2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2019
DOI: 10.1109/ntms.2019.8763854
|View full text |Cite
|
Sign up to set email alerts
|

An Asynchronous Dual Radio Opportunistic Beacon Network Protocol for Wildlife Monitoring System

Abstract: Currently there are several technologies such as opportunistic wireless sensor networks deployed to monitor wildlife. Due to network complexity and lack of full connectivity, the collected data is often either saved on internal memory for later off-line data transfer or relayed to sink nodes. In this paper, however, we introduce an asynchronous dual interface opportunistic beacon network for animal monitoring. Unlike conventional opportunistic networks which are based on multi-copy data replication techniques,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…To get more accurate EV values, the EBR protocol uses the concept of the exponentially weighted moving average. If CW stands for the current window, which is the number of encounters within the current time interval, EV is periodically recalculated using equation (5).…”
Section: Ebr Routing Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…To get more accurate EV values, the EBR protocol uses the concept of the exponentially weighted moving average. If CW stands for the current window, which is the number of encounters within the current time interval, EV is periodically recalculated using equation (5).…”
Section: Ebr Routing Protocolmentioning
confidence: 99%
“…After that, the DTN concepts grew to cover other types of networks. As examples of DTN networks we cite: disaster environments [2], under water communications [3], rural remote patient monitoring [4], animal habitat monitoring and network sensors for wildlife tracking [5], vehicular delay tolerant networks (VDTN) [6], surveillance for regions on the earth surface [7] and any network with frequent links disruptions due to environmental features changing. It should be noted that the routing in DTN is more difficult than in MANET.…”
Section: Introductionmentioning
confidence: 99%
“…Nodes within opportunistic networks employ a store-carry-forward mechanism for data forwarding, rendering the network mobile, open, and sparse [5]. Presently, opportunistic networks find application in various domains such as wildlife research [6], vehicle networking [7], and post-disaster communications [8]. Concurrently, within human society, individuals utilizing mobile devices imbue these networks with social attributes, thus forming social opportunistic networks [9].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, there are some aspects that suggest that connectionless BLE, when compared to WiFi, ZigBee/IEEE 802.15.4, and even sub-GHz solutions, can be better suited for small-to-medium network size IoT applications. Firstly, it does not have the scaling issue, which means that theoretically it can effectively communicate data between thousands of devices, and is often proposed as a method for opportunistic data transmission [13,14], monitoring applications [15], and localization systems based on radio signal strength [3,16]. BLE outperforms other 2.4 GHz technologies in terms of energy costs, throughput, and latency [7,17].…”
Section: Introductionmentioning
confidence: 99%