Abstract

Although some progress has been made in studying the triggering updating methods of interest message for reducing node energy consumption in directed diffusion routing protocols, they do not consider the anisotropy of sensing areas of nodes and the requirement of diversity of interest message exchange rates within real-time performance, which makes these studies unable to accurately adapt to the characteristics of interest message update. In this work, we proposed an improved triggering updating method (ITUM) consisted of adaptive threshold determination based on the analytic hierarchy process and update judgement by similarity comparison of interest messages. Meanwhile, the network model and the sensing model are presented to describe actual network scenarios. We analyze the impact of critical parameters and evaluate the performance of ITUM with several interest message updating methods from the aspect of lowering the number of information exchanges. The simulation results prove that ITUM can improve the adaptability to scene changes while decreasing the number of information exchanges compared with the existing methods. Furthermore, it is shown that ITUM is a highly effective solution for determining the triggering updating conditions of various information exchange rates in directed diffusion routing protocol.

1. Introduction

Query routing technique is undoubtedly one of the most typical routing protocols for wireless sensor networks (WSNs) [1], which is concretely composed by interest message diffusion, data transmission, and path enhancement in the implementation process [25]. The routing method has several remarkable highlights in data-oriented monitoring applications, such as direct transmission of interested data, information screening [6], and local communication [7], resulting in the advantages of less redundant information and long network lifetime. Moreover, the query routing protocol can be explicitly classified into rumor routing, directed diffusion routing, disjoint multipath routing, and braided multipath routing [811]. Directed diffusion routing exhibits excellent energy efficiency compared with other query routing methods [12] and can effectively lessen network data stream by query-driven data transmission and local data aggregation [13]. For example, Intanagonwiwat et al. explored the use of directed diffusion for a simple remote-surveillance sensor network and enabled diffusion to achieve energy savings by selecting empirically good paths and by caching and processing data in-network [14]. Mu et al. inquired a directional diffusion routing protocol to improve the reliability of data transmission and extend the network life in wireless body area networks (WBANs) [15]. Directed diffusion routing is made up of three independent stages: interest diffusion, data transmission, and path enhancement [1619]. During the application of directed diffusion routing, the query request is sent to nodes in the target area in the form of interest message, and the routing path is established in turn. Afterwards, the nodes start to execute the corresponding monitoring tasks according to the description of the interest message. Among them, the spread of interest message is named as interest message diffusion. Besides, since the network is not static, the nodes in the target area may move out, and on the contrary, the nodes outside the target area can also move in. These mobile nodes unavoidably require to communicate with surrounding nodes for timely exchanging or achieving interest messages in this phase, which is defined as interest message update.

In order to diminish energy consumption and extend network lifetime, various studies have been performed to optimize directed diffusion routing. For instance, Eghbali and Dehghan addressed a load-balancing method based on multipath directed diffusion to prolong the lifetime of nodes by establishing a multihop path between receivers and sensor nodes [20]. Li and Shi enhanced energy utilization rate and extended network lifetime by optimizing data transmission path and data aggregation [21]. Liu et al. investigated DDBC, a clustering-based directed diffusion routing protocol, to decrease network topology and hence improve energy efficiency by clustering and suppressing redundant messages in flooding [22]. However, these developed protocols solely pay attention to explore energy conservation strategies during data transmission and path enhancement stages in terms of data fusion, load balancing, and optimization path, less considering the energy consumption generated by interest message update. Nevertheless, the number of interest message exchanges in the stage of interest message update likewise directly influences node energy consumption [2325], which is tightly associated with triggering updating method of interest message. It is necessary to take into account the message exchange requirement and communication cost of the target area for a triggering updating method.

