunitha, “A combined technique for attack monitoring and risk assessment in MANET routing,” Proceedings of the 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN), Hyderabad, India, July 2016, pp. 1-11.
M. Dener, C. Bostancioglu, “Smart technologies with wireless sensor networks,” World Conference on Technology, Innovation and Entrepreneurship, Procedia. Social and Behavioral Sciences, vol. 195, pp. 1915-1921, 2015.
M. Rouse, “Wireless sensor network (WSN)”, Techtarget. [Online]. Available at: https://searchdatacenter.techtarget.com/definition/sensor-network.
S. Atanasov, “An overview of wireless communication technologies used in wireless sensor networks,” Proceedings of the International Scientific Conference eRA-8. Technologies used in wireless sensor networks, TEI Piraeus, Athens, Greece, September 2013, pp. 11-18.
Enabling technologies for Wireless Sensor Networks. VTT technical research centre of Finland LTD, June 2017, 14 p. [Online]. Available at: https://www.vttresearch.com/ Documents/Smart%20industry/EEES/updates_201610/technology/technology_sensor_network.pdf.
V. Kharchenko, D. Kochkar, O. Orekhov, “Monitoring network-based infrastructure for forest fire detection,” Proceedings of the Modelling, Monitoring and Management of Forest Fires III, Great Britain, 2012, pp. 91–100.
M. Kolisnyk, V. Kharchenko, I. Piskachova, “The research of the model of smart office availability considering patches on the router firewall software,” Proceedings of the 2018 IEEE 9th International Conference on dependable systems, services and technologies (DESSERT), May 2018, pp. 176–182.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.