 Research
 Open Access
A localized fault detection algorithm for mobility management in the strongly tdiagnosable wireless ad hoc network under the comparison model
 TzuLiang Kung^{1, 4},
 YuanHsiang Teng^{2},
 ChengKuan Lin^{3} and
 HsingChung Chen^{1, 4}Email authorView ORCID ID profile
https://doi.org/10.1186/s1363801607141
© The Author(s) 2016
 Received: 1 April 2016
 Accepted: 29 August 2016
 Published: 13 September 2016
Abstract
Among the many kinds of networking technologies, the wireless ad hoc network is an important one for creating highperformance ubiquitous computing systems. The availability of a wireless ad hoc network (WANET) depends highly upon the level of node reliability. Systemlevel fault diagnosis has long been a subject for the purpose of maintaining system reliability. This paper addresses the comparisonbased approach to fault detection, and accordingly, we developed a localized algorithm for detecting faulty nodes in strongly onestep tdiagnosable WANETs. The contributions of this paper are highlighted as follows: (i) A localized fault detection algorithm is proposed for strongly onestep tdiagnosable WANETs under the comparison model, (ii) the proposed algorithm is formally proved, and it incurs only linear time complexity, which is relatively efficient compared to some others in literature, and (iii) some examples are presented for clarifying how to accomplish the comparisonbased fault detection process.
Keywords
 Reliability
 Mobility management
 Fault diagnosis
 Strongly onestep tdiagnosable
 Comparison model
 Ad hoc network
1 Introduction
A modern network system contains a large number of computing and storage units, organized in a static or dynamic underlying interconnection topology. Among the many kinds of networking technologies, the wireless ad hoc network (WANET) is a key to highperformance ubiquitous computing systems [2, 3, 9, 22, 26, 28, 31]. A WANET is a type of wireless network in which some nodes are selforganized in a wireless local area network. There are three important properties related to WANETs [7]. First, the WANET is deployed on any topology and managed independently of any preexisting infrastructure. Second, the nodes with mobility property are the most important components of WANET. According to Grossglauser and Tse [11], mobility can increase the capacity of a WANET. Third, it has the scalability property, such that it could be used in a large deployment. Due to the undecided number of nodes even during a short duration, the main difficulties are mobility property and reasons for node failure. The reasons for node failures are caused by some nodes with low battery situations, selfish behavior, or suffering from being compromised as well as attacked events, etc. Therefore, the WANET for any topology is needed to possess strong requirements, which must be able to exploit the highlevel reliability linking with scalability and fault tolerance without compromising. In addition, many related issues have been addressed. For example, Kumar et al. [16] and Subramaniyan et al. [27] studied selfish node detection in a MANET; Renugadevi and Mala [24] proposed an improved group key agreement for MANETs. Hence, the maintaining connectivity in the face of node failures or socalled unit failures is a main concern in this paper.
The availability of a WANET depends greatly upon the node reliability, and the systemlevel fault detection approaches to achieve high system availability. Preparata, Metze, and Chien [23] formalized the notion of fault diagnosis and studied under what condition can a system be onestep tfault diagnosable. Then, they further proposed a faulttolerance metric, called the onestep diagnosability, to evaluate the degree of a system’s faulttolerance capability. According to their formal definition [23], a WANET of n nodes is onestep tfault diagnosable if all faulty nodes within the WANET can be identified without replacement provided the number of faulty nodes present does not exceed t. Among the various models of fault diagnosis [4, 21, 23], Maeng and Malek [21] proposed one classic approach in a comparisonbased strategy, as known as the comparison model. Their approach makes an assumption that any node w is capable of playing the role of a “comparator” in differentiating between responses from two of its neighbors, u and v. The comparison result is 0 if w finds no difference between the returned responses from u,v; otherwise, the comparison result is 1. However, w may be either faulty or normal so that the set of comparison results is not absolutely reliable. Thus, both theoretical and algorithmic issues related to comparisonbased fault diagnosis/detection have received the attention of many researchers [6, 8, 12–15, 18, 19, 29, 32].
The onestep diagnosability [23] is a reasonable metric for evaluating a network’s faulttolerance capability, but it cannot exceed the network’s minimum degree. However, for a number of wellknown instances of network topologies with onestep diagnosability being τ, their onestep diagnosability cannot be further increased only when some node happens to have exactly τ faulty neighbors and no normal neighbor. Motivated by such an observation, Lai et al. [20] first proposed the concept of strongly tdiagnosable systems/networks, in which each of any set of no more than t+1 faulty nodes can be correctly distinguished if every node has at least one normal neighbor. The aim of the localized fault detection is to identify the status of any given node in a WANET, which is classified as either “normal” or “faulty.” In this paper, we develop a localized fault detection algorithm under the comparison model for ease of handling scalability and mobility management in a strongly tdiagnosable WANET.
The remainder of this paper is structured as follows: We introduce in advance useful graphtheory terminology about formalizing the process of comparisonbased fault diagnosis in Section 2. The localized fault identification algorithm and its mathematical proof are detailed in Section 3. Examples and applications are presented in Section 4. Our concluding remarks are drawn in Section 5.
2 Preliminaries
A WANET is composed of mobile nodes that can communicate directly and bidirectionally with the others via wireless communication if they are in the allowable communication range [3]. Every node is also responsible for forwarding data packets from the other nodes. Therefore, any two individual nodes that are outside their allowable communication range can still communicate indirectly with each other if at least one path, an ordered sequence of communication links, connects them. On this background, a simple, loopless, and undirected graph is an adequate model of a WANET’s network topology. To formalize the process of comparisonbased fault diagnosis in a WANET, we have to define some graphtheory notations in advance. The standard terminology of graph theory is also referred to in [5].
An undirected graph G is composed of a vertex set V(G), which stands for mobile nodes in a WANET, coupled with an edge set E(G), which symbolizes communication links between nodes in a WANET. Here, we use {x,y} to denote an edge linking adjacent vertices x and y. Two adjacent vertices are neighbors of each other, denoted by N h d _{ G }(v) to the set of all neighbors of a vertex v. Then, the degree of v is equal to N h d _{ G }(v), which is denoted by d e g _{ G }(v). In this paper, we make the following assumption for a given WANET: every node has the same communication range; that is, each node communicates with others within a unitary circle. Under this assumption, the network topology of a WANET is further simplified as a unit disk graph, which corresponds to a collection of unit disks in 2D or 3D space  circle/spheres of radius 1. Each vertex in a unit disk graph is associated with the center of an individual unit disk. In a unit disk graph, an edge links two vertices v _{1} and v _{2} if and only if the two disks associated with v _{1} and v _{2} cover both v _{1} and v _{2}.
2.1 The comparisonbased fault detection
 1.
If the actual status of the comparator w is faulty, then w may produce an unpredictable comparison result. For example, γ({u,v}_{ w }) may be 0 or 1 at random, and it is unreliable.
 2.
If the actual status of the comparator w is normal, then w produces a reliable comparison result: γ({u,v}_{ w })=0 indicates that both u and v are normal; otherwise, u or v is a faulty node.
Validation rules of the fault detection under the comparison model [21]
Status of  Status of  Status of  Comparison result γ({u,v}_{ w }) 

node w  node u  node v  
Normal  Normal  Normal  0 
Normal  Normal  Faulty  1 
Normal  Faulty  Normal  1 
Normal  Faulty  Faulty  1 
Faulty  Normal  Normal  Unpredictable, 0/1 
Faulty  Normal  Faulty  Unpredictable, 0/1 
Faulty  Faulty  Normal  Unpredictable, 0/1 
Faulty  Faulty  Faulty  Unpredictable, 0/1 
The syndrome set is a set of all comparison results collected from a network. However, because a faulty node produces unpredictable comparison results, different syndrome sets may be consistent with an identical fault set F. Let γ[X] be the set of syndrome sets that are consistent with fault set X. Any two different fault sets X _{1} and X _{2} are called distinguishable (respectively, indistinguishable) if the intersection of γ[X _{1}] and γ[X _{2}] is empty (respectively, nonempty). Sengupta and Dahbura [25] proved topological conditions for characterizing any onestep tfault diagnosable graph G: Every two fault sets X _{1} and X _{2} in G have to be distinguishable if both X _{1} and X _{2} contain at most t vertices. Furthermore, the rules for telling whether or not two fault sets are distinguishable are summarized in the following lemma:
2.2 Strongly onestep tdiagnosable systems
Lai et al. [20] defined the concept of strongly onestep tdiagnosable network systems for investigating potential limitations in the onestep diagnosability. The standard definition of strongly onestep tdiagnosable graphs is presented in Definition 1.
Definition 1
 1.
X _{1} and X _{2} are distinguishable;
 2.
