Fault Tolerant Techniques in USNs: History
Please note this is an old version of this entry, which may differ significantly from the current revision.
Contributor:

Sensor networks provide services to a broad range of applications ranging from intelligence service surveillance to weather forecasting. While most of the sensor networks are terrestrial, Underwater Sensor Networks (USN) are an emerging area. One of the unavoidable and increasing challenges for modern USN technology is tolerating faults, i.e., accepting that hardware is imperfect, and coping with it. Fault Tolerance tends to have more impact in underwater than in terrestrial environment as the latter is generally more forgiving. Moreover, reaching the malfunctioning devices for replacement and maintenance under water is harder and more costly.

  • underwater sensor network
  • fault tolerance
  • cross-layer fault tolerance
  • fault management

1. Introduction

Underwater Sensor Networks (USNs) have become widespread and are being deployed in a wide range of applications ranging from harbor security to monitoring underwater pipelines and fish farms. Due to the fact that USNs often operate in an extremely harsh environment, and many of their applications are safety-critical, it is imperative to develop techniques enabling these networks to tolerate faults. Moreover, USNs face many challenges that are not present in terrestrial networks, such as virtual inapplicability of the wireless radio communication under water and limitations of the acoustic means, for example.

2. Specifics of Underwater Sensor Networks

Environmental and engineering challenges for sensor networks in underwater environments are shown on Figure 1. An underwater environment is mostly different from a terrestrial one due to the harsh physical conditions—high pressure and hard accessibility, as well as limited communication and energy resources. Depending on the specific location, the temperature may fall with increasing depth, which may affect, e.g., the battery lifetime. In underwater environments, faults can be caused over time by ambient flowing water generated by surface waves or other reasons that shake the components of the sensor networks. Moreover, faults can be introduced by humans or aquatic organisms.
Figure 1. Environmental and engineering challenges in USNs.
Many communication methods are unavailable underwater, and there are multiple phenomena [1][2] that obstruct communication there. Because of the possibility of flooding the hardware due to water leakage, more attention and resources should be paid to the physical integrity of sensor nodes. On the other hand, faults from excessive heat should be rare and avoidable underwater. In the underwater context, Fault Tolerance has been so far addressed for reliant UWSN networking [1][3][4][5], space localization [6], and monitoring underwater pipelines [7]. While it should be possible to adapt most of the generic Fault Tolerance concepts for the underwater use, the environment is more demanding and unforgiving, and faults are more costly. Some more demanding approaches, like cloud computing, may not make sense to be implemented in USNs. However, the authors cannot see any obstacles for applying those fault tolerant approaches that yield appropriate communication methods, low network bandwidths, and power requirements in the underwater domain.
Last but not least, one of the promising approaches that could be adapted successfully within the underwater environment’s constraints appears to be cross-layer resilience, which is an open research topic and lacking in recent research works, even for the terrestrial implementations.

3. Taxonomy of Faults and Fault Tolerance Tasks

In the following, we present the taxonomy of the sources of faults, as well as of the Fault Tolerance tasks. The objective of describing and representing these taxonomies is to categorize the articles for the current survey.

