CN103533571B - Fault-tolerant event detecting method based on temporal voting strategy - Google Patents

Fault-tolerant event detecting method based on temporal voting strategy Download PDF

Info

Publication number
CN103533571B
CN103533571B CN201310552747.3A CN201310552747A CN103533571B CN 103533571 B CN103533571 B CN 103533571B CN 201310552747 A CN201310552747 A CN 201310552747A CN 103533571 B CN103533571 B CN 103533571B
Authority
CN
China
Prior art keywords
node
local
event
data
fault
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310552747.3A
Other languages
Chinese (zh)
Other versions
CN103533571A (en
Inventor
吕建华
张柏礼
王进强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201310552747.3A priority Critical patent/CN103533571B/en
Publication of CN103533571A publication Critical patent/CN103533571A/en
Application granted granted Critical
Publication of CN103533571B publication Critical patent/CN103533571B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Complex Calculations (AREA)

Abstract

The invention discloses a kind of fault-tolerant event detecting method based on temporal voting strategy, including the following steps that order performs: (1) each node obtains the detection data of self; (2) based on rectangular histogram, detection data are carried out fault-tolerant processing; (3) based on the dependency of attribute, detection data are carried out local error detection, distinguish LF node and preliminary Normal node; (4) preliminary Normal node is carried out local event decision-making, distinguish LE node and Normal node; (5) to LF node and LE node, the credibility of its neighbor node is calculated; (6) vote based on credibility and distance weighting, it is judged that node is Event node or Normal node. Fault-tolerant event detecting method based on temporal voting strategy provided by the invention, has higher event detection rate and error correction rate, has relatively low event rate of false alarm and mistake introducing rate, and has less ability consumption.