X _{1} and X _{2} are indistinguishable, but there exists an individual vertex x in G such that X _{1}∩X _{2} covers N h d _{ G }(x).
Definition 1 implies that two arbitrary fault sets X _{1} and X _{2}, both of which contain at most t+1 elements, are indistinguishable in a strongly onestep tdiagnosable WANET only when X _{1} and X _{2} happen to cover all neighbors of some individual node. This special case incurs one potential limitation of the onestep diagnosability. In the remainder of this paper, a set F is a restrictive fault set if F∩N h d _{ G }(v)≠N h d _{ G }(v) for each v∈V(G). Definition 2 is an extension to the original notion of onestep tfault diagnosable systems for meeting the nature of restrictive fault sets.
Definition 2
A graph G is restrictively onestep tdiagnosable under the comparison model if every two different restrictive fault sets F _{1} and F _{2} in G, both of which contain at most t elements, are distinguishable.
3 The localized fault detection algorithm
Given a WANET with underlying topology G and any one of its node o, the localized fault identification aims to determine the actual status of o. Kung and Chen [17] first formalized the concept behind the localized fault identification under the PMC diagnostic model. The following definition extends it to the comparison model.
Definition 3
For any positive integer t, a node o is onestep tidentifiable under the comparison model if every two distinct fault sets F _{1} and F _{2} in G, with F _{1}≤t, F _{2}≤t, and o∈F _{1}△F _{2}, are distinguishable; furthermore, o is restrictively onestep tidentifiable under the comparison model if for every two different restrictive fault sets F _{1} and F _{2} in G, with F _{1}≤t, F _{2}≤t, and o∈F _{1}△F _{2}, are distinguishable.
Theorem 1
Under the comparison model, a graph G is onestep tfault diagnosable if and only if every vertex of G is onestep tidentifiable.
Proof
Suppose that G is onestep tfault diagnosable under the comparison model. If there is some vertex x not onestep tidentifiable in G, then G contains a pair of indistinguishable fault sets F _{1},F _{2}, both of which have at most t elements so that x is in F _{1}△F _{2} according to Definition 3. Obviously, G is not onestep tfault diagnosable, which is an trivial contradiction against the assumption.
On the other hand, suppose that all vertices of G are onestep tidentifiable under the comparison model. If G is not onestep tfault diagnosable, then G contains an indistinguishable pair F _{1},F _{2} of two fault sets that satisfy F _{1}≤t and F _{2}≤t. Since F _{1}≠F _{2}, the set F _{1}△F _{2} is not empty; i.e., it has at least one vertex, say y. Therefore, it follows from Definition 3 that y is not onestep tidentifiable under the comparison model, which is a contradiction against the assumption.
By the argument of contradiction, the proof is completed. □
The next theorem is an extension to the original concept behind Theorem 1 for meeting the condition on restrictive fault sets.
Theorem 2
Under the comparison model, a graph G is restrictively onestep tdiagnosable if and only if all vertices in G are restrictively onestep tidentifiable.
Proof
Suppose that G is restrictively onestep tdiagnosable under the comparison model. If there is some vertex x in G not restrictively onestep tidentifiable, then G contains a pair of indistinguishable fault sets F _{1},F _{2}, both of which have at most t elements so that x is in F _{1}△F _{2}, in accordance with Definition 3. Hence, it follows from Definition 2 that G is not restrictively onestep tdiagnosable, which is an obvious contradiction against the assumption.
On the other hand, suppose that all vertices of G are restrictively onestep tidentifiable. If G is not restrictively onestep tdiagnosable, then G contains an indistinguishable pair F _{1},F _{2} of two restrictive fault sets that satisfy F _{1}≤t and F _{2}≤t in accordance with Definition 2. Since F _{1}≠F _{2}, the set F _{1}△F _{2} is not empty; i.e., it has at least one vertex, say v. Consequently, it follows from Definition 3 that v cannot be restrictively onestep tidentifiable, which is a straightforward contradiction against the assumption.
By the argument of contradiction, the proof of this theorem is completed. □

\(V\left (\mathbb {ES}^{(h)}_{G}(o)\right) = \{o\} \cup \bigcup ^{h}_{i=1}\bigcup ^{t}_{j=1}\{o_{i,j}\}\).

