2014
DOI: 10.1155/2014/140973
|View full text |Cite
|
Sign up to set email alerts
|

Formal Specification and Validation of a Localized Algorithm for Segregation of Critical/Noncritical Nodes in MAHSNs

Abstract: Timely segregation of critical/noncritical nodes is extremely crucial in mobile ad hoc and sensor networks. Most of the existing segregation schemes are centralized and require maintaining network wide information, which may not be feasible in large-scale dynamic networks. Moreover, these schemes lack rigorous validation and entirely rely on simulations. We present a localized algorithm for segregation of critical/noncritical nodes (LASCNN) to the network connectivity. LASCNN establishes and maintains a k-hop … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
1

Relationship

4
3

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 30 publications
0
17
0
Order By: Relevance
“…In most of the relevant work PADRA 16 and restoring actor connected coverage (RACE), 41 it is focused on failure recovery of critical actors, while our proposed algorithm is for failure recovery of critical sensor, actor, and gateway nodes. Unlike proactive approach PADRA which uses depth-first search (DFS) for identification of critical nodes, we have proposed a localized cut-vertex detection procedure for identification of critical nodes performed at subnet level reducing time complexity.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In most of the relevant work PADRA 16 and restoring actor connected coverage (RACE), 41 it is focused on failure recovery of critical actors, while our proposed algorithm is for failure recovery of critical sensor, actor, and gateway nodes. Unlike proactive approach PADRA which uses depth-first search (DFS) for identification of critical nodes, we have proposed a localized cut-vertex detection procedure for identification of critical nodes performed at subnet level reducing time complexity.…”
Section: Resultsmentioning
confidence: 99%
“…In this way, the recovery process is completed by cascading, that is, backup B of A is moved to position of A and newly backup of B is moved to position of B (lines [34][35][36][37][38][39]. If backup node B is critical and its backup is other than its primary, then it notifies to its backup and moves to position of its primary by cascading (lines [40][41][42][43] [34][35][36][37][38][39]. If the backup is critical and its backup is other than its primary, then the recovery procedure takes time NK (lines [40][41][42][43].…”
Section: Proposed Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Z-notation and X-machine are used for the formal specification of multi-agent systems with a dynamic behaviour and structures (Ali et al 2012). VDM-SL and Z based formal models are developed for WSANs for safety critical systems Alnuem et al 2014;Riaz et al 2015).…”
Section: Literature Review Of Cas Using Formal Methodsmentioning
confidence: 99%
“…Unlike these approaches, our work is based on complementary verification and validation techniques that allow systematic and comprehensive investigation of the model properties and correctness of the proposed algorithm. Moreover, we used [24] to analyze the impact of repulsion on topology resilience.…”
Section: System Model and Problem Statementmentioning
confidence: 99%