Next Article in Journal
Determination of Fatty Acid Content of Rice during Storage Based on Feature Fusion of Olfactory Visualization Sensor Data and Near-Infrared Spectra
Previous Article in Journal
Face Mask Wearing Detection Algorithm Based on Improved YOLO-v4
Previous Article in Special Issue
Cross-Layer-Aided Opportunistic Routing for Sparse Underwater Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Systematic Review of Fault Tolerant Techniques in Underwater Sensor Networks

1
Smart City Center of Excellence (Finest Twins), Tallinn University of Technology, 12618 Tallinn, Estonia
2
Department of Computer Systems, Tallinn University of Technology, 12618 Tallinn, Estonia
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(9), 3264; https://doi.org/10.3390/s21093264
Submission received: 26 March 2021 / Revised: 30 April 2021 / Accepted: 2 May 2021 / Published: 8 May 2021
(This article belongs to the Special Issue Underwater Wireless Sensor Networks)

Abstract

:
Sensor networks provide services to a broad range of applications ranging from intelligence service surveillance to weather forecasting. While most of the sensor networks are terrestrial, Underwater Sensor Networks (USN) are an emerging area. One of the unavoidable and increasing challenges for modern USN technology is tolerating faults, i.e., accepting that hardware is imperfect, and coping with it. Fault Tolerance tends to have more impact in underwater than in terrestrial environment as the latter is generally more forgiving. Moreover, reaching the malfunctioning devices for replacement and maintenance under water is harder and more costly. The current paper is the first to provide an overview of fault-tolerant, particularly cross-layer fault-tolerant, techniques in USNs. In the paper, we present a systematic survey of the techniques, introduce a taxonomy of the Fault Tolerance tasks, present a categorized list of articles, and list the open research issues within the area.

1. Introduction

Underwater Sensor Networks (USNs) have become widespread and are being deployed in a wide range of applications ranging from harbor security to monitoring underwater pipelines and fish farms. Due to the fact that USNs often operate in an extremely harsh environment, and many of their applications are safety-critical, it is imperative to develop techniques enabling these networks to tolerate faults. Moreover, USNs face many challenges that are not present in terrestrial networks, such as virtual inapplicability of the wireless radio communication under water and limitations of the acoustic means, for example.
In the current paper, applications, practices, and central issues on fault tolerant USNs are discussed, and a systematic survey of fault tolerant techniques in USN networks is presented. Our objective is to investigate the state of the art and main focuses of ongoing research on cross-layer Fault Tolerance in underwater sensor networks, as well as to identify the existing gaps in previous research. As by now a limited effort has been put on the Fault Tolerance of USNs by the research community, the criteria is expanded, and papers covering some specific aspects of the fault-tolerance topic are also taken into account. Moreover, the sources also include generic terrestrial Fault Tolerance in sensor networks because research on underwater sensor network faults is limited, and many of the generic technologies, approaches, and tools can be adapted for use in USNs.
It is important to stress that the underwater environment is mostly different from terrestrial conditions, in the sense of additional and more fatal hazards, like an increased pressure and a danger of flooding, as well as added difficulty of communication and physical access. Some communication media, such as radio signals, are not applicable underwater. Additionally, falling temperatures with increasing depth may affect the equipment’s operation and reliability.
In this paper, a systematic search in IEEExplore, Google Scholar, and ScienceDirect online environments was carried out to obtain a relevant sample of works in the field of fault tolerant techniques in USNs. The search revealed 122 papers, with 59 of them dedicated to the Fault Tolerance of USNs, while the 63 remaining ones were generic fault tolerant techniques for terrestrial sensor networks applicable to the underwater environment.
In order to provide a systematic view of the paper categories, this survey introduces a taxonomy of Fault Tolerance tasks. Specifically, the identified relevant papers are grouped according to the tasks of fault prevention and prediction and Fault Detection and Fault Identification, as well as Fault Isolation and Fault Masking, respectively.
Moreover, a comparative analysis of the identified papers was presented, where the works were characterized according to their extra-functional aspects covered (i.e., security, energy-efficiency, scalability, cross-layer aspect) and Fault Tolerance tasks targeted, as well as marine or terrestrial application. As a result of the analysis, the lack of cross-layer Fault Tolerance approaches in the USN domain was identified as a particular gap in the state-of-the-art with prospective future research.
There are several surveys investigating underwater sensor networks. For example, Reference [1] introduced the term of Internet of Underwater Things (IoUT) and showed its applications in fish farms, monitoring underwater pipelines, harbor security, etc., and [2] analyzed cross-layer error control in Underwater Wireless Sensor Networks (UWSNs); however, the analysis focused on the underwater wireless network functionality faults and not on other sources of the USN faults. Underwater communications have been specifically surveyed in References [3,4], disregarding aspects of underwater sensor networks outside communication issues.
The main challenges identified for Internet of Underwater Things are the communication reliability and the differences between Underwater and Terrestrial Networks [5], such as mobility caused by water flow. For terrestrial sensor networks, there were 11 surveys found. Thereof, 3 terrestrial surveys addressed cross-layer aspects. Reference [6] was surveying cross-layer resilience design methods and [7,8] fault management techniques in wireless sensor networks. In addition, References [9,10] included surveys about aspects of the internet of things, and 7 papers by References [7,8,11,12,13,14,15] were surveys of different aspects of terrestrial wireless sensor networks. Reference [16] presented a survey about fault tolerant control systems, and, finally, Reference [14] was focused on surveying fault management frameworks in terrestrial wireless sensor networks.
The current state-of-the-art is lacking literature reviews covering faults in USNs not only from communication but from the entire infrastructure perspective, as well. To that end, the current paper has the following novel contributions:
  • to the best of the authors’ knowledge, this is the first survey of fault-tolerant, particularly cross-layer fault-tolerant, techniques in USNs;
  • it introduces a taxonomy of the Fault Tolerance tasks for categorizing fault-tolerant techniques for USNs;
  • it presents a comprehensive, categorized list of articles of works applicable in fault-tolerant USN design and deployment; and
  • the survey also lists the open research issues within the focused area.
The paper is organized as follows. In Section 2, the formal methodology of selecting the papers is explained and a breakdown of the sample by keywords is provided. Section 3 gives an overview of the specific Fault Tolerance challenges in underwater sensor networks. In Section 4, the taxonomy of possible fault sources and that of Fault Tolerance tasks is presented. Subsequently, Section 5 is divided according to this taxonomy of tasks. In Section 5.1, works targeting the fault prevention and prediction task are discussed and the respective design, deployment, data collection, and testing frameworks are reviewed. Section 5.2 gives an overview of Fault Detection and Fault Identification techniques. Section 5.3 provides an overview of Fault Masking and Fault Recovery techniques. In Section 6, a categorized table of the related works identified by the survey is presented. Finally, in Section 7, open research issues are discussed, and conclusions are drawn in Section 8.

2. Methodology

The current overview is following the PRISMA [17] guidelines for systematic reviews. In order to obtain a relevant sample in the field of fault tolerant techniques in USNs, IEEExplore, Google Scholar, and ScienceDirect online environments were searched with the following search keywords: “underwater”, “sensor network”, “internet of things”, “resilient”, “fault tolerant”, “fault management”, “cross-layer” in English language. Because the resulting counts were low (see Table 1), some keywords were removed, and more papers identified. Top papers were selected by the order of relevance offered by the respective environments. The papers published before the year 1990 were not considered. Further, citations within those sources were searched from the aforementioned environments, and additional papers were identified this way. Related articles offered by IEEExplore and ScienceDirect algorithms were also taken into account. Next, the duplicates and non-relevant papers (e.g., control theory) were removed from the collected papers, and the collected papers were analyzed, categorized, and divided into marine and terrestrial categories. Personalization on search engines was turned off wherever possible.
Table 1 shows the count of results using combinations of keywords in Google Scholar, IEEExplore, and Sciencedirect. (Searches were conducted on 13 April 2021, from Taltech, Estonia, IP addresses.). From Table 1, it can be seen that some combinations were giving no, or a very limited number of, results. A critical amount of papers was not reached using the initial criteria, and the criteria were expanded to include also relevant non-marine-specific (terrestrial) papers. The argumentation behind this is that many of these techniques may also be usable in underwater environments (see Section 3).
As a result of the search procedure, 122 related works were identified. These included 59 papers on marine Fault Tolerance and 63 papers being on terrestrial. The papers were tagged by specific areas addressed by them. The tags for specific areas included ’sensor network’, ’fault tolerant’, ’wireless’, ’scalable’, ’mobile’, ’routing protocol’, ’security’, ’localization’, ’framework’, ’survey’, ’energy-efficient’, ’cross-layer’, ’deployment’, ’marine’, and ’terrestrial’.
A bar graph showing the number of papers from our search that covered different specific areas is presented in Figure 1. The specific areas are ordered by the number of papers addressing them, and the bars for the specific areas maintain their colors throughout Figure 1, Figure 2 and Figure 3. It should be noted that, in the following context, the meaning of “localization” is location detection in space, and the meaning of “mobile” is capacity of movement. It can be seen from Figure 1 that there were substantially more terrestrial papers than the ones specific to marine environments. In addition, wireless communication is a frequently targeted area. Figure 2 shows research areas of the analyzed papers falling into terrestrial category. It should also be noted that papers on general fault-tolerant sensor networks, not specifically claiming any environments, were categorized into the terrestrial category. Figure 2 presents the frequency of specific areas addressed in terrestrial papers where the order of the most frequent categories has switched but is not much different from Figure 1. However, Figure 3, which presents the analyzed marine and aquatic environment-related papers covering different specific areas, shows that marine wireless communication related research works have the highest number of papers among those identified by the current survey.
In order to further highlight the differences of the previous research focus in marine and terrestrial sensor networks, a radar diagram is shown in Figure 4. For the diagram, we selected eight significant specific areas: ’fault tolerant’, ’wireless’, ’mobile’, ’localization’, secure’, ’scalable’, ’energy efficient’, and ’cross-layer’, respectively. It can be seen from Figure 4 that a large share of marine research (shown by blue color in Figure 4) interest from the identified papers has been drawn to underwater wireless communication, while some are drawn to underwater Fault Tolerance techniques and almost none to underwater cross-layer Fault Tolerance. Underwater energy-efficiency and scalability are more covered areas than underwater vehicles (mobility) and security. Papers addressing terrestrial techniques (shown by green in Figure 4) were, according to the initial search criteria, more focusing on Fault Tolerance, including cross-layer Fault Tolerance, and less on energy efficiency or security.
High research effort on marine wireless networking in Figure 4 confirms the claim [5] that current pace of research on Internet of Underwater Things (IoUT) is slow due to the challenges arising from the uniqueness of underwater wireless sensor networks. Specifically, the main challenges for IoUT are the differences between Underwater Wireless Sensor Networks and Terrestrial Wireless Sensor Networks [5].
Fault Tolerant Control Systems is another extensive research area of Fault Tolerance not covered by current paper. There is an existing recent review paper [16] on the overview of research works in that topic.