\(E\left (\mathbb {ES}^{(h)}_{G}(o)\right) = \bigcup ^{t}_{j=1} \left \{ \{o, o_{1,j}\} \right \} \cup \left \{ \{o_{i,j},o_{i+1,j}\} \mid h1 \geq i \geq 1 \right \}\) if h≥2, and

\(E\left (\mathbb {ES}^{(h)}_{G}(o)\right) = \bigcup ^{t}_{j=1} \left \{ \{o, o_{1,j}\} \right \}\) if h=1.
Theorem 3
[ 8 ] Let \(\mathbb {ES}^{(4)}_{G}(o)\) denote a 4extending star. The algorithm \(\mathbf {FD}(\mathbb {ES}^{(4)}_{G}(o))\) (Algorithm 1) returns a correct status of the root o if \(\mathbb {ES}^{(4)}_{G}(o)\) contains at most d e g _{ G }(o) faulty vertices.
Unfortunately, Algorithm 1 is likely to make an incorrect decision if the number of faults in \(\phantom {\dot {i}\!}\mathbb {ES}^{(4)}_{G}(o)\) is greater than d e g _{ G }(o), as shown in the following examples.
Example 1
Example 2

\(V\left (\mathbb {BS}_{G}(o)\right)=\{o\}\cup \bigcup ^{t}_{k=1}\{o^{k},o^{k}_{1,1},o^{k}_{1,2},o^{k}_{2,1},o^{k}_{2,2},o^{k}_{3,1},o^{k}_{3,2}\}\).

\(E\left (\mathbb {BS}_{G}(o)\right) = \bigcup ^{t}_{k=1} \left \{ \{o, o^{k}\} \right \} \cup \left \{ \{o^{k}, o^{k}_{1,1}\},\{o^{k}, o^{k}_{1,2}\}\right \} \cup \left \{ \{o^{k}_{i,j},o^{k}_{i+1,j}\} \mid 1 \leq i,j \leq 2 \right \}\).
See Fig. 2 c for illustration.
To prove the next theorem, we need an additional term  vertex cover, which can be referred to in [5].
Theorem 4
Suppose that d e g _{ G }(o)≥2. Under the comparison model, o is restrictively onestep (d e g _{ G }(o)+1)identifiable if there exists a branching star architecture with root o in G.
Proof
We assume that G contains a branching star \(\mathbb {BS}_{G}(o)\) with root o. Throughout this proof, F _{1} and F _{2} are two different restrictive fault sets satisfying the following conditions: (1) both F _{1} and F _{2} has at most t+1 elements, and (2) o is in F _{1}△F _{2}. By symmetry, we assume that o is in F _{1}. For the sake of convenience, let F denote the intersection of F _{1} and F _{2}, and p denote the number of elements in F. Obviously, the value of p ranges from 0 to t. Both F _{1} and F _{2} are restrictive fault sets, so is their intersection F. Because o is not in F, we derive the following inequality: r=F∩N h d _{ G }(o)≤ min{p,t−1}. Without loss of generality, we can further make an assumption that o ^{ r+1},…,o ^{ t } are normal; that is, {o ^{ i }∣r+1≤i≤t}∩F=∅. Then, we consider the possibilities of r.
Case I: r=t−1. That is, we have {o ^{1},…,o ^{ t−1}}⊆F. Because both F _{1} and F _{2} are restrictive fault sets, we obtain o ^{ t }∉F _{1}∪F _{2}.
Subcase I.2: Both \(o^{t}_{1,1}\) and \(o^{t}_{1,2}\) are in F _{1}∪F _{2}. We take into accounts the following three conditions.
Condition I.2.A: \(o^{t}_{1,1}\) or \(o^{t}_{1,2}\) is in F _{1}∖F _{2}. See Fig. 5 b, in which we assume \(o^{t}_{1,1} \in F_{1} \setminus F_{2}\). Consequently, it follows from Lemma 1 that F _{1} and F _{2} form a pair of distinguishable restrictive fault sets.
Condition I.2.B: Both \(o^{t}_{1,1}\) and \(o^{t}_{1,2}\) are in F _{2}∖F _{1}. See Fig. 5 c. By Lemma 1, F _{1} and F _{2} remain to form a pair of distinguishable restrictive fault sets.
Condition I.2.C: One of \(o^{t}_{1,1}\) and \(o^{t}_{1,2}\) is in F _{2}∖F _{1}, and the other is in F _{1}∩F _{2}. Without loss of generality, we assume \(o^{t}_{1,1} \in F_{2} \setminus F_{1}\). Then, \(o^{t}_{2,1}\) and \(o^{t}_{3,1}\) are not in F _{1}∪F _{2}. See Fig. 5 d. Again, it follows from Lemma 1 that F _{1} and F _{2} constitute a pair of distinguishable restrictive fault sets.
