6 research outputs found

    I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet Forwarding Technique for Wireless Sensor and Ad Hoc Networks

    Full text link
    Energy consumption and delay incurred in packet delivery are the two important metrics for measuring the performance of geographic routing protocols for Wireless Adhoc and Sensor Networks (WASN). A protocol capable of ensuring both lesser energy consumption and experiencing lesser delay in packet delivery is thus suitable for networks which are delay sensitive and energy hungry at the same time. Thus a smart packet forwarding technique addressing both the issues is thus the one looked for by any geographic routing protocol. In the present paper we have proposed a Fermat point based forwarding technique which reduces the delay experienced during packet delivery as well as the energy consumed for transmission and reception of data packets.Comment: 11 Page

    Dynamic Time-Stable Geocast Routing in Vehicular Ad Hoc Networks

    Get PDF
    Vehicular ad hoc networks (VANETs) have emerged as an area of interest for both industry and research scholars because they have become an essential part of intelligent transportation systems (ITSs). Many applications in VANET require sending a message to certain or all vehicles within a region, called geocast. Sometimes geocast requires that the message be kept alive within the region for a period of time. This time-stable geocast has a vital role in some ITS applications, particularly commercial applications. This study presents a novel time-stable geocast protocol that works well even in too sparse networks. Moreover, since commercial applications sometimes make it necessary to change the duration of the stable message within the region, the dynamic nature of a geocast protocol should allow this time to be extended, reduced, or canceled without any additional cost. Therefore, we call it a dynamic time-stable geocast, DTSG, protocol. It works in two phases (the pre-stable period and the stable period), and the simulation results show that it works well in its performance metrics (delivery ratio and network cost). In addition, these results validate the protocol prediction of its performance metrics. Moreover, with the informed time of zero, all the intended vehicles will be informed as soon as they enter the region. The fact that the protocol is independent of the networks’ density, the vehicles’ speed, and the vehicles’ broadcasting range, makes it more robust than others that fail in sparse networks or in high-speed nodes

    On Mobility Management in Multi-Sink Sensor Networks for Geocasting of Queries

    Get PDF
    In order to efficiently deal with location dependent messages in multi-sink wireless sensor networks (WSNs), it is key that the network informs sinks what geographical area is covered by which sink. The sinks are then able to efficiently route messages which are only valid in particular regions of the deployment. In our previous work (see the 5th and 6th cited documents), we proposed a combined coverage area reporting and geographical routing protocol for location dependent messages, for example, queries that are injected by sinks. In this paper, we study the case where we have static sinks and mobile sensor nodes in the network. To provide up-to-date coverage areas to sinks, we focus on handling node mobility in the network. We discuss what is a better method for updating the routing structure (i.e., routing trees and coverage areas) to handle mobility efficiently: periodic global updates initiated from sinks or local updates triggered by mobile sensors. Simulation results show that local updating perform very well in terms of query delivery ratio. Local updating has a better scalability to increasing network size. It is also more energy efficient than ourpreviously proposed approach, where global updating in networks have medium mobility rate and speed

    Transport mechanism for wireless micro sensor network

    Get PDF
    Wireless sensor network (WSN) is a wireless ad hoc network that consists of very large number of tiny sensor nodes communicating with each other with limited power and memory constrain. WSN demands real-time routing which requires messages to be delivered within their end-to-end deadlines (packet lifetime). This report proposes a novel real-time with load distribution (RTLD) routing protocol that provides real time data transfer and efficient distributed energy usage in WSN. The RTLD routing protocol ensures high packet throughput with minimized packet overhead and prolongs the lifetime of WSN. The routing depends on optimal forwarding (OF) decision that takes into account of the link quality, packet delay time and the remaining power of next hop sensor nodes. RTLD routing protocol possesses built-in security measure. The random selection of next hop node using location aided routing and multi-path forwarding contributes to built-in security measure. RTLD routing protocol in WSN has been successfully studied and verified through simulation and real test bed implementation. The performance of RTLD routing in WSN has been compared with the baseline real-time routing protocol. The simulation results show that RTLD experiences less than 150 ms packet delay to forward a packet through 10 hops. It increases the delivery ratio up to 7 % and decreases power consumption down to 15% in unicast forwarding when compared to the baseline routing protocol. However, multi-path forwarding in RTLD increases the delivery ratio up to 20%. In addition, RTLD routing spreads out and balances the forwarding load among sensor nodes towards the destination and thus prolongs the lifetime of WSN by 16% compared to the baseline protocol. The real test bed experiences only slight differences of about 7.5% lower delivery ratio compared to the simulation. The test bed confirms that RTLD routing protocol can be used in many WSN applications including disasters fighting, forest fire detection and volcanic eruption detection

