{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T02:17:24Z","timestamp":1721787444064},"reference-count":44,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2017,4,1]],"date-time":"2017-04-01T00:00:00Z","timestamp":1491004800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2017,4]]},"abstract":"<jats:p> An unattended deployment of wireless sensor and actor networks in a harsh and inhospitable environment may cause its failure by partitioning it into the disjoint segments. Although many variants of this problem are addressed using different approaches, it still needs to be investigated due to its various applications. In this article, an efficient, localized, hybrid failure detection and recovery algorithm is proposed which assumes planned deployment of nodes. The algorithm is approximate and distributed as its topology is partitioned into subnets localizing failure recovery procedure and efficient as the time complexity is reduced from nondeterministic polynomial-time\u2013hard to polynomial time. The algorithm is hybrid as pre-failure planning and post-failure recovery is assumed for the critical nodes. Graph-based model is designed to represent static part which is then transformed into a formal model using Vienna Development Method\u2014specification language. The static model consists of subnets, circular topology, sensors, actors, and gateways as composite objects in Vienna Development Method\u2014specification language. The dynamic model is developed by defining its state space, functions, and possible operations to describe the failure recovery procedure. Invariants are defined on static model to assure correctness, and pre\/post conditions are used in the dynamic model to control the behavior preventing system to enter into an unwanted situation. The formal specification is analyzed using Vienna Development Method\u2014specification language Toolbox to visualize the model. <\/jats:p>","DOI":"10.1177\/1550147717704417","type":"journal-article","created":{"date-parts":[[2017,4,22]],"date-time":"2017-04-22T07:17:58Z","timestamp":1492845478000},"page":"155014771770441","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":12,"title":["Hybrid subnet-based node failure recovery formal procedure in wireless sensor and actor networks"],"prefix":"10.1177","volume":"13","author":[{"given":"Hamra","family":"Afzaal","sequence":"first","affiliation":[{"name":"Department of Computer Science, COMSATS Institute of Information Technology, Sahiwal, Pakistan"}]},{"given":"Nazir Ahmad","family":"Zafar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS Institute of Information Technology, Sahiwal, Pakistan"}]},{"given":"Fahad","family":"Alhumaidan","sequence":"additional","affiliation":[{"name":"College of Computer Sciences & Information Technology, King Faisal University, Hofuf, Saudi Arabia"}]}],"member":"179","published-online":{"date-parts":[[2017,4,22]]},"reference":[{"key":"bibr1-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.04.003"},{"issue":"5","key":"bibr2-1550147717704417","first-page":"1","volume":"12","author":"Wang X","year":"2016","journal-title":"Int J Distrib Sens N"},{"key":"bibr3-1550147717704417","first-page":"302","volume-title":"IEEE international conference on complex, intelligent and software intensive systems (CISIS)","author":"Gogu A"},{"key":"bibr4-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1007\/s11424-006-0001-z"},{"key":"bibr5-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1134\/S0361768814030074"},{"key":"bibr6-1550147717704417","first-page":"438","volume-title":"IEEE multitopic conference (INMIC)","author":"Zafar NA"},{"key":"bibr7-1550147717704417","first-page":"64","volume-title":"9th IEEE international conference on open source systems and technologies (ICOSST)","author":"Afzaal H"},{"issue":"1","key":"bibr8-1550147717704417","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40294-015-0013-4","volume":"4","author":"Zafar NA.","year":"2016","journal-title":"Com Adap Sy Model"},{"issue":"27","key":"bibr9-1550147717704417","first-page":"1","volume":"4","author":"Afzaal H","year":"2016","journal-title":"Com Adap Sy Model"},{"key":"bibr10-1550147717704417","first-page":"1","volume-title":"Proceedings of the 6th international conference on information and communication technologies (ICICT)","author":"Afzaal H"},{"key":"bibr11-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1229-8"},{"key":"bibr12-1550147717704417","volume-title":"VDM tools, user manual (version 9.0.2)","author":"SCSK Corporation","year":"2013"},{"issue":"5","key":"bibr13-1550147717704417","volume-title":"Proceedings of the 20th IEEE international conference on advanced information networking and applications","volume":"2","author":"Ozaki K"},{"key":"bibr14-1550147717704417","first-page":"496","volume-title":"Proceedings of the 32nd IEEE conference on local computer networks (LCN)","author":"Abbasi AA"},{"key":"bibr15-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.120"},{"key":"bibr16-1550147717704417","first-page":"2480","volume-title":"IEEE wireless communications and networking conference (WCNC)","author":"Akkaya K"},{"key":"bibr17-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0796-9"},{"key":"bibr18-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/536841"},{"key":"bibr19-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.100"},{"key":"bibr20-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.03.008"},{"key":"bibr21-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2425146"},{"key":"bibr22-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20754-9_25"},{"key":"bibr23-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1046-7"},{"key":"bibr24-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.12.002"},{"key":"bibr25-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2345565"},{"key":"bibr26-1550147717704417","first-page":"1","volume":"1","author":"Imran M","year":"2012","journal-title":"EURASIP J Wirel Comm"},{"key":"bibr27-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1631-4"},{"key":"bibr28-1550147717704417","first-page":"365","volume-title":"Proceedings of the 6th international conference on next generation teletraffic and wired\/wireless advanced networking","author":"Shah GA"},{"key":"bibr29-1550147717704417","doi-asserted-by":"publisher","DOI":"10.22452\/mjcs.vol29no2.3"},{"key":"bibr30-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637928"},{"issue":"3","key":"bibr31-1550147717704417","first-page":"93","volume":"4","author":"Sharma D","year":"2013","journal-title":"Int J Electron Commun Technol"},{"key":"bibr32-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1109\/98.878532"},{"issue":"5","key":"bibr33-1550147717704417","first-page":"1229","volume":"9","author":"Zeng D","year":"2014","journal-title":"J Netw"},{"key":"bibr34-1550147717704417","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2009.1044.1048"},{"issue":"3","key":"bibr35-1550147717704417","first-page":"1636","volume":"3","author":"Preethi YR","year":"2013","journal-title":"Int J Mod Eng Res"},{"key":"bibr36-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/3815834"},{"key":"bibr37-1550147717704417","doi-asserted-by":"publisher","DOI":"10.3390\/s140202795"},{"key":"bibr38-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1228-9"},{"key":"bibr39-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.10.031"},{"key":"bibr40-1550147717704417","doi-asserted-by":"publisher","DOI":"10.3390\/s110101059"},{"key":"bibr41-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/140973"},{"key":"bibr42-1550147717704417","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.325"},{"key":"bibr43-1550147717704417","doi-asserted-by":"publisher","DOI":"10.3390\/s120911754"},{"key":"bibr44-1550147717704417","first-page":"6383","volume-title":"IEEE international conference on communications (ICC)","author":"Haider N"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717704417","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147717704417","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717704417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T17:46:01Z","timestamp":1610646361000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147717704417"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["10.1177\/1550147717704417"],"URL":"https:\/\/doi.org\/10.1177\/1550147717704417","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4]]}}}