Case II: r≤t−2. Referring to the definition given in [5], a component in G is the maximal connected subgraph of G. Let C _{ o } be the component of \(\mathbb {BS}_{G}(o)  F\) that o belongs to. Thus, C _{ o } contains \(\{o\} \cup \bigcup ^{t}_{i=r+1}\{ o^{i} \} \cup \big \{ o^{i}_{1,1},o^{i}_{2,1},o^{i}_{3,1},o^{i}_{1,2},o^{i}_{2,2},o^{i}_{3,2} \big \} \setminus F\). It is straightforward to see that the cardinality of any vertex cover S of C _{ o } is at least [2(t−r)−(p−r)]+(t−r)+1=3t−2r−p+1 if S contains o. Comparing this number with the value of F _{1}△F _{2}≤2(t−p+1), we have (3t−2r−p+1)−(2t−2p+2)=t+p−2r−1≥(p−r)+1≥1. Hence, we get a fact that S has two nodes x,y that are adjacent and reside outside F _{1}△F _{2}. So, both x and y are not in F because C _{ o } is a component of \(\mathbb {BS}_{G}(o) \setminus F\)). Accordingly, there exists a path in C _{ o } connecting edge {x,y} and node o through F _{1} or F _{2} (see Fig. 5 e, f). Again, it follows from Lemma 1 that F _{1} and F _{2} form a pair of distinguishable restrictive fault sets.
In summary, o is restrictively onestep (t+1)identifiable by Definition 3, and the proof is completed. □
On the basis of branching star architectures, we develop a localized fault diagnosis algorithm C F D (Algorithm 2) that can detect restrictive faults under the comparison model.
Theorem 5
Let \(\mathbb {BS}_{G}(o)\) denote a branching star with root o. Suppose that o is linked to a normal neighbor. Then, the proposed method \(\mathbf {CFD}(\mathbb {BS}_{G}(o))\) (Algorithm 2) returns a correct status of the root o if \(\mathbb {BS}_{G}(o)\) contains at most d e g _{ G }(o)+1 faulty vertices.
Proof
The proof proceeds using arguments of contradiction. Let t=d e g _{ G }(o). Suppose that \(\mathbb {BS}_{G}(o)\) contains at most t+1 faulty vertices and F denote the set of all faulty vertices.
If \(\gamma \big (\{ o^{k}_{1,p}, o^{k}_{3,p} \}_{o^{k}_{2,p}} \big) = 1\) for some k∈{1,2,…,t} and p∈{1,2}, then we assume, without loss of generality, \(\gamma (\{o^{1}_{1,2},o^{1}_{3,2}\}_{o^{1}_{2,2}})=1\). Then, at least one of \(o^{1}_{1,2}\), \(o^{1}_{2,2}\), and \(o^{1}_{3,2}\) is faulty. Thus, \(\mathbb {BS}_{G}(o)  \bigcup ^{t}_{i=1} \{o^{i}_{1,2},o^{i}_{2,2},o^{i}_{3,2}\}\), which is isomorphic to \(\mathbb {ES}^{(4)}_{G}(o)\), contains at most t faulty nodes. By Theorem 3, \(\mathbf {FD}(\mathbb {ES}^{(4)}_{G}(o))\) is able to identify the true status of o. Otherwise, we have \(\gamma \big (\{ o^{k}_{1,p}, o^{k}_{3,p} \}_{o^{k}_{2,p}} \big) = 0\) for all k∈{1,2,…,t} and p∈{1,2}.
For the sake of convenience, let n[∗][1]=t−n[0][0]−n[1][0].
Case 1: n[0][0]−n[1][0]≥0.
which is a contradiction against the assumption of F≤t+1. As a result, the status of o is normal.
Subcase 1.2: n[0][0]=n[1][0]=0. That is, it means \(\gamma (\{o^{k},o^{k}_{2,1}\}_{o^{k}_{1,1}})=\gamma (\{o^{k},o^{k}_{2,2}\}_{o^{k}_{1,2}})=1\) for every 1≤k≤t. We further make an assumption that the status of o ^{ t } is normal. Obviously, the number of faulty nodes in \(\bigcup ^{t1}_{k=1}\{o^{k},o^{k}_{1,1},o^{k}_{2,1},o^{k}_{1,2},o^{k}_{2,2}\}\) amounts to at least (t−1). Moreover, \(o^{t}_{1,1}\) or \(o^{t}_{2,1}\) is faulty; \(o^{t}_{1,2}\) or \(o^{t}_{2,2}\) is faulty. Thus, we can deduce that t+1≥F≥(t−1)+2=t+1, and the status of o must be normal.