3. Specifics of Underwater Sensor Networks

Environmental and engineering challenges for sensor networks in underwater environments are shown on Figure 5. An underwater environment is mostly different from a terrestrial one due to the harsh physical conditions—high pressure and hard accessibility, as well as limited communication and energy resources. Depending on the specific location, the temperature may fall with increasing depth, which may affect, e.g., the battery lifetime. In underwater environments, faults can be caused over time by ambient flowing water generated by surface waves or other reasons that shake the components of the sensor networks. Moreover, faults can be introduced by humans or aquatic organisms.
Many communication methods are unavailable underwater, and there are multiple phenomena [2,18] that obstruct communication there. Because of the possibility of flooding the hardware due to water leakage, more attention and resources should be paid to the physical integrity of sensor nodes. On the other hand, faults from excessive heat should be rare and avoidable underwater. In the underwater context, Fault Tolerance has been so far addressed for reliant UWSN networking [2,3,19,20], space localization [21], and monitoring underwater pipelines [22]. While it should be possible to adapt most of the generic Fault Tolerance concepts for the underwater use, the environment is more demanding and unforgiving, and faults are more costly. Some more demanding approaches, like cloud computing, may not make sense to be implemented in USNs. However, the authors cannot see any obstacles for applying those fault tolerant approaches that yield appropriate communication methods, low network bandwidths, and power requirements in the underwater domain.
Last but not least, one of the promising approaches that could be adapted successfully within the underwater environment’s constraints appears to be cross-layer resilience, which is an open research topic and lacking in recent research works, even for the terrestrial implementations.

4. Taxonomy of Faults and Fault Tolerance Tasks

In the following, we present the taxonomy of the sources of faults, as well as of the Fault Tolerance tasks. The objective of describing and representing these taxonomies is to categorize the articles for the current survey.

4.1. Sources of Faults

A fault is defined [23] as an underlying defect of a system that leads to an error. An error is a faulty system state, which may lead to failure, and failure is an error that affects system functionality. Faults may occur in different components and layers of systems for different reasons. The only type of fault possible in software is a design fault introduced during the software development, i.e., a bug [24]. Software bugs can be addressed separately and will not be covered further in the current paper.
Fault sources can be categorized by components where they occur. In sensor networks, they can occur in sensor nodes, in the communication network, and in the data sink [25]. Sensor networks share common failure issues with traditional networks, as well as introduce node failures as new fault sources [7].
USNs additionally introduce faults caused by environmental conditions, such as pressure, currents, underwater obstacles, etc. Those conditions may cause physical damage that may result in failures, as well as obstruct the system’s functionality. For instance, in underwater acoustic networks, loss of connection and high bit error rate may be caused by shadow zones [18] formed by different physical reasons. Domingo and Vuran distinguish up to five different underwater propagation phenomena which may obstruct communication [2].
Faults can either be permanent or temporary [26]. Permanent faults may be caused by manufacturing defects, as variances of the hardware components are inevitable due to physical reasons [27]. One of the other factors that can introduce faults is aging and wear-out of the hardware components [28]. In addition to the components themselves, the interconnections between them are also affecting the reliability and may cause faults [29].
One of the challenges of fault management is temporary faults, especially soft errors. Soft error is a temporary change of signal value due to ionizing particles [26] that may lead to failure. Due to high integration density, it is estimated that soft failure rate is increasing in the future [30]. Another potential source of temporary faults is electromagnetic interference [31].

4.2. Fault Tolerance Tasks

The objective of the current section is to define a taxonomy of Fault Tolerance tasks to help categorize the identified papers. The Fault Tolerance tasks are based on more general Fault Tolerance principles from References [32,33]. Figure 6. shows the taxonomy of Fault Tolerance tasks applicable in USNs and how they affect each other. While the design and initial deployment of USNs contribute to Fault Prevention and Prediction abilities, data collecting techniques at the run-time contribute also to Fault Detection and Fault Recovery stages of the system, all of which are going to be discussed in the current paper.
The techniques under consideration can be categorized into the following groups:
  • Fault Prediction and Prevention
    This task is about both preventing a fault to happen, as well as about proactive fault avoidance. Sensor networks can prevent certain faults from happening by design and/or deployment aspects. A disadvantage of fault prevention is a potentially increased system complexity. Fault avoidance, in turn, includes manufacturing testing and verification, which have a high cost often exceeding that of the entire design process.
  • Fault Detection and Identification
    One of the central parts of Fault Tolerance is Fault Detection and Fault Identification of affected components which can, for instance, be performed by utilizing data collection with ping messages. Without Fault Identification, for instance, sensor node and network faults may be hard to distinguish. A disadvantage of Fault Detection and Fault Identification may be additional energy requirements and network congestion.
  • Fault Isolation, Masking, and Recovery
    Isolation, masking, and recovery are different techniques for repairing a fault, minimizing the effect of a fault, or avoiding it to turn to system failure. Identified faults can be isolated, masked, and sensor network recovered, for instance, redirecting traffic through healthy backup components. Fault Recovery can ensure overall system operation even when components degrade. The downside may be the cost of adding components to ensure redundancy.
The overview of fault tolerant techniques presented in the following section follows the above-described taxonomy.

5. Overview of Techniques by Fault Tolerance Tasks

In the following, the Fault Tolerance techniques categorized according to the Fault Tolerance Tasks introduced in Section 4.2 and presented in Figure 6 will be discussed in more detail.

5.1. Fault Prevention and Prediction

Fault prevention and prediction in sensor networks are dependent on the architectural design of the system and the initial deployment method of the sensor network. These will be discussed in the following subsections. In addition, data collection in USNs and testing frameworks for UWSNs are presented.

5.1.1. Design of the Sensor Network

In Wireless Sensor Networks (WSN), instead of a centralized homogeneous topology, dividing nodes into clusters is an energy efficient and resilient method [12], where dedicated cluster head nodes may have more energy and communication capabilities to effectively act as mediators between regular nodes and data sinks.
To overcome the issues caused by varying environmental challenges of Underwater Wireless Sensor Networks (UWSN), natural algorithms may be utilized. For instance, clustering and routing can be done utilizing Cuckoo Search algorithm and Particle Swarm Optimization [34], which have behaved more resiliently in underwater conditions than more usual terrestrial Low Energy Adaptive Clustering Hierarchy (LEACH) protocol [11]. Pressure measurements have been used for UWSN routing [35] with floating depth-controlling sensors. Fault Management tasks can also be distributed across the whole network. In WSN with enough spare nodes energy efficient grid can be formed [36], changing the node manager, gateway and sensing nodes selected and spare nodes put to sleep. This results in energy-efficient and lightweight network but requires excess nodes.
However, existing UWSN protocols have not been adequately compared in underwater field trials yet [4].

5.1.2. Sensor Network Deployment

Sensor network deployment techniques are important for WSNs where deployment may directly affect the nodes’ locations and networking availability. Even for terrestrial wireless sensor networks, to obtain a satisfactory network performance, an adaptable deployment method is essential [37]. Usually, the sensor placement for WSNs utilizes, for redundancy reasons, more sensors than the minimum required number [38]. The deployment costs and energy efficiency of WSNs have been investigated in Reference [39], and it has been found that there is no single solution that can easily be applied in practice [40].
Wired sensor network deployment is less researched, possibly because wired sensor networks’ node deployment locations are limited by the cables, their locations are more predetermined, and node connectivity is not directly related to the location.

