{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:31:12Z","timestamp":1761676272142,"version":"3.41.0"},"reference-count":67,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T00:00:00Z","timestamp":1421798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2015,1,21]]},"abstract":"<jats:p>Technological advancements in communications and embedded systems have led to the proliferation of Wireless Sensor Networks (WSNs) in a wide variety of application domains. These application domains include but are not limited to mission-critical (e.g., security, defense, space, satellite) or safety-related (e.g., health care, active volcano monitoring) systems. One commonality across all WSN application domains is the need to meet application requirements (e.g., lifetime, reliability). Many application domains require that sensor nodes be deployed in harsh environments, such as on the ocean floor or in an active volcano, making these nodes more prone to failures. Sensor node failures can be catastrophic for critical or safety-related systems. This article models and analyzes fault detection and fault tolerance in WSNs. To determine the effectiveness and accuracy of fault detection algorithms, we simulate these algorithms using ns-2. We investigate the synergy between fault detection and fault tolerance and use the fault detection algorithms\u2019 accuracies in our modeling of Fault-Tolerant (FT) WSNs. We develop Markov models for characterizing WSN reliability and Mean Time to Failure (MTTF) to facilitate WSN application-specific design. Results obtained from our FT modeling reveal that an FT WSN composed of duplex sensor nodes can result in as high as a 100% MTTF increase and approximately a 350% improvement in reliability over a Non-Fault-Tolerant (NFT) WSN. The article also highlights future research directions for the design and deployment of reliable and trustworthy WSNs.<\/jats:p>","DOI":"10.1145\/2680538","type":"journal-article","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T14:05:51Z","timestamp":1422453951000},"page":"1-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Modeling and Analysis of Fault Detection and Fault Tolerance in Wireless Sensor Networks"],"prefix":"10.1145","volume":"14","author":[{"given":"Arslan","family":"Munir","sequence":"first","affiliation":[{"name":"University of Nevada, Reno, Nevada, USA"}]},{"given":"Joseph","family":"Antoon","sequence":"additional","affiliation":[{"name":"National Instruments"}]},{"given":"Ann","family":"Gordon-Ross","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,1,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2009.62"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1986.13527"},{"key":"e_1_2_1_5_1","unstructured":"Marco Baldi Franco Chiaraluce and Elma Zanaj. 2009. Fault tolerance in sensor networks: Performance comparison of some gossip algorithms. In IEEE WISES. Marco Baldi Franco Chiaraluce and Elma Zanaj. 2009. Fault tolerance in sensor networks: Performance comparison of some gossip algorithms. In IEEE WISES."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2013.34"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2024941"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2006.271"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1160972.1160985"},{"volume-title":"Proceedings of IEEE ITC.","author":"Chiang M.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.1261838"},{"volume-title":"Proceedings of IEEE INFOCOM.","year":"2005","author":"Ding Min","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2008.4599222"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958508"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.161"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1978.11113"},{"key":"e_1_2_1_17_1","unstructured":"Intel. 2009. Intel-Berkeley Research Lab. Available: http:\/\/db.csail.mit.edu\/labdata\/labdata.html. Intel. 2009. Intel-Berkeley Research Lab. Available: http:\/\/db.csail.mit.edu\/labdata\/labdata.html."},{"key":"e_1_2_1_18_1","first-page":"5","article-title":"Weighted-median based distributed fault detection for wireless sensor networks","volume":"18","author":"Jian-Liang Gao","year":"2007","journal-title":"Journal of Software"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912845"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/s90201282"},{"key":"e_1_2_1_21_1","unstructured":"Norman Johnson Samuel Kotz and N. Balakrishnan. 1994. Continuous Univariate Distributions. John Wiley and Sons Inc. Norman Johnson Samuel Kotz and N. Balakrishnan. 1994. Continuous Univariate Distributions. John Wiley and Sons Inc."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1758126.1758150"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.830937"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2007.46"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Israel Koren and Mani Krishna. 2007. Fault-Tolerant Systems. Morgan Kaufmann. Israel Koren and Mani Krishna. 