Description

Fault-tolerant event detecting method based on temporal voting strategy
Technical field
The present invention relates to fault-tolerant event detecting method in a kind of wireless sensor network, particularly relate to a kind of fault-tolerant event detection based on temporal voting strategy (Fault-tolerantEventDetectionAlgorithmbasedonVoting is called for short FEDAV) method.
Background technology
Wireless sensor network (WirelessSensorNetworks, it is called for short WSN) it is the wireless self-organization network being made up of one group of sensor node, it is used for gathering in real time data and the information of various monitored object, is analyzed and processed, testing result is supplied to the user of network.
Event detection in WSN, it is simply that refer to region or border that the event that detects occurs. For having the event (such as, when forest fire occurs, the high temperature of regional area, dry etc.) of special characteristic, when this kind of event occurs, the sampled value of respective sensor can deviate the sampled value of normal condition. Therefore, if the sampled value of sensor reaches an event threshold, it is believed that the monitored area of sensor there occurs event, is called event area; Otherwise it is assumed that this region occurs without event, it is referred to as normal region.
But, the unreliability of rugged environment and sensor itself, often lead to sensor and produce wrong data or noise data, thus affecting the detection to event area of the whole network. Therefore event detection must take into fault-tolerant processing, and namely when node makes a mistake, or under the interference of noise data, incident Detection Algorithm still has and detects performance preferably. Because the event that environmental factors causes or Deviant Behavior are space correlation, the fault of node or noise data are then stochastic independences, so the fault-tolerant processing of existing incident Detection Algorithm, mostly depend on the spatial coherence of sensing data, undertaken fault-tolerant by the swapping data of neighbor node, as based on theoretical fault-tolerant of Bayesian, fault-tolerant based on mobile median, based on moving the fault-tolerant of average, based on the tolerant fail algorithm etc. of ballot.
Tolerant fail algorithm (KrishnamachariB based on Bayesian, IyengarS.DistributedOTDSAlgorithmsforFault-TolerantEvent RegionDetectioninWirelessSensorNetworks [J] .IEEETrans, Computers, 2004, 53 (3): 241-250) it is the tolerant fail algorithm of a kind of classics, although having good fault freedom, but only only in accordance with whether the neighbours number consistent with oneself event court verdict reaches half, or the size of posterior probability revises the event decision result of oneself, accuracy in detection is not high, because when spatial redundancy information deficiency, such as the node for event boundaries place, fault freedom is poor. and based on the tolerant fail algorithm (ChenJ of temporal voting strategy, KherS, SomaniA.DistributedFaultDetectionofWirelessSensorNetwork s [C] .Procofthe2006WorkshoponDependabilityIssuesinWirelessAdH ocNetworksandSensorNetworks, 2006:65-71) do not consider the distance factor between neighbor node, and the fault-tolerant effect of Centroid is different by different far and near neighbor node.
Fault-tolerant processing based on spatial coherence has good fault freedom, but generally requires frequent exchange data between node, and energy expenditure is very big. And, if the data of detection itself comprise mistake, based on local event decision-making and neighbours' collaborative process, the testing result of mistake can be produced. It should also be seen that, in wireless sensor and actor networks, each node has different duties and reliability, and therefore, in ballot processes, the ballot weight of each neighbor node also should difference.
Summary of the invention
Goal of the invention: in order to overcome the deficiencies in the prior art, the present invention is from the temporal correlation of node its data, it is considered to the fault-tolerant processing in node, adopts the fault-tolerant processing based on rectangular histogram and Attribute Correlation; On this basis, based on the spatial coherence of internodal data, provide a kind of fault-tolerant incident Detection Algorithm based on temporal voting strategy, have that event detection is effective, fault-tolerant processing is effective and the advantage such as energy expenditure is low.
Technical scheme: for achieving the above object, the technical solution used in the present invention is:
Based on the fault-tolerant event detecting method of temporal voting strategy, the state of definition node is as follows:
Normal: represent node SlocalMonitored area in without event occur, node SlocalDo not break down and mistake;
LF: represent node SlocalIt is likely to occur fault or wrong data, for node SlocalLocal event judge in;
LE: represent node SlocalEvent it is likely to occur, for node S in monitored arealocalLocal event judge in;
Event: represent node SlocalEvent occurs, for node S in monitored arealocalIn ballot decision-making;
Fault: represent node SlocalBreak down event, and can not correct, for node SlocalIn ballot decision-making;
Including the following steps that order performs:
(1) each node obtains the detection data of self;
(2) based on rectangular histogram, detection data are carried out fault-tolerant processing;
(3) based on the dependency of attribute, detection data are carried out local error detection, distinguish LF node and preliminary Normal node;
(4) preliminary Normal node is carried out local event decision-making, distinguish LE node and Normal node;
(5) to LF node and LE node, the credibility of its neighbor node is calculated;
(6) vote based on credibility and distance weighting, it is judged that node is Event node or Normal node.
Concrete, in described step (2), when detection data being carried out fault-tolerant processing based on rectangular histogram, the acquisition methods of data center is as follows:
(21) for data x1,x2,��,xn, according to each data genaration histogram structure, obtain k packet g1,g2,��,gi,��,gk;
(22) size of definition i-th packet | gi| the number of the data comprised in being grouped for i-th, obtain g according to the descending arrangement of the size of each packetk',��,gi',��,g2',g1';
(23) a given mean data coverage m0, each group of data of descending accumulation, until group gr' meet following formula:
Σ i = r k g i ′ Σ i = 1 k g i ′ ≥ m 0
m0Value is relevant with the signal to noise ratio of data, and signal to noise ratio is more little, m0Value is more little, to filter more noise data; If the generation probability of noise data is p, then m0Should be less than 1-p;
(24) to organize gr',��,gk' the data that comprise, calculate data center
p = Σ i = r k | g i ′ |
x ‾ h = 1 p Σ x j
Hereini=r,r+1,��,k��
Node wrong data and noise data are small probability event. This method filters out small probability data, has both decreased the impact of noise data, considers again more normal data in the calculation.
Concrete, in described step (3), detection data are carried out local error detection by the dependency based on attribute, distinguish LF node and preliminary Normal node, method particularly includes: the initial relevance of two strong correlation attribute X and Y of note node is R0(X, Y), real-time dependency is R (X, Y), for a dependency irrelevance threshold xi, if the intensity of variation of Attribute Correlation meets following formula:
| R ( X , Y ) - R 0 ( X , Y ) R 0 ( X , Y ) | < &xi;
Then thinking that the dependency of X and Y is not changed in, node is preliminary Normal node; Otherwise it is assumed that the dependency of X and Y there occurs change, node is Event node.
If the expected value of E (X), E (Y) respectively two attribute X and Y, the variance that D (X), D (Y) are attribute X and Y, the linear dependence definition of X and Y is as follows:
R ( X , Y ) = E { [ X - E ( X ) ] [ Y - E ( Y ) ] } D ( X ) D ( Y )
For node data, following formula is adopted to carry out approximate calculation:
R ( X , Y ) = &Sigma; ( X - X &OverBar; ) ( Y - Y &OverBar; ) &Sigma; ( X - X &OverBar; ) 2 &times; &Sigma; ( Y - Y &OverBar; ) 2
Consider that node storage space is extremely limited, adopt cumulative mode to calculate the dependency of X and Y:
R ( X , Y ) = &Sigma;XY - &Sigma;X&Sigma;Y n &Sigma;X 2 - ( &Sigma;X ) 2 n &times; &Sigma; Y 2 - ( &Sigma;Y ) 2 n
Concrete, in described step (4), preliminary Normal node is carried out local event decision-making, distinguishes LE node and Normal node, method particularly includes:
If the average value that attribute X is under normal circumstances is Mn, the average value when event occurs is Me, Me>Mn, the threshold value x of definition event generationthFor:
x th = 1 2 ( M n + M e )
Real-time value x for attribute Xi, the binary judgment rule that event occurs is:
B e = 1 x i > x th 0 x i &le; x th
Wherein, Be=1 represents that node is LE node, Be=0 represents that node is Normal node.
The credibility of node, the confidence level of representation node current decision, reflect node current operating state. The concordance that node credibility detects data by node current detection data and history embodies. Concrete, in described step (5), the credibility C of node is calculated by following formula:
C = 1 - | R - R 0 | | R | + | R 0 |
Wherein, R0(X, Y) represents attribute X and the initial relevance of attribute Y, and R (X, Y) represents the real-time dependency of attribute X and attribute Y. C is the closer to 1, it was shown that the dependency between attribute X and Y changes more little as time goes by, and the probability of this one malfunctions is more low, thus the credibility of node is more high; Otherwise, C is the closer to 0, and node credibility is more low.
Concrete, in described step (6), vote based on credibility and distance weighting, it is judged that node is Event node or Normal node, method particularly includes:
(61) definition SlocalFor present node, SiFor SlocalA hop neighbor node, then:
Distance present node SlocalNearer node is more similar to its state, and ballot weight also should be more big, therefore adopts anti-distance weighting rule to vote. Node SiRelative to node SlocalAnti-distance weighting InvDistWeightilFor:
InvDist il = &Sigma; i = 1 k Dis tan ce ( S i , S local ) - Dis tan ce ( S i , S local )
InvDistWeight il = InvDist il &Sigma; i = 1 k InvDist il
Wherein, Distance (Si,Slocal) it is node SiWith node SlocalBetween the Euclidean distance of coordinate;
Node SiTo node SlocalBallot value ViFor:
Vi=Ci��InvDistWeightil
Wherein, C represents the credibility of node;
(62) at present node SlocalAll hop neighbor node SiIn, calculate and there is identical local event result of decision ballot value sum, remember that the ballot value sum that all local decision-makings are LE node is Ve, the ballot value sum that all local decision-makings are Normal node is Vn, calculate VeAnd VnBetween difference degree VdiffFor:
V diff = | V e - V n | | V e + V n |
(64) by VdiffCompare with the event boundaries threshold �� set:
Table 1FEDAV algorithm ballot processes decision rule
According to upper table decision node SlocalEnd-state.
As node SlocalWhen being positioned at event boundaries region and cause information of neighbor nodes deficiency, it is impossible to node S is corrected in the ballot relying on neighbourslocalError condition. For this situation, according to Tobler First Law, different from the dependency of present node apart from different neighbor nodes, therefore adopt the space interpolation algorithm based on inverse distance weight, by the data estimation node S of neighbor nodelocalDetected value
Wherein, diFor node SiTo node SlocalBetween distance, p is the values of powers of distance;
Then withAs node SlocalReal-time value, adopt the method for step (4) to carry out local event decision-making, and result step (4) distinguished be as node SlocalFinal decision result.
For the node S not having effective neighbor node to votelocal(such as, node SlocalThe local event result of decision of all neighbor nodes be LF), if the end-state processed through ballot is unsettled condition, then node S is setlocalState be Fault.
Beneficial effect: the fault-tolerant event detecting method based on temporal voting strategy provided by the invention, has higher event detection rate and error correction rate, has relatively low event rate of false alarm and mistake introducing rate, and has less ability consumption.
Accompanying drawing explanation
Fig. 1 is the flow chart of the present invention;
Fig. 2 is interior joint state transition diagram of the present invention;
Fig. 3 is Intel's Berkeley laboratory event simulated scenario, first group of data source;
Fig. 4 is the event simulation scene that 1024 nodes constitute in sensor network, second group of data source;
Fig. 5 is the contrast (adopting first group of data) of FEDAV, OTDS and SFEDA event recognition rate;
Fig. 6 is the contrast (adopting second group of data) of FEDAV, OTDS and SFEDA event recognition rate;
Fig. 7 is the contrast (adopting first group of data) of FEDAV, OTDS and SFEDA event rate of false alarm;
Fig. 8 is the contrast (adopting second group of data) of FEDAV, OTDS and SFEDA event rate of false alarm;
Fig. 9 is the contrast (adopting first group of data) of FEDAV, OTDS and SFEDA error correction rate;
Figure 10 is the contrast (adopting second group of data) of FEDAV, OTDS and SFEDA error correction rate;
Figure 11 is the contrast (adopting first group of data) of FEDAV, OTDS and SFEDA mistake introducing rate;
Figure 12 is the contrast (adopting second group of data) of FEDAV, OTDS and SFEDA mistake introducing rate;
Figure 13 is the contrast (adopting first group of data) of FEDAV, OTDS and SFEDA information exchange frequency;
Figure 14 is the contrast (adopting second group of data) of FEDAV, OTDS and SFEDA information exchange frequency.
Detailed description of the invention
Below in conjunction with accompanying drawing, the present invention is further described.
Being a kind of fault-tolerant event detecting method based on temporal voting strategy as shown in Figure 1 and Figure 2, the state of definition node is as follows:
Normal: represent node SlocalMonitored area in without event occur, node SlocalDo not break down and mistake;
LF: represent node SlocalIt is likely to occur fault or wrong data, for node SlocalLocal event judge in;
LE: represent node SlocalEvent it is likely to occur, for node S in monitored arealocalLocal event judge in;
Event: represent node SlocalEvent occurs, for node S in monitored arealocalIn ballot decision-making;
Fault: represent node SlocalBreak down event, and can not correct, for node SlocalIn ballot decision-making;
Including the following steps that order performs:
(1) each node obtains the detection data of self;
(2) based on rectangular histogram, detection data are carried out fault-tolerant processing;
(3) based on the dependency of attribute, detection data are carried out local error detection, distinguish LF node and preliminary Normal node;
(4) preliminary Normal node is carried out local event decision-making, distinguish LE node and Normal node;
(5) to LF node and LE node, the credibility of its neighbor node is calculated;
(6) vote based on credibility and distance weighting, it is judged that node is Event node or Normal node.
Concrete, in described step (2), when detection data being carried out fault-tolerant processing based on rectangular histogram, the acquisition methods of data center is as follows:
(21) for data x1,x2,��,xn, according to each data genaration histogram structure, obtain k packet g1,g2,��,gi,��,gk;
(22) size of definition i-th packet | gi| the number of the data comprised in being grouped for i-th, obtain g according to the descending arrangement of the size of each packetk',��,gi',��,g2',g1';
(23) a given mean data coverage m0, each group of data of descending accumulation, until group gr' meet following formula:
&Sigma; i = r k g i &prime; &Sigma; i = 1 k g i &prime; &GreaterEqual; m 0
m0Value is relevant with the signal to noise ratio of data, and signal to noise ratio is more little, m0Value is more little, to filter more noise data; If the generation probability of noise data is p, then m0Should be less than 1-p;
(24) to organize gr',��,gk' the data that comprise, calculate data center
p = &Sigma; i = r k | g i &prime; |
x &OverBar; h = 1 p &Sigma; x j
Hereini=r,r+1,��,k��
Node wrong data and noise data are small probability event. This method filters out small probability data, has both decreased the impact of noise data, considers again more normal data in the calculation.
Concrete, in described step (3), detection data are carried out local error detection by the dependency based on attribute, distinguish LF node and preliminary Normal node, method particularly includes: the initial relevance of two strong correlation attribute X and Y of note node is R0(X, Y), real-time dependency is R (X, Y), for a dependency irrelevance threshold xi, if the intensity of variation of Attribute Correlation meets following formula:
| R ( X , Y ) - R 0 ( X , Y ) R 0 ( X , Y ) | < &xi;
Then thinking that the dependency of X and Y is not changed in, node is preliminary Normal node; Otherwise it is assumed that the dependency of X and Y there occurs change, node is Event node.
If the expected value of E (X), E (Y) respectively two attribute X and Y, the variance that D (X), D (Y) are attribute X and Y, the linear dependence definition of X and Y is as follows:
R ( X , Y ) = E { [ X - E ( X ) ] [ Y - E ( Y ) ] } D ( X ) D ( Y )
For node data, following formula is adopted to carry out approximate calculation:
R ( X , Y ) = &Sigma; ( X - X &OverBar; ) ( Y - Y &OverBar; ) &Sigma; ( X - X &OverBar; ) 2 &times; &Sigma; ( Y - Y &OverBar; ) 2
Consider that node storage space is extremely limited, adopt cumulative mode to calculate the dependency of X and Y:
R ( X , Y ) = &Sigma;XY - &Sigma;X&Sigma;Y n &Sigma;X 2 - ( &Sigma;X ) 2 n &times; &Sigma; Y 2 - ( &Sigma;Y ) 2 n
Concrete, in described step (4), preliminary Normal node is carried out local event decision-making, distinguishes LE node and Normal node, method particularly includes:
If the average value that attribute X is under normal circumstances is Mn, the average value when event occurs is Me, Me>Mn, the threshold value x of definition event generationthFor:
x th = 1 2 ( M n + M e )
Real-time value x for attribute Xi, the binary judgment rule that event occurs is:
B e = 1 x i > x th 0 x i &le; x th
Wherein, Be=1 represents that node is LE node, Be=0 represents that node is Normal node.
The credibility of node, the confidence level of representation node current decision, reflect node current operating state. The concordance that node credibility detects data by node current detection data and history embodies. Concrete, in described step (5), the credibility C of node is calculated by following formula:
C = 1 - | R - R 0 | | R | + | R 0 |
Wherein, R0(X, Y) represents attribute X and the initial relevance of attribute Y, and R (X, Y) represents the real-time dependency of attribute X and attribute Y. C is the closer to 1, it was shown that the dependency between attribute X and Y changes more little as time goes by, and the probability of this one malfunctions is more low, thus the credibility of node is more high; Otherwise, C is the closer to 0, and node credibility is more low.
Concrete, in described step (6), vote based on credibility and distance weighting, it is judged that node is Event node or Normal node, method particularly includes:
(61) definition SlocalFor present node, SiFor SlocalA hop neighbor node, then:
Distance present node SlocalNearer node is more similar to its state, and ballot weight also should be more big, therefore adopts anti-distance weighting rule to vote. Node SiRelative to node SlocalAnti-distance weighting InvDistWeightilFor:
InvDist il = &Sigma; i = 1 k Dis tan ce ( S i , S local ) - Dis tan ce ( S i , S local )
InvDistWeight il = InvDist il &Sigma; i = 1 k InvDist il
Wherein, Distance (Si,Slocal) it is node SiWith node SlocalBetween the Euclidean distance of coordinate;
Node SiTo node SlocalBallot value ViFor:
Vi=Ci��InvDistWeightil
Wherein, C represents the credibility of node;
(62) at present node SlocalAll hop neighbor node SiIn, calculate and there is identical local event result of decision ballot value sum, remember that the ballot value sum that all local decision-makings are LE node is Ve, the ballot value sum that all local decision-makings are Normal node is Vn, calculate VeAnd VnBetween difference degree VdiffFor:
V diff = | V e - V n | | V e + V n |
(64) by VdiffCompare with the event boundaries threshold �� set, according to table 1 decision node SlocalEnd-state.
As node SlocalWhen being positioned at event boundaries region and cause information of neighbor nodes deficiency, it is impossible to node S is corrected in the ballot relying on neighbourslocalError condition. For this situation, according to Tobler First Law, different from the dependency of present node apart from different neighbor nodes, therefore adopt the space interpolation algorithm based on inverse distance weight, by the data estimation node S of neighbor nodelocalDetected value
Wherein, diFor node SiTo node SlocalBetween distance, p is the values of powers of distance;
Then withAs node SlocalReal-time value, adopt the method for step (4) to carry out local event decision-making, and result step (4) distinguished be as node SlocalFinal decision result.
For the node S not having effective neighbor node to votelocal(such as, node SlocalThe local event result of decision of all neighbor nodes be LF), if the end-state processed through ballot is unsettled condition, then node S is setlocalState be Fault.
Below in conjunction with experiment, the present invention is further illustrated.
Experiment have employed two groups of data and algorithm carried out simulation analysis. First group, we adopt the real wireless sensor network data of the offer of Intel's Berkeley laboratory; These real node data have good temporal correlation, have strong correlation between part physical amount, can substantially embody the Detection results of algorithm. But, because the sensor node that this laboratory is disposed only has 54, and in practical application, the deployment density of WSN is very big. For this, we adopt second group of data, simulate the sensor network that 1024 nodes are constituted, better to embody the behavior pattern of algorithm.
First group of data are to be produced by 54 nodes being deployed in Intel's Berkeley laboratory, laboratory be sized to 42m �� 32m, node data collection be spaced apart 31 seconds, the physical quantity of collection includes temperature, relative humidity, illumination, node voltage. There is stronger linear dependence between temperature and relative humidity in physical quantity, therefore, the analysis of Attribute Correlation can be carried out accordingly.
In simulation, we adopt the normal data of some day to process, and noise data and event data adopt the mode of synthesis to add. The probability of happening of noise data and wrong data assumes conformance with standard normal distribution. Event data, by simulating, at certain point A, (x, y) produces an event, and centered by this point, with R for the circle of radius, for event area, the detection data in this region are apparently higher than other regions. Modeling event occur scene as it is shown on figure 3, wherein, the center that node 1 occurs for event, with curve line around region be event area.
Second group of data, we simulate the sensor network that 1024 nodes are constituted, and are distributed in the spatial dimension of 32 �� 32. Adopt a space time correlation model, generate analog data. The data that each node produces include two attributes, and they have strong linear dependence. The analog form of noise data and event data is with first group of data. Fig. 4 is the simulated scenario that an event occurs, and wherein * represents node mistake, represents that node is normal ,+represent that Node Events occurs.
Experiment adopts FEDAV, OTDS(OptimalThresholdDecisionScheme, optimal threshold decision method) and SFEDA(Spatio-temporalbasedFault-tolerantEventDetectionAl gorithm, fault-tolerant incident Detection Algorithm based on temporal correlation) above-mentioned two groups of data carry out fault-tolerant event detection by three kinds of detection methods, and result is such as shown in Fig. 5��14.
Fig. 5, Fig. 6 show when node error probability changes, the contrast situation of the event recognition rate of FEDAV, OTDS and SFEDA algorithm. As seen from the figure, when node error rate is relatively low, the event recognition rate difference of three kinds of algorithms is little. But along with the increase of error rate, the event recognition hydraulic performance decline of OTDS and SFEDA algorithm is quickly; And the detection Performance comparision of FEDAV algorithm is stable. This is because along with the increase of error rate, adopt OTDS and SFEDA algorithm, at the borderline region of event to inside event area, increasing node can not meet the condition of half ballot, thus the generation of event can not effectively be identified.
And that FEDAV algorithm have employed based on Attribute Correlation is fault-tolerant, error node can be distinguished from normal node and event node, be not involved in the ballot to other nodes, thus avoiding the error node impact on ballot; Furthermore, when ballot, it is contemplated that the credibility of node decision-making, make voting results truly reflect the duty of node; Finally, in event boundaries region, FEDAV algorithm depends on the local decision-making of safe node, does not rely on ballot and processes, so on the whole, the event detection Performance comparision of FEDAV algorithm is stable. Just because of SFEDA algorithm is also not entirely dependent on most ballot, so event recognition rate is slightly better than OTDS algorithm.
In Fig. 6, the change ratio of curve is shallower, illustrates along with the increase of node deployment density, the redundancy of space nodes increases, the event detection performance of three kinds of algorithms all becomes more stable, it can be seen that the event detection rate of FEDAV algorithm is still substantially better than OTDS and SFEDA algorithm.
