scispace - formally typeset
Search or ask a question
Topic

Hazy Sighted Link State Routing Protocol

About: Hazy Sighted Link State Routing Protocol is a research topic. Over the lifetime, 6936 publications have been published within this topic receiving 169377 citations. The topic is also known as: HSLS.


Papers
More filters
Journal ArticleDOI
TL;DR: This work surveys the literature and classifies the various routing approaches for delay Tolerant Networks, and finds that communication is possible in such a challenged network.
Abstract: Delay Tolerant Networks (DTNs) have evolved from Mobile Ad Hoc Networks (MANET). It is a network, where contemporaneous connectivity among all nodes doesn’t exist. This leads to the problem of how to route a packet from one node to another, in such a network. This problem becomes more complex, when the node mobility also is considered. The researchers have attempted to address this issue for over a decade. They have found that communication is possible in such a challenged network. The design of routing protocol for such networks is an important issue. This work surveys the literature and classifies the various routing approaches.

75 citations

Journal ArticleDOI

[...]

TL;DR: A novel opportunistic routing approach ML-SOR (Multi-layer Social Network based Routing) is proposed which extracts social network information from such a model to perform routing decisions and measures the forwarding capability of a node when compared to an encountered node in terms of node centrality, tie strength and link prediction.

75 citations

Proceedings ArticleDOI
04 Jan 2006
TL;DR: This paper presents an on-demand secure routing protocol for ad hoc networks based on a distributed authentication mechanism that makes use of recommendation and trust evaluation to establish a trust relationship between network entities and uses feedback to adjust it.
Abstract: Ad hoc networks, which do not rely on infrastructure such as access points or base stations, can be deployed rapidly and inexpensively even in situations with geographical or time constraints. Ad hoc networks have attractive applications in both military and disaster situations and also in commercial uses like sensor networks or conferencing. However, the nature of ad hoc networks makes them vulnerable to attacks, especially in the routing protocol. How to protect an ad hoc routing protocol is an important research topic. In this paper, we present an on-demand secure routing protocol for ad hoc networks based on a distributed authentication mechanism. The protocol makes use of recommendation and trust evaluation to establish a trust relationship between network entities and uses feedback to adjust it. The protocol does not need the support of a trusted third party and can discover multiple routes between two nodes.

75 citations

Journal ArticleDOI
TL;DR: The simulation results show that the proposed on-demand bandwidth-constrained routing protocol can successfully discover paths that meet the end-to-end bandwidth requirements of flows, protect existing flows from QoS violations, exploit the capacity gain due to multiple channels, and incurs low message overhead.
Abstract: QoS routing in multi-channel wireless mesh networks (WMNs) with contention-based MAC protocols is a very challenging problem. In this paper, we propose an on-demand bandwidth-constrained routing protocol for multi-radio multi-rate multi-channel WMNs with the IEEE 802.11 DCF MAC protocol. The routing protocol is based on a distributed threshold-triggered bandwidth estimation scheme, implemented at each node for estimating the free-to-use bandwidth on each associated channel. According to the free-to-use bandwidth at each node, the call admission control, which is integrated into the routing protocol, predicts the residual bandwidth of a path with the consideration of inter-flow and intra-flow interference. To select the most efficient path among all feasible ones, we propose a routing metric which strikes a balance between the cost and the bandwidth of the path. The simulation results show that our routing protocol can successfully discover paths that meet the end-to-end bandwidth requirements of flows, protect existing flows from QoS violations, exploit the capacity gain due to multiple channels, and incurs low message overhead.

75 citations

Proceedings ArticleDOI
26 Oct 2015
TL;DR: The implementation of combining several routing metric using fuzzy logic to design a RPL objective function, the routing standard for the Internet of Things, is discussed and results show improvements compared to the common implementation of the RPL protocol.
Abstract: Minimizing the energy consumption and hence extending the network lifetime is a key requirement when designing an efficient sensor network protocol. QoS-aware routing in Wireless Sensor Network (WSN), aims to take into account other networks performance aspects as minimizing end-to-end delay (as well as jitter), reducing packet loss rate and minimizing the energy consumption of the network during data transmission. These objectives are sometimes conflicting therefore tradeoffs must be made between energy conservation and QoS considerations. The general problem can be reformulated as a Multi-Constrained Optimal Path problem (MCOP) which is known as NP-complete. The latter raises a real challenge as sensor nodes are very limited in resources capabilities. We propose to use fuzzy inference mechanism to seek a good tradeoff between all given metrics and constraints. This paper discusses the implementation of combining several routing metric using fuzzy logic to design a RPL objective function, the routing standard for the Internet of Things. The proposal is integrated on Contiki operating system, the deployment was performed on a real world indoor WSN. Obtained results show improvements compared to the common implementation of the RPL protocol and demonstrate relevance of our contribution.

74 citations


Network Information
Related Topics (5)
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
93% related
Wireless ad hoc network
49K papers, 1.1M citations
93% related
Network packet
159.7K papers, 2.2M citations
92% related
Wireless sensor network
142K papers, 2.4M citations
92% related
Wireless network
122.5K papers, 2.1M citations
92% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20236
202210
20211
20193
201822
2017264