Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Duplicate detectable opportunistic forwarding in duty-cycled wireless sensor networks

Published: 01 April 2016 Publication History

Abstract

Opportunistic routing, offering relatively efficient and adaptive forwarding in low-duty-cycled sensor networks, generally allows multiple nodes to forward the same packet simultaneously, especially in networks with intensive traffic. Uncoordinated transmissions often incur a number of duplicate packets, which are further forwarded in the network, occupy the limited network resource, and hinder the packet delivery performance. Existing solutions to this issue, e.g., overhearing or coordination based approaches, either cannot scale up with the system size, or suffer high control overhead. We present Duplicate-Detectable Opportunistic Forwarding (DOF), a duplicate-free opportunistic forwarding protocol for low-duty-cycled wireless sensor networks. DOF enables senders to obtain the information of all potential forwarders via a slotted acknowledgment scheme, so the data packets can be sent to the deterministic next-hop forwarder. Based on light-weight coordination, DOF explores the opportunities as many as possible and removes duplicate packets from the forwarding process. We implement DOF and evaluate its performance on an indoor testbed with 20 TelosB nodes. The experimental results show that DOF reduces the average duplicate ratio by 90%, compared to state-of-the-art opportunistic protocols, and achieves 61.5% enhancement in network yield and 51.4% saving in energy consumption.

References

[1]
X. Mao, X. Miao, Y. He, X.-Y. Li, and Y. Liu, "Citysee: Urban CO2 monitoring with sensors," in Proc. IEEE INFOCOM, 2012, pp. 1611--1619.
[2]
L. Mo et al., "Canopy closure estimates with greenorbs: Sustainable sensing in the forest," in Proc. Sensys, 2009, pp. 99--112.
[3]
M. Ceriotti et al., "Is there light at the ends of the tunnel? Wireless sensor networks for adaptive lighting in road tunnels," in Proc. IPSN, 2011, pp. 187--198.
[4]
X. Wu, M. Liu, and Y. Wu, "In-situ soil moisture sensing: Optimal sensor placement and field estimation," Trans. Senor Netw., vol. 8, no. 4, p. 33, 2012.
[5]
J. Polastre, J. Hill, and D. Culler, "Versatile low power media access for wireless sensor networks," in Proc. Sensys, 2004, pp. 95--107.
[6]
M. Buettner, G. V. Yee, E. Anderson, and R. Han, "X-MAC: A short preamble MAC protocol for duty-cycled wireless sensor networks," in Proc. Sensys, 2006, pp. 307--320.
[7]
S. Biswas and R. Morris, "Exor: Opportunistic multi-hop routing for wireless networks," Comput. Commun. Rev., vol. 35, no. 4, pp. 133--144, 2005.
[8]
O. Landsiedel, E. Ghadimi, S. Duquennoy, and M. Johansson, "Low power, low delay: Opportunistic routing meets duty cycling," in Proc. IPSN, 2012, pp. 185--196.
[9]
S. Liu, K.-W. Fan, and P. Sinha, "CMAC: An energy-efficient MAC layer protocol using convergent packet forwarding for wireless sensor networks," Trans. Senor Netw., vol. 5, no. 4, pp. 29:1--29:34, 2009.
[10]
C. Szymon, J. Michael, K. Sachin, and K. Dina, "MORE: Network coding approach to opportunistic routing," MIT-CSAIL-TR-2006-049, 2006.
[11]
K. Srinivasan, M. A. Kazandjieva, S. Agarwal, and P. Levis, "The β-factor: Measuring wireless link burstiness," in Proc. Sensys, 2008, pp. 29--42.
[12]
M. H. Alizai, O. Landsiedel, J.Á. B. Link, S. Götz, and K. Wehrle, "Bursty traffic over bursty links," in Proc. Sensys, 2009, pp. 71--84.
[13]
D. S. De Couto, D. Aguayo, J. Bicket, and R. Morris, "A high-throughput path metric for multi-hop wireless routing," Wireless Netw., vol. 11, no. 4, pp. 419--434, 2005.
[14]
N. Cressie, "Fitting variogram models by weighted least squares," Math. Geol., vol. 17, no. 5, pp. 563--586, 1985.
[15]
P. Dutta, S. Dawson-Haggerty, Y. Chen, C.-J. M. Liang, and A. Terzis, "Design and evaluation of a versatile and efficient receiver-initiated link layer for low-power wireless," in Proc. Sensys, 2010, pp. 1--14.
[16]
Z. Cao, Y. He, and Y. Liu, "L2: Lazy forwarding in low duty cycle wireless sensor networks," in Proc. IEEE INFOCOM, 2012, pp. 1323--1331.
[17]
R. Fonseca, P. Dutta, P. Levis, and I. Stoica, "Quanto: Tracking energy in networked embedded systems," in Proc. OSDI, 2008, pp. 323--338.
[18]
O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, "Collection tree protocol," in Proc. Sensys, 2009, pp. 1--14.
[19]
Y. Gu and T. He, "Data forwarding in extremely low duty-cycle sensor networks with unreliable communication links," in Proc. Sensys, 2007, pp. 321--334.
[20]
X. Mao, X.-Y. Li, W.-Z. Song, P. Xu, and K. Moaveni-Nejad, "Energy efficient opportunistic routing in wireless networks," in Proc. MSWiM, 2009, pp. 253--260.
[21]
G. Schaefer, F. Ingelrest, and M. Vetterli, "Potentials of opportunistic routing in energy-constrained wireless sensor networks," in Wireless Sensor Networks. New York, NY, USA: Springer, 2009, pp. 118--133.
[22]
J. Lu and X. Wang, "Interference-aware probabilistic routing for wireless sensor networks," Tsinghua Sci. Technol., vol. 17, no. 5, pp. 575--585, 2012.
[23]
J. Kim, X. Lin, and N. Shroff, "Optimal anycast technique for delay-sensitive energy-constrained asynchronous sensor networks," in Proc. IEEE INFOCOM, 2009, pp. 612--620.
[24]
J. Kim, X. Lin, N. B. Shroff, and P. Sinha, "On maximizing the lifetime of delay-sensitive wireless sensor networks with anycast," in Proc. IEEE INFOCOM, 2008, pp. 807--815.

