Bridge protection algorithms – A technique for fault-tolerance in sensor networks
Sensor networks operating in the field might be subject to catastrophic events which destroy a large number of nodes in the geographic area. Often, the aftermath of such an event is the creation of a network of bridged fragments where connectivity is maintained by one or several bridge nodes. These...
Saved in:
Published in | Ad hoc networks Vol. 24; pp. 186 - 199 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.01.2015
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Sensor networks operating in the field might be subject to catastrophic events which destroy a large number of nodes in the geographic area. Often, the aftermath of such an event is the creation of a network of bridged fragments where connectivity is maintained by one or several bridge nodes. These networks are vulnerable, because the bridge nodes will soon exhaust their energy resources leading to the fragmentation of the network. This paper describes a bridge protection algorithm (BPA), a combination of techniques which, in response to a catastrophic event, change the behavior of a set of topologically important nodes in the network. These techniques protect the bridge node by letting some nodes take over some of the responsibilities of the sink. At the same time, they relieve some other overwhelmed nodes and prevent the apparition of additional bridge nodes. To achieve this, the algorithm sacrifices the length of some routes in order to distribute routes away from critical areas. In a variation on the BPA algorithm, we show that if geographic information about the nodes is available, replacing shortest path routing with a routing model which follows the edges of the relational neighborhood graph will lead to further improvements in the expected connected lifetime of the network. |
---|---|
AbstractList | Sensor networks operating in the field might be subject to catastrophic events which destroy a large number of nodes in the geographic area. Often, the aftermath of such an event is the creation of a network of bridged fragments where connectivity is maintained by one or several bridge nodes. These networks are vulnerable, because the bridge nodes will soon exhaust their energy resources leading to the fragmentation of the network. This paper describes a bridge protection algorithm (BPA), a combination of techniques which, in response to a catastrophic event, change the behavior of a set of topologically important nodes in the network. These techniques protect the bridge node by letting some nodes take over some of the responsibilities of the sink. At the same time, they relieve some other overwhelmed nodes and prevent the apparition of additional bridge nodes. To achieve this, the algorithm sacrifices the length of some routes in order to distribute routes away from critical areas. In a variation on the BPA algorithm, we show that if geographic information about the nodes is available, replacing shortest path routing with a routing model which follows the edges of the relational neighborhood graph will lead to further improvements in the expected connected lifetime of the network. |
Author | Bölöni, Ladislau Khan, Saad Ahmad Turgut, Damla |
Author_xml | – sequence: 1 givenname: Saad Ahmad surname: Khan fullname: Khan, Saad Ahmad email: skhan@eecs.ucf.edu – sequence: 2 givenname: Ladislau surname: Bölöni fullname: Bölöni, Ladislau email: lboloni@eecs.ucf.edu – sequence: 3 givenname: Damla surname: Turgut fullname: Turgut, Damla email: turgut@eecs.ucf.edu |