Fig. 7, Fig. 8 show when node error probability changes, the contrast situation of the event rate of false alarm of FEDAV, OTDS and SFEDA algorithm, and Fig. 7 adopts first group of data, and Fig. 8 adopts second group of data to realize. In event area, the decision-making of node meets the condition of most voting mechanism, can effectively identify event node, and rate of false alarm is only small, and therefore, the rate of false alarm of three kinds of algorithms is all relatively low.
But in event boundaries region, OTDS and SFEDA algorithm adopts majority vote rule, it is easy to the ambiguousness of decision-making occurs, because the ballot value of normal node and event node is more or less the same, is unsatisfactory for the condition that majority is voted. And FEDAV algorithm does not adopt majority to vote, the present node that credibility is higher, rely on the judged result of self; For the boundary node already at error condition, according to the data estimation measured value of neighbor node, then carry out event detection. So, just decrease the generation of erroneous judgement, reduce rate of false alarm.
Fig. 9 and Figure 10 shows when node error probability changes, the contrast of FEDAV, OTDS and SFEDA algorithmic error adjusted rate. It can be seen that for error correction rate, the error correction rate of FEDAV algorithm is more stable, even if error rate increases, still maintain good fault freedom. This is due to the fault-tolerant processing based on Attribute Correlation, decreases the impact of error node; And in voting process, it is contemplated that the credibility of node decision-making, so, in ballot, the node that majority is with a high credibility determine the result of ballot, can correctly detect node mistake and carry out error correction. And OTDS and SFEDA algorithm determines the state of present node according only to the vote state of node of majority, fault freedom Shortcomings, increase along with error rate, there is mistake in more neighbor node, thus determined the result of decision of present node by the node of mistake, cause the mistake that can not repair local decision-making.
Figure 10 strengthens the performance comparison result of FEDAV algorithm and OTDS, SFEDA algorithm, also illustrate that the deployment density increasing node, it is possible to make the fault freedom of algorithm become stable.
The new mistake that mistake introducing rate and algorithm introduce, Figure 11 and Figure 12 is the contrast of the mistake introducing rate of FEDAV algorithm and OTDS, SFEDA algorithm.
For the algorithm based on temporal voting strategy, the introducing of new mistake occurs mainly in event boundaries region, because spatial redundancy information is not enough, is unsatisfactory for most voting mechanism. And FEDAV algorithm is in event boundaries region, ballot is not adopted to process: if node state is credible, it does not have make a mistake, then using the local event decision-making state of node as final detection result; If node state is LF, then carry out local decision-making by the estimated value that neighbor data calculates. So, so that it may avoid introducing new mistake.
And OTDS algorithm, in whole network, adopt temporal voting strategy, therefore mistake introducing rate is higher. And SFEDA algorithm is only when detecting data significant change, ballot is adopted to process; In other situations, depend on the local decision-making of node, so mistake introducing rate is lower than OTDS algorithm.
In Figure 11, when node error probability is relatively low, mistake introducing rate is also significantly high, being because first group of data, node density is less, and therefore spatial redundancy information is not enough, mistake introducing rate now is not caused by node mistake, and it is because the voting results to event boundaries node, there is ambiguousness, it is easy to produce new mistake.And the node density of Figure 12 is relatively big, embody the duty in practical application, therefore, mistake introducing rate coincidence theory value.
Owing to sensor node calculates the energy that the energy consumed to consume much smaller than communication, therefore, we represent the energy expenditure of node by the traffic of node. Consider that FEDAV, SFEDA and OTDS algorithm is all based on the space voting mechanism of the node result of decision, between node, the data of exchange mostly are decision data, therefore, for ease of analyzing, we adopt information exchange times to represent the energy expenditure of algorithm, and the exchange of each information includes sending solicited message to a neighbor node and accepting the feedback information of this neighbor node. And then, our definition information exchange frequency, it is the information exchange times by algorithm, is removed by the information exchange times of OTDS algorithm and obtain.
When Figure 13, Figure 14 sets forth two groups of data of employing, the energy expenditure contrast situation of FEDAV, SFEDA and OTDS algorithm. As seen from the figure, the energy expenditure of OTDS algorithm is the highest, because no matter node is normal condition or abnormality, is required for the ballot decision-making of neighbor node, therefore, needs frequent exchange data between node, and energy expenditure is very big. And SFEDA algorithm is only when data generation significant change, just carrying out ballot process, accordingly, it is capable to consume less, and the frequency of its information exchange is relevant with the probability of data generation significant change.
And FEDAV algorithm is because only when Node Events and node mistake, just needing node collaborative process, therefore information exchange frequency is less. But along with the rising of node error rate, the increased frequency of node cooperation, so information exchange frequency also raises. By scheming, when node error probability is relatively low, the energy expenditure of FEDAV algorithm is less; And node error probability higher time, the energy consumption of SFEDA algorithm is less.
Through experiment above, it can be deduced that FEDAV algorithm is all substantially better than OTDS algorithm and SFEDA algorithm in event detection effect, fault-tolerant processing effect and energy expenditure three, and this also demonstrates the analysis result of comparator algorithm.
The above is only the preferred embodiment of the present invention; it is noted that, for those skilled in the art; under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, these improvements and modifications also should be regarded as protection scope of the present invention.

