scispace - formally typeset
Search or ask a question

Showing papers on "Wireless ad hoc network published in 2014"


Journal ArticleDOI
TL;DR: In this article, the authors present aspects related to this field to help researchers and developers to understand and distinguish the main features surrounding VANET in one solid document, without the need to go through other relevant papers and articles.

1,216 citations


Journal ArticleDOI
TL;DR: A survey of the state-of-the-art in Intrusion Detection Systems (IDSs) that are proposed for WSNs is presented, followed by the analysis and comparison of each scheme along with their advantages and disadvantages.
Abstract: Wireless Sensor Networking is one of the most promising technologies that have applications ranging from health care to tactical military. Although Wireless Sensor Networks (WSNs) have appealing features (e.g., low installation cost, unattended network operation), due to the lack of a physical line of defense (i.e., there are no gateways or switches to monitor the information flow), the security of such networks is a big concern, especially for the applications where confidentiality has prime importance. Therefore, in order to operate WSNs in a secure way, any kind of intrusions should be detected before attackers can harm the network (i.e., sensor nodes) and/or information destination (i.e., data sink or base station). In this article, a survey of the state-of-the-art in Intrusion Detection Systems (IDSs) that are proposed for WSNs is presented. Firstly, detailed information about IDSs is provided. Secondly, a brief survey of IDSs proposed for Mobile Ad-Hoc Networks (MANETs) is presented and applicability of those systems to WSNs are discussed. Thirdly, IDSs proposed for WSNs are presented. This is followed by the analysis and comparison of each scheme along with their advantages and disadvantages. Finally, guidelines on IDSs that are potentially applicable to WSNs are provided. Our survey is concluded by highlighting open research issues in the field.

743 citations


Journal ArticleDOI
TL;DR: The communication architecture of VANETs is presented, the privacy and security challenges that need to be overcome to make such networks safety usable in practice are outlined and some future trends that will shape the research in cryptographic protocols for intelligent transportation systems are explored.

443 citations


Journal ArticleDOI
TL;DR: This article discusses the evolution of the multihop ad hoc networking paradigm by building on the lessons learned from the IETF MANET research, and analyzes four successful networking paradigms, mesh, sensor, opportunistic, and vehicular networks, that emerged from the MANET world as a more pragmatic application.
Abstract: In this article we discuss the state of the art of (mobile) multihop ad hoc networking. This paradigm has often been identified with the solutions developed inside the IETF MANET working group, and for this reason it is called the MANET paradigm. However, they do not coincide, and in the last decade they clearly diverged. In this article, we start from the reasons why the MANET paradigm did not have a major impact on computer communications, and we discuss the evolution of the multihop ad hoc networking paradigm by building on the lessons learned from the MANET research. Specifically, we analyze four successful networking paradigms, mesh, sensor, opportunistic, and vehicular networks, that emerged from the MANET world as a more pragmatic application of the multihop ad hoc networking paradigm. We also present the new research directions in the multihop ad hoc networking field: peoplecentric networking, triggered by the increasing penetration of the smartphones in everyday life, which is generating a people-centric revolution in computing and communications.

427 citations


Journal ArticleDOI
TL;DR: The various categories of applications in VANETs are introduced, as well as some security requirements, threats and certain architectures are proposed to solve the security problem.

407 citations


BookDOI
21 Jan 2014
TL;DR: Intrusion detection in wireless ad-hoc networks / editors, Nabendu Chaki and Rituparna Chaki, contains information obtained from authentic and highly regarded sources.
Abstract: This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted , or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Intrusion detection in wireless ad-hoc networks / editors, Nabendu Chaki and Rituparna Chaki. pages cm Includes bibliographical references and index. Contents Preface ix a b o u t t h e e d i t o r s xi c o n t r i b u t o r s xiii chaP t e r 1 intro d u c t i o n 1 Nova ru N De b , M a N a l i CH a k r a bor T y, a N D N a beN Du CH a k i chaP t e r 2 a r c h i t e c t u r e a n d o r g a n i z at i o n is s u e s 43 M a N a l i CH a k r a bor T y, Nova ru N De b , De bDu T Ta ba r M a N roy, a N D r i T u pa r N a CH a k i chaP t e r 3 routin g f o r …