Case 2: n[0][0]−n[1][0]≤−1.
Subcase 2.1: n[ 0][ 0]−n[ 1][ 0]≤ −2. On the contrary, we assume that o is normal. When \(\big (\gamma (\{o, o^{k}_{1,p}\}_{o^{k}}),\gamma (\{o^{k}, o^{k}_{2,p}\}_{o^{k}_{1,p}}), \gamma (\{o^{k}_{2,p}, o^{k}_{3,p}\}_{o^{k}_{2,p}}) \big) = (1,0,0)\) for some k∈{1,2,…,t} and p∈{1,2}, then both \(o^{k}_{1,p}\) and \(o^{k}_{2,p}\) are faulty. Thus, we get a contradiction as follows: F≥2n[1][0]+n[∗][1]≥(n[0][0]+2)+n[1][0]+n[∗][1]≥t+2.
Subcase 2.2: n[0][0]−n[1][0]=−1 and n[0][0]≥1. If o is normal, then we get a contradiction since F≥4n[1][0]+n[∗][1]=(n[0][0]+1)+3n[1][0]+n[∗][1]=t+1+2n[1][0]≥t+3. Hence, o must be faulty.
Subcase 2.3: n[0][0]=0 and n[1][0]=1. That is, there is exactly one integer k, 1≤k≤t, such that \(\big (\gamma (\{o,o^{k}_{1,1}\}_{o^{k}}), \gamma (\{o^{k},o^{k}_{2,1}\}_{o^{k}_{1,1}}) \big) = (1,0)\) or \(\big (\gamma (\{o,o^{k}_{1,2}\}_{o^{k}}), \gamma (\{o^{k},o^{k}_{2,2}\}_{o^{k}_{1,2}}) \big) = (1,0)\). We make the following assumption: \(\big (\gamma (\{o,o^{k}_{1,1}\}_{o^{k}}), \gamma (\{o^{k},o^{k}_{2,1}\}_{o^{k}_{1,1}}) \big) = (1,0)\). Then, we first claim that o ^{ k } is normal. If not, then o ^{ k }, \(o^{k}_{1,1}\), and \(o^{k}_{2,1}\) are all faulty so that F≥(t−1)+3=t+2, which is a straightforward contradiction violating the assumption of F≤t+1. We further claim that \(\gamma (\{o,o^{k}_{1,2}\}_{o^{k}})=1\). If not, then \(o^{k}_{1,1}\), \(o^{k}_{2,1}\), and \(o^{k}_{2,2}\) are all faulty so that F≥(t−1)+3=t+2. By contradiction, the claim holds. Since \(\gamma (\{o,o^{k}_{1,2}\}_{o^{k}})=1\), o has to be faulty. Suppose, by contradiction, that o is normal. Then \(o^{k}_{1,1}\), \(o^{k}_{2,1}\), \(o^{k}_{1,2}\), and \(o^{k}_{2,2}\) are all faulty and F≥(t−1)+4=t+3, which is an obvious contradiction violating the assumption of F≤t+1.
As a consequence, the algorithm \(\mathbf {CFD}(\mathbb {BS}_{G}(o))\) returns a correct status of o, provided that \(\mathbb {BS}_{G}(o)\) contains at most t+1 faulty vertices, and o is linked to a normal neighbor. □
The time complexity of \(\mathbf {CFD}(\mathbb {BS}_{G}(o))\) is analyzed below. We make an assumption that a comparator takes constant time differentiating responses from any two of its neighbors. Then, the time complexity of \(\mathbf {CFD}(\mathbb {BS}_{G}(o))\) is \(O(V(\mathbb {BS}_{G}(o)))\). Since \(V(\mathbb {BS}_{G}(o))=7deg_{G}(o)+1\), the time taken for determining the status of node o is O(d e g _{ G }(o)). We can apply this algorithm to every node in a WANET one after another. Let Δ denote the maximum degree of a WANET with underlying topology G. In general, the total time for identifying all nodes is O(N Δ), where N is the amount of nodes. In literature, Sengupta and Dahbura [25] first presented a diagnosis algorithm whose time complexity is O(N ^{5}). Later, Yang and Tang [30] addressed a more efficient fault identification under the comparison model and developed an O(N Δ ^{3} δ) algorithm with respect to Nnode networks, where δ is the minimum node degree. Compared with these previous results, our approach contributes a significant improvement.
