Skip to main content

Advertisement

Log in

Reliable critical nodes detection for Internet of Things (IoT)

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The 3D critical node (C-N) detection can play a vital role in algorithm development of security, surveillance, monitoring, topology detection, and situation-aware emergency navigation for the Internet of Things (IoT). However, 3D C-N detection problem in IoT raises some issues and also introduces new challenges. The existing state of the art in 3D C-N detection shows that rely on prior known anchor node, known coordinate, embedding of the 3D situation on a 2D geometrical structure like circles and presence of unreliable node and ignores the energy constraint in Low Power and Lossy Networks IoT. In this paper, we present a practical, distributed, and energy-efficient algorithm for reliable 3D C-N detection. The goal of the proposed mechanism is twofold, firstly a 3D critical nodes (C-N) detection algorithm is proposed which uses only Received Signal Strength Indicator information of neighbor. Secondly, a correlation-based algorithm for the reliability approach is proposed to increases the node resilience against malicious IoT nodes. The complexity of our proposed algorithms has a time complexity of \(\mathcal {O}(\log (N))\) and computation cost \(\mathcal {O}(\delta (\log N))\) where N is the number of nodes in networks, and \(\delta \) is the total number of forward and the backward message from an individual node. To validate our work, we implemented our proposed approach with the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) based IoT routing protocol compare it with RPL and cryptographic approach Version Number and Rank Authentication (VeRa). The result shows that the proposed approach can detect 10–15% more C-N nodes. Result also shows that our proposed algorithm has better PDR than RPL based approach by 12% and less than VeRa (cryptographic approach) by 8% however our proposed approach consumes almost 50% less power than the VeRa.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Farooq, M. J., & Zhu, Q. (2018). On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT). IEEE Transactions on Wireless Communications, 17(4), 2618–2632.

    Article  Google Scholar 

  2. Muhammed, T., Mehmood, R., & Albeshri, A. (2017). Enabling reliable and resilient IoT based smart city applications. In International conference on smart cities, infrastructure, technologies and applications (pp. 169–184). Springer, Cham.

  3. Winter, T., et al. (2012). RPL: IPv6 routing protocol for low-power and lossy networks. rfc 6550, 1–157.

  4. Akkaya, K., Thimmapuram, A., Senel, F., & Uludag, S. (2008). Distributed recovery of actor failures in wireless sensor and actor networks. In 2008 IEEE wireless communications and networking conference (pp. 2480–2485). IEEE.

  5. Dagdeviren, O., Akram, V. K., & Tavli, B. (2018). Design and evaluation of algorithms for energy efficient and complete determination of critical nodes for wireless sensor network reliability. IEEE Transactions on Reliability, 68(1), 280–290.

    Article  Google Scholar 

  6. Mumtaz, S., Alsohaily, A., Pang, Z., Rayes, A., Tsang, K. F., & Rodriguez, J. (2017). Massive Internet of Things for industrial applications: Addressing wireless IIoT connectivity challenges and ecosystem fragmentation. IEEE Industrial Electronics Magazine, 11(1), 28–33.

    Article  Google Scholar 

  7. Akram, V. K., & Dagdeviren, O. (2013). Breadth-first search-based single-phase algorithms for bridge detection in wireless sensor networks. Sensors, 13(7), 8786–8813.

    Article  Google Scholar 

  8. Ciuonzo, D., & Rossi, P. S. (2017). Distributed detection of a non-cooperative target via generalized locally-optimum approaches. Information Fusion, 36, 261–274.

    Article  Google Scholar 

  9. Gochhayat, S. P., Lal, C., Sharma, L., Sharma, D. P., Gupta, D., Saucedo, J. A. M., et al. (2019). Reliable and secure data transfer in IoT networks. Wireless Networks, 26, 1–14.

    Article  Google Scholar 

  10. Castiglione, A., Choo, K. K. R., Nappi, M., & Ricciardi, S. (2017). Context aware ubiquitous biometrics in edge of military things. IEEE Cloud Computing, 4(6), 16–20.

    Article  Google Scholar 

  11. Zieliski, Z., Chudzikiewicz, J., & Furtak, J. (2019). An approach to integrating security and fault tolerance mechanisms into the military IoT. In Security and fault tolerance in Internet of Things (pp. 111–128). Cham: Springer.

  12. Yang, Yang, Zheng, Xianghan, & Tang, Chunming. (2017). Lightweight distributed secure data management system for health internet of things. Journal of Network and Computer Applications, 89, 26–37.