BookMark | eNqFkMFOGzEQhq0qlUqgT9CLj1x2a3t3He-BQxpBQYrUA_RsDd5x4nRjg-2AuPEOfcM-CQ6peuBQTmPN_N949E3JxAePhHzhrOaMy6-bGoZ1MLVgvK2ZqkvvAzni3YxVasabyb836z6RaUobxkRfwkfk-lt0wwrpXQwZTXbBUxhXIbq83ib65_k3ndMyWHt3v0NqQ6QWdmOuchgxgjdInacJfSoTj_kxxF_phHy0MCb8_Lcek58X5zeLy2r54_vVYr6sTNPIXJX_bWOsVSC61sre9EpYOcjbmWFcgACAHgXncCt5K5QBUNjKngnVzdTAu-aYnB72luPLdSnrrUsGxxE8hl3SXHa87aTiqkSbQ9TEkFJEq--i20J80pzpvUK90a8K9V6hZkqXXqH6N5RxGfaScgQ3vsOeHVgsBh4cRp2MwyJscLGI1kNw_-VfAJihkUE |
CitedBy_id | crossref_primary_10_1007_s41109_019_0122_7 crossref_primary_10_1109_TNSM_2016_2516243 crossref_primary_10_1016_j_adhoc_2016_12_006 crossref_primary_10_1016_j_adhoc_2017_12_008 crossref_primary_10_1016_j_adhoc_2019_101879 crossref_primary_10_1016_j_comnet_2017_02_003 crossref_primary_10_1016_j_jnca_2017_02_007 crossref_primary_10_1109_JSYST_2017_2780264 |
Cites_doi | 10.1145/989459.989483 10.1016/j.jnca.2011.12.002 10.1145/1089444.1089473 10.1109/TC.2009.120 10.1109/ICC.2009.5199381 10.1109/ICC.2009.5199052 10.1109/LCN.2009.5355150 10.1145/2402.322386 10.1109/INFCOM.2005.1498517 10.1007/s11276-010-0313-8 10.1109/GLOCOM.2008.ECP.44 10.1145/1298126.1298143 10.1109/WCINS.2010.5544679 10.1007/BF02187695 10.1145/958491.958506 10.1109/IWCMC.2011.5982846 10.1109/TPDS.2008.246 10.1109/MCOM.2006.248176 10.1109/EUC.2010.37 10.1109/TWC.2005.853969 10.1109/LCN.2007.19 10.1007/s11276-006-0724-8 10.1016/j.comnet.2008.04.002 10.1016/S1570-8705(03)00003-9 |
ContentType | Journal Article |
Copyright | 2014 Elsevier B.V. |
Copyright_xml | – notice: 2014 Elsevier B.V. |
DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1016/j.adhoc.2014.08.016 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1570-8713 |
EndPage | 199 |
ExternalDocumentID | 10_1016_j_adhoc_2014_08_016 S1570870514001875 |
GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 23M 4.4 457 4G. 5GY 5VS 6OB 7-5 71M 8P~ AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 RIG ROL RPZ SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K UHS ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c336t-201f3cff8a254f69c982f6d6b7c012a2aaa9e211ab61428caa8e469028578d153 |
IEDL.DBID | .~1 |
ISSN | 1570-8705 |
IngestDate | Fri Jul 11 02:45:57 EDT 2025 Tue Jul 01 04:51:31 EDT 2025 Thu Apr 24 23:12:59 EDT 2025 Fri Feb 23 02:27:34 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Bridge protection Fault tolerance Sensor network |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c336t-201f3cff8a254f69c982f6d6b7c012a2aaa9e211ab61428caa8e469028578d153 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
PQID | 1651456818 |
PQPubID | 23500 |
PageCount | 14 |
ParticipantIDs | proquest_miscellaneous_1651456818 crossref_primary_10_1016_j_adhoc_2014_08_016 crossref_citationtrail_10_1016_j_adhoc_2014_08_016 elsevier_sciencedirect_doi_10_1016_j_adhoc_2014_08_016 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | January 2015 2015-01-00 20150101 |
PublicationDateYYYYMMDD | 2015-01-01 |
PublicationDate_xml | – month: 01 year: 2015 text: January 2015 |
PublicationDecade | 2010 |
PublicationTitle | Ad hoc networks |
PublicationYear | 2015 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | H. Almasaeid, A. Kamal, Data delivery in fragmented wireless sensor networks using mobile agents, in: Proc. of the ACM Int’l Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2007), 2007, pp. 86–94. Rappaport (b0015) 1996 Basagni, Carosi, Petrioli, Phillips (b0050) 2011; 17 Hou, Shi, Sherali, Midkiff (b0120) 2005; 4 Supowit (b0025) 1983; 30 L. Bölöni, D. Turgut, YAES – a modular simulator for mobile networks, in: Proc. of the 8-th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2005), 2005, pp. 169–173. Akkaya, Senel, Thimmapuram, Uludag (b0080) 2010; 59 G. Wang, G. Cao, T. La Porta, W. Zhang, Sensor relocation in mobile sensor networks, in: Proc. of 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM-2005), vol. 4, 2005, pp. 2302–2312. Cheng, Du, Wang, Xu (b0115) 2008; 14 S. Lee, M. Younis, QoS-aware relay node placement in a segmented wireless sensor network, in: Proc. of the IEEE Int’l Conference on Communications (ICC 2009), 2009, pp. 1–5. W. Zhao, M. Ammar, E. Zegura, A message ferrying approach for data delivery in sparse mobile ad hoc networks, in: Proc. of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2004), 2004, pp. 187–198. Shah, Roy, Jain, Brunette (b0040) 2003; 1 L. Bölöni, D. Turgut, Protecting bridges: reorganizing sensor networks after catastrophic events, in: Proc. of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC-2011), 2011, pp. 2028–2033. A.A. Abbasi, K. Akkaya, M. Younis, A distributed connectivity restoration algorithm in wireless sensor and actor networks, in: Proc. of 32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007, pp. 496–503. Pelusi, Passarella, Conti (b0105) 2006; 44 M. Imran, M. Younis, A. Md Said, H. Hasbullah, Volunteer-instigated connectivity restoration algorithm for wireless sensor and actor networks, in: Proc. of IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), 2010, pp. 679–683. Yick, Mukherjee, Ghosal (b0035) 2008; 52 H. Almasaeid, A. Kamal, Modeling mobility-assisted data collection in wireless sensor networks, in: Proc. of the IEEE Global Communications Conference (GLOBECOM-2008), 2008, pp. 1–5. Abbasi, Younis, Akkaya (b0075) 2009; 20 Imran, Younis, Md Said, Hasbullah (b0095) 2012; 35 P. Levis, N. Lee, M. Welsh, D. Culler, TOSSIM: accurate and scalable simulation of entire TinyOS applications, in: Proc. of the 1st International Conference on Embedded Networked Sensor Systems, 2003, pp. 126–137. Lee, Lin (b0020) 1986; 1 D. Turgut, B. Turgut, L. Bölöni, Stealthy dissemination in intruder tracking sensor networks, in: Proc. of IEEE Local Computer Networks (LCN 2009), 2009, pp. 22–29. S. Basagni, A. Carosi, C. Petrioli, Heuristics for lifetime maximization in wireless sensor networks with multiple mobile sinks, in: Proc. of the IEEE ICC’09, 2009, pp. 1–6. M. Imran, M. Younis, A.M. Said, H. Hasbullah, Partitioning detection and connectivity restoration algorithm for wireless sensor and actor networks, in: Proc. of the 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2010), 2010, pp. 200–207. 10.1016/j.adhoc.2014.08.016_b0125 10.1016/j.adhoc.2014.08.016_b0005 10.1016/j.adhoc.2014.08.016_b0065 10.1016/j.adhoc.2014.08.016_b0045 10.1016/j.adhoc.2014.08.016_b0100 Basagni (10.1016/j.adhoc.2014.08.016_b0050) 2011; 17 10.1016/j.adhoc.2014.08.016_b0060 Rappaport (10.1016/j.adhoc.2014.08.016_b0015) 1996 10.1016/j.adhoc.2014.08.016_b0085 Akkaya (10.1016/j.adhoc.2014.08.016_b0080) 2010; 59 Lee (10.1016/j.adhoc.2014.08.016_b0020) 1986; 1 Cheng (10.1016/j.adhoc.2014.08.016_b0115) 2008; 14 Supowit (10.1016/j.adhoc.2014.08.016_b0025) 1983; 30 Hou (10.1016/j.adhoc.2014.08.016_b0120) 2005; 4 10.1016/j.adhoc.2014.08.016_b0010 10.1016/j.adhoc.2014.08.016_b0055 10.1016/j.adhoc.2014.08.016_b0110 10.1016/j.adhoc.2014.08.016_b0030 Shah (10.1016/j.adhoc.2014.08.016_b0040) 2003; 1 10.1016/j.adhoc.2014.08.016_b0090 Pelusi (10.1016/j.adhoc.2014.08.016_b0105) 2006; 44 10.1016/j.adhoc.2014.08.016_b0070 Abbasi (10.1016/j.adhoc.2014.08.016_b0075) 2009; 20 Imran (10.1016/j.adhoc.2014.08.016_b0095) 2012; 35 Yick (10.1016/j.adhoc.2014.08.016_b0035) 2008; 52 |
