Assessment of common routing metrics for efficient RPL-based routing in large WSNs

Size: px
Start display at page:

Download "Assessment of common routing metrics for efficient RPL-based routing in large WSNs"

Transcription

1 Assessment of common routing metrics for efficient RPL-based routing in large WSs LAMBROS SARAKIS, STAMATIS VOLIOTIS, DIMITRIOS BARGIOTAS, THEODORE ZAHARIADIS Department of Electrical Engineering Technological Educational Institute of Sterea Ellada Psachna Evias, 344 GREECE {sarakis, svoliotis, bargiotas, Abstract: - The IPv6 routing protocol for low-power and lossy networks (RPL) is based on routing metrics to build communication paths between a source and the destination node. In this regard, the selection of the routing metric determines the path cost with respect to some performance indicator. In this paper, we consider a number of common metrics derived from the lexical composition of hop-count, expected transmission count and network-layer forwarding reliability, and assess their performance against two performance indicators. The first one evaluates the energy cost indicated by the expected number of frame transmissions (including hop-byhop retransmissions over unreliable links) needed for the successful delivery of data from the source to the sink in the presence of lossy links and non-fully cooperative relays. The second performance indicator assesses the cost of the constructed paths in terms of the achieved end-to-end throughput. We use simulation to evaluate the impact of the topological distance between source and destination nodes and draw conclusions which can be used for selecting such metrics for energy- and throughput-efficient RPL-based routing in large wireless sensor networks. Key-Words: - Routing metric, lexical metric composition, energy cost, throughput, large WS, simulation 1 Introduction Routing in Wireless Sensor etworks (WSs) has received considerable attention during the last fifteen years [1 3]. In this context, the earlier research efforts led to the introduction of numerous protocols for data-centric, hierarchical, locationbased and Quality of Service (QoS)-aware routing [1]. The majority of these protocols were designed with the goal to optimize data/information dissemination inside the network and did not aim to support (in an efficient manner) interoperability with external networks. However, the need to integrate WSs with the Internet gave impetus to a new research direction, that of providing WSs (and in general networks of constrained devices) with IP functionality and IP-based routing. These challenges have been addressed by the IETF which specified IPv6 over IEEE networks [4] and the RPL (IPv6 Routing Protocol for Low-Power and Lossy etworks) protocol [5]. (Another emerging effort involves the adaptation of the Ad hoc On- Demand Distance Vector (AODV) routing protocol to constrained mobile ad-hoc networks [6].) RPL constructs Directed Acyclic Graphs (DAGs) to route traffic from network devices towards a central control point inside the network that is called DAG root. To build the DAG, the protocol specifies the rules based on which every node selects its parent (next hop towards the root) among a possibly large set of neighbor nodes. RPL is a distancevector protocol and is, thus, based on routing metrics to compute a weight (cost) for a path interconnecting an origin and a destination node. To cover the diverse requirements imposed by different applications running on constrained networks, a set of primary link and node routing metrics (the term primary is used to discriminate from composite metrics which will be discussed below), as well as static or dynamic constraints that are suitable for RPL have been specified in [7]. The node metrics include energy and hop count, while the link metrics include throughput, latency and reliability (the latter can be quantified by the Expected Transmission Count (ETX) or the Link Quality Level metrics). However, [7] does not preclude the use of other metrics or combinations of metrics. Examples of other routing metrics that can be used include [8] ETT (Expected Transmission Time), WCETT (Weighted Cumulative ETT), MIC (Metric of Interference and Channel-switching), RSSI ISB:

