SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 4, August 2020, pp. 4416~4425
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i4.pp4416-4425  4416
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Self-checking method for fault tolerance solution
in wireless sensor network
Muayad Sadik Croock, Saja Dhyaa Khuder, Zahraa Abbas Hassan
Computer Engineering Department, University of Technology, Iraq
Article Info ABSTRACT
Article history:
Received Jan 6, 2020
Revised Mar 22, 2020
Accepted Mar 28, 2020
Recently, the wireless sensor network (WSN) has been considered in
different application, particularly in emergency systems. Therefore, it is
important to keep these networks in high reliability using software
engineering techniques in the field of fault tolerance. This paper proposed
a fault node detection method in WSN using the self-checking technique
according to the rules of software engineering. Then, the detected faulted
node is covered employing the reading of nearest neighbor nodes (sensors).
In addition, the proposed method sends a message for maintenance to solve
the fault. The proposed method can reduce the time between the detection
and recovery of a fault to prevent the confusion of adopting wrong readings,
in which the detection is making with mistake. Moreover, it guarantees
the reliability of the WSN, in terms of operation and data transmission.
The proposed method has been tested over different scenarios and
the obtained results show the superior efficiency in terms of recovery,
reliability, and continuous data transmission.
Keywords:
Fault tolerance
Self-checking technique
Software engineering
WSN
Copyright Β© 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Muayad Sadik Croock,
Department of Compute Engineering,
University of Technology,
Al-sinaa Street, Baghdad, Iraq.
Email: 1
Muayad.S.Croock@uotechnology.edu.iq; 2
120099@uotechnology.edu.iq;
3
120052@uotechnology.edu.iq
1. INTRODUCTION
It is well known that the WSN has been considered in numerous fields of the modern life, such as
smart buildings and emergency systems [1]. These applications provide the WSN with high importance and
should be more reliable, flexible and extendable. These properties have been addressed by designing
the software algorithms according to the software engineering techniques [2]. The fault tolerance method is
one of the most important part in the software engineering that can guarantee the operation of a system with
high reliability. To be more precise, the self-checking technique can be considered for checking the status of
such system based on the readings with the time. The concepts of this technique are built on allocating upper
and lower threshold values for right operation to any part of a system. These values are used for checking
the validity of the system, in which the fault can be detected efficiently [3].
In general, the fault in WSN are occurred mainly in the nodes (sensors) [1]. These faults can be
classified into hardware and software. These two classifications are also being under the permanent and
temporary faults. As mentioned above, the self-checking approach is used for detecting the fault of nodes and
the monitoring system sends a message for maintenance for solving the occurred problems [2]. Throughout
the maintenance procedure, the system can cover this error in different ways depending on the design and
status of the related conditions [3].
In this paper, a monitoring system for WSN is proposed based on software engineering techniques.
The proposed method adopts the fault tolerance approach for managing the operation of nodes inside
Int J Elec & Comp Eng ISSN: 2088-8708 
Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock)
4417
the WSN. In the fault detection part of the proposed method, the self-checking technique is considered with
upper and lower threshold for each node included in a cluster. The designed WSN contains numerous clusters
and each of which includes different nodes. At a time that the fault is occurred in a node, the proposed
method takes the neighbor nodes reading to tackle the problem in an efficient way. The recovery operation is
performed by calculating the average value of nearest neighbor nodes until the fault is solved. The proposed
system is tested under different conditions and the achieved results prove the satisfactory in terms of
accuracy and efficiency.
2. RELATED WORK
The applications of WSN and related supported systems attract the attentions of numerous
researchers in distinct fields. Each group of them tackled a side of appeared problems, such as faults, data
transmission. All these researches focused on introducing robust systems with high accuracy, reliability,
flexibility and extendibility. Therefore, the concepts and approaches of software engineering were adopted.
In [4], the authors presented a developed management method for WSN based on software
engineering rules. They classified the situations of WSN in terms of infrastructure and found the suitable
adapting software. While the authors of [5] proposed a real time oil and gas monitoring system based on
WSN using the software development as a part of software engineering. The presented system took care of
different equipment, such as pumps, sensors and metering infrastructure. In addition, it managed the flow of
oil and gas sequentially. In [6], a new framework for WSN was presented. The introduced framework
was built based on software engineering challenges including flexibility and scalability. It worked as
a middleware that could manage the data mining, energy consumption and self-organization. In addition,
the authors of [7] performed a modeling framework for analyzing the features in terms of variation and
commination. These features provided a complete view for the WSN based agriculture system. All proposed
algorithms and software were designed under the rules of software engineering. In [8], a searching based on
software engineering was implemented in WSN. The implemented method adopted the multi-objective
algorithm to be solved using genetic method. It also considered the fixed obstacles in the searching process.
The authors of [9] introduced hardware and software infrastructure for WSN based on the regulation of
software engineering, particularly the software requirements. The focused on the receiver and how it
described itself to the others nodes of WSN. The work was done in physical layer in real time situation.
It is important to note that the test results of the literature research works were clear enough to prove
the claim of authors.
At the other hand, the fault tolerance of software engineering was adopted in solving the problem of
reliability. In [10], a survey on fault detection and the solutions were presented. It considered the relation
between different types of faults in WSN nodes and the choosing of suitable fault detector as well as fault
tolerance method. This relation could lead to the root of faulted node, in which the solution was presented.
The authors of [11] proposed a management architecture of WSN based on fault tolerance approach.
The proposed architecture tackled two sides of challenges inside WSN. The first one is the power
consumption, while the other side is the fault tolerance to cover the self-organized network. This was to
increase the reliability of the WSN and become fault tolerance. In [12], a new trend of guaranteeing
the reliability of WSN was presented based on fault tolerance method. Both theory and applications were
considered in the oriented research. In [13], a cluster head based fault tolerance system was proposed.
The objectives of the proposed system were to keep eye on the WSN throughout the operation in terms of
data transmission, mobility and fault occur.
The solutions were also provided to guarantee the reliability. The authors of [14] used an agent
factor to propose a fault tolerance method for WSN. The platform of the proposed method worked across
different levels including sensors, cluster heads and base stations. In [15], the researchers employed the fault
tolerance method for reducing the redundancy and packet loss over the broken links (paths) of WSN and
finding the solutions to keep the WSN in operation. Moreover, they supported the security of the data
transmission using cryptography methods. The authors of [16] designed a software engineering based fault
detection method for optimization method that was proposed. In [17], a list of the recent methods of fault
detection and diagnosing was presented. It included a real survey on fault detection in WSN. The researchers
of [18] proposed a fault detection based clustering network. The proposed method involved two sides; firstly,
the cluster configuration, while the other is fault detection and recovery. In [19], a method of solving
the problem of node isolation in AGR-MAC protocol was presented. The proposed method used fault
tolerance technique for maintaining the isolation problem. The authors of [20] proposed a guaranteed
algorithm of bioinformatic connectivity in WSN based on fault tolerance technique for ambulance system.
In [21], a WSN based wildfire detection system was proposed based on self-organization and fault
tolerance approaches.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425
4418
At the other hand, a system based virtual biological community of nature living style has been
proposed. The evolutionary game method was adopted to introduce a fault tolerance procedure for managing
the problems of WSN [22]. In [23], a fault tolerance method was presented for solving the problem of cluster
head failures. This was done by planning the solution based on virtual heads and the collected information.