2007. Fault-Tolerant Systems. Morgan Kaufmann.","DOI":"10.1016\/B978-012088525-1\/50007-9"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2002.1037343"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.92"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.1261832"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.06.014"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2244881"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00062"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570751"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.110813.121812"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2007.372797"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.131"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629435.1629461"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Arslan Munir and Ann Gordon-Ross. 2010. Optimization approaches in wireless sensor networks. In Sustainable Wireless Sensor Networks Winston Seah and Yen Kheng Tan (Eds.). INTECH. Arslan Munir and Ann Gordon-Ross. 2010. Optimization approaches in wireless sensor networks. In Sustainable Wireless Sensor Networks Winston Seah and Yen Kheng Tan (Eds.). INTECH.","DOI":"10.5772\/13093"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6005768"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.219"},{"key":"e_1_2_1_40_1","unstructured":"NASA. 2011. NASA Kennedy Space Center: NASA Orbiter Fleet. Available: http:\/\/www.nasa.gov\/centers\/kennedy\/shuttleoperations\/orbiters\/orbitersdis.html. NASA. 2011. NASA Kennedy Space Center: NASA Orbiter Fleet. Available: http:\/\/www.nasa.gov\/centers\/kennedy\/shuttleoperations\/orbiters\/orbitersdis.html."},{"volume-title":"Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom\u201911)","year":"2011","author":"Nguyen Hoang","key":"e_1_2_1_41_1"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525863"},{"key":"e_1_2_1_43_1","unstructured":"NIST. 2011. Engineering Statistics Handbook: Exponential Distribution. Available: http:\/\/www.itl.nist.gov\/div898\/handbook\/apr\/section1\/apr161.htm. NIST. 2011. Engineering Statistics Handbook: Exponential Distribution. Available: http:\/\/www.itl.nist.gov\/div898\/handbook\/apr\/section1\/apr161.htm."},{"key":"e_1_2_1_44_1","unstructured":"ns2. 2014. The Network Simulator\u2014ns-2. Available: http:\/\/www.isi.edu\/nsnam\/ns\/. ns2. 2014. The Network Simulator\u2014ns-2. Available: http:\/\/www.isi.edu\/nsnam\/ns\/."},{"key":"e_1_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Robin Sahner Kishor Trivedi and Antonio Puliafito. 1996. Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package. Kluwer Academic. Robin Sahner Kishor Trivedi and Antonio Puliafito. 1996. Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package. Kluwer Academic.","DOI":"10.1109\/TR.1997.664017"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655254"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.270"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1166\/sl.2005.017"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292833"},{"key":"e_1_2_1_50_1","unstructured":"SHARPE. 2014. The SHARPE Tool & The Interface (GUI). Available: http:\/\/people.ee.duke.edu\/&sim;&sim;chirel\/IRISA\/sharpeGui.html. SHARPE. 2014. The SHARPE Tool & The Interface (GUI). Available: http:\/\/people.ee.duke.edu\/&sim;&sim;chirel\/IRISA\/sharpeGui.html."},{"volume-title":"Proceedings of IEEE Wireless Communications and Networking (WCNC\u201903)","author":"Sichitiu M. L.","key":"e_1_2_1_51_1"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.201.0020"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1997.585153"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/1338444.1338810"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396943"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.68"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2009.5284742"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1978.11114"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.26"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.26"},{"key":"e_1_2_1_61_1","unstructured":"Wikipedia. 2014. ns (simulator). Available at: http:\/\/en.wikipedia.org\/wiki\/Ns_(simulator). Wikipedia. 2014. ns (simulator). Available at: http:\/\/en.wikipedia.org\/wiki\/Ns_(simulator)."},{"key":"e_1_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Michael Winkler Klaus-Dieter Tuchs Kester Hughes and Graeme Barclay. 2008. Theoretical and practical aspects of military wireless sensor networks. Journal of Telecommunications and Information Technology (2008) 37--45. Michael Winkler Klaus-Dieter Tuchs Kester Hughes and Graeme Barclay. 2008. Theoretical and practical aspects of military wireless sensor networks. Journal of Telecommunications and Information Technology (2008) 37--45.","DOI":"10.26636\/jtit.2008.2.870"},{"volume-title":"Proceedings of the 24th Workshop on Combinatorial Mathematics and Computation Theory (ALGO\u201907)","author":"Wu J.","key":"e_1_2_1_63_1"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2006.1677438"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/1444447.1444988"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.193"},{"volume-title":"Proceedings of IEEE WCNC.","year":"2003","author":"Zhu Jin","key":"e_1_2_1_67_1"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2680538","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2680538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:15Z","timestamp":1750273455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2680538"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,21]]},"references-count":67,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1,21]]}},"alternative-id":["10.1145\/2680538"],"URL":"https:\/\/doi.org\/10.1145\/2680538","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2015,1,21]]},"assertion":[{"value":"2013-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-01-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}