The document discusses fault tolerance techniques in wireless sensor networks (WSNs). It first reviews WSNs and types of failures that can occur, such as energy depletion, hardware failure, and communication link errors. It then covers approaches to fault detection including centralized (Sympathy, Secure Locations) and distributed (node self-detection, clustering). Fault recovery techniques like relay node placement, hop-by-hop TCP, and data aggregation are also summarized. The document aims to provide an overview of key aspects of fault tolerance in WSNs.
sensors are what we experience the most in our life. they are even working in our body in different aspects. they may be as eyes, ears, skin, tongue etc. when we combine them they make a network. it may be a human sensor network. but i have shared something interesting about wireless sensor networks.
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
This slides about Wireless sensor network MAC protocol,
There are bunch of MAC protocol in research field.
It classify the MAC protocol and summarize the feature of typical sensor network MAC protcol
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
Wireless sensor network is a type of network which have no communications pattern for communication between nodes, any node can easily join the network and leave the network so attacks are more probable. Gray hole is one of such attacks and it is tough to detect since malicious node switches behavior between normal node and malicious node. For detection and prevention of gray hole attacks our proposed technique is based on Cluster head and RREQ based approach in WSN. In our proposed technique we select a node which has the highest energy as a cluster head and remaining node are marked as work as cluster member. For each node we decide a threshold for sending RREQ if any node generate RREQ more than threshold then we check its RREP threshold value if it’s less than one than cluster head will conclude this node as a malicious node and broadcast its node id so that all other nodes also mark it as malicious node and drop the request arrive from this malicious node and for gray hole detection.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Various Techniques Used in Wireless Sensor Networks for Data TransferIJAEMSJORNAL
Nowadays the wireless sensor networking is the common way for data transfer. So, it is a big task to upload and download data securely without any data loss. as we know in the wireless sensor network there are several nodes which are used to transfer the data. To perform this task there are various data transport protocols available. In this paper, we analyze the various protocol which is used for data transfer in WSN. We also discuss the various challenges which are faced during the data transfer in WSN.
Building Fault Tolerance Within Wsn-A Topology ModelIJAAS Team
Wireless Sensor network plays a crucial role which helps in visualizing, processing, and analyzing the information wirelessly. WSN is a network which consists of huge amount of sensor devices which are of low cost and low powered also known as sensor nodes. These type of networks are generally used in real time applications such as monitoring of environmental conditions, militaries, industries etc., .but the problem that exists in WSN is may be due to different failures such as node failure, link failure, sink failure, interference, power dissipation and collision. If these faults are unable to handle then the desired network criteria’s may not be reached properly which results in inefficiency of the network. So, the main idea behind the investigation is to form a different networking topology which works in the event of failure.
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...IDES Editor
In a Wireless Sensor Network (WSN) having a single
sink, information is given to the distant nodes from beacons
by overhearing. Since it is out of the communication range,
information is not sent directly to the static sink (SS). If a
distant node is not able to communicate directly, then it should
send its own packet to another node which is closer to the
Base Station (BS) so that the received packets are relayed to
the BS by this node. In this paper, we propose a relay node
selection algorithm to reduce contention and improve energy
efficiency. In this algorithm, each data packet of direct
communication should include the received signal strength
(RSS) of the beacon packet. The distant node selects a node
with the maximum RSS value as a relay. The algorithm also
assigns transmitting intervals to each relay node. By our
simulation results, we show that our proposed algorithm
improves the packet delivery ratio and energy efficiency.
