Abstract
Wireless sensor network senses the environment where the human access is limited. Sensor nodes will collect the information and pass it to the sink node. When passing the information, malicious node or compromised node will corrupt it and forward it to the sink node. In the receiver side, a corrupted message will create a problem. The proper information will not be conveyed to the sink node. The presence of compromised node will generate incorrect report and it affects the event detection. In this paper, we proposed an EERN algorithm to provide reliability for the entire wireless sensor network against compromised node. To provide reliability and to save time, we introduced vigilant node and aggregator node. Aggregator node will detect the suspicious node. Vigilant node will identify the suspicious node as malicious, compromised or faulty node.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., et al.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52(12), 2292–2330 (2008)
Van der Werff, T.J.: 10 emerging technologies that will change the world. MIT’s Technol. Rev. 32(2), 33–49 (2003)
Misra, S., Reisslein, M., Xue, G.: A survey of multimedia streaming in wireless sensor networks. IEEE Commun. Surv. Tutor. 10(4), 18–39 (2008)
Rehman, A., Abbasi, A.Z., Islam, N., et al.: A review of wireless sensors and networks’ applications in agriculture. Comput. Stand. Interfaces 36(2), 263–270 (2014)
Oliveira, L.M., Rodrigues, J.J.: Wireless sensor networks: a survey on environmental monitoring. J. Commun. 6(2), 143–155 (2011)
Alemdar, H., Ersoy, C.: Wireless sensor networks for healthcare: a survey. Comput. Netw. 54(15), 2688–2710 (2010)
Yang, J., Chen, Y., Trappe, W., Cheng, J.: Detection and localization of multiple spoofing attackers in wireless networks. IEEE Trans. Parallel Distrib. Syst. 24(1), 44–57 (2013)
Yang, J., Chen, Y., Trappe, W., Cheng, J.: Detection and localization of multiple spoofing attackers in wireless networks. IEEE Trans. Parallel Distrib. Syst. 24(1), 1045–9219 (2013)
Nidhya, M.S., Chinnaiyan, R.: Improving the reliability of data transfer against sinkhole in wireless sensor networks—a review. Int. J. Appl. Eng. Res. (IJAER) 10(82), 122–125 (2015)
Nidhya, M.S., Chinnaiyan, R.: Shortest reliable path for wireless sensor network. Int. J. Pure Appl. Math. (IJPAM) 117(20), 105–108 (2017)
Nidhya, M.S., Chinnaiyan, R.: Conniving energy and time delay factor to model reliability for wireless sensor networks. IEEE xplore Digital Library (2017)
Chinnaiyan, R., Somasundaram, S.: Evaluating the reliability of component based software systems. Int. J. Qual. Reliab. Manag. 27(1), 78–88 (2010)
Chinnaiyan, R., Somasundaram, S.: Reliability of object oriented software systems using communication variables—a review. Int. J. Softw. Eng. 2(2), 87–96 (2009)
Chinnaiyan, R., Somasundaram, S.: Reliability assessment of component based software systems using test suite—a review. J. Comput. Appl. 1(4), 34–37 (2008)
Chinnaiyan, R., Somasundaram, S.: An experimental study on reliability estimation of GNU compiler components—a review. Int. J. Comput. Appl. (0975 – 8887) 25(3) (2011)
Chinnaiyan, R., Somasundaram, S.: Reliability of component based software with similar software components—a review. i-Manager’s J Softw. Eng. 5(2), 44 (2010)
Chinnaiyan, R., Somasundaram, S.: Monte carlo simulation for reliability assessment of component based software systems. i-Manager’s J. Softw. Eng. 3(4), 27 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nidhya, M.S., Chinnaiyan, R. (2019). Reliability Evaluation of Wireless Sensor Networks Using EERN Algorithm. In: Smys, S., Bestak, R., Chen, JZ., Kotuliak, I. (eds) International Conference on Computer Networks and Communication Technologies. Lecture Notes on Data Engineering and Communications Technologies, vol 15. Springer, Singapore. https://doi.org/10.1007/978-981-10-8681-6_78
Download citation
DOI: https://doi.org/10.1007/978-981-10-8681-6_78
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8680-9
Online ISBN: 978-981-10-8681-6
eBook Packages: EngineeringEngineering (R0)