3.1. Sources of Faults

A fault is defined [8] as an underlying defect of a system that leads to an error. An error is a faulty system state, which may lead to failure, and failure is an error that affects system functionality. Faults may occur in different components and layers of systems for different reasons. The only type of fault possible in software is a design fault introduced during the software development, i.e., a bug [9]. Software bugs can be addressed separately and will not be covered further in the current paper.
Fault sources can be categorized by components where they occur. In sensor networks, they can occur in sensor nodes, in the communication network, and in the data sink [10]. Sensor networks share common failure issues with traditional networks, as well as introduce node failures as new fault sources [11].
USNs additionally introduce faults caused by environmental conditions, such as pressure, currents, underwater obstacles, etc. Those conditions may cause physical damage that may result in failures, as well as obstruct the system’s functionality. For instance, in underwater acoustic networks, loss of connection and high bit error rate may be caused by shadow zones [2] formed by different physical reasons. Domingo and Vuran distinguish up to five different underwater propagation phenomena which may obstruct communication [1].
Faults can either be permanent or temporary [12]. Permanent faults may be caused by manufacturing defects, as variances of the hardware components are inevitable due to physical reasons [13]. One of the other factors that can introduce faults is aging and wear-out of the hardware components [14]. In addition to the components themselves, the interconnections between them are also affecting the reliability and may cause faults [15].
One of the challenges of fault management is temporary faults, especially soft errors. Soft error is a temporary change of signal value due to ionizing particles [12] that may lead to failure. Due to high integration density, it is estimated that soft failure rate is increasing in the future [16]. Another potential source of temporary faults is electromagnetic interference [17].

3.2. Fault Tolerance Tasks

The objective of the current section is to define a taxonomy of Fault Tolerance tasks to help categorize the identified papers. The Fault Tolerance tasks are based on more general Fault Tolerance principles from References [18][19]Figure 2. shows the taxonomy of Fault Tolerance tasks applicable in USNs and how they affect each other. While the design and initial deployment of USNs contribute to Fault Prevention and Prediction abilities, data collecting techniques at the run-time contribute also to Fault Detection and Fault Recovery stages of the system, all of which are going to be discussed in the current paper.

Figure 2. Taxonomy of Fault Tolerance tasks in USNs.

The techniques under consideration can be categorized into the following groups:

  • Fault Prediction and Prevention
    This task is about both preventing a fault to happen, as well as about proactive fault avoidance. Sensor networks can prevent certain faults from happening by design and/or deployment aspects. A disadvantage of fault prevention is a potentially increased system complexity. Fault avoidance, in turn, includes manufacturing testing and verification, which have a high cost often exceeding that of the entire design process.
  • Fault Detection and Identification
    One of the central parts of Fault Tolerance is Fault Detection and Fault Identification of affected components which can, for instance, be performed by utilizing data collection with ping messages. Without Fault Identification, for instance, sensor node and network faults may be hard to distinguish. A disadvantage of Fault Detection and Fault Identification may be additional energy requirements and network congestion.
  • Fault Isolation, Masking, and Recovery
    Isolation, masking, and recovery are different techniques for repairing a fault, minimizing the effect of a fault, or avoiding it to turn to system failure. Identified faults can be isolated, masked, and sensor network recovered, for instance, redirecting traffic through healthy backup components. Fault Recovery can ensure overall system operation even when components degrade. The downside may be the cost of adding components to ensure redundancy.

The overview of fault tolerant techniques presented in the following section follows the above-described taxonomy.

4. Overview of Techniques by Fault Tolerance Tasks

4.1. Fault Prevention and Prediction

Fault prevention and prediction in sensor networks are dependent on the architectural design of the system and the initial deployment method of the sensor network. These will be discussed in the following subsections. In addition, data collection in USNs and testing frameworks for UWSNs are presented.

4.1.1. Design of the Sensor Network

In Wireless Sensor Networks (WSN), instead of a centralized homogeneous topology, dividing nodes into clusters is an energy efficient and resilient method [20], where dedicated cluster head nodes may have more energy and communication capabilities to effectively act as mediators between regular nodes and data sinks.
To overcome the issues caused by varying environmental challenges of Underwater Wireless Sensor Networks (UWSN), natural algorithms may be utilized. For instance, clustering and routing can be done utilizing Cuckoo Search algorithm and Particle Swarm Optimization [21], which have behaved more resiliently in underwater conditions than more usual terrestrial Low Energy Adaptive Clustering Hierarchy (LEACH) protocol [22]. Pressure measurements have been used for UWSN routing [23] with floating depth-controlling sensors. Fault Management tasks can also be distributed across the whole network. In WSN with enough spare nodes energy efficient grid can be formed [24], changing the node manager, gateway and sensing nodes selected and spare nodes put to sleep. This results in energy-efficient and lightweight network but requires excess nodes.
However, existing UWSN protocols have not been adequately compared in underwater field trials yet [25].