In this thesis work, firstly an attempt have been made to evaluate the performance of DSR and OLSR routing protocol in mobile and static environments using Random Waypoint model, and also investigate how well these selected protocols performs on WSNs. energy efficient routing in wireless sensor networks thesis
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
The Wireless Sensor Networks (WSN) is
considered to be one of the most promising emerging
technologies. However one of the main constraints which
is holding back its wide range of applications is the
battery life of the sensor node and thus effecting the
network life. A new approach to this problem has been
presented in this paper. The proposed method is suitable
for event driven applications where the event occurrence
is very rare. The system uses spread spectrum as a means
of communication.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
2. Outline
Review of Wireless Sensor Network
Fault Tolerance in WSNs
Fault Detection
Fault Recovery
Relay Node Placement in Wireless Sensor Networks
Hop-by-Hop TCP for Sensor Networks
Conclusion
2
3. Review of Wireless Sensor Network
A WSN is a self-organized network that consists of a large number
of low-cost and low powered sensor devices, called sensor nodes
Can be deployed on the ground, in the air, in vehicles, on bodies,
under water, and inside buildings
Each sensor node is equipped with a sensing unit, which is used to
capture events of interest, and a wireless transceiver, which is used
to transform the captured events back to the base station, called
sink node
Sensor nodes collaborate with each other to perform tasks of data
sensing, data communication, and data processing
3
4. Type of failure in WSNs
Energy depletion
Have very limited energy and their batteries cannot usually be recharged or
replaced, due to hostile or hazardous environments
Hardware failure
A sensor node has two component: sensing unit and wireless transceiver
Usually directly interact with the environment, which is subject to variety of physical,
chemical, and biological factors.
Communication link errors
Even if condition of the hardware is good, the communication between sensor
nodes is affected by many factors, such as signal strength, antenna angle,
obstacles, weather conditions
Malicious attack
It results in low reliability of performance of sensor nodes.
Therefore, fault tolerance is one of the critical issues in WSNs
4
6. Sympathy[4]
Using a message-flooding approach to pool event data and current
states (metrics) from sensor node
Nodes periodically send metrics back to a sink to detect failures and
cause of failure
Given sensor hardware and network limitations, these transmitted
metrics must be minimized
Insufficient data at the sink implies failure; sufficient data at the sink
implies acceptable network behavior
Based on these metrics, it detects which nodes or components have
not delivered sufficient data and infers the causes of failures
6
7. Secure Locations[5]
Work on location-aware sensor networks
Introduces a scalable trust-based routing protocol (TRANS)
Select trusted paths that do not include misbehaving
nodes by identifying the insecure locations and routing
Include two parts:
1. trust routing
2. insecure location discovery and isolation
7
8. Secure Locations (cont’d)
Select a secure path and avoid insecure locations
All destination nodes use TESLA, to authenticate all requests
1. sink creates a message with( source location, destination
location, authentication message)
2. encrypts this message with its share key and broadcasts it.
3. neighbors who know its shared key will be able to decrypt the
request
4. trusted neighbor decrypts the request, adds its location,
encrypts the message with its share key and sends it to
neighbors
8
9. Secure Locations (cont’d)
Use Expanding TTL Search (ETS).
1. Sink marks data packets with increasing hop-count
2. Each intermediate node decrements the hop-count before
forwarding
3. When hop count reaches zero node sends ACK to the
source informing it of its location is safe
4. The source identifies that part of the path as safe and
increases the hop count in subsequent packets.
9
10. Advantage & Disadvantage of Centralize
Approaches
The centralized approach is efficient and accurate to identify
the network faults in certain ways
Resource-constrained sensor networks can not always afford
to periodically collect all the sensor measurements and states
in a centralized manner
Central node easily becomes a single point of data traffic
concentration in the network, as it is responsible for all the
fault detection and fault management
This subsequently causes a high volume of message traffic and
quick energy depletion in certain regions of the network,
especially the nodes closer to the base station
10
11. Advantage & Disadvantage of Centralize
Approaches(cont’d)
This approach will become extremely inefficient and expensive
in consideration of a large-scale sensor network
Multi-hops communication of this approach will also increase
the response delay from the base station to faults occurred in
the network
Therefore, we have to seek a localized and more
Computationally efficient fault detection model
11
12. Distributed Approach & Node Self-detection
Use flexible circuit acts as a sensing layer around a node,
capable of sensing the physical condition of a node.
Detect physical faults requires the use:
1. Hardware interface consists of a
sensing layer(wraps around the node).