Some triggering updating methods have been reported to improve the routing performance in interest message update. The current triggering updating methods can be separated into two categories: conventional triggering updating method (TUM) and energy-saving triggering updating method. The first method is that the mobile node accomplishes update through periodically broadcasting the update request of interest message to the neighbor nodes during its movement [26]. This behavior based on periodic triggering may substantially increase the number of interest message exchanges and cannot adapt to the movement path of mobile node due to the blindness of triggering. Meanwhile, the possible simultaneous responses of neighbor nodes are probable to induce information redundancy and network congestion. For overcoming the weaknesses of the classic triggering updating method, a series of energy-saving triggering updating methods are probed by refining the trigger and response patterns. Yu and Zhang and Cui and Cao investigated a method to effectively decrease the frequency of interest message updates by spreading interest messages only between cluster heads [27, 28]. Krishnamachari and Ahn proposed an extending ring query approach that can implement adaptive adjustment of query radius [29]. Niu et al. recommended an interest message updating method based on update triggering, delayed response, and incremental update to decrease update frequency [30]. Although the propagation between cluster heads or the limitation of update request range can restrain the surge of update frequency due to the flooding mode, the problem that updating operation and movement path are difficult to adapt to has not been solved, and there is an increased possibility of premature death of cluster heads. Moreover, these studies are all based on the ideal node model and do not consider the variations in sensing scope for different directions. Additionally, compared with the other methods, the incremental update proposed by Niu et al. can decrease update number while multiple nodes are within the sensing area of mobile node during the update phase. However, it will inevitably boost the amount of response inhibition messages transmitted and cannot prevent nodes with high proximity of interest message content from acting void updates.

The ideal sensing area of node is approximately circular. Though in the actual scene, the path attenuation of signal transmission in different directions is varied as a consequence of the influence of wireless device properties and other environmental factors such as obstacles, leading to the anisotropy of sensing area. On the other side, choosing the improper threshold based on previous experience is a crucial problem to the triggering updating method. This may cause a direct impact on the real time, adaptability, and timeliness of interest information update. It is additionally a vital concern to avoid updating between a mobile node and multiple fixed nodes with high-similarity message content.

Based on the above introduction, this paper proposes an improved triggering updating method for interest message update in directed diffusion routing protocol, which is constituted by adaptive threshold determination using the analytic hierarchy process (AHP) and trigger judgement adopting similarity comparison of interest messages. The contribution of this paper covers four aspects: (1)We develop a network model based on different overlapping patterns of sensing areas between a mobile node and various fixed nodes and establish a sensing model considering time-varying anisotropy of wireless signal transmission(2)We propose an improved triggering updating method comprised of threshold determination and update judgement to minimize the number of information exchanges under different information exchange rates(3)We use the Gauss-Markov mobility model to describe the mobile node movement in the target area and investigate the performance of reducing the number of information exchanges for diverse network and mobility parameters(4)Simulation results demonstrate that the proposed triggering updating method can significantly decrease the number of information exchanges due to the combination of advantages of two factors. The analytic hierarchy process can dynamically obtain the proper threshold of interest messages of multifixed nodes, and the similarity comparison is capable of avoiding unnecessary updates

The outline of this paper is organized as follows. Section 2 provided the network model and sensing model. Section 3 depicts the proposed method. In Section 4, we conduct the performance analysis of the proposed method under different network and mobility parameters. Finally, we summarize our work and draw conclusions in Section 5.

2. Network and Sensing Model

In this section, aiming to describe the scenario of interest message update precisely, we propose several assumptions of network model and two categories of overlapping pattern of sensing areas to imply the preconditions of update triggering in consideration of the bidirectional links between nodes and use a time-varying standard normal distribution to indicate the difference of sensing area of node in each direction.

2.1. Network Model

Considering the distribution of fixed nodes, the moving path of mobile node, and the capacity of node interest messages, we concretely define network model as follows.

(1) Every node has the same communication ability, each communication link between nodes is bidirectional, and all fixed nodes in WSNs are randomly distributed in a rectangular target area

(2) The total number of nodes in the target area is , and each node can utilize the existing wireless location technology to provide location information

(3) The number of interest messages carried within each sensor node is . These interest messages vary and are sorted by importance in descending order. The characters 1, 2, …, are used to depict different monitoring tasks, respectively. Additionally, it is assumed that is greater than . Meanwhile, the interest message in a mobile node is empty at the initial stage

(4) The overlapped sensing areas of fixed nodes manifest that there are common interest messages (monitoring tasks) between them and vice versa. The fixed nodes overlapping with a mobile node can be abstracted as a fixed node

(5) A mobile node can enter or leave from any boundary of the target area and move according to the Gauss-Markov mobility model. The update is triggered by simultaneously satisfying the two conditions that the sensing areas of the mobile node and fixed nodes overlap, and the similarity of interest messages is higher than threshold value

(6) The overlaps can be divided into two kinds by the number of fixed nodes overlapped with a mobile node, as illustrated in Figure 1. The first category is that the sensing area of mobile node overlaps with that of a single fixed node, and triggering updating is settled by both. The second category is that the sensing area of mobile node overlaps with that of multiple fixed nodes at the same time, which can be classified into the following three cases:

(a) The sensing areas of fixed nodes are entirely overlapped, that is, the interest messages are the same, and the triggering updating is decided by the mobile node and any node together

(b) The sensing areas of fixed nodes do not overlap with each other at all. Namely, the interest messages are entirely different, and the mobile node needs to make the judgment of triggering updating with each fixed node, respectively

(c) The sensing areas of fixed nodes are partially intersected, and the interest messages of these nodes are supposed to be not exactly the same. In this case, common messages of these fixed nodes are firstly arranged in random order, and the remaining messages are further sorted in descending order of importance of interest message content until the message capacity of a fixed node is reached. The triggering updating assessment is eventually carried out between the reorganized interest message and the interest message of mobile node

(7) The query request is strictly restricted in the target area, and the sink node locates outside the target area. Each request by the user is time-limited and expires after the corresponding validity duration

2.2. Sensing Model

Radio irregularity originated by the heterogeneous properties of devices and the anisotropic properties of propagation media is a common and nonnegligible phenomenon in WSNs [31]. It results in irregularity in radio range and variations in packet loss in different directions for sensor node. The sensing model we put forward here is inspired by three properties of radio signals: anisotropy, continuous variation, and heterogeneity. In addition, the degree of influence of factors such as residual energy of nodes and neighboring environment on the perceived distance of nodes in various directions is random, time varying, and has the characteristics of normal distribution. Therefore, for the convenience of description and application, the standard normal distribution is used to demonstrate the random influence degree of multiple independent factors on the perceived distance of nodes in each direction, and the time-varying process of the influence is expressed by introducing the time variable.

A time-varying irregular circle with the node as the center is proposed to depict the sensing area of node in the deployment scenario. The variable perceived distance is used as its radius, where denotes the radius as the sensing area of node is a regular circle [32, 33] and is anisotropic influence factor.

The anisotropy influence factor is represented by an integral function of the standard normal distribution with time and angle as variables and can be calculated by Eq. (1). where and are direction coefficient and adjustment coefficient, represents a random number greater than 1, indicates time, and the product of and is an adjustable time-varying parameter.

3. Triggering Updating Method

The interest message update process has varied requirements on the degree of information exchange between a mobile node and several fixed nodes with overlapped sensing areas, corresponding to different information exchange rates. The high information exchange rate indicates that the update sensitivity of interest message of mobile node and fixed nodes is at a high level and vice versa. For the information exchange requirements, relying only on the previous experience to artificially set the update threshold, it will inevitably lead to the decline of necessity and adaptability of update. Therefore, we build an improved triggering updating method in this section. In this method, the update threshold of fixed nodes is solved adaptively based on AHP for evaluating the difference of interest message content in light of information exchange rate, and then the similarity of interest message contents between the mobile node and fixed nodes is computed and compared with the update threshold to judge whether to update or not.

3.1. Threshold Determination

AHP proposed by Saaty in the early 1970s is a multicriteria decision method that uses hierarchical structures to represent a problem and makes decisions based on importance scales [34, 35]. Because of the effective combination of qualitative and quantitative approaches, it has been popularly practiced in the fields of performance evaluation, engineering planning, program sequencing, economic management, etc. [36]. In this paper, the complex correlation and subordination between interest messages and information exchange rates are combined into a three-level analysis structure model by AHP, and the threshold determination can be converted into computing the relative weights of information exchange rates to the update threshold. The specific steps are listed as follows:

(1) Establishing Hierarchical Threshold Model. The information exchange rate and message priority are arranged into an ordered hierarchy model based on membership relations, as shown in Figure 2. The update threshold is referred to as the overall target layer, the priorities () of interest message content are employed as the criterion layer for achieving the overall goal, and three information exchange rates are selected as the solution layer in which express high, medium, and low information exchange rates, respectively. In the constructed model, the update threshold is jointly determined by priorities . A priority is mutually affected by the three information exchange rates and the priorities in turn act on the same information exchange rate.

(2) Constructing Importance Matrix. According to the importance of priority levels of interest message content in the criterion layer, the criteria scale is evenly subdivided into nine levels from equal importance (lowest priority) to extreme importance (highest priority), and the values are assigned 1 to 9. Each value signifies that the importance of the former over the latter of two priorities compared, and the corresponding value should be reciprocal with the positions of two priorities interchange. Moreover, , the importance comparison results of and are added as the th row element of importance matrix of criterion layer using the update threshold as the evaluation criterion, and the importance matrix is set up as follows:

As a result of the identical hierarchical model, the importance matrix of solution layer and criterion layer is assembled by the same method. Through the steps above, the importance matrix of solution layer with priority as evaluation criteria is described by Eq. (3).

