Skip to main content
Erschienen in: Wireless Networks 1/2017

16.12.2015

Fault detection and recovery scheme for routing and lifetime enhancement in WSN

verfasst von: M. Yuvaraja, M. Sabrigiriraj

Erschienen in: Wireless Networks | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In WSNs, failures are unavoidable due to the inhospitable environment and unattended deployment. The node failure leads to disconnection from the network and causes network partitioning. We propose to develop a fault detection and recovery scheme where the sink generates an agent packet and the Agent forms a query path towards the dead or faulty node. Here, sink periodically broadcasts the Agent packet to all its neighbor nodes. The receiving node randomly makes a decision as whether to forward the packet or not thereby detecting the dead or faulty nodes. After detecting a node failure or dead node, the connectivity is restored using Least-Disruptive Topology Repair (LeDiR) without extending the length of the shortest path among nodes compared to the pre failure topology. LeDiR replaces the faulty node with block movement.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, C. F., Shih, J. D., Pan, B. H., & Wu, T. Y. (2014). A network lifetime enhancement method for sink relocation and its analysis in wireless sensor networks. IEEE Sensors Journal, 14(6), 1932–1943.CrossRef Wang, C. F., Shih, J. D., Pan, B. H., & Wu, T. Y. (2014). A network lifetime enhancement method for sink relocation and its analysis in wireless sensor networks. IEEE Sensors Journal, 14(6), 1932–1943.CrossRef
2.
Zurück zum Zitat Wang, H., Zhang, X., & Khokhar, A. (2007). Efficient “void” handling in contention-based geographic routing for wireless sensor networks. In IEEE global telecommunications conference GLOBECOM. Wang, H., Zhang, X., & Khokhar, A. (2007). Efficient “void” handling in contention-based geographic routing for wireless sensor networks. In IEEE global telecommunications conference GLOBECOM.
3.
Zurück zum Zitat Han, K., et al. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107–113.CrossRef Han, K., et al. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107–113.CrossRef
4.
Zurück zum Zitat Yao, Y., et al. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In MASS (pp. 182–190). Yao, Y., et al. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In MASS (pp. 182–190).
5.
Zurück zum Zitat Sheng, Z., et al. (2013). A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities. Wireless Communications, IEEE., 20(6), 91–98.CrossRef Sheng, Z., et al. (2013). A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities. Wireless Communications, IEEE., 20(6), 91–98.CrossRef
6.
Zurück zum Zitat Zhang, K., Wang, C., & Wang, C. (2008). A secure routing protocol for cluster-based wireless sensor networks using group key management. In 4th International conference on wireless communications, networking and mobile computing, WiCOM. Zhang, K., Wang, C., & Wang, C. (2008). A secure routing protocol for cluster-based wireless sensor networks using group key management. In 4th International conference on wireless communications, networking and mobile computing, WiCOM.
7.
Zurück zum Zitat Kang, K. D., Liu, K., & Abu-Ghazaleh, N. (2006). Securing geographic routing in wireless sensor networks. In 9th Annual cyber security conference on information assurance. Kang, K. D., Liu, K., & Abu-Ghazaleh, N. (2006). Securing geographic routing in wireless sensor networks. In 9th Annual cyber security conference on information assurance.
8.
Zurück zum Zitat Yu, P., Jia, S., & Xi-yuan, P. (2011). A self detection technique in fault management in WSN. In IEEE instrumentation and measurement technology conference (I2MTC). Yu, P., Jia, S., & Xi-yuan, P. (2011). A self detection technique in fault management in WSN. In IEEE instrumentation and measurement technology conference (I2MTC).
9.
Zurück zum Zitat Wei, L., et al. (2010). SecCloud: Bridging secure storage and computation in cloud. In ICDCS Workshops (pp. 52–61). Wei, L., et al. (2010). SecCloud: Bridging secure storage and computation in cloud. In ICDCS Workshops (pp. 52–61).
10.
Zurück zum Zitat Yan, Z., et al. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef Yan, Z., et al. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef
11.
Zurück zum Zitat Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef
12.
Zurück zum Zitat Zhang, Z., et al. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.CrossRef Zhang, Z., et al. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.CrossRef
13.
Zurück zum Zitat Zhang, Y., et al. (2013). A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimedia tools and applications, 67(1), 97–117.CrossRef Zhang, Y., et al. (2013). A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimedia tools and applications, 67(1), 97–117.CrossRef
14.
Zurück zum Zitat Xu, X., et al. (2015). Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN)., 11(3), 45.MathSciNetCrossRef Xu, X., et al. (2015). Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN)., 11(3), 45.MathSciNetCrossRef
15.
Zurück zum Zitat Xiang, L., et al. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In SECON (pp. 46–54). Xiang, L., et al. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In SECON (pp. 46–54).
16.
Zurück zum Zitat Campana, T., & O’Hare, G. M. (2013). Intellectus: multi-hop fault detection methodology. In International conference on selected topics in mobile and wireless networking (MoWNeT). Campana, T., & O’Hare, G. M. (2013). Intellectus: multi-hop fault detection methodology. In International conference on selected topics in mobile and wireless networking (MoWNeT).
17.
Zurück zum Zitat Liu, X.-Y., et al. (2015). CDC: Compressive data collection for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2188–2197.CrossRef Liu, X.-Y., et al. (2015). CDC: Compressive data collection for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2188–2197.CrossRef
18.
Zurück zum Zitat Fadlullah, Z. M., et al. (2010). DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18(4), 1234–1247.CrossRef Fadlullah, Z. M., et al. (2010). DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18(4), 1234–1247.CrossRef
19.
Zurück zum Zitat Abu Alsheikh, M., Lin, S., Niyato, D., & Tan, H. P. (2014). Machine learning in wireless sensor networks: Algorithms, strategies, and applications. Communications Surveys and Tutorials, IEEE, 16(4), 1996–2018.CrossRef Abu Alsheikh, M., Lin, S., Niyato, D., & Tan, H. P. (2014). Machine learning in wireless sensor networks: Algorithms, strategies, and applications. Communications Surveys and Tutorials, IEEE, 16(4), 1996–2018.CrossRef
20.
Zurück zum Zitat He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef
21.
Zurück zum Zitat Xiao, Y., et al. (2012). Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Transactions on Mobile Computing, 11(10), 1538–1554.CrossRef Xiao, Y., et al. (2012). Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Transactions on Mobile Computing, 11(10), 1538–1554.CrossRef
22.
Zurück zum Zitat Wei, G., et al. (2011). Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman filter. Computer Communications, 34(6), 793–802.CrossRef Wei, G., et al. (2011). Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman filter. Computer Communications, 34(6), 793–802.CrossRef
23.
Zurück zum Zitat Wei, L., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef Wei, L., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef
24.
Zurück zum Zitat Rehena, Z., Mukherjee, R., Roy, S., & Mukherjee, N. (2014). Detection of node failure in wireless sensor networks. Applications and innovations in mobile computing (AIMoC). Rehena, Z., Mukherjee, R., Roy, S., & Mukherjee, N. (2014). Detection of node failure in wireless sensor networks. Applications and innovations in mobile computing (AIMoC).
25.
Zurück zum Zitat He, Daojing, et al. (2012). A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1164–1175.CrossRef He, Daojing, et al. (2012). A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1164–1175.CrossRef
26.
Zurück zum Zitat Yang, Haomin, et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, Haomin, et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
27.
Zurück zum Zitat Yan, Z., et al. (XXXX). A security and trust framework for virtualized networks and software‐defined networking. In Security and communication networks. Yan, Z., et al. (XXXX). A security and trust framework for virtualized networks and software‐defined networking. In Security and communication networks.
28.