4.1.2. Sensor Network Deployment

Sensor network deployment techniques are important for WSNs where deployment may directly affect the nodes’ locations and networking availability. Even for terrestrial wireless sensor networks, to obtain a satisfactory network performance, an adaptable deployment method is essential [26]. Usually, the sensor placement for WSNs utilizes, for redundancy reasons, more sensors than the minimum required number [27]. The deployment costs and energy efficiency of WSNs have been investigated in Reference [28], and it has been found that there is no single solution that can easily be applied in practice [29].
Wired sensor network deployment is less researched, possibly because wired sensor networks’ node deployment locations are limited by the cables, their locations are more predetermined, and node connectivity is not directly related to the location.

4.1.3. Data Collection

Sensor networks tend to have limited network bandwidth, energy, and storage capabilities. Thus, filtering and aggregating sensor information may be a way to meet those requirements. Raw sensor data near the source can be divided into informative, non-informative, and outlier groups [30], and only the needed data could be communicated or stored. Outlier data may result from noise, failures, disturbances, etc., and may be useful for Fault Tolerance purposes.
Different techniques to compress and aggregate collected information in UWSNs are investigated in Reference [31]. It was found that aggregation is justified, and cluster-based aggregation techniques are performing better than non-cluster-based ones. For instance, cluster head (CH) switching to backup (BCH) technique was proposed [32] for cluster-based UWSNs.
Moreover, security challenges need to be addressed. One way to minimize the risk of data tampering and/or interference is to ensure that the data is processed locally or, if that is not possible, then communicated end-to-end encrypted [33].

4.1.4. UWSN Testing Frameworks

Wireless networking protocols are one of the key research areas in UWSNs. To evaluate the implementation of underwater wireless protocols, simulation is often used. Due to the specifics of underwater environments (See Section 3), generic simulation environments are not able to capture some of the relevant features. Frameworks covered in the current section are useful for underwater acoustic protocols’ simulation and evaluation.
Frameworks, such as DESERT version 1 and 2 [34] and SUNSET [35], that allow simulation, emulation, and testing of the sensor networks, have been developed for UWSNs. An analysis conducted in Reference [36] shows that SUNSET represents a more mature, flexible, and robust framework for in-field testing than DESERT. However, DESERT v2 was released subsequently. For acoustic UWSN security testing, SecFUN framework [37] has been proposed.

4.2. Fault Detection and Identification

In essence, Fault Detection means determining that one or more bits in the computation differ from their correct value [19]. This can be detected via continuous monitoring of the network and nodes’ status. Some sources also use the word “Diagnosis” in a broader meaning than just detection and identification. Diagnosis has been defined as “characterizing the system’s state to locate the causes of errors, determine how the system is changing over time, and predict errors before they occur [19]”. The current section covers different techniques to execute the previously mentioned concepts.
A distributed hierarchical fault management [38] has been used for WSNs, where agent Fault Detection devices collect information from the power modules and sensors to determine failure conditions and sequentially diagnose the nature of the detected failure.
At higher abstraction levels, there has been a wide use of the SNMP protocol [39] by the industry for Fault Detection querying and triggering in IP networked devices. There are multiple commercial tools for generating failures, e.g., Chaos Monkey from Netflix [40], that randomly terminate services in production environments, to ensure their resiliency. The latter does not manage the occurring faults but ensures that the repairing mechanisms are in place and operable. Intelligent Platform Management Interface (IPMI) [41] is an industrial technology specification for hardware system management and monitoring.
A neural-network-based scheme for sensor failure detection, identification, and accommodation can be used which may allow the conditions to deviate to greater extent from theoretical models and estimation. A relatively simple and computationally light approach has been presented [42], where a neural network is used as an online learning state estimator for detecting faults. The neural network itself can be built as fault-tolerant [43], so that failing nodes have the least impact on result data.
Situational Awareness approach, using a mechanism that has been borrowed from humans, can be applied in sensor data interpretation for Internet of Things (IoT), specifically, regarding processes of sensation, perception and cognition. In addition to specification-based and learning-based approaches, a perception-based approach utilizing Fuzzy Formal Concept was proposed [44] for Situational Awareness identification.
Semantic Sensor Network Ontology has been proposed in Reference [45] for managing interoperability between sensing systems. The Semantic Ground describes information for interoperability and cooperation among agents [46]. To enhance resilience in Semantic Sensor Networks, monitoring nodes may forward observations to association nodes, which develop Situational Awareness by mining association rules, for example, via a natural Artificial Bee Colony algorithm [46].
Electric Power Grids need efficient monitoring since, for outage detection, environmental monitoring, and fault diagnostics, different WSN-based approaches are reviewed [47]. Most of these approaches are also applicable in other kinds of applications.

