SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep – Oct 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 22
Fault Tolerance Mechanism in WSN’s through
Recovery Nodes
A RAJENDRA BABU 1
, SHIVA MURTHY. G 2
1 CSE, VTU – Centre for PG Studies, Bengaluru Region
2 CSE, VTU – Centre for PG Studies, Bengaluru Region
I. INTRODUCTION
WSNs are spatially distributed autonomous sensors to monitor
physical or environmental conditions, such as temperature,
sound, pressure, etc. and to cooperatively pass their data
through the network to a main location. Typically a WSN
contains hundreds of thousands of sensor nodes. The sensor
nodes can communicate among themselves using radio signals.
The sensor nodes in a WSN have limited processing speed,
storage capacity and communication bandwidth. The
development of WSNs was motivated by military applications
such as battlefield surveillance.
The advances in microelectronics and sensor technology made
it possible to have of small, low-cost and large number of
sensor nodes placed in measuring range through the wireless
communication module. The applications of WSNs are in
variety of fields like home security, defense, and healthcare,
environmental and industrial monitoring [1]-[2]. Subsequently
substantial number of compact sensor nodes can be used in the
field to increase quality of service. The activity to utilize
expansive number of sensor nodes will expand the likelihood
of sensor node failures in wireless sensor networks.
Information examination in view of such flawed sensor node
will get to be off base. This will eventually cast down the QoS.
The sensor nodes in WSNs can get to be flawed because of
different reasons, for example, battery failure,
environmental effects, hardware or programming
glitches. Better quality of service is accomplished
by disposing of the information from such defective
sensor nodes [3], [4]. different reasons for example,
battery failure, environmental effects, hardware or
programming glitches. Better quality of service is
accomplished by disposing of the information from such
defective sensor nodes [3], [4].
WSNs with sensor nodes identification of sensor node
location, distance of particular sensor node from some
reference node and fault detection are the great challenging
issues. RTD time measurement technique is an easy way to
obtain the information regarding above issues in WSNs. But
RTD measurement is affected by various parameters of
wireless sensor network. As the sensor nodes are placed
randomly in network, sensor node distance has more impact
on this time measurement. So it is necessary to study the
relationship between the RTD time and sensor node distance.
To prove this relationship the other parameters affecting RTD
time like speed, data transfer rate, number of sensor nodes in
RTD path and other request handled by intermediate nodes are
either made constant or disabled. In such WSNs having large
number of portable sensor nodes, identification of sensor node,
locating the distance of target sensor node with respect to
reference sensor node and detection of failed sensor node
becomes most difficult. In case of indoor positing system the
sensor node location accuracy needed is in centimetre. Failure
detection of sensor node in WSNs is essential because failed
or malfunctioning sensor node may produce incorrect data or
Abstract:
During recent years, usage of wireless sensor networks (WSNs) has been increased because of its huge
potential to interconnect the physical world to the virtual world. To increase the quality of service (QoS) in WSNs,
large numbers of portable wireless sensor nodes have been deployed. The failure of these sensor nodes will affect
the QoS. To maintain better QoS, faulty nodes need to be identified. In the proposed method, sensor node failures
are identified by calculating the round trip delay (RTD) of discrete round trip paths (RTP) and analysing them with
threshold value. Once the faulty nodes are detected, neighbour nodes (Recovery Nodes) that have higher energy
are selected for further transmission. By this approach, the quality of service (QoS) in WSNs can be improved.
Simulation results using the NS2 simulator shows the transmission in WSNs even in the presence of faulty nodes.
Keywords — Wireless Sensor Networks; QoS; Round Trip Path; Round Trip Delay; Recovery Nodes
RESEARCH ARTICLE OPEN ACCESS
International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep – Oct 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 23
no data, which will affect the overall quality of the entire
WSN. Manually checking of such failed sensor node in WSN
is troublesome and impossible.
WSNs with efficient and accurate design to increase the
quality of service (QoS) have become a hot area of research.
Implementing the efficient and accurate WSNs require
deployment of the large numbers of portable sensor nodes in
the field. The QoS of such networks is affected by lifetime
and failure of sensor node. In order to improve the QoS the
data from faulty sensor nodes has to be ignored or discarded
in the decision making process. Hence detection of faulty
sensor node is of prime importance. In the proposed method,
discrete RTPs are compared on the basis of RTD time to
detect the faulty sensor node. WSNs with circular topology is
simulated to determine the RTD time of discrete RTPs.
Scalability of proposed method is verified by simulating the
WSNs with various sensor nodes.
RTD, also called as round-trip time (RTT), is the time
required for a signal pulse or packet to travel from a specific
source node through path consisting other nodes and back
again. The RTD time can range from a few milliseconds
(thousandths of a second) under ideal conditions between
nearby spaced sensor nodes to several seconds under adverse
conditions between sensor nodes separated by a large distance.
RTD time of the RTP will change due to faulty sensor node. It
will be either infinity or higher than the threshold value.
Faulty sensor node is detected by comparing the RTD time of
RTPs with threshold value. The sensor node common to
specific RTPs with infinity RTD time is detected as failed. If
this time is higher than the threshold value then this senor
node is detected as malfunctioning. Detection time of faulty
sensor node depends upon the numbers of RTPs and RTD
time. Therefore, RTD time measurement and evaluation of
RTPs is must to minimize the detection time.
The different failure detection approaches in WSNs are
centralized, distributed and clustered. Discrete clustering
approach to detect the faulty sensor node is used here.
Detection of fault is based on inspecting the discrete RTPs for
their round trip delay (RTD) time. Few RTPs are analysed
during fault detection; therefore involvement of sensor node in
investigating the fault is rare. This will improve the lifetime as
well as QoS of WSNs. Faulty sensor node is detected by
simulating circular topology WSNs with RTD protocol. This
method is tested for different numbers of sensor nodes in
WSNs to verify the scalability.
In a network, RTD time is affected by several factors. One of
them is latency, which is the time between a request for data
and the complete return or display of that data. The round trip
delay RTD time depends on various factors including data
transfer rate of the sensor node, nature of the transmission
medium, physical distance between the sensor nodes, number
of nodes in the RTD path, number of other requests being
handled by intermediate nodes, speed with which intermediate
nodes and source node functions, presence of interference in
the circuit.
This paper is organized into V sections. In section II, the
related works of detecting the fault nodes are described.
Section III presents the fault detection technique and fault
tolerance mechanism in WSNs. Section IV presents the
related results. Paper is concluded in section V.
II. RELATED WORK
Several researchers addressed these problems and proposed
several techniques for detection of faulty nodes in WSNs.
They are discussed here.
M. Asim [5] et.al attempt to examine the efficiency of existing
cellular architecture for fault detection and recovery. Here the
whole network is partitioned into a virtual grid of cells. A cell
manager is chosen in each cell to perform management tasks.
These cells combine to form various groups and each group
chooses one of their cell managers to be a group manager.
They proposed a hierarchical management structure to ensure
that self-management ability is respectively distributed. The
hierarchical management framework and node management
role is also expected to be self-adjustable dynamically to the
changes occurred in the network. For example, replacing the
failed cell manager; shifting over some workload from the
sensor nodes whose residual resource status is in a critical
level. The faulty sensor nodes are detected and recovered in
their respective cells without affecting overall structure of the
network.
I. Chen, A. p. Speer [6]et.al in their work developed adaptive
fault-tolerant QoS control algorithms based on hop-by-hop
data delivery utilizing “source” and “path” redundancy, with
the goal to satisfy application QoS requirements while
prolonging the lifetime of the sensor system. They developed
a mathematical model for the lifetime of the sensor system as
a function of system parameters including the “source” and
“path” redundancy levels utilized. They discover that there
exists optimal “source” and “path” redundancy under which
the lifetime of the system is maximized while satisfying
application QoS requirements.
S.Mathumitha [7] et.al introduced a novel approach for
determining specific discrete RTP will improve efficiency by
enabling parallel analysis of such RTPs. During data analysis,
data from faulty node needs to be excluded. Hence QoS will
be maintained in WSNs. In their proposed system discrete
RTP is formed and need to calculate RTD time for each
discrete RTP.
Algorithm for detecting fault node consists of two phases. In
first phase consider all nodes working properly calculate RTD
value, highest RTD time is consider as the threshold value. In
second phase the fault node is identified by comparing RTD
value with the threshold value identified in first phase if the
International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep – Oct 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 24
RTD value is greater than the threshold value then it is
consider as the malfunction node .RTD value is equal to
infinity then the node is consider as the dead node.
Discrete RTP contain two level of optimization. First level of
optimization is to minimize the analysis time. Large number
of RTP will take high fault detection time. So, number of RTP
selected need to be reduced. Second Level of optimization is
to reduce the number of RTP. Discrete RTP is selected from
linear RTP. Eliminating two RTP after creating linear RTP
will form discrete RTP.
R.N. Duche [8] et.al proposed a new method to detect the
sensor node failure or malfunctioning in WSNs. Here discrete
RTPs are compared on the basis of RTD time to detect the
faulty sensor node.
RTD time mainly depends upon the numbers of sensor node
present in the RTP and the distance between them. Accuracy
can be increased by reducing the RTD time of RTP. It can be
decreased only by reducing the sensor nodes in RTP because
the distance between sensor nodes in WSNs is determined by
particular applications and cannot be decided. Selecting
minimum numbers of sensor nodes in the RTP will reduce the
RTD time. The RTP in WSNs is formed by grouping
minimum three sensor nodes. This method will detect the
failure in sensor node for symmetrical network conditions. In
this way it helps to detect failed or malfunctioning sensor,
which can be used to get correct data in WSNs or the exact
sensor node can be repaired or working status of the WSN can
be checked.
Two algorithms are proposed here to detect the sensor node
failure or malfunctioning. First case is for sensor node failure.
In this case time delay associated with faulty senor node
becomes infinity. RTD time of path in which this sensor node
is present will also become infinity. If instantaneous time is
observed as infinity in look-up table then sensor node failure
is confirmed. In second case if instantaneous time is not
infinity, which means sensor node in WSN is malfunctioning.
P. Jiang [9] proposed a new method for node fault detection in
WSNs. He proposed an improved distributed fault detection
(DFD) scheme by defining new detection criteria. The
improved DFD node fault detection scheme detects the fault
node as follows: for any node Si and the nodes in Neighbour
(Si) whose initial detection status is possibly normal (LG), if
the nodes whose test result with Si is 0 are not less than the
nodes whose initial result is 1, then the status of Si is normal,
otherwise, the status is faulty.
A. Akbari [10] et.al in their work, proposed techniques to
maintain the cluster structure in the event of failures caused by
energy-drained nodes. The node with maximum residual
energy in a cluster becomes cluster heed and node with the
second maximum residual energy becomes secondary cluster
heed. Hence, selection of cluster heed and secondary cluster
heed will be based on available residual energy.
Cluster heed and secondary cluster heed are known to their
cluster members. If cluster heed energy drops below the
threshold value, it then sends a message to its cluster member
including secondary cluster heed. This is an indication for
secondary cluster heed to stand up as a new cluster heed and
the existing cell manager becomes common node and goes to
a low computational mode. Common nodes will automatically
start treating the secondary cluster heed as their new cluster
heed and the new cluster heed upon receiving updates from its
cluster members; choose a new secondary cluster heed.
Recovery from cluster heeds failure involved in invoking a
backup node to stand up as a new cluster heed.
T.W. Pirinen [11] et.al presented a new method to detect and
compensate for a failure of one sensor in an array performing
time delay based direction of arrival (DOA) estimation. The
detection is based on the planar wave assumption, which can
be used to form confidence factors for time delays. Using
these confidence factors, the sensors in the array which is
producing improper data and has failed can be determined.
After detection, all data from the failed sensor are discarded
and DOA is computed without these data.
C.-C. Song [12] et.al in their work proposed path redundancy
technique to detect faulty sensor node. In this technique,
redundancy increases the energy consumption and reduces the
number of correct responses in network lifetime. Excessive
redundant paths in WSNs will slow down the fault detection
process.
M. Lee [13] et.al presented faulty sensor nodes identification.
This model is based on comparisons between neighboring
nodes and dissemination of the decision made at each node.
Algorithm proposed in this method can’t detect the malicious
nodes.
S. S. Ahuja [14] et.al proposed link failure detection based on
monitoring cycles and monitoring paths. Three-edge
connectivity in the network, separate wavelength for each
monitoring cycle and monitoring locations are the limitations
of this method.
The previous approaches were able to detect fault sensor
nodes in WSNs but data leakage through these fault nodes was
not addressed. The proposed mechanism provides a fault
tolerance mechanism through Recovery nodes and provides
better QoS.
III. FAULT TOLERANCE MECHANISM IN WSNs
This section discusses the implementation details of the
proposed generalized model. The fault detection technique
based on RTD time measurement and fault tolerance
technique are introduced in this section.
The fault tolerance mechanism can be achieved by
transmitting the data through neighbour nodes which are
called as Recovery nodes. The selection of neighbour nodes
International Journal of Engineering and Techniques
ISSN: 2395-1303
(Recovery nodes) and the data routing through Reco
nodes are elaborated here. Consider the circular topology with
six sensors as shown in the below figure. Three consecutive
sensor nodes in each RTP are almost at equidistance because
of circular topology.
Figure 1: Circular topology WSN with six sensor nodes
A. RTD Time Estimation
RTD time mainly depends upon the numbers of sensor
node present in the round trip path and the distance between
them. Selecting minimum number of sensor nodes in the RTP
will reduce the RTD time. The RTP in WSNs is formed by
grouping minimum three sensor nodes. Hence the minimum
round trip delay time of RTP with three sensor node is given
by
τRTD = τ1 + τ2 + τ3 (1)
Where τ1, τ2 and τ3 are the delays for sensor node pairs (1, 2),
(2, 3) and (3, 1) respectively.
Likewise RTPs of all the nodes in the network is calculated
and based upon these values RTD value is inferred. This is the
minimum RTD time of an RTP in WSNs.
B. Evaluation of Round Trip Paths
Faulty sensor node is detected by comparing the specific
RTPs to which it belongs. More numbers of sensor nodes in
the round path will reduce the RTPs created. While detecting
faults, comparisons of all such RTPs become necessary. This
will delay the fault detection process. The numbers of RTPs
formed with ‘m’ sensor nodes is given by
P=N (N-m)
Where N is number of sensor nodes and P is the numbers of
RTPs.
C. Optimization of Round Trip Paths
Fault detection by analysing RTD times of maximum numbers
of RTPs will require substantial time and can affect the
performance. Therefore essential numbers of RTPs has to be
International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep –
1303 http://www.ijetjournal.org
(Recovery nodes) and the data routing through Recovery
circular topology with
six sensors as shown in the below figure. Three consecutive
sensor nodes in each RTP are almost at equidistance because
Circular topology WSN with six sensor nodes
RTD time mainly depends upon the numbers of sensor
node present in the round trip path and the distance between
them. Selecting minimum number of sensor nodes in the RTP
will reduce the RTD time. The RTP in WSNs is formed by
odes. Hence the minimum
delay time of RTP with three sensor node is given
τRTD = τ1 + τ2 + τ3 (1)
Where τ1, τ2 and τ3 are the delays for sensor node pairs (1, 2),
es in the network is calculated
and based upon these values RTD value is inferred. This is the
Faulty sensor node is detected by comparing the specific
s of sensor nodes in
the round path will reduce the RTPs created. While detecting
faults, comparisons of all such RTPs become necessary. This
will delay the fault detection process. The numbers of RTPs
(2)
Where N is number of sensor nodes and P is the numbers of
Fault detection by analysing RTD times of maximum numbers
of RTPs will require substantial time and can affect the
performance. Therefore essential numbers of RTPs has to be
selected for comparison purpose. Optimization of RTPs can
be done as explained below.
D. Discrete Selection of RTPs
Discrete RTPs are selected from sequential linear RTPs
only. They are selected by ignoring the two consecutive paths,
after each selected linear path. In this way RTPs are selected
in discrete steps of three as each RTP consi
nodes.
Figure 2: Illustration of two discrete RTPs
Figure 2 illustrates two discrete RTPs. Selection of discrete
RTPs will save the analysis time to a large extend.
E. Threshold RTD Time Detection
RTD time depends upon various fact
Sometime due to improper selection of threshold value normal
working sensor node can be detected as faulty. Appropriate
selection of threshold RTD time is essential to detect the
correct faulty sensor node in WSNs. In the proposed method,
average threshold value is computed by calculating the
average RTD time of N nodes.
Threshold value =
F. Detection of Faulty Sensor Node
