International Conference on Computer and Communication Engineering (ICCCE'10) 2010
DOI: 10.1109/iccce.2010.5556790
|View full text |Cite
|
Sign up to set email alerts
|

An enhancement of fault-tolerant routing protocol for Wireless Sensor Network

Abstract: As more and more real Wireless Sensor Network's (WSN) applications have been tested and deployed over the last decade, the research community of WSN realizes that several issues need to be revisited from practical angles, such as reliability and availability. Furthermore, fault-tolerance is one of the main issues in WSNs since it becomes critical in real deployed environments where network stability and reduced inaccessibility times are important. Basically, wireless sensor networks suffer from resource limita… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Though our approach is entirely focused on mission critical environments, the results are compared with some of the traditional and recent proactive as well as reactive routing protocols. For the betterment of our analysis, an advanced OLSR from [21], Fault tolerant DSR from [22] and AODV [23] routing protocols are considered. We evaluate the network consequences based on two aspects.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Though our approach is entirely focused on mission critical environments, the results are compared with some of the traditional and recent proactive as well as reactive routing protocols. For the betterment of our analysis, an advanced OLSR from [21], Fault tolerant DSR from [22] and AODV [23] routing protocols are considered. We evaluate the network consequences based on two aspects.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Gray hole assaults is a functioning assault type, that can cause message dropping or malfunctioning. Assaulting hub initially consents to advance parcels and after that neglects to do as such [15]. At first the hub acts effectively and replays genuine packet messages to hubs that start RREQ message.…”
Section: Gray Hole Attack (Routing Misbehaviour)mentioning
confidence: 99%
“…In this approach, each mobile device is controlled by a multi-role agent, which performs these tasks efficiently based only on local interactions; role management allows the backbone reconfiguration when the nodes leave or arrive to the network yielding a complex global emergent behavior. [5] Energy saving is achieved by adapting the time interval and power of transmission after the network formation. The inconsistency problem exist both in member and gateway nodes.…”
Section: Figure 1: Topology Diagrammentioning
confidence: 99%