5.1.3. Data Collection

Sensor networks tend to have limited network bandwidth, energy, and storage capabilities. Thus, filtering and aggregating sensor information may be a way to meet those requirements. Raw sensor data near the source can be divided into informative, non-informative, and outlier groups [41], and only the needed data could be communicated or stored. Outlier data may result from noise, failures, disturbances, etc., and may be useful for Fault Tolerance purposes.
Different techniques to compress and aggregate collected information in UWSNs are investigated in Reference [42]. It was found that aggregation is justified, and cluster-based aggregation techniques are performing better than non-cluster-based ones. For instance, cluster head (CH) switching to backup (BCH) technique was proposed [43] for cluster-based UWSNs.
Moreover, security challenges need to be addressed. One way to minimize the risk of data tampering and/or interference is to ensure that the data is processed locally or, if that is not possible, then communicated end-to-end encrypted [44].

5.1.4. UWSN Testing Frameworks

Wireless networking protocols are one of the key research areas in UWSNs. To evaluate the implementation of underwater wireless protocols, simulation is often used. Due to the specifics of underwater environments (See Section 3), generic simulation environments are not able to capture some of the relevant features. Frameworks covered in the current section are useful for underwater acoustic protocols’ simulation and evaluation.
Frameworks, such as DESERT version 1 and 2 [45] and SUNSET [46], that allow simulation, emulation, and testing of the sensor networks, have been developed for UWSNs. An analysis conducted in Reference [47] shows that SUNSET represents a more mature, flexible, and robust framework for in-field testing than DESERT. However, DESERT v2 was released subsequently. For acoustic UWSN security testing, SecFUN framework [48] has been proposed.

5.2. Fault Detection and Identification

In essence, Fault Detection means determining that one or more bits in the computation differ from their correct value [33]. This can be detected via continuous monitoring of the network and nodes’ status. Some sources also use the word “Diagnosis” in a broader meaning than just detection and identification. Diagnosis has been defined as “characterizing the system’s state to locate the causes of errors, determine how the system is changing over time, and predict errors before they occur [33]”. The current section covers different techniques to execute the previously mentioned concepts.
A distributed hierarchical fault management [49] has been used for WSNs, where agent Fault Detection devices collect information from the power modules and sensors to determine failure conditions and sequentially diagnose the nature of the detected failure.
At higher abstraction levels, there has been a wide use of the SNMP protocol [50] by the industry for Fault Detection querying and triggering in IP networked devices. There are multiple commercial tools for generating failures, e.g., Chaos Monkey from Netflix [51], that randomly terminate services in production environments, to ensure their resiliency. The latter does not manage the occurring faults but ensures that the repairing mechanisms are in place and operable. Intelligent Platform Management Interface (IPMI) [52] is an industrial technology specification for hardware system management and monitoring.
A neural-network-based scheme for sensor failure detection, identification, and accommodation can be used which may allow the conditions to deviate to greater extent from theoretical models and estimation. A relatively simple and computationally light approach has been presented [53], where a neural network is used as an online learning state estimator for detecting faults. The neural network itself can be built as fault-tolerant [54], so that failing nodes have the least impact on result data.
Situational Awareness approach, using a mechanism that has been borrowed from humans, can be applied in sensor data interpretation for Internet of Things (IoT), specifically, regarding processes of sensation, perception and cognition. In addition to specification-based and learning-based approaches, a perception-based approach utilizing Fuzzy Formal Concept was proposed [55] for Situational Awareness identification.
Semantic Sensor Network Ontology has been proposed in Reference [56] for managing interoperability between sensing systems. The Semantic Ground describes information for interoperability and cooperation among agents [57]. To enhance resilience in Semantic Sensor Networks, monitoring nodes may forward observations to association nodes, which develop Situational Awareness by mining association rules, for example, via a natural Artificial Bee Colony algorithm [57].
Electric Power Grids need efficient monitoring since, for outage detection, environmental monitoring, and fault diagnostics, different WSN-based approaches are reviewed [13]. Most of these approaches are also applicable in other kinds of applications.

5.3. Fault Isolation, Masking and Recovery

Subsequent to Fault Detection, Fault Identification, and Fault Diagnosis, a fault handling stage can be entered [49] to prevent further data corruption and system deterioration. The fault handling consists of Fault Isolation, Masking, and Recovery. Fault handling can hide the fault occurrence from other components by applying Fault Masking; the key techniques for such masking are informational, time, and physical redundancy [32]. Proposed masking technique For Underwater Vehicles is Triple Modular Redundancy (TMPR) [58], which is also one of the most commonly used Fault Masking techniques. Isolating a faulty component from the others can be facilitated by using virtualization [32]. In large scale distributed systems, frozen virtual images of healthy services have been used as checkpoints [59] for rolling back in case of a fault occurrence.
Fault Recovery ensures that the fault does not propagate to visible results, for instance, by rolling back to a previous healthy state (checkpointing) or re-trying failed operations (time redundancy). Some of the techniques for Fault Recovery can be Reconfiguration, which is changing the system’s state so that the same or similar error is prevented from occurring again, and Adaptation, which is re-optimizing the system, for instance, after Reconfiguration task [33].
In Sensor Networks, different approaches for Fault Recovery have been used, that have different resource overheads, energy-efficiencies, scalabilities and network types. For both network and node Fault Recovery in wireless sensor networks, Mitra et al. (2016) [8] compares techniques, such as checkpoint-based recovery (CRAFT), agent-based recovery (ABSR), fault node recovery (FNR), cluster-based and hierarchical fault management (CHFM), and Failure Node Detection and Recovery algorithm (FNDRA). While some of those are specific to terrestrial wireless usage, some principles (e.g., checkpointing, etc.) can also be used in wired and/or underwater environments. To reduce the network bandwidth requirements, checkpoint backup can be mobile to nearby nodes [60] and used for recovering from fault situations.
In network protocols, Fault Masking and Fault Recovery are handled by error control schemes that are commonly categorized into the following three groups [2]:
  • Automatic Repeat Request (ARQ)—re-transmission of corrupted data is asked;
  • Forward Error Correction (FEC)—data corruption can be detected and corrected by the receiving end; and
  • Hybrid ARQ (HARQ)—a combination of FEC and ARQ.
The cross-layer approach benefits Fault Recovery significantly since single-layer redundancy, such as hardware redundancy and application checkpointing, have very high costs, and latency between fault occurrence and detection makes the recovery difficult [33].

6. Comparative Analysis

All the papers that were selected according to the criteria described in Section 2 are listed in Table 2. The table includes information about the targeted extra-functional aspects and Fault Tolerance task(s). In addition, the Marine column in Table shows if the listed paper is explicitly touching aquatic environments. The papers are ordered by their order of citation within this survey paper. Papers that are not directly cited in the text but still listed in Table 2 are ordered chronologically by the publishing year. Papers that are not included in the analysis but are cited (e.g., definitions) have not been included in the table.
It can be seen from Table 2 that only two papers address both marine and cross-layer Fault Tolerance aspects. However, in the work targeting cross-layer analysis of error control [2], the term ’cross-layer’ does not apply to the system stack but only to the communication protocol layers. Another work authored by the authors of this survey [61] is focusing on data-driven cross-layer Fault Tolerance. Thus, there is a serious gap in research addressing cross-layer Fault Tolerance in underwater sensor networks.
Regarding other extra-functional aspects, security in marine environments is addressed by six marine papers and is focusing on securing wireless communication [20,48,62], authentication [63], and hybrid attacks [64]. On scalability, seven marine papers were identified, and underwater scalability has been researched, for instance, in the context of monitoring underwater pipelines [22]. On Energy-efficiency, there were 14 Marine papers identified, and extensive focus has been on energy-efficient underwater wireless protocols [3,19,65,66,67,68,69] and less on other aspects. Open research issues from all the mentioned extra-functional aspects will be discussed in the following section.

7. Open Research Issues

In the following, the open research issues identified are presented according to the categories of extra-functional aspects reported in Table 2.

7.1. Security

Faults and security are interrelated concepts [59]. It requires effort to prevent systems from being penetrated, even when they operate as intended; however, faults will add further uncertainty and make the task of prevention even harder. Faults can be created by an intrusion; but, moreover, faults can enable new intrusion vectors [70]—misbehaving devices violate key assumptions and create a number of new attack vectors to systems. For example, soft errors explained in Section 4.1 can be used to defeat cryptography [128]. In wireless sensor networks, intrusion detection systems have been investigated [71], and intrusion detection can be divided into Anomaly detection, which can work well for unknown attacks, and Misuse detection, for known attack signatures.

7.2. Energy-Efficiency

Power dissipation has by now reached a point where energy concerns limit the computation we can deploy on the chip [70], and the aim is shifting from transistor density and speed to energy density and cost. Energy density and efficiency need also to be addressed on a larger scale; for instance, WSNs may not have unlimited power supply and need to utilize energy-efficiency strategies [11,12,36,40]. For Fault Tolerance techniques, cross-layer approach is considered more energy-efficient [33] than single layer. Strategic redundancy in cross-layer approach may allow systems to safely operate on the verge of failure [70], spending less energy without going over the edge.
In sensor networks, energy consumption can be reduced, for instance, by using specific low-energy communication protocols, reducing the number and speed of the nodes, and pausing the nodes [129]. However, with the growing complexity of applications, energy consumption is becoming one of the limiting factors.

