Survey of Geographical Packet Forwarding In Wireless Sensor Networks Using Sleep Wake Pattern
نویسنده
چکیده
In wireless sensor networks nodes follows sleepwake cycling policy. If a node wants to forward the packet to another node, it has to select a node from available nodes. Each relay is associated with a reward that gives the benefit of forwarding the packet using that relay. We have to develop a solution to this local problem, if that solution is adopted by every node, it should provide a reasonable heuristic for the end-to-end forwarding problem. Relay selection problem comprises a forwarding node has to select relays which follows asynchronous sleep wake cycling policy. At each relay wake-up instant the forwarder can choose to probe a relay to learn its reward value, based on this it can forward the packet or it can wait for other relays to wake up. The source objective is to select a relay so as to minimize a combination of waiting-delay, reward and probing cost. We formulate this relay selection problem as a Partially Observable Markov Decision Process (POMDP) and obtain some interesting structural results on the optimal policy. We also conduct simulation experiments and gain valuable insights into the performance of our local forwarding-solution. We can formulate this next problem as a Markov decision process (MDP). The exact optimal solution Best Forward can be found, but is not a better solution. Next we consider Simple Forward policy; Simulations show that SF performance is very close to the performance of BF, even for reasonably small node density. We then consider the end-to-end performance of SF in comparison with two external policies: Max Forward (MF) and First Forward (FF), and an end-to-end delay minimizing policy proposed by Kim et al (distributed bellman ford algorithm).
منابع مشابه
A Priority-based Routing Algorithm for Underwater Wireless Sensor Networks (UWSNs)
Advances in low-power electronics design and wireless communication have enabled the development of low cost, low power micro-sensor nodes. These sensor nodes are capable of sensing, processing and forwarding which have many applications such as underwater networks. In underwater wireless sensor networks (UWSNs) applications, sensors which are placed in underwater environments and predicted ena...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملAnycast Technique to Increase the Life Time of Wireless Sensor Network
Wireless sensor network is collection of sensor nodes and one sink node. Sensor nodes sense the signals and forward to the sink node. In event driven wireless sensor network where some event is happened that event is sense by one of the sensor node and forward to sink node. Sensor nodes are small in size so the energy capacity of sensor node is very less. In the event driven wireless sensor net...
متن کاملEnergy Efficiency and Reliability in Underwater Wireless Sensor Networks Using Cuckoo Optimizer Algorithm
Energy efficiency and reliability are widely understood to be one of the dominant considerations for Underwater Wireless Sensor Networks (UWSNs). In this paper, in order to maintain energy efficiency and reliability in a UWSN, Cuckoo Optimization Algorithm (COA) is adopted that is a combination of three techniques of geo-routing, multi-path routing, and Duty-Cycle mechanism. In the proposed alg...
متن کاملUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014