Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks

Size: px
Start display at page:

Download "Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks"

Transcription

1 Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks Hannes Frey Universität Paderborn Department of Computer Science Computer Networks Group Pohlweg 47-49, Paderborn, Germany Matthias Hollick, Adrian Loch Technische Universität Darmstadt Department of Computer Science Secure Mobile Networking Lab (SEEMOO) Mornewegstr. 32, Darmstadt, Germany Abstract Localized geographic routing schemes operating on planar graphs promise scalability for use within large multihop wireless networks. Existing schemes base routing path construction on faces defined by the planar graph. Once running on a particular planar graph, none of the existing schemes is flexible enough to adapt the sequence of faces visited by the constructed path. Thus, real-world constraints such as network congestion, limited node energy levels, or noncooperation of nodes might severely impact the performance and the robustness of existing planar graph routing variants. To address this problem, we extend planar graph routing with one further degree of freedom: control over the sequence of visited faces. Basically, our face routing extension now follows a sequence of faces intersected by any curve we can freely adjust. We investigate basic schemes for choosing curves dealing with imperfections in the network, and derive algorithms for routing and forwarding along these curves. We analytically prove that our scheme is loop free and allows for guaranteed delivery in arbitrary planar connected graphs. We implement curve-based routing and show its feasibility by means of a simulation study. As a proof-of-concept scenario, we investigate the case of noncooperating nodes. Our results show that curve-based routing is able to sustain the delivery of packets where traditional schemes fail. Keywords-Algorithms, network protocols, wireless multihop networks, localized routing, delivery guarantees I. INTRODUCTION Geographic routing schemes that operate on local state information have been proposed to meet the challenge of scalable routing within large-scale multihop wireless networks. By utilizing local state, these schemes avoid costly exchange of routing updates, which helps conserving the limited bandwidth of wireless environments. Instead of pinpointing a node s position in the network via an IP address, geolocation serves as a location identifier and allows to forward packets towards the intended destination. In fact, following a trivial approach, nodes without any knowledge about the rest of the network but their direct neighborhood can relay packets to neighboring nodes that present some positive progress towards the destination in terms of geographical distance. This allows for scalable operation within large multihop wireless networks. However, the aforementioned purely localized approach cannot guarantee delivery, since local minima in the graph can lead to dead ends, for example, if a node has no neighbor which is closer to the destination than itself. Purely localized geographic algorithms can be beneficially combined with face routing [1], which uses the direct line connecting source and destination as a reference to escape from local minima. Its key concept is routing packets along faces, which are the polygons formed by the edges of a planar network graph. Face routing is confronted with a number of challenges if operating under realistic topology assumptions, as observed, for example, in realistic wireless mesh/sensor networks: Dynamic optimization such as interference-aware or congestion-aware routing cannot easily be realized. Usage of limited resources such as the energy of battery powered nodes cannot be balanced or optimized. Non-cooperative or misbehaving nodes can fatally affect the resiliency of the routing system. The above issues are particularly critical, since existing face routing schemes are non-adaptive, i.e., if the planar graph is not changing, the sequence of visited faces will always be the same. If by chance the face sequence passes a region that only allows for substandard and inferior service, the quality of the forwarding service is likewise. Even worse, adverse and hostile network conditions in certain parts of the network can disallow the packet forwarding entirely. Without additional mechanisms to control the visited face sequence, face routing is not able to deal with such challenges. In contrast, if the visited face sequence can be adjusted, nodes can adapt to the network conditions and deviate for instance from the direct line trajectory (which is the most popular approach so far) to optimize the routing performance w.r.t. certain network constraints. For example, if most of the traffic in a battery powered network always follows the same face sequence, energy depletion of the nodes on the route might lead to network partitioning. Having the freedom to adjust the sequence of visited faces, a node could send packets over an alternative path to avoid low energy regions /12$31.00 c 2012 IEEE

2 In this work we enhance localized routing schemes to follow global forwarding rules, while avoiding the inherent drawbacks of global routing schemes. In particular, we present an approach, which expands the concept of localized geographic routing by allowing curved trajectories between source and destination. Similar to conventional face routing, our scheme maintains its locality, because it only requires nodes to know about their immediate neighbors. At the same time, our scheme allows to exercise global control over the routing/forwarding path, since nodes can define end-toend trajectories that indirectly control which regions in the network to visit or to evade 1. By choosing different enough curves, packets follow different paths. Our contribution is the design of a curve-based, localized, geographic routing scheme for planar graphs 2. In particular, we design a robust algorithm based on face routing and give a rigorous mathematical definition of our scheme, which enables the source of a packet to define an arbitrary curve as an abstract trajectory. We prove that the curve-based planar graph routing is loop free and allows for guaranteed delivery of packets in planar graphs. While our routing mechanism is localized, defining the curve itself might require global knowledge. However, together with a global scheme, we also discuss a distributed strategy to find trajectories. As a proofof-concept, we implement curve-based planar graph routing and study its performance using simulation. In particular, we analyze the scenario of non-cooperative nodes. The remainder of this work is organized as follows. Section II is dedicated to related work and provides a short introduction to face routing. We define and mathematically formulate the basis for our scheme in Section III. The algorithms for curve-based routing are presented in Section IV, while in Section V, we prove that our scheme operates loopfree and can provide delivery guarantees. In Section VI we present our scenario for the proof-of-concept implementation. We further design and implement a system using curvebased routing in a network simulator. We study and analyze its performance in Section VII. Finally, Section VIII presents conclusions and an outlook on future work. II. RELATED WORK Using trajectories or just a sequence of anchor points to guide localized geographic routing has been considered in connection with geographic greedy routing so far [3], [4], [5]. Yet, none of the known approaches supports pure localized forwarding while providing delivery guarantees at the same time. In fact, existing localized schemes require mechanisms to recover from the well known greedy routing failure [6]. 1 In a sense, our curve-based routing can be seen as a form of geo-trafficengineering for multihop wireless networks. In contrast to the control and optimization of traditional traffic engineering, the focus is on controlling the traffic flow with respect to geographical areas that are impacting on the performance of the multihop wireless network. 2 A sketch of the idea has been presented as a poster at MASS 2011 [2]. Face routing is the only known general localized forwarding scheme to recover from greedy routing failure and to guarantee message delivery. It was first mentioned as Compass Routing II in [7] and was picked up and extended in many follow-up publications [1], [8], [9], [10], [11]. The main idea is to send packets along the interior of the faces formed by a planar drawing of the network topology. Packets visit the faces intersected by the straight line connecting source and destination. Traversing a single face is done by left or right hand traversal. The right hand rule is the same as if a person would walk on the interior of the face holding its right hand against its edges. The left hand rule is the same but using the left hand instead. Face routing and trajectory based forwarding has not been considered in combination so far. This is the contribution of this work. In this work we specify in detail a face routing variant to follow arbitrary trajectories, we technically proof its delivery guarantees, and we show an application example of this face routing extension. Deviating from a straight line has been briefly introduced in [12], yet following welldefined trajectories is not discussed. With that we extend and generalize the knowledge about face routing and the delivery guarantees rigorously studied in [6]. For all variants and also for the variant presented in this work, a planar graph is assumed, which means that the nodes of the graph are located on a plane and that the edges of the graph cross at most in their end points. However, usually the graph of a wireless network is not planar. Therefore, a previous step is necessary to planarize it. Arbitrary graphs can be transformed by the non-localized topology control scheme CLDP [13] into a (not necessarily planar) graph where face routing always succeeds. However, a localized topology control scheme to transform an arbitrary graph into one which supports face routing cannot exist. This is an immediate consequence of [14]. Such a negative result renders face routing useless at the first look. However, wireless networks are not arbitrary graphs, they have a local structure which has recently been exploited in [15]. In that work, it has been shown that in wireless networks it is possible to locally construct graphs which are planar with a very high probability. Simulations in realistic wireless graph models based on log-normal shadowing revealed actually a 100% probability. In this work we are not concerned about how a planar graph is constructed but what to make best of such graph once it is constructed. In the following we just assume any planar graph, though, we do not assume any further structural properties. III. NOTATIONS AND ASSUMPTIONS A. Geometric and Graph Notations We consider undirected graphs G = (V, E) with finite node sets. Two nodes s and t are said to be connected if there exists at least one path in G with end points s and t.

3 Each node in V is a point in 2D Euclidean space. For two points p and q we use p q to express the Euclidean distance between p and q. We say that G is planar if the edges in E intersect at most in their end points. p left right a q (a) Left and right of ab. b C 2 a b C 1 c (b) Cones of ab and ac. Figure 1: Definitions for straight lines. Given two points a and b, the straight line from a to b is denoted by ab. A point p is said to be located left of ab if the counter clockwise angle between ab and ap is less than 180. Otherwise, it is said to be located right. For example, in Fig. 1a point p is located left of ab and point q is located right. Two straight lines ab and ac with same origin a define two areas, one is the area defined by the clockwise angle from ab to ac and the other one defined by the counter clock wise one. We term both areas the cones defined by ab and ac. For example, in Fig. 1b the straight lines ab and ac define the cones C 1 and C 2. A special case occurs, when one of the angles between ab and ac is 0. In this case we consider however two cones, one being the entire R 2 and the other being just a line originating from a and passing through b, c. B. Continuous Curves A curve is a function f : [0,1] R 2. The value x in the expression is termed parameter. If we write we implicitly assume x [0,1]. A curve is continuous if for each x and ǫ > 0 there exists a δ > 0 such that x y δ implies f(y) ǫ. A continuous curve connects a source node s with a destination node t, if f(0) = s and f(1) = t. A curve intersects a line ab if there exists an x 0 such that f(x 0 ) is located on ab. Continuous curves obey the properties expressed in the following three lemmas. In the following, we take these properties for granted when defining our routing algorithm. Lemma 1: If a continuous curve intersects a straight line ab, then there exists a largest q 1 such that f(q) is located on ab. Proof: Let q = sup{x 1 : is located on ab}. We claim that q is the largest parameter such that f(q) is located on ab. We have to show that f(q) is located on ab and that f(q ) is not located on ab for all q > q. The latter is obvious. Otherwise, we would have the contradiction q < q sup{x 1 : is located on ab} = q. Assume for the sake of contradiction that f(q) is not located on ab. Let ǫ be the minimum distance between f(q) and ab. Since is continuous, there exists a δ > 0 such that f(q) f(y) ǫ/2 for all y with q y δ. Moreover, is not located on ab for all x > q. Thus, f(q δ +x) is not located on ab for all x 0. It follows: q = sup{x 1 : is located on ab} q δ, a contradiction. Lemma 2: Assume a continuous curve intersects a straight line ab. Consider the largest q such that f(q) is located on ab. If f(q) is not an end point of ab, then there exists a δ > 0 such that for all q < x < q +δ, all are located either on the left hand or the right hand side of ab. Proof: Without loss of generality assume that f(q) a f(q) b (the following arguments can be written the same way for the opposite case). Thus, changing the side of ab requires the curve starting at q to advance at least by f(q) a. Define ǫ = f(q) a /2. Since is continuous there exists a δ > 0 such that all x > q with x q δ satisfy f(q) ǫ < f(q) a. Thus, is located on one side of ab all these x. Lemma 3: Assume a continuous curve intersects two straight lines ab and ac which are originating from a. Consider the largest parameter q such that f(q) is located on ab or ac. If f(q) = a, then there exists a δ > 0 such that for all q < x < q+δ, all are located in one of the two cones defined by ab and ac. Proof: Without loss of generality assume that a b a c (the following arguments can be written the same way for the opposite case). Thus, changing the cone defined by ab and ac requires the curve starting at q to advance at least by a b. Define ǫ = a b /2. Since is continuous there exists a δ > 0 such that all x > q with x q δ satisfy a ǫ < a b. Thus, is located in one of the two cones defined by ab and ac for all these x. As a short hand notation of the facts derived with Lemma 2 and Lemma 3, we just speak of the initial part of is located left/right of ab for x > q and the initial part of is located in one cone for x > q, respectively. A. Formal Specification IV. ALGORITHM The main part of the curve assisted planar graph routing algorithm is shown in Alg. 1. It basically works as follows (refer to Fig. 2 for an example): The faces intersected by a continuous curve connecting source with destination node need to be traversed. The edges of a face are traversed until an intersection p of the curve with a face edge sv is found.