7.3. Scalability

One of the traditional benefits of scaling has been the decrease of cost per functionality [70], but easing reliability problems by multiplicating logic, voting and similar techniques means that the scaled technology might not offer a reduction of energy or area. Some Fault Tolerance techniques may increase computing overhead, and not all approaches are scalable [8]. Large scale fault tolerant systems are researched without paying special attention to energy and communication constraints [59].

7.4. Cross Layer Approach to Fault Tolerance

Faults are not going to disappear but likely to increase in the future [30]. One way to cope with faults is to accept imperfect devices to fail and compensate failures at higher levels in the system stack [70], tolerating faults across layers involving circuit design, firmware, operating system, applications, etc. Cross-layer fault tolerant systems have potential to implement reliable, high-performance and energy-efficient solutions without overwhelming costs [33] by distributing the responsibilities of tolerating faults across multiple layers [6]. Cross-layer Fault Tolerance has also been viewed from the perspective of sensor data layers [61].
In case Fault Detection and Fault Recovery are to be implemented in different system layers, then following challenges arise [72]:
  • For statistical validation and metrics high confidence resource-light reliability and availability estimation is needed.
  • Verification of resilience techniques, to be sure that resilience techniques perform under all possible scenarios.
  • Reliability grades for testing and grading system-wide reliability and data integrity. Reliability may change under different workloads.
In addition to the cross-layer approach, a Multi-Layer approach [73] has also been proposed, where system layers are adapted to each other to reduce error propagation. However, in the opinion of the authors of the current paper, this does not constitute a principally distinct approach but, rather, an increment to the cross-layer approach.

8. Conclusions

The current paper presented a systematic survey on fault tolerant techniques in USNs and pointed out open research issues in this field. The paper considered fault tolerant techniques that are developed for underwater use or could be adapted for that. The techniques were divided into groups according to the taxonomy of Fault Tolerance tasks, and papers utilizing these techniques were discussed in sections corresponding to the tasks.
We collected top papers by conducting a systematic search from different online environments, related papers suggested by those environments, and sources cited by the collected papers. Next, we analyzed the collected papers, divided them into categories and discussed aspects covered in those papers. Areas of high research interest and open research issues in the scope of the initial criteria were detected and brought out. Additionally, in order to categorize and systematize the analyzed papers, taxonomies for fault sources and Fault Tolerance tasks were described, and a full table of the papers was presented.
The current paper is the first to investigate the state-of-the-art in Fault Tolerance, particularly cross-layer Fault Tolerance, in USNs. According to the survey, there is a lack of research covering the cross-layer Fault Tolerance aspect for underwater sensor networks. Therefore, the mentioned topic is a prospective candidate for future works on fault tolerant USNs.

Author Contributions

Conceptualization, L.V., M.K. and J.R.; methodology, L.V. and M.K.; software, L.V.; validation, L.V. and J.R.; formal analysis, L.V.; investigation, L.V.; writing—original draft preparation, L.V., M.K. and J.R.; writing—review and editing, L.V. and J.R.; visualization, L.V. and J.R.; supervision, M.K. and J.R.; funding acquisition, M.K. and J.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Estonian Centre of Excellence in ICT Research (EXCITE) and by the Estonian Ministry of Education and Research and European Regional Fund (grant 2014-2020.4.01.20-0289).

