Bridge protection algorithms – A technique for fault-tolerance in sensor networks

Sensor networks operating in the field might be subject to catastrophic events which destroy a large number of nodes in the geographic area. Often, the aftermath of such an event is the creation of a network of bridged fragments where connectivity is maintained by one or several bridge nodes. These...

Full description

Saved in:
Bibliographic Details
Published inAd hoc networks Vol. 24; pp. 186 - 199
Main Authors Khan, Saad Ahmad, Bölöni, Ladislau, Turgut, Damla
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.01.2015
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Sensor networks operating in the field might be subject to catastrophic events which destroy a large number of nodes in the geographic area. Often, the aftermath of such an event is the creation of a network of bridged fragments where connectivity is maintained by one or several bridge nodes. These networks are vulnerable, because the bridge nodes will soon exhaust their energy resources leading to the fragmentation of the network. This paper describes a bridge protection algorithm (BPA), a combination of techniques which, in response to a catastrophic event, change the behavior of a set of topologically important nodes in the network. These techniques protect the bridge node by letting some nodes take over some of the responsibilities of the sink. At the same time, they relieve some other overwhelmed nodes and prevent the apparition of additional bridge nodes. To achieve this, the algorithm sacrifices the length of some routes in order to distribute routes away from critical areas. In a variation on the BPA algorithm, we show that if geographic information about the nodes is available, replacing shortest path routing with a routing model which follows the edges of the relational neighborhood graph will lead to further improvements in the expected connected lifetime of the network.
AbstractList Sensor networks operating in the field might be subject to catastrophic events which destroy a large number of nodes in the geographic area. Often, the aftermath of such an event is the creation of a network of bridged fragments where connectivity is maintained by one or several bridge nodes. These networks are vulnerable, because the bridge nodes will soon exhaust their energy resources leading to the fragmentation of the network. This paper describes a bridge protection algorithm (BPA), a combination of techniques which, in response to a catastrophic event, change the behavior of a set of topologically important nodes in the network. These techniques protect the bridge node by letting some nodes take over some of the responsibilities of the sink. At the same time, they relieve some other overwhelmed nodes and prevent the apparition of additional bridge nodes. To achieve this, the algorithm sacrifices the length of some routes in order to distribute routes away from critical areas. In a variation on the BPA algorithm, we show that if geographic information about the nodes is available, replacing shortest path routing with a routing model which follows the edges of the relational neighborhood graph will lead to further improvements in the expected connected lifetime of the network.
Author Bölöni, Ladislau
Khan, Saad Ahmad
Turgut, Damla
Author_xml – sequence: 1
  givenname: Saad Ahmad
  surname: Khan
  fullname: Khan, Saad Ahmad
  email: skhan@eecs.ucf.edu
– sequence: 2
  givenname: Ladislau
  surname: Bölöni
  fullname: Bölöni, Ladislau
  email: lboloni@eecs.ucf.edu
– sequence: 3
  givenname: Damla
  surname: Turgut
  fullname: Turgut, Damla
  email: turgut@eecs.ucf.edu
BookMark eNqFkMFOGzEQhq0qlUqgT9CLj1x2a3t3He-BQxpBQYrUA_RsDd5x4nRjg-2AuPEOfcM-CQ6peuBQTmPN_N949E3JxAePhHzhrOaMy6-bGoZ1MLVgvK2ZqkvvAzni3YxVasabyb836z6RaUobxkRfwkfk-lt0wwrpXQwZTXbBUxhXIbq83ib65_k3ndMyWHt3v0NqQ6QWdmOuchgxgjdInacJfSoTj_kxxF_phHy0MCb8_Lcek58X5zeLy2r54_vVYr6sTNPIXJX_bWOsVSC61sre9EpYOcjbmWFcgACAHgXncCt5K5QBUNjKngnVzdTAu-aYnB72luPLdSnrrUsGxxE8hl3SXHa87aTiqkSbQ9TEkFJEq--i20J80pzpvUK90a8K9V6hZkqXXqH6N5RxGfaScgQ3vsOeHVgsBh4cRp2MwyJscLGI1kNw_-VfAJihkUE
CitedBy_id crossref_primary_10_1007_s41109_019_0122_7
crossref_primary_10_1109_TNSM_2016_2516243
crossref_primary_10_1016_j_adhoc_2016_12_006
crossref_primary_10_1016_j_adhoc_2017_12_008
crossref_primary_10_1016_j_adhoc_2019_101879
crossref_primary_10_1016_j_comnet_2017_02_003
crossref_primary_10_1016_j_jnca_2017_02_007
crossref_primary_10_1109_JSYST_2017_2780264
Cites_doi 10.1145/989459.989483
10.1016/j.jnca.2011.12.002
10.1145/1089444.1089473
10.1109/TC.2009.120
10.1109/ICC.2009.5199381
10.1109/ICC.2009.5199052
10.1109/LCN.2009.5355150
10.1145/2402.322386
10.1109/INFCOM.2005.1498517
10.1007/s11276-010-0313-8
10.1109/GLOCOM.2008.ECP.44
10.1145/1298126.1298143
10.1109/WCINS.2010.5544679
10.1007/BF02187695
10.1145/958491.958506
10.1109/IWCMC.2011.5982846
10.1109/TPDS.2008.246
10.1109/MCOM.2006.248176
10.1109/EUC.2010.37
10.1109/TWC.2005.853969
10.1109/LCN.2007.19
10.1007/s11276-006-0724-8
10.1016/j.comnet.2008.04.002
10.1016/S1570-8705(03)00003-9
ContentType Journal Article
Copyright 2014 Elsevier B.V.
