70
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

Connectivity-based Cross-Layer Opportunistic Forwarding for MWSNs

, &

REFERENCES

  • W. Guojun, W. Tiang, J. Weijia, G. Minyi, C. HsiaoHwa, and G. Mohsen, “Local update-based routing protocol in wireless sensor networks with mobile sinks,” in Proceedings of the IEEE International Conference on Communications, ICC'07, Glasgow, 2007, pp. 3094–9.
  • R. Zahra, and T. J. Akbari, “An Energy Efficient MCDS-based Routing Algorithm for Wireless Sensor Networks: Learning Automata Approach,” PRZEGLD ELEKTROTECHNICZNY (Electrical Review), ISSN 0033-2097, R. 88 NR 11a/ 2012.
  • O. A. Massayuki, and F. A. Augusto, “Ant-based dynamic hop optimization protocol: A routing algorithm for mobile wireless sensor networks,” IEEE GLOBECOM Workshops, pp. 1139–43, Dec. 2011, E-ISBN :978-1-4673-0038-4.
  • H. Xiaoxia, Z. Hongqiang, and F. Yuguang, “Robust cooperative routing protocol in mobile wireless sensor networks,” IEEE Trans. Wireless Communications, Vol. 7, no. 12, pp. 5278–85, Dec. 2008.
  • M. Xufei, T. Shaojie, X. Xiahua, L. Xiang-Yang, and M. Huadong, “Energy-efficient opportunistic routing in wireless sensor networks,” IEEE Trans. Parallel and Distributed Systems, Vol. 22, no. 11, pp. 1934–42, 2011.
  • K. Akkaya, and M. Younis, “Energy-aware routing to a mobile gateway in wireless sensor networks,” in IEEE Global Telecommunications Conference Workshops, Dallas, TX, Dec. 2004, pp. 16–21.
  • J. N. Al-Karaki, and A. E. Kamal, “Routing techniques in wireless sensor networks: A survey,” IEEE Wireless Communications, Vol. 11, no. 6, pp. 6–28, Dec. 2004.
  • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A survey,” Computer Networks, Vol. 38, pp. 393–422, Mar. 2002.
  • L. Blazevic, J.-Y. Le Boudec, and S. Giordano, “A location-based routing method for mobile ad hoc networks,” IEEE Trans. Mobile Computing, Vol. 4, no. 2, pp. 97–110, Mar./Apr. 2005.
  • S. Madani, D. Weber, and S. Mahlknecht, “Position-based routing protocol for low power wireless sensor networks,” J. Universal Computer Science, Vol. 16, no. 9, pp. 1215–33, May 2010.
  • W. Bernd-ludwig, L. Arturas, T. Andreas, G.R.G. Carmelita, and T. Slobodanka, “Opportunistic distance aware routing in multi-sink mobile wireless sensor networks,” in Proceedings of ICT Mobile Summit, Stockholm, 2008, pp. 97–110.
  • A. R. Khan, S. A. Madani, H. Khizar, and S. U. Khan, “Clustering based power controlled routing for mobile wireless sensor networks,” Int. J. Communication Systems, Vol. 25, no. 4, pp. 529–42, Mar. 2011.
  • C. Pandana, and Liu K. J. Ray, “Robust connectivity-aware energy-efficient routing for wireless sensor networks,” IEEE Trans. Wireless Communications, Vol. 7, no. 10, pp. 3904–16, Oct. 2008.
  • J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, “Algorithms for energy-efficient multicasting in ad hoc wireless networks,” ACM/Springer Mobile Networks and Applications, Vol. 6, no. 3, pp. 251–63, Jun. 2001.
  • M. Fiedler, “Algebraic connectivity of graphs,” Czechoslovak Mathematical J., Vol. 23, no. 2, pp. 298–305, 1973.
  • S. Singh, M. Woo, and C. S. Raghavendra, “Power-aware routing in mobile ad hoc networks,” in MobiCom '98 Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, 1998, pp. 181–90.
  • J. H. Chang, and L. Tassiulas, “Maximum lifetime routing in wireless sensor networks,” IEEE/ACM Trans. Networking, Vol. 12, no. 4, pp. 609–19, Aug.2004.
  • M. Stemm, and R. H. Katz, “Measuring and reducing energy consumption of network interfaces in hand-held devices,” IEICE Trans. On Communication, Vol. E80-B, no. 8, pp. 1125–31, Aug. 1997.
  • C. E. Perkins, and P. Bhagwat, “Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers,” in SIGCOMM '94 Proceedings of the Conference on Communications Architectures, Protocols and Applications, London, Aug. 1994, pp. 234–44.
  • M. K. Marina, and S. R. Das, “Ad hoc on-demand multipath distance vector routing,” Wireless Communications and Mobile Computing, Vol. 6, no. 7, pp. 969–88, Nov. 2006.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.