In the first phase, all sensor nodes in WSNs are considered
as working properly. This phase is used to decide the
threshold value of RTD time. In the second phase of fault
detection, instantaneous RTD time of discrete RTPs is
compared with the threshold time. Discrete RTPs whose RTD
time is found to be greater than threshold time is then detected
as faulty sensor node.
G. Selection of Neighbour Nodes (Recovery Nodes)
` `Neighbour nodes of the faulty nodes are selected by
using routing table. Routing table contains all the information
about the nodes and their neighbour n
information, the faulty nodes identify their neighbour nodes
and the data transmission is done through these nodes. Once
the faulty nodes in the network are detected using RTD times
of discrete RTPs, the data transmission through these
nodes will lead to data loss. Packets transmitting through these
nodes will be dropped resulting in the degradation of (QoS) in
the network. To overcome this problem in the network, the
– Oct 2016
Page 25
selected for comparison purpose. Optimization of RTPs can
Discrete RTPs are selected from sequential linear RTPs
only. They are selected by ignoring the two consecutive paths,
after each selected linear path. In this way RTPs are selected
in discrete steps of three as each RTP consists of three sensor
Figure 2: Illustration of two discrete RTPs
Figure 2 illustrates two discrete RTPs. Selection of discrete
RTPs will save the analysis time to a large extend.
RTD time depends upon various factors of WSNs.
Sometime due to improper selection of threshold value normal
working sensor node can be detected as faulty. Appropriate
selection of threshold RTD time is essential to detect the
correct faulty sensor node in WSNs. In the proposed method,
age threshold value is computed by calculating the
(3)
In the first phase, all sensor nodes in WSNs are considered
working properly. This phase is used to decide the
threshold value of RTD time. In the second phase of fault
detection, instantaneous RTD time of discrete RTPs is
compared with the threshold time. Discrete RTPs whose RTD
reshold time is then detected
Selection of Neighbour Nodes (Recovery Nodes)
nodes of the faulty nodes are selected by
using routing table. Routing table contains all the information
about the nodes and their neighbour nodes. By using this
information, the faulty nodes identify their neighbour nodes
and the data transmission is done through these nodes. Once
the faulty nodes in the network are detected using RTD times
of discrete RTPs, the data transmission through these faulty
nodes will lead to data loss. Packets transmitting through these
nodes will be dropped resulting in the degradation of (QoS) in
the network. To overcome this problem in the network, the
International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep – Oct 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 26
neighbour nodes with highest energy will be selected for the
data transmission. These neighbour nodes are called as
Recovery Nodes.
H. Data Routing Through Recovery Nodes
The routing protocol used in the proposed method is
Destination-Sequenced Distance Vector (DSDV) protocol.
Here, each node maintains a routing table with one route entry
for each destination. A packet is routed by assigning the
address of source, forwarding and destination sensor nodes in
routing table. Data transmission is established between nodes
using User Datagram Protocol (UDP) agent and Constant bit
rate (CBR) traffic. An UDP agent is defined and attached to
sender node. Similarly CBR agent is created and attached to it.
Finally the CBR source is attached to the sink node for the
data transmission.
Algorithm for fault node detection and Selection of Recovery
Nodes
Step 1: Select any sensor node Dx from WSN with N sensor
nodes.
The value of X=1, 2, 3…….N (D1≤Dx≤DN).
Step 2: Form RTP_X in sequence as Dx-Dx+1-Dx+2
Calculate RTP_X
Pd = Q+C
Q = [N/m]
C = 0 if R=0,
1 otherwise
Step 3: Calculate RTD time of all the sensor nodes.
τRTD = τ1 + τ2 + τ3.
Where τ1, τ2 and τ3 are the delays for sensor node
pairs (1, 2), (2, 3) and (3, 1) respectively.
Step 4: Calculating Average Threshold Value.
Average Threshold value =
Step 5: Compare each sensor node RTD with Threshold
value, if any node having RTD greater than Average
Threshold Value then that node is consider as Faulty
sensor node.
Step 6: If a node is faulty, select the neighbour nodes which
have the maximum energy and consider them as
Recovery nodes. The remaining energy of Recovery
nodes are calculated as shown below
Rem = Ie0 – Fe0
Where Rem, Ie and Fe are Remaining Energy, Initial Energy
and Final Energy respectively.
Step 7: Transmit the data through the Recovery Nodes to the
destination.
The main objective of this paper is to transmit packets through
recovery nodes upon detection of faulty nodes in the wireless
sensor network.
IV. RESULTS AND DISCUSSION
This section presents the performance results of the proposed
model. Also it discusses the performance parameters which
evaluate the effectiveness of the proposed system, along with
the simulation setup.
We define the node density as the number of nodes deployed
in a 1000 *1000 square area. Around 30 nodes are initialized
using circular topology in the proposed model. The routing
protocol used is DSDV. The node transmission range is set to
50m. The proposed method is implemented in network
simulator (NS2) using Tool Command Language (TCL).The
type of traffic is Constant Bit Rate (CBR) and agent type is
UDP. Nodes through which data is transmitted are shown
green in color. Faulty nodes are denoted in red color and
Recovery nodes are shown in brown color. The initial energy
given to every node is 10J.
A. Performance Parameters
The performance parameters such as Throughput and
Packet Delivery Ratio of the proposed method are plotted
using graphs shown below.
Figure 3: Throughput
The Figure 3 shows the throughput of the proposed method.
The graph is plotted against time and the data transmission
rate between the nodes. The graph shows that when the nodes
22 and 29 are detected as faulty nodes, packets transmitting
between these faulty nodes will be dropped which brings
down the throughput. After the selection of recovery nodes,
packet transmission continues and the throughput increases as
shown in the graph.
International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep – Oct 2016
ISSN: 2395-1303 http://www.ijetjournal.org Page 27
Figure 4: Packet Delivery Ratio
Packet delivery ratio can be defined as the ratio of data
packets received by the destination nodes to those generated
by the source nodes.
The above Figure 4 shows the packet delivery ratio of the
proposed model. The graph is plotted against time and the
proportion of received and sent packet. Graph shows the
fraction of data packets that are successfully delivered during
simulation time. The percentage of Packet Delivery Ratio of
the proposed model is approximately 98%.
V. CONCLUSION
This paper proposes fault tolerant mechanism for WSN upon
detection of faulty sensor nodes. The data loss at faulty sensor
nodes is overcome here by allowing the data transmission
through Recovery Nodes. Remaining Energy of sensor nodes
is used efficiently. The proposed fault tolerance mechanism
improves the throughput and PDR in the network. The PDR in
the network is approximately 98%. Thus the proposed system
increases the QoS in WSNs.
REFERENCES
1. K. Sha, J. Gehlot, and R. Greve, “Multipath routing
techniques in wireless sensor networks: A survey,”
Wireless Personal Commun., vol. 70, no. 2, pp. 807–
829, 2013.
2. M. Younis and K. Akkaya, “Strategies and techniques
for node placement in wireless sensor networks: A
survey,” Ad Hoc Netw., vol. 6, no. 4, pp. 621–655,
2008.
3. A. A. Boudhir, B. Mohamed, and B. A. Mohamed,
“New technique of wireless sensor networks
localization based on energy consumption,” Int. J.
Comput. Appl., vol. 9, no. 12, pp. 25–28, Nov. 2010.
4. W. Y. Poe and J. B. Schmitt, “Node deployment in
large wireless sensor networks: Coverage, energy
consumption, and worst-case delay,” in Proc. ACM,
AINTEC, Nov. 2009, pp. 1–8.
5. M. Asim, H. Mokhtar, and M. Merabti, “A fault
management architecture for wireless sensor
network,” in Proc. IWCMC, Aug. 2008, pp. 1–7.
6. I. Chen, A. P. Speer, and M. Eltoweissy, “Adaptive
fault tolerant QoS control algorithms for maximizing
system lifetime of query-based wireless sensor
networks,” IEEE Trans. Dependable Secure
Comput., vol. 8, no. 2, pp. 1–35, Mar./Apr. 2011.
7. S.Mathumitha,S. Kavipriya, T.Revathi, “Efficient
Fault Node Detection in WSN using RTD
Calculation” in IJESC,May.2014.
8. R. N. Duche and N. P. Sarwade, “Sensor node
failure or malfunctioning detection in wireless sensor
network,” ACEEE Int. J. Commun., vol. 3, no. 1, pp.
57–61, Mar. 2012.
9. P. Jiang, “A new method for node fault detection in
wireless sensor networks,” Sensors, vol. 9, no. 2, pp.
1282–1294, 2009.
10. A. Akbari, A. Dana, A. Khademzadeh, and N.
Beikmahdavi, “Fault detection and recovery in
wireless sensor network using clustering,” IJWMN
vol. 3, no. 1, pp. 130–138, Feb. 2011.
11. T. W. Pirinen, J. Yli-Hietanen, P. Pertil, and A. Visa,
“Detection and compensation of sensor malfunction
in time delay based direction of arrival estimation,”
IEEE Circuits Syst., vol. 4, no. 1, pp. 872–875, May
2004.
12. C.-C. Song, C.-F. Feng, C.-H. Wang, and D.-C.
Liaw, “Simulation and experimental analysis of a
ZigBee sensor network with fault detection and
reconfiguration mechanism,” in Proc. 8th ASCC,
May 2011, pp. 659–664.
13. M. Lee and Y. Choi, “Fault detection of wireless
sensor networks,” Comput. Commun., vol. 31, pp.
3469–3475, Jun. 2008.
14. S. S. Ahuja, R. Srinivasan, and M. Krunz, “Single-
link failure detection in all-optical networks using
monitoring cycles and paths,” IEEE/ACM Trans.
Netw., vol. 17, no. 4, pp. 1080–1093, Aug. 2009.
Computer Vision–ECCV 2000, 2000, pp. 751–767,
Springer.