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

References

  1. Domingo, M.C. An overview of the internet of underwater things. J. Netw. Comput. Appl. 2012, 35, 1879–1890. [Google Scholar] [CrossRef]
  2. Domingo, M.C.; Vuran, M.C. Cross-layer analysis of error control in underwater wireless sensor networks. Comput. Commun. 2012, 35, 2162–2172. [Google Scholar] [CrossRef]
  3. Zenia, N.Z.; Aseeri, M.; Ahmed, M.R.; Chowdhury, Z.I.; Shamim Kaiser, M. Energy-efficiency and reliability in MAC and routing protocols for underwater wireless sensor network: A survey. J. Netw. Comput. Appl. 2016, 71, 72–85. [Google Scholar] [CrossRef]
  4. Jiang, S. State-of-the-Art Medium Access Control (MAC) Protocols for Underwater Acoustic Networks: A Survey Based on a MAC Reference Model. IEEE Commun. Surv. Tutor. 2018, 20, 96–131. [Google Scholar] [CrossRef]
  5. Kao, C.C.; Lin, Y.S.; Wu, G.D.; Huang, C.J. A study of applications, challenges, and channel models on the Internet of Underwater Things. In Proceedings of the 2017 International Conference on Applied System Innovation (ICASI), Sapporo, Japan, 13–17 May 2017; pp. 1375–1378. [Google Scholar] [CrossRef]
  6. Veleski, M.; Kraemer, R.; Krstic, M. An overview of cross-layer resilience design methods. In Proceedings of the Fifth International Conference Reliability—ETS’17 Fringe Workshop, Limasol, Cyprus, 25–26 May 2017. [Google Scholar]
  7. Paradis, L.; Han, Q. A survey of fault management in wireless sensor networks. J. Netw. Syst. Manag. 2007, 15, 171–190. [Google Scholar] [CrossRef]
  8. Mitra, S. Comparative study of fault recovery techniques in wireless sensor network. In Proceedings of the 2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), Pune, India, 19–21 December 2016; pp. 19–21. [Google Scholar]
  9. Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
  10. Díaz, M.; Martín, C.; Rubio, B. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl. 2016, 67, 99–117. [Google Scholar] [CrossRef]
  11. Tyagi, S.; Kumar, N. A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks. J. Netw. Comput. Appl. 2013, 36, 623–645. [Google Scholar] [CrossRef]
  12. Singh, S.P.; Sharma, S.C. A survey on cluster based routing protocols in wireless sensor networks. Procedia Comput. Sci. 2015, 45, 687–695. [Google Scholar] [CrossRef] [Green Version]
  13. Fadel, E.; Gungor, V.C.; Nassef, L.; Akkari, N.; Abbas Malik, M.G.; Almasri, S.; Akyildiz, I.F. A survey on wireless sensor networks for smart grid. Comput. Commun. 2015, 71, 22–33. [Google Scholar] [CrossRef]
  14. Moridi, E.; Haghparast, M.; Hosseinzadeh, M.; Jassbi, S.J. Fault management frameworks in wireless sensor networks: A survey. Comput. Commun. 2020, 155, 205–226. [Google Scholar] [CrossRef]
  15. More, A.; Raisinghani, V. A survey on energy efficient coverage protocols in wireless sensor networks. J. King Saud Univ. Comput. Inf. Sci. 2017, 29, 428–448. [Google Scholar] [CrossRef] [Green Version]
  16. Amin, A.A.; Hasan, K.M. A review of Fault Tolerant Control Systems: Advancements and applications. Meas. J. Int. Meas. Confed. 2019, 143, 58–68. [Google Scholar] [CrossRef]
  17. Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G. Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. Int. J. Surg. 2010, 8, 336–341. [Google Scholar] [CrossRef] [Green Version]
  18. Domingo, M.C. A topology reorganization scheme for reliable communication in underwater wireless sensor networks affected by shadow zones. Sensors 2009, 9, 8684–8708. [Google Scholar] [CrossRef] [Green Version]
  19. Xu, J.; Li, K.; Min, G. Reliable and energy-efficient multipath communications in underwater sensor networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1326–1335. [Google Scholar] [CrossRef]
  20. Lal, C.; Petroccia, R.; Conti, M.; Alves, J. Secure underwater acoustic networks: Current and future research directions. In Proceedings of the 2016 IEEE Third Underwater Communications and Networking Conference (UComms), Lerici, Italy, 30 August–1 September 2016. [Google Scholar] [CrossRef]
  21. Das, A.P.; Thampi, S.M. Fault-resilient localization for underwater sensor networks. Ad Hoc Netw. 2017, 55, 132–142. [Google Scholar] [CrossRef]
  22. Mohamed, N.; Jawhar, I.; Al-Jaroodi, J.; Zhang, L. Sensor network architectures for monitoring underwater pipelines. Sensors 2011, 11, 10738–10764. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Kumar, S.; Balamurugan, B. Fault tolerant cloud systems. In Encyclopedia of Information Science and Technology, 4th ed.; Khosrow-Pour, D.B.A., Ed.; IGI Global: Hershey, PA, USA, 2018. [Google Scholar] [CrossRef]
  24. Wilfredo, T.; Torres-Pomales, W. Software Fault Tolerance: A Tutorial; Technical Report October; NASA: Washington, DC, USA, 2000. [Google Scholar]
  25. Khan, M.Z. Fault Management in Wireless Sensor Networks. GESJ Comput. Sci. Telecommun. 2013, 1, 3–17. [Google Scholar]
  26. Henkel, J.; Hedrich, L.; Herkersdorf, A.; Kapitza, R.; Lohmann, D.; Marwedel, P.; Platzner, M.; Rosenstiel, W.; Schlichtmann, U.; Spinczyk, O.; et al. Design and architectures for dependable embedded systems. In Proceedings of the Seventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, Taipei, Taiwan, 9–14 October 2011; ACM Press: New York, NY, USA, 2011; p. 69. [Google Scholar] [CrossRef]
  27. Georgakos, G.; Schlichtmann, U.; Schneider, R.; Chakraborty, S. Reliability challenges for electric vehicles. In Proceedings of the 50th Annual Design Automation Conference, Austin, TX, USA, 29 May–7 June 2013; ACM Press: New York, NY, USA, 2013; p. 1. [Google Scholar] [CrossRef]
  28. Lorenz, D.; Barke, M.; Schlichtmann, U. Efficiently analyzing the impact of aging effects on large integrated circuits. Microelectron. Reliab. 2012, 52, 1546–1552. [Google Scholar] [CrossRef]
  29. Sauli, Z.; Retnasamy, V.; Taniselass, S.; Shapri, A.H.; Hatta, R.M.; Aziz, M.H. Polymer core BGA vertical stress loading analysis. Proc. Int. Conf. Comput. Intell. Model. Simul. 2012, 129, 148–151. [Google Scholar] [CrossRef]
  30. Rehman, S. Reliable Software for Unreliable Hardware—A Cross-Layer Approach. Ph.D. Thesis, Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany, 2015. [Google Scholar]
  31. Kaaniche, M.; Laprie, J.C.; Blanquart, J.P. Dependability engineering of complex computing systems. In Proceedings of the Sixth IEEE International Conference on Engineering of Complex Computer Systems 2000, Tokyo, Japan, 11–14 September 2000; pp. 36–46. [Google Scholar] [CrossRef]
  32. Tanenbaum, A.S.; Van Steen, M. Distributed Systems: Principles and Paradigms; Prentice-Hall: Upper Saddle River, NJ, USA, 2007. [Google Scholar]
  33. Carter, N.P.; Naeimi, H.; Gardner, D.S. Design techniques for cross-layer resilience. In Proceedings of the 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), Dresden, Germany, 8–12 March 2010; pp. 1023–1028. [Google Scholar] [CrossRef]
  34. Sofi, S.A.; Mir, R.N. Natural algorithm based adaptive architecture for underwater wireless sensor networks. In Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 22–24 March 2017; pp. 2343–2346. [Google Scholar] [CrossRef]
  35. Noh, Y.; Lee, U.; Lee, S.; Wang, P.; Vieira, L.F.; Cui, J.H.; Gerla, M.; Kim, K. HydroCast: Pressure routing for underwater sensor networks. IEEE Trans. Veh. Technol. 2016, 65, 333–347. [Google Scholar] [CrossRef]
  36. Asim, M.; Mokhtar, H.; Merabti, M. A fault management architecture for wireless sensor network. In Proceedings of the 2008 International Wireless Communications and Mobile Computing Conference, Crete, Greece, 6–8 August 2008; pp. 779–785. [Google Scholar] [CrossRef] [Green Version]
  37. Wu, C.H.; Lee, K.C.; Chung, Y.C. A Delaunay Triangulation based method for wireless sensor network deployment. Comput. Commun. 2007, 30, 2744–2752. [Google Scholar] [CrossRef]
  38. Isler, V.; Kannan, S.; Daniilidis, K. Sampling based sensor-network deployment. In Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Sendai, Japan, 28 September–2 October 2004; pp. 1780–1785. [Google Scholar]
  39. Dong, M.; Li, H.; Li, Y.; Deng, Y.; Yin, R. Fault-tolerant topology with lifetime optimization for underwater wireless sensor networks. Sadhana Acad. Proc. Eng. Sci. 2020, 45. [Google Scholar] [CrossRef]
  40. Cheng, Z.; Perillo, M.; Heinzelman, W.B. General network lifetime and cost models for evaluating sensor network deployment strategies. IEEE Trans. Mob. Comput. 2008, 7, 484–497. [Google Scholar] [CrossRef]
  41. Bhuvana, V.P.; Preissl, C.; Tonello, A.M.; Huemer, M. Multi-Sensor Information Filtering with Information-Based Sensor Selection and Outlier Rejection. IEEE Sens. J. 2018, 18, 2442–2452. [Google Scholar] [CrossRef]
  42. Goyal, N.; Dave, M.; Verma, A.K. Data aggregation in underwater wireless sensor network: Recent approaches and issues. J. King Saud Univ. Comput. Inf. Sci. 2017. [Google Scholar] [CrossRef]
  43. Goyal, N.; Dave, M.; Verma, A.K. A novel fault detection and recovery technique for cluster-based underwater wireless sensor networks. Int. J. Commun. Syst. 2018, 31, 1–14. [Google Scholar] [CrossRef]
  44. Kohnstamm, J.; Madhub, D. Mauritius Declaration. In Proceedings of the 36th International Conference of Data Protection & Privacy Commissioners, Balaclava, Mauritius, 14 October 2014; pp. 1–2. [Google Scholar]
  45. Campagnaro, F.; Francescon, R.; Guerra, F.; Favaro, F.; Casari, P.; Diamant, R.; Zorzi, M. The DESERT underwater framework v2: Improved capabilities and extension tools. In Proceedings of the 2016 IEEE Third Underwater Communications and Networking Conference (UComms), Lerici, Italy, 30 August–1 September 2016. [Google Scholar] [CrossRef]
  46. Petrioli, C.; Petroccia, R.; Potter, J.R.; Spaccini, D. The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks. Ad Hoc Netw. 2015, 34, 224–238. [Google Scholar] [CrossRef]
  47. Petroccia, R.; Spaccini, D. Comparing the SUNSET and DESERT frameworks for in field experiments in underwater acoustic networks. In OCEANS 2013 MTS/IEEE Bergen: The Challenges of the Northern Dimension; IEEE: Bergen, Norway, 2013. [Google Scholar] [CrossRef]
  48. Ateniese, G.; Capossele, A.; Gjanci, P.; Petrioli, C.; Spaccini, D. SecFUN: Security framework for underwater acoustic sensor networks. In MTS/IEEE OCEANS 2015—Genova: Discovering Sustainable Ocean Energy for a New World; IEEE: Genova, Italy, 2015. [Google Scholar] [CrossRef]
  49. Liu, T.H.; Yi, S.C.; Wang, X.W. A fault management protocol for low-energy and efficient Wireless sensor networks. J. Inf. Hiding Multimed. Signal Process. 2013, 4, 34–45. [Google Scholar]
  50. Case, J.D.; Fedor, M.; Schoffstall, M.L.; Davin, J. RFC1157: Simple Network Management Protocol (SNMP). Technical Report, RFC Editor. 1990. [Google Scholar]
  51. Gunawi, H.S.; Do, T.; Hellerstein, J.M.; Stoica, I.; Borthakur, D.; Robbins, J. Failure as a service (faas): A cloud service for large-scale, online failure drills. In Technical Report No. UCB/EECS-2011-87; University of California: Berkeley, CA, USA, 2011. [Google Scholar]
  52. Intel. Intelligent Platform Management Interface. 2004. Available online: https://www.intel.com/content/www/us/en/servers/ipmi/ipmi-home.html (accessed on 6 May 2021).
  53. Napolitano, M.R.; Neppach, C.; Casdorph, V.; Naylor, S.; Innocenti, M.; Silvestri, G. Neural-network-based scheme for sensor failure detection, identification, and accommodation. J. Guid. Control. Dyn. 1995, 18, 1280–1286. [Google Scholar] [CrossRef]
  54. Neti, C.; Schneider, M.H.; Young, E.D. Maximally Fault Tolerant Neural Networks. IEEE Trans. Neural Netw. 1992, 3, 14–23. [Google Scholar] [CrossRef]
  55. Benincasa, G.; D’Aniello, G.; De Maio, C.; Loia, V.; Orciuoli, F. Towards perception-oriented situation awareness systems. Adv. Intell. Syst. Comput. 2014, 322, 813–824. [Google Scholar] [CrossRef]
  56. Compton, M.; Barnaghi, P.; Bermudez, L.; García-Castro, R.; Corcho, O.; Cox, S.; Graybeal, J.; Hauswirth, M.; Henson, C.; Herzog, A.; et al. The SSN ontology of the W3C semantic sensor network incubator group. J. Web Semant. 2012, 17, 25–32. [Google Scholar] [CrossRef]
  57. D’Aniello, G.; Gaeta, A.; Orciuoli, F. Artificial bees for improving resilience in a sensor middleware for Situational Awareness. In Proceedings of the 2015 Conference on Technologies and Applications of Artificial Intelligence, Tainan, Taiwan, 20–22 November 2015; pp. 300–307. [Google Scholar] [CrossRef]
  58. Alansary, K.A.; Daoud, R.M.; Amer, H.H.; Elsayed, H.M. Networked control system architecture for autonomous underwater vehicles with redundant sensors. In Proceedings of the 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Pitesti, Romania, 27–29 June 2019; pp. 2019–2022. [Google Scholar] [CrossRef]
  59. Cristea, V.; Dobre, C.; Pop, F.; Stratan, C.; Costan, A.; Leordeanu, C.; Tirsa, E. A dependability layer for large-scale distributed systems. Int. J. Grid Util. Comput. 2011, 2, 109. [Google Scholar] [CrossRef]
  60. Salera, I.; Agbaria, A.; Eltoweissy, M. Fault-tolerant mobile sink in networked sensor systems. In Proceedings of the 2006 2nd IEEE Workshop on Wireless Mesh Networks, Reston, VA, USA, 25–28 September 2007; pp. 106–108. [Google Scholar] [CrossRef]
  61. Vihman, L.; Kruusmaa, M.; Raik, J. Data-driven cross-layer fault management architecture for sensor networks. In Proceedings of the 2020 16th European Dependable Computing Conference (EDCC), Munich, Germany, 7–10 September 2020; pp. 33–40. [Google Scholar] [CrossRef]
  62. Han, G.; Jiang, J.; Sun, N.; Shu, L. Secure communication for underwater acoustic sensor networks. IEEE Commun. Mag. 2015, 53, 54–60. [Google Scholar] [CrossRef]
  63. Chae-Won, Y.; Jae-Hoon, L.; Okyeon, Y.; Soo-Hyun, P. Ticket-based authentication protocol for Underwater Wireless Sensor Network. In Proceedings of the 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), Vienna, Austria, 5–8 July 2016; pp. 215–217. [Google Scholar] [CrossRef]
  64. Han, G.; He, Y.; Jiang, J.; Wang, H.; Peng, Y.; Fan, K. Fault-Tolerant Trust Model for Hybrid Attack Mode in Underwater Acoustic Sensor Networks. IEEE Netw. 2020, 34, 330–336. [Google Scholar] [CrossRef]
  65. Dong, Y.; Dong, H. Simulation study on cross-layer design for energy conservation in underwater acoustic networks. In 2013 OCEANS—San Diego; IEEE: San Diego, CA, USA, 2013; pp. 1–4. [Google Scholar]
  66. Zhou, Z.; Yao, B.; Xing, R.; Shu, L.; Bu, S. E-CARP: An Energy Efficient Routing Protocol for UWSNs in the Internet of Underwater Things. IEEE Sens. J. 2016, 16, 4072–4082. [Google Scholar] [CrossRef]
  67. Wang, K.; Gao, H.; Xu, X.; Jiang, J.; Yue, D. An Energy-Efficient Reliable Data Transmission Scheme for Complex Environmental Monitoring in Underwater Acoustic Sensor Networks. IEEE Sens. J. 2016, 16, 4051–4062. [Google Scholar] [CrossRef]
  68. Huang, C.J.; Wang, Y.W.; Liao, H.H.; Lin, C.F.; Hu, K.W.; Chang, T.Y. A power-efficient routing protocol for underwater wireless sensor networks. Appl. Soft Comput. J. 2011, 11, 2348–2355. [Google Scholar] [CrossRef]
  69. Rani, S.; Hassan, S.; Malhotra, J.; Talwar, R. Energy e ffi cient chain based routing protocol for underwater wireless sensor networks. J. Netw. Comput. Appl. 2017, 92, 1–9. [Google Scholar] [CrossRef]
  70. DeHon, A.; Quinn, H.M.; Carter, N.P. Vision for cross-layer optimization to address the dual challenges of energy and reliability. In Proceedings of the 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), Dresden, Germany, 8–12 March 2010; pp. 1017–1022. [Google Scholar] [CrossRef]
  71. Darra, E.; Katsikas, S.K. A survey of intrusion detection systems in wireless sensor networks. Intrusion Detect. Prev. Mob. Ecosyst. 2017, 393–458. [Google Scholar] [CrossRef]
  72. Mitra, S.; Brelsford, K.; Sanda, P.N. Cross-layer resilience challenges: Metrics and optimization. In Proceedings of the 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), Dresden, Germany, 8–12 March 2010; pp. 1029–1034. [Google Scholar] [CrossRef]
  73. Henkel, J.; Bauer, L.; Zhang, H.; Rehman, S.; Shafique, M. Multi-layer dependability: From microarchitecture to application level. In Proceedings of the 51st Annual Design Automation Conference, San Francisco, CA, USA, 1–5 June 2014; pp. 47:1–47:6. [Google Scholar] [CrossRef]
  74. Bulusu, N.; Heidemann, J.; Estrin, D. GPS-less low-cost outdoor localization for very small devices. IEEE Pers. Commun. 2000, 7, 28–34. [Google Scholar] [CrossRef] [Green Version]
  75. Nassif, S. Modeling and analysis of manufacturing variations. In Proceedings of the IEEE 2001 Custom Integrated Circuits Conference, San Diego, CA, USA, 9 May 2001; pp. 223–228. [Google Scholar] [CrossRef]
  76. Zhao, Y.J.; Govindan, R.; Estrin, D. Residual energy scan for monitoring sensor networks. In Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record, Orlando, FL, USA, 17–21 March 2002; Volume 1, pp. 356–362. [Google Scholar] [CrossRef]
  77. de Lemos, R.; Gacek, C.; Romanovsky, A. LNCS 3069—Architecting dependable systems II. In Architecting Dependable Systems II; Springer: Berlin, Germany, 2004; pp. 286–304. [Google Scholar]
  78. Bokareva, T.; Bulusu, N.; Jha, S. SASHA: Toward a self-healing hybrid sensor network architecture. In Proceedings of the Second IEEE Workshop on Embedded Networked Sensors 2005, Sydney, Australia, 31 May 2005; Volume 2005, pp. 71–78. [Google Scholar] [CrossRef]
  79. Heidemann, J.; Wei, Y.; Wills, J.; Syed, A.; Yuan, L. Research challenges and applications for underwater sensor networking. In Proceedings of the IEEE Wireless Communications and Networking Conference 2006, Las Vegas, NV, USA, 3–6 April 2006; pp. 228–235. [Google Scholar] [CrossRef]
  80. Mengjie, Y.; Mokhtar, H.; Merabti, M. Fault management in wireless sensor networks. IEEE Wirel. Commun. 2007, 14, 13–19. [Google Scholar] [CrossRef] [Green Version]
  81. Lee, M.H.; Choi, Y.H. Fault detection of wireless sensor networks. Comput. Commun. 2008, 31, 3469–3475. [Google Scholar] [CrossRef]
  82. Wang, Y.; Cao, L.; Dahlberg, T.A. Efficient fault tolerant topology control for three-dimensional wireless networks. In Proceedings of the 2008 17th International Conference on Computer Communications and Networks, St. Thomas, VI, USA, 3–7 August 2008; pp. 336–341. [Google Scholar] [CrossRef]
  83. Khan, M.Z.; Merabti, M.; Askwith, B. Design considerations for fault management in wireless sensor networks. In Proceedings of the 10th Annual Conference on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, 12–23 June 2009. [Google Scholar] [CrossRef]
