Abstract
Wireless sensor networks (WSNs) may be deployed in failure-prone environments, and WSNs nodes easily fail due to unreliable wireless connections, malicious attacks and resource-constrained features. Nevertheless, if WSNs can tolerate at most losing k − 1 nodes while the rest of nodes remain connected, the network is called k − connected. k is one of the most important indicators for WSNs’ self-healing capability. Following a WSN design flow, this paper surveys resilience issues from the topology control and multi-path routing point of view. This paper provides a discussion on transmission and failure models, which have an important impact on research results. Afterwards, this paper reviews theoretical results and representative topology control approaches to guarantee WSNs to be k − connected at three different network deployment stages: pre-deployment, post-deployment and re-deployment. Multi-path routing protocols are discussed, and many NP-complete or NP-hard problems regarding topology control are identified. The challenging open issues are discussed at the end. This paper can serve as a guideline to design resilient WSNs.
Highlights
Wireless sensor networks (WSNs) [1,2] have attracted much interest in recent years
WSN technology is the basis of the future network “Internet of Things” (IoT) [4,5]
This paper focuses on surveying resilient design in WSNs from the topology control and routing protocol perspective
Summary
Wireless sensor networks (WSNs) [1,2] have attracted much interest in recent years. The use of WSNs in numerous applications, such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection and battlefield surveillance [3], is on the rise. The WSNs nodes are usually battery powered, deployed either randomly or according to a predefined statistical distribution [6]. In environment surveillance, the sensor node is exposed to an unsafe situation, making nodes likely to suffer various kinds of damage. The sensor node itself is very vulnerable due to the unreliable wireless connection and resource constrained features, such as limited transmission power, computing ability, storage space, etc
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have