| Literature DB >> 29966366 |
Zhaobin Liu1, Qiang Ma2, Wenzhi Liu3, Victor S Sheng4, Liang Zhang5, Gang Liu6.
Abstract
Internal reliability and external safety of Wireless Sensor Networks (WSN) data transmission have become increasingly outstanding issues with the wide applications of WSN. This paper proposes a new method for access control and mitigation of interfering noise in time synchronization environments. First, a formal definition is given regarding the impact interference noise has on the clock skew and clock offset of each node. The degree of node interference behavior is estimated dynamically from the perspective of time-stamp changes caused by the interference noise. Secondly, a general access control model is proposed to resist invasion of noise interference. A prediction model is constructed using the Bayesian method for calculating the reliability of neighbor node behavior in the proposed model. Interference noise, which attacks the time synchronization, is regarded as the key factor for probability estimation of the reliability. The result of the calculations determines whether it is necessary to initiate synchronization filtering. Finally, a division of trust levels with bilinear definition is employed to lower interference noise and improve the quality of interference detection. Experimental results show that this model has advantages in system overhead, energy consumption and testing errors, compared to its counterparts. When the disturbance intensity of a WSN increases, the proposed optimized algorithm converges faster with a lower network communication load.Entities:
Keywords: access control; interference noise; reliability; time synchronization; wireless sensor networks
Year: 2018 PMID: 29966366 PMCID: PMC6069018 DOI: 10.3390/s18072107
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Two-way synchronous information exchange between two nodes.
Figure 2The basic steps of CEACM-TS.
Figure 3A prototype network for event detection.
Figure 4The topological structure of test platform with 50 nodes. (a) Topological structure of 50 node test platform; (b) CEACM-TS test results; (3) APAC test results; (d) GTMS test results.
Figure 5Throughput curve versus Interference intensity.
Figure 6Energy consumption of different interference intensities.
Figure 7Error rate of access control detection: (a) Error rate; (b) Estimation error rate; (c) Correct error rate.