The researcher of [24] proposed a data transmission protocol in save situation using fault tolerance method.
This protocol used the residual information regarding the links of WSN to build a plan for tolerant the faults.
In [25], the cluster head selection method was proposed based on fault tolerance and fuzzy-logic approaches.
The soft computing method provided the system with optimality in allocating the cluster head, in which
the failure is covered well. In [26, 27], different methods for WSN structure and clustering methods have
been proposed to solve numerous problem. They used software engineering regulations in building
the proposed methods.
3. THE PROPOSED SYSTEM
As mentioned earlier, the proposed system includes two sides of work based on software
engineering methods that are used for guarantee the reliability of the adopted WSN. The first one is related to
detect the occurred fault in a node at the adopted WSN using the self-checking method. While the second one
takes care of finding the solution of the detected fault using the available tolerance in finding the recovery
values within the neighborhood area.
3.1. System structure
In this section, the general structure of the proposed system is explained as a block diagram shown
in Figure 1. It is shown that the collected reading data from the underlying sensors of allocated WSN is
entered to the fault detection unit. This unit is responsible on detecting the fault that can be occurred in
a node using the self-checking approach. This approach is based on upper and lower threshold values for
each sensor as a tolerance range. The received values that fall within the outage tolerance area is classified as
a fault. If there is no detected fault, the data is sent to the system safely.
Figure 1. The proposed system structure
The detected faults are passed to the fault tolerance unit. This unit is responsible on finding
the solution to the problem of fault using the available tolerances. The solution adopted in the proposed
method uses the values of neighbor nodes with correct values for guessing the expected reading of the faulted
sensor node. Whilst the processing of finding the solutions, a communication between fault detection unit
and fault tolerance unit. The reason behind this communication is exchanging the information and correct any
error can be happened in finding the tolerant solution. The results of fault detection and the tolerant solution
is applied to send the corrected readings as well as the estimated reading to the system for continuing
the process.
3.2. Proposed algorithm
It is well known that the software algorithm is necessary to be proposed for managing the fault
detection and finding the solution. In this section, the proposed algorithm is presented as a flowchart,
shown in Figure 2.
Int J Elec & Comp Eng ISSN: 2088-8708 
Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock)
4419
Figure 2. Flowchart of the proposed algorithm
Based on the flowchart of the proposed algorithm, the working procedure can be summarized in
the following:
a. Collecting the readings of the sensor nodes in the adopted WSN.
b. Checking the validity of the received readings by the cluster head. In case the readings are not valid,
a request is sent back to the nodes for providing another copy of readings.
c. The valid readings are checked for fault detection using the self-checking process based on the upper
and lower threshold as explained mathematically in (1):
𝜸 𝒖𝒑𝒑𝒆𝒓 β‰₯ 𝜹(π’Š, 𝒋) β‰₯ πœΈπ’π’π’˜π’†π’“ (1)
Where 𝜸 𝒖𝒑𝒑𝒆𝒓 and πœΈπ’π’π’˜π’†π’“ are the upper and lower threshold values. In case of fault occur, the proposed
algorithm sends the information to the next step. Otherwise, the readings can be passed to the system.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425
4420
It is important to highlight that the 𝜸 𝒖𝒑𝒑𝒆𝒓 and πœΈπ’π’π’˜π’†π’“ values are selected depending on the type of used
sensor as well as the surrounding conditions.
d. The faulted readings are passed to the fault tolerance unit. This unit adopts the valid readings of
the close neighbour nodes. The most important condition is the validity of these reading as could be
happened the even the close neighbour readings have faults as well according to the following equation:
𝛿(π’Š, 𝒋) =, {
𝜹(π’Š Β± π’Œ, 𝒋 Β± π’Œ), 𝜸 𝒖𝒑𝒑𝒆𝒓 β‰₯ 𝜹(π’Š Β± π’Œ, 𝒋 Β± π’Œ) β‰₯ πœΈπ’π’π’˜π’†π’“
𝜹(π’Š, 𝒋) , π’π’•π’‰π’†π’“π’˜π’Šπ’”π’†
} (2)
Where 𝜹(π’Š, 𝒋) is the instant reading of a node with location (i,j) in the covered area. 𝜸(π’Š Β± π’Œ, 𝒋 Β± π’Œ) is
the next neighbor readings, increased by π’Œ ∈ 𝑲 total WSN dimension, and k={1,2,3,…,K}.
e. It is noted from (2) hat the instant reading of a node can be replaced with the neighbour nodes in case
they are valid. In order to increase the validity of estimation and the accuracy, the average value can be
adopted amongst the valid close neighbours in the estimation process. Therefore, the estimated value
𝐸 𝛿(π’Š,𝒋) of reading of a node 𝛿(π’Š, 𝒋) is mathematically written as:
𝑬 𝜹(π’Š,𝒋) =
𝟏
𝑡 𝒏𝒐𝒅𝒆
βˆ‘ 𝜹(π’Š Β± π’Œ, 𝒋 Β± π’Œ)𝑲
π’Œ=𝟏 (3)
Where 𝑡 𝒏𝒐𝒅𝒆 is the total number of adopted neighbor nodes to the underlying node 𝛿(π’Š, 𝒋).
f. Checking the estimated value of a node 𝑬 𝜹(π’Š,𝒋) if it is within the upper and lower threshold vlues as:
𝜸 𝒖𝒑𝒑𝒆𝒓 β‰₯ 𝑬 𝜹(π’Š,𝒋) β‰₯ πœΈπ’π’π’˜π’†π’“ (4)
g. Sending the valid values (sensors’ readings) to the system for future processing.
4. RESULTS
In order to test the proposed method that has been explained in early sections, a simulation model is
adopted. The proposed model includes a WSN with four clusters, each of which involves cluster head and six
sensors, as shown in Figure 3. The cluster heads are connected to the device manager as a base station.
Temperature sensors are adopted in this simulated model that can be changed to different types of sensors.
This model is built using Visual Studio C# language and the interface presents the results in numerous color
for more explanation. The green boxes represent the well working nodes, while the red boxes are the faulted
nodes. Inside each box, the instant sensor reading is shown. The nodes are connected to the cluster head
within each one individually.
Figure 3. Simulated model interface, case study
Int J Elec & Comp Eng ISSN: 2088-8708 
Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock)
4421
Different case studies have been considered to test the system under changeable conditions.
The case study, shown in Figure 3, explains that the cluster one has three faulted sensor nodes, mentioned in
red color. In addition, cluster two involves two faulted sensors with red label. Moreover, cluster three
includes a faulted sensor, while the fourth cluster points three sensor nodes to be faulted. Depending on
the proposed algorithm and based on equations (1-4), the proposed method compensates the faulted readings
with estimated values. It is important to note that the proposed algorithm amongst all clusters checks
the readings of neighbor nodes if they are within the thresholds to be considered. Otherwise, it considers
the next neighbor instead to guarantee the estimation with minimum error occur. The simulation parameters
are built based on the upper and lower threshold of (35o
c) and (55o
c), sequentially, for a whole July month
in Baghdad city at Iraq.
Figure 4 shows the same case study of Figure 3 after applying the proposed algorithm. I can be seen
that the faulted readings of the sensors in all clusters are estimated based on the neighbors and labeled in blue
color. As mentioned earlier, the results are measured for thirty days among July month. The performance of
each sensor in all clusters can be measured accurately. Figure 5 shows the performance of sensor nodes in
cluster one. The case here that there is no fault is detected, and all sensors are working well in cluster one.
