The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To satisfy requirements from various applications in the smart grid, transmitting data robustly and reliably has become one of the most crucial tasks. However, existing routing protocols like CTP, LEACH, HWMP cannot be directly applied to the smart grid system. In this paper, we propose RH-HWMP, which provides robust data transmission for the neighbor area network (NAN) in the smart grid. The main...
In-network caching is an inherent feature of Named Data Networking (NDN), and the basic data unit of naming and caching in NDN is called “chunk”. However, a chunk needs to be further fragmented into fragments when its size is larger than the link layer's Maximum Transmission Unit (MTU). Furthermore, fragments also need to be reassembled into the original chunk at intermediate routers so that subsequent...
Our objective in this paper is to improve the communications performance for IoT applications by proposing a new solution called IC-IoT (Improving Communication for IoT). The principle used is the exploitation of three existing communication protocol by incorporating some mechanisms to consider the different parameters which can cause the data loses. A probabilistic approach is used to know the impact...
Since its definition, RPL (the IPv6 Routing Protocol for Low-Power and Lossy Networks) has been emerging as the standard protocol for routing in Internet of Things (IoT) solutions. RPL is a proactive routing protocol that performs the process of route creation based on Objective Functions (OFs). The OFs are responsible for defining rules and constraints to select the best paths considering different...
This paper aims to compare several hierarchical routing protocols. LEACH protocol is one of the basic and typical hierarchical routing protocols in wireless sensor networks. Some Lifetime, Density, Radius and Reliability analysis will be done for the hierarchical routing protocols. After comparisons of different hierarchical routing protocols in this paper, an approach of routing-protocol recommendation...
Based on the LEACH protocol and the Single-hop protocol, this paper proposes a new method to predict the lifetime and reliability of wireless sensor network directly. That is to say, the sensor nodes can be directly deployed without further simulation. Through a series of experiments to compare the two protocols have been several key conclusions: With the increase in sensor density, although the LEACH...
Many broadcast protocols have been proposed in Vehicular ad-hoc Network (VANET) for safety applications and traffic efficiency. GeoBroadcast, which the sender sends information to the geographical area, has been standardized by the ETSI Technical Committee ITS. The routing protocol is a key technology satisfying communication requests of high reliability, low delay and universality for GeoBroadcast...
Efficient routing is one of the key challenges for next generation vehicular networks for providing fast and reliable communication in a smart city context. Various routing protocols have been proposed for determining optimal routing paths in highly dynamic topologies. However, it is the dilemma of those kinds of networks that good paths are used intensively, resulting in congestion and path quality...
Conventional flow-monitoring methods, such as sFlow, cannot detect low-rate HTTP GET Flooding denial of service (DoS) attacks, which are a threat even if the traffic rate is low. To solve this problem, we propose a method for detecting DoS attacks on the basis of the burst-state duration of traffic calculated using a quick packet-matching function of a general router such as TCAM. In addition, we...
Geographic routing protocols establish scalable and robust routes for multi-hop trsdansmission in wireless mobile ad-hoc networks, where accurate location information of the mobile nodes is needed. Aiming to alleviate the influence of location errors, existing works focus on modifying routing protocols through modeling the error sources and mobility prediction. In this paper, we propose a cooperative...
Maintaining the reliability of Next Hop selection (NHS) in Inter-Vehicle Communication (IVC) technology has witnessed significant attention among researchers nowadays. The reason is because reliable selection of the next hop could improve the performance of geographic routing protocols, which is a major goal of Intelligent Transportation Systems (ITS) applications. This paper provides a qualitative...
A new routing protocol that adjusts of the necessities of heterogeneous traffic is presented in this paper. The proposed scheme make improvement in TeGAR algorithm. The point of the scheme will be on accomplish low latency, and to fulfill various quality of service (QoS) in different network conditions. To do that, the proposed algorithm exploits multiple nodes' attributes like distance to the Sink,...
Internet of Things promises large scale interconnected sensing and actuation capabilities in domains, areas, applications and activities never accessed before by Internet. Besides other technical barriers, wireless network node lifetime impedes its applicability. To reduce the energy cost incurred by wireless communication, several existing mechanisms typically downscale the power of transmitters...
We propose algorithms that uses fast graph mining for resolving the network topology to a locally regulated area defined as a component of network topology. Though the IP backbone network should be reconfigured periodically in accordance with environmental changes, reconfiguration results in heavy workload, such as routing re-designs or testing these re-designs for network operators. If a network...
The article aimed at offering new ways of routing in networks with the DTN architecture, which allows using the most optimal routes for determining the routes depending on various conditions. To achieve these goals, it is necessary to analyze the available developments in this field with the subsequent identification of advantages and disadvantages. An attempt to realize advantages with a minimum...
Opportunistic routing (OR) has emerged as a promising paradigm to the design of routing protocols for underwater sensor networks (UWSNs). However, despite of its advantages, it introduces a critical problem that has been neglected until now: the immutable transmission priority level of the next-hop forwarding nodes. This characteristic can lead to an overuse of a unique node (or a few of them), quickly...
Wireless Sensor Networks (WSNs) will represent a crucial enabling technology to interconnect sensors and actuators in future smart cities. Since many applications will demand for reliable and low-latency communication, current standardization efforts are focusing in the definition of novel wireless standard architectures, e.g., the 6TiSCH architecture, to improve reliability and introduce support...
Wireless sensor network(WSN) contains a number of sensor nodes distributed in the sensor field. Sensor nodes gather information from the environment, process them and then transmit data to the sink node. To send data from the source node to sink node require efficient routing algorithm. This routing algorithm plays important role in WSN is to finding a reliable path for a data transmission in the...
This paper addresses the issue of reliable data delivery in highly dynamic Mobile Ad-hoc Networks (MANETs). Most existing MANET routing protocols are susceptible to data delivery in reliable and timely manner. To counter this problem, Position-based Greedy Forwarding protocol (PGF), a novel GR protocol which takes advantage of greedy forwarding and opportunistic routing is proposed. In PGF, the best...
Many common DTN routing protocols are replication-based, which have relatively good performance in terms of message delivery ratio but high overhead, and leave the issue of garbage collection open. In this paper, we propose Named Data Distance Routing (NDDR), a named data based DTN routing approach which makes routing decisions for named data based on topological distance information. This helps to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.