A novel approach for void avoidance in wireless sensor networks
We propose a novel approach to treat the problem of void avoidance in sensor networks. In our approach, the choice of the forwarding region around a discovered void is oriented by the locations of (i) the sender node, (ii) the void center and (iii) the destination node. Three void‐avoidance schemes...
Gespeichert in:
Veröffentlicht in: | International journal of communication systems 2010-08, Vol.23 (8), p.945-962 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | We propose a novel approach to treat the problem of void avoidance in sensor networks. In our approach, the choice of the forwarding region around a discovered void is oriented by the locations of (i) the sender node, (ii) the void center and (iii) the destination node. Three void‐avoidance schemes are described which use the same void‐discovery algorithm. Based on an oriented face routing, the first scheme is used by the boundary nodes to prevent packets from dropping. The second scheme is used by sender nodes located n‐hops away from the void boundary to launch a preventive rerouting. The third scheme tends to protect packets from both the concave zones and the boundaries nodes of voids. Proposed schemes are simple to implement. They save network resources and could be easily associated with existing geographic routing protocols. Simulation results show the efficiency of the proposed approach. Copyright © 2009 John Wiley & Sons, Ltd.
We propose a novel approach to treat the problem of void avoidance in sensor networks. In our approach, the choice of the forwarding region around a void is oriented by the locations of: the sender node, the void center and the destination node. Three void‐avoidance schemes are described. They save the network resources and could be easily associated to the existing geographic routing protocols. Each proposed scheme consists of void‐discovery, void‐announce and packet‐rerouting steps, as shown in the figure. Simulation results show the efficiency of the proposed approach. Copyright © 2009 John Wiley & Sons, Ltd. |
---|---|
ISSN: | 1074-5351 1099-1131 1099-1131 |
DOI: | 10.1002/dac.1079 |