It is seen that the whole readings are within the validity range between upper and lower thresholds.
Figure 4. Case study of Figure 3 after applying the proposed algorithm
Figure 5. Cluster one performance in case of normal working
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425
4422
At the other hand, the same cluster one passes by worst conditions, in which there are three sensors
suffer from faults. This can lead to changing in the readings of these sensors. These faults are detected using
the proposed algorithm that is based on self-checking process. The detected faults are compensated by
applying the proposed fault tolerance method based on the neighbor nodes as explained earlier.
Figure 6 explains the readings of sensors inside cluster one, where the faulted readings exceed the upper
threshold values. It is shown that the faults are started at day seven, twelve and fourteen, sequentially.
Figure 6. Cluster one performance in case of fault detection
Now the proposed method should solve this problem by applying the presented algorithms. This is
done efficiently as shown in Figure 7. The faulted readings are fixed by estimating replaced values depending
on the valid readings of neighbor nodes. To be more precise, sensor node number four in cluster one has been
analyzed in Figure 8. It is shown that the estimated values of this sensor are within the validity range between
thresholds with acceptable error.
Figure 7. Cluster one performance in case of fixing faults
Int J Elec & Comp Eng ISSN: 2088-8708 
Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock)
4423
Figure 8. Sensor four analysis regarding normal, fault and fixed
Figure 9 illustrates the performance of the adopted WSN with four clusters. For each cluster,
the average values of normal, faulted and fixed cases are evaluated according to the following equation:
𝑨𝒗 𝜹(π’Š,𝒋)(𝒛) =
𝟏
𝑡 𝑻𝒐𝒕𝒂𝒍
βˆ‘ βˆ‘ 𝜹(π’Š, 𝒋)
𝑱
𝒋=𝟏
𝑰
π’Š=𝟏 (5)
where 𝑨𝒗 𝜹(π’Š,𝒋)(𝒛) is the average values of the cluster z, and z={1, 2, 3, …, Z} and Z is the number of clusters
within the WSN. 𝑡 𝑻𝒐𝒕𝒂𝒍 is the number of all readings of sensors inside the cluster z, represented as a matrix
of (6 X 30) for six sensors and thirty days. I is considered as the number of sensors, which is six, while J
represents the number of days (thirty days). These values are compared in this figure and shown that
the estimated values are very close to the normal ones, while the faulted reading increased in notable way.
This means that the proposed algorithm and method are working in efficient way.
Figure 9. The total cluster performance for normal, faulted and fixed cases
Table 1 shows the recorded readings of sensors over thirty days of July month for cluster three at
the present of fault occur, as an example to the proposed system fault monitoring. It can be seen that
the values of readings of the 6th
sensor are increased sharply after the 10th
day as the fault happened.
In addition, the readings of sensor four decreased to become zeros and this is indicated as a fault as the values
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425
4424
went down the lower threshold starting from day 11th
. At the other hand, sensor two provides wrong readings
after 23rd
day, where the values are increased notably. The values, highlighted with yellow color,
are recorded as faults due to the exceeding of upper and lower thresholds (25-55o
c), which are the maximum
and minimum temperatures among this month.
Table 1. Cluster 3 sensors after fault (in sensor 2, 4, 6)
Day Sensor 1 Sensor 2 Sensor 3 Sensor 4 Sensor 5 Sensor 6
1. 36 43 31 38 34 47
2. 40 40 49 40 43 49
3. 44 37 31 34 31 48
4. 39 42 41 44 32 32
5. 47 32 36 49 34 38
6. 50 36 48 43 41 36
7. 46 48 41 49 50 34
8. 46 46 32 30 49 37
9. 32 33 31 45 40 43
10. 49 44 48 45 37 76
11. 39 37 40 0 39 70
12. 40 39 38 0 43 71
13. 34 38 39 0 31 76
14. 33 30 49 0 45 74
15. 39 43 34 0 35 71
16. 41 49 30 0 45 70
17. 47 42 43 0 38 75
18. 41 40 33 0 38 63
19. 41 50 49 0 40 78
20. 45 34 34 0 34 68
21. 47 45 38 0 40 68
22. 32 42 35 0 32 74
23. 46 65 49 0 49 74
24. 38 65 31 0 32 63
25. 45 59 34 0 31 60
26. 33 75 37 0 31 58
27. 35 66 30 0 47 74
28. 37 68 31 0 36 63
29. 34 64 50 0 40 77
30. 33 75 30 0 39 78
It is important to note that the proposed algorithm does not change the complexity of the WSN as
there is no any addition to the hardware side. In addition, in fault appearance cases, the solution is produced
until they are fixed. Therefore, the proposed algorithm consumed a sensible time to recover the errors,
in which the real-time concepts are still satisfied.
5. CONCLUSION
This paper proposed a software engineering based fault tolerance method for fault detection and
introducing a solution in WSN. The proposed method adopted the self-checking process for fault detection.
In addition, the proposed algorithm considered the neighbor sensor nodes to estimate the faulted readings in
efficient way. The average value of the close neighbors was adopted in the proposed algorithm to increase
the accuracy of estimation as well as the reliability. In case of fault occur in the close neighbor node, the next
valid one was considered. It is important to note that the robust response of the proposed method allowed
the use in real-time system with high activity of fault tolerance. The proposed method was tested over
different case studies at an assumed simulation model with different clusters in WSN. The obtained results
showed the proved performance of the proposed method in terms of reliability and accuracy.
REFERENCES
[1] Hossam Mahmoud Ahmad, β€œWireless Sensor Networks Concepts, Applications, Experimentation and Analysis,”
Springer, 2016.
[2] Ian Sommerville, β€œSoftware engineering,” 10th
Edition, Pearson Education, Inc, 2017.
[3] Miikka Kuutilaa, Mika Mantylaa, Umar Farooqa, and Maelick Claes, β€œTime Pressure in Software Engineering:
A Systematic Review,” Esliver, 2020.
[4] V. V. Phoha and Shashi Phoha, β€œSituation-Aware Software Engineering for Sensor Networks,” 2nd International
Conference on Communication Systems Software and Middleware, 2007.
Int J Elec & Comp Eng ISSN: 2088-8708 
Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock)
4425
[5] Ayuba J, Safwana H, and Abdulazeez Y, β€œSoftware Development of Integrated Wireless Sensor Networks For
RealTime Monitoring of Oil and Gas Flow Rate Metering Infrastructure,” Journal of Information Technology &
Software Engineering, vol. 8, no. 2, pp. 1-10, 2018.
[6] Savitha S, S C Linga Reddy, Sanjay Chitnis, β€œEnergy Efficient Clustering and Routing Optimization Model for
Maximizing Lifetime of Wireless Sensor Network,” International Journal of Electrical and Computer Engineering
(IJECE), vol. 10, no. 5, 2020.
[7] Sridhar R., and N. Guruprasad, β€œEnergy efficient chaotic whale optimization technique for data gathering in
wireless sensor network,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4,
pp. 4176-4188, 2020.
[8] Abdusy Syarif, Abdelhafid Abouaissa, Lhassane Idoumghar, Achmad Kodar, Pascal Lorenz, β€œSearch Based
Software Engineering on Evolutionary Multi-Objective Approach,” IEEE- ICC Next-Generation Networking and
Internet Symposium, 2016.
[9] Aaditiya Venkat Kannan, β€œHardware and Software Architecture of Wireless Sensor Networks,” Journal of
Advances in Computer Networks, vol. 2, no. 3, pp. 207-210, 2014.
[10] Emmanuel Effah, Ousmane Thiare, β€œSurvey: Faults, Fault Detection and Fault Tolerance Techniques in Wireless
Sensor Networks,” International Journal of Computer Science and Information Security, 2018.
[11] Khadidja El Merraoui, Abdellaziz Ferdjouni, M’hamed Bounekhla, β€œReal time observer-based stator fault diagnosis
for IM,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 210-222, 2020.
[12] Sushruta Mishra, Lambodar Jena, Aarti Pradhan, β€œFault Tolerance in Wireless Sensor Networks,” International
Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 10, pp. 146-153, 2014.
[13] Manasvi Mannan, and Shashi B. Rana, β€œFault Tolerance in Wireless Sensor Network,” International Journal of
Current Engineering and Technology, vol. 5, no. 3, pp. 1785-1788, 2015.
[14] A.V. Sutagundar, Vidya S. Bennur, Anusha A. M. Bhanu K. N., β€œAgent Based Fault Tolerance in Wireless Sensor
Networks,” International Conference on Inventive Computation Technologies (ICICT), 2016.
[15] H.S.Annapurna, and M.Siddappa, β€œSecure Data Aggregation with Fault Tolerance for Wireless Sensor Networks,”
International Conference on Emerging Research in Electronics, Computer Science and Technology, 2015.
[16] TaoChena, MiqingLi, and XinYaocb, β€œStanding on the shoulders of giants: Seeding search-based multi-objective
optimization with prior knowledge for software service composition,” Journal of Information and Softwrae
Technology, vol. 114, pp. 155-175, 2019.
[17] Zeyu Zhang, Amjad Mehmood, Lei Shu, Zhiqiang Huo, Yu Zhang and Mithun Mukherjee, β€œA Survey on Fault
Diagnosis in Wireless Sensor Networks,” IEEE Access, vol. 8, pp. 11349-11364, 2018.
[18] Mehdi Nazari Cheraghlou, Ahmad Khadem-Zadeh and Majid Haghparast, β€œA New Fault-Tolerant Clustering
Protocol for Wireless Sensor Networks,” International Journal of Security and Its Applications, vol. 12, no. 4,
pp. 29-40, 2018.
[19] Myeongseung Han, Eun-Sung Cho, Jun-hyuk Lee, and Intae Ryoo, β€œA Study on Fault Tolerance Technique for
AGR-MAC Protocol based Sensor Networks,” International Conference on Information Networking (ICOIN),
pp. 457-460, 2019.
[20] Asmaa Shaalan Abdul Munem, and Muayad Sadik Croock, β€œSmart Traffic Light Control System for Emergency
Ambulance,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET),
vol. 5, no. 1, 2016.
[21] Felipe Taliar Giuntini, Delano Medeiros Beder and JoΒ΄ Ueyama, β€œExploiting Self-organization and Fault Tolerance
in Wireless Sensor Networks: A Case Study on Wildfire Detection Application,” International Journal of
Distributed Sensor Networks, vol. 13, no. 4, pp. 1-16, 2017.
[22] Ricardo VillalΓ³n and Patrick G. Bridges, β€œFault-Tolerant Wireless Sensor Networks using Evolutionary Games,”
PhD Thesis, The University of New Mexico, 2012.
[23] Jenn-Wei Lin, Pethuru Raj C., Meng-Chieh H., and Jia-Xin H., β€œEfficient Fault-Tolerant Routing in IoT Wireless
Sensor Networks Based on Bipartite-Flow Graph Modeling,” IEEE Access, vol. 7, pp. 14022-14034, 2019.
[24] L. Mottola, G. P. Picco, F. J. Oppermann, et al, β€œSimplifying the Integration of Wireless Sensor Networks into
Business Processes,” IEEE Transaction on Software Engineering, vol. 45, no. 6, pp. 576-596, 2019.
[25] Farnaz Pakdel 1, Mansour Esmaeilpour, β€œFuzzy Logic Method for Enhancement Fault-Tolerant of Cluster Head in
Wireless Sensor Networks Clustering,” TEM Journal, vol. 5, no. 3, pp. 268-277, 2016.
[26] Evizal Abdul Kadir, Hitoshi Irie, Sri Listia Rosa, and Mahmod Othman, β€œModelling of wireless sensor networks
for detection land and forest fire hotspot,” TELKOMNIKA (Telecommunication, Computing, Electronics and
Control), vol. 17, no. 6, pp. 2772-2781, 2019.
[27] Ngan Nguyen, Quoc Cuong Nguyen, and Minh Thuy Le, β€œA novel autonomous wireless sensor node for IoT
applications,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 17, no. 5,
pp. 2389-2399, 2019.

More Related Content

What's hot

Redundant secure timing sources and timing distribution to digital power prot...
Redundant secure timing sources and timing distribution to digital power prot...Redundant secure timing sources and timing distribution to digital power prot...
Redundant secure timing sources and timing distribution to digital power prot...Power System Operation
Β 
IRJET- Survey on Flood Management System
IRJET- Survey on Flood Management SystemIRJET- Survey on Flood Management System
IRJET- Survey on Flood Management SystemIRJET Journal
Β 
Ao03402350245
Ao03402350245Ao03402350245
Ao03402350245ijceronline
Β 
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...rahulmonikasharma
Β 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
Β 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksIJERA Editor
Β 
Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...ijsc
Β 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsneSAT Journals
Β 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent dataeSAT Publishing House
Β 
IRJET- Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA ClassifierIRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET- Flaw Detection in Wireless Sensor Network using a LDA ClassifierIRJET Journal
Β 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Dharmendrasingh417
Β 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
Β 
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline MonitoringWiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline MonitoringIJECEIAES
Β 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Β 
International Journal of Engineering (IJE) Volume (3) Issue (1)
International Journal of Engineering (IJE) Volume (3)  Issue (1)International Journal of Engineering (IJE) Volume (3)  Issue (1)
International Journal of Engineering (IJE) Volume (3) Issue (1)CSCJournals
Β 
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...IJECEIAES
Β 
Resume-Hariprasad-Ravishankar_12Feb
Resume-Hariprasad-Ravishankar_12FebResume-Hariprasad-Ravishankar_12Feb
Resume-Hariprasad-Ravishankar_12FebHariprasad Ravishankar
Β 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
Β 

What's hot (18)

Redundant secure timing sources and timing distribution to digital power prot...
Redundant secure timing sources and timing distribution to digital power prot...Redundant secure timing sources and timing distribution to digital power prot...
Redundant secure timing sources and timing distribution to digital power prot...
Β 
IRJET- Survey on Flood Management System
IRJET- Survey on Flood Management SystemIRJET- Survey on Flood Management System
IRJET- Survey on Flood Management System
Β 
Ao03402350245
Ao03402350245Ao03402350245
Ao03402350245
Β 
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Β 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
Β 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Β 
Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...
Β 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsn
Β 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent data
Β 
IRJET- Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA ClassifierIRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET- Flaw Detection in Wireless Sensor Network using a LDA Classifier
Β 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
Β 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
Β 
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline MonitoringWiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
Β 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
Β 
International Journal of Engineering (IJE) Volume (3) Issue (1)
International Journal of Engineering (IJE) Volume (3)  Issue (1)International Journal of Engineering (IJE) Volume (3)  Issue (1)
International Journal of Engineering (IJE) Volume (3) Issue (1)
Β 
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...