4 Algorithm 1 Curve-based planar graph routing. Require: start node s, destination node t. Ensure: message delivery if t reachable from s, message drop, otherwise. 1: set p = 0 and v = s. 2: repeat 3: find the largest q 1 such that f(q) is located on an edge vw E. 4: if f(q) = w for an edge vw E then 5: set node_rhr and node_lhr to w 6: else if f(q) = v then 7: find node_rhr and node_lhr with Alg. 3. 8: set p = q 9: else 10: find node_rhr and node_lhr with Alg : set p = q 12: end if 13: right/left hand traversal until one of the conditions hold destination node t is reached. visited node has outgoing link intersecting with for p < x 1. traversal start edge visited again in the same direction. 14: set v to the currently visited node. 15: until no more intersections found on current traversed face Three cases need to be considered: the intersection might regularly intersect sv at a point p s (see Fig. 3a), it might irregularly intersect at a point p = s (see Fig. 3b), or it might intersect the end point w of an outgoing link vw. For the latter case, the algorithm just forwards to w. For the other two cases, the next hop node and traversal rule selection are decided by Alg. 2 and 3, respectively. In both cases, traversal changes into the face intersected by the remaining part of the curve connecting the intersection f(p) with the destination t. Face traversal is determined by the values stored in node_rhr and node_lhr. They determine the next hop to be used when right hand or left hand rule is applied. The whole algorithm stops if the destination is visited or if no more intersections are found. B. Execution Example Consider Fig. 2 for an example of Alg. 1. Node s has a message to be sent to node t. The face sequence to follow is s v 3 q 3 v 1 q 1 q 2 q v 4 v 4 2 F 1 F 2 F 3 F 4 v 5 q 5 F 5 Figure 2: Curve-based face traversal. t Algorithm 2 Forwarding decision for regular intersections (see Fig. 3a). Require: forwarding node s, destination node t. Ensure: next hop nodes node_rhr and node_lhr for left or right hand traversal. 1: find largest q 1 such that f(q) is located on an edge sv E. 2: if is initially located left of sv for x > q then 3: let sw be the edge in counter clockwise direction of sv. 4: set node_rhr to v. 5: set node_lhr to w. 6: else 7: let sw be the edge in clockwise direction of sv. 8: set node_rhr to w. 9: set node_lhr to v. 10: end if determined by, depicted by the dashed curve. Node s sees only intersecting irregular with its outgoing links. Thus, Alg. 3 is used to determine the start edges for left or right hand traversal. Say left hand traversal is used. In this case, the message will be forwarded to v 1. At nodev 1 an intersection with is found again. Node v 1 finds intersecting regularly with its outgoing edges. It determines the largest parameter q 1 which satisfies that f(q 1 ) is located on an outgoing edge, v 1 v 2 in this case. The curve is initially located right of v 1 v 2 for x > q 1. Thus, with Alg. 2 v 1 v 2 becomes the start edge for left hand traversal. Edge v 1 s becomes the edge for right hand traversal. For the following assume that with each face change at regular intersections, we always follow the link which was intersected by. In this example we then follow the link v 1 v 2. At node v 2 we find intersecting with outgoing edges again. The latest intersection is at q 2, where f(q 2 ) lies on edge v 2 v 3. Alg. 2 determines that edge v 2 v 3 is to be followed with the right hand rule. At node v 3 face F 3 will then be followed by left hand rule until reaching node v 4. Here again an intersection of an edge with at q 4 > q 3 is found. Face F 4 is then Algorithm 3 Forwarding decision for irregular intersections (see Fig. 3b). Require: forwarding node s, destination node t. Ensure: next hop nodes node_rhr and node_lhr for left or right hand traversal. 1: find largest q 1 such that f(q) is located on s. 2: find edges sv and sw which define the smallest cone where is initially located in. 3: if counter clockwise angle from sv to sw is less than 180 then 4: set node_rhr to v. 5: set node_lhr to w. 6: else 7: set node_rhr to w. 8: set node_lhr to v. 9: end if

5 followed by right hand rule until arriving at node v 5. Here the last intersection is found at q 5 > q 4. Face F 5 is then traversed by left hand rule until arriving at the destination node t. w s f(q) v (a) Regular intersection. t w v s f(q) (b) Irregular intersection. Figure 3: Possible face traversal start cases. A. Loop Free Operation V. ANALYSIS Theorem 1: Curve-based planar graph routing is loop free. This holds even if it is applied in arbitrary not necessary planar graphs. Proof: Whenever in Alg. 1 an intersection of the remaining curve for x > p with an edge e is encountered, parameter p is advanced to a value q > p such that does not intersect with e for x > q. Thus, at each edge a traversal of a new face is started at most once. It follows, since G is finite, only a finite number of times a new face will be explored. Thus, a routing loop may occur only if the last face F is traversed infinitely. However, if F is traversed without further face changes, with Theorem 9 in [6], the traversal start edge e will eventually be traversed twice in the same direction again. Thus, Alg. 1 will stop at e and drop the message. B. Guaranteed Delivery s w f(q) F v (a) Initial curve located left. f(q) s v F w (b) Initial curve located right. Figure 4: Considering the initial part of the curve. Lemma 4: Let G be a planar graph and let t be reachable fromsing. Assume there exists a largestq such that f(q) is located on an edge sv. Assume f(q) s,v. When starting in s, face exploration according to the rule and first edge determined by Alg. 2 will always encounter an edge e which satisfies: there exists a q with q < q 1 such that f(q ) is located on e. t Proof: Assume for the sake of contradiction that no such intersection exists. Consider the case that is initially located left of sv for x > q (see Fig. 4a). With Alg. 2 face traversal will follow sv with right hand rule or sw with left hand rule. In both cases, the same face F is traversed. Moreover, is initially located inside F for x > q. When the boundary of the traversed face does not intersect the curve for x > p, the curve is located completely inside F for p < x 1. This follows immediately from the fact that is continuous. If we consider the case that is initially located right of sv for x > q (see Fig. 4b), it follows the same way that a single face F is traversed and that the curve is located completely in F for p < x 1. With t = f(1) we get for both cases that t is located inside the traversed face F. With Lemma 2 in [6] follows that there exists no path in G which connects t with a node on the boundary of F. Thus, t is not reachable from s, since s is on the boundary of F, a contradiction. Lemma 5: Let G be a planar graph and let t be reachable from s in G. Assume there exists a largest q such that f(q) is located on an edge sv. Assume f(q) = s. When starting in s, face exploration according to the rule and first edge determined by Alg. 3 will always encounter an edge e which satisfies: there exists a q with q < q 1 such that f(q ) is located on e. Proof: Assume for the sake of contradiction that no such intersection exists. For x > q, the initial part of is located inside the cone of the outgoing edges selected by Alg. 3. Let F be the face traversed according to the outgoing edge and rule determined by Alg. 3. When the boundary of the traversed face does not intersect the curve for x > p, the curve is located completely inside F for p < x 1. This follows immediately from the fact that is continuous. With f(1) = t follows that t is located in the interior of F. By Lemma 2 of [6], s and t can not reach each other, a contradiction. Theorem 2: Curve-based planar graph routing has guaranteed delivery as long it is applied on planar graphs. Proof: Let G be an arbitrary planar graph. Let s and t be source and destination nodes which are reachable in G. With Theorem 1 the message is either dropped or delivered after a finite number of forwarding steps. Assume for the sake of contradiction that the message is dropped. If the last visited face was selected due to the fact that intersected the end point w of an edge vw originating at the current forwarding node v, then Alg. 1 advances to w and selects a next face at w. If the last visited facef was selected due to Alg. 2, then by Lemma 4 a further face will be selected afterf. IfF was selected due to Alg. 3, then a further face will be selected due to Lemma 5. Thus,

