Efficient data-forwarding method in delay-tolerant P2P networking for IoT services
Tóm tắt
These days Internet of Things (IoT), which consists of smart objects such as sensor nodes is the most important technology for providing intelligent services. In the IoT ecosystem, wireless sensor networks deliver collected information from IoT devices to a server via sink nodes, and IoT services are provided by peer-to-peer (P2P) networking between the server and the IoT devices. Particularly, IoT applications with wide service area requires the mobile sink nodes to cover the service area. To employ mobile sink nodes, the network adopts delay-tolerant capability by which delay-tolerant nodes try to transmit data when they connect to the mobile sink node in the application service field. However, if the connection status between a IoT device and a mobile sink node is not good, the efficiency of data forwarding will be decreased. In addition, retransmission in bad connection cause high energy consumption for data transmission. Therefore, data forwarding in the delay-tolerant based services needs to take the connection status into account. The proposed method predicts the connection status using naïve Bayesian classifier and determines whether the delay tolerant node transmits data to the mobile sink node or not. Furthermore, the efficiency of the proposed method was validated through extensive computer simulations.
Tài liệu tham khảo
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Elsevier Futur Gener Comput Syst 29(7):1645–1660
Sundmaeker H, Guillemin P, Friess P, Woelfflé S (eds) (2010) Vision and challenges for realising the internet of things. Publications Office of the European Union, Luxembourg
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Elsevier Comput Netw 54(15):2787–2805
Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wirel Pers Commun 55(1):49–69
Kim S, Na W (2016) Safe data transmission architecture based on cloud for internet of things. Wirel Pers Commun 86(1):287–300
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirei E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114
Culler D, Estrin D, Srivastava M (2004) Guest editors introduction: overview of sensor networks. IEEE Computer 37(8):41–49
Deng R, Liang H, Young J, Chai B, Yang T (2017) Distributed rate control, routing, and energy management in dynamic rechargeable sensor networks. Peer-to-Peer Netw Appl 10(3):425–439
Ghosh A, Das SK (2008) Coverage and connectivity issues in wireless sensor networks: a survey. Elsevier Pervasive Mob Comput 4(3):303–334
Kim D-Y, Cho J, Jeong B-S (2010) Practical data transmission in cluster-based sensor networks. KSII Trans. Internet Inf Syst (TIIS) 4(3):224–242
Kim D-Y, Jin Z, Choi J, Lee B, Cho J (2015) Transmission power control with the guaranteed communication reliability in WSN. In: International journal of distributed sensor networks, Vol. 2015, ID 632590
Zhu C, Han G, Zhang H (2017) A honeycomb structure based data gathering scheme with a mobile sink for wireless sensor networks. Peer-to-Peer Netw Appl 10(3):484–499
Amgoth T, Jana PK (2017) Coverage hole detection and restoration algorithm for wireless sensor networks. Peer-to-Peer Netw Appl 10(1):66–78
Kim D-Y, Jung M (2017) Data transmission and network architecture in long range low power sensor networks for IoT. Wirel Pers Commun 93(1):119–129
Conti M, Giordano S, May M, Passarella A (2010) From opportunistic networks to opportunistic computing. IEEE Commun Mag 48(9):126–139
Reina DG, Askalani M, Toral SL, Barrero F, Asimakopoulou E, Bessis N (2015) A survey on multihop ad hoc networks for disaster response scenarios. In: International journal of distributed sensor networks, Vol. 2015, ID 647037
Takahashi A, Nishiyama H, Kato N (2013) Fairness issue in message delivery in delay- and disruption-tolerant networks for disaster area. In: Proc. of IEEE international conference on computing, networking and communications (ICNC). IEEE, San Diego, pp 890–894
Spyropoulos T, Psounis K, Raghavendra CS (2004) Single-copy routing in intermittently connected mobile networks. In: Proc. of IEEE communications society conference on sensor and ad hoc communications and networks (SECON), IEEE, Santa Clara
Sushant J, Fall K, Patra R (2004) Routing in a delay tolerant network. In: Proc. of ACM international conference on applications, technologies, architectures and protocols for computer communications (SIGCOMM), ACM, Portland, pp 145–158
Vahdat A, Beeker D (2000) Epidemic routing for partially-connected ad hoc networks. Technical Report CS-2000-06
Ahmed S, Kanhere SS (2010) A bayesian routing framework for delay tolerant networks. In: Proc. of IEEE wireless communications and networking conference (WCNC). IEEE, Sydney
Marsland S (2009) Machine learning an algorithmic perspective. Chapman & Hall, New York
D.-Y. Kim, D. Ko, S. Kim, “Network access control for location-based mobile services in heterogeneous wireless networks,” Mobile information systems, Vol. 2017, ID 6195024, 2017
Ross SM (2001) Probability models for computer science. Harcourt/Academic Press, Orlando
Yates RD, Goodman DJ (2004) Probability and stochastic processes: a friendly introduction for electrical and computer engineers. Wiley, New York
Trivedi KS (2001) Probability and statistics with reliability, queuing and computer science applications. Wiley, Chichester
MacDougall MH (1987) Simulating computer systems, techniques and tool. MIT Press, Cambridge, USA
IEEE (2006) IEEE standard for information technology – telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - part 15.4: wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for low-rate wireless personal area networks (LR-WPAN). IEEE Standard 802.15.4–2006. IEEE, Piscataway