Β 
Resume-Hariprasad-Ravishankar_12Feb
Resume-Hariprasad-Ravishankar_12FebResume-Hariprasad-Ravishankar_12Feb
Resume-Hariprasad-Ravishankar_12Feb
Β 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
Β 

Similar to Self-checking method for fault tolerance solution in wireless sensor network

IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET Journal
Β 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksiaemedu
Β 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET Journal
Β 
234-Article Text-423-1-10-20210316.pdf
234-Article Text-423-1-10-20210316.pdf234-Article Text-423-1-10-20210316.pdf
234-Article Text-423-1-10-20210316.pdfNiharikaDubey17
Β 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Β 
Data Analysis In The Cloud
Data Analysis In The CloudData Analysis In The Cloud
Data Analysis In The CloudMonica Carter
Β 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
Β 
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...IRJET Journal
Β 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Β 
Robust wireless reprogramming method using differential approach for wireless...
Robust wireless reprogramming method using differential approach for wireless...Robust wireless reprogramming method using differential approach for wireless...
Robust wireless reprogramming method using differential approach for wireless...IAEME Publication
Β 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsCSCJournals
Β 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
Β 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
Β 
Autonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridgesAutonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridgesIRJET Journal
Β 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
Β 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
Β 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical methodeSAT Journals
Β 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical methodeSAT Publishing House
Β 

Similar to Self-checking method for fault tolerance solution in wireless sensor network (20)

IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
Β 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networks
Β 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
Β 
234-Article Text-423-1-10-20210316.pdf
234-Article Text-423-1-10-20210316.pdf234-Article Text-423-1-10-20210316.pdf
234-Article Text-423-1-10-20210316.pdf
Β 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
Β 
Data Analysis In The Cloud
Data Analysis In The CloudData Analysis In The Cloud
Data Analysis In The Cloud
Β 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Β 
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Β 
C1804011117
C1804011117C1804011117
C1804011117
Β 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
Β 
50120140505014
5012014050501450120140505014
50120140505014
Β 
Robust wireless reprogramming method using differential approach for wireless...
Robust wireless reprogramming method using differential approach for wireless...Robust wireless reprogramming method using differential approach for wireless...
Robust wireless reprogramming method using differential approach for wireless...
Β 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and Comparisons
Β 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Β 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Β 
Autonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridgesAutonomous sensor nodes for Structural Health Monitoring of bridges
Autonomous sensor nodes for Structural Health Monitoring of bridges
Β 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
Β 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
Β 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
Β 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
Β 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
Β 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
Β 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
Β 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
Β 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
Β 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
Β 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
Β 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
Β 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
Β 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
Β 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
Β 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
Β 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
Β 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
Β 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
Β 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
Β 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
Β 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
Β 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
Β 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
Β 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
Β 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
Β 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Β 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Β 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
Β 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
Β 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
Β 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
Β 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
Β 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
Β 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
Β 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
Β 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
Β 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
Β 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Β 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
Β 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
Β 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
Β 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
Β 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
Β 

Recently uploaded

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
Β 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
Β 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
Β 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
Β 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Β 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
Β 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
Β 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
Β 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
Β 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
Β 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
Β 
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”soniya singh
Β 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
Β 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
Β 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
Β 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
Β 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
Β 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
Β 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Β 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
Β 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Β 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
Β 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Β 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
Β 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
Β 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Β 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Β 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Β 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Β 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Β 
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Β 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Β 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Β 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Β 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Β 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Β 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Β 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Β 

Self-checking method for fault tolerance solution in wireless sensor network

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 4, August 2020, pp. 4416~4425 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i4.pp4416-4425  4416 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Self-checking method for fault tolerance solution in wireless sensor network Muayad Sadik Croock, Saja Dhyaa Khuder, Zahraa Abbas Hassan Computer Engineering Department, University of Technology, Iraq Article Info ABSTRACT Article history: Received Jan 6, 2020 Revised Mar 22, 2020 Accepted Mar 28, 2020 Recently, the wireless sensor network (WSN) has been considered in different application, particularly in emergency systems. Therefore, it is important to keep these networks in high reliability using software engineering techniques in the field of fault tolerance. This paper proposed a fault node detection method in WSN using the self-checking technique according to the rules of software engineering. Then, the detected faulted node is covered employing the reading of nearest neighbor nodes (sensors). In addition, the proposed method sends a message for maintenance to solve the fault. The proposed method can reduce the time between the detection and recovery of a fault to prevent the confusion of adopting wrong readings, in which the detection is making with mistake. Moreover, it guarantees the reliability of the WSN, in terms of operation and data transmission. The proposed method has been tested over different scenarios and the obtained results show the superior efficiency in terms of recovery, reliability, and continuous data transmission. Keywords: Fault tolerance Self-checking technique Software engineering WSN Copyright Β© 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Muayad Sadik Croock, Department of Compute Engineering, University of Technology, Al-sinaa Street, Baghdad, Iraq. Email: 1 Muayad.S.Croock@uotechnology.edu.iq; 2 120099@uotechnology.edu.iq; 3 120052@uotechnology.edu.iq 1. INTRODUCTION It is well known that the WSN has been considered in numerous fields of the modern life, such as smart buildings and emergency systems [1]. These applications provide the WSN with high importance and should be more reliable, flexible and extendable. These properties have been addressed by designing the software algorithms according to the software engineering techniques [2]. The fault tolerance method is one of the most important part in the software engineering that can guarantee the operation of a system with high reliability. To be more precise, the self-checking technique can be considered for checking the status of such system based on the readings with the time. The concepts of this technique are built on allocating upper and lower threshold values for right operation to any part of a system. These values are used for checking the validity of the system, in which the fault can be detected efficiently [3]. In general, the fault in WSN are occurred mainly in the nodes (sensors) [1]. These faults can be classified into hardware and software. These two classifications are also being under the permanent and temporary faults. As mentioned above, the self-checking approach is used for detecting the fault of nodes and the monitoring system sends a message for maintenance for solving the occurred problems [2]. Throughout the maintenance procedure, the system can cover this error in different ways depending on the design and status of the related conditions [3]. In this paper, a monitoring system for WSN is proposed based on software engineering techniques. The proposed method adopts the fault tolerance approach for managing the operation of nodes inside