6 in all cases we have a contradiction since the last face was already selected. VI. APPLICATION SCENARIO AND SYSTEM DESIGN We next demonstrate the feasibility of our scheme in a concrete application scenario and describe the design and implementation of a proof-of-concept system. A. Application Scenario Curve-based planar graph routing departs from the trivial line trajectory that existing face routing schemes employ. As a result, it introduces an additional degree of freedom, which allows to either circumvent, or force the visiting of, defined geographic zones in the network. Applications we envision include (1) to mitigate interference or congestion in the wireless network, (2) to balance load within the network to achieve fairness w.r.t. utilization of resources such as energy or bandwidth, and (3) to counteract non-cooperative or misbehaving nodes by avoiding the affected zones. For the proof-of-concept of our scheme, we have chosen scenario (3), i.e., the avoidance of misbehaving nodes in the network. Related work on robust operation of classical multihop wireless networks exists and mainly concentrates on cryptographically secure routing protocols as well as schemes to increase the robustness of the forwarding of data packets (see [16] for a survey on this topic). The avoidance of insecure areas in the network using geographic approaches has been studied in [17]; the proposed scheme GeoSec introduces so-called quarantine zones, which are excluded from the routing. However, GeoSec does not use the abstraction of curves to specify routing trajectories, but has been designed as an extension to traditional reactive routing protocols for multihop networks such as AODV. Within our application scenario, we assume the network to contain a number of malicious/non-cooperative nodes. For the special case of face routing, nodes could manipulate the graph topology, or they could simply drop all packets instead of forwarding them to the next node. For our discussion, we assume that the faces which contain at least one misbehaving node are potentially malfunctioning and need to be avoided by our routing. We assume that information about the areas to avoid is available in the network, for example, by means of an intrusion detection system. B. System and Protocol Design As described, our curve-based routing approach extends the original face routing variant [1] by allowing the trajectory to be an in principle arbitrary curve connecting source and destination. The curve is defined by the source according to a given policy and included in the header of each packet. Policies are derived from the application scenario; an exhaustive definition of possible policies is out of the scope of this work. For the chosen scenario, the policy could be prohibitive, i.e., specifying to evade areas with misbehaving nodes from any network traffic, or permitting, i.e., specifying to visit areas with trustworthy nodes. Trajectories can be coded by any parametric function from source to destination. In practice, this can be simplified by approximating the curve with a sequence of straight lines and including their end points in the header. The overhead depends on how detailed the curve is represented. To implement our curve-based routing, we investigate two main design alternatives: distributed and centralized. 1) Distributed Scheme: The first design alternative is a fully distributed scheme. Since no global information about the network status is available, this approach has to use a trial and error strategy to find a working curve. We implement a scheme that deviates from the straight line by choosing curves with stepwise increasing diameter as shown in Fig. 5a. For practical implementation, the source node needs some end-to-end feedback such as an acknowledgment (ACK) to know whether a packet has arrived or not. If ACKs are not received after a set interval of time, a retransmission is triggered. Note that such a packet resent on the original straight line would allow to deal with transient failures of the routing system, even without our curve-based extension. The latter is absolutely required in case of misbehaving nodes, though. Advantages of this distributed scheme are that it can operate as long as the source node itself is able to operate. Since it does not rely on any centralized components, it does not possess a single point of failure. 2) Centralized Scheme using Location Service: The second design alternative takes advantage of a central location service. Such centralized location services have been proposed for existing planar graph routing schemes to resolve the mapping between geographic coordinates and logical addresses of the destination nodes. In static networks, this information might be distributed in advance, but mobile environments require a reliable and dynamic location service 3. Access to the location service is necessary before sending a packet. We build on this and propose to piggyback information about the network status (trusted zones, insecure zones, etc.) when the service answers a location request. Thus, nodes obtain up-to-date information about challenged areas prior to sending a packet and can adapt the curve for the message accordingly, as shown in Fig. 5b. In our scheme, the location service instruments the network by collecting the network status gathered by the nodes. E.g., if a node detects a misbehaving neighbor in its direct vicinity, it sends an alert to the location service, which maintains a geo-referenced database of such information. 3) Implementation and Protocol Operation: We implemented both, the distributed and centralized approach. To allow for flexibility, we have chosen to include curve construction methods based on line segments, parabolic segments and Bézier segments for both approaches. 3 A location service can be seen as equivalent to a DNS service in an IP-based network, but translates names into geo-locations.