  84. Teymorian, A.Y.; Member, S.; Cheng, W.; Ma, L.; Cheng, X. 3D Underwater Sensor Network Localization. Network 2009, 8, 1610–1621. [Google Scholar] [CrossRef]
  85. Yu, C.H.; Lee, K.H.; Moon, H.P.; Choi, J.W.; Seo, Y.B. Sensor localization algorithms in underwater wireless sensor networks. In Proceedings of the 2009 ICCAS-SICE, Fukuoka, Japan, 18–21 August 2009; pp. 1760–1764. [Google Scholar]
  86. Kim, J.Y.; Yoon, H.; Kim, S.H.; Son, S.H. Fault management of robot software components based on OPRoS. In Proceedings of the 2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, Newport Beach, CA, USA, 28–31 March 2011; pp. 253–260. [Google Scholar] [CrossRef] [Green Version]
  87. Tanasa, B.; Bordoloi, U.D.; Eles, P.; Peng, Z. Reliability-aware frame packing for the static segment of flexray. In Proceedings of the 2011 Ninth ACM International Conference on Embedded Software (EMSOFT), Taipei, Taiwan, 9–14 October 2011; ACM Press: New York, NY, USA, 2011; pp. 175–184. [Google Scholar] [CrossRef] [Green Version]
  88. Roman, R.; Najera, P.; Lopez, J. Securing the Internet of things. Comput. (Long. Beach. Calif.) 2011, 44, 51–58. [Google Scholar] [CrossRef] [Green Version]
  89. Paul, S.; Pan, J.; Jain, R. Architectures for the future networks and the next generation Internet: A survey. Comput. Commun. 2011, 34, 2–42. [Google Scholar] [CrossRef] [Green Version]
  90. Xu, M.; Liu, G. Fault tolerant routing in three-dimensional underwater acoustic sensor networks. In Proceedings of the 2011 International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 9–11 November 2011. [Google Scholar] [CrossRef]
  91. Thomas, A.; Pattabiraman, K. Error detector placement for soft computation. Proc. Int. Conf. Dependable Syst. Netw. 2013, 15, 1–25. [Google Scholar] [CrossRef]
  92. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
  93. Guo, Y.; Liu, Y. Localization for anchor-free underwater sensor networks. Comput. Electr. Eng. 2013, 39, 1812–1821. [Google Scholar] [CrossRef]
  94. Amory, A.; Meyer, B.; Osterloh, C.; Tosik, T.; Maehle, E. Towards fault-tolerant and energy-efficient swarms of underwater robots. In Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, Cambridge, MA, USA, 20–24 May 2013; pp. 1550–1553. [Google Scholar] [CrossRef]
  95. Oteafy, S.M.; Hassanein, H.S. Resilient Sensor Networks utilizing dynamic resource reuse: A novel paradigm towards fault-tolerant wireless sensing. In Proceedings of the 2014 International Conference on Computing, Management and Telecommunications (ComManTel), Da Nang, Vietnam, 27–29 April 2014; pp. 217–222. [Google Scholar] [CrossRef]
  96. Rault, T.; Bouabdallah, A.; Challal, Y. Energy efficiency in wireless sensor networks: A top-down survey. Comput. Netw. 2014, 67, 104–122. [Google Scholar] [CrossRef] [Green Version]
  97. Kuila, P.; Jana, P.K. Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach. Eng. Appl. Artif. Intell. 2014, 33, 127–140. [Google Scholar] [CrossRef]
  98. Zhu, Y.; Lu, X.; Pu, L.; Su, Y.; Martin, R.; Zuba, M.; Peng, Z.; Cui, J.H. Aqua-Sim: An NS-2 Based Simulator for Underwater Sensor Networks. In OCEANS 2009; IEEE: Biloxi, MS, USA, 2014; p. 2014. [Google Scholar] [CrossRef]
  99. Rossi, P.S.; Member, S.; Ciuonzo, D. Energy Detection for MIMO Decision Fusion in Underwater Sensor Networks. IEEE Sens. J. 2015, 15, 1630–1640. [Google Scholar] [CrossRef]
  100. Bauer, L.; Henkel, J.; Herkersdorf, A.; Kochte, M.A.; Kühn, J.M.; Rosenstiel, W.; Schweizer, T.; Wallentowitz, S.; Wenzel, V.; Wild, T.; et al. Adaptive multi-layer techniques for increased system dependability. It-Inf. Technol. 2015, 57, 149–158. [Google Scholar] [CrossRef]
  101. Benson, K. Enabling resilience in the Internet of Things. In Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), St. Louis, MO, USA, 23–27 March 2015; pp. 230–232. [Google Scholar] [CrossRef]
  102. Zhehao, W.; Xia, L. An Improved Underwater Acoustic Network Localization Algorithm. China Commun. 2015, 12, 77–83. [Google Scholar]
  103. Han, G.; Zhang, C.; Shu, L.; Rodrigues, J.J.P.C. Impacts of Deployment Strategies on Localization Performance in Underwater Acoustic Sensor Networks. IEEE Trans. Ind. Electron. 2015, 62, 1725–1733. [Google Scholar] [CrossRef]
  104. Valerio, V.D.; Petrioli, C.; Pescosolido, L.; Van Der Shaar, M. A reinforcement learning-based data-link protocol for underwater acoustic communications. In Proceedings of the 10th International Conference on Underwater Networks & Systems, Arlington, VA, USA, 22–24 October 2015; pp. 1–5. [Google Scholar] [CrossRef]
  105. Rehman, S.; Chen, K.H.; Kriebel, F.; Toma, A.; Shafique, M.; Chen, J.J.; Henkel, J. Cross-Layer Software Dependability on Unreliable Hardware. IEEE Trans. Comput. 2016, 65, 80–94. [Google Scholar] [CrossRef]
  106. Sahoo, S.S.; Veeravalli, B.; Kumar, A. Cross-layer fault-tolerant design of real-time systems. In Proceedings of the 2016 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Storrs, CT, USA, 19–20 September 2016; pp. 63–68. [Google Scholar] [CrossRef]
  107. Li, J.; Gao, H.; Zhang, S.; Chang, S.; Chen, J.; Liu, Z. Self-localization of autonomous underwater vehicles with accurate sound travel time solution. Comput. Electr. Eng. 2016, 50, 26–38. [Google Scholar] [CrossRef]
  108. Liu, J.; Wang, Z.; Cui, J.H.; Zhou, S.; Yang, B. A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks. IEEE Trans. Mob. Comput. 2016, 15, 530–543. [Google Scholar] [CrossRef]
  109. Khan, J.U.; Cho, H.S. A multihop data-gathering scheme using multiple AUVs in hierarchical underwater sensor networks. Int. Conf. Inf. Netw. 2016, 265–267. [Google Scholar] [CrossRef]
  110. Koraz, Y.; Gabbar, H.A. Bayesian-neuro-fuzzy network based online condition monitoring system for resilient micro energy grid using FPGA. In Proceedings of the 2017 IEEE 7th International Conference on Power and Energy Systems (ICPES), Toronto, ON, Canada, 1–3 November 2017; pp. 85–89. [Google Scholar] [CrossRef]
  111. Suvarna, M.; Patil, A.; Mishra, M.P. Improved Mobicast Routing Protocol to Minimize Energy Consumption for Underwater Sensor Networks. Int. J. Res. Sci. Eng. 2017, 3, 201. [Google Scholar]
  112. Cario, G.; Casavola, A.; Gjanci, P.; Lupia, M.; Petrioli, C.; Spaccini, D. Long lasting underwater wireless sensors network for water quality monitoring in fish farms. In OCEANS 2017—Aberdeen; IEEE: Aberdeen, UK, 2017; pp. 1–6. [Google Scholar] [CrossRef]
  113. Dong, Y.; Wang, R.; Li, Z.; Cheng, C.; Zhang, K. Poster abstract: Improved reverse localization schemes for underwater wireless sensor networks. In Proceedings of the 2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks, Pittsburgh, PA, USA, 18–21 April 2017; Volume 1, pp. 323–324. [Google Scholar] [CrossRef]
  114. Kao, C.C.; Lin, Y.S.; Wu, G.D.; Huang, C.J. A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models. Sensors 2017, 17, 1477. [Google Scholar] [CrossRef] [Green Version]
  115. Mortazavi, E.; Javidan, R.; Dehghani, M.J.; Kavoosi, V. A robust method for underwater wireless sensor joint localization and synchronization. Ocean Eng. 2017, 137, 276–286. [Google Scholar] [CrossRef]
  116. Seto, M.L.; Bashir, A.Z. Fault tolerance considerations for long endurance AUVs. Proc. Annu. Reliab. Maintainab. Symp. 2017. [Google Scholar] [CrossRef]
  117. Azad, S.P. Cross-Layer Dependability Management in Network on Chip Based System on Chip. Ph.D. Thesis, Tallinn Technical University, Tallinn, Estonia, 13 March 2018. [Google Scholar]
  118. Sahu, B.; Sahu, P.; Dash, P. Fault tolerant dynamic multi-hop clustering in under water sensor network. In Proceedings of the 2018 International Conference on Information Technology (ICIT), Bhubaneswar, India, 19–21 December 2018; pp. 101–105. [Google Scholar] [CrossRef]
  119. Dala, A.; Adetomi, A.; Enemali, G.; Arslan, T. RR4DSN: Reconfigurable Receiver for Deepwater Sensor Nodes. In Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), Edinburgh, UK, 6–9 August 2018; pp. 280–284. [Google Scholar] [CrossRef]
  120. Tang, Y.; Chen, Y.; Yu, W.; Xu, X. Emergency communication schemes for muliti-hop underwater acoustic cooperartive networks. In Proceedings of the 2018 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Qingdao, China, 14–16 September 2018. [Google Scholar] [CrossRef]
  121. Yanmaz, E.; Yahyanejad, S.; Rinner, B.; Hellwagner, H.; Bettstetter, C. Drone networks: Communications, coordination, and sensing. Ad Hoc Netw. 2018, 68, 1–15. [Google Scholar] [CrossRef]
  122. Han, Y.; Zhang, J.; Sun, D. Error control and adjustment method for underwater wireless sensor network localization. Appl. Acoust. 2018, 130, 293–299. [Google Scholar] [CrossRef]
  123. Shah, M.; Wadud, Z.; Sher, A.; Ashraf, M.; Khan, Z.A.; Javaid, N. Position adjustment-based location error-resilient geo-opportunistic routing for void hole avoidance in underwater sensor networks. Concurr. Comput. 2018, 1–18. [Google Scholar] [CrossRef]
  124. Caporuscio, M.; Flammini, F.; Khakpour, N.; Singh, P.; Thornadtsson, J. Smart-troubleshooting connected devices: Concept, challenges and opportunities. Futur. Gener. Comput. Syst. 2020, 111, 681–697. [Google Scholar] [CrossRef]
  125. Desai, N.; Punnekkat, S. Enhancing fault detection in time sensitive networks using machine learning. In Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), Bengaluru, India, 7–11 January 2020; pp. 714–719. [Google Scholar] [CrossRef]