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock) 4417 the WSN. In the fault detection part of the proposed method, the self-checking technique is considered with upper and lower threshold for each node included in a cluster. The designed WSN contains numerous clusters and each of which includes different nodes. At a time that the fault is occurred in a node, the proposed method takes the neighbor nodes reading to tackle the problem in an efficient way. The recovery operation is performed by calculating the average value of nearest neighbor nodes until the fault is solved. The proposed system is tested under different conditions and the achieved results prove the satisfactory in terms of accuracy and efficiency. 2. RELATED WORK The applications of WSN and related supported systems attract the attentions of numerous researchers in distinct fields. Each group of them tackled a side of appeared problems, such as faults, data transmission. All these researches focused on introducing robust systems with high accuracy, reliability, flexibility and extendibility. Therefore, the concepts and approaches of software engineering were adopted. In [4], the authors presented a developed management method for WSN based on software engineering rules. They classified the situations of WSN in terms of infrastructure and found the suitable adapting software. While the authors of [5] proposed a real time oil and gas monitoring system based on WSN using the software development as a part of software engineering. The presented system took care of different equipment, such as pumps, sensors and metering infrastructure. In addition, it managed the flow of oil and gas sequentially. In [6], a new framework for WSN was presented. The introduced framework was built based on software engineering challenges including flexibility and scalability. It worked as a middleware that could manage the data mining, energy consumption and self-organization. In addition, the authors of [7] performed a modeling framework for analyzing the features in terms of variation and commination. These features provided a complete view for the WSN based agriculture system. All proposed algorithms and software were designed under the rules of software engineering. In [8], a searching based on software engineering was implemented in WSN. The implemented method adopted the multi-objective algorithm to be solved using genetic method. It also considered the fixed obstacles in the searching process. The authors of [9] introduced hardware and software infrastructure for WSN based on the regulation of software engineering, particularly the software requirements. The focused on the receiver and how it described itself to the others nodes of WSN. The work was done in physical layer in real time situation. It is important to note that the test results of the literature research works were clear enough to prove the claim of authors. At the other hand, the fault tolerance of software engineering was adopted in solving the problem of reliability. In [10], a survey on fault detection and the solutions were presented. It considered the relation between different types of faults in WSN nodes and the choosing of suitable fault detector as well as fault tolerance method. This relation could lead to the root of faulted node, in which the solution was presented. The authors of [11] proposed a management architecture of WSN based on fault tolerance approach. The proposed architecture tackled two sides of challenges inside WSN. The first one is the power consumption, while the other side is the fault tolerance to cover the self-organized network. This was to increase the reliability of the WSN and become fault tolerance. In [12], a new trend of guaranteeing the reliability of WSN was presented based on fault tolerance method. Both theory and applications were considered in the oriented research. In [13], a cluster head based fault tolerance system was proposed. The objectives of the proposed system were to keep eye on the WSN throughout the operation in terms of data transmission, mobility and fault occur. The solutions were also provided to guarantee the reliability. The authors of [14] used an agent factor to propose a fault tolerance method for WSN. The platform of the proposed method worked across different levels including sensors, cluster heads and base stations. In [15], the researchers employed the fault tolerance method for reducing the redundancy and packet loss over the broken links (paths) of WSN and finding the solutions to keep the WSN in operation. Moreover, they supported the security of the data transmission using cryptography methods. The authors of [16] designed a software engineering based fault detection method for optimization method that was proposed. In [17], a list of the recent methods of fault detection and diagnosing was presented. It included a real survey on fault detection in WSN. The researchers of [18] proposed a fault detection based clustering network. The proposed method involved two sides; firstly, the cluster configuration, while the other is fault detection and recovery. In [19], a method of solving the problem of node isolation in AGR-MAC protocol was presented. The proposed method used fault tolerance technique for maintaining the isolation problem. The authors of [20] proposed a guaranteed algorithm of bioinformatic connectivity in WSN based on fault tolerance technique for ambulance system. In [21], a WSN based wildfire detection system was proposed based on self-organization and fault tolerance approaches.
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425 4418 At the other hand, a system based virtual biological community of nature living style has been proposed. The evolutionary game method was adopted to introduce a fault tolerance procedure for managing the problems of WSN [22]. In [23], a fault tolerance method was presented for solving the problem of cluster head failures. This was done by planning the solution based on virtual heads and the collected information. The researcher of [24] proposed a data transmission protocol in save situation using fault tolerance method. This protocol used the residual information regarding the links of WSN to build a plan for tolerant the faults. In [25], the cluster head selection method was proposed based on fault tolerance and fuzzy-logic approaches. The soft computing method provided the system with optimality in allocating the cluster head, in which the failure is covered well. In [26, 27], different methods for WSN structure and clustering methods have been proposed to solve numerous problem. They used software engineering regulations in building the proposed methods. 3. THE PROPOSED SYSTEM As mentioned earlier, the proposed system includes two sides of work based on software engineering methods that are used for guarantee the reliability of the adopted WSN. The first one is related to detect the occurred fault in a node at the adopted WSN using the self-checking method. While the second one takes care of finding the solution of the detected fault using the available tolerance in finding the recovery values within the neighborhood area. 3.1. System structure In this section, the general structure of the proposed system is explained as a block diagram shown in Figure 1. It is shown that the collected reading data from the underlying sensors of allocated WSN is entered to the fault detection unit. This unit is responsible on detecting the fault that can be occurred in a node using the self-checking approach. This approach is based on upper and lower threshold values for each sensor as a tolerance range. The received values that fall within the outage tolerance area is classified as a fault. If there is no detected fault, the data is sent to the system safely. Figure 1. The proposed system structure The detected faults are passed to the fault tolerance unit. This unit is responsible on finding the solution to the problem of fault using the available tolerances. The solution adopted in the proposed method uses the values of neighbor nodes with correct values for guessing the expected reading of the faulted sensor node. Whilst the processing of finding the solutions, a communication between fault detection unit and fault tolerance unit. The reason behind this communication is exchanging the information and correct any error can be happened in finding the tolerant solution. The results of fault detection and the tolerant solution is applied to send the corrected readings as well as the estimated reading to the system for continuing the process. 3.2. Proposed algorithm It is well known that the software algorithm is necessary to be proposed for managing the fault detection and finding the solution. In this section, the proposed algorithm is presented as a flowchart, shown in Figure 2.
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock) 4419 Figure 2. Flowchart of the proposed algorithm Based on the flowchart of the proposed algorithm, the working procedure can be summarized in the following: a. Collecting the readings of the sensor nodes in the adopted WSN. b. Checking the validity of the received readings by the cluster head. In case the readings are not valid, a request is sent back to the nodes for providing another copy of readings. c. The valid readings are checked for fault detection using the self-checking process based on the upper and lower threshold as explained mathematically in (1): 𝜸 𝒖𝒑𝒑𝒆𝒓 β‰₯ 𝜹(π’Š, 𝒋) β‰₯ πœΈπ’π’π’˜π’†π’“ (1) Where 𝜸 𝒖𝒑𝒑𝒆𝒓 and πœΈπ’π’π’˜π’†π’“ are the upper and lower threshold values. In case of fault occur, the proposed algorithm sends the information to the next step. Otherwise, the readings can be passed to the system.