1. Software interface reads the sensors,
Figure 1: SYS25 node.
and transmits the data to the Sink
Use TinyOS( have very small footprint, energy-aware, event-based )
12
13. Distributed Approach & Clustering
Approach MANNA
Design for event-driven WSN
Clustering use for building scalable and energy balanced applications
for WSNs
Distribute fault management into each cluster
Management agents execute in the cluster-heads
This mechanism decreases the information flow and energy
consumption as well
A manager is located externally to the WSN has a global vision
13
14. Distributed Approach & Clustering
Approach MANNA
Management application is divided into two phases:
Installation
Occurs as soon as the nodes are deployed in the network.
Each node report its position and energy to the agent located in the
cluster-head.
Agent sends a LOCATION TRAP and ENERGY TRAP to the
manager
Manager build topology map model and the WSN energy model
14
15. Distributed Approach & Clustering
Approach MANNA
Management application is divided into two phases:
Operation
Each node report its energy level and position to the agent
whenever there is a state change (another ENERGY TRAP or
LOCATION TRAP)
Manager rebuild topology map model and energy model
Manager sends GET operations in order to retrieve the node
state
15
16. Fault Recovery
WSN restructured or reconfigured, in such a way that
failures or faulty nodes do not impact further on network
performance
The most commonly used technique for fault recovery is
replication or redundancy of components that are prone
to be failure
When some nodes fail to provide data, the base station still
gets sufficient data if redundant sensor nodes are deployed in
the region
16
18. Relay Node Placement in Wireless Sensor
Networks(Two-Tiered Wireless Sensor Networks)
Improving reliability and prolonging lifetime of WSNs
Energy consumption is proportional to d for transmitting over
distance d, where is a constant in the interval , long distance
transmission in WSNs is costly
Employs some powerful relay nodes whose main function is to
gather information from raw data from sensor nodes and relay the
information to the sink
Relay nodes serve as a backbone of the network
The relay nodes are more powerful than sensor nodes ( energy
storage, computing, and communication capabilities)
18
19. Two-Tiered Wireless Sensor Networks
Each cluster has only one cluster head and each sensor
belongs to at least (backup cluster heads)
Receiver of a relay node fails
Data sent by the sensors will be lost
Sensor to be reallocated to other cluster heads
Handle general communication faults
There should be at least two node-disjoint paths between each
pair of relay nodes in the network
19
20. Two-Tiered Wireless Sensor Networks
An intuitive objective of relay node placement in two-tiered
WSNs is to place the minimum number of relay nodes, such
that some degree of fault tolerance can be achieved.
There are other works that study placement of sensor nodes
to make a sensor network k-connected
20
21. Hop-by-Hop TCP for Sensor Networks
Why conventional TCP protocol can not be used?
Communication links in a sensor network are unstable
TCP protocol over a high loss rate will suffer from severe
performance degradation
Sensor may not have sufficient computing power to implement
the entire TCP/IP protocol
Hop-by-Hop TCP for Sensor Networks
Aiming to accelerate reliable packet delivery
Minimizing end-to-end packet delivery time without too much
throughput degradation
Minimizing the number of retransmissions
21
22. Hop-by-Hop TCP for Sensor Networks
Every intermediate node execute a light-weight local
TCP
Include two part:
1. End-to-End TCP
Working on the source and destination nodes
2. One-Hop TCP
Working on every node
The sender module of a One-Hop TCP is working at the
sender end of a link, and the receiver module is working at the
receiver end.
22
23. Hop-by-Hop TCP for Sensor Networks
Figure2. Protocol Stack Hop by Hop TCP
23
24. End-to-End TCP
Reuse an existing popular TCP protocol, NewReno, with
several modifications
1. Sender module forwards packets to the One-Hop TCP
module
2. Receiver module receives packets from the One-Hop TCP
module
3. One-Hop TCP in each node forwards data packets hop by
hop
4. End-to-End ACKs, are forwarded to the source node using
One-Hop TCP in the opposite direction
5. Set a larger initial RTO value
24
25. One-Hop TCP
A light-weight version of TCP running on each node to
forward received packets reliably
Many TCP features, such as packetization and congestion
control, are removed
1. Add the IP address of current node to the packet header
(receiver knows where to send Local ACK)
2. Set CWND to 1
3. Set the upper threshold for the number of
retransmissions.