Copyright_xml – notice: 2014 Elsevier B.V.
DBID AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.adhoc.2014.08.016
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1570-8713
EndPage 199
ExternalDocumentID 10_1016_j_adhoc_2014_08_016
S1570870514001875
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
23M
4.4
457
4G.
5GY
5VS
6OB
7-5
71M
8P~
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
RIG
ROL
RPZ
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
UHS
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c336t-201f3cff8a254f69c982f6d6b7c012a2aaa9e211ab61428caa8e469028578d153
IEDL.DBID .~1
ISSN 1570-8705
IngestDate Fri Jul 11 02:45:57 EDT 2025
Tue Jul 01 04:51:31 EDT 2025
Thu Apr 24 23:12:59 EDT 2025
Fri Feb 23 02:27:34 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Bridge protection
Fault tolerance
Sensor network
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c336t-201f3cff8a254f69c982f6d6b7c012a2aaa9e211ab61428caa8e469028578d153
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 1651456818
PQPubID 23500
PageCount 14
ParticipantIDs proquest_miscellaneous_1651456818
crossref_primary_10_1016_j_adhoc_2014_08_016
crossref_citationtrail_10_1016_j_adhoc_2014_08_016
elsevier_sciencedirect_doi_10_1016_j_adhoc_2014_08_016
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate January 2015
2015-01-00
20150101
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – month: 01
  year: 2015
  text: January 2015
PublicationDecade 2010
PublicationTitle Ad hoc networks
PublicationYear 2015
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References H. Almasaeid, A. Kamal, Data delivery in fragmented wireless sensor networks using mobile agents, in: Proc. of the ACM Int’l Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2007), 2007, pp. 86–94.
Rappaport (b0015) 1996
Basagni, Carosi, Petrioli, Phillips (b0050) 2011; 17
Hou, Shi, Sherali, Midkiff (b0120) 2005; 4
Supowit (b0025) 1983; 30
L. Bölöni, D. Turgut, YAES – a modular simulator for mobile networks, in: Proc. of the 8-th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2005), 2005, pp. 169–173.
Akkaya, Senel, Thimmapuram, Uludag (b0080) 2010; 59
G. Wang, G. Cao, T. La Porta, W. Zhang, Sensor relocation in mobile sensor networks, in: Proc. of 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM-2005), vol. 4, 2005, pp. 2302–2312.
Cheng, Du, Wang, Xu (b0115) 2008; 14
S. Lee, M. Younis, QoS-aware relay node placement in a segmented wireless sensor network, in: Proc. of the IEEE Int’l Conference on Communications (ICC 2009), 2009, pp. 1–5.
W. Zhao, M. Ammar, E. Zegura, A message ferrying approach for data delivery in sparse mobile ad hoc networks, in: Proc. of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2004), 2004, pp. 187–198.
Shah, Roy, Jain, Brunette (b0040) 2003; 1
L. Bölöni, D. Turgut, Protecting bridges: reorganizing sensor networks after catastrophic events, in: Proc. of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC-2011), 2011, pp. 2028–2033.