More Related Content

What's hot

Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsneSAT Journals
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent dataeSAT Publishing House
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Toward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networksToward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networksNaveena N
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor NetworkAarthi Raghavendra
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Editor IJARCET
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBANImprovement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBANijeei-iaes
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocoljaimin_m_raval
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKNishant Bhardwaj
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 

What's hot (18)

Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsn
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent data
 
10.1.1.118.4231
10.1.1.118.423110.1.1.118.4231
10.1.1.118.4231
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Toward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networksToward efficient task management in wireless sensor networks
Toward efficient task management in wireless sensor networks
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
 
E044033136
E044033136E044033136
E044033136
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBANImprovement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 

Viewers also liked

Atividade de matemática 1º g
Atividade de matemática 1º gAtividade de matemática 1º g
Atividade de matemática 1º gJose Donisete
 
Questions employers ask: Why does your experience qualifies for this role?
Questions employers ask: Why does your experience qualifies for this role?Questions employers ask: Why does your experience qualifies for this role?
Questions employers ask: Why does your experience qualifies for this role?Zorcis Consulting
 
Apresentação subprojeto de licenciatura em ciências biológicas.
Apresentação subprojeto de licenciatura em ciências biológicas.Apresentação subprojeto de licenciatura em ciências biológicas.
Apresentação subprojeto de licenciatura em ciências biológicas.PibidUENP
 
Sociales bizantino
Sociales bizantinoSociales bizantino
Sociales bizantinoduartegue
 
Biossegurananaenfermagem 130301191638-phpapp01
Biossegurananaenfermagem 130301191638-phpapp01Biossegurananaenfermagem 130301191638-phpapp01
Biossegurananaenfermagem 130301191638-phpapp01Tec Saúde
 
DIMENSIONES HUMANAS
DIMENSIONES HUMANASDIMENSIONES HUMANAS
DIMENSIONES HUMANASDiego C.
 
Ran Rothschild - CloudZone
Ran Rothschild - CloudZoneRan Rothschild - CloudZone
Ran Rothschild - CloudZoneIdan Tohami
 
Slide do-trabalho-de-metologia-do-trabalho-científico
Slide do-trabalho-de-metologia-do-trabalho-científicoSlide do-trabalho-de-metologia-do-trabalho-científico
Slide do-trabalho-de-metologia-do-trabalho-científicoTissiane Lima
 
Exercicios de Matrizes, Vetores e Equacões Lineares
Exercicios de Matrizes, Vetores e Equacões LinearesExercicios de Matrizes, Vetores e Equacões Lineares
Exercicios de Matrizes, Vetores e Equacões LinearesLCCIMETRO
 
Divulgacion masiva ingenierias
Divulgacion masiva ingenieriasDivulgacion masiva ingenierias
Divulgacion masiva ingenieriasBEATRIZ SANCHIS
 
Baixo sul (versão book ag)
Baixo sul (versão book ag)Baixo sul (versão book ag)
Baixo sul (versão book ag)Agência Social
 

Viewers also liked (20)

Atividade de matemática 1º g
Atividade de matemática 1º gAtividade de matemática 1º g
Atividade de matemática 1º g
 
PDT Plano Diretor de Tecnologia da Informação
PDT  Plano Diretor de Tecnologia da InformaçãoPDT  Plano Diretor de Tecnologia da Informação
PDT Plano Diretor de Tecnologia da Informação
 
Questions employers ask: Why does your experience qualifies for this role?
Questions employers ask: Why does your experience qualifies for this role?Questions employers ask: Why does your experience qualifies for this role?
Questions employers ask: Why does your experience qualifies for this role?
 