(3) Sorting and Validation of Single-Layer Weight. The eigenvectors of importance matrices and can be obtained by the square root method. The relative weights among and the relative weights among can be collected after normalization, respectively. In this paper, we use the calculation process of as an example, to illuminate the same implement process of the two weights as follows.

(a) Compute the cubic root of product of elements of each row in the importance matrix by , and normalize by the following: where represents the weight of by the use of as evaluation criteria. is the relative weight, namely, the normalized vector, and each component is the weight value of different information exchange rates relative to the priority .

(b) Calculate the largest characteristic root of importance matrix by Eq. (5). where is the th element of vector .

(c) As the elements of importance matrix are quantitatively assigned, in order to avoid the influence of change of characteristic roots caused by data contradiction on calculation result and decision accuracy, the consistency validation on its elements can be done through Eq. (6). where CR is the consistency ratio, RI is the random consistency index, CI is the consistency index, and is the order of matrix with a value of 3. CR is used to indicate the degree to which the constructed importance matrix deviates from the ideal completely consistent matrix, which can effectively detect the logical errors in judgement and improve the reliability of the final decision. The threshold value of 0.1 is recommend by Saaty and has been widely accepted as a general setting used to assess whether the matrix has satisfactory consistency. In case consistency ratio , it shows that importance matrix has satisfactory consistency. The normalized eigenvector can be applied as the weight vector representing relative weight. Otherwise, the element should be adjusted through the reconstruction of by the most inconsistent element (MICE) iteration algorithm, which is recommended by Yuan and Liang [37].

(d) Weight Sorting and Threshold Determination. Based on consistency validation, the total weight of each information exchange rate can be computed by Eq. (7). where is the total weight of relative to , is the weight of relative to , and denotes the weight of relative to . To ensure the reliability of the total weights obtained, the consistency validation can be designed: where is the final consistency ratio and and are the sorting consistency index and random consistency index of hierarchical weights of solution layer to the criterion layer . In the case of , it is concluded that the weight sorting has satisfactory consistency. Then, the optimal threshold at the current information exchange rate can be gained by Eq. (9) and Eq. (10). where is the maximum threshold, is the minimum threshold with the value of zero, and is the weight of the current information exchange rate relative to the update threshold achieved by Eq. (7).

3.2. Update Judgement

After obtaining the update threshold of fixed nodes overlapped with a mobile node, the similarity can be adopted to assess whether the interest messages of mobile and fixed nodes satisfy the update condition under the current information exchange rate. Distance measurement methods are widely used to signify the similarity between data. However, such methods often show more reliable measurement results in low-dimensional space and weak performance in high-dimensional space by the cause of the sparsity of data [38]. Hence, the application of the distance-based method to the similarity comparison of multidimensional interest messages will unavoidably lead to a sharp increase in update times with the growing number of deployed nodes, forming a dimensional disaster. The predicament of the distance-based method results in the ignorance of similarity difference for high-value data and low-value data in various dimensions, which directly generates the underestimate of similarity outcomes. To solve this problem, we propose a modified distance-based similarity function by using the absolute average of each dimension to balance the similarity discrepancy of high-value data and low-value data. This function evaluates the similarity of each dimension of data, and its value is between 0 and . The larger the value, the higher the difference between the two information messages. The similarity of interest message contents between a mobile node and multiple fixed nodes is defined by the following: where represents a mobile node and is the fixed node abstracted by the fixed nodes overlapped with M; and , respectively, indicate the interest message contents of and ; is the absolute average of and .

The introduction of parameter can make the similarity analysis based on distance depends not only on the difference between and but also on the size of the dimension data, for intensifying the similarity measurement performance of dimension with large value in the case of high dimension. For example, suppose and , if in is removed, then the similarity of and in these three dimensions is 2, respectively, and the overall similarity is 2. However, based upon data comparison, the similarity of the second dimension should be higher than that of the first dimension, and the similarity of the third dimension should be higher than that of the second dimension. According to the , the similarity of the two messages in the three dimensions is 3, 3.6, and 3.75, respectively, and the overall similarity is 3.45. It is easy to find that the similarity comparison function proposed in this paper has high-grade discrimination performance.

