scispace - formally typeset
Proceedings ArticleDOI

Voronoi diagram and convex hull based geocasting and routing in wireless networks

Reads0
Chats0
TLDR
A general algorithm is proposed, in which message is forwarded to exactly those neighbors, which may be best choices for a possible position of destination (using the appropriate criterion), in which memoryless and past traffic memorization variants of each scheme are proposed.
Abstract
A broad variety of location dependent services will become feasible in the near future due to the use of the Global Positioning System (GPS), which provides location information (latitude, longitude and possibly height) and global timing to mobile users. Routing is a problem of sending a message from a source to a destination. Geocasting is a problem of sending a message to all nodes located within a region (e.g. circle or square). Recently, several localized GPS based routing and geocasting protocols for a mobile ad hoc network were reported in literature. In directional (DIR) routing and geocasting methods, node A (the source or intermediate node) transmits a message m to all neighbors located between the two tangents from A to the region that could contain the destination. It was shown that memoryless directional methods might create loops in routing process. In two other proposed methods (proven to be loop-free), geographic distance (GEDIR) or most forward progress within radius (MFR) routing, node A forwards the message to its neighbor who is closest to destination, or has greatest progress towards destination (respectively). In this paper, we propose a general algorithm (based on a unified framework for both routing and geocasting problems), in which message is forwarded to exactly those neighbors, which may be best choices for a possible position of destination (using the appropriate criterion). We then propose and discuss new V-GEDIR and CH-MFR methods and define R-DIR, modified version of existing directional methods. In V-GEDIR method, these neighbors are determined by intersecting the Voronoi diagram of neighbors with the circle (or rectangle) of possible positions of destination, while the portion of the complex hull of neighboring node is analogously used in the CH-MFR method. Routing and geocasting algorithms differ only inside the circle/rectangle. We propose memoryless and past traffic memorization variants of each scheme. The proposed methods may be also used for the destination search phase allowing the application of different routing schemes after the exact destination of position is discovered. Memoryless V-GEDIR and CH-MFR algorithms are loop-free, and have smaller flooding rate (with similar success rate) compared to directional method. Simulations involving the proposed and some known algorithms are in progress and confirm our expectations.

read more

Citations
More filters
BookDOI

Handbook of wireless networks and mobile computing

TL;DR: H Handbook of Internet Computing pdf eBook copy write by good Handbook of Wireless Networks and Mobile Computing Google Books.
Journal ArticleDOI

A survey of geocast routing protocols

TL;DR: A protocol comparison includes message and memory complexity, robustness, and the ability to deliver geocast packets in partially partitioned networks and presents simulations to compare the approaches based on flooding, directed flooding, and routing without flooding.
Book ChapterDOI

Position Based Routing Algorithms for Ad Hoc Networks: A Taxonomy

TL;DR: This article surveys known routing methods, and provides their taxonomy in terms of a number of characteristics: loop-free behavior, distributed operation (localized, global or zonal), path strategy (single path, multi-path or flooding based), metrics used, guaranteed delivery, scalability, and robustness.
Proceedings ArticleDOI

ALARM: Anonymous Location-Aided Routing in Suspicious MANETs

TL;DR: This work addresses a number of issues arising in suspicious location-based MANET settings by designing and analyzing a privacy-preserving and secure link-state based routing protocol (ALARM), which provides both security and privacy features, including node authentication, data integrity, anonymity, and untraceability.
Journal ArticleDOI

Redundancy and coverage detection in sensor networks

TL;DR: This work studies the problem of detecting and eliminating redundancy in a sensor network with a view to improving energy efficiency, while preserving the network's coverage, and presents efficient distributed algorithms for computing and maintaining solutions in cases of sensor failures or insertion of new sensors.
References
More filters

Dynamic Source Routing in Ad Hoc Wireless Networks.

TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI

Dynamic Source Routing in Ad Hoc Wireless Networks

TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Proceedings ArticleDOI

A performance comparison of multi-hop wireless ad hoc network routing protocols

TL;DR: The results of a derailed packet-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocols, which cover a range of designchoices: DSDV,TORA, DSR and AODV are presented.
Book

Understanding GPS : principles and applications

TL;DR: In this paper, the authors discuss the effects of RF interference on GPS Satellite Signal Receiver Tracking (GSRSR) performance and the integration of GPS with other Sensors, including the Russian GLONASS, Chinese Bediou, and Japanese QZSS systems.
Book

Spatial Tessellations: Concepts and Applications of Voronoi Diagrams

TL;DR: In this article, the Voronoi diagram generalizations of the Voroni diagram algorithm for computing poisson Voroni diagrams are defined and basic properties of the generalization of Voroni's algorithm are discussed.