371 citations


Proceedings ArticleDOI
02 Jun 2014
TL;DR: It is demonstrated how Software-Defined Networking (SDN), an emerging network paradigm, can be used to provide the flexibility and programmability to networks and introduces new services and features to today's VANETs.
Abstract: Vehicular Ad Hoc Networks (VANETs) have in recent years been viewed as one of the enabling technologies to provide a wide variety of services, such as vehicle road safety, enhanced traffic and travel efficiency, and convenience and comfort for passengers and drivers. However, current VANET architectures lack in flexibility and make the deployment of services/protocols in large-scale a hard task. In this paper, we demonstrate how Software-Defined Networking (SDN), an emerging network paradigm, can be used to provide the flexibility and programmability to networks and introduces new services and features to today's VANETs. We take the concept of SDN, which has mainly been designed for wired infrastructures, especially in the data center space, and propose SDN-based VANET architecture and its operational mode to adapt SDN to VANET environments. We also discuss benefits of a Software-Defined VANET and the services that can be provided. We demonstrate in simulation the feasibility of a Software-Defined VANET by comparing SDN-based routing with traditional MANET/VANET routing protocols. We also show in simulation fallback mechanisms that must be provided to apply the SDN concept into mobile wireless scenarios, and demonstrate one of the possible services that can be provided by a Software-Defined VANET.

338 citations


Journal ArticleDOI
TL;DR: The challenges with using Uavs as relay nodes in an ad-hoc manner are identified, network models of UAVs are introduced, and open research issues with analyzing opportunities and future work are depicted.
Abstract: In recent years, the capabilities and roles of Unmanned Aerial Vehicles (UAVs) have rapidly evolved, and their usage in military and civilian areas is extremely popular as a result of the advances in technology of robotic systems such as processors, sensors, communications, and networking technologies. While this technology is progressing, development and maintenance costs of UAVs are decreasing relatively. The focus is changing from use of one large UAV to use of multiple UAVs, which are integrated into teams that can coordinate to achieve high-level goals. This level of coordination requires new networking models that can be set up on highly mobile nodes such as UAVs in the fleet. Such networking models allow any two nodes to communicate directly if they are in the communication range, or indirectly through a number of relay nodes such as UAVs. Setting up an ad-hoc network between flying UAVs is a challenging issue, and requirements can differ from traditional networks, Mobile Ad-hoc Networks (MANETs) and Vehicular Ad-hoc Networks (VANETs) in terms of node mobility, connectivity, message routing, service quality, application areas, etc. This paper identifies the challenges with using UAVs as relay nodes in an ad-hoc manner, introduces network models of UAVs, and depicts open research issues with analyzing opportunities and future work.

318 citations


Proceedings ArticleDOI
08 Jul 2014
TL;DR: A prototype implementation of Named Data Networking is described and its preliminary performance assessment is described, and remaining challenges are identified.
Abstract: In this paper we apply the Named Data Networking [8], a newly proposed Internet architecture, to networking vehicles on the run Our initial design, dubbed V-NDN, illustrates NDN's promising potential in providing a unifying architecture that enables networking among all computing devices independent from whether they are connected through wired infrastructure, ad hoc, or intermittent DTN This paper describes a prototype implementation of V-NDN and its preliminary performance assessment, and identifies remaining challenges

297 citations


Journal ArticleDOI
TL;DR: In this article, the authors discuss the main characteristics and the research challenge of routing in VANETs, which may be considered in designing various routing protocols, and create taxonomy of the current routing protocols for VANets, and surveyed and compared symbolized instances for all the classes of protocols.

