scispace - formally typeset
Search or ask a question
Topic

Hazy Sighted Link State Routing Protocol

About: Hazy Sighted Link State Routing Protocol is a research topic. Over the lifetime, 6936 publications have been published within this topic receiving 169377 citations. The topic is also known as: HSLS.


Papers
More filters
Journal ArticleDOI
TL;DR: An overview of the different routing strategies used in wireless sensor networks is given and a brief working model of energy efficient routing protocols in WSN is given based on metrics such as mobility support, stability, overlapping.
Abstract: Wireless sensor networks are a web of sensor nodes with a set of processor and limited memory unit embedded in it. Reliable routing of packets from the sensor node to its base station is the most important task for the networks. In wireless sensor networks, routing is bit more complex than other wired or wireless networks. The routing protocols applied for the other networks cannot be used here due to its battery powered nodes. Unlike other wireless networks routing in WSN should be the energy efficient one. This paper gives an overview of the different routing strategies used in wireless sensor networks and gives a brief working model of energy efficient routing protocols in WSN. We have also compared these different routing protocols based on metrics such as mobility support, stability, overlapping. The study concludes with the recommendations to the future direction in the energy efficiency model for the sensor networks.

60 citations

Proceedings ArticleDOI
01 Dec 2005
TL;DR: In this paper, an intelligent flooding-based routing protocol for inter-vehicle communication (IVC) networks is proposed and evaluated in several field trials to evaluate its performance on the roads.
Abstract: An IVC (Inter-vehicle communication) network is a type of mobile ad hoc networks (MANET) in which high-speed vehicles send, receive, and forward packets via other vehicles on the roads. An IVC network can provide useful applications in future Intelligent Transportation Systems. However, due to frequent network topology changes, a routing path in an IVC network breaks easily. As such, a routing protocol proposed for general MANET (e.g., AODV) performs poorly in IVC networks. To address this problem, we designed and implemented an intelligent flooding-based routing protocol and conducted several field trials to evaluate its performance on the roads. Results obtained from field trials show that (1) our protocol outperforms AODV significantly on IVC networks, and (2) our protocol can make many useful services such as email, ftp, web, video conferencing, and video broadcasting applicable on IVC networks for vehicle users.

60 citations

Journal ArticleDOI
Xuelian Cai1, Yulong Duan1, Ying He1, Jin Yang1, Changle Li1 
TL;DR: Bee-Sensor-C is an energy-aware and scalable multipath routing protocol based on dynamic cluster and foraging behavior of a bee swarm that outperforms the existing protocols in terms of energy efficiency, energy consumption balance, packet delivery rate, and scalability.
Abstract: A wireless sensor network (WSN) is composed of a large collection of sensor nodes with limited resources in terms of battery supplied energy, processing capability, and storage. Therefore, the design of an energy-efficient and scalable routing protocol is a crucial concern for WSN applications. In this paper, we propose Bee-Sensor-C, an energy-aware and scalable multipath routing protocol based on dynamic cluster and foraging behavior of a bee swarm. Bee-Sensor-C is an evolution from BeeSensor which is a bee-inspired routing protocol for WSNs. First of all, through introducing a dynamic clustering scheme, Bee-Sensor-C offers parallel data transmissions close to the event area. This evolution reduces routing overhead and improves the scalability. Moreover, Bee-Sensor-C adopts an enhanced multipath construction method in order to achieve the balance of the network energy consumption. Besides, Bee-Sensor-C can well support the multicluster scenario. Through simulations, the network performance is evaluated and the results demonstrate that Bee-Sensor-C outperforms the existing protocols in terms of energy efficiency, energy consumption balance, packet delivery rate, and scalability.

60 citations

Proceedings ArticleDOI
25 Jun 2012
TL;DR: This paper proposes a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs by using promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network.
Abstract: Interest in the area of Mobile Ad-hoc Network (MANET) is growing since last few years because of its practical applications and requirement of communication in mobile devices. However, in comparison to wired network or infrastructure-based wireless network, MANET is particularly vulnerable to security attacks due to its fundamental characteristics, e.g., the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. The black hole attack is one of such security risks. In this attack, a malicious node falsely advertise shortest path to the destination node with an intension to disrupt the communication. In this paper, we propose a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs. The proposed method uses promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network. The simulation results show the efficacy of the proposed method as throughput of the network does not deteriorate in presence of the back holes.

60 citations

Book ChapterDOI
15 Jun 2005
TL;DR: In this article, the authors apply the real-time model checker Uppaal to consider the effect of the protocol parameters on the timing behavior of AODV, thus complementing the earlier untimed verification effort.
Abstract: Mobile ad hoc networks (MANETs) are wireless networks formed spontaneously. Communication in such networks typically involves multi-hop relays, and is subjected to dynamic topology changes and frequent link failures. This complex scenario demands robust routing protocol standards that ensure correct and timely delivery of messages. Recently, formal verification has been successful in detecting ambiguities in protocol standards. We consider the Ad hoc On Demand Distance Vector (AODV) protocol, a reactive protocol currently undergoing standardisation at the IETF (RFC3561). AODV performs route discovery whenever a route to the destination is needed, and retains routing information for a period of time specified by the standard. We apply the real-time model checker Uppaal to consider the effect of the protocol parameters on the timing behaviour of AODV, thus complementing the earlier untimed verification effort. Our study of the recent versions of the standard (RFC3561-bis-01) has highlighted a dependency of the lifetime of routes on network size, which can be alleviated by allowing the route timeouts to adapt to network growth.

60 citations

Network Information
Related Topics (5)
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
93% related
Wireless ad hoc network
49K papers, 1.1M citations
93% related
Network packet
159.7K papers, 2.2M citations
92% related
Wireless sensor network
142K papers, 2.4M citations
92% related
Wireless network
122.5K papers, 2.1M citations
92% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20236
202210
20211
20193
201822
2017264