4.3. Fault Isolation, Masking and Recovery

Subsequent to Fault Detection, Fault Identification, and Fault Diagnosis, a fault handling stage can be entered [38] to prevent further data corruption and system deterioration. The fault handling consists of Fault Isolation, Masking, and Recovery. Fault handling can hide the fault occurrence from other components by applying Fault Masking; the key techniques for such masking are informational, time, and physical redundancy [18]. Proposed masking technique For Underwater Vehicles is Triple Modular Redundancy (TMPR) [48], which is also one of the most commonly used Fault Masking techniques. Isolating a faulty component from the others can be facilitated by using virtualization [18]. In large scale distributed systems, frozen virtual images of healthy services have been used as checkpoints [49] for rolling back in case of a fault occurrence.

Fault Recovery ensures that the fault does not propagate to visible results, for instance, by rolling back to a previous healthy state (checkpointing) or re-trying failed operations (time redundancy). Some of the techniques for Fault Recovery can be Reconfiguration, which is changing the system’s state so that the same or similar error is prevented from occurring again, and Adaptation, which is re-optimizing the system, for instance, after Reconfiguration task [19].

In Sensor Networks, different approaches for Fault Recovery have been used, that have different resource overheads, energy-efficiencies, scalabilities and network types. For both network and node Fault Recovery in wireless sensor networks, Mitra et al. (2016) [50] compares techniques, such as checkpoint-based recovery (CRAFT), agent-based recovery (ABSR), fault node recovery (FNR), cluster-based and hierarchical fault management (CHFM), and Failure Node Detection and Recovery algorithm (FNDRA). While some of those are specific to terrestrial wireless usage, some principles (e.g., checkpointing, etc.) can also be used in wired and/or underwater environments. To reduce the network bandwidth requirements, checkpoint backup can be mobile to nearby nodes [51] and used for recovering from fault situations.

In network protocols, Fault Masking and Fault Recovery are handled by error control schemes that are commonly categorized into the following three groups [1]:

  • Automatic Repeat Request (ARQ)—re-transmission of corrupted data is asked;
  • Forward Error Correction (FEC)—data corruption can be detected and corrected by the receiving end; and
  • Hybrid ARQ (HARQ)—a combination of FEC and ARQ.

The cross-layer approach benefits Fault Recovery significantly since single-layer redundancy, such as hardware redundancy and application checkpointing, have very high costs, and latency between fault occurrence and detection makes the recovery difficult [19].