231 citations


Journal ArticleDOI
Li Wenchao, Ping Yi, Yue Wu, Li Pan1, Jianhua Li 
TL;DR: This system can separate abnormal nodes from normal nodes by observing their abnormal behaviors, and it has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV).
Abstract: The Internet of Things has broad application in military field, commerce, environmental monitoring, and many other fields. However, the open nature of the information media and the poor deployment environment have brought great risks to the security of wireless sensor networks, seriously restricting the application of wireless sensor network. Internet of Things composed of wireless sensor network faces security threats mainly from Dos attack, replay attack, integrity attack, false routing information attack, and flooding attack. In this paper, we proposed a new intrusion detection system based on -nearest neighbor (-nearest neighbor, referred to as KNN below) classification algorithm in wireless sensor network. This system can separate abnormal nodes from normal nodes by observing their abnormal behaviors, and we analyse parameter selection and error rate of the intrusion detection system. The paper elaborates on the design and implementation of the detection system. This system has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV). Finally, the test results show that: the system has high detection accuracy and speed, in accordance with the requirement of wireless sensor network intrusion detection.

Journal ArticleDOI
TL;DR: This paper proposes a decentralized lightweight authentication scheme called trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication networks that adopts the concept of transitive trust relationships to improve the performance of the authentication procedure and only needs a few storage spaces.
Abstract: The security of vehicular ad hoc networks (VANETs) has been receiving a significant amount of attention in the field of wireless mobile networking because VANETs are vulnerable to malicious attacks. A number of secure authentication schemes based on asymmetric cryptography have been proposed to prevent such attacks. However, these schemes are not suitable for highly dynamic environments such as VANETs, because they cannot efficiently cope with the authentication procedure. Hence, this still calls for an efficient authentication scheme for VANETs. In this paper, we propose a decentralized lightweight authentication scheme called trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication networks. TEAM adopts the concept of transitive trust relationships to improve the performance of the authentication procedure and only needs a few storage spaces. Moreover, TEAM satisfies the following security requirements: anonymity, location privacy, mutual authentication, forgery attack resistance, modification attack resistance, replay attack resistance, no clock synchronization problem, no verification table, fast error detection, perfect forward secrecy, man-in-the-middle attack resistance, and session key agreement.

Journal ArticleDOI
TL;DR: The approach is to classify existing contemporary wireless intrusion detection system (IDS) techniques based on target wireless network, detection technique, collection process, trust model and analysis technique.

Proceedings ArticleDOI
01 Dec 2014
TL;DR: This paper develops a WIPT protocol in two-way amplify-and-forward relaying channels, where two sources exchange information via an energy harvesting relay node, and analytically derives the exact expressions of the outage probability, the ergodic capacity and the finite-SNR diversity-multiplexing trade-off.
Abstract: Various wireless networks have made the ambient radio frequency signals around the world. Wireless information and power transfer (WIPT) enables the devices to recycle energy from these ambient radio frequency signals and process information simultaneously. In this paper, we develop a WIPT protocol in two-way amplify-and-forward relaying channels, where two sources exchange information via an energy harvesting relay node. The relay node collects energy from the received signal and uses it as the transmission power to forward the received signal. We analytically derive the exact expressions of the outage probability, the ergodic capacity and the finite-SNR diversity-multiplexing trade-off (DMT). Furthermore, the tight closed-form upper and lower bounds of the outage probability and the ergodic capacity are then developed. Moreover, the impact of the power splitting ratio is also evaluated and analyzed. Finally, we show that compared to the non-cooperative relaying scheme, the proposed protocol is a green solution to offer higher transmission rate and more reliable communication without consuming additional resource.

Proceedings ArticleDOI
27 Oct 2014
TL;DR: An overview on current research state, challenges, potentials of VANETs as well the way forward to achieving the long awaited ITS is provided.
Abstract: Recent advances in wireless communication technologies and auto-mobile industry have triggered a significant research interest in the field of VANETs over the past few years. VANET consists of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications supported by wireless access technologies such as IEEE 802.11p. This innovation in wireless communication has been envisaged to improve road safety and motor traffic efficiency in near future through the development of Intelligent Transport Systems (ITS). Hence, government, auto-mobile industries and academia are heavily partnering through several ongoing research projects to establish standards for VANETs. The typical set of VANET application areas, such as vehicle collision warning and traffic information dissemination have made VANET an interested field of wireless communication. This paper provides an overview on current research state, challenges, potentials of VANETs as well the way forward to achieving the long awaited ITS.

Journal ArticleDOI
TL;DR: A complete taxonomy on clustering in VANETs has been provided based upon various parameters and a comprehensive analysis of all the existing proposals in literature with respect to number of parameters is provided.

Journal ArticleDOI
TL;DR: It is reviewed how CR technologies such as dynamic spectrum access, adaptive software-defined radios, and cooperative communications will enhance vehicular communications and, hence, present the potential of transforming vehicle communication in terms of efficiency and safety.
Abstract: With growing interest in using cognitive radio (CR) technology in wireless communication systems for vehicles, it is envisioned that future vehicles will be CR-enabled. This paper discusses CR technologies for vehicular networks aimed at improving vehicular communication efficiency. CR for vehicular networks has the potential of becoming a killer CR application in the future due to a huge consumer market for vehicular communications. This paper surveys novel approaches and discusses research challenges related to the use of cognitive radio technology in vehicular ad hoc networks. We review how CR technologies such as dynamic spectrum access, adaptive software-defined radios, and cooperative communications will enhance vehicular communications and, hence, present the potential of transforming vehicle communication in terms of efficiency and safety. Our work is different from existing works in that we provide recent advances and open research directions on applying cognitive radio in vehicular ad hoc networks (CR-VANETs) focusing on architecture, machine learning, cooperation, reprogrammability, and spectrum management as well as QoE optimization for infotainment applications. A taxonomy of recent advances in cognitive radio for vehicular networks is also provided. In addition, several challenges and requirements have been identified. The research on applying CR in vehicular networks is still in its early stage, and there are not many experimental platforms due to their complex setup and requirements. Some related testbeds and research projects are provided at the end.

Journal ArticleDOI
TL;DR: This paper surveys existing data dissemination techniques and their performance modeling approaches in VANETs, along with optimization strategies under two basic models: the push model, and the pull model and presents major research challenges.

Journal ArticleDOI
TL;DR: This paper surveys emerging and established wireless ad-hoc technologies and highlights their security/privacy features and deficiencies, and identifies open research issues and technology challenges for each surveyed technology.

Journal ArticleDOI
TL;DR: Opportunistic Flooding is introduced, a novel design tailored for low-duty-cycle networks with unreliable wireless links and predetermined working schedules and achieves significantly shorter flooding delay while consuming only 20-60% of the transmission energy.
Abstract: Flooding service has been investigated extensively in wireless networks to efficiently disseminate network-wide commands, configurations, and code binaries. However, little work has been done on low-duty-cycle wireless sensor networks in which nodes stay asleep most of the time and wake up asynchronously. In this type of network, a broadcasting packet is rarely received by multiple nodes simultaneously, a unique constraining feature that makes existing solutions unsuitable. In this paper, we introduce Opportunistic Flooding, a novel design tailored for low-duty-cycle networks with unreliable wireless links and predetermined working schedules. Starting with an energy-optimal tree structure, probabilistic forwarding decisions are made at each sender based on the delay distribution of next-hop receivers. Only opportunistically early packets are forwarded via links outside the tree to reduce the flooding delay and redundancy in transmission. We further propose a forwarder selection method to alleviate the hidden terminal problem and a link-quality-based backoff method to resolve simultaneous forwarding operations. We show by extensive simulations and test-bed implementations that Opportunistic Flooding is close to the optimal performance achievable by oracle flooding designs. Compared with Improved Traditional Flooding, our design achieves significantly shorter flooding delay while consuming only 20-60% of the transmission energy.

Journal ArticleDOI
30 Apr 2014
TL;DR: A survey of VANETs attacks and solutions is presented in carefully considering other similar works as well as updating new attacks and categorizing them into different classes.
Abstract: Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency and other added services. However, VANETs are themselves vulnerable against attacks that can directly lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as well as updating new attacks and categorizing them into different classes.

Proceedings ArticleDOI
27 May 2014
TL;DR: A realistic mobility model designed for UAV ad hoc networks is presented since evaluating the performances of ad hoc protocols is an important step in order to predict possible problems that can affect the system in the real environment.
Abstract: With the technological advances, there is an increasing attention on micro-UAVs in the military area as well as in the civilian domain. They are used as swarm (several UAVs) forming a UAS (Unmanned Aircraft System) since they are relatively cheap and offer better performance than one aircraft. The UAVs, in a UAS, have to exchange information with each other and with the control station in order to create a clear vision of the swarm situation and the task performance. This exchange is made possible by the application of an ad hoc network between UAVs which is a challenging issue because of the node mobility, the network topology change, and the operation communication requirements in term of quality of service (delay, throughput or loss rate for instance). This paper presents a realistic mobility model designed for UAV ad hoc networks. since evaluating the performances of ad hoc protocols is an important step in order to predict possible problems that can affect the system in the real environment. This mobility model behavior is compared to the well-known mobility model behavior Random-Way Point. It is also compared to real movements traces using several metrics.

Journal ArticleDOI
01 Feb 2014
TL;DR: This work presents a novel, mobility-based clustering scheme for Vehicular Ad hoc Networks, which forms clusters using the Affinity Propagation algorithm in a distributed manner and produces clusters with high stability.
Abstract: The need for an effective clustering algorithm for Vehicular Ad Hoc Networks (VANETs) is motivated by the recent research in cluster-based MAC and routing schemes. VANETs are highly dynamic and have harsh channel conditions, thus a suitable clustering algorithm must be robust to channel error and must consider node mobility during cluster formation. This work presents a novel, mobility-based clustering scheme for Vehicular Ad hoc Networks, which forms clusters using the Affinity Propagation algorithm in a distributed manner. This proposed algorithm considers node mobility during cluster formation and produces clusters with high stability. Cluster performance was measured in terms of average clusterhead duration, average cluster member duration, average rate of clusterhead change, and average number of clusters. The proposed algorithm is also robust to channel error and exhibits reasonable overhead. Simulation results confirm the superior performance, when compared to other mobility-based clustering techniques.

Journal ArticleDOI
TL;DR: Simulation results validate the analysis and demonstrate that the proposed spectrum access scheme can achieve higher utility and fairness, compared with a random access scheme.
Abstract: In this paper, we investigate the opportunistic spectrum access for cognitive radio vehicular ad hoc networks. The probability distribution of the channel availability is first derived through a finite-state continuous-time Markov chain, jointly considering the mobility of vehicles and the spatial distribution and temporal channel usage pattern of primary transmitters. Utilizing the channel availability statistics, we propose a game-theoretic spectrum access scheme for vehicles to opportunistically access licensed channels in a distributed manner. In particular, the spectrum access process is modeled as a noncooperative congestion game. The existence of the Nash equilibrium (NE) is proved, and its efficiency is analyzed when employing the uniform medium access control protocol and slotted ALOHA, respectively. Furthermore, a spectrum access algorithm is devised to achieve a pure NE with high efficiency and fairness. Simulation results validate our analysis and demonstrate that the proposed spectrum access scheme can achieve higher utility and fairness, compared with a random access scheme.

Journal ArticleDOI
TL;DR: This paper examines the applicability of CCN principles to wireless networks with distributed access control, different degrees of node mobility and resource constraints, and provides some guidelines for readers approaching research on CCN, by highlighting points of strength and weaknesses and reviewing the current state of the art.

Journal ArticleDOI
TL;DR: An integrative analysis of deterministic protocols via a generic framework is given and several representative protocols are presented, respectively, pointing out promising research directions towards energy-efficient neighbor discovery.
Abstract: Due to slow advance in battery technology, power remains a bottleneck to limit wide applications of mobile ad hoc and wireless sensor networks. Among all extensive studies on minimizing power consumption, neighbor discovery is one of the fundamental components focusing on communication and access. This work surveys research literature on neighbor discovery protocols (NDPs). In general, they can be roughly classified by four underlying principles: randomness, over-half occupation, rotation-resistant intersection, and coprime cycles. The Birthday protocols act as representatives of NDPs using randomness, in which a node decides to listen, transmit, or sleep with probabilities. The original idea of over-half occupation is to be active over at least half of each period, though several refinements have been proposed to decrease its high duty cycle. Methods of rotation-resistant intersection formulate the problem of discovery using combinatorial characteristics of discrete time slots, and guarantee discovery at least once per period. Moreover, neighbor discovery can also be guaranteed within a worst-case bound, as shown by methods adopting coprime cycles. In this paper, we elaborate on these ideas and present several representative protocols, respectively. In particular, we give an integrative analysis of deterministic protocols via a generic framework. A qualitative comparison incorporating multiple criteria and a quantitative evaluation on energy efficiency are also included. Finally, we point out promising research directions towards energy-efficient neighbor discovery.