4 Applications
The proposed algorithm is also capable of identifying faults in some static network structures including two of the most popular ones, hypercubes and stargraph networks. These two networks have been approved for their promising topological properties. To apply the proposed algorithm, it suffices to show that branching star architectures can be embedded into them.
5 Conclusions
 1.
A localized fault detection algorithm, \(\mathbf {CFD}(\mathbb {BS}_{G}(o))\), is proposed for strongly tdiagnosable WANETs under the comparison model.
 2.
The proposed algorithm is formally proved to assure its validity.
 3.
The algorithm \(\mathbf {CFD}(\mathbb {BS}_{G}(o))\) incurs only linear time complexity, which is relatively efficient compared to some others in literature.
 4.
Examples are presented to clarify how \(\mathbf {CFD}(\mathbb {BS}_{G}(o))\) does accomplish the comparisonbased fault detection.
Declarations
Acknowledgements
The authors would like to thank the anonymous referees and the editors for their thorough review. The suggested comments help us improve the present manuscript significantly. In particular, our gratitude also goes to Prof. Michael Burton, Asia University, for his effort into language editing. This work is supported in part by the Ministry of Science and Technology, Taiwan, Republic of China, under Grants MOST 1042221E468002 and MOST 1042221E468003.
Competing interests
The authors declare that they have no competing interests.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Authors’ Affiliations
References
 SB Akers, B Krishnamurthy, A grouptheoretic model for symmetric interconnection networks. IEEE Trans. Comput. 38(4), 555–566 (1989).MathSciNetView ArticleMATHGoogle Scholar
 I Ambika, V Pillai Sadasivam, P Eswaran, An effective queuing architecture for elastic and inelastic traffic with different dropping precedence in MANET. EURASIP J. Wirel. Commun. Netw. 2014:, 155 (2014).View ArticleGoogle Scholar
 M Barbeau, E Kranakis, Principles of ad hoc networking (Wiley, New York, 2007).View ArticleGoogle Scholar
 F Barsi, F Grandoni, P Maestrini, A theory of diagnosability of digital systems. IEEE Trans. Comput. 25(6), 585–593 (1976).MathSciNetView ArticleMATHGoogle Scholar
 G Chartrand, OR Ollermann, Applied and algorithmic graph theory (McGrawHill, New York, 1993).Google Scholar
 CA Chen, SY Hsieh, (t,k)Diagnosis for component composition graphs under the MM* model. IEEE Trans. Comput. 60(12), 1704–1717 (2011).MathSciNetView ArticleGoogle Scholar
 HC Chen, TCABRP: A trustbased cooperation authentication bitmap routing protocol against insider security threats in wireless ad hoc networks. IEEE Syst. J (2015). doi:http://dx.doi.org/10.1109/JSYST.2015.2437285.
 CF Chiang, JJM Tan, Using node diagnosability to determine tdiagnosability under the comparison diagnosis model. IEEE Trans. Comput. 58(1), 251–259 (2009).MathSciNetView ArticleGoogle Scholar
 FT Chien, KG Wu, YW Chan, MK Chang, YS Su, An effective routing protocol with guaranteed route preference for mobile ad hoc networks. Int. J. Distrib. Sens. Netw. 2014(532049), 2014 (2014). doi:http://dx.doi.org/10.1155/2014/532049.