Zurück zum Zitat Yin, X., et al. (XXXX). Keep all mobile users′ whereabouts secure: A radio frequency identification protocol anti‐tracking. In 5G international journal of communication systems. Yin, X., et al. (XXXX). Keep all mobile users′ whereabouts secure: A radio frequency identification protocol anti‐tracking. In 5G international journal of communication systems.
29.
Zurück zum Zitat Abbasi, A. A., Younis, M. F., & Baroudi, U. A. (2013). Recovering from a node failure in wireless sensor-actor networks with minimal topology changes. IEEE Transactions on Vehicular Technology, 62(1), 256–271.CrossRef Abbasi, A. A., Younis, M. F., & Baroudi, U. A. (2013). Recovering from a node failure in wireless sensor-actor networks with minimal topology changes. IEEE Transactions on Vehicular Technology, 62(1), 256–271.CrossRef
31.
Zurück zum Zitat Afsar, M. M. (2014). Maximizing the reliability of clustered sensor networks by a fault-tolerant service. In IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). Afsar, M. M. (2014). Maximizing the reliability of clustered sensor networks by a fault-tolerant service. In IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).
32.
Zurück zum Zitat Szczytowski, P., Khelil, A., & Suri, N. (2012). DKM: Distributed k-connectivity maintenance in wireless sensor networks. In 9th Annual conference on wireless on-demand network systems and services (WONS). Szczytowski, P., Khelil, A., & Suri, N. (2012). DKM: Distributed k-connectivity maintenance in wireless sensor networks. In 9th Annual conference on wireless on-demand network systems and services (WONS).
33.
Zurück zum Zitat Da Silva, R. I., Macedo, D. F., & Nogueira, J. M. S. (2012). Fault tolerance in spatial query processing for wireless sensor networks. In IEEE Network Operations and Management Symposium (NOMS). Da Silva, R. I., Macedo, D. F., & Nogueira, J. M. S. (2012). Fault tolerance in spatial query processing for wireless sensor networks. In IEEE Network Operations and Management Symposium (NOMS).
34.
Zurück zum Zitat Lee, S., & Younis, M. (2010). Recovery from multiple simultaneous failures in wireless sensor networks using minimum Steiner tree. Journal of Parallel and Distributed Computing, 70(5), 525–536.CrossRefMATH Lee, S., & Younis, M. (2010). Recovery from multiple simultaneous failures in wireless sensor networks using minimum Steiner tree. Journal of Parallel and Distributed Computing, 70(5), 525–536.CrossRefMATH
35.
Zurück zum Zitat Guan, Z., Gao, Z., Yang, Y., Li, Y., & Qiu, X. (2010). A distributed fault recovery method in clustering-based wireless sensor networks. In Proceedings of AIAI2010 (pp. 269–273). Guan, Z., Gao, Z., Yang, Y., Li, Y., & Qiu, X. (2010). A distributed fault recovery method in clustering-based wireless sensor networks. In Proceedings of AIAI2010 (pp. 269–273).
36.
Zurück zum Zitat Senel, F., Younis, M. F., & Akkaya, K. (2011). Bio-inspired relay node placement heuristics for repairing damaged wireless sensor networks. IEEE Transactions on Vehicular Technology, 60(4), 1835–1848.CrossRef Senel, F., Younis, M. F., & Akkaya, K. (2011). Bio-inspired relay node placement heuristics for repairing damaged wireless sensor networks. IEEE Transactions on Vehicular Technology, 60(4), 1835–1848.CrossRef
37.
Zurück zum Zitat Akkaya, K., Senel, F., Thimmapuram, A., & Uludag, S. (2010). Distributed recovery from network partitioning in movable sensor/actor networks via controlled mobility. IEEE Transactions on Computers, 59(2), 258–271.MathSciNetCrossRef Akkaya, K., Senel, F., Thimmapuram, A., & Uludag, S. (2010). Distributed recovery from network partitioning in movable sensor/actor networks via controlled mobility. IEEE Transactions on Computers, 59(2), 258–271.MathSciNetCrossRef
38.
Zurück zum Zitat Han, X., Cao, X., Lloyd, E. L., & Shen, C. C. (2010). Fault-tolerant relay node placement in heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 9(5), 643–656.CrossRef Han, X., Cao, X., Lloyd, E. L., & Shen, C. C. (2010). Fault-tolerant relay node placement in heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 9(5), 643–656.CrossRef
Metadaten
Titel
Fault detection and recovery scheme for routing and lifetime enhancement in WSN
verfasst von
M. Yuvaraja
M. Sabrigiriraj
Publikationsdatum
16.12.2015
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 1/2017
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-1141-7

Weitere Artikel der Ausgabe 1/2017

Wireless Networks 1/2017 Zur Ausgabe

Neuer Inhalt