Redundancy and its applications in wireless sensor networks: a survey

In this paper we presented and classified various approaches for redundancy in the area of wireless sensor networks, related to sensing, communication and information processing. Sometimes an ally, sometimes a foe, redundancy is an inherent feature of sensor networks that has to be very carefully examined in order to improve important aspects of their functioning. Moreover, this paper presents two methodologies: one that implies both components of spatial redundancy and one that implies the use of temporal redundancy for achieving the objective of fault-tolerant and safe operation. In the end, the fields in which the redundancy could be applied with significant results are highlighted.

[1]  M.M. Gore,et al.  A solution to sensor network coverage problem , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..

[2]  Michael N. DeMers,et al.  Fundamentals of Geographic Information Systems , 1996 .

[3]  Bruce H. Krogh,et al.  Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.

[4]  Ling-Jyh Chen,et al.  Reliable sensor networks for planet exploration , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..

[5]  Yong Gao,et al.  Analysis on the redundancy of wireless sensor networks , 2003, WSNA '03.

[6]  H. Hillmer,et al.  Redundant data transmission and nonlinear codes , 2008 .

[7]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[8]  Deborah Estrin,et al.  Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.

[9]  David E. Culler,et al.  Reliable transfer on wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[10]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[11]  Alhussein A. Abouzeid,et al.  Error Robust Image Transport in Wireless Sensor Networks , 2005 .

[12]  Koushik Kar,et al.  Low-coordination topologies for redundancy in sensor networks , 2005, MobiHoc '05.

[13]  Zoran Bojkovic,et al.  A survey on wireless sensor networks deployment , 2008 .

[14]  Constantin Volosencu,et al.  Identification of distributed parameter systems, based on sensor networks and artificial intelligence , 2008 .

[15]  Daniel Curiac,et al.  Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).

[16]  Yang Xiao,et al.  Energy saving mechanisms in sensor networks , 2005, 2nd International Conference on Broadband Networks, 2005..

[17]  Tomasz Bednarz,et al.  Discovery of Malicious Nodes in Wireless Sensor Networks Using Neural Predictors , 2007 .

[18]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[19]  Kuang-Ching Wang,et al.  Value-Fusion versus Decision-Fusion for Fault-tolerance in Collaborative Target Detection in Sensor Networks , 2001 .

[20]  John A. Stankovic,et al.  Di erentiated Surveillance Service for Sensor Networks , 2003 .

[21]  Ian F. Akyildiz,et al.  A scalable approach for reliable downstream data delivery in wireless sensor networks , 2004, MobiHoc '04.

[22]  Yu-Chee Tseng,et al.  The Coverage Problem in a Wireless Sensor Network , 2003, WSNA '03.

[23]  Miguel J. Bagajewicz,et al.  Design and upgrade of nonredundant and redundant linear sensor networks , 1999 .

[24]  G. Milovanović,et al.  Interpolation Processes: Basic Theory and Applications , 2008 .

[25]  Drew Gislason,et al.  Zigbee Wireless Networking , 2008 .