A.A. Abbasi, K. Akkaya, M. Younis, A distributed connectivity restoration algorithm in wireless sensor and actor networks, in: Proc. of 32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007, pp. 496–503.
Pelusi, Passarella, Conti (b0105) 2006; 44
M. Imran, M. Younis, A. Md Said, H. Hasbullah, Volunteer-instigated connectivity restoration algorithm for wireless sensor and actor networks, in: Proc. of IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), 2010, pp. 679–683.
Yick, Mukherjee, Ghosal (b0035) 2008; 52
H. Almasaeid, A. Kamal, Modeling mobility-assisted data collection in wireless sensor networks, in: Proc. of the IEEE Global Communications Conference (GLOBECOM-2008), 2008, pp. 1–5.
Abbasi, Younis, Akkaya (b0075) 2009; 20
Imran, Younis, Md Said, Hasbullah (b0095) 2012; 35
P. Levis, N. Lee, M. Welsh, D. Culler, TOSSIM: accurate and scalable simulation of entire TinyOS applications, in: Proc. of the 1st International Conference on Embedded Networked Sensor Systems, 2003, pp. 126–137.
Lee, Lin (b0020) 1986; 1
D. Turgut, B. Turgut, L. Bölöni, Stealthy dissemination in intruder tracking sensor networks, in: Proc. of IEEE Local Computer Networks (LCN 2009), 2009, pp. 22–29.
S. Basagni, A. Carosi, C. Petrioli, Heuristics for lifetime maximization in wireless sensor networks with multiple mobile sinks, in: Proc. of the IEEE ICC’09, 2009, pp. 1–6.
M. Imran, M. Younis, A.M. Said, H. Hasbullah, Partitioning detection and connectivity restoration algorithm for wireless sensor and actor networks, in: Proc. of the 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2010), 2010, pp. 200–207.
10.1016/j.adhoc.2014.08.016_b0125
10.1016/j.adhoc.2014.08.016_b0005
10.1016/j.adhoc.2014.08.016_b0065
10.1016/j.adhoc.2014.08.016_b0045
10.1016/j.adhoc.2014.08.016_b0100
Basagni (10.1016/j.adhoc.2014.08.016_b0050) 2011; 17
10.1016/j.adhoc.2014.08.016_b0060
Rappaport (10.1016/j.adhoc.2014.08.016_b0015) 1996
10.1016/j.adhoc.2014.08.016_b0085
Akkaya (10.1016/j.adhoc.2014.08.016_b0080) 2010; 59
Lee (10.1016/j.adhoc.2014.08.016_b0020) 1986; 1
Cheng (10.1016/j.adhoc.2014.08.016_b0115) 2008; 14
Supowit (10.1016/j.adhoc.2014.08.016_b0025) 1983; 30
Hou (10.1016/j.adhoc.2014.08.016_b0120) 2005; 4
10.1016/j.adhoc.2014.08.016_b0010
10.1016/j.adhoc.2014.08.016_b0055
10.1016/j.adhoc.2014.08.016_b0110
10.1016/j.adhoc.2014.08.016_b0030
Shah (10.1016/j.adhoc.2014.08.016_b0040) 2003; 1
10.1016/j.adhoc.2014.08.016_b0090
Pelusi (10.1016/j.adhoc.2014.08.016_b0105) 2006; 44
10.1016/j.adhoc.2014.08.016_b0070
Abbasi (10.1016/j.adhoc.2014.08.016_b0075) 2009; 20
Imran (10.1016/j.adhoc.2014.08.016_b0095) 2012; 35
Yick (10.1016/j.adhoc.2014.08.016_b0035) 2008; 52
References_xml – year: 1996
  ident: b0015
  article-title: Wireless Communications: Principles & Practice
– reference: A.A. Abbasi, K. Akkaya, M. Younis, A distributed connectivity restoration algorithm in wireless sensor and actor networks, in: Proc. of 32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007, pp. 496–503.
– volume: 30
  start-page: 428
  year: 1983
  end-page: 448
  ident: b0025
  article-title: The relative neighborhood graph, with an application to minimum spanning trees
  publication-title: J. ACM (JACM)
– volume: 1
  start-page: 215
  year: 2003
  end-page: 233
  ident: b0040
  article-title: Data mules: modeling and analysis of a three-tier architecture for sparse sensor networks
  publication-title: Ad Hoc Networks
– reference: S. Basagni, A. Carosi, C. Petrioli, Heuristics for lifetime maximization in wireless sensor networks with multiple mobile sinks, in: Proc. of the IEEE ICC’09, 2009, pp. 1–6.