We decide whether to do the update operation following the similarity calculation. If the similarity is higher than the update threshold, the update operation will be enabled. Otherwise, the update will be abandoned, and the mobile node continues to move and prepares for the next update as requested by the query.

4. Results and Discussion

In the simulations, we make use of Gauss-Markov mobility model to depict the mobile node movement in the target area, which was initially presented for the simulation of a personal communication service network. It can be described as where and are the new velocity and direction of mobile node at time interval ; and are constants representing the mean value of velocity and direction as ; is the tuning parameter used to vary the randomness; and are random variables from a Gauss distribution. At each time interval, the next location is calculated based on the current location, velocity, and direction of movement. Specifically, at time interval , the location of mobile node is given by where and are the and coordinates of mobile node at the th and th time intervals, respectively, and and are the velocity and direction of mobile node, respectively, at the th time interval. We set the target area to be . All the simulation results are the average values of 50 simulations. The simulation parameters are shown in Table 1.

With the change of simulation parameters, the ITUM proposed in this paper is compared with traditional updating method (TUM) and TURIR [30], by using the number of information exchanges as the indicator.

Figure 3 depicts the relations of ITUM, TUM, and TURIR between the number of information exchanges and the deployment density of fixed nodes . It is easy to observe that the number of information exchanges can increase significantly with the growth of . When , the number of information exchanges of these three methods will rise slowly, with average growth rates of 21.58%, 23.73%, and 21.72%, respectively. When , the number of information exchanges of these three methods will proliferate, with the growth rates of 101.72%, 104.56%, and 162.81% separately. Apparently, TUM is the most sensitive to the deployment density of fixed nodes, and ITUM has the minimum increase in the number of information exchanges, with the rising from 1/1000 m2 to 1/100 m2. The triggering methods of three methods lead this phenomenon. The timing update mechanism of TUM is associated with time and deployment density of fixed nodes. Under a certain time, the deployment density directly impacts the number of information exchanges, and the higher the is, the faster the increase will be. TURIR merely updated while the node displacement is higher than the fixed threshold value. Compared to TUM, the method can efficiently decrease the number of information exchanges, and the number of information exchanges will slowly increase with the increment of affected by mobility model and threshold value. However, if the node density increases to a specific value, the node displacement becomes the chief influencing factor, which will drive to the sharp increase in the number of information exchanges. ITUM can lessen the number of information exchanges by avoiding blind and invalid updates as a consequence of the triggering updating conditions recommended in this paper. Influenced by the anisotropy, update threshold, and similarity in the initial phase, the number of information exchanges rises moderately with the increase of . As the deployment density continues to grow, the anisotropy converts to the principle aspect and will cause an abrupt jump in the number of information exchanges.

As shown in Figure 4, with the increase of , the average number of information exchanges of ITUM is lowered by 75.72% and 41.00%, respectively, compared to that of TUM and TURIR. When , the number of information exchanges of ITUM and TURIR has an approximate trend with a slow growth rate. In particular, when , ITUM can dramatically decrease the number of information exchanges, compared with the other two kinds of methods. As a whole, the rate of change, the number of information exchanges, and the increment of ITUM are significantly lower than the other two methods produced by the anisotropy of sensing area and the triggering updating conditions, which diminishes the probability of the update judgment. Furthermore, it is easy to understand that the bigger the is, the more the number of information exchanges are, which means that more updates will be triggered. Therefore, in order to reduce the update times, designers should set reasonable sensing radius for network nodes.

Figure 5 demonstrates the relation between the dimension of interest message and the number of information exchanges. With the increase in , the average number of information exchanges of these three methods is raised by 3.19%, 6.81%, and 4.55%, respectively. Compared with TUM, TURIR, and ITUM, it has better performance in reducing the number of information exchanges and decreases by 20.68% and 2.93% on average. When , affected by the number of monitoring tasks, priority, and threshold range, TURIR is the most effective in cutting down the number of information exchanges by reason of the fixed threshold mechanism. When , the number of information exchanges of ITUM can be stable at 38, which has a prominent advantage over the other two methods. In the case of , although the impact of will lead to sudden increases in quantities, contrasted to the other two methods, the number of information exchanges of ITUM is still reduced by 20.38% and 8.76%, respectively. Therefore, to lower the update times by ITUM, we need to limit the number of within a reasonable scale .