    Article  Google Scholar 

  13. Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., & Spirito, M. A. (2013). An IDS framework for internet of things empowered by 6LoWPAN. In Proceedings of the 2013 ACM SIGSAC conference on computer communications security (pp. 1337–1340).

  14. Malina, L., Hajny, J., Fujdiak, R., & Hosek, J. (2016). On perspective of security and privacy-preserving solutions in the internet of things. Computer Networks, 102, 83–95.

    Article  Google Scholar 

  15. Lavanya, M., & Natarajan, V. (2017). Lightweight key agreement protocol for IoT based on IKEv2. Computers Electrical Engineering, 64, 580–594.

    Article  Google Scholar 

  16. Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Third IEEE international conference on pervasive computing and communications (pp. 324–328). IEEE.

  17. Dvir, A., & Buttyan, L. (2011). VeRA-version number and rank authentication in rpl. In 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems (pp. 709–714). IEEE.

  18. Perrey, H., Landsmann, M., Ugus, O., Schmidt, T. C., & Wählisch, M. (2013). TRAIL: Topology authentication in RPL. arXiv preprint arXiv:1312.0984.

  19. Liu, X., Xiao, L., Kreling, A., & Liu, Y. (2006). Optimizing overlay topology by reducing cut vertices. In Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video (pp. 1–6).

  20. Funke, S. (2005). Topological hole detection in wireless sensor networks and its applications. In Proceedings of the 2005 joint workshop on Foundations of mobile computing (pp. 44–53).

  21. Ciuonzo, D., Rossi, P. S., & Willett, P. (2017). Generalized Rao test for decentralized detection of an uncooperative target. IEEE Signal Processing Letters, 24(5), 678–682.

    Article  Google Scholar 

  22. Aldalahmeh, S. A., Al-Jazzar, S. O., McLernon, D., Zaidi, S. A. R., & Ghogho, M. (2019). Fusion rules for distributed detection in clustered wireless sensor networks with imperfect channels. IEEE Transactions on Signal and Information Processing over Networks, 5(3), 585–597.

    Article  MathSciNet  Google Scholar 

  23. Mayzaud, A. (2016). Monitoring and security for the RPL-based Internet of Things. Doctoral dissertation.

  24. Case, J., Fedor, M., & Schoffstall, M. (1990). J. Davin, simple network management protocol. STD 15, RFC 1157, May.

  25. Enns, R., Bjorklund, M., Schoenwaelder, J., & Bierman, A. (2011). Network configuration protocol (NETCONF): RFC 6241. IETF, June.

  26. Sehgal, A., Perelman, V., Kuryla, S., & Schonwalder, J. (2012). Management of resource constrained devices in the internet of things. IEEE Communications Magazine, 50(12), 144–149.

    Article  Google Scholar 

  27. Datasheet, T. Retrieved January, 2020, from http://www.willow.co.uk.TelosBDatasheet.pdf/.

  28. Shelby, Z., Hartke, K., & Bormann, C. (2014). The constrained application protocol (CoAP).

  29. Liu, C., & Cao, G. (2010). Distributed monitoring and aggregation in wireless sensor networks. In 2010 Proceedings IEEE INFOCOM (pp. 1–9). IEEE.

  30. Lahmadi, A., & Boeglin, A. (2013). Efficient distributed monitoring in 6lowpan networks. In Proceedings of the 9th international conference on network and service management (CNSM 2013) (pp. 268–276). IEEE.

  31. Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc Networks, 11(8), 2661–2674.

    Article  Google Scholar 

  32. Xu, X., Wan, J., Zhang, W., Tong, C., & Wu, C. (2011). PMSW: A passive monitoring system in wireless sensor networks. International Journal of Network Management, 21(4), 300–325.

    Article  Google Scholar 

  33. Khan, M. M. H., Luo, L., Huang, C., & Abdelzaher, T. (2007). SNTS: Sensor network troubleshooting suite. In International conference on distributed computing in sensor systems (pp. 142–157). Berlin: Springer.

  34. Saoudi, M., Lalem, F., Bounceur, A., Euler, R., Kechadi, M. T., Laouid, A., et al. (2017). D-LPCN: A distributed least polar-angle connected node algorithm for finding the boundary of a wireless sensor network. Ad Hoc Networks, 56, 56–71.