  126. Jin, Z.; Zhao, Q.; Luo, Y. Routing Void Prediction and Repairing in AUV-Assisted Underwater Acoustic Sensor Networks. IEEE Access 2020, 8, 54200–54212. [Google Scholar] [CrossRef]
  127. Prasanth, A. Certain Investigations on Energy-Efficient Fault Detection and Recovery Management in Underwater Wireless Sensor Networks. J. Circuits Syst. Comput. 2020. [Google Scholar] [CrossRef]
  128. Xu, J.; Chen, S.; Kalbarczyk, Z.; Iyer, R.K. An experimental study of security vulnerabilities caused by errors. Proc. Int. Conf. Dependable Syst. Netw. 2001, 421–430. [Google Scholar] [CrossRef]
  129. Safara, F.; Souri, A.; Baker, T.; Al Ridhawi, I.; Aloqaily, M. PriNergy: A priority-based energy-efficient routing method for IoT systems. J. Supercomput. 2020, 76, 8609–8626. [Google Scholar] [CrossRef]
Figure 1. The number of papers by specific areas.
Figure 1. The number of papers by specific areas.
Sensors 21 03264 g001
Figure 2. The number of terrestrial-related papers by specific areas.
Figure 2. The number of terrestrial-related papers by specific areas.
Sensors 21 03264 g002
Figure 3. The number of marine-related papers by specific areas.
Figure 3. The number of marine-related papers by specific areas.
Sensors 21 03264 g003
Figure 4. A radar chart of the analyzed papers addressing the main specific areas.
Figure 4. A radar chart of the analyzed papers addressing the main specific areas.
Sensors 21 03264 g004
Figure 5. Environmental and engineering challenges in USNs.
Figure 5. Environmental and engineering challenges in USNs.
Sensors 21 03264 g005
Figure 6. Taxonomy of Fault Tolerance tasks in USNs.
Figure 6. Taxonomy of Fault Tolerance tasks in USNs.
Sensors 21 03264 g006
Table 1. Search engine result count of respective keyword combinations.
Table 1. Search engine result count of respective keyword combinations.
Search KeywordsG. ScholarIEEEXS.Direct
“underwater”, “internet of things”, “resilient”, “fault tolerant”, “fault management”, “cross-layer”400
“underwater”, “internet of things”, “resilient”, “fault tolerant”, “fault management”801
“underwater ”, “sensor network”, “resilient”, “fault tolerant”, “fault management”3604
“sensor network”, “resilient”, “fault tolerant”, “fault management”, “cross-layer”4914
“underwater ”, “sensor network”, “fault management”162010
“sensor network”, “resilient”, “fault tolerant”, “fault management”223916
Table 2. Categorized papers.
Table 2. Categorized papers.
Pub.1st Auth.YearExtra-Functional AspectMarineFault Tolerance (FT) Tasks and
SecureEnergy-EfficientScalableCross-Layer Other Research Areas
[1]Domingo2012----+sensor network
[2]Domingo2012---++sensor network, FT detect/recover, wireless
[3]Zenia2016-++-+sensor network, routing protocol, survey, FT detect, FT recover
[4]Jiang2018----+survey, wireless, sensor network
[5]Kao2017----+FT design, survey, wireless
[6]Veleski2017---+-survey, FT detect, FT recover
[7]Paradis2007---+-FT detect/recover, survey, wireless
[8]Mitra2016-+++-survey, wireless, FT detect, FT recover,
[9]Atzori2010-----sensor network, survey
[10]Diaz2016--+--survey
[11]Tyagi2013+++--survey, wireless, routing protocol
[12]Singh2012-----routing protocol, survey, wireless
[13]Fadel2015-----survey, sensor network, wireless, FT detect
[14]Moridi2020-----sensor network, wireless, FT detection, FT recovery
[15]More2017-++--sensor network, survey
[16]Amin2019-----FT detect/recover, survey
[18]Domingo2009----+FT detect, wireless
[19]Xu2012-++-+FT detect, FT recover, sensor network
[20]Lal2016+-+-+wireless, sensor network
[21]Das2017--+-+localization, sensor network, FT recover
[22]Mohamed2011--+-+sensor network, FT detect
[23]Kumar2018--+--FT detect/recover
[25]Khan2013--++-FT detect/recover, wireless
[26]Henkel2011---+-FT design/detect/recover
[27]Georgakos2013---+-FT design/detect/recover, vehicle
[28]Lorenz2012-----FT prevent
[29]Sauli2012-----FT prevent
[30]Rehman2016---+-FT prevent/detect/recover
[31]Kaaniche2000-----FT prevent/detect/recover
[33]Carter2010---+-FT design
[34]Sofi2018-+--+sensor network, wireless
[35]Noh2016----+routing protocol, sensor network, wireless
[37]Wu2007-----deployment, localization, sensor network, wireless
[38]Isler2004-----deployment, sensor network, wireless
[39]Dong2020-+--+sensor network, wireless, FT recover
[40]Cheng2008-----deployment, sensor network, wireless
[41]Bhuvana2018-+---sensor network, wireless, FT detect
[42]Goyal2017----+wireless, sensor network
[43]Goyal2018----+wireless, sensor network, FT detection, FT recovery
[45]Campagnaro2016----+framework, wireless, sensor network
[46]Petrioli2015----+framework wireless, sensor network
[47]Petroccia2013----+framework, wireless, sensor network
[48]Ateniese2015+---+framework, wireless, sensor network
[49]Liu2013++-+-wireless, sensor network
[51]Gunawi2011--+--FT design
[53]Napolitano1995-----sensor network, FT detect, FT recover
[54]Neti1992-----FT design
[55]Benincasa2014-----sensor network
[56]Compton2012-----sensor network, deployment
[57]DAniello2016---+-sensor network, FT detect, FT recover
[58]Alansary2019----+vehicle, FT recovery
[59]Cristea2011+-+--FT detect, FT recover
[60]Salera2007---+-sensor network, FT detect, FT recover
[61]Vihman2020+-+++sensor network, FT detect
[62]Han2015+---+wireless, sensor network
[63]Chae-Won2016+---+sensor network, wireless
[64]Han2020+-+-+sensor network, wireless
[65]Dong2013-+--+sensor network, wireless
[66]Zhou2016-+--+, wireless, sensor network, routing protocol
[67]Wang2016-+--+, sensor network, wireless
[68]Huang2011-+--+wireless, sensor network, routing protocol
[69]Rani2017-+--+sensor network, routing protocol
[70]DeHon2010-+++-FT detect, FT recover
[71]Darra2017+----survey, sensor network, wireless
[72]Mitra2010---+-FT detect, FT recover
[73]Henkel2014---+-FT detect, FT recover
[74]Bulusu2000-++--localization, sensor network
[75]Nassif2001-----FT prevent
[76]Zhao2002-++--, wireless, sensor network
[77]de Lemos2004-----FT design, sensor network
[78]Bokareva2005---+-cross-layer, FT design, FT recover, framework, sensor network
[79]Heidemann2006----+sensor network, wireless
[80]Mengjie2007--++-wireless, sensor network, FT detect, FT recover
[81]Lee2008-----wireless, FT detect, sensor network
[82]Wang2008----+sensor network
[83]Khan2009-++--wireless, FT design, sensor network
[84]Teymorian2009----+localization, sensor network
[85]Yu2009----+localization, wireless, sensor network
[86]Kim2011---+-vehicle, FT detect, FT recover,
[87]Tanasa2011-----vehicle, FT detect
[88]Roman2011+----sensor network,
[89]Paul2011+----sensor network
[90]Xu2011----+wireless, sensor network, routing protocol, FT recovery
[91]Thomas2013-----FT detect
[92]Gubbi2013+-+--wireless, sensor network,
[93]Guo2013--+-+localization, sensor network
[94]Amory2013+-+-+vehicle
[95]Oteafy2014---+-wireless, sensor network
[96]Rault2014--+--wireless, sensor network
[97]Kuila2014-+---wireless, sensor network, routing protocol
[98]Zhu2014----+sensor network
[99]Rossi2015-+--+sensor network, wireless
[100]Bauer2015-----FT masking
[101]Benson2015---+-sensor network
[102]Zhehao2015----+localization, wireless, sensor network
[103]Han2015----+localization, wireless, sensor network, deployment
[104]Valerio2015----+wireless, sensor network, routing protocol
[105]Rehman2016---+-FT detect, FT recover,
[106]Sahoo2016---+-FT design, FT detect
[107]Li2016----+localization, vehicle
[108]Liu2016----+sensor network, wireless, localization
[109]Khan2016----+vehicle, sensor network
[110]Koraz2017---+-FT detect
[111]Suvarna2017-+--+wireless, sensor network, routing protocol
[112]Cario2017-+--+sensor network, wireless
[113]Dong2017-+--+, localization, wireless, sensor network
[114]Kao2017----+survey, sensor network, wireless
[115]Mortazavi2017----+localization, wireless, sensor network
[116]Seto2017----+vehicle
[117]Azad2018---+-FT detect, FT recovery
[118]Sahu2018----+clustering, sensor network, routing protocol, FT detection, FT recovery
[119]Dala2018----+sensor network, FT detection, FT recovery
[120]Tang2018----+wireless, sensor network, fault, FT detection, FT recovery
[121]Yanmaz2018--+--vehicle, sensor network, wireless
[122]Han2018----+localization, wireless, sensor network
[123]Shah2018--+-+localization, sensor network
[124]Caporuscio2020-----sensor network, FT detection, FT recovery
[125]Desai2020-----sensor network, FT detection
[126]Jin2020----+sensor network, wireless, routing protocol, vehicle, FT detection; FT recovery
[127]Prasanth2020-+--+wireless, sensor network, fault, ft recovery, ft detection
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Vihman, L.; Kruusmaa, M.; Raik, J. Systematic Review of Fault Tolerant Techniques in Underwater Sensor Networks. Sensors 2021, 21, 3264. https://doi.org/10.3390/s21093264

AMA Style

Vihman L, Kruusmaa M, Raik J. Systematic Review of Fault Tolerant Techniques in Underwater Sensor Networks. Sensors. 2021; 21(9):3264. https://doi.org/10.3390/s21093264

Chicago/Turabian Style

Vihman, Lauri, Maarja Kruusmaa, and Jaan Raik. 2021. "Systematic Review of Fault Tolerant Techniques in Underwater Sensor Networks" Sensors 21, no. 9: 3264. https://doi.org/10.3390/s21093264

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop