Skip to main content

Advertisement

Log in

An Efficient Multi-Path Self-Organizing Strategy in Internet of Things

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In order to improve the organizing performance and fault tolerance of the wireless network protocol GEAR based on the geographical location information in the Internet of things and achieve better energy distribution and conservation effects. This paper proposes a new multipath routing organizing protocol (SMG, Self-organized Multipath GEAR) based on the basic geographic routing protocol GEAR. By two-step organizing, communication empty nodes and communication hole can join the network respectively and energy spreading out and mechanism of dormancy of the multi-path are utilized to spread out and save energy. Meanwhile, this paper presents an approximate estimation algorithm to estimate the number of the nodes in the monitoring region with a certain size and regular shape. The critical path node goes to failure in different times while received packet rate is monitored using the experiment of NS2 simulation and actual hardware. The experiment results show that the improved protocol increases the fault tolerance of the network, reduces the paralysis rate of the network and achieves the effect of energy spreading out and saving, increases the lifetime of the network through a multi-path strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Bai, F., Munasinghe, K. S., & Jamalipour, A. (2011). Accuracy, latency, and energy cross-optimization in wireless sensor networks through infection spreading. International Journal of Communication Systems, 24(5), 628–646.

    Article  Google Scholar 

  2. Cook, D. J., & Das, S. K. (2012). Pervasive computing at scale: Transforming the state of the art. Pervasive and Mobile Computing, 8(1), 22–35.

    Article  Google Scholar 

  3. Qiu, T., Ding, Y., Xia, F., & Ma, H. (2012). A search strategy of level-based flooding for the internet of things. Sensors, 12(8), 10163–10195.

    Article  Google Scholar 

  4. Agrawal, D., & Aggarwal, C. C. (2001). On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (pp. 247–255).

  5. Shen, B., Liu, Y., & Wang, X.Y. (2010). Research on data mining models for the internet of things. In 2nd international conference on image analysis and signal processing (pp. 127–132).

  6. Tseng, F., Chou, L., & Han, Chao. (2011). A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences, 1(4), 1–16.

    Google Scholar 

  7. Louis, C., & Johan, E. (2011). The internet of things-promise for the future? An introduction. In 2011 IST-Africa conference proceedings (pp. 1–9).

  8. Leon, R. A., Vittal, V., & Manimaran, G. (2007). Application of sensor network for secure electric energy infrastructure. IEEE Transactions on Power Delivery, 22(2), 1021–1028.

    Article  Google Scholar 

  9. Ding, L., Shi, P., & Liu, B. (2010). The clustering of internet, internet of things and social network. In 3rd international symposium on knowledge acquisition and modeling (pp. 417–420).

  10. Butgereit, L., & Coetzee, L. (2011). Beachcomber: Linking the internet of things to the internet of people. In 2011 IST-Africa conference proceedings. IST 2011 (pp. 1–7).

  11. Mulligan, G. (2010). The internet of things: Here now and coming soon. IEEE Internet Computing, 14(1), 35–36.

    Google Scholar 

  12. Rohokale, V. M., Prasad, N. R., & Prasad, R. (2011). A cooperative internet of things (IoT) for rural healthcare monitoring and control. In 2011 2nd international conference on wireless communication. Vehicular technology, information theory and aerospace and electronic systems technology, Wireless VITAE, 2011 (pp. 1–6).

  13. Bouckaert, S., De Poorter, E., Latre, B., Hoebeke, J., Moerman, I., & Demeester, P. (2010). Strategies and challenges for interconnecting wireless mesh and wireless sensor networks. Wireless personal communications, 53(3), 443–463.

    Article  Google Scholar 

  14. Huang, C., Cheng, R., Chen, S., & Li, C. (2010). Enhancing network availability by tolerance control in multi-sink wireless sensor networks. Journal of Convergence, 1(1), 15–22.

    Google Scholar 

  15. Rabaey, J. M., Ammer, M. J., Da Silva, J. L, Jr, Patel, D., & Roundy, S. (2000). PicoRadio supports ad hoc ultra-low power wireless organizing. Computer, 33(7), 42–48.

    Article  Google Scholar 

  16. Bulusu, N., Heidemann, J., & Estrin, D. (2000). GPS-Less low-cost outdoor localization for very small devices. IEEE Personal Communications, 7(5), 28–34.

    Article  Google Scholar 

  17. Dondi, D., Bertacchini, A., Brunelli, D., Larcher, L., & Benini, L. (2008). Modeling and Optimization of a Solar Energy Harvester System for Self-Powered Wireless Sensor Networks. IEEE Transactions on Industrial Electronics, 55(7), 2759–2766.

    Article  Google Scholar 

  18. Alippi, C., & Galperti, C. (2008). An adaptive system for optimal solar energy harvesting in wireless sensor network nodes. IEEE Transactions on Circuits and Systems, 55(6), 1742–1750.

    Article  MathSciNet  Google Scholar 

  19. Bhuvaneswari, P. T. V., Balakumar, R., Vaidehi, V., & Balamuralidhar, P. (2009). Solar energy harvesting for wireless sensor networks. In 2009 1st international conference on computational intelligence, communication systems and networks (pp. 57–61).

  20. Niyato, D., Hossain, E., & Fallahi, A. (2006). Analysis of different sleep and wakeup strategies in solar powered wireless sensor networks. IEEE International Conference on Communications, 7, 3333–3338.

    Google Scholar 

  21. Voigt, T., Ritter, H., Schiller, J. (2003). Utilizing solar power in wireless sensor networks. In Local computer networks, proceedings 28th annual IEEE international conference on local computer networks (pp. 416–422).

  22. Shah, D. (2008). Gossip algorithms. Foundations and Trends in Organizing, 3(1), 1–125.

    Article  MATH  Google Scholar 

  23. Wendi, R. H., Joanna, K., & Hari, B. (1999). Adaptive protocols for information dissemination in wireless sensor networks. In MobiCom ’99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and organizing, August 1999 (pp. 174–185).

  24. Tripathy, R. M., Bagchi, A., & Mehta, S. (2010). A study of rumor control strategies on social networks. In International conference on information and knowledge management (pp. 1817–1820).

  25. Vidhate, D. A., Patil, A. K., & Pophale, S. S. (2010). Performance evaluation of low energy adaptive clustering hierarchy protocol for wireless sensor networks. In Proceedings of the international conference and workshop on emerging trends in technology (pp. 59–63).

  26. Boukerche, A., Das, S. K., & Fabbri, A. (2001). Analysis of a randomized congestion control scheme with DSDV routing in ad hoc wireless networks. Journal of Parallel and Distributed Computing, 61(7), 967–995.

    Article  MATH  Google Scholar 

  27. Kumar, R., Anil, A. K., & Misra, M. (2010). An AODV based QoS routing protocol for delay sensitive applications in mobile Ad Hoc networks. Journal of Digital Information Management, 8(5), 303–314.

    Google Scholar 

  28. Gani, A., Han, Q., Anuar, N. B., & Zakaria, O. (2009). Enhancing DSR protocol performance in mobile Ad hoc network using ACK reply. WSEAS Transactions on Communications, 8(2), 227–236.

    Google Scholar 

  29. Xu, Y., Heidemann, J., & Estrin, D. (2001). Geography-informed energy conservation for ad hoc routing (pp. 70–84). Rome, Italy: Proceedings of the Annual International Conference on Mobile Computing and Organizing.

    Google Scholar 

  30. Maarouf, I. K., & Sheltami, T. R. (2008). Simulation-based analysis for GEAR performance optimization. In Proceedings-international conference on advanced information organizing and applications (pp. 910–915).

  31. Yang, W., Ma, X., Wang, W., Man, D., & Gao, G. (2010). Research on a security routing protocol based on reputation evolution mechanism for WSNs. Chinese High Technoloty Letters, 20(12), 1211–1216.

    Google Scholar 

  32. Roman, R., Alcaraz, C., Lopez, J., & Sklavos, N. (2011). Key management systems for sensor networks in the context of the internet of things. Computers and Electrical Engineering, 37(2), 147–159.

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by Natural Science Foundation of P.R. China (Grant No. 61202443 and Grant No. 61103233), and the Fundamental Research Funds for the Central Universities (No. DUT13JS07).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tie Qiu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Qiu, T., Sun, W., Bai, Y. et al. An Efficient Multi-Path Self-Organizing Strategy in Internet of Things. Wireless Pers Commun 73, 1613–1629 (2013). https://doi.org/10.1007/s11277-013-1270-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1270-1

Keywords

Navigation