    Privacy-preserving spatiotemporal multicast for mobile information services

    Get PDF
    Mobile devices have become essential for accessing information services anywhere at any time. While the so-called geographic multicast (geocast) has been considered in detail in existing research, it only focuses on delivering messages to all mobile devices that are currently residing within a certain geographic area. This thesis extends this notion by introducing a Spatiotemporal Multicast (STM), which can informally be described as a "geocast into the past". Instead of addressing users based on their current locations, this concept relates to the challenge of sending a message to all devices that have resided within a geographic area at a certain time in the past. While a wide variety of applications can be envisioned for this concept, it presents several challenges to be solved. In order to deliver messages to all past visitors of a certain location, an STM service would have to fully track all user movements at all times. However, collecting this kind of information is not desirable considering the underlying privacy implications, i.e., users may not wish to be identified by the sender of a message as this can disclose sensitive personal information. Consequently, this thesis aims to provide a privacy-preserving notion of STM. In order to realize such a service, this work first presents a detailed overview of possible applications. Based on those, functional, non-functional, as well as security and privacy objectives are proposed. These objectives provide the foundation for an in-depth literature review of potential mechanisms for realizing an STM service. Among the suggested options, the most promising relies on Rendezvous Points (RPs) for datagram delivery. In simple terms, RPs represent "anonymous mailboxes" that are responsible for certain spatiotemporal regions. Messages are deposited at RPs so that users can retrieve them later on. Protecting the privacy of users then translates to obfuscating the responsibilities of RPs for specific spatiotemporal regions. This work proposes two realizations: CSTM, which relies on cryptographic hashing, and OSTM, which considers the use of order-preserving encryption in a CAN overlay. Both approaches are evaluated and compared in detail with respect to the given objectives. While OSTM yields superior performance-related properties, CSTM provides an increased ability of protecting the privacy of users.MobilgerĂ€te bilden heute die Grundlage allgegenwĂ€rtiger Informationsdienste. WĂ€hrend der sogenannte geografische Multicast (Geocast) hier bereits ausfĂŒhrlich erforscht worden ist, so bezieht sich dieser nur auf GerĂ€te, welche sich aktuell innerhalb einer geografischen Zielregion befinden. Diese Arbeit erweitert dieses Konzept durch einen rĂ€umlich-zeitlichen Multicast, welcher sich informell als "Geocast in die Vergangenheit" beschreiben lĂ€sst. Dabei wird die Zustellung einer Nachricht an alle Nutzer betrachtet, die sich in der Vergangenheit an einem bestimmten Ort aufgehalten haben. WĂ€hrend eine Vielzahl von Anwendungen fĂŒr dieses Konzept denkbar ist, so ergeben sich hier mehrere Herausforderungen. Um Nachrichten an ehemalige Besucher eines Ortes senden zu können, mĂŒsste ein rĂ€umlich-zeitlicher Multicast-Dienst die Bewegungen aller Nutzer vollstĂ€ndig erfassen. Aus GrĂŒnden des Datenschutzes ist das zentralisierte Sammeln solch sensibler personenbezogener Daten jedoch nicht wĂŒnschenswert. Diese Arbeit befasst sich daher insbesondere mit dem Schutz der PrivatsphĂ€re von Nutzern eines solchen Dienstes. Zur Entwicklung eines rĂ€umlich-zeitlichen Multicast-Dienstes erörtert diese Arbeit zunĂ€chst mögliche Anwendungen. Darauf aufbauend werden funktionale, nicht-funktionale, sowie Sicherheits- und PrivatsphĂ€re-relevante Anforderungen definiert. Diese bilden die Grundlage einer umfangreichen Literaturrecherche relevanter Realisierungstechniken. Der vielversprechendste Ansatz basiert hierbei auf der Hinterlegung von Nachrichten in sogenannten Rendezvous Points. Vereinfacht betrachtet stellen diese "anonyme BriefkĂ€sten" fĂŒr bestimmte rĂ€umlich-zeitliche Regionen dar. Nachrichten werden in diesen so hinterlegt, dass legitime EmpfĂ€nger sie dort spĂ€ter abholen können. Der Schutz der Nutzer-PrivatsphĂ€re entspricht dann der Verschleierung der ZustĂ€ndigkeiten von Rendezvous Points fĂŒr verschiedene rĂ€umlich-zeitliche Regionen. Diese Arbeit schlĂ€gt zwei AnsĂ€tze vor: CSTM, welches kryptografische Hashfunktionen nutzt, sowie OSTM, welches ordnungserhaltende VerschlĂŒsselung in einem CAN Overlay einsetzt. Beide Optionen werden detailliert analytisch sowie empirisch bezĂŒglich ihrer Diensteigenschaften untersucht und verglichen. Dabei zeigt sich, dass OSTM vorteilhaftere Leistungseigenschaften besitzt, wĂ€hrend CSTM einen besseren Schutz der Nutzer-PrivatsphĂ€re bietet
    corecore