– reference: G. Wang, G. Cao, T. La Porta, W. Zhang, Sensor relocation in mobile sensor networks, in: Proc. of 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM-2005), vol. 4, 2005, pp. 2302–2312.
– volume: 44
  start-page: 134
  year: 2006
  end-page: 141
  ident: b0105
  article-title: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks
  publication-title: IEEE Commun. Mag.
– reference: W. Zhao, M. Ammar, E. Zegura, A message ferrying approach for data delivery in sparse mobile ad hoc networks, in: Proc. of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2004), 2004, pp. 187–198.
– reference: S. Lee, M. Younis, QoS-aware relay node placement in a segmented wireless sensor network, in: Proc. of the IEEE Int’l Conference on Communications (ICC 2009), 2009, pp. 1–5.
– reference: D. Turgut, B. Turgut, L. Bölöni, Stealthy dissemination in intruder tracking sensor networks, in: Proc. of IEEE Local Computer Networks (LCN 2009), 2009, pp. 22–29.
– reference: H. Almasaeid, A. Kamal, Modeling mobility-assisted data collection in wireless sensor networks, in: Proc. of the IEEE Global Communications Conference (GLOBECOM-2008), 2008, pp. 1–5.
– volume: 52
  start-page: 2292
  year: 2008
  end-page: 2330
  ident: b0035
  article-title: Wireless sensor network survey
  publication-title: Comput. Networks
– reference: L. Bölöni, D. Turgut, Protecting bridges: reorganizing sensor networks after catastrophic events, in: Proc. of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC-2011), 2011, pp. 2028–2033.
– volume: 1
  start-page: 201
  year: 1986
  end-page: 217
  ident: b0020
  article-title: Generalized Delaunay triangulation for planar graphs
  publication-title: Discr. Comput. Geomet.
– reference: L. Bölöni, D. Turgut, YAES – a modular simulator for mobile networks, in: Proc. of the 8-th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2005), 2005, pp. 169–173.
– reference: H. Almasaeid, A. Kamal, Data delivery in fragmented wireless sensor networks using mobile agents, in: Proc. of the ACM Int’l Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2007), 2007, pp. 86–94.
– reference: M. Imran, M. Younis, A. Md Said, H. Hasbullah, Volunteer-instigated connectivity restoration algorithm for wireless sensor and actor networks, in: Proc. of IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), 2010, pp. 679–683.
– volume: 17
  start-page: 759
  year: 2011
  end-page: 778
  ident: b0050
  article-title: Coordinated and controlled mobility of multiple sinks for maximizing the lifetime of wireless sensor networks
  publication-title: Wireless Networks
– volume: 4
  start-page: 2579
  year: 2005
  end-page: 2590
  ident: b0120
  article-title: On energy provisioning and relay node placement for wireless sensor networks
  publication-title: IEEE Trans. Wireless Commun.
– reference: P. Levis, N. Lee, M. Welsh, D. Culler, TOSSIM: accurate and scalable simulation of entire TinyOS applications, in: Proc. of the 1st International Conference on Embedded Networked Sensor Systems, 2003, pp. 126–137.
– volume: 59
  start-page: 258
  year: 2010
  end-page: 271
  ident: b0080
  article-title: Distributed recovery from network partitioning in movable sensor/actor networks via controlled mobility
  publication-title: IEEE Trans. Comput.
– volume: 20
  start-page: 1366
  year: 2009
  end-page: 1379
  ident: b0075
  article-title: Movement-assisted connectivity restoration in wireless sensor and actor networks
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– reference: M. Imran, M. Younis, A.M. Said, H. Hasbullah, Partitioning detection and connectivity restoration algorithm for wireless sensor and actor networks, in: Proc. of the 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2010), 2010, pp. 200–207.
– volume: 35
  start-page: 844
  year: 2012
  end-page: 856
  ident: b0095
  article-title: Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks
  publication-title: J. Network Comput. Appl.
