Efficient data-forwarding method in delay-tolerant P2P networking for IoT services

Peer-to-Peer Networking and Applications - Tập 11 - Trang 1176-1185 - 2017
Seokhoon Kim1, Dae-Young Kim2
1Department of Computer Software Engineering, Soonchunhyang University, Asan, Republic of Korea
2School of Information Technology Engineering, Daegu Catholic University, Gyeongsan, Republic of Korea

Tóm tắt

These days Internet of Things (IoT), which consists of smart objects such as sensor nodes is the most important technology for providing intelligent services. In the IoT ecosystem, wireless sensor networks deliver collected information from IoT devices to a server via sink nodes, and IoT services are provided by peer-to-peer (P2P) networking between the server and the IoT devices. Particularly, IoT applications with wide service area requires the mobile sink nodes to cover the service area. To employ mobile sink nodes, the network adopts delay-tolerant capability by which delay-tolerant nodes try to transmit data when they connect to the mobile sink node in the application service field. However, if the connection status between a IoT device and a mobile sink node is not good, the efficiency of data forwarding will be decreased. In addition, retransmission in bad connection cause high energy consumption for data transmission. Therefore, data forwarding in the delay-tolerant based services needs to take the connection status into account. The proposed method predicts the connection status using naïve Bayesian classifier and determines whether the delay tolerant node transmits data to the mobile sink node or not. Furthermore, the efficiency of the proposed method was validated through extensive computer simulations.

Tài liệu tham khảo

Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Elsevier Futur Gener Comput Syst 29(7):1645–1660 Sundmaeker H, Guillemin P, Friess P, Woelfflé S (eds) (2010) Vision and challenges for realising the internet of things. Publications Office of the European Union, Luxembourg Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Elsevier Comput Netw 54(15):2787–2805 Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wirel Pers Commun 55(1):49–69 Kim S, Na W (2016) Safe data transmission architecture based on cloud for internet of things. Wirel Pers Commun 86(1):287–300 Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirei E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114 Culler D, Estrin D, Srivastava M (2004) Guest editors introduction: overview of sensor networks. IEEE Computer 37(8):41–49 Deng R, Liang H, Young J, Chai B, Yang T (2017) Distributed rate control, routing, and energy management in dynamic rechargeable sensor networks. Peer-to-Peer Netw Appl 10(3):425–439 Ghosh A, Das SK (2008) Coverage and connectivity issues in wireless sensor networks: a survey. Elsevier Pervasive Mob Comput 4(3):303–334 Kim D-Y, Cho J, Jeong B-S (2010) Practical data transmission in cluster-based sensor networks. KSII Trans. Internet Inf Syst (TIIS) 4(3):224–242 Kim D-Y, Jin Z, Choi J, Lee B, Cho J (2015) Transmission power control with the guaranteed communication reliability in WSN. In: International journal of distributed sensor networks, Vol. 2015, ID 632590 Zhu C, Han G, Zhang H (2017) A honeycomb structure based data gathering scheme with a mobile sink for wireless sensor networks. Peer-to-Peer Netw Appl 10(3):484–499 Amgoth T, Jana PK (2017) Coverage hole detection and restoration algorithm for wireless sensor networks. Peer-to-Peer Netw Appl 10(1):66–78 Kim D-Y, Jung M (2017) Data transmission and network architecture in long range low power sensor networks for IoT. Wirel Pers Commun 93(1):119–129 Conti M, Giordano S, May M, Passarella A (2010) From opportunistic networks to opportunistic computing. IEEE Commun Mag 48(9):126–139 Reina DG, Askalani M, Toral SL, Barrero F, Asimakopoulou E, Bessis N (2015) A survey on multihop ad hoc networks for disaster response scenarios. In: International journal of distributed sensor networks, Vol. 2015, ID 647037 Takahashi A, Nishiyama H, Kato N (2013) Fairness issue in message delivery in delay- and disruption-tolerant networks for disaster area. In: Proc. of IEEE international conference on computing, networking and communications (ICNC). IEEE, San Diego, pp 890–894 Spyropoulos T, Psounis K, Raghavendra CS (2004) Single-copy routing in intermittently connected mobile networks. In: Proc. of IEEE communications society conference on sensor and ad hoc communications and networks (SECON), IEEE, Santa Clara Sushant J, Fall K, Patra R (2004) Routing in a delay tolerant network. In: Proc. of ACM international conference on applications, technologies, architectures and protocols for computer communications (SIGCOMM), ACM, Portland, pp 145–158 Vahdat A, Beeker D (2000) Epidemic routing for partially-connected ad hoc networks. Technical Report CS-2000-06 Ahmed S, Kanhere SS (2010) A bayesian routing framework for delay tolerant networks. In: Proc. of IEEE wireless communications and networking conference (WCNC). IEEE, Sydney Marsland S (2009) Machine learning an algorithmic perspective. Chapman & Hall, New York D.-Y. Kim, D. Ko, S. Kim, “Network access control for location-based mobile services in heterogeneous wireless networks,” Mobile information systems, Vol. 2017, ID 6195024, 2017 Ross SM (2001) Probability models for computer science. Harcourt/Academic Press, Orlando Yates RD, Goodman DJ (2004) Probability and stochastic processes: a friendly introduction for electrical and computer engineers. Wiley, New York Trivedi KS (2001) Probability and statistics with reliability, queuing and computer science applications. Wiley, Chichester MacDougall MH (1987) Simulating computer systems, techniques and tool. MIT Press, Cambridge, USA IEEE (2006) IEEE standard for information technology – telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - part 15.4: wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for low-rate wireless personal area networks (LR-WPAN). IEEE Standard 802.15.4–2006. IEEE, Piscataway