Evaluation of a Robust Fault-Tolerant Mechanism for Resilient IoT Infrastructures

  • José Manuel Lozano Domínguez
  • Tomás de J. Mateo Sanguino
  • Manuel J. Redondo González
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 263)


Gateways in IoT infrastructures generally represent a single point of failure, thus resulting in a total loss of network operability. This paper presents the design, implementation and experimentation of a fault-tolerant protocol for a critical infrastructure applied to the field of road safety. The proposed mechanism establishes a node hierarchy to prevent loss of communication against AP failures in WLANs based on the IEEE 802.11n standard. This mechanism automates the management of the node roles by means of an election and promotion process between stations in search of designated and backup APs. The convergence times of the protocol obtained suitable values of 3.34 s for the formation of a BSS from zero, as well as 15.20 s and 18.84 s for the failover conditions of the backup and designated APs with a minimum traffic load of 42.76% over the WSN traffic.


Failover mechanism Fault tolerance IoT Resilience WSN 


  1. 1.
    Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)CrossRefGoogle Scholar
  2. 2.
    Ortiz, K.J.P., et al.: IoT: Electrocardiogram (ECG) monitoring system. Indonesian J. Electr. Eng. Comput. Sci. 10(2), 480–489 (2018)Google Scholar
  3. 3.
    Alonso, L., Barbarán, J., Chen, J., Díaz, M., Llopis, L., Rubio, B.: Middleware and communication technologies for structural health monitoring of critical infrastructures: a survey. Comput. Standars Interfaces 56, 83–100 (2018)CrossRefGoogle Scholar
  4. 4.
    Samboni, F., et al.: MEC IoT: monitorización de estructuras civiles en el contexto IoT. In: Colombian Conference on Communications and Computing, pp. 1–6, Cartagena (2017)Google Scholar
  5. 5.
    Helen, A., Fathila, F., Rijwana, R., Kalaiselvi, V.K.G. A smart watch for women security based on IoT concept ‘watch me’. In: International Conference on Computing and Communications Technologies, pp. 190–194, Chennai (2017)Google Scholar
  6. 6.
    Ray, P.P., Mukherjee, M., Shu, L.: Internet of things for disaster management: state-of-art and prospects. IEEE Access 5, 18818–18835 (2017)CrossRefGoogle Scholar
  7. 7.
    Gautam, B.P., Wasaki, K., Sharma, N. A Novel Approach of Fault Management and Restoration of Network Services in IoT Cluster to Ensure Disaster Readiness. In: Networking and Network Applications, pp. 423–428, Hakodate (2016)Google Scholar
  8. 8.
    Pan, W.M.: Dynamic update mechanism in wireless sensor Networks. Appl. Mech. Mater. 526, 267–272 (2014)CrossRefGoogle Scholar
  9. 9.
    Din, S., et al.: Energy efficient topology management scheme based on clustering technique for software define wireless sensor network. In: Peer-to-Peer. Springer US (2017).
  10. 10.
    Xian, T.: A modified energy efficient backup hierarchical clustering algorithm for WSN. In: Information Security and Control, pp. 45–48, Taiwan (2012)Google Scholar
  11. 11.
    Asim, M., Mokhtar, H., Merabti, M.: A Cellular approach to fault detection and recovery in wireless sensor networks. In: Sensor Technologies and Applications, pp. 352–357, Glyfada, Athens (2009)Google Scholar
  12. 12.
    Yektaparast, A., Nabavi, F.H., Sarmast, A.: An improvement on LEACH protocol (Cell-LEACH). In: International Conference on Advanced Communication Technology, pp. 992–996, Pyeong Chang (2012)Google Scholar
  13. 13.
    Goratti, L., Kato, S.N.A.C.R.P., et al.: A connectivity protocol for start topology wireless sensor network. IEEE Wirel. Commun. Lett. 5, 12–123 (2016)CrossRefGoogle Scholar
  14. 14.
    Induja, K., Deva Kupra, A.J.: A connectivity protocol for star topology using wireless sensor network. In: Nextgen Electronic Technologies: Silicon to Software, pp. 50–56, Chennai (2017)Google Scholar
  15. 15.
    Bhoi, S.K., Panda, S.K., Khilar, P.M.: A network survivability approach to resist access point failure in IEEE 802.11 WLAN. In: Sathiakumar, S., Awasthi, L., Masillamani, M., Sridhar, S. (eds.) Proceedings of International Conference on Internet Computing and Information Communications. Advances in Intelligent Systems and Computing, vol. 216. Springer, New Delhi (2014). Scholar
  16. 16.
    Sfeir, E., Pasquahi, S., Schwabe, T., Iselt, A.: Performance evaluation of ethernet resilience mechanisms. In: Workshop on High Performance Switching and Routing, pp. 356–360, Hong Kong, China (2005)Google Scholar
  17. 17.
    Lozano Domínguez, J.M., Mateo Sanguino, T.J.: Design, modelling and implementation of a fuzzy controller for an intelligent road signaling system. Complexity, 2018, Article ID 1849527 (2018)Google Scholar
  18. 18.
    IEEE Computer Society: IEEE Standard for Information Technology–Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks–Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Technical Report (2016)Google Scholar
  19. 19.
    Adnan, A.H., et al.: A comparative study of WLAN security protocols: WPA, WPA2. In: Advances in Electrical Engineering, pp. 165–169, Dhaka (2015)Google Scholar
  20. 20.
    Masirap, M., et al: Evaluation of reliable UDP-based transport protocols for internet of things (IoT). In: IEEE Symposium Computer Applications & Industrial Electronics, pp. 200–205, Penang (2016)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.University of Huelva, Dpto. Ing. Electrónica, de Sistemas Informáticos y AutomáticaPalos de la FronteraSpain

Personalised recommendations