A Unicast Tree-Based Data Gathering Protocol for Delay Tolerant Mobile Sensor Networks
Journal Title: Journal of Information Systems and Telecommunication - Year 2016, Vol 4, Issue 1
Abstract
The Delay Tolerant Mobile Sensor Networks (DTMSNs) distinguish themselves from conventional sensor networks by means of some features such as loose connectivity, node mobility, and delay tolerability. It needs to be acknowledged that traditional end-to-end routing protocols cannot be applied usefully in such challenging network conditions because of intermittent connections and/or long delays. Hence, this research is intended to propose a Unicast Tree-based Data Gathering protocol (UTDG) to resolve this problem. A UTDG includes 3 phases: tree formation phase, data collection and data transmission phase, and finally the updating phase. The proposed protocol constructs a tree in each community on the basis of transmission ranking, contact probability and the link expiration time. The selection of the next-hop node is based on the tree structure rather than forwarding the message to the neighbor node directly. Each node unicasts the data to its parent in the related community, and the root of the tree successively sends the data to the sink node. The authors contend, based on the simulation results of the study, that the proposed protocol can gain significantly higher message delivery rates with lower transmission overhead and also lower delay in data delivery than the other existing DTMSNs routing protocols in some applications.
Authors and Affiliations
Zeynab Mottaghinia, Ali Ghaffari
Multiple Antenna Relay Beamforming for Wireless Peer to Peer Communications
This paper deals with optimal beamforming in wireless multiple-input-multiple-output (MIMO) relay networks that involves multiple concurrent source-destination pairs with imperfect channel state information (CSI) at the...
Privacy Preserving Big Data Mining: Association Rule Hiding
Data repositories contain sensitive information which must be protected from unauthorized access. Existing data mining techniques can be considered as a privacy threat to sensitive data. Association rule mining is one of...
Pose-Invariant Eye Gaze Estimation Using Geometrical Features of Iris and Pupil Images
In the cases of severe paralysis in which the ability to control the body movements of a person is limited to the muscles around the eyes, eye movements or blinks are the only way for the person to communicate. Interface...
A New Recursive Algorithm for Universal Coding of Integers
In this paper, we aim to encode the set of all positive integers so that the codewords not only be uniquely decodable but also be an instantaneous set of binary sequences. Elias introduces three recursive algorithms for...
A New Approach to the Quantitative Measurement of Software Reliability
Nowadays software systems have very important role in a lot of sensitive and critical applications. Sometimes a small error in software could cause financial or even health loss in critical applications. So reliability a...