Journal ArticleDOI
TL;DR: In this paper, the authors proposed a tractable baseline multicast D2D model, and used it to analyze important multicast metrics like the coverage probability, mean number of covered receivers and throughput.
Abstract: Multicast device-to-device (D2D) transmission is important for applications like local file transfer in commercial networks and is also a required feature in public safety networks. In this paper we propose a tractable baseline multicast D2D model, and use it to analyze important multicast metrics like the coverage probability, mean number of covered receivers and throughput. In addition, we examine how the multicast performance would be affected by certain factors like dynamics (due to e.g., mobility) and network assistance. Take the mean number of covered receivers as an example. We find that simple repetitive transmissions help but the gain quickly diminishes as the number of repetitions increases. Meanwhile, dynamics and network assistance (i.e., allowing the network to relay the multicast signals) can help cover more receivers. We also explore how to optimize multicasting, e.g. by choosing the optimal multicast rate and the optimal number of retransmission times.

Journal ArticleDOI
TL;DR: Simulation results show that DRIVE performs data dissemination with better efficiency than other algorithms, outperforming them in different scenarios in all the evaluations carried out.

Journal ArticleDOI
TL;DR: This paper designs and implements an efficient and light-weight intrusion detection mechanism for vehicular network (ELIDV) that aims to protect the network against three kinds of attacks: denial of service (DoS), integrity target, and false alert's generation.
Abstract: Vehicular ad hoc networks (VANETs) are wireless networks that provide high-rate data communication among moving vehicles and between the vehicles and the road-side units. VANETs are considered as the main wireless communication platforms for the intelligent transportation systems (ITS). Service-oriented vehicular networks are special categories for VANETs that support diverse infrastructure-based commercial infotainment services including, for instance, Internet access, real-time traffic monitoring and management, video streaming. Security is a fundamental issue for these service networks due to the relevant business information handled in these networks. In this paper, we design and implement an efficient and light-weight intrusion detection mechanism, called efficient and light-weight intrusion detection mechanism for vehicular network (ELIDV) that aims to protect the network against three kinds of attacks: denial of service (DoS), integrity target, and false alert's generation. ELIDV is based on a set of rules that detects malicious vehicles promptly and with high accuracy. We present the performance analysis of our detection mechanism using NS-3 simulator. Our simulation results show that ELIDV exhibits a high-level security in terms of highly accurate detection rate (detection rate more than 97%), low false positive rate (close to 1%), and exhibits a lower overhead compared to contemporary frameworks.

Journal ArticleDOI
TL;DR: This paper discusses algorithms, protocols, and mechanisms that deal directly with congestion control and avoidance in WSNs, a special category of wireless ad hoc networks with unique characteristics and important limitations.
Abstract: Congestion control and reliable data delivery are two primary functions of the transport layer in wired and wireless networks. Wireless sensor networks (WSNs) are a special category of wireless ad hoc networks with unique characteristics and important limitations. Limitations concern their resources, such as energy, memory, and computational power, as well as their applications. Due to these limitations and characteristics, the Transmission Control Protocol (TCP), the legacy protocol that implements congestion control and reliable transmission in the Internet, cannot apply to WSNs in its traditional form. To deal with this unavailability of a standard solution, many efforts are taking place in this area. In this paper, we review, classify, and compare algorithms, protocols, and mechanisms that deal directly with congestion control and avoidance in WSNs.