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425 4420 It is important to highlight that the 𝜸 𝒖𝒑𝒑𝒆𝒓 and πœΈπ’π’π’˜π’†π’“ values are selected depending on the type of used sensor as well as the surrounding conditions. d. The faulted readings are passed to the fault tolerance unit. This unit adopts the valid readings of the close neighbour nodes. The most important condition is the validity of these reading as could be happened the even the close neighbour readings have faults as well according to the following equation: 𝛿(π’Š, 𝒋) =, { 𝜹(π’Š Β± π’Œ, 𝒋 Β± π’Œ), 𝜸 𝒖𝒑𝒑𝒆𝒓 β‰₯ 𝜹(π’Š Β± π’Œ, 𝒋 Β± π’Œ) β‰₯ πœΈπ’π’π’˜π’†π’“ 𝜹(π’Š, 𝒋) , π’π’•π’‰π’†π’“π’˜π’Šπ’”π’† } (2) Where 𝜹(π’Š, 𝒋) is the instant reading of a node with location (i,j) in the covered area. 𝜸(π’Š Β± π’Œ, 𝒋 Β± π’Œ) is the next neighbor readings, increased by π’Œ ∈ 𝑲 total WSN dimension, and k={1,2,3,…,K}. e. It is noted from (2) hat the instant reading of a node can be replaced with the neighbour nodes in case they are valid. In order to increase the validity of estimation and the accuracy, the average value can be adopted amongst the valid close neighbours in the estimation process. Therefore, the estimated value 𝐸 𝛿(π’Š,𝒋) of reading of a node 𝛿(π’Š, 𝒋) is mathematically written as: 𝑬 𝜹(π’Š,𝒋) = 𝟏 𝑡 𝒏𝒐𝒅𝒆 βˆ‘ 𝜹(π’Š Β± π’Œ, 𝒋 Β± π’Œ)𝑲 π’Œ=𝟏 (3) Where 𝑡 𝒏𝒐𝒅𝒆 is the total number of adopted neighbor nodes to the underlying node 𝛿(π’Š, 𝒋). f. Checking the estimated value of a node 𝑬 𝜹(π’Š,𝒋) if it is within the upper and lower threshold vlues as: 𝜸 𝒖𝒑𝒑𝒆𝒓 β‰₯ 𝑬 𝜹(π’Š,𝒋) β‰₯ πœΈπ’π’π’˜π’†π’“ (4) g. Sending the valid values (sensors’ readings) to the system for future processing. 4. RESULTS In order to test the proposed method that has been explained in early sections, a simulation model is adopted. The proposed model includes a WSN with four clusters, each of which involves cluster head and six sensors, as shown in Figure 3. The cluster heads are connected to the device manager as a base station. Temperature sensors are adopted in this simulated model that can be changed to different types of sensors. This model is built using Visual Studio C# language and the interface presents the results in numerous color for more explanation. The green boxes represent the well working nodes, while the red boxes are the faulted nodes. Inside each box, the instant sensor reading is shown. The nodes are connected to the cluster head within each one individually. Figure 3. Simulated model interface, case study
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock) 4421 Different case studies have been considered to test the system under changeable conditions. The case study, shown in Figure 3, explains that the cluster one has three faulted sensor nodes, mentioned in red color. In addition, cluster two involves two faulted sensors with red label. Moreover, cluster three includes a faulted sensor, while the fourth cluster points three sensor nodes to be faulted. Depending on the proposed algorithm and based on equations (1-4), the proposed method compensates the faulted readings with estimated values. It is important to note that the proposed algorithm amongst all clusters checks the readings of neighbor nodes if they are within the thresholds to be considered. Otherwise, it considers the next neighbor instead to guarantee the estimation with minimum error occur. The simulation parameters are built based on the upper and lower threshold of (35o c) and (55o c), sequentially, for a whole July month in Baghdad city at Iraq. Figure 4 shows the same case study of Figure 3 after applying the proposed algorithm. I can be seen that the faulted readings of the sensors in all clusters are estimated based on the neighbors and labeled in blue color. As mentioned earlier, the results are measured for thirty days among July month. The performance of each sensor in all clusters can be measured accurately. Figure 5 shows the performance of sensor nodes in cluster one. The case here that there is no fault is detected, and all sensors are working well in cluster one. It is seen that the whole readings are within the validity range between upper and lower thresholds. Figure 4. Case study of Figure 3 after applying the proposed algorithm Figure 5. Cluster one performance in case of normal working
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425 4422 At the other hand, the same cluster one passes by worst conditions, in which there are three sensors suffer from faults. This can lead to changing in the readings of these sensors. These faults are detected using the proposed algorithm that is based on self-checking process. The detected faults are compensated by applying the proposed fault tolerance method based on the neighbor nodes as explained earlier. Figure 6 explains the readings of sensors inside cluster one, where the faulted readings exceed the upper threshold values. It is shown that the faults are started at day seven, twelve and fourteen, sequentially. Figure 6. Cluster one performance in case of fault detection Now the proposed method should solve this problem by applying the presented algorithms. This is done efficiently as shown in Figure 7. The faulted readings are fixed by estimating replaced values depending on the valid readings of neighbor nodes. To be more precise, sensor node number four in cluster one has been analyzed in Figure 8. It is shown that the estimated values of this sensor are within the validity range between thresholds with acceptable error. Figure 7. Cluster one performance in case of fixing faults
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock) 4423 Figure 8. Sensor four analysis regarding normal, fault and fixed Figure 9 illustrates the performance of the adopted WSN with four clusters. For each cluster, the average values of normal, faulted and fixed cases are evaluated according to the following equation: 𝑨𝒗 𝜹(π’Š,𝒋)(𝒛) = 𝟏 𝑡 𝑻𝒐𝒕𝒂𝒍 βˆ‘ βˆ‘ 𝜹(π’Š, 𝒋) 𝑱 𝒋=𝟏 𝑰 π’Š=𝟏 (5) where 𝑨𝒗 𝜹(π’Š,𝒋)(𝒛) is the average values of the cluster z, and z={1, 2, 3, …, Z} and Z is the number of clusters within the WSN. 𝑡 𝑻𝒐𝒕𝒂𝒍 is the number of all readings of sensors inside the cluster z, represented as a matrix of (6 X 30) for six sensors and thirty days. I is considered as the number of sensors, which is six, while J represents the number of days (thirty days). These values are compared in this figure and shown that the estimated values are very close to the normal ones, while the faulted reading increased in notable way. This means that the proposed algorithm and method are working in efficient way. Figure 9. The total cluster performance for normal, faulted and fixed cases Table 1 shows the recorded readings of sensors over thirty days of July month for cluster three at the present of fault occur, as an example to the proposed system fault monitoring. It can be seen that the values of readings of the 6th sensor are increased sharply after the 10th day as the fault happened. In addition, the readings of sensor four decreased to become zeros and this is indicated as a fault as the values
  • 9.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425 4424 went down the lower threshold starting from day 11th . At the other hand, sensor two provides wrong readings after 23rd day, where the values are increased notably. The values, highlighted with yellow color, are recorded as faults due to the exceeding of upper and lower thresholds (25-55o c), which are the maximum and minimum temperatures among this month. Table 1. Cluster 3 sensors after fault (in sensor 2, 4, 6) Day Sensor 1 Sensor 2 Sensor 3 Sensor 4 Sensor 5 Sensor 6 1. 36 43 31 38 34 47 2. 40 40 49 40 43 49 3. 44 37 31 34 31 48 4. 39 42 41 44 32 32 5. 47 32 36 49 34 38 6. 50 36 48 43 41 36 7. 46 48 41 49 50 34 8. 46 46 32 30 49 37 9. 32 33 31 45 40 43 10. 49 44 48 45 37 76 11. 39 37 40 0 39 70 12. 40 39 38 0 43 71 13. 34 38 39 0 31 76 14. 33 30 49 0 45 74 15. 39 43 34 0 35 71 16. 41 49 30 0 45 70 17. 47 42 43 0 38 75 18. 41 40 33 0 38 63 19. 41 50 49 0 40 78 20. 45 34 34 0 34 68 21. 47 45 38 0 40 68 22. 32 42 35 0 32 74 23. 46 65 49 0 49 74 24. 38 65 31 0 32 63 25. 45 59 34 0 31 60 26. 33 75 37 0 31 58 27. 35 66 30 0 47 74 28. 37 68 31 0 36 63 29. 34 64 50 0 40 77 30. 33 75 30 0 39 78 It is important to note that the proposed algorithm does not change the complexity of the WSN as there is no any addition to the hardware side. In addition, in fault appearance cases, the solution is produced until they are fixed. Therefore, the proposed algorithm consumed a sensible time to recover the errors, in which the real-time concepts are still satisfied. 5. CONCLUSION This paper proposed a software engineering based fault tolerance method for fault detection and introducing a solution in WSN. The proposed method adopted the self-checking process for fault detection. In addition, the proposed algorithm considered the neighbor sensor nodes to estimate the faulted readings in efficient way. The average value of the close neighbors was adopted in the proposed algorithm to increase the accuracy of estimation as well as the reliability. In case of fault occur in the close neighbor node, the next valid one was considered. It is important to note that the robust response of the proposed method allowed the use in real-time system with high activity of fault tolerance. The proposed method was tested over different case studies at an assumed simulation model with different clusters in WSN. The obtained results showed the proved performance of the proposed method in terms of reliability and accuracy. REFERENCES [1] Hossam Mahmoud Ahmad, β€œWireless Sensor Networks Concepts, Applications, Experimentation and Analysis,” Springer, 2016. [2] Ian Sommerville, β€œSoftware engineering,” 10th Edition, Pearson Education, Inc, 2017. [3] Miikka Kuutilaa, Mika Mantylaa, Umar Farooqa, and Maelick Claes, β€œTime Pressure in Software Engineering: A Systematic Review,” Esliver, 2020. [4] V. V. Phoha and Shashi Phoha, β€œSituation-Aware Software Engineering for Sensor Networks,” 2nd International Conference on Communication Systems Software and Middleware, 2007.
