Algorithm and Formal Model of Recovering Network Connectivity in Battlefield Surveillance

Journal Title: EAI Endorsed Transactions on Internet of Things - Year 2017, Vol 3, Issue 11

Abstract

Battlefield surveillance requires mission-critical operations and tasks which can effectively be performed using Wireless Sensor and Actor Networks (WSANs). We have used clustering approach for deployment of WSAN to minimize energy consumption and to limit the processing cost. The adverse environment conditions in battlefield may cause a loss of connectivity but there is a need of continuous flow of information in this application. Therefore an algorithm for network recovering is proposed. Firstly, graphical model of the system is presented using graph theory which is then transformed into a formal model by developing formal specification using Vienna Development Method-Specification Language (VDM-SL). Invariants and pre/post-conditions are defined for its validation. The correctness of the formal specification is assured by an analysis through VDM-SL toolbox.

Authors and Affiliations

Nazir Ahmad Zafar , Hamra Afzaal

Keywords

Related Articles

IoT-F2CDM-LB: IoT Based Fog-to-Cloud and Data-in-Motion Architectures with Load Balancing

The work in this paper tries to enhance the performance of IoT by modifying the Cloud based architecture in terms of storage, processing, and Load Balancing (LB). The assumption is as follows: In a single Fog server, hig...

Securing the Timestamping of Sensor Data from Wearable Healthcare Devices

An ageing population, coupled with increasing prevalence of chronic diseases, is placing unsustainable demands on current healthcare systems. Home-based medical monitoring, supported by wearable sensors for heart-rate, E...

Authorization-based Approach for Customized Automated Resource Provisioning Services

Combining the concept of software control with existing legacy network technology promotes new networking services with low capital expenditure. Currently, many testbeds and academic operators provide bandwidth on demand...

Secure Login Using Multi-Tier Authentication Schemes in Fog Computing

Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different...

A Survey of Internet of Things Services Provision by Telecom Operators

Telecom industry will play a vital role in delivering Internet of Things (IoT) solutions and services. Researchers trust that IoT services deployment by Telecom is inevitable during the next few years. Nowadays, digital...

Download PDF file
  • EP ID EP46599
  • DOI http://dx.doi.org/10.4108/eai.26-3-2018.154377
  • Views 259
  • Downloads 0

How To Cite

Nazir Ahmad Zafar, Hamra Afzaal (2017). Algorithm and Formal Model of Recovering Network Connectivity in Battlefield Surveillance. EAI Endorsed Transactions on Internet of Things, 3(11), -. https://europub.co.uk/articles/-A-46599