Ennovx português
Ennovx portuguêsEnnovx português
Ennovx português
 
Edital_TRT_SC_2013
Edital_TRT_SC_2013Edital_TRT_SC_2013
Edital_TRT_SC_2013
 
Apresentação subprojeto de licenciatura em ciências biológicas.
Apresentação subprojeto de licenciatura em ciências biológicas.Apresentação subprojeto de licenciatura em ciências biológicas.
Apresentação subprojeto de licenciatura em ciências biológicas.
 
Reciclar andy
Reciclar andyReciclar andy
Reciclar andy
 
Ilmu Sosial Dasar
Ilmu Sosial DasarIlmu Sosial Dasar
Ilmu Sosial Dasar
 
Sociales bizantino
Sociales bizantinoSociales bizantino
Sociales bizantino
 
Biossegurananaenfermagem 130301191638-phpapp01
Biossegurananaenfermagem 130301191638-phpapp01Biossegurananaenfermagem 130301191638-phpapp01
Biossegurananaenfermagem 130301191638-phpapp01
 
DIMENSIONES HUMANAS
DIMENSIONES HUMANASDIMENSIONES HUMANAS
DIMENSIONES HUMANAS
 
Mi biografía
Mi biografíaMi biografía
Mi biografía
 
Ran Rothschild - CloudZone
Ran Rothschild - CloudZoneRan Rothschild - CloudZone
Ran Rothschild - CloudZone
 
Slide do-trabalho-de-metologia-do-trabalho-científico
Slide do-trabalho-de-metologia-do-trabalho-científicoSlide do-trabalho-de-metologia-do-trabalho-científico
Slide do-trabalho-de-metologia-do-trabalho-científico
 
Exercicios de Matrizes, Vetores e Equacões Lineares
Exercicios de Matrizes, Vetores e Equacões LinearesExercicios de Matrizes, Vetores e Equacões Lineares
Exercicios de Matrizes, Vetores e Equacões Lineares
 
JEPH2012
JEPH2012JEPH2012
JEPH2012
 
Divulgacion masiva ingenierias
Divulgacion masiva ingenieriasDivulgacion masiva ingenierias
Divulgacion masiva ingenierias
 
Baixo sul (versão book ag)
Baixo sul (versão book ag)Baixo sul (versão book ag)
Baixo sul (versão book ag)
 
SCIENCE and EDUCATION a NEW DIMENSION PEDAGOGY and PSYCHOLOGY Issue 86
SCIENCE and EDUCATION a NEW DIMENSION PEDAGOGY and PSYCHOLOGY Issue 86SCIENCE and EDUCATION a NEW DIMENSION PEDAGOGY and PSYCHOLOGY Issue 86
SCIENCE and EDUCATION a NEW DIMENSION PEDAGOGY and PSYCHOLOGY Issue 86
 
Artigo - Compliance: Pirataria Corporativa
Artigo - Compliance: Pirataria CorporativaArtigo - Compliance: Pirataria Corporativa
Artigo - Compliance: Pirataria Corporativa
 

Similar to Fault Tolerance in WSNs through Recovery Nodes

Bb2641284132
Bb2641284132Bb2641284132
Bb2641284132IJMER
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...IRJET Journal
 
Routing techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a surveyRouting techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a surveyAmandeep Sohal
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksijcses
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksijwmn
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
 
High uncertainty aware localization and error optimization of mobile nodes fo...
High uncertainty aware localization and error optimization of mobile nodes fo...High uncertainty aware localization and error optimization of mobile nodes fo...
High uncertainty aware localization and error optimization of mobile nodes fo...IAESIJAI
 
Routing protocols
Routing protocolsRouting protocols
Routing protocolsmehulpatira
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 

Similar to Fault Tolerance in WSNs through Recovery Nodes (20)

K010526570
K010526570K010526570
K010526570
 
Bb2641284132
Bb2641284132Bb2641284132
Bb2641284132
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
 
Routing techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a surveyRouting techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a survey
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networks
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
High uncertainty aware localization and error optimization of mobile nodes fo...
High uncertainty aware localization and error optimization of mobile nodes fo...High uncertainty aware localization and error optimization of mobile nodes fo...
High uncertainty aware localization and error optimization of mobile nodes fo...
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 

More from IJET - International Journal of Engineering and Techniques

More from IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Recently uploaded