This entry is adapted from the peer-reviewed paper 10.3390/s21093264

References

  1. Domingo, M.C.; Vuran, M.C. Cross-layer analysis of error control in underwater wireless sensor networks. Comput. Commun. 2012, 35, 2162–2172.
  2. Domingo, M.C. A topology reorganization scheme for reliable communication in underwater wireless sensor networks affected by shadow zones. Sensors 2009, 9, 8684–8708.
  3. Zenia, N.Z.; Aseeri, M.; Ahmed, M.R.; Chowdhury, Z.I.; Shamim Kaiser, M. Energy-efficiency and reliability in MAC and routing protocols for underwater wireless sensor network: A survey. J. Netw. Comput. Appl. 2016, 71, 72–85.
  4. Xu, J.; Li, K.; Min, G. Reliable and energy-efficient multipath communications in underwater sensor networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1326–1335.
  5. Lal, C.; Petroccia, R.; Conti, M.; Alves, J. Secure underwater acoustic networks: Current and future research directions. In Proceedings of the 2016 IEEE Third Underwater Communications and Networking Conference (UComms), Lerici, Italy, 30 August–1 September 2016.
  6. Das, A.P.; Thampi, S.M. Fault-resilient localization for underwater sensor networks. Ad Hoc Netw. 2017, 55, 132–142.
  7. Mohamed, N.; Jawhar, I.; Al-Jaroodi, J.; Zhang, L. Sensor network architectures for monitoring underwater pipelines. Sensors 2011, 11, 10738–10764.
  8. Kumar, S.; Balamurugan, B. Fault tolerant cloud systems. In Encyclopedia of Information Science and Technology, 4th ed.; Khosrow-Pour, D.B.A., Ed.; IGI Global: Hershey, PA, USA, 2018.
  9. Wilfredo, T.; Torres-Pomales, W. Software Fault Tolerance: A Tutorial; Technical Report October; NASA: Washington, DC, USA, 2000.
  10. Khan, M.Z. Fault Management in Wireless Sensor Networks. GESJ Comput. Sci. Telecommun. 2013, 1, 3–17.
  11. Paradis, L.; Han, Q. A survey of fault management in wireless sensor networks. J. Netw. Syst. Manag. 2007, 15, 171–190.
  12. Henkel, J.; Hedrich, L.; Herkersdorf, A.; Kapitza, R.; Lohmann, D.; Marwedel, P.; Platzner, M.; Rosenstiel, W.; Schlichtmann, U.; Spinczyk, O.; et al. Design and architectures for dependable embedded systems. In Proceedings of the Seventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, Taipei, Taiwan, 9–14 October 2011; ACM Press: New York, NY, USA, 2011; p. 69.
  13. Georgakos, G.; Schlichtmann, U.; Schneider, R.; Chakraborty, S. Reliability challenges for electric vehicles. In Proceedings of the 50th Annual Design Automation Conference, Austin, TX, USA, 29 May–7 June 2013; ACM Press: New York, NY, USA, 2013; p. 1.
  14. Lorenz, D.; Barke, M.; Schlichtmann, U. Efficiently analyzing the impact of aging effects on large integrated circuits. Microelectron. Reliab. 2012, 52, 1546–1552.
  15. Sauli, Z.; Retnasamy, V.; Taniselass, S.; Shapri, A.H.; Hatta, R.M.; Aziz, M.H. Polymer core BGA vertical stress loading analysis. Proc. Int. Conf. Comput. Intell. Model. Simul. 2012, 129, 148–151.
  16. Rehman, S. Reliable Software for Unreliable Hardware—A Cross-Layer Approach. Ph.D. Thesis, Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany, 2015.
  17. Kaaniche, M.; Laprie, J.C.; Blanquart, J.P. Dependability engineering of complex computing systems. In Proceedings of the Sixth IEEE International Conference on Engineering of Complex Computer Systems 2000, Tokyo, Japan, 11–14 September 2000; pp. 36–46.
