2015
DOI: 10.1109/lcomm.2015.2403837
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Bypassing Void Routing Protocol Based on Virtual Coordinate for WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…Separating the surrounding region of void into 3 different regions is the most important functionalities of the void region dividing phase, where separate routings strategy was used [9]. On the bases of the positions of void and destination node location of any packets, surroundings regions are dividing into 3 forms that is departing region, approaching regions and free regions has showing in the The 2 tangent lines of area of the circle of virtual mapping, receive the departing region, is called as the approaching area of the outside 2 tangent lines defined in free region of circle of Virtual mapping shown in the fig.6 C region.…”
Section: Breaking Phases In Void Regionsmentioning
confidence: 99%
“…Separating the surrounding region of void into 3 different regions is the most important functionalities of the void region dividing phase, where separate routings strategy was used [9]. On the bases of the positions of void and destination node location of any packets, surroundings regions are dividing into 3 forms that is departing region, approaching regions and free regions has showing in the The 2 tangent lines of area of the circle of virtual mapping, receive the departing region, is called as the approaching area of the outside 2 tangent lines defined in free region of circle of Virtual mapping shown in the fig.6 C region.…”
Section: Breaking Phases In Void Regionsmentioning
confidence: 99%
“…The sensors in each cluster forward the relevant information or data to CHs after an event or periodically. Subsequently, CHs directly transmit the information to a BS directly [18,19]. In fact, clustering technique includes certain advantages and some of them are (i) clustering could maintain communication bandwidth and can avoid redundancy of transmitting data, (ii) clustering could stabilize network topology at the sensor level and can minimize the communication overhead as well.…”
Section: Introductionmentioning
confidence: 99%
“…In cluster-based routing, CH [19,20] takes the complete responsibility for data transmission; thereby network prolonging is highly possible via balancing the energy consumption which, is to be noted for the precise or optimal selection of cluster head [21,22]. The number of works has been progressed with cluster-based routing strategy through the utilization of recent metaheuristic and machine learning algorithms [23][24][25][26][27].…”
Section: Introductionmentioning
confidence: 99%
“…In [11], a right-hand based method to anticipate voids and a routing protocol are proposed to bypass them. In [5], a method based on the locations of the transmitter node is presented to determine the left or right side of the network to route messages by avoiding voids.…”
Section: Introduction and Related Workmentioning
confidence: 99%