2 (Received Signal Strength Indication) and energyrelated metrics (like BAMER and GAMER [9]). In the development of routing metrics like the ones just presented, cooperation of the network nodes is usually taken for granted. However, full cooperation of nodes in WSs cannot be always assumed, especially in hostile environments or in cases where nodes may act selfishly in order to save resources. For example, in the case of network layer attacks [1], a malicious (i.e., non-fully cooperative) node may refuse to forward all or part of the received traffic towards the destination. To defend against routing attacks in WSs, an efficient approach is to let the network nodes establish trust relationships based on their expectation (trust) that their neighbors will sincerely cooperate on particular tasks (e.g. data forwarding) [11]. In other words, the routing protocol considers the trustworthiness of neighboring nodes as a metric for the selection of the routing path or the forwarding node. In contrast to the node or link metrics, this type of trustworthiness defines a network-layer routing metric. Two primary metrics can be combined in a lexical manner to produce composite metrics (there is also a second type of composition called additive composition which, however, is not relevant to the study presented in this paper). In this case, the primary metrics are prioritized and the candidate paths are first evaluated using the metric with the highest priority. If this procedure delivers more than one candidate paths (these paths will have equal weights; the weight values will depend on the first routing metric used) these paths will be evaluated against the metric with the lowest priority (second metric) and the lightest among these paths will be selected. For the formal definition and the properties of the composition of routing metrics, the interested reader is referred to [12]. In this paper, we consider a number of simple composite metrics that can be used in WS routing based on RPL, and assess their performance against two indicators of the quality of the constructed paths (performance metrics). The first performance metric evaluates the energy cost indicated by the expected number of frame transmissions (including hop-byhop retransmissions over unreliable links) needed for the successful delivery of data from the source to the sink. This metric was addressed in our previous works [13] and [14], where a routing metric, called TXPFI, was used to minimize this energy cost metric and deliver energy-efficient routing in RPLbased WSs. (This energy cost performance metric has been also studied in [9]) The second performance metric assesses the quality of the constructed paths in terms of the achieved end-toend (application-layer) throughput. For both metrics, we notably study the impact of the topological distance between source and destination nodes and we draw conclusions that can be used for selecting such routing metrics in large WSs. The routing metrics used in this paper are derived from the lexical composition of three primary routing metrics: Hop-Count (HC), ETX and forwarding reliability. In particular, the HC is a primary routing metric that is used to report the number of traversed nodes along the path. By minimizing the number of traversed nodes, the overall number of transmissions is expected to be minimized leading to the consideration that also the overall energy consumption and the packet latency are reduced. However, this is true only under the assumption of equally loaded and equally lossy links, which in general does not hold. The ETX on each link expresses the number of link layer transmissions (including retransmissions) required for the successful delivery of a message to the next-hop neighbor. Even if link layer losses are recovered by retransmission mechanisms, selecting lossy links results in high energy consumption and should be avoided. The successful delivery of a link layer frame is decided based on the reception of link layer acknowledgment. Based on ETX, the lossy links are distinguished irrespective of the cause of loss, e.g. physical layer causes or contention at the MAC layer. The last metric (following the terminology in [12], we call it Packet Forward Indication PFI) assesses the forwarding reliability of the constructed path taking into account the potential presence of malicious nodes. Since PFI can detect and minimize losses at the network layer caused by misbehaving nodes, it may be considered as a type of trust-related primary routing metric. PFI is evaluated as follows: each node, after transmitting a packet to a neighbor, enters the promiscuous mode and waits to listen whether the selected neighbor has actually forwarded its packet, thus building trust knowledge [15 17]. The remainder of the paper is organized as follows. In section 2 we formulate our problem, while in section 3 we provide the analysis of the performance metrics assessing energy cost and throughput. Section 4 presents simulation results evaluating the performance of the considered composite metrics in terms of energy cost and throughput. Finally, conclusions are provided in Section 5. ISB:

3 2 Problem Formulation The motivation for this work stems from observations presented in [13,14] on the performance of lexical combinations of the HC, ETX and PFI metrics with respect to an energy consumption metric that captures the number of link-layer (L2) frame transmissions needed for the successful delivery of a packet from the WS source to the destination (we elaborate on this metric in sub-section 3.1). Those composite metrics, by not being specifically designed to minimize this energy cost, performed worse than the metric that was explicitly designed for this purpose. However, the results showed that the lexical combination of ETX and PFI clearly outperformed the other lexical metrics in a variety of simulation settings and, notably, delivered close-to-optimal results in settings with a relatively small number of hops (e.g., 5) between the source and the destination nodes. Based on these observations, we formulate our problem as follows: given a representative set of routing metrics derived from the lexical combinations of the (commonly used) primary metrics HC, ETX and PFI, a) how is the metrics performance with respect to energy cost related with the metrics performance with respect to throughput, and b) are the conclusions drawn from the comparison of the performance of the metrics for small network topologies still valid for large networks? 3 Performance Metric Analysis In this section we present the analysis of the performance metrics evaluating the energy cost and the achieved end-to-end throughput. 3.1 Analysis of the performance metric assessing energy cost The goal of any routing protocol is to establish a communication path between the source and the destination nodes. Figure 1 shows such a path interconnecting the source and the destination nodes (s and d, respectively) through relay nodes (traffic forwarders f i, i = 1 ) and + 1 lossy links. A relay node i forwards a received packet to the next node with probability p i f. The forwarding probability has been used to model the behavior of a node which drops packets due to congestion or deliberately does not always cooperate in the packet forwarding process (for example, it may represent a network attacker or a node acting selfishly in order to save energy resources that would be otherwise spent for the packet forwarding). Every link between two nodes is characterized by an ETX value, ETX i, which represents the average number of L2 frame transmissions (including retransmissions) that are needed for the delivery of a packet to the destination end of the link. s Fig. 1. A path interconnecting a source and a sink node. Regarding the model for the communication between the source and sink nodes, it is assumed that these nodes rely on an end-to-end (e.g. TCPlike) transport mechanism ensuring that data packets are delivered to the sink. According to this mechanism, if a packet is dropped at a network node before reaching the sink, the packet will be retransmitted by the source node (this retransmission is different form L2 frame retransmission taking place because of the lossy nature of the link). It is further assumed that the reception of a packet by the sink node is signaled back to the source through an acknowledgement message transmitted over a reverse loss-free communication path. Based on the modeling approach just described, the formula for the expected number of frame transmissions (including hop-by-hop retransmissions over unreliable links) needed for the successful delivery of one packet from the source to the sink reads [13] ECM p f 1 f 1 = ETX 1 + p f 1 ETX p f i ETX +1. (1) f p i Since in WSs data transmission involves, in general, greater power consumption than data reception or processing, (1) can be used for a performance metric assessing energy cost in such networks. In the following, we will refer to this metric as Energy Cost Metric (EMC). Larger values of ECM correspond to worse performance since they involve more energy consumption for the delivery of a packet from the source to the destination. The minimum value of ECM is 1 and is obtained when the source and the sink are zero hops away and communicate through a non-lossy link. p f 2 f 2 p f ETX 1 ETX 2 ETX+1... f d ISB:

4 3.2 Analysis of the performance metric assessing throughput Assuming that the source and the destination nodes communicate through a mechanism which ensures reliability through the use of acknowledgements (implemented either at the transport layer or as part of the application) and that every information item sent by the source is included in a single packet (as is the case for periodic measurements of some e.g. environmental quantity), the rate at which a saturated source (i.e., a source that has always data to send) can transmit information is 1 packet every Round Trip Time (RTT). This rate is achieved when the time-out value used in the sender (for deciding whether the last transmitted packet should be sent again) equals the RTT. If the communication link between the sender and the receiver is lossy, the useful throughput (i.e., goodput) is approximated by p f i Goodput = RTT, where 1 is the end-to-end packet loss probability. The RTT is comprised of the one-way delay at the forward and the one-way delay at the reverse path. Following a common assumption that the links are symmetric and ignoring components of delay such as processing at the intermediate nodes, delay for medium access and delays due to possible congestion, we may define the following metric (Throughput Metric TM) as a representative indicator of the path s useful throughput p i f f TM = p i +1. (2) ETX i Equation (2) can be used to derive an approximation of the (useful) throughput when the one-way delay is dominated by the time spent for L2 frame transmissions (and retransmissions) over the links of the path. For two different metrics used for the calculation of paths between given source and sink nodes, the metric that delivers the path with the larger value of TM outperforms the other metric. The maximum value of TM is 1 and is obtained under the same conditions the ECM obtains its minimum value. In section 4, the TM (as well as the ECM) will be used to assess the throughput of the paths calculated by composite routing metrics derived from the lexical combination of a) ETX and PFI (Lex(ETX,PFI)), b) PFI and ETX (Lex(PFI,ETX), and c) HC and PFI (Lex(HC,PFI)). Each of these metrics selects paths according to different rules and, thus, affects the value of the TM performance indicator in different ways. The Lex(ETX,PFI) achieves paths with minimum ETX and, thus, it will mainly affect the denominator of (2). The Lex(PFI,ETX), on the other hand, calculates paths of maximum reliability and, thus, it will have a major impact on the numerator of (2). The Lex(HC,PFI) operates closer to the Lex(ETX,PFI) and it is anticipated that its performance will be more related to that of Lex(ETX,PFI) than to that of Lex(PFI,ETX). The following question then arises: what would be the baseline performance achieved by a simple routing metric which does not take into account either the reliability of the path or the transmission count? To calculate such a baseline performance we consider the HC primary routing metric as the sole metric used in the routing protocol. The metric calculates paths of minimum number of traversed nodes (and also of traversed links) and in case more than one such paths exist the selection among the candidates is done at random. In this case, we proceed to calculate the baseline performance as follows. For a source having a minimum topological distance from a destination ( in the following analysis is the number of traversed links) the selected path will consist of 1 relay nodes. We assume that the percentage of malicious relay nodes is p mal and that the forwarding probability of each i malicious node i is a random variable (r.v.) F m obtaining values in an interval [a i, b i ], a i, b i < 1. Then the (total) expectation of the r.v. F i, which is introduced to represent the forwarding probability of a relay node (irrespectively of whether the node is malicious or not), is given by E[F i ] = E[F i i is malicious] P{i is malicious} + E[F i i is not malicious] P{i is not malicious}. Since E[F i i is malicious] = E[F m i ] and E[F i i is not malicious] = 1, we get E[F i ] = 1 p mal (1 E[F m i ]). Then, assuming that the F m i are independent and identically distributed (i.i.d.) r.vs with expected value m Fm, we have ISB:

5 1 E [ F i ] = E[F i ] 1 = [1 p mal (1 m Fm )] 1. Similarly to the forwarding probability, the ETX of the link l, l = 1, is represented by a r.v. denoted by X l. The r.vs X l and F i are independent, and, thus, the expected value of the r.v. TM rv representing the throughput cost is given by E[TM rv ] = E [ 1 Fi X i 1 ] = E[ F i 1 ] E[ X i Assuming that the X l are i.i.d. r.vs with expected value m X, the following lower bound on the value of the throughput metric TM is obtained (using Jensen s inequality) and this value is used as the baseline performance E[TM rv ] TM baseline = [1 p mal(1 m Fm )] 1 m X. (3) 4 Performance Evaluation We use a custom simulation tool to evaluate the performance of the 3 lexical combinations of HC, PFI and ETX with respect to the performance metrics calculated from (1) and (2) in network settings which involve a distance-vector protocol (like RPL), lossy links and malicious nodes. The tool computes for the composite routing metrics the paths that would be used to forward traffic from the source to the sink node. We are particularly interested to apply the metrics discussed in this paper to the RPL protocol; for this purpose, the simulator implements a suitable variation of the distributed Bellman-Ford algorithm to take account of the composite metrics. In all simulations, the network consists of 4 nodes placed on a 2x2 grid topology. Each node located at the periphery of the grid has five one-hop neighbors except from the nodes located at the corners which have three neighbors. All the rest (inner) nodes have eight neighbors. Following the modeling approach presented in section 3 the links between nodes may be unreliable (in this case they have an ETX value greater than 1) and the routing paths may include malicious forwarders. In every simulation run, the network involves one destination node placed at a corner of the grid and one source node placed at the main diagonal of ]. the grid at various topological distances (number of hops) from the source. The rest of the nodes act as forwarders. The forwarders include both malicious and non-malicious nodes. The forwarding probabilities of the malicious nodes are obtained by getting samples from a uniform distribution in [.7, 1] and then setting the forwarding probability to the quantized probability value that is closer to the sample (we have specified five probability intervals with equal length, which gives a total of five discrete forwarding probability values). The ETX value of every link is obtained by sampling the uniform distribution in [1,4], and applying a quantization to the sample similar to the one just described (for ETX we specified six intervals of equal length, which gives a maximum ETX of 3.75). The quantizations are done in order to allow composite metrics that use the PFI or the ETX as first-priority metrics in a lexical combination to make also use of the second metric. (If the probability or the ETX values were not quantized, the probability of finding two or more paths of equal PFI or ETX values, in a network with many malicious nodes and long paths, would be very small.) The performance of the Lex(ETX,PFI), Lex(PFI,ETX) and Lex(HC,PFI) with respect to the ECM, for various distances (measured in minimum number of hops) between source and destination nodes and different levels of penetration of the malicious nodes, are shown in Fig. 2. The results (for each depicted point, the value is the average over 1 simulation runs) show that as the distance between the communicating nodes increases the energy cost increases and tends to follow an exponential increase for all metrics for distances larger than 8 hops (Fig. 2b). For relatively small distances (i.e., 2 and 5 hops) the Lex(ETX,PFI) and Lex(HC,PFI) metrics show comparable performance and clearly outperform Lex(PFI,ETX). This is mainly due to the fact that the selection of the most reliable path (achieved by Lex(PFI,ETX)), especially in cases where clear paths do exist (as is the case for 5% and 75% of malicious nodes), results in significant path stretching (increase of the number of hops) which negatively impacts the path s overall ETX and thus the energy cost metric ECM. ISB:

6 Average ECM Average ECM Average ECM Lex(PFI,ETX) 5 hops Lex(HC,PFI) 5 hops Lex(ETX,PFI) 5 hops Lex(PFI,ETX) 2 hops Lex(HC,PFI) 2 hops Lex(ETX,PFI) 2 hops Malicious odes (%) (a) Lex(ETX,PFI) 11 hops Lex(HC,PFI) 11 hops Lex(PFI,ETX) 11 hops Lex(ETX,PFI) 8 hops Lex(PFI,ETX) 8 hops Lex(HC,PFI) 8 hops Malicious odes (%) (b) Lex(ETX,PFI) 17 hops Lex(HC,PFI) 17 hops Lex(ETX,PFI) 14 hops Lex(HC,PFI) 14 hops Lex(PFI,ETX) 17 hops Lex(PFI,ETX) 14 hops Malicious odes (%) (c) Fig. 2. Average Energy Cost Metric (ECM) for different topological distances between source and destination and different percentage of malicious nodes. Smaller values correspond to better performance. For a distance of 8 hops the performance of all composite metrics addressed in this study is similar. However, as the distance increases beyond 8 hops (which would be reasonable for large WSs), the difference in performance becomes more clear, especially for a large percentage of malicious forwarders. In such cases, some of the conclusions drawn previously for small distances (i.e., small networks) are not valid and the composite metric that gives priority to reliability (i.e., the Lex(PFI,ETX) metric) achieves constantly better performance than the metrics that strive to minimize the number of hops or the total ETX of the path (Fig. 2c). Furthermore, the rate of ECM increase for Lex(PFI,ETX) is lower than that of the other metrics and, notably, Lex(PFI,ETX) for 17 hops even outperforms Lex(ETX,PFI) and Lex(HC,PFI) for 14 hops (Fig. 2c). A first explanation we can give for this behavior is that the variability of the reliability of the candidate paths is proportionally larger than the variability of the paths ETX and since Lex(PFI,ETX) selects the path with maximum reliability (i.e. largest deviation from the average value) it delivers lower values of ECM, as the ETXs affect the numerators of the factors of (1) while the reliability affects the denominators of the factors of (1). The observations regarding the ECM are generally reflected to the observations stemming from the comparison of the metrics performance with respect to the TM. The performance according to TM is depicted in Fig. 3, where we have also included the baseline performance TM baseline obtained by utilizing the HC as the sole routing metric (the baseline performance is given by (3) and is illustrated with the Lower Bound LB legend in the figure). The results show that as the distance increases, the throughput achieved by each metric (which is proportional to TM) decreases. For a minimum distance of 2 hops, the Lex(PFI,ETX) metric achieves the lowest performance (this observation is in line with the observation from Fig. 2a), which, for large percentage of malicious nodes (approximately above 35%), is even lower from the baseline performance. However, for minimum distances of 5 hops and above the routing metric gradually achieves increasingly better performance compared to Lex(ETX,PFI) and Lex(HC,PFI). This observation holds even in cases the Lex(PFI,ETX) is used in settings which involve a topological distance between source and destination which is larger than that considered for the calculation of paths according to Lex(ETX,PFI) and Lex(HC,PFI). (For example, Fig. 3c illustrates that Lex(PFI,ETX) for a minimum distance of 17 hops achieves better throughput than Lex(ETX,PFI) or Lex(HC,PFI) for 14 hops.) ISB:

7 Average TM Lex(ETX,PFI) 2 hops Lex(HC,PFI) 2 hops Lex(ETX,PFI) 5 hops Lex(HC,PFI) 5 hops Lex(PFI,ETX) 2 hops LB for HC metric (2 hops) Lex(PFI,ETX) 5 hops LB for HC metric (5 hops) different percentage of malicious nodes. Larger values correspond to better performance. The Lex(ETX,PFI) and Lex(HC,PFI) achieve comparable performance in most of the settings, with Lex(ETX,PFI) achieving a slightly better throughput in cases of small penetration of malicious nodes. As a final remark, we note that in all cases the performance of Lex(HC,PFI) is almost indistinguishable from the baseline performance (based only on the use of the HC metric)..6 Average TM Average TM Lex(ETX,PFI) 8 hops Lex(HC,PFI) 8 hops Lex(ETX,PFI) 11 hops Lex(HC,PFI) 11 hops Malicious odes (%) (a) Malicious odes (%) (b) Lex(ETX,PFI) 14 hops Lex(HC,PFI) 14 hops Lex(ETX,PFI) 17 hops Lex(HC,PFI) 17 hops (c) Lex(PFI,ETX) 8 hops LB for HC metric (8 hops) Lex(PFI,ETX) 11 hops LB for HC metric (11 hops) Lex(PFI,ETX) 14 hops LB for HC metric (14 hops) Lex(PFI,ETX) 17 hops LB for HC metric (17 hops) Malicious odes (%) Fig. 3. Average Throughput Metric (TM) for different topological distances between source and destination and 5 Conclusion In WSs with lossy links and non-fully cooperative nodes, calculating routing paths of minimum energy cost and maximum end-to-end throughput is a challenging task. In this paper, we compared the performance of simple composite routing metrics that can be used in RPL-based routing in WSs against two performance indicators that assess energy cost indicated by the expected number of frame transmissions needed for the successful delivery of data from the source to the sink, and achieved end-to-end throughput. The simulation results showed that in WSs with lossy links, nonfully cooperative relays and small topological distances between the source and the destination, metrics that rely primarily on the number of traversed nodes or the link quality outperform the metric that computes paths mainly according to the forwarding reliability of the relay nodes. On the contrary, routing based primarily on the forwarding reliability achieves significantly better performance in WSs with distant sources. These conclusions can be used for selecting such metrics for energyand throughput-efficient RPL-based routing in WSs. Acknowledgment: This research has been cofinanced by the European Union (European Social Fund ESF) and Greek national funds through the Operational Program Education and Lifelong Learning of the ational Strategic Reference Framework (SRF) - Research Funding Program ARCHIMEDES III Investing in knowledge society through the European Social Fund, sub-project 8 TROLLS. References: [1] K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor networks, ISB:

8 Elsevier Journal of Ad Hoc etworks, vol. 3, no. 3, May 25, pp [2] E. Alotaibi, and B. Mukherjee, A survey on routing algorithms for wireless Ad-Hoc and mesh networks, Computer etworks, vol.56, no.2, February 212, pp [3]. Tekbiyik, and E. Uysal-Biyikoglu, Energy efficient wireless unicast routing alternatives for machine-to-machine networks, Journal of etwork and Computer Applications, vol.34, no.5, September 211, pp [4] G. Montenegro,. Kushalnagar, J. Hui, D. Culler, Transmission of IPv6 Packets over IEEE etworks, IETF RFC 4944, September 27. [5] T. Winter, P. Thubert (Eds.), RPL: IPv6 Routing Protocol for Low-Power and Lossy etworks, IETF RFC 655, March 212. [6] T. Clausen et al., The Lightweight Ondemand Ad hoc Distance-vector Routing Protocol ext Generation (LOADng), IETF Internet-Draft draft-clausen-lln-loadng-12, October 214. [7] JP. Vasseur, M. Kim (Eds.), Routing Metrics Used for Path Calculation in Low-Power and Lossy etworks, IETF RFC 6551, March 212. [8] G. Parissidis, M. Karaliopoulos, R. Baumann, T. Spyropoulos, and B. Plattner, Routing metrics for Wireless Mesh etworks, S. Misra et al. (eds.), Guide to Wireless Mesh etworks, Computer Communications and etworks, Springer, 29, pp [9] Q. Dong, S. Banerjee, M. Adler, and A. Misra, Minimum energy reliable paths using unreliable wireless links, in Proceedings of ACM MobiHoc (25), Urbana-Champaign, Illinois, USA, pp [1] B. Kannhavong, H. akayama, Y. emoto,. Kato, and A. Jamalipour, A survey of routing attacks in mobile ad hoc networks, IEEE Wireless Communications, vol. 14, no. 5, 27, pp [11] J.H. Cho, A. Swami, and I.R. Chen, A survey on trust management for mobile ad hoc networks, IEEE Communications Surveys & Tutorials PP (99) (21), pp [12] T.H.. Velivasaki, P. Karkazis, Th. V. Zahariadis, P. T. Trakadas, and Ch.. Capsalis, Trust-aware and link-reliable routing metric composition for wireless sensor networks, Transactions on Emerging Telecommunications Technologies, Wiley, October 212. [13] P. Karkazis, I. Papaefstathiou, L. Sarakis, Th. Zahariadis, T.-H. Velivassaki, and D. Bargiotas, Evaluation of RPL with a Transmission Count-Efficient and Trust-Aware Routing Metric, in Proc. 214 IEEE International Conference on Communications (ICC), Sydney, Australia, June 214, pp [14] L. Sarakis, H. C. Leligou, P. Karkazis, T.H. Velivassaki, T. Zahariadis, Evaluation of a Transmission Count-Efficient Metric for Energy-Aware Routing in WSs, in Proc. of the International Conference on Telecommunications and Multimedia (TEMU), Heraklion, Greece, July 214, pp [15] T. Zahariadis, H. Leligou, P. Trakadas, S. Voliotis, Trust management in wireless sensor networks, European Transaction on Telecommunications, vol. 21, no. 4, April 21, pp [16] F. G. Marmol, G. M. Perez, Providing trust in wireless sensor networks using a bio-inspired technique, Telecommunication Systems, vol. 46, no. 2, 21, pp [17] Y. Sun, Z. Han, K.J.R. Liu, Defense of trust management vulnerabilities in distributed networks, IEEE Communications Magazine, vol. 25, no. 2, February 28, pp ISB:

Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks

Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks Panagiotis Karkazis, Panagiotis Trakadas, Helen C. Leligou 3, Lambros Sarakis 3, Ioannis Papaefstathiou,

More information

Routing over Low Power and Lossy Networks

Routing over Low Power and Lossy Networks outing over Low Power and Lossy Networks Analysis and possible enhancements of the IETF PL routing protocol Enzo Mingozzi Associate Professor @ University of Pisa e.mingozzi@iet.unipi.it outing over LLNs

More information

Study of RPL DODAG Version Attacks

Study of RPL DODAG Version Attacks Study of RPL DODAG Version Attacks Anthéa Mayzaud anthea.mayzaud@inria.fr Rémi Badonnel Isabelle Chrisment Anuj Sehgal s.anuj@jacobs-university.de Jürgen Schönwälder IFIP AIMS 2014 Brno, Czech Republik

More information

Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks

Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks Panagiotis Karkazis, Panagiotis Trakadas, Helen C. Leligou, Lambros Sarakis, Ioannis Papaefstathiou

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Expanding Ring Search for Route Discovery in LOADng Routing Protocol Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Enhancing Routing Protocol for Low Power and Lossy Networks

Enhancing Routing Protocol for Low Power and Lossy Networks Enhancing Routing Protocol for Low Power and Lossy Networks John Abied Hatem, Haidar Safa, and Wassim El-Hajj Department of Computer Science American University of Beirut Beirut, Lebanon Email: jmh8@mail.aub.edu;

More information

Available online at ScienceDirect. Procedia Computer Science 87 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 87 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 87 (2016 ) 270 274 4th International Conference on Recent Trends in Computer Science & Engineering Analysis of Routing

More information

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks High-Throughput Multicast Routing Metrics in Wireless Mesh Networks Sabyasachi Roy Dimitrios Koutsonikolas Saumitra Das Y. Charlie Hu TR-ECE-05-7 September, 2005 School of Electrical and Computer Engineering

More information

forward packets do not forward packets

forward packets do not forward packets Power-aware Routing in Wireless Packet Networks Javier Gomez, Andrew T. Campbell Dept. of Electrical Engineering Columbia University, N 10027, USA Mahmoud Naghshineh, Chatschik Bisdikian IBM T.J. Watson

More information

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,

More information

Balanced Load Sharing Protocol for Wireless Sensor Networks

Balanced Load Sharing Protocol for Wireless Sensor Networks Balanced Load Sharing Protocol for Wireless Sensor Networks Maytham Safarª, Rabie Al-Mejbas b ªCollege of Engineering and Petroleum Kuwait University, Kuwait State ªE-mail: maytham@me.com, b mejbas@hotmail.com

More information

Internet Engineering Task Force (IETF) Category: Standards Track. September The Minimum Rank with Hysteresis Objective Function

Internet Engineering Task Force (IETF) Category: Standards Track. September The Minimum Rank with Hysteresis Objective Function Internet Engineering Task Force (IETF) Request for Comments: 6719 Category: Standards Track ISSN: 2070-1721 O. Gnawali University of Houston P. Levis Stanford University September 2012 The Minimum Rank

More information

This is a repository copy of Congestion-aware RPL for 6L0WPAN networks.

