Energy efficient wireless unicast routing alternatives for machine-to-machine networks

2011-09-01
Tekbiyik, Neyre
Uysal, Elif
Machine-to-machine (M2M) communications is a new and rapidly developing technology for large-scale networking of devices without dependence on human interaction. Energy efficiency is one of the important design objectives for machine-to-machine network architectures that often contain multihop wireless subnetworks. Constructing energy-efficient routes for sending data through such networks is important not only for the longevity of the nodes which typically depend on battery energy, but also for achieving an environmentally friendly system design overall, which will be imperative as M2M networks scale in number of nodes as projected. The objective of this survey is to provide a comprehensive look into shortest-path based energy-efficient routing alternatives to provide a reference for system designers as well as researchers. We start by describing M2M and its application areas, as well as its challenges. Next, a detailed account of energy-efficient unicast routing alternatives, with a particular focus on those based on additive link cost is given. Following a novel comprehensive classification of shortest-path-based energy-efficient routing algorithms designed for wireless ad hoc and sensor networks, we end by comparisons and discussions of the use of different cost metrics.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS

Suggestions

SWARM-based data delivery in Social Internet of Things
Hasan, Mohammed Zaki; Al-Turjman, Fadi (Elsevier BV, 2019-03-01)
Social Internet of Things (SIoTs) refers to the rapidly growing network of connected objects and people that are able to collect and exchange data using embedded sensors. To guarantee the connectivity among these objects and people, fault tolerance routing has to be significantly considered. In this paper, we propose a bio-inspired particle multi-swarm optimization (PMSO) routing algorithm to construct, recover and select k-disjoint paths that tolerates the failure while satisfying quality of service (QoS) ...
Cognitive-Node Architecture and a Deployment Strategy for the Future WSNs
Al-Turjman, Fadi (Springer Science and Business Media LLC, 2019-10-01)
The advent of sensing and communication technologies represents the next step in the evolution of wireless sensor networks (WSNs) and future applications. Future WSNs systems demand that connected devices could be able to work autonomously, while surfing on-line generated data and process them for self-decision making. Accordingly, we propose a cognitive Information-Centric Sensor Network (ICSN) framework. The fundamentals of cognition in ICSN can be recognized as a promising direction in addressing opportu...
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm
Cakmakci, Salva Daneshgadeh; Kemmerich, Thomas; Ahmed, Tarem; Baykal, Nazife (Elsevier BV, 2020-10-01)
Distributed denial-of-service (DDoS) attacks are constantly evolving as the computer and networking technologies and attackers' motivations are changing. In recent years, several supervised DDoS detection algorithms have been proposed. However, these algorithms require a priori knowledge of the classes and cannot automatically adapt to frequently changing network traffic trends. This emphasizes the need for the development of new DDoS detection mechanisms that target zero-day and sophisticated DDoS attacks....
PLGAKD: A PUF-based Lightweight Group Authentication and Key Distribution Protocol
Yıldız, Hüsnü; Cenk, Murat; Onur, Ertan (Institute of Electrical and Electronics Engineers (IEEE), 2020-11-01)
Securing Internet of Things (IoT) applications that collect and transport sensitive data by guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing computation and communication overhead of security functions is also a key concern since a large number of constrained devices may take place in such applications. Our main focus in this paper is group authentication and key management in IoT. The existing group authentication and key management protocols in the literature per...
Mobile multi-access IP: a proposal for mobile multi-access management in future wireless IP networks
Altuntas, S; Baykal, Buyurman (Elsevier BV, 2005-03-15)
As the wireless networking technologies advance rapidly, providing mobile users with roaming freely in heterogeneous wireless access domains, the need for multi-access arises. This paper introduces the Mobile Multi-Access Management Architecture (MMA-IP) for IP-based future wireless networks. MMA-IP enables mobile users to utilize multiple access domains synchronously and to switch between different access domains. In order to handle multi-access operations, MMA-IP defines a new special mobility agent, call...
Citation Formats
N. Tekbiyik and E. Uysal, “Energy efficient wireless unicast routing alternatives for machine-to-machine networks,” JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, pp. 1587–1614, 2011, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/46255.