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 

Fault Tolerance in WSNs through Recovery Nodes

  • 1. International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep – Oct 2016 ISSN: 2395-1303 http://www.ijetjournal.org Page 22 Fault Tolerance Mechanism in WSN’s through Recovery Nodes A RAJENDRA BABU 1 , SHIVA MURTHY. G 2 1 CSE, VTU – Centre for PG Studies, Bengaluru Region 2 CSE, VTU – Centre for PG Studies, Bengaluru Region I. INTRODUCTION WSNs are spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. Typically a WSN contains hundreds of thousands of sensor nodes. The sensor nodes can communicate among themselves using radio signals. The sensor nodes in a WSN have limited processing speed, storage capacity and communication bandwidth. The development of WSNs was motivated by military applications such as battlefield surveillance. The advances in microelectronics and sensor technology made it possible to have of small, low-cost and large number of sensor nodes placed in measuring range through the wireless communication module. The applications of WSNs are in variety of fields like home security, defense, and healthcare, environmental and industrial monitoring [1]-[2]. Subsequently substantial number of compact sensor nodes can be used in the field to increase quality of service. The activity to utilize expansive number of sensor nodes will expand the likelihood of sensor node failures in wireless sensor networks. Information examination in view of such flawed sensor node will get to be off base. This will eventually cast down the QoS. The sensor nodes in WSNs can get to be flawed because of different reasons, for example, battery failure, environmental effects, hardware or programming glitches. Better quality of service is accomplished by disposing of the information from such defective sensor nodes [3], [4]. different reasons for example, battery failure, environmental effects, hardware or programming glitches. Better quality of service is accomplished by disposing of the information from such defective sensor nodes [3], [4]. WSNs with sensor nodes identification of sensor node location, distance of particular sensor node from some reference node and fault detection are the great challenging issues. RTD time measurement technique is an easy way to obtain the information regarding above issues in WSNs. But RTD measurement is affected by various parameters of wireless sensor network. As the sensor nodes are placed randomly in network, sensor node distance has more impact on this time measurement. So it is necessary to study the relationship between the RTD time and sensor node distance. To prove this relationship the other parameters affecting RTD time like speed, data transfer rate, number of sensor nodes in RTD path and other request handled by intermediate nodes are either made constant or disabled. In such WSNs having large number of portable sensor nodes, identification of sensor node, locating the distance of target sensor node with respect to reference sensor node and detection of failed sensor node becomes most difficult. In case of indoor positing system the sensor node location accuracy needed is in centimetre. Failure detection of sensor node in WSNs is essential because failed or malfunctioning sensor node may produce incorrect data or Abstract: During recent years, usage of wireless sensor networks (WSNs) has been increased because of its huge potential to interconnect the physical world to the virtual world. To increase the quality of service (QoS) in WSNs, large numbers of portable wireless sensor nodes have been deployed. The failure of these sensor nodes will affect the QoS. To maintain better QoS, faulty nodes need to be identified. In the proposed method, sensor node failures are identified by calculating the round trip delay (RTD) of discrete round trip paths (RTP) and analysing them with threshold value. Once the faulty nodes are detected, neighbour nodes (Recovery Nodes) that have higher energy are selected for further transmission. By this approach, the quality of service (QoS) in WSNs can be improved. Simulation results using the NS2 simulator shows the transmission in WSNs even in the presence of faulty nodes. Keywords — Wireless Sensor Networks; QoS; Round Trip Path; Round Trip Delay; Recovery Nodes RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep – Oct 2016 ISSN: 2395-1303 http://www.ijetjournal.org Page 23 no data, which will affect the overall quality of the entire WSN. Manually checking of such failed sensor node in WSN is troublesome and impossible. WSNs with efficient and accurate design to increase the quality of service (QoS) have become a hot area of research. Implementing the efficient and accurate WSNs require deployment of the large numbers of portable sensor nodes in the field. The QoS of such networks is affected by lifetime and failure of sensor node. In order to improve the QoS the data from faulty sensor nodes has to be ignored or discarded in the decision making process. Hence detection of faulty sensor node is of prime importance. In the proposed method, discrete RTPs are compared on the basis of RTD time to detect the faulty sensor node. WSNs with circular topology is simulated to determine the RTD time of discrete RTPs. Scalability of proposed method is verified by simulating the WSNs with various sensor nodes. RTD, also called as round-trip time (RTT), is the time required for a signal pulse or packet to travel from a specific source node through path consisting other nodes and back again. The RTD time can range from a few milliseconds (thousandths of a second) under ideal conditions between nearby spaced sensor nodes to several seconds under adverse conditions between sensor nodes separated by a large distance. RTD time of the RTP will change due to faulty sensor node. It will be either infinity or higher than the threshold value. Faulty sensor node is detected by comparing the RTD time of RTPs with threshold value. The sensor node common to specific RTPs with infinity RTD time is detected as failed. If this time is higher than the threshold value then this senor node is detected as malfunctioning. Detection time of faulty sensor node depends upon the numbers of RTPs and RTD time. Therefore, RTD time measurement and evaluation of RTPs is must to minimize the detection time. The different failure detection approaches in WSNs are centralized, distributed and clustered. Discrete clustering approach to detect the faulty sensor node is used here. Detection of fault is based on inspecting the discrete RTPs for their round trip delay (RTD) time. Few RTPs are analysed during fault detection; therefore involvement of sensor node in investigating the fault is rare. This will improve the lifetime as well as QoS of WSNs. Faulty sensor node is detected by simulating circular topology WSNs with RTD protocol. This method is tested for different numbers of sensor nodes in WSNs to verify the scalability. In a network, RTD time is affected by several factors. One of them is latency, which is the time between a request for data and the complete return or display of that data. The round trip delay RTD time depends on various factors including data transfer rate of the sensor node, nature of the transmission medium, physical distance between the sensor nodes, number of nodes in the RTD path, number of other requests being handled by intermediate nodes, speed with which intermediate nodes and source node functions, presence of interference in the circuit. This paper is organized into V sections. In section II, the related works of detecting the fault nodes are described. Section III presents the fault detection technique and fault tolerance mechanism in WSNs. Section IV presents the related results. Paper is concluded in section V. II. RELATED WORK Several researchers addressed these problems and proposed several techniques for detection of faulty nodes in WSNs. They are discussed here. M. Asim [5] et.al attempt to examine the efficiency of existing cellular architecture for fault detection and recovery. Here the whole network is partitioned into a virtual grid of cells. A cell manager is chosen in each cell to perform management tasks. These cells combine to form various groups and each group chooses one of their cell managers to be a group manager. They proposed a hierarchical management structure to ensure that self-management ability is respectively distributed. The hierarchical management framework and node management role is also expected to be self-adjustable dynamically to the changes occurred in the network. For example, replacing the failed cell manager; shifting over some workload from the sensor nodes whose residual resource status is in a critical level. The faulty sensor nodes are detected and recovered in their respective cells without affecting overall structure of the network. I. Chen, A. p. Speer [6]et.al in their work developed adaptive fault-tolerant QoS control algorithms based on hop-by-hop data delivery utilizing “source” and “path” redundancy, with the goal to satisfy application QoS requirements while prolonging the lifetime of the sensor system. They developed a mathematical model for the lifetime of the sensor system as a function of system parameters including the “source” and “path” redundancy levels utilized. They discover that there exists optimal “source” and “path” redundancy under which the lifetime of the system is maximized while satisfying application QoS requirements. S.Mathumitha [7] et.al introduced a novel approach for determining specific discrete RTP will improve efficiency by enabling parallel analysis of such RTPs. During data analysis, data from faulty node needs to be excluded. Hence QoS will be maintained in WSNs. In their proposed system discrete RTP is formed and need to calculate RTD time for each discrete RTP. Algorithm for detecting fault node consists of two phases. In first phase consider all nodes working properly calculate RTD value, highest RTD time is consider as the threshold value. In second phase the fault node is identified by comparing RTD value with the threshold value identified in first phase if the