 J Fan, L He, BC Interconnection networks and their properties. Chin. J. Comput. 26(1), 84–90 (2003).MathSciNetGoogle Scholar
 M Grossglauser, DNC Tse, Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. Netw. 10(4), 477–486 (2002).View ArticleGoogle Scholar
 SY Hsieh, YS Chen, Strongly diagnosable product networks under the comparison diagnosis model. IEEE Trans. Comput. 57(6), 721–732 (2008).MathSciNetView ArticleGoogle Scholar
 SY Hsieh, YS Chen, Strongly diagnosable systems under the comparison diagnosis model. IEEE Trans. Comput. 57(12), 1720–1725 (2008).MathSciNetView ArticleGoogle Scholar
 SY Hsieh, CW Lee, Diagnosability of twomatching composition networks under the MM* model. IEEE Trans. Dependable Secure Comput. 8(2), 246–255 (2011).View ArticleGoogle Scholar
 GH Hsu, CF Chiang, LM Shih, LH Hsu, JJM Tan, Conditional diagnosability of hypercubes under the comparison diagnosis model. J. Syst. Archit. 55(2), 140–146 (2009).View ArticleGoogle Scholar
 J Kumar, A Kathirvel, N Kirubakaran, P Sivaraman, M Subramaniam, A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT. EURASIP J. Wirel. Commun. Netw. 2015:, 143 (2015).View ArticleGoogle Scholar
 TL Kung, HC Chen, Toward the fault identification method for diagnosing strongly tdiagnosable systems under the PMC model. Int. J. Commun. Netw. Distrib. Syst. 15(4), 386–399 (2015).View ArticleGoogle Scholar
 TL Kung, HC Chen, LH Hsu, in Proc. 2015 International Congress on Natural Sciences and Engineering (2015 ICNSE), Kyoto, Japan, May 7–9 2015, Higher Education Forum (HEF). A topological condition for recognizing strongly diagnosable systems under the comparison model, (2015), pp. 314–319.Google Scholar
 PL Lai, A systematic algorithm for identifying faults on hypercubelike networks under the comparison model. IEEE Trans. Reliab. 61(2), 452–459 (2012).View ArticleGoogle Scholar
 PL Lai, JJM Tan, CP Chang, LH Hsu, Conditional diagnosability measures for large multiprocessor systems. IEEE Trans. Comput. 54(2), 165–175 (2005).View ArticleGoogle Scholar
 J Maeng, M Malek, in Proc.11th Int. Symp. FaultTolerant Comput. (FTCS’81), Portland, USA, June 2426, 1981, IEEE CS. A comparison connection assignment for selfdiagnosis of multiprocessors systems, (1981), pp. 173–175.Google Scholar
 S Palaniappan, K Chellan, Energyefficient stable routing using QoS monitoring agents in MANET. EURASIP J. Wirel. Commun. Netw. 2015:, 13 (2015).View ArticleGoogle Scholar
 FP Preparata, G Metze, RT Chien, On the connection assignment problem of diagnosis systems. IEEE Trans. Electron. Comput. 16(12), 848–854 (1967).View ArticleMATHGoogle Scholar
 N Renugadevi, C Mala, Improved group key agreement for emergency cognitive radio mobile ad hoc networks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl.6(3), 73–86 (2015).Google Scholar
 A Sengupta, A Dahbura, On selfdiagnosable multiprocessor systems: diagnosis by the comparison approach. IEEE Trans. Comput. 41(11), 1386–1396 (1992).MathSciNetView ArticleGoogle Scholar
 V Sharma, R Kumar, N Rathore, Topological broadcasting using parameter sensitivitybased logical proximity graphs in coordinated groundflying ad hoc networks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 6(3), 54–72 (2015).Google Scholar
 S Subramaniyan, W Johnson, K Subramaniyan, A distributed framework for detecting selfish nodes in MANET using record and trustbased detection (RTBD) technique. EURASIP J. Wirel. Commun. Netw. 2014:, 205 (2014).View ArticleGoogle Scholar
 W Xiong, J Xu, Y Li, N Zhao, X Wan, J Liang, Minimum node degree of kconnected vehicular ad hoc networks in highway scenarios. EURASIP J. Wirel. Commun. Netw. 2016:, 32 (2016).View ArticleGoogle Scholar
 MC Yang, Conditional diagnosability of matching composition networks under the MM* model. Inf. Sci. 233:, 230–243 (2013).MathSciNetView ArticleMATHGoogle Scholar
 X Yang, YY Tang, Efficient fault identification of diagnosable systems under the comparison model. IEEE Trans. Comput. 56(12), 1612–1618 (2007).MathSciNetView ArticleGoogle Scholar
 XM Zhang, Y Zhang, F Yan, AV Vasilakos, Interferencebased topology control algorithm for delayconstrained mobile ad hoc networks. IEEE Trans. Mob. Comput. 14(4), 742–754 (2015).View ArticleGoogle Scholar
 Q Zhu, G Guo, D Wang, Relating diagnosability, strong diagnosability and conditional diagnosability of strong networks. IEEE Trans. Comput. 63(7), 1847–1851 (2014).MathSciNetView ArticleGoogle Scholar