References_xml | – year: 1996 ident: b0015 article-title: Wireless Communications: Principles & Practice – reference: A.A. Abbasi, K. Akkaya, M. Younis, A distributed connectivity restoration algorithm in wireless sensor and actor networks, in: Proc. of 32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007, pp. 496–503. – volume: 30 start-page: 428 year: 1983 end-page: 448 ident: b0025 article-title: The relative neighborhood graph, with an application to minimum spanning trees publication-title: J. ACM (JACM) – volume: 1 start-page: 215 year: 2003 end-page: 233 ident: b0040 article-title: Data mules: modeling and analysis of a three-tier architecture for sparse sensor networks publication-title: Ad Hoc Networks – reference: S. Basagni, A. Carosi, C. Petrioli, Heuristics for lifetime maximization in wireless sensor networks with multiple mobile sinks, in: Proc. of the IEEE ICC’09, 2009, pp. 1–6. – reference: G. Wang, G. Cao, T. La Porta, W. Zhang, Sensor relocation in mobile sensor networks, in: Proc. of 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM-2005), vol. 4, 2005, pp. 2302–2312. – volume: 44 start-page: 134 year: 2006 end-page: 141 ident: b0105 article-title: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks publication-title: IEEE Commun. Mag. – reference: W. Zhao, M. Ammar, E. Zegura, A message ferrying approach for data delivery in sparse mobile ad hoc networks, in: Proc. of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2004), 2004, pp. 187–198. – reference: S. Lee, M. Younis, QoS-aware relay node placement in a segmented wireless sensor network, in: Proc. of the IEEE Int’l Conference on Communications (ICC 2009), 2009, pp. 1–5. – reference: D. Turgut, B. Turgut, L. Bölöni, Stealthy dissemination in intruder tracking sensor networks, in: Proc. of IEEE Local Computer Networks (LCN 2009), 2009, pp. 22–29. – reference: H. Almasaeid, A. Kamal, Modeling mobility-assisted data collection in wireless sensor networks, in: Proc. of the IEEE Global Communications Conference (GLOBECOM-2008), 2008, pp. 1–5. – volume: 52 start-page: 2292 year: 2008 end-page: 2330 ident: b0035 article-title: Wireless sensor network survey publication-title: Comput. Networks – reference: L. Bölöni, D. Turgut, Protecting bridges: reorganizing sensor networks after catastrophic events, in: Proc. of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC-2011), 2011, pp. 2028–2033. – volume: 1 start-page: 201 year: 1986 end-page: 217 ident: b0020 article-title: Generalized Delaunay triangulation for planar graphs publication-title: Discr. Comput. Geomet. – reference: L. Bölöni, D. Turgut, YAES – a modular simulator for mobile networks, in: Proc. of the 8-th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2005), 2005, pp. 169–173. – reference: H. Almasaeid, A. Kamal, Data delivery in fragmented wireless sensor networks using mobile agents, in: Proc. of the ACM Int’l Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2007), 2007, pp. 86–94. – reference: M. Imran, M. Younis, A. Md Said, H. Hasbullah, Volunteer-instigated connectivity restoration algorithm for wireless sensor and actor networks, in: Proc. of IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), 2010, pp. 679–683. – volume: 17 start-page: 759 year: 2011 end-page: 778 ident: b0050 article-title: Coordinated and controlled mobility of multiple sinks for maximizing the lifetime of wireless sensor networks publication-title: Wireless Networks – volume: 4 start-page: 2579 year: 2005 end-page: 2590 ident: b0120 article-title: On energy provisioning and relay node placement for wireless sensor networks publication-title: IEEE Trans. Wireless Commun. – reference: P. Levis, N. Lee, M. Welsh, D. Culler, TOSSIM: accurate and scalable simulation of entire TinyOS applications, in: Proc. of the 1st International Conference on Embedded Networked Sensor Systems, 2003, pp. 126–137. – volume: 59 start-page: 258 year: 2010 end-page: 271 ident: b0080 article-title: Distributed recovery from network partitioning in movable sensor/actor networks via controlled mobility publication-title: IEEE Trans. Comput. – volume: 20 start-page: 1366 year: 2009 end-page: 1379 ident: b0075 article-title: Movement-assisted connectivity restoration in wireless sensor and actor networks publication-title: IEEE Trans. Parallel Distrib. Syst. – reference: M. Imran, M. Younis, A.M. Said, H. Hasbullah, Partitioning detection and connectivity restoration algorithm for wireless sensor and actor networks, in: Proc. of the 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2010), 2010, pp. 200–207. – volume: 35 start-page: 844 year: 2012 end-page: 856 ident: b0095 article-title: Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks publication-title: J. Network Comput. Appl. – volume: 14 start-page: 347 year: 2008 end-page: 355 ident: b0115 article-title: Relay sensor placement in wireless sensor networks publication-title: Wireless Networks – ident: 10.1016/j.adhoc.2014.08.016_b0100 doi: 10.1145/989459.989483 – volume: 35 start-page: 844 issue: 2 year: 2012 ident: 10.1016/j.adhoc.2014.08.016_b0095 article-title: Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks publication-title: J. Network Comput. Appl. doi: 10.1016/j.jnca.2011.12.002 – ident: 10.1016/j.adhoc.2014.08.016_b0030 doi: 10.1145/1089444.1089473 – volume: 59 start-page: 258 issue: 2 year: 2010 ident: 10.1016/j.adhoc.2014.08.016_b0080 article-title: Distributed recovery from network partitioning in movable sensor/actor networks via controlled mobility publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2009.120 – ident: 10.1016/j.adhoc.2014.08.016_b0125 doi: 10.1109/ICC.2009.5199381 – ident: 10.1016/j.adhoc.2014.08.016_b0045 doi: 10.1109/ICC.2009.5199052 – ident: 10.1016/j.adhoc.2014.08.016_b0010 doi: 10.1109/LCN.2009.5355150 – volume: 30 start-page: 428 issue: 3 year: 1983 ident: 10.1016/j.adhoc.2014.08.016_b0025 article-title: The relative neighborhood graph, with an application to minimum spanning trees publication-title: J. ACM (JACM) doi: 10.1145/2402.322386 – ident: 10.1016/j.adhoc.2014.08.016_b0110 doi: 10.1109/INFCOM.2005.1498517 – volume: 17 start-page: 759 issue: 3 year: 2011 ident: 10.1016/j.adhoc.2014.08.016_b0050 article-title: Coordinated and controlled mobility of multiple sinks for maximizing the lifetime of wireless sensor networks publication-title: Wireless Networks doi: 10.1007/s11276-010-0313-8 – ident: 10.1016/j.adhoc.2014.08.016_b0060 doi: 10.1109/GLOCOM.2008.ECP.44 – ident: 10.1016/j.adhoc.2014.08.016_b0055 doi: 10.1145/1298126.1298143 – ident: 10.1016/j.adhoc.2014.08.016_b0085 doi: 10.1109/WCINS.2010.5544679 – volume: 1 start-page: 201 issue: 1 year: 1986 ident: 10.1016/j.adhoc.2014.08.016_b0020 article-title: Generalized Delaunay triangulation for planar graphs publication-title: Discr. Comput. Geomet. doi: 10.1007/BF02187695 – ident: 10.1016/j.adhoc.2014.08.016_b0065 doi: 10.1145/958491.958506 – ident: 10.1016/j.adhoc.2014.08.016_b0005 doi: 10.1109/IWCMC.2011.5982846 – volume: 20 start-page: 1366 issue: 9 year: 2009 ident: 10.1016/j.adhoc.2014.08.016_b0075 article-title: Movement-assisted connectivity restoration in wireless sensor and actor networks publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2008.246 – volume: 44 start-page: 134 issue: 11 year: 2006 ident: 10.1016/j.adhoc.2014.08.016_b0105 article-title: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2006.248176 – ident: 