Claims (3)

1. based on the fault-tolerant event detecting method of temporal voting strategy, it is characterised in that:
The state of definition node is as follows:
Normal: represent node SlocalMonitored area in without event occur, node SlocalDo not break down and mistake;
LF: represent node SlocalIt is likely to occur fault or wrong data, for node SlocalLocal event judge in;
LE: represent node SlocalEvent it is likely to occur, for node S in monitored arealocalLocal event judge in;
Event: represent node SlocalEvent occurs, for node S in monitored arealocalIn ballot decision-making;
Fault: represent node SlocalBreak down event, and can not correct, for node SlocalIn ballot decision-making;
Including the following steps that order performs:
(1) each node obtains the detection data of self;
(2) based on rectangular histogram, detection data are carried out fault-tolerant processing; When detection data being carried out fault-tolerant processing based on rectangular histogram, the acquisition methods of data center is as follows:
(21) for data x1,x2,��,xn, according to each data genaration histogram structure, obtain k packet g1,g2,��,gi,��,gk;
(22) size of definition i-th packet | gi| the number of the data comprised in being grouped for i-th, obtain g according to the descending arrangement of the size of each packetk',��,gi',��,g2',g1';
(23) a given mean data coverage m0, each group of data of descending accumulation, until group gr' meet following formula:
&Sigma; i = r k g i &prime; &Sigma; i = 1 k g i &prime; &GreaterEqual; m 0
(24) to organize gr',��,gk' the data that comprise, calculate data center
p = &Sigma; i = r k | g i &prime; |
x &OverBar; h = 1 p &Sigma;x j
X hereinj��g��i, i=r, r+1 ..., k;
(3) based on the dependency of attribute, detection data are carried out local error detection, distinguish LF node and preliminary Normal node; Method particularly includes: the initial relevance of two strong correlation attribute X and Y of note node is R0(X, Y), real-time dependency is R (X, Y), for a dependency irrelevance threshold xi, if the intensity of variation of Attribute Correlation meets following formula:
| R ( X , Y ) - R 0 ( X , Y ) R 0 ( X , Y ) | < &xi;
Then thinking that the dependency of X and Y is not changed in, node is preliminary Normal node; Otherwise it is assumed that the dependency of X and Y there occurs change, node is Event node;
(4) preliminary Normal node is carried out local event decision-making, distinguish LE node and Normal node; Method particularly includes:
If the average value that attribute X is under normal circumstances is Mn, the average value when event occurs is Me, Me>Mn, the threshold value x of definition event generationthFor:
x t h = 1 2 ( M n + M e )
Real-time value x for attribute Xi, the binary judgment rule that event occurs is:
B e = 1 x i > x t h 0 x i &le; x t h
Wherein, Be=1 represents that node is LE node, Be=0 represents that node is Normal node;
(5) to LF node and LE node, the credibility of its neighbor node is calculated; The credibility C of node is calculated by following formula:
C = 1 - | R - R 0 | | R | + | R 0 |
Wherein, R0(X, Y) represents attribute X and the initial relevance of attribute Y, and R (X, Y) represents the real-time dependency of attribute X and attribute Y;
(6) vote based on credibility and distance weighting, it is judged that node is Event node or Normal node; Method particularly includes:
(61) definition SlocalFor present node, SiFor SlocalA hop neighbor node, then:
Node SiRelative to node SlocalAnti-distance weighting InvDistWeightilFor:
InvDist i 1 = &Sigma; i = 1 k D i s tan c e ( S i , S l o c a l ) - D i s tan c e ( S i , S l o c a l )
InvDistWeight i 1 = InvDist i 1 &Sigma; i = 1 k InvDist i 1
Wherein, Distance (Si,Slocal) it is node SiWith node SlocalBetween the Euclidean distance of coordinate;
Node SiTo node SlocalBallot value ViFor:
Vi=Ci��InvDistWeightil
Wherein, C represents the credibility of node;
(62) at present node SlocalAll hop neighbor node SiIn, calculate and there is identical local event result of decision ballot value sum, remember that the ballot value sum that all local decision-makings are LE node is Ve, the ballot value sum that all local decision-makings are Normal node is Vn, calculate VeAnd VnBetween difference degree VdiffFor:
V d i f f = | V e - V n | | V e + V n |
(64) by VdiffCompare with the event boundaries threshold �� set:
If Vn> 0 and Ve=0, then judge that LE node is Normal node, LF node is Normal node;
If Vn-Ve> ��, then judging that LE node is Event node, LF node is Normal node;
If Vdiff< ��, then judge that LE node is Event node, and LF node state is indefinite;
If Ve-Vn> ��, then judging that LE node is Event node, LF node is Event node;
If Vn=0 and Ve> 0, then judging that LE node is Event node, LF node is Event node.
2. the fault-tolerant event detecting method based on temporal voting strategy according to claim 1, it is characterised in that: as node SlocalThe redundancy of neighbor node not enough, it is impossible to node S is corrected in the ballot relying on neighbourslocalError condition time, first pass through the data estimation node S of neighbor nodelocalDetected value
Wherein, diFor node SiTo node SlocalBetween distance, p is the values of powers of distance;
Then withAs node SlocalReal-time value, adopt the method for step (4) to carry out local event decision-making, and result step (4) distinguished be as node SlocalFinal decision result.
3. the fault-tolerant event detecting method based on temporal voting strategy according to claim 1, it is characterised in that: for the node S not having effective neighbor node to votelocalIf the end-state processed through ballot is unsettled condition, then arrange node SlocalState be Fault.
CN201310552747.3A 2013-11-07 2013-11-07 Fault-tolerant event detecting method based on temporal voting strategy Expired - Fee Related CN103533571B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310552747.3A CN103533571B (en) 2013-11-07 2013-11-07 Fault-tolerant event detecting method based on temporal voting strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310552747.3A CN103533571B (en) 2013-11-07 2013-11-07 Fault-tolerant event detecting method based on temporal voting strategy