7 Table I: Overview on Experiments Section Experiment Objective Experiment Results VII-D Show if disallowed areas are evaded Areas are successfully avoided. Exp.(1) of traffic. A significant reduction of packet loss is observed. VII-E Compare the efficiency of distributed Centralized scheme has constant overhead, while overhead of Exp.(2) vs. centralized approach to define curve. distributed scheme increases with # of malicious nodes. For small # of malicious nodes, distributed scheme is more efficient. S (a) Distributed scheme. D S (b) Centralized scheme. Figure 5: Examples for curved paths. For the distributed scheme, the source node initiates the routing process using the direct line to the destination, it sends the packet and starts a timer. If it fails to receive an acknowledgment for a given timeout value, the source calculates a curved path with a predefined step size that marks the distance of the parabola from the center of the reference line. We alternate the curves from the left to the right of the reference line and increase the step size linearly, if still unsuccessful. Thus we explore alternate paths through the network (see Fig. 5a). For the centralized scheme, the source queries the location service and obtains directly the disallowed areas. For our proof-of-concept implementation, we chose a basic variant to implement this scheme. The disallowed areas are distributed arbitrarily in the simulation area and, thus, might overlap. In a first step, our algorithm aggregates all areas that overlap, which results in an independent set of area groups. In a second step, for the trajectory calculation, all area groups intersecting the straight line between both nodes are determined. Next, we calculate the convex hulls enclosing these area groups. Last, the trajectory is planned as straight line segments, which border the convex hulls. The design and evaluation of more advanced combinations of calculating curves under realistic assumptions is highly scenario dependent, and thus outside the scope of this paper. VII. PERFORMANCE EVALUATION In this section, by means of simulation, we analyze our curve-based routing scheme. A. Goal of the Evaluation The first goal of our study is to demonstrate the correct working of curve-based routing and its effectiveness in counteracting non-cooperative nodes in the network. The second goal of our study is to analyze the efficiency of our scheme and its control overhead by comparing the D distributed vs. the centralized approach. Table I shows the corresponding two sets of experiments carried out, and gives a summary of our findings. B. Evaluation Technique and System under Test We perform a simulation study to be able to investigate sufficiently large networks. We have extended the NetSim 2 network simulator developed by Leong et al. 4 In particular, we implemented curve-based routing as described in Sec. VI as well as actual node misbehavior and misbehavior detection/reaction. Benign nodes adhere to the protocol at all times, while misbehaving nodes are dropping packets. C. Experimental Design, Metrics, Parameters, and Factors The effectiveness of our scheme can be measured using the degree by which our scheme is able to bypass malicious areas. As an application level metric, the packet loss ratio, which is defined as the number of successfully received packets divided by the number of sent packets, reflects this. Parameters to be studied are the number of attackers, type of routing protocol (face routing vs. curve-based routing) and the different modes of operation of curve-based routing. To measure the efficiency of the distributed vs. the centralized scheme, we measure the instantaneous overhead of both schemes. We measure overhead by counting how many tries in average have to be performed, until a packet is successfully received. We treat each packet independently and do not apply any reference-line caching. For the case of the approach using a location service, we count the querying of the location service as one try, but we omit the overhead to update the location service. For the distributed scheme, the overhead is measured by the average number of packets that need to be generated until a feasible trajectory is found. Table II gives an overview on all important parameters and factors of the simulation. We present the results for the selected network size of 150 nodes, since our results for different network sizes and network densities did not yield significant qualitative differences. We generate packets with an average packet generation period of 1 packet per second between random sourcedestination pairs. We kept the workload as simple as possible, since more complex workload does not yield any 4 NetSim 2 has been specifically developed for face routing. It abstracts from the medium access and physical layers to focus on routing. It is available at

8 Table II: Simulation Parameters Parameter Factors # of nodes 150 Node placement Randomly (uniform distribution) Simulation area units Simulation time 100 seconds Planarization method Gabriel Graph Routing scheme {Face, curve-based} Curve-based variants {Centralized, distributed} step size in units {25, 50, 100} (distributed only) # of attackers {1, 2,..., 20} Attacker placement Randomly (uniform distribution) Workload 1 pkt/s, random src-dst pairs # of iterations 40 in Exp. (1), 80 in Exp. (2) Loss ratio Comparison with and without curved-based routing With curved paths Without curved paths Number of attackers / bad areas Figure 6: Effectiveness. Exp. (1), loss ratio. additional insights for our analysis. We perform a sufficiently large number of iterations to obtain statistically significant results. For each iteration, we generate a new random topology. We show the 95% confidence levels for all results. D. Analysis of Effectiveness and Correct Operation Fig. 6 shows the results of the first set of experiments. As expected, the loss ratio using curve-based routing is significantly lower than using plain face routing. Up to five malicious nodes, the loss rate is close to zero (equal to zero for the majority of replications), but for a higher number of malicious nodes, we observe non-zero loss rates. These can be explained by network partitioning. Since entire faces have to be evaded from traffic, even a relatively small number of attackers might isolate regions of the network. If source and destination are not in the same network partition, loss occurs. We conclude that curve-based routing is effective. An interesting observation is the non-linear and asymptotic increase in loss ratio for face routing. By analyzing the packet traces, we could attribute this asymptotic behavior to the fact that the contribution of additional misbehaving nodes gets smaller with each node. For few attackers, the probability of intersecting a source-destination line is roughly the same for each additional attacker (nearly linear increase in Fig. 6). For many attackers, covered areas start to overlap and multiple attackers will intersect the same lines, thus the contribution of each additional attacker gets smaller and smaller. Number of tries Distributed approach Distributed approach (Step 25) Distributed approach (Step 50) Distributed approach (Step 100) Number of attackers / bad areas Figure 7: Efficiency. Exp. (2), overhead (tries until success). E. Analysis of Efficiency and Control Overhead The results of the second set of experiments are shown in Fig. 7. The overhead of the distributed approach increases with the number of attackers in the network, since it gets more difficult to find a valid path if more disallowed areas exist. Yet, for small numbers of attackers, the distributed approach can outperform the centralized one, if no query to the location service is required. In contrast, the centralized approach carries a constant overhead, which stems from a query to the location server. If the location server information is accurate, the first try is going to be successful. We can conclude that for a scenario with only a limited amount of disallowed areas, both approaches are feasible and perform well. The bigger the number of attackers, the bigger the potential benefit of the centralized approach. For different step sizes, the overhead of the distributed scheme varies significantly. For a small step size, a higher amount of tries can be observed, which is due to the fact that multiple tries are required, until areas can be circumvented. F. Summary and Discussion In summary, our simulations show that curve-based routing is feasible. It can significantly improve the performance of planar graph routing in challenging environments. This has been shown for the case of misbehaving nodes, where a remarkable reduction of the loss ratio could be observed. Both suggested practical variants of curve-based routing work according to specification, yet they have pros and cons. The distributed scheme can outperform the centralized w.r.t. to overhead in scenarios with very few attackers and can be implemented in a fully localized fashion. It can further benefit from existing caching techniques to reduce the number of location queries by estimating the position of the destination based on previous message exchange. For large number of attackers, it reaches its limits, though, if the trial-and-error strategy cannot deal with the environment.

9 The centralized scheme has a moderate to low, but constant overhead in terms of number of control messages. This overhead is negligible for routing protocols that access the location service before sending each packet, since the network state can be piggybacked to the reply. In general, it will also yield a smaller delay, since it can directly calculate a valid path. Most important, it is independent from the number of bad areas in the network. The optimal design of the protocol and curve parameters depends on the scenario, and is subject of future work. VIII. CONCLUSIONS We have motivated and presented the curve-based routing paradigm, which is an enhancement to traditional planar graph routing. Curve-based routing enables source nodes to define an arbitrary curve in order to influence the path followed by packets to reach the destination, while traditional schemes utilize straight lines as trajectories, only. We have shown by mathematical proof that the curve-based routing scheme is loop free and guarantees delivery of packets in a planar graph. To the best of our knowledge, this work marks the first technical proof of delivery guarantees for a curve-based face routing variant. We have implemented curve-based routing with two curve-selection variants, and have shown its feasibility by means of a simulation study. As a proof-of-concept scenario, we have investigated the case of non-cooperating nodes. Yet, our scheme is similarly applicable to deal with other realworld constraints such as network congestion or limited node energy levels. Our results show that curve-based routing is able to sustain the delivery of packets where traditional schemes fail. The investigated variants have pros and cons, which need to be traded-off depending on the scenario. Further work could aim at proving upper bounds on pathlenghts for curve-based routing, improving the practicality of our scheme and tuning the performance. ACKNOWLEDGMENTS This work was supported by the LOEWE Priority Program Cocoon ( and LOEWE CASED ( REFERENCES [1] P. Bose, P. Morin, I. Stojmenović, and J. Urrutia, Routing with guaranteed delivery in ad hoc wireless networks, in Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DialM 99), [2] H. Frey, M. Hollick, and A. Loch, Curve-based planar graph routing in multihop wireless networks, in Poster presentation at the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), [3] D. Niculescu and B. Nath, Trajectory based forwarding and its applications, in Proceedings of the Ninth Annual International ACM Conference on Mobile Computing and Networking (MobiCom), [4] M. Yuksel, R. Pradhan, and S. Kalyanaraman, An implementation framework for trajectory-based routing in ad hoc networks, Ad Hoc Networks, vol. 4, no. 1, pp , January [5] L. Blazevic, S. Giordano, and J.-Y. L. Boudec, Self organized terminode routing, Cluster Computing, vol. 5, no. 2, pp , Apr [6] H. Frey and I. Stojmenović, On delivery guarantees and worst case forwarding bounds of elementary face routing components in ad hoc and sensor networks, IEEE Transactions on Computers (TC), vol. 59, no. 9, pp , September [7] E. Kranakis, H. Singh, and J. Urrutia, Compass routing on geometric networks, in Proceedings of the 11th Canadian Conference on Computational Geometry (CCCG 99), [8] B. Karp and H. T. Kung, GPSR: greedy perimeter stateless routing for wireless networks, in Proceedings of the 6th annual international conference on Mobile computing and networking (Mobicom 2000), [9] F. Kuhn, R. Wattenhofer, and A. Zollinger, Worst-case optimal and average-case efficient geometric ad-hoc routing, in Proceedings of the 4th ACM International Symposium on Mobile Computing and Networking (MobiHoc), [10] F. Kuhn, R. Wattenhofer, Y. Zhang, and A. Zollinger, Geometric ad-hoc routing: Of theory and practice, in Proceedings of the 22nd ACM International Symposium on the Principles of Distributed Computing (PODC), Jul [11] B. Leong, S. Mitra, and B. Liskov, Path vector face routing: Geographic routing with local face information, in Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP), Nov [12] Y. Li, Y. Yang, and X. Lu, Rules of designing routing metrics for greedy, face, and combined greedy-face routing, IEEE Transactions on Mobile Computing, pp , [13] Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker, Geographic routing made practical, in Proceedings of USENIX Symposium on Network Systems Design and Implementation, Boston, Massachusetts, USA, May [14] S. Durocher, D. Kirkpatrick, and L. Narayanan, On routing with guaranteed delivery in three-dimensional ad hoc wireless networks, in Proceedings of the Ninth International Conference on Distributed Computing and Networking (ICDCN 2008), [15] E. Mathews and H. Frey, A localized planarization algorithm for realistic wireless networks, in Proceedings of the 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), [16] Y.-C. Hu and A. Perrig, A survey of secure wireless ad hoc routing, IEEE Security and Privacy, vol. 2, no. 3, pp , May [17] A. König, M. Hollick, T. Krop, and R. Steinmetz, Geosec: quarantine zones for mobile ad hoc networks, Security and Communication Networks, vol. 2, no. 3, pp , Dec 2008.

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Geometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger

Geometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger Geometric Routing s??? t s PODC 2003 2 Greedy Routing Each node forwards message to best neighbor

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Void Traversal for Guaranteed Delivery in Geometric Routing

Void Traversal for Guaranteed Delivery in Geometric Routing Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v

More information

Geographical Quadtree Routing

Geographical Quadtree Routing Geographical Quadtree Routing Chen Avin, Yaniv Dvory, Ran Giladi Department of Communication Systems Engineering Ben Gurion University of the Negev Beer Sheva 84105, Israel Email: avin@cse.bgu.ac.il, dvory@bgu.ac.il,

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Networks: A Deterministic Approach with Constant Overhead

Networks: A Deterministic Approach with Constant Overhead Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette

More information

Geographic Routing in Simulation: GPSR

Geographic Routing in Simulation: GPSR Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops

More information

BGR: Blind Geographic Routing for Sensor Networks

BGR: Blind Geographic Routing for Sensor Networks BGR: Blind Geographic Routing for Sensor Networks Matthias Witt 1 and Volker Turau 1 1 Department of Telematics, Hamburg University of Technology, Hamburg, Germany {matthias.witt,turau}@tuhh.de Abstract

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

Energy Aware and Anonymous Location Based Efficient Routing Protocol

Energy Aware and Anonymous Location Based Efficient Routing Protocol Energy Aware and Anonymous Location Based Efficient Routing Protocol N.Nivethitha 1, G.Balaji 2 1 PG student, 2 Asst.Professor Department of Electronics and Communication Engineering Angel College of Engineering

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information

arxiv:cs/ v1 [cs.dc] 22 Nov 2006

arxiv:cs/ v1 [cs.dc] 22 Nov 2006 arxiv:cs/0611117v1 [cs.dc] 22 Nov 06 Abstract 2FACE: Bi-Directional Face Traversal for Efficient Geometric Routing Mark Miyashita Mikhail Nesterenko Department of Computer Science Kent State University

More information

A FRAMEWORK FOR ROUTING IN LARGE AD-HOC NETWORKS WITH IRREGULAR TOPOLOGIES

A FRAMEWORK FOR ROUTING IN LARGE AD-HOC NETWORKS WITH IRREGULAR TOPOLOGIES A FRAMEWORK FOR ROUTING IN LARGE AD-HOC NETWORKS WITH IRREGULAR TOPOLOGIES Marc Heissenbüttel, Torsten Braun, David Jörg, Thomas Huber Institute of Computer Science and Applied Mathematics University of

More information

Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

Location-aware In-Network Monitoring in Wireless Sensor Networks

Location-aware In-Network Monitoring in Wireless Sensor Networks Location-aware In-Network Monitoring in Wireless Sensor Networks Volker Turau and Christoph Weyer Department of Telematics, Technische Universität Hamburg-Harburg Schwarzenbergstraße 95, 21073 Hamburg,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

Packing Two Disks into a Polygonal Environment

Packing Two Disks into a Polygonal Environment Packing Two Disks into a Polygonal Environment Prosenjit Bose, School of Computer Science, Carleton University. E-mail: jit@cs.carleton.ca Pat Morin, School of Computer Science, Carleton University. E-mail:

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Routing on Overlay Graphs in Mobile Ad Hoc Networks

Routing on Overlay Graphs in Mobile Ad Hoc Networks Routing on Overlay Graphs in Mobile Ad Hoc Networks Sumesh J. Philip Department of Computer Science Western Illinois University Macomb IL 61455 Email: sj-philip@wiu.edu Joy Ghosh, Hung Q. Ngo, Chunming

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Routing. Geo-Routing. Thanks to Stefan Schmid for slides

Routing. Geo-Routing. Thanks to Stefan Schmid for slides Routing Geo-Routing Thanks to Stefan Schmid for slides 1 Overview Classic routing overview Geo-routing Greedy geo-routing Euclidean and Planar graphs Face Routing Greedy and Face Routing 2 Shortest path

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Computing intersections in a set of line segments: the Bentley-Ottmann algorithm

Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Michiel Smid October 14, 2003 1 Introduction In these notes, we introduce a powerful technique for solving geometric problems.

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

3D Wireless Sensor Networks: Challenges and Solutions

3D Wireless Sensor Networks: Challenges and Solutions 3D Wireless Sensor Networks: Challenges and Solutions Hongyi Wu Old Dominion University Ph.D., CSE, UB, 2002 This work is partially supported by NSF CNS-1018306 and CNS-1320931. 2D PLANE, 3D VOLUME, AND

More information

Adaptive Delay Tolerant Routing Protocol (ADTRP) for Cognitive Radio Mobile Ad Hoc Networks

Adaptive Delay Tolerant Routing Protocol (ADTRP) for Cognitive Radio Mobile Ad Hoc Networks Adaptive Delay Tolerant Routing Protocol (ADTRP) for Cognitive Radio Mobile Ad Hoc Networks L. Indhumathi M.Phil Research Scholar Department of Information Technology Bharathiar University, Coimbatore,

More information

Routing in Sensor Networks

Routing in Sensor Networks Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing

More information

Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing

Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing Yujun Li, Yaling Yang, and Xianliang Lu School of Computer Science and Engineering, University of Electronic Science and Technology

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Replacing Failed Sensor Nodes by Mobile Robots

Replacing Failed Sensor Nodes by Mobile Robots Replacing Failed Sensor Nodes by Mobile Robots Yongguo Mei, Changjiu Xian, Saumitra Das, Y. Charlie Hu and Yung-Hsiang Lu Purdue University, West Lafayette {ymei, cjx, smdas, ychu, yunglu}@purdue.edu Abstract

More information

Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach

Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach Biljana Stojkoska, Ilinka Ivanoska, Danco Davcev, 1 Faculty of Electrical Engineering and Information

More information

Geometric Routing: Of Theory and Practice

Geometric Routing: Of Theory and Practice Geometric Routing: Of Theory and Practice PODC 03 F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger [KWZ 02] [KWZ 03] [KK 00] Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Worst-Case Optimal and

More information

Scalable Position-Based Multicast for Mobile Ad-hoc Networks

Scalable Position-Based Multicast for Mobile Ad-hoc Networks Scalable Position-Based Multicast for Mobile Ad-hoc Networks Matthias Transier, Holger Füßler, Jörg Widmer, Martin Mauve, and Wolfgang Effelsberg University of Mannheim, Institut für Informatik, 683 Mannheim,

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Ad hoc and Sensor Networks Chapter 10: Topology control

Ad hoc and Sensor Networks Chapter 10: Topology control Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity

More information

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Hadi Asharioun, Hassan Asadollahi, Abdul Samad Ismail, and Sureswaran Ramadass Abstract Lifetime of a sensor network is defined

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

AN AD HOC network consists of a collection of mobile

AN AD HOC network consists of a collection of mobile 174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,

More information

Geographic and Diversity Routing in Mesh Networks

Geographic and Diversity Routing in Mesh Networks Geographic and Diversity Routing in Mesh Networks COS 463: Wireless Networks Lecture 7 Kyle Jamieson [Parts adapted from B. Karp, S. Biswas, S. Katti] Course Contents 1. Wireless From the Transport Layer

More information

EXTREME POINTS AND AFFINE EQUIVALENCE

EXTREME POINTS AND AFFINE EQUIVALENCE EXTREME POINTS AND AFFINE EQUIVALENCE The purpose of this note is to use the notions of extreme points and affine transformations which are studied in the file affine-convex.pdf to prove that certain standard

More information

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS Ramya. S 1 and Prof. B. Sakthivel 2 ramyasiva.jothi@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor & Head, Department

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

Keyword- Geographically Routing Protocol, MANET Routing Protocol, Wireless Sensor Network, Position Based Routing Protocol..

Keyword- Geographically Routing Protocol, MANET Routing Protocol, Wireless Sensor Network, Position Based Routing Protocol.. www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 6 Issue 2 Feb. 2017, Page No. 20293-20297 Index Copernicus Value (2015): 58.10, DOI: 10.18535/ijecs/v6i2.25

More information

Midpoint Routing algorithms for Delaunay Triangulations

Midpoint Routing algorithms for Delaunay Triangulations Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical

More information

However, this is not always true! For example, this fails if both A and B are closed and unbounded (find an example).

However, this is not always true! For example, this fails if both A and B are closed and unbounded (find an example). 98 CHAPTER 3. PROPERTIES OF CONVEX SETS: A GLIMPSE 3.2 Separation Theorems It seems intuitively rather obvious that if A and B are two nonempty disjoint convex sets in A 2, then there is a line, H, separating

More information

Connected Components of Underlying Graphs of Halving Lines

Connected Components of Underlying Graphs of Halving Lines arxiv:1304.5658v1 [math.co] 20 Apr 2013 Connected Components of Underlying Graphs of Halving Lines Tanya Khovanova MIT November 5, 2018 Abstract Dai Yang MIT In this paper we discuss the connected components

More information

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Harichandan Roy, Shuvo Kumar De, Md.Maniruzzaman, and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network Author manuscript, published in "ITCom 6 - next generation and sensor networks, Boston : United States (26)" DOI :.7/2.68625 Performance evaluation of reactive and proactive routing protocol in IEEE 82.

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Simultaneously flippable edges in triangulations

Simultaneously flippable edges in triangulations Simultaneously flippable edges in triangulations Diane L. Souvaine 1, Csaba D. Tóth 2, and Andrew Winslow 1 1 Tufts University, Medford MA 02155, USA, {dls,awinslow}@cs.tufts.edu 2 University of Calgary,

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Mobility Control for Complete Coverage in Wireless Sensor Networks

Mobility Control for Complete Coverage in Wireless Sensor Networks Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Lectures 19: The Gauss-Bonnet Theorem I. Table of contents

Lectures 19: The Gauss-Bonnet Theorem I. Table of contents Math 348 Fall 07 Lectures 9: The Gauss-Bonnet Theorem I Disclaimer. As we have a textbook, this lecture note is for guidance and supplement only. It should not be relied on when preparing for exams. In

More information

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Receiver Based Multicasting Protocol for Wireless Sensor Networks Receiver Based Multicasting Protocol for Wireless Sensor Networks Madesha M Assistant Professor, Department of CSE Sahyadri College of Engineering and Management Chaya D Lecturer, Department of CSE H.M.S

More information

Benefit-based Data Caching in Ad Hoc. Networks

Benefit-based Data Caching in Ad Hoc. Networks Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta, Samir Das Computer Science Department Stony Brook University Stony Brook, NY 790 Email: {bintang,hgupta,samir}@cs.sunysb.edu Abstract

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

On the Minimum k-connectivity Repair in Wireless Sensor Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu

More information

A Robust Interference Model for Wireless Ad-Hoc Networks

A Robust Interference Model for Wireless Ad-Hoc Networks A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach, Stefan Schmid, Roger Wattenhofer, Aaron Zollinger {vonrickenbach, schmiste, wattenhofer, zollinger}@tik.ee.ethz.ch Computer

More information

The Geometry of Carpentry and Joinery

The Geometry of Carpentry and Joinery The Geometry of Carpentry and Joinery Pat Morin and Jason Morrison School of Computer Science, Carleton University, 115 Colonel By Drive Ottawa, Ontario, CANADA K1S 5B6 Abstract In this paper we propose

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks

An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks Natarajan Meghanathan Jackson State University P. O. Box 18839, 1400 J. Lynch Street Jackson, MS 39217, USA ABSTRACT

More information

Delay Tolerant Networks

Delay Tolerant Networks Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Danny Z. Chen 1, Yan Gu 2, Jian Li 3, and Haitao Wang 1 1 Department of Computer Science and Engineering University

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information

Two trees which are self-intersecting when drawn simultaneously

Two trees which are self-intersecting when drawn simultaneously Discrete Mathematics 309 (2009) 1909 1916 www.elsevier.com/locate/disc Two trees which are self-intersecting when drawn simultaneously Markus Geyer a,, Michael Kaufmann a, Imrich Vrt o b a Universität

More information

Approximately Uniform Random Sampling in Sensor Networks

Approximately Uniform Random Sampling in Sensor Networks Approximately Uniform Random Sampling in Sensor Networks Boulat A. Bash, John W. Byers and Jeffrey Considine Motivation Data aggregation Approximations to COUNT, SUM, AVG, MEDIAN Existing work does not

More information

ROUTING is an important issue that affects wireless

ROUTING is an important issue that affects wireless 1 Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks Ming-Jer Tsai, Hong-Yen Yang, Bing-Hong Liu, and Wen-Qian Huang Abstract In this paper, we first propose a method,,

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information

Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks

Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks RESEARCH Open Access Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks Kaouther Abrougui 1,2*, Azzedine Boukerche 1,2 and Hussam Ramadan 3 Abstract

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

6. Concluding Remarks

6. Concluding Remarks [8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue School of Computer Science Fudan University {09110240030,11110240029,xinw,xyxue}@fudan.edu.cn Zongpeng Li Dept.

More information

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor

More information

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 6, 2013 ISSN (online): 2321-0613 Integrated Demand (IRA-ODGR) for MANET M J.Kalaiselvi 1 K.Sathishkumar 2 1 M.E. Student,

More information

Chord-based Key Establishment Schemes for Sensor Networks

Chord-based Key Establishment Schemes for Sensor Networks Chord-based Key Establishment Schemes for Sensor Networks Fan Zhang, Zhijie Jerry Shi, Bing Wang Department of Computer Science and Engineering, University of Connecticut, Storrs, CT 06269 Abstract Because

More information