%%{init: {'theme': 'base', 'themeVariables': {'primaryColor': '#2C3E50', 'primaryTextColor': '#ffffff', 'primaryBorderColor': '#16A085', 'lineColor': '#7F8C8D', 'secondaryColor': '#16A085', 'tertiaryColor': '#E67E22', 'fontFamily': 'Arial', 'fontSize': '14px'}}}%%
flowchart TD
A["Observed Node Anomaly"] --> B{"Can node<br/>communicate?"}
B -- "No" --> C{"Hardware<br/>intact?"}
C -- "No" --> D["FAILED NODE<br/>Replace hardware"]
C -- "Yes, environmental<br/>interference" --> E["DUMB NODE<br/>Wait for recovery<br/>or reposition"]
B -- "Yes" --> F{"Are sensor<br/>readings accurate?"}
F -- "No, readings<br/>deviate >10%" --> G["BADLY FAILED<br/>Recalibrate or<br/>replace sensor"]
F -- "Yes" --> H{"Does node forward<br/>others' packets?"}
H -- "Yes, normal<br/>forwarding" --> I["NORMAL NODE<br/>No action needed"]
H -- "Selective dropping<br/>based on cost" --> J["SELFISH NODE<br/>Apply incentive<br/>mechanisms"]
H -- "Strategic dropping<br/>or modification" --> K{"Coordinated<br/>attack pattern?"}
K -- "Yes" --> L["MALICIOUS NODE<br/>Isolate and<br/>trigger IDS alert"]
K -- "No clear<br/>pattern" --> M["SUSPECT NODE<br/>Monitor with<br/>multi-metric audit"]
style A fill:#2C3E50,stroke:#16A085,color:#ffffff
style D fill:#E67E22,stroke:#2C3E50,color:#ffffff
style E fill:#E67E22,stroke:#2C3E50,color:#ffffff
style G fill:#E67E22,stroke:#2C3E50,color:#ffffff
style I fill:#16A085,stroke:#2C3E50,color:#ffffff
style J fill:#E67E22,stroke:#2C3E50,color:#ffffff
style L fill:#c0392b,stroke:#2C3E50,color:#ffffff
style M fill:#7F8C8D,stroke:#2C3E50,color:#ffffff
13 Sensor Behaviors Quiz
13.1 Learning Objectives
By the end of this chapter, you will be able to:
- Classify Node Behaviors: Accurately identify failed, badly failed, dumb, selfish, and malicious nodes from described behaviors using systematic decision criteria
- Apply Diagnostic Reasoning: Use systematic decision trees to classify observed sensor node anomalies in production WSN deployments
- Evaluate Trade-offs: Quantify the energy-latency-reliability trade-offs in WSN design decisions using duty cycle calculations and information-theoretic metrics
- Analyze Reputation Systems: Identify vulnerabilities in single-metric trust management and design multi-dimensional countermeasures combining forwarding reputation with energy auditing
- Compare Protocol Layers: Distinguish MAC layer vs routing layer responsibilities for energy management, mapping idle listening (65% energy) to MAC and hotspot formation to routing
- Assess Social Sensing Applicability: Determine when social media integration benefits WSN duty cycle management based on event type, observability, and advance notice criteria
- Node classification requires cross-checking 3 dimensions: sensing capability (working/faulty), communication status (transmitting/silent), and cooperation pattern (forwarding others’ packets vs dropping them) – a node that senses correctly but drops forwarded packets is selfish, not failed
- MAC layer controls 65% of WSN energy budget: idle listening dominates energy consumption; duty-cycle MACs (S-MAC, B-MAC) reduce idle listening from continuous to below 5%, while TDMA MACs eliminate the 18% collision overhead during peak periods
- Single-metric reputation systems are trivially gameable: a selfish node maintaining forwarding rate just above the 0.5 threshold still drops 40% of packets; combining forwarding reputation with energy consumption auditing creates cross-validation where high claimed forwarding + low measured energy consumption exposes gaming
- InTSeM transmission reduction scales with data predictability: stable environments achieve 80-90% reduction (Information = -log2(0.9) = 0.15 bits per reading), periodic patterns achieve 60-70%, and highly variable conditions yield only 10-20% reduction
Sammy the Sound Sensor gathered the team for a mystery game. “Someone in our sensor network is not doing their job – let’s figure out who!”
Lila the Light Sensor pointed at the first suspect: “Node 7 has been completely silent for three days. No readings, no messages, nothing.” Sammy nodded, “That’s a failed node – like a phone with a dead battery. It can’t do anything at all.”
Max the Motion Sensor spotted another clue: “Node 12 is sending temperature readings, but they say it’s 50 degrees outside when everyone else says 25!” Bella the Bio Sensor laughed, “That’s a badly failed node – it’s like someone wearing foggy glasses. It tries to help but gives wrong answers because its sensor is broken.”
Then Max noticed something sneaky: “Node 15 always sends its own readings perfectly, but when we ask it to pass along our messages to the base station, it just… doesn’t.” Sammy’s eyes widened: “That’s a selfish node! It’s like someone at lunch who eats their own food but refuses to pass the ketchup. Its hardware works fine – it just won’t share!”
Bella found the trickiest case: “Node 20 sometimes forwards messages, sometimes doesn’t, and the messages it does send look… changed.” Lila shivered. “That’s a malicious node – like a spy! It’s not lazy or broken, it’s actively trying to cause trouble.”