  • 3. International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep – Oct 2016 ISSN: 2395-1303 http://www.ijetjournal.org Page 24 RTD value is greater than the threshold value then it is consider as the malfunction node .RTD value is equal to infinity then the node is consider as the dead node. Discrete RTP contain two level of optimization. First level of optimization is to minimize the analysis time. Large number of RTP will take high fault detection time. So, number of RTP selected need to be reduced. Second Level of optimization is to reduce the number of RTP. Discrete RTP is selected from linear RTP. Eliminating two RTP after creating linear RTP will form discrete RTP. R.N. Duche [8] et.al proposed a new method to detect the sensor node failure or malfunctioning in WSNs. Here discrete RTPs are compared on the basis of RTD time to detect the faulty sensor node. RTD time mainly depends upon the numbers of sensor node present in the RTP and the distance between them. Accuracy can be increased by reducing the RTD time of RTP. It can be decreased only by reducing the sensor nodes in RTP because the distance between sensor nodes in WSNs is determined by particular applications and cannot be decided. Selecting minimum numbers of sensor nodes in the RTP will reduce the RTD time. The RTP in WSNs is formed by grouping minimum three sensor nodes. This method will detect the failure in sensor node for symmetrical network conditions. In this way it helps to detect failed or malfunctioning sensor, which can be used to get correct data in WSNs or the exact sensor node can be repaired or working status of the WSN can be checked. Two algorithms are proposed here to detect the sensor node failure or malfunctioning. First case is for sensor node failure. In this case time delay associated with faulty senor node becomes infinity. RTD time of path in which this sensor node is present will also become infinity. If instantaneous time is observed as infinity in look-up table then sensor node failure is confirmed. In second case if instantaneous time is not infinity, which means sensor node in WSN is malfunctioning. P. Jiang [9] proposed a new method for node fault detection in WSNs. He proposed an improved distributed fault detection (DFD) scheme by defining new detection criteria. The improved DFD node fault detection scheme detects the fault node as follows: for any node Si and the nodes in Neighbour (Si) whose initial detection status is possibly normal (LG), if the nodes whose test result with Si is 0 are not less than the nodes whose initial result is 1, then the status of Si is normal, otherwise, the status is faulty. A. Akbari [10] et.al in their work, proposed techniques to maintain the cluster structure in the event of failures caused by energy-drained nodes. The node with maximum residual energy in a cluster becomes cluster heed and node with the second maximum residual energy becomes secondary cluster heed. Hence, selection of cluster heed and secondary cluster heed will be based on available residual energy. Cluster heed and secondary cluster heed are known to their cluster members. If cluster heed energy drops below the threshold value, it then sends a message to its cluster member including secondary cluster heed. This is an indication for secondary cluster heed to stand up as a new cluster heed and the existing cell manager becomes common node and goes to a low computational mode. Common nodes will automatically start treating the secondary cluster heed as their new cluster heed and the new cluster heed upon receiving updates from its cluster members; choose a new secondary cluster heed. Recovery from cluster heeds failure involved in invoking a backup node to stand up as a new cluster heed. T.W. Pirinen [11] et.al presented a new method to detect and compensate for a failure of one sensor in an array performing time delay based direction of arrival (DOA) estimation. The detection is based on the planar wave assumption, which can be used to form confidence factors for time delays. Using these confidence factors, the sensors in the array which is producing improper data and has failed can be determined. After detection, all data from the failed sensor are discarded and DOA is computed without these data. C.-C. Song [12] et.al in their work proposed path redundancy technique to detect faulty sensor node. In this technique, redundancy increases the energy consumption and reduces the number of correct responses in network lifetime. Excessive redundant paths in WSNs will slow down the fault detection process. M. Lee [13] et.al presented faulty sensor nodes identification. This model is based on comparisons between neighboring nodes and dissemination of the decision made at each node. Algorithm proposed in this method can’t detect the malicious nodes. S. S. Ahuja [14] et.al proposed link failure detection based on monitoring cycles and monitoring paths. Three-edge connectivity in the network, separate wavelength for each monitoring cycle and monitoring locations are the limitations of this method. The previous approaches were able to detect fault sensor nodes in WSNs but data leakage through these fault nodes was not addressed. The proposed mechanism provides a fault tolerance mechanism through Recovery nodes and provides better QoS. III. FAULT TOLERANCE MECHANISM IN WSNs This section discusses the implementation details of the proposed generalized model. The fault detection technique based on RTD time measurement and fault tolerance technique are introduced in this section. The fault tolerance mechanism can be achieved by transmitting the data through neighbour nodes which are called as Recovery nodes. The selection of neighbour nodes
  • 4. International Journal of Engineering and Techniques ISSN: 2395-1303 (Recovery nodes) and the data routing through Reco nodes are elaborated here. Consider the circular topology with six sensors as shown in the below figure. Three consecutive sensor nodes in each RTP are almost at equidistance because of circular topology. Figure 1: Circular topology WSN with six sensor nodes A. RTD Time Estimation RTD time mainly depends upon the numbers of sensor node present in the round trip path and the distance between them. Selecting minimum number of sensor nodes in the RTP will reduce the RTD time. The RTP in WSNs is formed by grouping minimum three sensor nodes. Hence the minimum round trip delay time of RTP with three sensor node is given by τRTD = τ1 + τ2 + τ3 (1) Where τ1, τ2 and τ3 are the delays for sensor node pairs (1, 2), (2, 3) and (3, 1) respectively. Likewise RTPs of all the nodes in the network is calculated and based upon these values RTD value is inferred. This is the minimum RTD time of an RTP in WSNs. B. Evaluation of Round Trip Paths Faulty sensor node is detected by comparing the specific RTPs to which it belongs. More numbers of sensor nodes in the round path will reduce the RTPs created. While detecting faults, comparisons of all such RTPs become necessary. This will delay the fault detection process. The numbers of RTPs formed with ‘m’ sensor nodes is given by P=N (N-m) Where N is number of sensor nodes and P is the numbers of RTPs. C. Optimization of Round Trip Paths Fault detection by analysing RTD times of maximum numbers of RTPs will require substantial time and can affect the performance. Therefore essential numbers of RTPs has to be International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep – 1303 http://www.ijetjournal.org (Recovery nodes) and the data routing through Recovery circular topology with six sensors as shown in the below figure. Three consecutive sensor nodes in each RTP are almost at equidistance because Circular topology WSN with six sensor nodes RTD time mainly depends upon the numbers of sensor node present in the round trip path and the distance between them. Selecting minimum number of sensor nodes in the RTP will reduce the RTD time. The RTP in WSNs is formed by odes. Hence the minimum delay time of RTP with three sensor node is given τRTD = τ1 + τ2 + τ3 (1) Where τ1, τ2 and τ3 are the delays for sensor node pairs (1, 2), es in the network is calculated and based upon these values RTD value is inferred. This is the Faulty sensor node is detected by comparing the specific s of sensor nodes in the round path will reduce the RTPs created. While detecting faults, comparisons of all such RTPs become necessary. This will delay the fault detection process. The numbers of RTPs (2) Where N is number of sensor nodes and P is the numbers of Fault detection by analysing RTD times of maximum numbers of RTPs will require substantial time and can affect the performance. Therefore essential numbers of RTPs has to be selected for comparison purpose. Optimization of RTPs can be done as explained below. D. Discrete Selection of RTPs Discrete RTPs are selected from sequential linear RTPs only. They are selected by ignoring the two consecutive paths, after each selected linear path. In this way RTPs are selected in discrete steps of three as each RTP consi nodes. Figure 2: Illustration of two discrete RTPs Figure 2 illustrates two discrete RTPs. Selection of discrete RTPs will save the analysis time to a large extend. E. Threshold RTD Time Detection RTD time depends upon various fact Sometime due to improper selection of threshold value normal working sensor node can be detected as faulty. Appropriate selection of threshold RTD time is essential to detect the correct faulty sensor node in WSNs. In the proposed method, average threshold value is computed by calculating the average RTD time of N nodes. Threshold value = F. Detection of