Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-77690-1_16
|View full text |Cite
|
Sign up to set email alerts
|

An Algorithm for Reconnecting Wireless Sensor Network Partitions

Abstract: Abstract. In a Wireless Sensor Network, sensor nodes may fail for several reasons and the network may split into two or more disconnected partitions. This may deteriorate or even nullify the usefulness and effectiveness of the network. Therefore, repairing partitions is a priority. In this paper we present a method to repair network partitions by using mobile nodes. By reasoning upon the degree of connectivity with neighbours, a mobile node finds the proper position where to stop in order to re-establish conne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(13 citation statements)
references
References 11 publications
(20 reference statements)
0
12
0
Order By: Relevance
“…MDC maximum residual energy LEACH creates clusters by the help of distributed algorithm where each node in the network must individually choose to become a cluster head or not using the probability of Pi [12]. The Pi node is computed utilizing the LEACH algorithm:…”
Section: B Setup Phase or Cluster Formationmentioning
confidence: 99%
“…MDC maximum residual energy LEACH creates clusters by the help of distributed algorithm where each node in the network must individually choose to become a cluster head or not using the probability of Pi [12]. The Pi node is computed utilizing the LEACH algorithm:…”
Section: B Setup Phase or Cluster Formationmentioning
confidence: 99%
“…The common options are to reposition SNs [16]- [18] [22]- [24], to deploy redundant SNs that can be activated or added on demand [20] [21], increase the transmission range, or combinations [19]. These works are well suited to react on drop of connectivity or coverage resulting from failure of single SNs.…”
Section: Related Workmentioning
confidence: 99%
“…As a next step in the second stage for each of Ψ, Ψ 1 , and Ψ 2 , respectively, lines (13)(14)(15), RSA does the following: RSA starts performing new sequence evaluations looking for a better sequence solution as in previous evaluation where RSA was looking one step a head. However after each fragments-pair evaluation, the next fragments pair or new solution candidate, is derived from latest derived candidate so far ζ 2 , line 20.…”
Section: B Heuristic Algorithm Formulationmentioning
confidence: 99%
“…The problem of fragmentation detection and fragment identification is beyond the scope of this paper. We assume that fragments are identified, in terms of location and shape, using any of the existing approaches in the literature [10], [11], [12], [13], and provided as an input.…”
Section: Introductionmentioning
confidence: 99%