This is a repository copy of Congestion-aware RPL for 6L0WPAN networks. This is a repository copy of Congestion-aware RPL for 6LWPAN networks. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/365/ Version: Accepted Version Proceedings Paper: Al-Kashoash,

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5

Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5 Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5 Nallamalla Anusha Department of Computer Science and Engineering Baba Institute of Technology and Sciences, Visakhapatnam, Andhra Pradesh-

More information

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS Pardeep Saini* Computer sci. & engg. & YIET Ravinder Chouhan Computer sci.engg. & YIET Abstract - An adhoc network is a collection of

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Quantitative Analysis and Evaluation of RPL with Various Objective Functions for 6LoWPAN

Quantitative Analysis and Evaluation of RPL with Various Objective Functions for 6LoWPAN Indian Journal of Science and Technology, Vol 8(19), DOI: 10.17485/ijst/2015/v8i19/76696, August 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Quantitative Analysis and Evaluation of RPL with

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Comparison of Routing Metrics for Wireless Mesh Networks

Comparison of Routing Metrics for Wireless Mesh Networks Comparison of Routing Metrics for Wireless Mesh Networks S.L. Nxumalo 1,2, M.O. Adigun 1, P. Mudali 1,2, N. Ntlatlapa 2, S.M. Ncanana 1 Department of Computer Science University of Zululand 1, P. O. Box

More information

A Depth First Forwarding (DFF) Extension for the LOADng Routing Protocol

A Depth First Forwarding (DFF) Extension for the LOADng Routing Protocol A Depth First Forwarding (DFF) Extension for the Routing Protocol Thomas Clausen, Jiazi Yi, Antonin Bas Laboratoire d Informatique (LIX) Ecole Polytechnique, France Thomas@ThomasClausen.org, jiazi@jiaziyi.com,

More information

Detection of Wormhole Attacks in Wireless Sensor Networks

Detection of Wormhole Attacks in Wireless Sensor Networks Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics

More information

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

An Adaptive Self-Organization Protocol for Wireless Sensor Networks An Adaptive Self-Organization Protocol for Wireless Sensor Networks Kil-Woong Jang 1 and Byung-Soon Kim 2 1 Dept. of Mathematical and Information Science, Korea Maritime University 1 YeongDo-Gu Dongsam-Dong,

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

The P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments

The P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments The P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments Emmanuel Baccelli, Matthias Philipp INRIA Saclay, France E-mail: name.lastname@inria.fr Mukul Goyal UWM, USA E-mail: mukul@uwm.edu

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Performance Evaluation of RPL Objective Functions

Performance Evaluation of RPL Objective Functions See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/281377239 Performance Evaluation of RPL Objective Functions CONFERENCE PAPER OCTOBER 2015 READS

More information

Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle

Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle 24 IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.12, December 212 Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle Jeehoon Lee*, Jongsoo Jeong,

More information

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2012

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2012 Internet Engineering Task Force (IETF) J. Hui Request for Comments: 6553 JP. Vasseur Category: Standards Track Cisco Systems ISSN: 2070-1721 March 2012 The Routing Protocol for Low-Power and Lossy Networks

More information

Opportunistic RPL for Reliable AMI Mesh Networks

Opportunistic RPL for Reliable AMI Mesh Networks Noname manuscript No. (will be inserted by the editor) Opportunistic RPL for Reliable AMI Mesh Networks Sedat Gormus Filippo Tosato Zhong Fan Zubeir Bocus Parag Kulkarni Received: date / Accepted: date

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Designing Optimized Scheduling QoS-Aware RPL for Sensor- Based Smart Grid Communication Network

Designing Optimized Scheduling QoS-Aware RPL for Sensor- Based Smart Grid Communication Network Journal of Computer and Knowledge Engineering, Vol. 1, No. 1. DOI: 10.22067/cke.v1i2.60500 Designing Optimized Scheduling QoS-Aware RPL for Sensor- Based Smart Grid Communication Network Mohammad Alishahi,

More information

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Dr. Mohammed Ahmed Abdala, Mustafa Hussein Jabbar College of Information Engineering, Al-Nahrain University,

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

An analysis of retransmission strategies for reliable multicast protocols

An analysis of retransmission strategies for reliable multicast protocols An analysis of retransmission strategies for reliable multicast protocols M. Schuba, P. Reichl Informatik 4, Aachen University of Technology 52056 Aachen, Germany email: marko peter@i4.informatik.rwth-aachen.de

More information

A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization

A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization Víctor M. Aragón, Ignacio de Miguel, Ramón J. Durán, Noemí Merayo, Juan Carlos Aguado, Patricia Fernández,

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY

ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY L. Donckers, P.J.M. Havinga, G.J.M. Smit, L.T. Smit University of Twente, department of Computer Science, PO Box 217, 7 AE Enschede, the Netherlands

More information

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK P.M.Shareefa Jareena *1, T.Samraj Lawrence #2, and V.Perathu Selvi #3 * Student, Dept of CSE (SNW), Francis Xavier Engineering

More information

On the Interdependence of Congestion and Contention in Wireless Sensor Networks

On the Interdependence of Congestion and Contention in Wireless Sensor Networks On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA

More information

Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks

Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks Punit Rathod 1, Nirali Mody 1, Dhaval Gada 1, Rajat Gogri 1, Zalak Dedhia 1, Sugata Sanyal 2 and Ajith Abraham 3 1 Mumbai University,

More information

Cross-Layer QoS Support in the IEEE Mesh Network

Cross-Layer QoS Support in the IEEE Mesh Network Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Adaptive Packet Size Control for Bulk Data Transmission in IPv6 over Networks of Resource Constrained Nodes

Adaptive Packet Size Control for Bulk Data Transmission in IPv6 over Networks of Resource Constrained Nodes Packet Size Control for Bulk Data Transmission in IPv6 over Networks of Resource Constrained Nodes Yang Deng, Zhonghong Ou, and Antti Ylä-Jääski Aalto University, Espoo, Finland {yang.deng,zhonghong.ou,antti.yla-jaaski}@aalto.fi

More information

This is the author s final accepted version.

This is the author s final accepted version. Alayed, W., Mackenzie, L. and Pezaros, D. (2018) Evaluation of RPL s Single Metric Objective Functions. In: 10th IEEE International Conference on Internet of Things (ithings-2017), Exeter, England, UK,

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

New Trust Metric for RPL Routing Protocol

New Trust Metric for RPL Routing Protocol New Trust Metric for RPL Routing Protocol Nabil Djedjig, Djamel Tandjaoui Faiza Medjek, Imed Romdhani Research Center on Scientific and Technical Information-CERIST, 03, Rue des Frres Aissou, Ben Aknoun,

More information

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze 80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that

More information

Trust and Energy-aware Routing Protocol for Wireless Sensor Networks

Trust and Energy-aware Routing Protocol for Wireless Sensor Networks Trust and Energy-aware Routing Protocol for Wireless Sensor Networks Laura Gheorghe, Răzvan Rughiniș, Nicolae Țăpuș Department of Computer Science and Engineering University Politehnica of Bucharest Bucharest,

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Factors Affecting the Performance of Ad Hoc Networks

Factors Affecting the Performance of Ad Hoc Networks Factors Affecting the Performance of Ad Hoc Networks Dmitri D. Perkins, Herman D. Hughes, and Charles B. Owen Department of Computer Science and Engineering Michigan State University East Lansing, MI 88-6

More information

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks 1 T.R.Gopalakrishnan Nair (SM-IEEE), 2 R. Selvarani, 3 Vaidehi M. 1 Director Research & Industry

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Mitigating Malicious Activities by Providing New Acknowledgment Approach Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

An efficient traffic management framework for multi-channel wireless backbone networks

An efficient traffic management framework for multi-channel wireless backbone networks An efficient traffic management framework for multi-channel wireless backbone networks Yuzo Taenaka 1a) and Kazuya Tsukamoto 2 1 Information Technology Center, The University of Tokyo 2 11 16 Yayoi, Bunkyo,

More information

Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection

Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection Kin Choong Yow School of Computer Engineering Nanyang Technological University Nanyang Avenue,

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

A Survey on Path Weight Based routing Over Wireless Mesh Networks

A Survey on Path Weight Based routing Over Wireless Mesh Networks A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi

More information

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing

More information

ENSC 427: COMMUNICATION NETWORKS

ENSC 427: COMMUNICATION NETWORKS ENSC 427: COMMUNICATION NETWORKS Simulation of ZigBee Wireless Sensor Networks Final Report Spring 2012 Mehran Ferdowsi Mfa6@sfu.ca Table of Contents 1. Introduction...2 2. Project Scope...2 3. ZigBee

More information

Proposal of interference reduction routing for ad-hoc networks

Proposal of interference reduction routing for ad-hoc networks Proposal of interference reduction routing for ad-hoc networks Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering, Mie University, 577 Kurimamachiya, Tsu,

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network G.Premalatha 1, T.K.P.Rajagopal 2 Computer Science and Engineering Department, Kathir College of Engineering

More information

On QoS Mapping in TDMA Based Wireless Sensor Networks

On QoS Mapping in TDMA Based Wireless Sensor Networks On QoS Mapping in TDMA Based Wireless Sensor Networks Wassim Masri and Zoubir Mammeri IRIT Paul Sabatier University Toulouse, France {Wassim.Masri, Zoubir.Mammeri}@irit.fr Abstract Recently, there have

More information

High-throughput multicast routing metrics in wireless mesh networks

High-throughput multicast routing metrics in wireless mesh networks Ad Hoc Networks xxx (2007) xxx xxx www.elsevier.com/locate/adhoc High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, Y. Charlie Hu

More information

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically

More information

Intended status: Informational. October 22, Requirements for Scalable DNS-SD/mDNS Extensions draft-lynn-dnssd-requirements-00

Intended status: Informational. October 22, Requirements for Scalable DNS-SD/mDNS Extensions draft-lynn-dnssd-requirements-00 DNS-SD/mDNS Extensions Internet-Draft Intended status: Informational Expires: April 25, 2014 K. Lynn, Ed. Consultant S. Cheshire Apple, Inc. October 22, 2013 Requirements for Scalable DNS-SD/mDNS Extensions

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

' INRIA Rocquencourt, Domaine de Voluceau

' INRIA Rocquencourt, Domaine de Voluceau OPTIMIZED FLOODING AND INTERFERENCE-AWARE QOS ROUTING IN OLSR* Dang Quan ~ ~ u ~ and e n Pascale ' ~inet' ' INRIA Rocquencourt, Domaine de Voluceau Rocquencourt - B.P 105 78153 Le Chesnay Cedex, France

More information

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com PERFORMANCE ANALYSIS FOR WIRELESS MESH NETWORK CONSIDERING DIFFERENT CLIENT DISTRIBUTION PATTERNS S.Dhivya #1,

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information