Faulty Sensor Node In the first phase, all sensor nodes in WSNs are considered as working properly. This phase is used to decide the threshold value of RTD time. In the second phase of fault detection, instantaneous RTD time of discrete RTPs is compared with the threshold time. Discrete RTPs whose RTD time is found to be greater than threshold time is then detected as faulty sensor node. G. Selection of Neighbour Nodes (Recovery Nodes) ` `Neighbour nodes of the faulty nodes are selected by using routing table. Routing table contains all the information about the nodes and their neighbour n information, the faulty nodes identify their neighbour nodes and the data transmission is done through these nodes. Once the faulty nodes in the network are detected using RTD times of discrete RTPs, the data transmission through these nodes will lead to data loss. Packets transmitting through these nodes will be dropped resulting in the degradation of (QoS) in the network. To overcome this problem in the network, the – Oct 2016 Page 25 selected for comparison purpose. Optimization of RTPs can Discrete RTPs are selected from sequential linear RTPs only. They are selected by ignoring the two consecutive paths, after each selected linear path. In this way RTPs are selected in discrete steps of three as each RTP consists of three sensor Figure 2: Illustration of two discrete RTPs Figure 2 illustrates two discrete RTPs. Selection of discrete RTPs will save the analysis time to a large extend. RTD time depends upon various factors of WSNs. Sometime due to improper selection of threshold value normal working sensor node can be detected as faulty. Appropriate selection of threshold RTD time is essential to detect the correct faulty sensor node in WSNs. In the proposed method, age threshold value is computed by calculating the (3) In the first phase, all sensor nodes in WSNs are considered working properly. This phase is used to decide the threshold value of RTD time. In the second phase of fault detection, instantaneous RTD time of discrete RTPs is compared with the threshold time. Discrete RTPs whose RTD reshold time is then detected Selection of Neighbour Nodes (Recovery Nodes) nodes of the faulty nodes are selected by using routing table. Routing table contains all the information about the nodes and their neighbour nodes. By using this information, the faulty nodes identify their neighbour nodes and the data transmission is done through these nodes. Once the faulty nodes in the network are detected using RTD times of discrete RTPs, the data transmission through these faulty nodes will lead to data loss. Packets transmitting through these nodes will be dropped resulting in the degradation of (QoS) in the network. To overcome this problem in the network, the
  • 5. International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep – Oct 2016 ISSN: 2395-1303 http://www.ijetjournal.org Page 26 neighbour nodes with highest energy will be selected for the data transmission. These neighbour nodes are called as Recovery Nodes. H. Data Routing Through Recovery Nodes The routing protocol used in the proposed method is Destination-Sequenced Distance Vector (DSDV) protocol. Here, each node maintains a routing table with one route entry for each destination. A packet is routed by assigning the address of source, forwarding and destination sensor nodes in routing table. Data transmission is established between nodes using User Datagram Protocol (UDP) agent and Constant bit rate (CBR) traffic. An UDP agent is defined and attached to sender node. Similarly CBR agent is created and attached to it. Finally the CBR source is attached to the sink node for the data transmission. Algorithm for fault node detection and Selection of Recovery Nodes Step 1: Select any sensor node Dx from WSN with N sensor nodes. The value of X=1, 2, 3…….N (D1≤Dx≤DN). Step 2: Form RTP_X in sequence as Dx-Dx+1-Dx+2 Calculate RTP_X Pd = Q+C Q = [N/m] C = 0 if R=0, 1 otherwise Step 3: Calculate RTD time of all the sensor nodes. τRTD = τ1 + τ2 + τ3. Where τ1, τ2 and τ3 are the delays for sensor node pairs (1, 2), (2, 3) and (3, 1) respectively. Step 4: Calculating Average Threshold Value. Average Threshold value = Step 5: Compare each sensor node RTD with Threshold value, if any node having RTD greater than Average Threshold Value then that node is consider as Faulty sensor node. Step 6: If a node is faulty, select the neighbour nodes which have the maximum energy and consider them as Recovery nodes. The remaining energy of Recovery nodes are calculated as shown below Rem = Ie0 – Fe0 Where Rem, Ie and Fe are Remaining Energy, Initial Energy and Final Energy respectively. Step 7: Transmit the data through the Recovery Nodes to the destination. The main objective of this paper is to transmit packets through recovery nodes upon detection of faulty nodes in the wireless sensor network. IV. RESULTS AND DISCUSSION This section presents the performance results of the proposed model. Also it discusses the performance parameters which evaluate the effectiveness of the proposed system, along with the simulation setup. We define the node density as the number of nodes deployed in a 1000 *1000 square area. Around 30 nodes are initialized using circular topology in the proposed model. The routing protocol used is DSDV. The node transmission range is set to 50m. The proposed method is implemented in network simulator (NS2) using Tool Command Language (TCL).The type of traffic is Constant Bit Rate (CBR) and agent type is UDP. Nodes through which data is transmitted are shown green in color. Faulty nodes are denoted in red color and Recovery nodes are shown in brown color. The initial energy given to every node is 10J. A. Performance Parameters The performance parameters such as Throughput and Packet Delivery Ratio of the proposed method are plotted using graphs shown below. Figure 3: Throughput The Figure 3 shows the throughput of the proposed method. The graph is plotted against time and the data transmission rate between the nodes. The graph shows that when the nodes 22 and 29 are detected as faulty nodes, packets transmitting between these faulty nodes will be dropped which brings down the throughput. After the selection of recovery nodes, packet transmission continues and the throughput increases as shown in the graph.
  • 6. International Journal of Engineering and Techniques - Volume 2 Issue 5, Sep – Oct 2016 ISSN: 2395-1303 http://www.ijetjournal.org Page 27 Figure 4: Packet Delivery Ratio Packet delivery ratio can be defined as the ratio of data packets received by the destination nodes to those generated by the source nodes. The above Figure 4 shows the packet delivery ratio of the proposed model. The graph is plotted against time and the proportion of received and sent packet. Graph shows the fraction of data packets that are successfully delivered during simulation time. The percentage of Packet Delivery Ratio of the proposed model is approximately 98%. V. CONCLUSION This paper proposes fault tolerant mechanism for WSN upon detection of faulty sensor nodes. The data loss at faulty sensor nodes is overcome here by allowing the data transmission through Recovery Nodes. Remaining Energy of sensor nodes is used efficiently. The proposed fault tolerance mechanism improves the throughput and PDR in the network. The PDR in the network is approximately 98%. Thus the proposed system increases the QoS in WSNs. REFERENCES 1. K. Sha, J. Gehlot, and R. Greve, “Multipath routing techniques in wireless sensor networks: A survey,” Wireless Personal Commun., vol. 70, no. 2, pp. 807– 829, 2013. 2. M. Younis and K. Akkaya, “Strategies and techniques for node placement in wireless sensor networks: A survey,” Ad Hoc Netw., vol. 6, no. 4, pp. 621–655, 2008. 3. A. A. Boudhir, B. Mohamed, and B. A. Mohamed, “New technique of wireless sensor networks localization based on energy consumption,” Int. J. Comput. Appl., vol. 9, no. 12, pp. 25–28, Nov. 2010. 4. W. Y. Poe and J. B. Schmitt, “Node deployment in large wireless sensor networks: Coverage, energy consumption, and worst-case delay,” in Proc. ACM, AINTEC, Nov. 2009, pp. 1–8. 5. M. Asim, H. Mokhtar, and M. Merabti, “A fault management architecture for wireless sensor network,” in Proc. IWCMC, Aug. 2008, pp. 1–7. 6. I. Chen, A. P. Speer, and M. Eltoweissy, “Adaptive fault tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks,” IEEE Trans. Dependable Secure Comput., vol. 8, no. 2, pp. 1–35, Mar./Apr. 2011. 7. S.Mathumitha,S. Kavipriya, T.Revathi, “Efficient Fault Node Detection in WSN using RTD Calculation” in IJESC,May.2014. 8. R. N. Duche and N. P. Sarwade, “Sensor node failure or malfunctioning detection in wireless sensor network,” ACEEE Int. J. Commun., vol. 3, no. 1, pp. 57–61, Mar. 2012. 9. P. Jiang, “A new method for node fault detection in wireless sensor networks,” Sensors, vol. 9, no. 2, pp. 1282–1294, 2009. 10. A. Akbari, A. Dana, A. Khademzadeh, and N. Beikmahdavi, “Fault detection and recovery in wireless sensor network using clustering,” IJWMN vol. 3, no. 1, pp. 130–138, Feb. 2011. 11. T. W. Pirinen, J. Yli-Hietanen, P. Pertil, and A. Visa, “Detection and compensation of sensor malfunction in time delay based direction of arrival estimation,” IEEE Circuits Syst., vol. 4, no. 1, pp. 872–875, May 2004. 12. C.-C. Song, C.-F. Feng, C.-H. Wang, and D.-C. Liaw, “Simulation and experimental analysis of a ZigBee sensor network with fault detection and reconfiguration mechanism,” in Proc. 8th ASCC, May 2011, pp. 659–664. 13. M. Lee and Y. Choi, “Fault detection of wireless sensor networks,” Comput. Commun., vol. 31, pp. 3469–3475, Jun. 2008. 14. S. S. Ahuja, R. Srinivasan, and M. Krunz, “Single- link failure detection in all-optical networks using monitoring cycles and paths,” IEEE/ACM Trans. Netw., vol. 17, no. 4, pp. 1080–1093, Aug. 2009. Computer Vision–ECCV 2000, 2000, pp. 751–767, Springer.