25
26. RideSharing: Fault Tolerant Aggregation
Aggregation use for filter redundancy and reduce communication
and energy consumption
Multipath routing can overcome losses by duplicating and
forwarding each sensor measurement
One or more other sensors have correctly overheard the packet
Some aggregate functions, such as SUM, COUNT, are duplicate-
sensitive
Use RideSharing (RS) scheme for fault-tolerant, duplicate-sensitive
aggregation
26
27. RideSharing: Fault Tolerant Aggregation
Edges are classified into three types: primary, backup, and side
edges
Using a small bit vector that each parent attaches to each data
message it sends
Parents detect link errors
when one or more children
are missing from the bit vector
Figure3. Track Topology
27
28. Cascaded RideSharing
Each parent broadcasts children ids and their bit positions
inside its bit vector
When an error occurs, each backup parent decides whether
or not to correct the error based on its order in a correction
sequence(parent with smallest id)
28
29. References
[1] Hai Liu, Amiya Nayak, and Ivan Stojmenovi ' Fault-Tolerant Algorithms/Protocols in
Wireless Sensor Networks' Department of Computer Science, Hong Kong Baptist
University, Springer-Verlag London Limited 2009
[2] M.Yu, H.Mokhtar, and M.Merabti, 'A Survey on Fault Management in Wireless Sensor
Networks' School of Computing & Mathematical Science Liverpool John Moores
University, 2007
[3] Farinaz Koushanfar1, Miodrag Potkonjak2, Alberto Sangiovanni-Vincentelli1, ' FAULT
TOLERANCE IN WIRELESS SENSOR NETWORKS'1Department of Electrical Engineering
and Computer Science Univeristy of California, Berkeley , CA, US 94720, 2Department of
Computer Science Univeristy of California, Los Angeles Los Angeles, CA, US 90095
[4] Nithya Ramanathan, Kevin Chang, Rahul Kapur, Lewis Girod, Eddie Kohler, and eborah
Estrin,' Sympathy for the Sensor Network Debugger' UCLA Center for Embedded Network
Sensing, ACM 2005
29
30. References(cont’d)
[5] Jessica Staddon, Dirk Balfanz, Glenn Durfee' Efficient Tracing of Failed Nodes in
Sensor Networks ', September 28, 2002, Atlanta, Georgia, USA,ACM.
[6] Sapon Tanachaiwiwat1, Pinalkumar Dave1, Rohan Bhindwale2, Ahmed Helmy1,'
Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-Aware
Sensor Networks ' 1. Department of Electrical Engineering – Systems 2. Department of
Computer Science University of Southern California, ACM 2003
[7] Gaurav Gupta1, Mohamed Younis2, ' Fault-Tolerant Clustering of Wireless Sensor
Networks ', Dept. of Computer Science and Elec. Eng. Dept. of Computer Science and
Elec. Eng. University of Maryland Baltimore County University of Maryland Baltimore
County 2003 IEEE
30
31. References(cont’d)
[8] Jinran Chen, Shubha Kher, and Arun Somani,' Distributed Fault Detection of Wireless
Sensor Networks' Dependable Computing and Networking Lab Iowa State University
Ames, Iowa 50010, 2006 IEEE
[9] Sameh Gobriel, Sherif Khattab, Daniel Moss´e, Jos´e Brustoloni and Rami Melhem,’
RideSharing: Fault Tolerant Aggregation in Sensor Networks Using Corrective Actions’,
Computer Science Department, University of Pittsburgh,2006
[10] Weiyi Zhang, Guoliang Xue and Satyajayant Misra,'Fault-Tolerant Relay Node
Placement in Wireless Sensor Networks', Department of Computer Science and
Engineering at Arizona State University, IEEE INFOCOM 2007
[11] S Harte1, A Rahman1, K M Razeeb2 'FAULT TOLERANCE IN SENSOR NETWORKS
USING SELF-DIAGNOSING SENSOR NODES', 1 University of Limerick, Ireland 2 Tyndall
National Institute, Ireland,2005
31