    Article  Google Scholar 

  35. Pongle, P., & Chavan, G. (2015). Real time intrusion and wormhole attack detection in internet of things. International Journal of Computer Applications,121(9).

  36. Li, X., Shi, H., & Shang, Y. (2005). A sorted RSSI quantization based algorithm for sensor network localization. In 11th international conference on parallel and distributed systems (ICPADS’05) (Vol. 1, pp. 557–563). IEEE.

  37. Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based internet of things. International Journal of Distributed Sensor Networks, 9(8), 794326.

    Article  Google Scholar 

  38. Conta, A., Deering, S., & Gupta, M. (1998). Internet control message protocol (icmpv6) for the internet protocol version 6 (ipv6) specification. RFC 2463, December.

  39. Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A taxonomy of attacks in RPL-based Internet of Things.

  40. Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.

    Article  Google Scholar 

  41. Pongle, P., & Chavan, G. (2015). A survey: Attacks on RPL and 6LoWPAN in IoT. In 2015 international conference on pervasive computing (ICPC) (pp. 1–6). IEEE.

  42. Levis, P., et al. (2011). ”The trickle algorithm.” Internet Engineering Task Force, RFC6206.

  43. Marina, M. K., & Das, S. R. (2006). Ad hoc on-demand multipath distance vector routing. Wireless Communications and Mobile computing, 6(7), 969–988.

    Article  Google Scholar 

  44. Bai, X., Zhang, C., Xuan, D., Jia, W. (2009). Full-coverage and k-connectivity (k= 14, 6) three dimensional networks. In IEEE INFOCOM 2009 (pp. 388–396). IEEE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shailendra Shukla.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

In this Appendix, we derive the 3D critical node (C-N) detection rule for 3D topology. Let us consider a tetrahedron with vertices ABCDE, as illustrated in the Fig. 2(b). The angle between the any two planes of ABCDE can be derived using Lemma 1

Lemma 1

For a given a tetrahedron ABCD, the angle between the two planes i.e, \(\mathcal {P}\)(CAB) versus \(\mathcal {P}\) (CAD) is:

$$\begin{aligned} \cos ^{-1}\left( \frac{\cos (\angle BAD) -\cos (\angle CAB)*\cos (\angle CAD) }{\sin (\angle CAB)\sin (\angle CAD)} \right) \end{aligned}$$
(1)

where \(\angle BAD\)= \(\cos ^{-1}\left( \frac{dis(\varvec{(}B,A))^2 + dis(\varvec{(}A,D))^2-dis(\varvec{(}B,D))^2}{2dis(\varvec{(}A,B))*dis(\varvec{(}A,D))^2} \right) \),

\(\angle CAB=\cos ^{-1}\left( \frac{dis(\varvec{(}C,A))^2 +dis(\varvec{(}A,B))^2 -dis(\varvec{(}C,B))^2}{2dis(\varvec{(}C,A))*dis(\varvec{(}A,B))}\right) \),

\(\angle CBD=\cos ^{-1}\left( \frac{dis(\varvec{(}C,A))^2 + dis(\varvec{(}A,D))^2-dis(\varvec{(}C,D))^2}{2dis(\varvec{(}C,A))*dis(\varvec{(}A,D))}\right) \) and

\(dis(\mathbf {B},\mathbf {A})\),\(dis(\mathbf {A},\mathbf {D})\),\(dis(\mathbf {B},\mathbf {D})\),\(dis(\mathbf {C},\mathbf {A})\), \(dis(\mathbf {A},\mathbf {B})\), \(dis(\mathbf {C},\mathbf {D})\),\(dis(\mathbf {C}, \mathbf {D)}\) are the distance between the nodes \(\overline{\mathrm{BA}}\),\(\overline{\mathrm{AD}}\),\(\overline{\mathrm{BD}}\),\(\overline{\mathrm{CA}}\),\(\overline{\mathrm{AB}}\),\(\overline{\mathrm{CB}}\) and \(\overline{\mathrm{CD}}\).