– volume: 14
  start-page: 347
  year: 2008
  end-page: 355
  ident: b0115
  article-title: Relay sensor placement in wireless sensor networks
  publication-title: Wireless Networks
– ident: 10.1016/j.adhoc.2014.08.016_b0100
  doi: 10.1145/989459.989483
– volume: 35
  start-page: 844
  issue: 2
  year: 2012
  ident: 10.1016/j.adhoc.2014.08.016_b0095
  article-title: Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks
  publication-title: J. Network Comput. Appl.
  doi: 10.1016/j.jnca.2011.12.002
– ident: 10.1016/j.adhoc.2014.08.016_b0030
  doi: 10.1145/1089444.1089473
– volume: 59
  start-page: 258
  issue: 2
  year: 2010
  ident: 10.1016/j.adhoc.2014.08.016_b0080
  article-title: Distributed recovery from network partitioning in movable sensor/actor networks via controlled mobility
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2009.120
– ident: 10.1016/j.adhoc.2014.08.016_b0125
  doi: 10.1109/ICC.2009.5199381
– ident: 10.1016/j.adhoc.2014.08.016_b0045
  doi: 10.1109/ICC.2009.5199052
– ident: 10.1016/j.adhoc.2014.08.016_b0010
  doi: 10.1109/LCN.2009.5355150
– volume: 30
  start-page: 428
  issue: 3
  year: 1983
  ident: 10.1016/j.adhoc.2014.08.016_b0025
  article-title: The relative neighborhood graph, with an application to minimum spanning trees
  publication-title: J. ACM (JACM)
  doi: 10.1145/2402.322386
– ident: 10.1016/j.adhoc.2014.08.016_b0110
  doi: 10.1109/INFCOM.2005.1498517
– volume: 17
  start-page: 759
  issue: 3
  year: 2011
  ident: 10.1016/j.adhoc.2014.08.016_b0050
  article-title: Coordinated and controlled mobility of multiple sinks for maximizing the lifetime of wireless sensor networks
  publication-title: Wireless Networks
  doi: 10.1007/s11276-010-0313-8
– ident: 10.1016/j.adhoc.2014.08.016_b0060
  doi: 10.1109/GLOCOM.2008.ECP.44
– ident: 10.1016/j.adhoc.2014.08.016_b0055
  doi: 10.1145/1298126.1298143
– ident: 10.1016/j.adhoc.2014.08.016_b0085
  doi: 10.1109/WCINS.2010.5544679
– volume: 1
  start-page: 201
  issue: 1
  year: 1986
  ident: 10.1016/j.adhoc.2014.08.016_b0020
  article-title: Generalized Delaunay triangulation for planar graphs
  publication-title: Discr. Comput. Geomet.
  doi: 10.1007/BF02187695
– ident: 10.1016/j.adhoc.2014.08.016_b0065
  doi: 10.1145/958491.958506
– ident: 10.1016/j.adhoc.2014.08.016_b0005
  doi: 10.1109/IWCMC.2011.5982846
– volume: 20
  start-page: 1366
  issue: 9
  year: 2009
  ident: 10.1016/j.adhoc.2014.08.016_b0075
  article-title: Movement-assisted connectivity restoration in wireless sensor and actor networks
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2008.246
– volume: 44
  start-page: 134
  issue: 11
  year: 2006
  ident: 10.1016/j.adhoc.2014.08.016_b0105
  article-title: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2006.248176
– ident: 10.1016/j.adhoc.2014.08.016_b0090
  doi: 10.1109/EUC.2010.37
– volume: 4
  start-page: 2579
  issue: 5
  year: 2005
  ident: 10.1016/j.adhoc.2014.08.016_b0120
  article-title: On energy provisioning and relay node placement for wireless sensor networks
  publication-title: IEEE Trans. Wireless Commun.
