期刊文献+

LB-AGR: level-based adaptive geo-routing for underwater sensor network 被引量:4

LB-AGR: level-based adaptive geo-routing for underwater sensor network
原文传递
导出
摘要 Underwater sensor network(UWSN) adopts acoustic communication with more energy-consumption and longer propagation-delay, which bring great challenges to protocol design. In this paper, we proposed level-based adaptive geo-routing(LB-AGR) protocol. LB-AGR divides traffics into four categories, and routes different types of traffic in accordance with different decisions. Packets upstream to the sink are forwarded unicast to the best next-hop instead of broadcasting to all neighbor nodes as in present UWSN routing protocols. LB-AGR defines an integrated forwarding factor for each candidate node based on available energy, density, location, and level-difference between neighbor nodes, which is used to determine the best next-hop among multiple qualified candidates. Through simulation experiments, we show the promising performance of LB-AGR. Underwater sensor network(UWSN) adopts acoustic communication with more energy-consumption and longer propagation-delay, which bring great challenges to protocol design. In this paper, we proposed level-based adaptive geo-routing(LB-AGR) protocol. LB-AGR divides traffics into four categories, and routes different types of traffic in accordance with different decisions. Packets upstream to the sink are forwarded unicast to the best next-hop instead of broadcasting to all neighbor nodes as in present UWSN routing protocols. LB-AGR defines an integrated forwarding factor for each candidate node based on available energy, density, location, and level-difference between neighbor nodes, which is used to determine the best next-hop among multiple qualified candidates. Through simulation experiments, we show the promising performance of LB-AGR.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第1期54-59,共6页 中国邮电高校学报(英文版)
基金 supported by the Program for New Century Excellent Talents in University of China(NCET-11-1025) the National Natural Science Foundation of China(61162003,61163050,6126104) Qinghai Office of Science and Technology(2012-Z-902) the National Basic Research Program of China(2011CB311809) the Natural Science Foundation of Tianjin(10JCYBJC00600)
关键词 UWSN LB-AGR node level neighbor table UWSN,LB-AGR,node level,neighbor table
  • 相关文献

参考文献1

二级参考文献13

  • 1KYASANUR P, VAIDYA N. Detection and handling of MAC layer misbehavior in wireless networks [ C ]// Pro- ceedings of the 2003 International Conference on Dependa- ble Systems and Networks (DSN03), San Francisco: IEEEPress, 2003: 173-183.
  • 2CAGALJ M, GANERIWAL S, AAD I, et al. On selfish be- havior in CSMA/CA networks [ C ]//Proceedings of IEEE Infocom on 24th Annum Joint Conference of the IEEE Com- puter and Communications Societies. Miami: IEEE Press, 2005 : 2513-2524.
  • 3RADOSAVAC S, BARAS J S, KOUTSOPOULOS I. A framework for MAC protocol misbehavior detection in wire- less networks[ C ]//Proceedings of the 4th ACM Workshop on Wireless Security. Cologne : ACM Press, 2005 : 33-42.
  • 4TOLEDO L, WANG X. Robust detection of selfish misbe- havior in wireless network [ J ]. IEEE Journal on Selected Areas in Communications, 2007, 25 (6) : 1124-1134.
  • 5刘春风.IEEE802.11无线adhoe网络MAC层自私行为研究[D].天津:天津大学,2008:45-55.
  • 6RAYA M, HUBAUX J P, AAD I. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots [ C ]// Pro- ceedings of the 2nd International Conference on Mobile Sys- tems, Applications and Services. Boston: ACM Press,2004 : 84-97.
  • 7AICKELIN U, BENTLEY P, CAYZER S, et al. Danger theory: the link between ais and ids [ C ]//Proceedings of the Second International Conference on Artificial Immune Systems (ICARIS-03). Edinburgh : Springer Press, 2003 : 147-155.
  • 8AZZEDINE B, RENATO B M, KATHIA R L, et al. An a- gent based and biological inspired real-time intrusion detec- tion and security model for computer network operations [J]. Computer Communications, 2007, 30 (13) : 2649- 2660.
  • 9GONG Maoguo, JIAO Licheng, ZHANG Lining. Baldwini- an learning in clonal selection algorithm for optimization [ J ]. Information Sciences: an International Journal, 2010, 180(8): 1218-1236.
  • 10WU Xiaonan, BANZHAF W. Review: the use of computa- tional intelligence in intrusion detection systems [ J ]. Ap- plied Soft Computing, 2010, 10 (1) : 1-35.

共引文献3

同被引文献10

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部