A Dynamic Resource-Aware Routing Protocol in Resource-Constrained Opportunistic Networks

被引:3
|
作者
Ali, Aref Hassan Kurd [1 ]
Lenando, Halikul [1 ]
Chaoui, Slim [2 ,3 ]
Alrfaay, Mohamad [1 ,4 ]
Tawfeek, Medhat A. [5 ,6 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Dept Comp Syst & Commun Technol, Kota Samarahan 94300, Malaysia
[2] Jouf Univ, Coll Comp & Informat Sci, Dept Comp Engn & Networks, Sakaka 2014, Saudi Arabia
[3] Sfax Univ, Unit Lab Sci Elect Technol Informat & Telecommun, Sfax, Tunisia
[4] Jouf Univ, First Common Year Deanship, Dept Basic Sci, Sakaka 2014, Saudi Arabia
[5] Jouf Univ, Coll Comp & Informat Sci, Dept Comp Sci, Sakaka 2014, Saudi Arabia
[6] Menoufia Univ, Fac Comp & Informat, Dept Comp Sci, Menoufia, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 02期
关键词
Opportunistic networks; mobile ad hoc networks; routing pro-tocols; resource-constrained networks; load balancing; buffer management; FAIRNESS;
D O I
10.32604/cmc.2022.020659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Opportunistic Networks (OppNets) are considered to be one of the most attractive developments of Mobile Ad Hoc Networks that have arisen thanks to the development of intelligent devices. OppNets are characterized by a rough and dynamic topology as well as unpredictable con-tacts and contact times. Data is forwarded and stored in intermediate nodes until the next opportunity occurs. Therefore, achieving a high delivery ratio in OppNets is a challenging issue. It is imperative that any routing protocol use network resources, as far as they are available, in order to achieve higher net-work performance. In this article, we introduce the Resource-Aware Routing (ReAR) protocol which dynamically controls the buffer usage with the aim of balancing the load in resource-constrained, stateless and non-social OppNets. The ReAR protocol invokes our recently introduced mutual information -based weighting approach to estimate the impact of the buffer size on the network performance and ultimately to regulate the buffer consumption in real time. The proposed routing protocol is proofed conceptually and simu-lated using the Opportunistic Network Environment simulator. Experiments show that the ReAR protocol outperforms a set of well-known routing pro-tocols such as EBR, Epidemic MaxProp, energy-aware Spray and Wait and energy-aware PRoPHET in terms of message delivery ratio and overhead ratio.
引用
收藏
页码:4147 / 4167
页数:21
相关论文
共 50 条
  • [21] Resource-aware Security Configuration for Constrained IoT Devices
    Fischer, Marten
    Toenjes, Ralf
    PROCEEDINGS OF THE 19TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, Q2SWINET 2023, 2023, : 7 - 14
  • [22] Resource-aware State Estimation in Visual Sensor Networks with Dynamic Clustering
    Schranz, Melanie
    Rinner, Bernhard
    SENSORNETS: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, 2015, : 15 - 24
  • [23] Passive Network-Awareness for Dynamic Resource-Constrained Networks
    Petz, Agoston
    Jun, Taesoo
    Roy, Nirmalya
    Fok, Chien-Liang
    Julien, Christine
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, 2011, 6723 : 106 - 121
  • [24] Resource-aware speculative prefetching in wireless networks
    Tuah, NJ
    Kumar, M
    Venkatesh, S
    WIRELESS NETWORKS, 2003, 9 (01) : 61 - 72
  • [25] Resource-Aware Control and Dynamic Scheduling in CPS
    Heemels, W. P. M. H.
    CYBER PHYSICAL SYSTEMS: DESIGN, MODELING, AND EVALUATION, CYPHY 2015, 2015, 9361 : 1 - 7
  • [26] Resource-aware Speculative Prefetching in Wireless Networks
    N.J. Tuah
    M. Kumar
    S. Venkatesh
    Wireless Networks, 2003, 9 : 61 - 72
  • [27] A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks
    Wen, Mi
    Lei, Jingsheng
    Tang, Zhong
    Tian, Xiuxia
    Chen, Kefei
    Qiu, Weidong
    WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 413 - +
  • [28] An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks
    Mulkey, Clifton
    Kar, Dulal
    Katangur, Ajay
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (02) : 38 - 57
  • [29] A resource-constrained group key agreement protocol for imbalanced wireless networks
    Tseng, Yuh-Min
    COMPUTERS & SECURITY, 2007, 26 (04) : 331 - 337
  • [30] Resource-aware policies
    Bottoni, Paolo
    Fish, Andrew
    Heussner, Alexander
    Presicce, Francesco Parisi
    JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2017, 38 : 84 - 96