A rellabllity-orlented transmlsslon service in wireless sensor networks
Ni, Lionel M.
|Source||Proceedings IEEE International Conference on Mobile Adhoc and Sensor Systems, 2007. MASS 2007. Pisa, 8-11 October 2007|
|Summary||Reliable transmission service is in dire need for many applicationsin wireless sensor networks (WSNs). Most existing routing protocols however, seriously suffer from low end-to-end success rates in real deployments. Through extensive experiments on a test-bed of Mica2 nodes, we identify three key problems that hinder the reliable packet delivery. In order to address these problems and therefore to provide a reliability-oriented transmission service, we propose a novel in-middle recovery mechanism thatfills the gap between the traditional per-hop recovery and end-to-end recovery mechanisms. To realize such an idea, we design and implement proliferation routing that leverages randomized dispersity and reproduction. The distinctive feature of proliferation routing is its great flexibility. Not only can it be applied with any Medium Access Control (MAC) protocol and routing metric, but also a desired service quality can be effectively derived by controlling the system parameters. Such a feature is revealed by theoretical analysis and confirmed by implementation and simulation experiments. In a specific experiment setup, proliferation routing can increase the end-to-end transmission success rate up to 70% compared with the well-known hop-based routing and flooding.|
|Rights||© 2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.|
Files in this item: