scholarly journals Hybrid Position-Based and DTN Forwarding for Vehicular Sensor Networks

2012 ◽  
Vol 8 (4) ◽  
pp. 186146 ◽  
Author(s):  
Fan Li ◽  
Lei Zhao ◽  
Xiumei Fan ◽  
Yu Wang

Efficient data delivery in vehicular sensor networks is still a challenging research issue. Position-based routing protocols have been proven to be more suitable for dynamic vehicular networks or large-scale mobile sensor networks than traditional ad hoc routing protocols. However, position-based routing assumes that intermediate nodes can always be found to set up an end-to-end connection between the source and the destination; otherwise, it suffers from network partitions which are very common in vehicular networks and leads to poor performances. This paper addresses data delivery challenge in the possible intermittently connected vehicular sensor networks by combining position-based forwarding strategy with store-carry-forward routing scheme from delay tolerant networks. The proposed routing method makes use of vehicle driving direction to determine whether holding or forwarding the packet. Experimental results show that the proposed mechanism outperforms existing position-based solutions in terms of packet delivery ratio.

Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7060
Author(s):  
Jatinkumar Patel ◽  
Hosam El-Ocla

In this paper, we examine routing protocols with the shortest path in sensor networks. In doing this, we propose a genetic algorithm (GA)-based Ad Hoc On-Demand Multipath Distance Vector routing protocol (GA-AOMDV). We utilize a fitness function that optimizes routes based on the energy consumption in their nodes. We compare this algorithm with other existing ad hoc routing protocols including LEACH-GA, GA-AODV, AODV, DSR, EPAR, EBAR_BFS. Results prove that our protocol enhances the network performance in terms of packet delivery ratio, throughput, round trip time and energy consumption. GA-AOMDV protocol achieves average gain that is 7 to 22% over other protocols. Therefore, our protocol extends the network lifetime for data communications.


2022 ◽  
Vol 14 (1) ◽  
pp. 28
Author(s):  
Yelena Trofimova ◽  
Pavel Tvrdík

In wireless ad hoc networks, security and communication challenges are frequently addressed by deploying a trust mechanism. A number of approaches for evaluating trust of ad hoc network nodes have been proposed, including the one that uses neural networks. We proposed to use packet delivery ratios as input to the neural network. In this article, we present a new method, called TARA (Trust-Aware Reactive Ad Hoc routing), to incorporate node trusts into reactive ad hoc routing protocols. The novelty of the TARA method is that it does not require changes to the routing protocol itself. Instead, it influences the routing choice from outside by delaying the route request messages of untrusted nodes. The performance of the method was evaluated on the use case of sensor nodes sending data to a sink node. The experiments showed that the method improves the packet delivery ratio in the network by about 70%. Performance analysis of the TARA method provided recommendations for its application in a particular ad hoc network.


Author(s):  
S. Ashok Kumar ◽  
E. Suresh Babu ◽  
C. Nagaraju ◽  
A. Peda Gopi

<div><table cellspacing="0" cellpadding="0" align="left"><tbody><tr><td align="left" valign="top"><p>Over the last decade, researchers had  proposed numerous  mobile ad hoc routing protocols for which are operate in an on-demand way, as standard on-demand routing protocols such as AODV, DSR and TORA, etc., have been shown to often have faster reaction time and  lower overhead than proactive protocols. However, the openness of the routing environment and the absence of centralized system and infrastructure make them exposed to security attacks in large extent.  In particular, one such kind of attacks is rushing attack, which is mostly hard to detect due to their inherited properties, that alters the network statistics radically. In this paper, we modeled a rushing attack which is a powerful attack that exploits the weaknesses of the secure routing protocols. Moreover, to know the weakness and strength of these protocols, it is necessary to test their performance in hostile environments. Subsequently, the performance is measured with the various metrics, some ot them are average throughput, packet delivery ratio, average end-to-end delay and etc., to compare and evaluate their performance.</p></td></tr></tbody></table></div>


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Guangjie Han ◽  
Na Bao ◽  
Li Liu ◽  
Daqiang Zhang ◽  
Lei Shu

Underwater Acoustic Sensor Networks (UASNs) have drawn great attention for their potential value in ocean monitoring and offshore exploration. In order to make the underwater application possible, the unique characteristics of underwater acoustic channels and continuous node movement inspired the emergence of routing protocols for underwater environment. In this paper, we introduce and compare four prominent routing protocols proposed for UASNs, namely, H2-DAB, GEDAR, E-PULRP, and PER. Performances of the routing protocols are evaluated in terms of the average number of control packets, end-to-end delay, data delivery ratio, and total energy consumption. The impact of water currents on the routing algorithms is also analyzed in our simulation. Experimental results demonstrate that E-PULRP provides high data delivery ratio at the cost of end-to-end delay. H2-DAB has better real-time performance for minimal delay transmission. GEDAR efficiently addresses the problem of void region without introducing extra energy. PER requires the most control packets in the process of routing establishment. Our work aims to provide useful insights to select appropriate routing protocols to fulfil different application requirements in UASNs.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 364
Author(s):  
Saritha Arumugam ◽  
N Kumar

Mobile ad hoc network is a wireless network which has peer to peer process .it is established to achieve a group of network to be connected in wireless network. It is a large network that transfers the data from source to destination .Here we are computing the routing protocols like (DSDV, AODV, OLSR, DSR, TORA, and ZRP) which is analyzed in the form of packet delivery ratio, throughput, end to end delay, Routing overhead. There are three types of ADHOC network routing protocol 1) table driven proactive protocol acts as background traffic generally, in ADHOC  network the location of one node is send to other node through location this nodes transfer the data from one to other its done by DSDV and WRP. 2) on demand driven reactive it establish route between nodes when they are required to route packet data it is done by DSR and AODV. 3)  hybrid protocol each node has its own zone radius. 


Author(s):  
Varun Menon

Opportunistic routing has emerged as one of the prominent solutions for efficient data delivery in ad hoc networks especially in highly dynamic scenarios. Opportunistic routing uses the broadcasting nature of the wireless medium to increase the number of potential forwarding nodes in the network, thereby improving the delivery rate. But most of the proposed opportunistic routing protocols suffer from increased duplicate data forwarding at the intermediate nodes in the network which leads to increase in traffic and reduced efficiency. We propose a novel method which uses acknowledgements for controlling the data forwarding by intermediate nodes and thereby eliminating most of the duplicate forwarding in the network. Simulation results show that our proposed method is much more efficient that all the major existing opportunistic protocols.


Sign in / Sign up

Export Citation Format

Share Document