Cited By

View all
  • (2024)Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMORComputer Communications10.1016/j.comcom.2024.01.024217:C(57-69)Online publication date: 25-Jun-2024
  • (2023)SDORP: SDN Based Opportunistic Routing for Asynchronous Wireless Sensor NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2022.315869522:8(4912-4929)Online publication date: 1-Aug-2023
  • (2021)Trust aware routing using sunflower sine cosine-based stacked autoencoder approach for EEG signal classification in WSNJournal of High Speed Networks10.3233/JHS-21065427:2(101-119)Online publication date: 7-Jul-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking  Volume 24, Issue 2
April 2016
646 pages
ISSN:1063-6692
Issue’s Table of Contents

Publisher

IEEE Press

Publication History

Published: 01 April 2016
Published in TON Volume 24, Issue 2

Author Tags

  1. duplicate-detectable
  2. energy constraint
  3. low-duty-cycled
  4. opportunistic forwarding
  5. wireless sensor network

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMORComputer Communications10.1016/j.comcom.2024.01.024217:C(57-69)Online publication date: 25-Jun-2024
  • (2023)SDORP: SDN Based Opportunistic Routing for Asynchronous Wireless Sensor NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2022.315869522:8(4912-4929)Online publication date: 1-Aug-2023
  • (2021)Trust aware routing using sunflower sine cosine-based stacked autoencoder approach for EEG signal classification in WSNJournal of High Speed Networks10.3233/JHS-21065427:2(101-119)Online publication date: 7-Jul-2021
  • (2020)PortalProceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing10.1145/3397166.3409134(241-250)Online publication date: 11-Oct-2020
  • (2020)Adaptive Forwarding With Probabilistic Delay Guarantee in Low-Duty-Cycle WSNsIEEE Transactions on Wireless Communications10.1109/TWC.2020.298730819:7(4775-4792)Online publication date: 1-Jul-2020
  • (2020)Trust and Opportunity Based Routing Framework in Wireless Sensor Network Using Hybrid Optimization AlgorithmWireless Personal Communications: An International Journal10.1007/s11277-020-07579-6115:1(415-437)Online publication date: 1-Nov-2020
  • (2019)Exploiting Concurrency for Opportunistic Forwarding in Duty-Cycled IoT NetworksACM Transactions on Sensor Networks10.1145/332249615:3(1-33)Online publication date: 30-May-2019
  • (2019)Contention-Detectable Mechanism for Receiver-Initiated MACACM Transactions on Embedded Computing Systems10.1145/331768318:4(1-27)Online publication date: 10-Jun-2019
  • (2017)Improving transmission delay with sink location in low-duty-cycle wireless sensor networksInternational Journal of Ad Hoc and Ubiquitous Computing10.1504/IJAHUC.2017.08513025:4(213-224)Online publication date: 1-Jan-2017

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media