  • 10. Int J Elec & Comp Eng ISSN: 2088-8708  Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock) 4425 [5] Ayuba J, Safwana H, and Abdulazeez Y, β€œSoftware Development of Integrated Wireless Sensor Networks For RealTime Monitoring of Oil and Gas Flow Rate Metering Infrastructure,” Journal of Information Technology & Software Engineering, vol. 8, no. 2, pp. 1-10, 2018. [6] Savitha S, S C Linga Reddy, Sanjay Chitnis, β€œEnergy Efficient Clustering and Routing Optimization Model for Maximizing Lifetime of Wireless Sensor Network,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 5, 2020. [7] Sridhar R., and N. Guruprasad, β€œEnergy efficient chaotic whale optimization technique for data gathering in wireless sensor network,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 4176-4188, 2020. [8] Abdusy Syarif, Abdelhafid Abouaissa, Lhassane Idoumghar, Achmad Kodar, Pascal Lorenz, β€œSearch Based Software Engineering on Evolutionary Multi-Objective Approach,” IEEE- ICC Next-Generation Networking and Internet Symposium, 2016. [9] Aaditiya Venkat Kannan, β€œHardware and Software Architecture of Wireless Sensor Networks,” Journal of Advances in Computer Networks, vol. 2, no. 3, pp. 207-210, 2014. [10] Emmanuel Effah, Ousmane Thiare, β€œSurvey: Faults, Fault Detection and Fault Tolerance Techniques in Wireless Sensor Networks,” International Journal of Computer Science and Information Security, 2018. [11] Khadidja El Merraoui, Abdellaziz Ferdjouni, M’hamed Bounekhla, β€œReal time observer-based stator fault diagnosis for IM,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 210-222, 2020. [12] Sushruta Mishra, Lambodar Jena, Aarti Pradhan, β€œFault Tolerance in Wireless Sensor Networks,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 10, pp. 146-153, 2014. [13] Manasvi Mannan, and Shashi B. Rana, β€œFault Tolerance in Wireless Sensor Network,” International Journal of Current Engineering and Technology, vol. 5, no. 3, pp. 1785-1788, 2015. [14] A.V. Sutagundar, Vidya S. Bennur, Anusha A. M. Bhanu K. N., β€œAgent Based Fault Tolerance in Wireless Sensor Networks,” International Conference on Inventive Computation Technologies (ICICT), 2016. [15] H.S.Annapurna, and M.Siddappa, β€œSecure Data Aggregation with Fault Tolerance for Wireless Sensor Networks,” International Conference on Emerging Research in Electronics, Computer Science and Technology, 2015. [16] TaoChena, MiqingLi, and XinYaocb, β€œStanding on the shoulders of giants: Seeding search-based multi-objective optimization with prior knowledge for software service composition,” Journal of Information and Softwrae Technology, vol. 114, pp. 155-175, 2019. [17] Zeyu Zhang, Amjad Mehmood, Lei Shu, Zhiqiang Huo, Yu Zhang and Mithun Mukherjee, β€œA Survey on Fault Diagnosis in Wireless Sensor Networks,” IEEE Access, vol. 8, pp. 11349-11364, 2018. [18] Mehdi Nazari Cheraghlou, Ahmad Khadem-Zadeh and Majid Haghparast, β€œA New Fault-Tolerant Clustering Protocol for Wireless Sensor Networks,” International Journal of Security and Its Applications, vol. 12, no. 4, pp. 29-40, 2018. [19] Myeongseung Han, Eun-Sung Cho, Jun-hyuk Lee, and Intae Ryoo, β€œA Study on Fault Tolerance Technique for AGR-MAC Protocol based Sensor Networks,” International Conference on Information Networking (ICOIN), pp. 457-460, 2019. [20] Asmaa Shaalan Abdul Munem, and Muayad Sadik Croock, β€œSmart Traffic Light Control System for Emergency Ambulance,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 5, no. 1, 2016. [21] Felipe Taliar Giuntini, Delano Medeiros Beder and JoΒ΄ Ueyama, β€œExploiting Self-organization and Fault Tolerance in Wireless Sensor Networks: A Case Study on Wildfire Detection Application,” International Journal of Distributed Sensor Networks, vol. 13, no. 4, pp. 1-16, 2017. [22] Ricardo VillalΓ³n and Patrick G. Bridges, β€œFault-Tolerant Wireless Sensor Networks using Evolutionary Games,” PhD Thesis, The University of New Mexico, 2012. [23] Jenn-Wei Lin, Pethuru Raj C., Meng-Chieh H., and Jia-Xin H., β€œEfficient Fault-Tolerant Routing in IoT Wireless Sensor Networks Based on Bipartite-Flow Graph Modeling,” IEEE Access, vol. 7, pp. 14022-14034, 2019. [24] L. Mottola, G. P. Picco, F. J. Oppermann, et al, β€œSimplifying the Integration of Wireless Sensor Networks into Business Processes,” IEEE Transaction on Software Engineering, vol. 45, no. 6, pp. 576-596, 2019. [25] Farnaz Pakdel 1, Mansour Esmaeilpour, β€œFuzzy Logic Method for Enhancement Fault-Tolerant of Cluster Head in Wireless Sensor Networks Clustering,” TEM Journal, vol. 5, no. 3, pp. 268-277, 2016. [26] Evizal Abdul Kadir, Hitoshi Irie, Sri Listia Rosa, and Mahmod Othman, β€œModelling of wireless sensor networks for detection land and forest fire hotspot,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 17, no. 6, pp. 2772-2781, 2019. [27] Ngan Nguyen, Quoc Cuong Nguyen, and Minh Thuy Le, β€œA novel autonomous wireless sensor node for IoT applications,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 17, no. 5, pp. 2389-2399, 2019.