13 research outputs found

    Rician statistical assumptions for geographic routing in wireless sensor networks

    Full text link

    Intertwined localization and error-resilient geographic routing for mobile wireless sensor networks

    Get PDF
    “This is a post-peer-review, pre-copyedit version of an article published in Wireless Networks. The final authenticated version is available online at: http://dx.doi.org/10.1007/s11276-018-1836-7”Geographic routing in wireless sensor networks brings numerous inherent advantages, albeit its performance relying heavily on accurate node locations. In mobile networks, localization of the continuously moving nodes is a challenging task and location errors are inevitable and affect considerably routing decisions. Our proposal is in response to the unrealistic assumption widely made by previous geographic routing protocols that the accurate location of mobile nodes can be obtained at any time. Such idealized assumption results in under-performing or infeasible routing protocols for the real world applications. In this paper, we propose INTEGER, a localization method intertwined with a new location-error-resilient geographic routing specifically designed for mobile sensor networks even when these networks are intermittently connected. By combining the localization phase with the geographic routing process, INTEGER can select a relay node based on nodes’ mobility predictions from the localization phase. Results show that INTEGER improves the efficiency of the routing by increasing the packet delivery ratio and by reducing the energy consumption while minimizing the number of relay nodes compared to six prevalent protocols from the literature.Peer ReviewedPostprint (author's final draft

    LER-GR: Location Error Resilient Geographical Routing for Vehicular Ad-hoc Networks

    Get PDF
    The efficiency and scalability of geographical routing depend on the accuracy of location information of vehicles. Each vehicle determines its location using Global Positioning System (GPS) or other positioning systems. Related literature in geographical routing implicitly assumes accurate location information. However, this assumption is unrealistic considering the accuracy limitation of GPS and obstruction of signals by road side environments. The inaccurate location information results in performance degradation of geographical routing protocols in vehicular environments. In this context, this paper proposes a location error resilient geographical routing (LER-GR) protocol. Rayleigh distribution based error calculation technique is utilized for assessing error in the location of neighbouring vehicles. Kalman filter based location prediction and correction technique is developed to predict the location of the neighbouring vehicles. The next forwarding vehicle (NFV) is selected based on the least error in location information. Simulations are carried out to evaluate the performance of LER-GR in realistic environments, considering junction-based as well as real map-based road networks. The comparative performance evaluation attests the location error resilient capability of LER-GR in a vehicular environment

    Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks

    Get PDF
    A focus of the scientific community is to design network oriented position-based routing protocols and this has resulted in a very high number of algorithms, different in approach and performance and each suited only to particular applications. However, though numerous, very few position-based algorithms have actually been adopted for commercial purposes. This article is a survey of almost 50 position-based routing protocols and it comes as an aid in the implementation of this type of routing in various applications which may need to consider the advantages and pitfalls of position-based routing. An emphasis is made on geographic routing, whose notion is clarified as a more restrictive and more efficient type of position-based routing. The protocols are therefore divided into geographic and non-geographic routing protocols and each is characterized according to a number of network design issues and presented in a comparative manner from multiple points of view. The main requirements of current general applications are also studied and, depending on these, the survey proposes a number of protocols for use in particular application areas. This aims to help both researchers and potential users assess and choose the protocol best suited to their interest

    An Emergency Packet Forwarding Scheme for V2V Communication Networks

    Get PDF
    This paper proposes an effective warning message forwarding scheme for cooperative collision avoidance. In an emergency situation, an emergency-detecting vehicle warns the neighbor vehicles via an emergency warning message. Since the transmission range is limited, the warning message is broadcast in a multihop manner. Broadcast packets lead two challenges to forward the warning message in the vehicular network: redundancy of warning messages and competition with nonemergency transmissions. In this paper, we study and address the two major challenges to achieve low latency in delivery of the warning message. To reduce the intervehicle latency and end-to-end latency, which cause chain collisions, we propose a two-way intelligent broadcasting method with an adaptable distance-dependent backoff algorithm. Considering locations of vehicles, the proposed algorithm controls the broadcast of a warning message to reduce redundant EWM messages and adaptively chooses the contention window to compete with nonemergency transmission. Via simulations, we show that our proposed algorithm reduces the probability of rear-end crashes by 70% compared to previous algorithms by reducing the intervehicle delay. We also show that the end-to-end propagation delay of the warning message is reduced by 55%

    GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks

    Get PDF
    The routing process in a Mobile Ad Hoc Network (MANET) poses critical challenges because of its features such as frequent topology changes and resource limitations. Hence, designing a reliable and dynamic routing protocol that satisfies MANET requirements is highly demanded. The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. The GFS algorithm was designed as a high-performance protocol that adopts hop count in soliciting shortest path. However, the GFS does not consider MANET needs and is therefore insufficient in computing reliable routes. Hence, this study aims to improve the existing GFS by transforming it into a dynamic stand-alone routing protocol that responds swiftly to MANET needs, and provides reliable routes among the communicating nodes. To achieve the aim, two mechanisms were proposed as extensions to the current GFS, namely the Dynamic Beaconing Updates Mechanism (DBUM) and the Dynamic and Reactive Reliability Estimation with Selective Metrics Mechanism (DRESM). The DBUM algorithm is mainly responsible for providing a node with up-to-date status information about its neighbours. The DRESM algorithm is responsible for making forwarding decisions based on multiple routing metrics. Both mechanisms were integrated into the conventional GFS to form Greedy Stand-Alone Routing (GSAR) protocol. Evaluations of GSAR were performed using network simulator Ns2 based upon a defined set of performance metrics, scenarios and topologies. The results demonstrate that GSAR eliminates recovery mode mechanism in GFS and consequently improve overall network performance. Under various mobility conditions, GSAR avoids hole problem by about 87% and 79% over Greedy Perimeter Stateless Routing and Position-based Opportunistic Routing Protocol respectively. Therefore, the GSAR protocol is a reasonable alternative to position-based unicast routing protocol in MANET

    Recent Trends in Communication Networks

    Get PDF
    In recent years there has been many developments in communication technology. This has greatly enhanced the computing power of small handheld resource-constrained mobile devices. Different generations of communication technology have evolved. This had led to new research for communication of large volumes of data in different transmission media and the design of different communication protocols. Another direction of research concerns the secure and error-free communication between the sender and receiver despite the risk of the presence of an eavesdropper. For the communication requirement of a huge amount of multimedia streaming data, a lot of research has been carried out in the design of proper overlay networks. The book addresses new research techniques that have evolved to handle these challenges
    corecore