Publications (2)

Publication Number Publication Date
CN103533571A CN103533571A (en) 2014-01-22
CN103533571B true CN103533571B (en) 2016-06-08

Family

ID=49935162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310552747.3A Expired - Fee Related CN103533571B (en) 2013-11-07 2013-11-07 Fault-tolerant event detecting method based on temporal voting strategy

Country Status (1)

Country Link
CN (1) CN103533571B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939524B (en) * 2016-06-21 2019-08-16 南京大学 A kind of wireless sensor network node event real-time predicting method
CN107945027A (en) * 2017-11-14 2018-04-20 北京欧链科技有限公司 The processing method and system of Claims Resolution event based on block chain
CN108170701A (en) * 2017-11-14 2018-06-15 北京欧链科技有限公司 The information processing method and device of block chain
CN108038786A (en) * 2017-11-14 2018-05-15 北京欧链科技有限公司 The processing method and system of Claims Resolution event based on block chain
CN108924786B (en) * 2018-08-13 2021-03-16 中山大学南方学院 Wireless sensor network data acquisition method facing environmental emergency
CN109285263B (en) * 2018-10-17 2020-10-13 重庆扬升信息技术有限公司 Big data-based paperless conference voting prediction method
US11385632B2 (en) * 2018-12-21 2022-07-12 The Boeing Company Sensor fault detection and identification using residual failure pattern recognition
CN109814113B (en) * 2019-01-15 2022-02-25 北京百度网讯科技有限公司 Ultrasonic radar obstacle detection result processing method and system
CN114484732B (en) * 2022-01-14 2023-06-02 南京信息工程大学 Air conditioning unit sensor fault diagnosis method based on voting network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102612065A (en) * 2012-03-19 2012-07-25 中国地质大学(武汉) Quick fault-tolerance detection method for monitoring abnormal event by wireless sensor network
CN103200597A (en) * 2013-04-19 2013-07-10 山东大学 Wireless sensor network-oriented fault-tolerance event boundary detection method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102612065A (en) * 2012-03-19 2012-07-25 中国地质大学(武汉) Quick fault-tolerance detection method for monitoring abnormal event by wireless sensor network
CN103200597A (en) * 2013-04-19 2013-07-10 山东大学 Wireless sensor network-oriented fault-tolerance event boundary detection method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
On-Line Sensor Fault Detection Based on Majority Voting in Wireless Sensor Networks;Jeng-Yang Wu 等;《Workshop on Combinatorial Mathematics and Computation Theory》;20071231;第292-297页 *
无线传感器网络故障检测与事件检测的研究;耿卫建;《中国优秀硕士学位论文全文数据库信息科技辑》;20130615(第6期);全文 *

Also Published As

Publication number Publication date
CN103533571A (en) 2014-01-22

Similar Documents

Publication Publication Date Title
CN103533571B (en) Fault-tolerant event detecting method based on temporal voting strategy
Fawzy et al. Outliers detection and classification in wireless sensor networks
Alsheikh et al. Machine learning in wireless sensor networks: Algorithms, strategies, and applications
CN105764162A (en) Wireless sensor network abnormal event detecting method based on multi-attribute correlation
Bahrepour et al. Use of wireless sensor networks for distributed event detection in disaster management applications
Wang et al. An isolation-based distributed outlier detection framework using nearest neighbor ensembles for wireless sensor networks
CN102752784B (en) Detection method of distribution type event domain based on graph theory in wireless sensor network
CN103338451B (en) Distributed malicious node detection method in a kind of wireless sensor network
CN102594904A (en) Method for detecting abnormal events of wireless sensor network in distributed way
CN112512003B (en) Dynamic trust model based on long-time and short-time memory network in underwater acoustic sensor network
Ayadi et al. Spatio-temporal correlations for damages identification and localization in water pipeline systems based on WSNs
Fu et al. Lightweight fault detection strategy for wireless sensor networks based on trend correlation
CN103973697A (en) Intrusion detecting method of internet-of-things sensing layer
CN106303901B (en) A kind of authentic data in wireless sense network based on collaborative filtering merges optimization method
Zhang et al. Anomaly detection approach for urban sensing based on credibility and time-series analysis optimization model
Feng et al. Weighted distributed fault detection for wireless sensor networks Based on the distance
Dinc et al. Smart home security with the use of wsns on future intelligent cities
Wang et al. Abnormal event detection in wireless sensor networks based on multiattribute correlation
CN104809205B (en) A kind of online network of waterways space-time accident detection method
Li et al. [Retracted] Abnormal Data Detection in Sensor Networks Based on DNN Algorithm and Cluster Analysis
CN104080108B (en) A kind of variable thresholding abnormal point detecting method for radio sensing network data
Zhang et al. Fault diagnosis in clustering WSN based on neighbor cooperation
Sung et al. Enhance the efficient of WSN data fusion by neural networks training process
Zhang et al. Unspecific event detection in wireless sensor networks
De Paola et al. Predictive models for energy saving in wireless sensor networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160608

Termination date: 20191107