  doi: 10.1109/TWC.2005.853969
– year: 1996
  ident: 10.1016/j.adhoc.2014.08.016_b0015
– ident: 10.1016/j.adhoc.2014.08.016_b0070
  doi: 10.1109/LCN.2007.19
– volume: 14
  start-page: 347
  issue: 3
  year: 2008
  ident: 10.1016/j.adhoc.2014.08.016_b0115
  article-title: Relay sensor placement in wireless sensor networks
  publication-title: Wireless Networks
  doi: 10.1007/s11276-006-0724-8
– volume: 52
  start-page: 2292
  issue: 12
  year: 2008
  ident: 10.1016/j.adhoc.2014.08.016_b0035
  article-title: Wireless sensor network survey
  publication-title: Comput. Networks
  doi: 10.1016/j.comnet.2008.04.002
– volume: 1
  start-page: 215
  issue: 2–3
  year: 2003
  ident: 10.1016/j.adhoc.2014.08.016_b0040
  article-title: Data mules: modeling and analysis of a three-tier architecture for sparse sensor networks
  publication-title: Ad Hoc Networks
  doi: 10.1016/S1570-8705(03)00003-9
SSID ssj0029201
Score 2.157547
Snippet Sensor networks operating in the field might be subject to catastrophic events which destroy a large number of nodes in the geographic area. Often, the...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 186
SubjectTerms Algorithms
Bridge protection
Catastrophic events
Computer networks
Exhaust
Fault tolerance
Networks
Remote sensors
Routing (telecommunications)
Sensor network
Title Bridge protection algorithms – A technique for fault-tolerance in sensor networks
URI https://dx.doi.org/10.1016/j.adhoc.2014.08.016
https://www.proquest.com/docview/1651456818
Volume 24
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDI6mcYED4imeU5A4UtZ2bdoex8Q0XhNiIHGL3DRlQ6OdWHdF_Af-Ib8Eu48JENqBU9U2qSLHsf2lzmfGjqMQg1bXpoUEoUEBvOFHXmgE4CkbrCAEIKB40xe9B-fy0X2ssU51FobSKkvbX9j03FqXT5qlNJuT0ag5sFzPRG1Dj59XlqOD5o7jkZafvs3TPKgYU8GZ6pkGta6Yh_IcL4iGKfEYWk7O40lFz__2Tr_sdO58umtstYwaebsY2Dqr6WSDrXzjEtxkg7P86BUviRdQ3BzGTyli_-HLlH--f_A2nxO2cgxVeQyzcWZk6VhTcQ3NRwmfIqjFN0mRGz7dYg_d8_tOzygrJhiq1RIZqrwVt1Qc-4C4LxaBCnw7FpEIPYWOCGwACDRCPggFMa0pAF8TPrZ9XLgRGr9tVk_SRO8wbgK6N1-JSGvlICYKYqFMM46Ei5jQjcQusytJSVXSiVNVi7Gs8saeZS5eSeKVVOvSwk4n806Tgk1jcXNRTYH8oRQS7f3ijkfVhElcLvQPBBKdzqbSwvE7RLrm7_334_tsGe_cYh_mgNWz15k-xMgkCxu56jXYUrtzd31L14urXv8L1Ffk_A
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDI7GdgAOiKd4EySOVGu7NW2PY2Lq2OOyTdotctOUDZV2Yt2d_8A_5Jfg9DEBQjtwbeoqchzbX-N8JuQu8DFptUy1kcDXVAKvOYHtay7YwgTD9QEUUBwMmTdpPk2taYW0y7swqqyy8P25T8-8dfGkXmizvpjP6yPDsnW0Noz4WWc5a4vUFDuVVSW1VrfnDde4yzX1nDbV1jUlUJIPZWVeEMwSRWVoNDMqT9X3_O8A9ctVZ_Gns0_2isSRtvK5HZCKjA_J7jc6wSMyeshuX9GCewE1TiF6ThD-z16X9PP9g7bomrOVYrZKQ1hFqZYmkVT9NSSdx3SJuBZH4rw8fHlMJp3HcdvTiqYJmmg0WIpWb4QNEYYOIPQLmStcxwxZwHxbYCwCEwBciagPfKbI1gSAIxVENh3cuwH6vxNSjZNYnhKqA0Y4R7BAStFEWOSGTOh6GDALYaEVsDNilpriomAUV40tIl6Wjr3wTL1cqZerdpcGCt2vhRY5ocbm11m5BPyHXXB0-ZsFb8sF47hj1DEIxDJZLbmB828q3jXn_L8fvyHb3njQ5_3usHdBdnDEyn_LXJJq-raSV5iopP51YYhfhObmGA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Bridge+protection+algorithms+-+A+technique+for+fault-tolerance+in+sensor+networks&rft.jtitle=Ad+hoc+networks&rft.au=Khan%2C+Saad+Ahmad&rft.au=Boloni%2C+Ladislau&rft.au=Turgut%2C+Damla&rft.date=2015-01-01&rft.issn=1570-8705&rft.volume=24&rft.spage=186&rft.epage=199&rft_id=info:doi/10.1016%2Fj.adhoc.2014.08.016&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1570-8705&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1570-8705&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1570-8705&client=summon