Proof

Viewing the tetrahedron from vertices A, we get three triangular planes (Fig. 3). The angle: \(\angle BCA= \cos ^{-1}\left( \frac{dis(\varvec{(}B,C))^2 + dis(\varvec{(}C,A))^2-dis(\varvec{(}B,A))^2}{2dis(\varvec{(}B,C))*dis(\varvec{(}C,A))^2} \right) \),

\(\angle CAD\cos ^{-1}\left( \frac{dis(\varvec{(}C,A))^2 + dis(\varvec{(}A,D))^2-dis(\varvec{(}C,D))^2}{2dis(\varvec{(}A,D))*dis(\varvec{(}C,D))^2} \right) \) and

\(\angle DAB=\cos ^{-1}\left( \frac{dis(\varvec{(}D,A))^2 + dis(\varvec{(}A,B))^2-dis(\varvec{(}D,B))^2}{2dis(\varvec{(}D,A))*dis(\varvec{(}A,B))^2} \right) \) ( by using inverse Cosine Formula for triangle). Now, label the 3 edges associated with node A as \(\overline{\mathrm{AB}}\),\(\overline{\mathrm{AC}}\) and \(\overline{\mathrm{AD}}\) and arrange them in counterclockwise manner. Let \(\vec {v}_{ab}\), \(\vec {v}_{ac}\) and \(\vec {v}_{ad}\) be the unit vector pointing away from the vertex A along the direction of the edge \(\overline{\mathrm{AB}}\),\(\overline{\mathrm{AC}}\) and \(\overline{\mathrm{AD}}\) respectively. Any of the edges can be seen as the contact point of two planes or faces. Lets say edge \(\overline{\mathrm{AC}}\), can be seen as the juncture of vectors bounded by \(\vec {v}_{ab}\) and \(\vec {v}_{ac}\) with another vector bounded by \(\vec {v}_{ac}\) and \(\vec {v}_{ad}\). The inward normal vectors of these two faces are given by: \(\vec {n}_{ab,ac}\) = \(\frac{\vec {v}_{ab} \times \vec {v}_{ac}}{|\vec {v}_{ab} \times \vec {v}_{ac}|}\) \( \,\,\,\text { and }\,\,\, \vec {n}_{ac,ad}\) = \(\frac{\vec {v}_{ac} \times \vec {v}_{ad}}{|\vec {v}_{ac} \times \vec {v}_{ad}|}\)

$$\begin{aligned}&= -\vec {n}_{ab,ac}\cdot \vec {n}_{ac,ad} \end{aligned}$$
(2)
$$\begin{aligned}&= -\frac{( \vec {v}_{ab} \times \vec {v}_{ac} )\cdot (\vec {v}_{ac} \times \vec {v}_{ad})}{ |\vec {v}_{ab} \times \vec {v}_{ac}||\vec {v}_{ac} \times \vec {v}_{ad}|} \end{aligned}$$
(3)
$$\begin{aligned}&=-\frac{(\vec {v}_{ab}\cdot \vec {v}_{ac})(\vec {v}_{ac}\cdot \vec {v}_{ad}) - (\vec {v}_{ab}\cdot \vec {v}_{ad})|\vec {v}_{ac}|^2}{|\vec {v}_{ab} \times \vec {v}_{ac}||\vec {v}_{ac} \times \vec {v}_{ad}|} \end{aligned}$$
(4)
$$\begin{aligned}&= \frac{\vec {v}_{ab}\cdot \vec {v}_{ad} - (\vec {v}_{ab}\cdot \vec {v}_{ac})(\vec {v}_{ac}\cdot \vec {v}_{ad})}{|\vec {v}_{ab} \times \vec {v}_{ac}||\vec {v}_{ac} \times \vec {v}_{ad}|} \end{aligned}$$
(5)

without loss of generality we will get the dihedral angle between \(\mathcal {P}\)(CAB) versus \(\mathcal {P}\) (CAD) as: \(\cos ^{-1}\left( \frac{\cos (\angle BAD) -\cos (\angle CAB)*\cos (\angle CAD) }{\sin \angle CAB)*\sin (\angle CAD)} \right) \) Similarly, dihedral angles between other planes can be obtained as: \(\mathcal {P}_{\infty }\)(ABC) versus \(\mathcal {P}_{\in }\) (ABD) can be derived as: \(\cos ^{-1}\left( \frac{\cos (\angle CBD) -\cos (\angle ABC)*\cos (\angle ABD) }{\sin (\angle ABC))*\sin (\angle ABD)} \right) \) and corresponding dihedral angles between other planes are derived. \(\square \)

For 3D B-N, assume a smaller subgraph of four nodes \(\{A, B, C, E\}\in \{A, B, C, D, E\}\), as illustrated in Figs. 2 and 3. Suppose node E wants to test whether it is B-N or I-N (Fig. 2b shows the placement of node E as I-N). Node E tests the coverness information (according to Definition-2), i.e., at least four nodes covers it. If node E lies inside the tetrahedral, then it is I-N else it is B-N. The stated Lemma 2 is used to derive the relation and to detect the node as I-N or B-N as illustrated in (Fig. 9).