  18. Tanenbaum, A.S.; Van Steen, M. Distributed Systems: Principles and Paradigms; Prentice-Hall: Upper Saddle River, NJ, USA, 2007.
  19. Carter, N.P.; Naeimi, H.; Gardner, D.S. Design techniques for cross-layer resilience. In Proceedings of the 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), Dresden, Germany, 8–12 March 2010; pp. 1023–1028.
  20. Singh, S.P.; Sharma, S.C. A survey on cluster based routing protocols in wireless sensor networks. Procedia Comput. Sci. 2015, 45, 687–695.
  21. Sofi, S.A.; Mir, R.N. Natural algorithm based adaptive architecture for underwater wireless sensor networks. In Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 22–24 March 2017; pp. 2343–2346.
  22. Tyagi, S.; Kumar, N. A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks. J. Netw. Comput. Appl. 2013, 36, 623–645.
  23. Noh, Y.; Lee, U.; Lee, S.; Wang, P.; Vieira, L.F.; Cui, J.H.; Gerla, M.; Kim, K. HydroCast: Pressure routing for underwater sensor networks. IEEE Trans. Veh. Technol. 2016, 65, 333–347.
  24. Asim, M.; Mokhtar, H.; Merabti, M. A fault management architecture for wireless sensor network. In Proceedings of the 2008 International Wireless Communications and Mobile Computing Conference, Crete, Greece, 6–8 August 2008; pp. 779–785.
  25. Jiang, S. State-of-the-Art Medium Access Control (MAC) Protocols for Underwater Acoustic Networks: A Survey Based on a MAC Reference Model. IEEE Commun. Surv. Tutor. 2018, 20, 96–131.
  26. Wu, C.H.; Lee, K.C.; Chung, Y.C. A Delaunay Triangulation based method for wireless sensor network deployment. Comput. Commun. 2007, 30, 2744–2752.
  27. Isler, V.; Kannan, S.; Daniilidis, K. Sampling based sensor-network deployment. In Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Sendai, Japan, 28 September–2 October 2004; pp. 1780–1785.
  28. Dong, M.; Li, H.; Li, Y.; Deng, Y.; Yin, R. Fault-tolerant topology with lifetime optimization for underwater wireless sensor networks. Sadhana Acad. Proc. Eng. Sci. 2020, 45.
  29. Cheng, Z.; Perillo, M.; Heinzelman, W.B. General network lifetime and cost models for evaluating sensor network deployment strategies. IEEE Trans. Mob. Comput. 2008, 7, 484–497.
  30. Bhuvana, V.P.; Preissl, C.; Tonello, A.M.; Huemer, M. Multi-Sensor Information Filtering with Information-Based Sensor Selection and Outlier Rejection. IEEE Sens. J. 2018, 18, 2442–2452.
  31. Goyal, N.; Dave, M.; Verma, A.K. Data aggregation in underwater wireless sensor network: Recent approaches and issues. J. King Saud Univ. Comput. Inf. Sci. 2017.
  32. Goyal, N.; Dave, M.; Verma, A.K. A novel fault detection and recovery technique for cluster-based underwater wireless sensor networks. Int. J. Commun. Syst. 2018, 31, 1–14.
  33. Kohnstamm, J.; Madhub, D. Mauritius Declaration. In Proceedings of the 36th International Conference of Data Protection & Privacy Commissioners, Balaclava, Mauritius, 14 October 2014; pp. 1–2.
  34. Campagnaro, F.; Francescon, R.; Guerra, F.; Favaro, F.; Casari, P.; Diamant, R.; Zorzi, M. The DESERT underwater framework v2: Improved capabilities and extension tools. In Proceedings of the 2016 IEEE Third Underwater Communications and Networking Conference (UComms), Lerici, Italy, 30 August–1 September 2016.
  35. Petrioli, C.; Petroccia, R.; Potter, J.R.; Spaccini, D. The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks. Ad Hoc Netw. 2015, 34, 224–238.
