GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Geography-informed energy conservation for Ad Hoc routing
Proceedings of the 7th annual international conference on Mobile computing and networking
The holes problem in wireless sensor networks: a survey
ACM SIGMOBILE Mobile Computing and Communications Review
Look-ahead geographic routing for sensor networks
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
Context-aware geographic routing for sensor networks with routing holes
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
IEEE Transactions on Signal Processing
Target Location Estimation in Sensor Networks With Quantized Data
IEEE Transactions on Signal Processing
Hi-index | 0.00 |
Wireless Sensor Networks (WSNs) consist of a large number of low powered nodes that need to operate for months unattended. Since modern WSNs are used in various applications, their topology is becoming complicated. Due to limited precision of deployment, holes may occur in the network, which often lead traditional Greedy Forwarding algorithms to fail. Thus, bypassing the holes is one of the important issues for WSNs. Since each node has limited energy, its energy consumption needs to be optimized to prolong network lifetime. In the well-known Virtual Position (ViP) scheme, each node routes data using virtual positions instead of actual geographic positions to improve the packet delivery rate. A Hole-bypassing Routing with Context-awareness scheme achieves balanced energy consumption by changing current path to one of the candidate paths, based on the residual energy of nodes. However, this scheme tends to extend the size of holes. Since existing hole detour schemes that do not consider efficient energy consumption, they cause imbalanced energy consumption and make network lifetime relatively shorter than other hole detour schemes. Similar to ViP, our scheme uses virtual positions to bypass holes. However, the virtual positions are computed using both geographic positions and the residual energies of neighbor nodes. Our approach outperforms the ViP scheme in terms of network lifetime and hole extension.