Fig. 9
figure 9

Tetrahydron \(\{\hbox {A,B,C,D,E}\}\) is sub divided into sub tetrahydron() considering E as top vertex

Lemma 2

Node ’E’ is interior node (I-N) if it satisfy all the six relationship in terms of angularity.

  1. 1.

    \(\mathcal {P}\)(ABC) versus \(\mathcal {P}\) (ABD) < \(\mathcal {P}\)(ABC) versus \(\mathcal {P}\) (ABE) + \(\mathcal {P}\)(ABD) versus \(\mathcal {P}\) (ABE)

  2. 2.

    \(\mathcal {P}\)(BDA) versus \(\mathcal {P}\) (BDC) < \(\mathcal {P}\)(BDA) versus \(\mathcal {P}\) (BDE) + \(\mathcal {P}\)(BDC) versus \(\mathcal {P}\) (BDE)

  3. 3.

    \(\mathcal {P}\)(DCA) versus \(\mathcal {P}\) (DCB) < \(\mathcal {P}\)(DCA) versus \(\mathcal {P}\) (DCB) + \(\mathcal {P}\)(DCB) versus \(\mathcal {P}\) (DCE)

  4. 4.

    \(\mathcal {P}\)(BCA) versus \(\mathcal {P}\) (BCD) < \(\mathcal {P}\)(BCA) versus \(\mathcal {P}\) (BCE) + \(\mathcal {P}\)(BCD) versus \(\mathcal {P}\) (BCE)

  5. 5.

    \(\mathcal {P}\)(ADB) versus \(\mathcal {P}\) (ADC) < \(\mathcal {P}\)(ADB) versus \(\mathcal {P}\) (ADE) + \(\mathcal {P}\)(ADC) versus \(\mathcal {P}\) (ADE)

  6. 6.

    \(\mathcal {P}\)(ACB) versus \(\mathcal {P}\) (ACD) < \(\mathcal {P}\)(ACB) versus \(\mathcal {P}\) (ACE) + \(\mathcal {P}\)(ACD) versus \(\mathcal {P}\) (ACE)

Proof

“without loss of generality” angle divided into two-part will always be greater than the individual split parts (direct proof by triangle inequality). Hence if the equation fails then it is a boundary node (B-N). \(\square \)

1.1 Correctness for coverage and connectivity of 3D critical nodes (C-N)

Proving optimality in coverage and connectivity in 3D topology is surprisingly difficult, even though similar problems in 2D can be proved easily. As it has at least 14 different directions when assumed \(R_c =R_s\) (Kepler’s sphere-packing problem has been around since 1611 and proof of Kepler’s conjecture has only been found in 1998). Similarly, no optimality proof for Kelvin’s 1887 conjecture is known yet. For coverage, we have proposed a K-Hop distance-vector algorithm. Each Critical Node (C-N) has (node id) so they will extend their Nbr table only and we use an extended k-Hop distance vector routing [43]. Each node transmits its Nbr table each receives the same the most recently received vector from the neighbor is changed according to the distance vector formula. Once this initial helper node were identified then the final Helper nodes [43] are identified using Lemma-III. Figure 10 shows the lattice pattern to achieve full coverage with 14-connectivity (nodes are \(\frac{R_c}{2}\) distance apart). Solid circular dots denote sensors, solid lines represent connected links with other sensors and the dashed lines construct a cube. The graph also represents the Voronoi polyhedron generated by each sensing sphere is a truncated octahedron [44].

Fig. 10
figure 10

Figure shows the lattice pattern to achieve full coverage with 14-connectivity [44]

Lemma 3

Node(u) becomes a interior node if \(deg(u)<14\) and all neighbours are \(\frac{R_c}{2}\) distance apart.

Proof

Paper [44] proves that patterns for full coverage requires 14 connectivity illustrated in Fig. 10. \(\square \)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shukla, S. Reliable critical nodes detection for Internet of Things (IoT). Wireless Netw 27, 2931–2946 (2021). https://doi.org/10.1007/s11276-021-02603-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-021-02603-4

Keywords

Navigation