Fault Tolerance in Wireless Sensor Networks using Stiffed Delaunay Triangulation
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 6
Abstract
In this chapter, we introduce fault tolerance in Wireless Sensor Networks. Firstly, we start with a short description of sensor networks, fault tolerance and its different techniques. Then we discuss the different phases of fault tolerance (fault models, fault detection and identification at five levels of abstractions (physical, hardware, middleware, system software and applications) and four scopes (components of individual nodes, individual node, network and the distributed system). The technical cores of the chapter covered various coverage strategies to make the system fault tolerant. We conclude the chapter with a brief survey of the future directions for fault tolerance in Wireless Sensor Networks.
Authors and Affiliations
Abhinandan Gupta , Rinkle Aggarwal
Classification of Escherichia Coli Bacteria using Meta-Cognitive Neural Network
The classification of data using machine learning involves different challenging tasks which depend on the learning method, selection of neurons, selection of dataset, selection of algorithm etc. This paper deals with cl...
Civilizing the Network Lifetime Efficiently in MANETs Through DEL-CMAC Protocol
MANET (Mobile Ad-Hoc Network) has a dynamic topology. Due to the mobility of nodes in the network of cooperative communication is a technique for archived greater efficiency of transmission. In this paper the Network Lif...
A SURVEY ON CYBER TERRORISM
Cyber terrorism is a major issue by which an individual or group of people use digitalized method to attack physically or attack on any information for their various reasons. Recent years have seen a rapid growth in the...
A Review on Recent Computer Crimes
With the evolution of technology, crimes happening with the help of computer and internet are increasing day by day and have become curse for the modern era. Cybercrime globally affects IT environment very much be it gov...
SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW
Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of a node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The...