Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2015, Article ID 634759, 10 pages
http://dx.doi.org/10.1155/2015/634759
Research Article

Heuristic Approach to Select Opportunistic Routing Forwarders (HASORF) to Enhance Throughput for Wireless Sensor Networks

1Department of Information and Communication Engineering, Yeungnam University, Gyeongsangbuk-do, Gyeongsan-si 712-749, Republic of Korea
2School of Engineering and Computer Science, Victoria University of Wellington, Wellington 6140, New Zealand

Received 13 November 2014; Revised 11 February 2015; Accepted 20 February 2015

Academic Editor: Bo-Wei Chen

Copyright © 2015 Yousaf Bin Zikria et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. Dressler and O. B. Akan, “A survey on bio-inspired networking,” Computer Networks, vol. 54, no. 6, pp. 881–900, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. S. S. Iyengar, H.-C. Wu, N. Balakrishnan, and S. Y. Chang, “Biologically inspired cooperative routing for wireless mobile sensor networks,” IEEE Systems Journal, vol. 1, no. 1, pp. 29–37, 2007. View at Publisher · View at Google Scholar
  3. K. Martinez, R. Ong, J. K. Hart, and J. Stefanov, “Glacsweb: a sensor web for glaciers,” in Proceedings of the IEEE 1st European Workshop on Wireless Sensor Networks (EWSN '04), Berlin, Germany, January 2004.
  4. F. Michahelles, P. Matter, A. Schmidt, and B. Schiele, “Applying wearable sensors to avalanche rescue,” Computers and Graphics, vol. 27, no. 6, pp. 839–847, 2003. View at Publisher · View at Google Scholar · View at Scopus
  5. K. Römer and F. Mattern, “The design space of wireless sensor networks,” IEEE Wireless Communications, vol. 11, no. 6, pp. 54–61, 2004. View at Publisher · View at Google Scholar · View at Scopus
  6. W. Marshall, C. Roadknight, I. Wokoma, and L. Sacks, Self-Organizing Sensor Networks, UbiNet, London, UK, 2003.
  7. P. Juang, H. Oki, Y. Wang, M. Martonosi, L.-S. Peh, and D. Rubenstein, “Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet,” in Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 96–107, San Jose, Calif, USA, October 2002. View at Scopus
  8. Z. Butler, P. Corke, R. Peterson, and D. Rus, “Networked cows: virtual fences for controlling cows,” in Proceedings of the Workshop on Applications of Mobile Embedded Systems (WAMES '04), Boston, Mass, USA, June 2004.
  9. A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson, “Wireless sensor networks for habitat monitoring,” in Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, pp. 88–97, Atlanta, Ga, USA, September 2002. View at Scopus
  10. R. Beckwith, D. Teibel, and P. Bowen, “Pervasive computing and proactive agriculture,” in Proceedings of the 2nd International Conference of Pervasive Computing, Vienna, Austria, April 2004.
  11. F. Michahelles, P. Matter, A. Schmidt, and B. Schiele, “Applying wearable sensors to avalanche rescue,” Computers & Graphics, vol. 27, no. 6, pp. 839–847, 2003. View at Publisher · View at Google Scholar · View at Scopus
  12. Neurfon, 2012, http://www.motorola.com/content.jsp?globalObjectId=290.
  13. Holter Systems, Med-electronics Inc, 2014, http://med-electronics.com/.
  14. Cardio Micro Sensor, 2014, http://www.cardiomems.com.
  15. D. S. J. de Couto, D. Aguayo, J. Bicket, and R. Morris, “A high-throughput path metric for multi-hop wireless routing,” in Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (MobiCom '03), pp. 134–146, 2003. View at Publisher · View at Google Scholar
  16. S. Biswas and R. Morris, “Opportunistic routing in multi-hop wireless networks,” in Proceedings of the 2nd Workshop on Hot Topics in Networks (HotNets '03), Cambridge, Mass, USA, November 2003.
  17. S. Biswas and R. Morris, “ExOR: opportunistic multi-hop routing for wireless networks,” in Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '05), pp. 133–144, ACM, 2005. View at Publisher · View at Google Scholar · View at Scopus
  18. E. Rozner, J. Seshadri, Y. A. Mehta, and L. Qiu, “SOAR: simple opportunistic adaptive routing protocol for wireless mesh networks,” IEEE Transactions on Mobile Computing, vol. 8, no. 12, pp. 1622–1635, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. T. Li, D. Leith, and L. Qiu, “Opportunistic routing for interactive traffic in wireless networks,” in Proceedings of the 30th International Conference on Distributed Computing Systems (ICDCS '10), pp. 458–467, IEEE, Genoa, Italy, June 2010. View at Publisher · View at Google Scholar
  20. Z. Wang, Y. Chen, and C. Li, “CORMAN: a novel cooperative opportunistic routing scheme in mobile Ad Hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 289–296, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. E. Rozner, J. Seshadri, Y. Mehta, and L. Qiu, “Simple opportunistic adaptive routing protocol for wireless mesh networks,” IEEE Transactions on Mobile Computing, vol. 8, no. 12, pp. 1622–1635, 2009. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Chachulski, M. Jennings, and S. Katti, “Trading structure for randomness in wireless opportunistic routing,” in Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '07), vol. 37, pp. 169–180, 2007.
  23. Y. C. Cheng, J. Bellardo, P. Benko et al., “Jigsaw: solving the puzzle of enterprise 802.11 analysis,” in Proceedings of the ACM SIGCOMM Conference, 2006.
  24. N. Celandroni, F. Davoli, E. Ferro, and A. Gotta, “Long-lived TCP connections via satellite: cross-layer bandwidth allocation, pricing, and adaptive control,” IEEE/ACM Transactions on Networking, vol. 14, no. 5, pp. 1019–1030, 2006. View at Publisher · View at Google Scholar · View at Scopus
  25. Y. Yuan, H. Yang, S. Wong, S. Lu, and W. Arbaugh, “ROMER: resilient opportunistic mesh routing for wireless mesh networks,” in Proceedings of the 1st IEEE Workshop on Wireless Mesh Networks (WiMesh'05), 2005.
  26. K. L. Judd, “The law of large numbers with a continuum of IID random variables,” Journal of Economic Theory, vol. 35, no. 1, pp. 19–25, 1985. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  27. http://www.isi.edu/nsnam/ns/.
  28. J. Cai, X. Song, J. Wang, and M. Gu, “Reliability analysis for chain topology wireless sensor networks with multiple-sending transmission scheme,” EURASIP Journal on Wireless Communications and Networking, vol. 2014, article 156, 13 pages, 2014. View at Publisher · View at Google Scholar
  29. J. Y. Yoo and J. Kim, “Maximum end-to-end throughput of chain-topology wireless multi-hop networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '07), pp. 4282–4286, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  30. G. Guido, A. Vitale, V. Astarita, F. Saccomanno, V. P. Giofré, and V. Gallelli, “Estimation of safety performance measures from smartphone sensors,” Procedia-Social and Behavioral Journal, vol. 54, pp. 1095–1103, 2012. View at Publisher · View at Google Scholar