As shown in Figure 6, with the increase in number of interest message update intervals from 1 minute to 20 minutes, ITUM is the least in the number of update messages in comparison with that of TUM and TURIR. The average number of update messages is reduced by 68.03% and 17.47%, and the average amount of update data declined by 78.41% and 41.35%, respectively. In Figure 6(a), the number of update messages in TUM is linked to the number of neighbor nodes, depending on the triggering way. In the condition of a definite deployment density of fixed nodes, the number of update messages decreases insignificantly with the increase of interest message interval, primarily induced by the decrease of the number of messages used for interest message propagation. The variance in the number of update messages between ITUM and TURIR is affected by the triggering updating mode, with the condition that the frequency of query request, the scope of target area, and the validity period of request remain unchanged.

Two main factors interlock with the amount of update data: whether to adopt incremental update and the number of messages in the update process, as exhibited in Figure 6(b), as TUM does not use the incremental update, the number of messages in the update process and message format bring about that its data quantity varies little and is much larger than the other two methods. In the case that ITUM and TURIR both utilize incremental update pattern, the amount of update data of both has direct relevance to the number of messages generated by respective triggering updating methods and message formats. In summary, ITUM can not only reduce the number of update messages in the update process but also match the update messages with user queries, which is particularly suitable for data-centric WSNs with low network bandwidth requirements.

Figure 7 shows the performances under various parameters of Gauss-Markov mobility model in terms of , , and . With the growth of , the average growth rates of the three methods are 1.581%, 1.089%, and 0.744%, respectively; When boosts, the average growth rates of the three methods are 1.803%, 1.427%, and 1.082%, respectively; with the increase in , the average growth rates of the three methods are 0.441%, 0.401%, and 0.211%, respectively. We can effortlessly note that the increase of model parameters has the greatest impact on TUM and the least impact on ITUM. By comparison, we can observe that the is not the critical factor in the three parameters. The update operation of TUM is easily influenced by the number of fixed nodes within the sensing area and movement path of mobile node. TURIR triggers an update once the displacement of mobile node is higher than the fixed threshold value, and the displacement of mobile node is mainly ascertained by and , as presented in Figures 7(a) and 7(b). The trigger updating mode of ITUM can adjust to the movement path and circumvent unnecessary updates within high similarity messages according to the adaptive dynamic threshold. Moreover, due to the anisotropic sensing model of ITUM, the sensing area of nodes is susceptible to the influence of in mobility model, as shown in Figure 7(a).

From Figure 8, we can find that TUM and TURIR are both little affected by changes in information exchange rate , as a result of the influence of timing updating mechanism and fixed threshold updating pattern, respectively. Specifically, the timing update mechanism applied by TUM has nothing to do with , and the fixed threshold mode of TURIR is independent of . The variation coefficients of the two methods are 0.308% and 0.415%, respectively. The number of information exchanges of ITUM is positively correlated with , and its variation coefficient is 41.475%. It is because the probability of triggering updating increases with the growth of , resulting in the increment of number of information exchanges.

In Figure 9, we can note that , , and have strong positive correlation with the number of information exchanges . Although , , and are also positively correlated with the number of information exchanges, the correlation is weaker compared with , , and . has no concern with the number of information exchanges.

5. Conclusion

Energy efficiency is an essential concern in WSNs based on directed diffusion routing protocols. In this paper, after defining the network model and the sensing model, we established an improved triggering updating method of interest message to reduce the number of information exchanges through threshold determination based on AHP and update judgement using similarity calculation. The most significant advantage of this method is that it can better adapt the requirement of information exchange rate, according to the triggering updating mechanism composed of dynamic hierarchical threshold adjustment and message similarity comparison. Besides, we analyzed the impact of key parameters and evaluated the performances of reducing update times with two interest message updating methods. The simulation results show that ITUM has a distinct advantage compared with the exiting interest message updating methods, and the proposed method can improve the adaptability to scene changes while lowering the number of information exchanges. Finally, other network constraints in real scenes, such as channel noise and packet loss, are not considered. It is this need in the next work to further test and improve the proposed method. Also, the paper provided the weight calculation method in threshold determination scheme is relatively complicated; in future works, the weight-decision method should be investigated to automatically get the recommended settings under the requirements imposed by a specific range of information exchange rates.

Data Availability

The authors declare that the data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declared that they have no conflicts of interest to this work.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant no. 61771184), Program for Science & Technology Innovation Talents in University of Henan Province (Grant no. 20HASTIT029), Program for Innovative Research Team (in Science and Technology) in University of Henan Province (Grant no. 19IRTSTHN021), and Science and Technology Major Project of Henan Province (Grant no. 181100110100).