10.1016/j.adhoc.2014.08.016_b0090 doi: 10.1109/EUC.2010.37 – volume: 4 start-page: 2579 issue: 5 year: 2005 ident: 10.1016/j.adhoc.2014.08.016_b0120 article-title: On energy provisioning and relay node placement for wireless sensor networks publication-title: IEEE Trans. Wireless Commun. doi: 10.1109/TWC.2005.853969 – year: 1996 ident: 10.1016/j.adhoc.2014.08.016_b0015 – ident: 10.1016/j.adhoc.2014.08.016_b0070 doi: 10.1109/LCN.2007.19 – volume: 14 start-page: 347 issue: 3 year: 2008 ident: 10.1016/j.adhoc.2014.08.016_b0115 article-title: Relay sensor placement in wireless sensor networks publication-title: Wireless Networks doi: 10.1007/s11276-006-0724-8 – volume: 52 start-page: 2292 issue: 12 year: 2008 ident: 10.1016/j.adhoc.2014.08.016_b0035 article-title: Wireless sensor network survey publication-title: Comput. Networks doi: 10.1016/j.comnet.2008.04.002 – volume: 1 start-page: 215 issue: 2–3 year: 2003 ident: 10.1016/j.adhoc.2014.08.016_b0040 article-title: Data mules: modeling and analysis of a three-tier architecture for sparse sensor networks publication-title: Ad Hoc Networks doi: 10.1016/S1570-8705(03)00003-9 |
SSID | ssj0029201 |
Score | 2.157547 |
Snippet | Sensor networks operating in the field might be subject to catastrophic events which destroy a large number of nodes in the geographic area. Often, the... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 186 |
SubjectTerms | Algorithms Bridge protection Catastrophic events Computer networks Exhaust Fault tolerance Networks Remote sensors Routing (telecommunications) Sensor network |
Title | Bridge protection algorithms – A technique for fault-tolerance in sensor networks |
URI | https://dx.doi.org/10.1016/j.adhoc.2014.08.016 https://www.proquest.com/docview/1651456818 |
Volume | 24 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDI6mcYED4imeU5A4UtZ2bdoex8Q0XhNiIHGL3DRlQ6OdWHdF_Af-Ib8Eu48JENqBU9U2qSLHsf2lzmfGjqMQg1bXpoUEoUEBvOFHXmgE4CkbrCAEIKB40xe9B-fy0X2ssU51FobSKkvbX9j03FqXT5qlNJuT0ag5sFzPRG1Dj59XlqOD5o7jkZafvs3TPKgYU8GZ6pkGta6Yh_IcL4iGKfEYWk7O40lFz__2Tr_sdO58umtstYwaebsY2Dqr6WSDrXzjEtxkg7P86BUviRdQ3BzGTyli_-HLlH--f_A2nxO2cgxVeQyzcWZk6VhTcQ3NRwmfIqjFN0mRGz7dYg_d8_tOzygrJhiq1RIZqrwVt1Qc-4C4LxaBCnw7FpEIPYWOCGwACDRCPggFMa0pAF8TPrZ9XLgRGr9tVk_SRO8wbgK6N1-JSGvlICYKYqFMM46Ei5jQjcQusytJSVXSiVNVi7Gs8saeZS5eSeKVVOvSwk4n806Tgk1jcXNRTYH8oRQS7f3ijkfVhElcLvQPBBKdzqbSwvE7RLrm7_334_tsGe_cYh_mgNWz15k-xMgkCxu56jXYUrtzd31L14urXv8L1Ffk_A |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDI7GdgAOiKd4EySOVGu7NW2PY2Lq2OOyTdotctOUDZV2Yt2d_8A_5Jfg9DEBQjtwbeoqchzbX-N8JuQu8DFptUy1kcDXVAKvOYHtay7YwgTD9QEUUBwMmTdpPk2taYW0y7swqqyy8P25T8-8dfGkXmizvpjP6yPDsnW0Noz4WWc5a4vUFDuVVSW1VrfnDde4yzX1nDbV1jUlUJIPZWVeEMwSRWVoNDMqT9X3_O8A9ctVZ_Gns0_2isSRtvK5HZCKjA_J7jc6wSMyeshuX9GCewE1TiF6ThD-z16X9PP9g7bomrOVYrZKQ1hFqZYmkVT9NSSdx3SJuBZH4rw8fHlMJp3HcdvTiqYJmmg0WIpWb4QNEYYOIPQLmStcxwxZwHxbYCwCEwBciagPfKbI1gSAIxVENh3cuwH6vxNSjZNYnhKqA0Y4R7BAStFEWOSGTOh6GDALYaEVsDNilpriomAUV40tIl6Wjr3wTL1cqZerdpcGCt2vhRY5ocbm11m5BPyHXXB0-ZsFb8sF47hj1DEIxDJZLbmB828q3jXn_L8fvyHb3njQ5_3usHdBdnDEyn_LXJJq-raSV5iopP51YYhfhObmGA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Bridge+protection+algorithms+-+A+technique+for+fault-tolerance+in+sensor+networks&rft.jtitle=Ad+hoc+networks&rft.au=Khan%2C+Saad+Ahmad&rft.au=Boloni%2C+Ladislau&rft.au=Turgut%2C+Damla&rft.date=2015-01-01&rft.issn=1570-8705&rft.volume=24&rft.spage=186&rft.epage=199&rft_id=info:doi/10.1016%2Fj.adhoc.2014.08.016&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1570-8705&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1570-8705&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1570-8705&client=summon |