  36. Petroccia, R.; Spaccini, D. Comparing the SUNSET and DESERT frameworks for in field experiments in underwater acoustic networks. In OCEANS 2013 MTS/IEEE Bergen: The Challenges of the Northern Dimension; IEEE: Bergen, Norway, 2013.
  37. Ateniese, G.; Capossele, A.; Gjanci, P.; Petrioli, C.; Spaccini, D. SecFUN: Security framework for underwater acoustic sensor networks. In MTS/IEEE OCEANS 2015—Genova: Discovering Sustainable Ocean Energy for a New World; IEEE: Genova, Italy, 2015.
  38. Liu, T.H.; Yi, S.C.; Wang, X.W. A fault management protocol for low-energy and efficient Wireless sensor networks. J. Inf. Hiding Multimed. Signal Process. 2013, 4, 34–45.
  39. Case, J.D.; Fedor, M.; Schoffstall, M.L.; Davin, J. RFC1157: Simple Network Management Protocol (SNMP). Technical Report, RFC Editor. 1990.
  40. Gunawi, H.S.; Do, T.; Hellerstein, J.M.; Stoica, I.; Borthakur, D.; Robbins, J. Failure as a service (faas): A cloud service for large-scale, online failure drills. In Technical Report No. UCB/EECS-2011-87; University of California: Berkeley, CA, USA, 2011.
  41. Intel. Intelligent Platform Management Interface. 2004. Available online: (accessed on 6 May 2021).
  42. Napolitano, M.R.; Neppach, C.; Casdorph, V.; Naylor, S.; Innocenti, M.; Silvestri, G. Neural-network-based scheme for sensor failure detection, identification, and accommodation. J. Guid. Control. Dyn. 1995, 18, 1280–1286.
  43. Neti, C.; Schneider, M.H.; Young, E.D. Maximally Fault Tolerant Neural Networks. IEEE Trans. Neural Netw. 1992, 3, 14–23.
  44. Benincasa, G.; D’Aniello, G.; De Maio, C.; Loia, V.; Orciuoli, F. Towards perception-oriented situation awareness systems. Adv. Intell. Syst. Comput. 2014, 322, 813–824.
  45. Compton, M.; Barnaghi, P.; Bermudez, L.; García-Castro, R.; Corcho, O.; Cox, S.; Graybeal, J.; Hauswirth, M.; Henson, C.; Herzog, A.; et al. The SSN ontology of the W3C semantic sensor network incubator group. J. Web Semant. 2012, 17, 25–32.
  46. D’Aniello, G.; Gaeta, A.; Orciuoli, F. Artificial bees for improving resilience in a sensor middleware for Situational Awareness. In Proceedings of the 2015 Conference on Technologies and Applications of Artificial Intelligence, Tainan, Taiwan, 20–22 November 2015; pp. 300–307.
  47. Fadel, E.; Gungor, V.C.; Nassef, L.; Akkari, N.; Abbas Malik, M.G.; Almasri, S.; Akyildiz, I.F. A survey on wireless sensor networks for smart grid. Comput. Commun. 2015, 71, 22–33.
  48. Alansary, K.A.; Daoud, R.M.; Amer, H.H.; Elsayed, H.M. Networked control system architecture for autonomous underwater vehicles with redundant sensors. In Proceedings of the 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Pitesti, Romania, 27–29 June 2019; pp. 2019–2022.
  49. Cristea, V.; Dobre, C.; Pop, F.; Stratan, C.; Costan, A.; Leordeanu, C.; Tirsa, E. A dependability layer for large-scale distributed systems. Int. J. Grid Util. Comput. 2011, 2, 109.
  50. Mitra, S. Comparative study of fault recovery techniques in wireless sensor network. In Proceedings of the 2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), Pune, India, 19–21 December 2016; pp. 19–21.
  51. Salera, I.; Agbaria, A.; Eltoweissy, M. Fault-tolerant mobile sink in networked sensor systems. In Proceedings of the 2006 2nd IEEE Workshop on Wireless Mesh Networks, Reston, VA, USA, 25–28 September 2007; pp. 106–108.
More
This entry is offline, you can click here to edit this entry!
ScholarVision Creations