“So remember,” Sammy summarized, “Silent = failed, Wrong answers = badly failed, Won’t share = selfish, and Causes trouble on purpose = malicious. Knowing which is which helps us fix the right problem!”
What is this chapter? A collection of self-assessment questions to test and reinforce your understanding of sensor node behaviors and WSN design principles.
How to approach the questions: 1. Read each scenario carefully before looking at answer choices 2. Think through your reasoning before checking the answer 3. Review explanations even for questions you answered correctly 4. Note any concepts that surprised you for further study
Types of questions: - Understanding Checks: Open-ended scenarios requiring analysis - Auto-Gradable MCQs: Multiple choice with immediate feedback - Interactive Quiz: Detailed questions with comprehensive explanations
Recommended approach: 1. Complete all Understanding Checks first 2. Take the Auto-Gradable Quick Check 3. Work through Interactive Quiz questions 4. Review any topics where you struggled
Before attempting these knowledge checks, you should have studied:
- Mine Safety Monitoring Case Study - WSN application and node behavior classification framework
- Node Behavior Taxonomy - Detailed behavior definitions and detection methods
- WSN Overview and Fundamentals - Network architecture and protocol basics
13.2 Node Behavior Classification Decision Tree
Use the following decision tree to systematically classify sensor node behaviors. Each branch tests a specific observable characteristic, leading to a definitive classification with an appropriate remediation strategy.
13.3 Knowledge Check: Understanding Checks
Test your understanding of sensor node behaviors and WSN design principles with these scenario-based questions.
13.4 Auto-Gradable Quick Check
Test your knowledge with these multiple-choice questions that provide immediate feedback.
13.5 Interactive Quiz
Work through these detailed questions to deepen your understanding of sensor node behaviors and WSN design decisions.
Assuming all packet drops indicate malicious nodes: This is the most costly misclassification error. A node dropping packets could be failed (dead hardware), dumb (environmental interference), selfish (conserving energy), or malicious (attacking). Each requires a completely different remediation – replacing hardware vs waiting for recovery vs applying incentive mechanisms vs triggering incident response. Always check sensing capability and communication status before concluding malice.
Treating reputation threshold as a fixed security boundary: Setting a fixed reputation threshold (e.g., 0.5) and trusting it creates a trivially gameable system. A selfish node that discovers the threshold simply maintains its reputation at 0.6 while still dropping 40% of forwarded packets. Multi-metric cross-validation (forwarding rate + energy consumption + neighbor reports) is required because a node cannot simultaneously fake low energy use and high forwarding behavior.
Confusing MAC layer and routing layer energy responsibilities: Students frequently attribute all WSN energy problems to routing. In reality, idle listening (a MAC layer issue) consumes approximately 65% of total energy in a typical WSN, while routing hotspots account for localized but severe battery drain. Implementing duty-cycle MAC (S-MAC, B-MAC) addresses the 65% idle listening waste; implementing energy-aware routing (RPL with ETX) addresses the hotspot distribution problem. Both layers must be optimized together.
Overestimating InTSeM efficiency for variable data: InTSeM achieves 80-90% transmission reduction only when data is highly predictable (stable environments like indoor temperature). For highly variable conditions (outdoor weather, vibration monitoring), reduction drops to 10-20% because most readings carry high information content (-log2 of low probability yields high bits). Choosing InTSeM for a high-variability deployment provides negligible energy savings while adding computational overhead for probability estimation.
Applying social sensing to all WSN scenarios: Social sensing for duty cycle management is a niche optimization that works only when events are rare, human-observable, publicly discussed on social media, and have hours-to-days advance notice. Using it for continuous processes (temperature gradients), microscopic phenomena (chemical reactions), or random events (lightning) yields zero benefit because these events generate no correlated social media activity.
13.6 Summary
This chapter tested your understanding of sensor node behaviors through various question formats:
Node Classification Skills: Distinguishing between failed, badly failed, dumb, selfish, and malicious behaviors requires systematic analysis of sensing capability, communication status, data accuracy, and cooperation patterns.
Environmental vs Intentional Failures: Dumb nodes (environmental communication failure) differ fundamentally from failed nodes (hardware death) and selfish nodes (intentional non-cooperation) - correct diagnosis prevents costly misremediations.
Protocol Layer Responsibilities: MAC layer controls idle listening and collision management (65% of typical WSN energy), while routing layer controls traffic distribution and hotspot formation.
Information-Theoretic Efficiency: InTSeM achieves maximum transmission reduction (80-90%) in stable environments where readings are highly predictable, moderate reduction (60-70%) for periodic patterns, and minimal reduction for highly variable conditions.
Social Sensing Applicability: Social media integration benefits duty cycle management only for rare, human-observable, publicly-discussed events with advance notice - not continuous processes or random events.
Multi-Dimensional Trust Management: Single-metric reputation systems are gameable; combining forwarding reputation with energy consumption auditing creates cross-validation that catches clever selfish nodes.
13.7 What’s Next
Continue to the implementation chapter to see a complete Python reputation-based trust management system in action.
Continue to Sensor Behaviors: Trust Implementation ->
Application Context: - Mine Safety Monitoring - WSN application case study - Node Behavior Taxonomy - Detailed behavior definitions
Implementation: - Trust Implementation - Python reputation system code - Production and Review - Deployment strategies
Protocol Details: - MAC Protocols - Duty cycling and collision management - Routing Protocols - Energy-aware routing