VGDRA: A virtual grid-based dynamic routes adjustment scheme for mobile sink-based WSN

VGDRA: A virtual grid-based dynamic routes adjustment scheme for mobile sink-based wsn Exploiting the sink mobility in wireless sensor networks has been considered as a good strategy to balance the nodes energy dissipation. Despite its numerous advantages, the data dissemination to the mobile sink is a challenging task for the resource constrained sensor nodes due to the dynamic network topology caused by the sink mobility. For efficient data delivery, nodes need to reconstruct their routes toward the latest location of the mobile sink, which undermines the energy conservation goal. A…

Read More

Restricted Epidemic Routing in Multi-Community Delay Tolerant Networks

Restricted Epidemic Routing in Multi-Community Delay Tolerant Networks In some specific applicable scenarios, nodes are placed in some geographical areas and limited to move in their own community. The tradeoff between the delivery delay and the number of transmissions is studied in the above multi-community delay tolerant networks by propagating a data packet in a carefully chosen segment of community. First, three restricted epidemic routing are proposed: the shortest community-hop path scheme, the rectangle scheme, and the parallelogram scheme. Second, the ratios of the average number of communities that can…

Read More

Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing

Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing CSPR, a compressive-sensing based approach is proposed for path reconstruction in wireless sensor networks. By viewing the whole network as a path representation space, an arbitrary routing path can be represented by a path vector in the space. As path length is usually much smaller than the network size, such path vectors are sparse, i.e., the majority of elements are zeros. By encoding sparse path representation into packets, the path vector can be recovered from a small amount of packets…

Read More

Opportunistic Routing Algorithm for Relay Node Selection in WSN

Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks Energy savings optimization becomes one of the major concerns in the wireless sensor network (WSN) routing protocol design, due to the fact that most sensor nodes are equipped with the limited non rechargeable battery power. Minimizing energy consumption and maximizing network lifetime is focused for data relay in one-dimensional queue network. Following the principle of opportunistic routing theory, multihop relay decision to optimize the network energy efficiency is made based on the differences among sensor nodes, in terms of…

Read More

E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks

E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks DOWNLOAD PROJECT SYNOPSIS -JAVA DOWNLOAD PROJECT SYNOPSIS -NS2 Wireless sensor networks (WSNs) are resource constrained. Energy is one of the most important resources in such networks. Therefore, optimal use of energy is necessary. A novel energy-efficient routing protocol is proposed for WSNs. The protocol is reliable in terms of data delivery at the base station (BS). Mobility in sensor nodes and in the BS is considered. The proposed protocol is hierarchical and cluster based. Each cluster consists of one cluster…

Read More

A Lightweight Scheme for Detecting Provenance Forgery and Packet Drop Attacks

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for…

Read More

Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks

Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks Two novel energy-aware routing algorithms to be proposed for wireless ad hoc networks, called reliable minimum energy cost routing (RMECR) and reliable minimum energy routing (RMER). RMECR addresses three important requirements of ad hoc networks: energy-efficiency, reliability, and prolonging network lifetime. It considers the energy consumption and the remaining battery energy of nodes as well as quality of links to find energy-efficient and reliable routes that increase the operational lifetime of the network. RMER, on the other hand, is…

Read More

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable node mobility, and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work has been done on providing efficient data access to mobile users. A novel approach is proposed to support cooperative caching in DTNs, which enables the sharing and coordination of cached data among multiple nodes and reduces data access delay. The basic idea is to intentionally cache…

Read More

Incentive Based Data Sharing in Delay Tolerant Mobile Networks

Incentive Based Data Sharing in Delay Tolerant Mobile Networks Mobile wireless devices play important roles in our daily life, e.g., users often use such devices to take pictures and share with friends via opportunistic peer-to-peer links, which however are intermittent in nature, and hence require the store and- forward feature proposed in Delay Tolerant Networks to provide useful data sharing opportunities. Moreover, mobile devices may not be willing to forward data items to other devices due to the limited resources. Hence, effective data dissemination schemes need to be designed to…

Read More