2015
DOI: 10.3390/s150922364
|View full text |Cite
|
Sign up to set email alerts
|

Handling Neighbor Discovery and Rendezvous Consistency with Weighted Quorum-Based Approach

Abstract: Neighbor discovery and the power of sensors play an important role in the formation of Wireless Sensor Networks (WSNs) and mobile networks. Many asynchronous protocols based on wake-up time scheduling have been proposed to enable neighbor discovery among neighboring nodes for the energy saving, especially in the difficulty of clock synchronization. However, existing researches are divided two parts with the neighbor-discovery methods, one is the quorum-based protocols and the other is co-primality based protoc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…The earliest deterministic neighbor discovery protocols are quorum-based ones [21,22,29], where time is divided into m 2 slots. These slots can be regarded as a two-dimensional array.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The earliest deterministic neighbor discovery protocols are quorum-based ones [21,22,29], where time is divided into m 2 slots. These slots can be regarded as a two-dimensional array.…”
Section: Related Workmentioning
confidence: 99%
“…Quorum-based [21,22,29]; Prime-based: Disco [23], U-connect 2 [24]; Searchlight [7]; Unequal-sized Slot methods [7,25,26]; Block-based [8,27]; middleware methods WiFlock [13], Acc 3 [14], EQS 4 [9], Group [10] 1 prime-set-based algorithm; 2 unified connect; 3 on-demand accelerations; 4 extended quorum systems.…”
Section: Sub-categories Main Workmentioning
confidence: 99%
“…That means one of them is the sender, while the rest of them are receivers [11]. There are quorum based protocols where each node chooses one row and one column active slots entries in m × m matrix [4,12]. The main limitation of this protocol is that in average case the performance may worsen due to extra intersection [9].…”
Section: Related Workmentioning
confidence: 99%
“…Although global positioning systems can provide accurate and reliable position information for location services, they cannot be used effectively indoors. Recently, numerous localization methods, such as those involving sensor networks, radio frequency identification, wireless fidelity (WiFi), Bluetooth low energy (BLE), and visual light positioning, have been proposed to overcome this limitation; among them, the use of BLE positioning technology has attracted widespread attention because it is based on mobile phones—most notably the iPhone—which are extensively used worldwide [ 1 ].…”
Section: Introductionmentioning
confidence: 99%
“…When the system boots up, mobile devices receive the system’s unique RSS value; the devices subsequently search the fingerprinting database and identify the entry that is most similar to the system’s unique RSS value for the estimated location [ 2 ]. The main problem of a typical RSS fingerprinting system is that the real RSS value at any location is easily affected by the object and multipath fading effects [ 1 ]. In other words, the RSS fingerprint obtained at different times needs not match the previous fingerprint stored in the database, leading to incorrect estimation results.…”
Section: Introductionmentioning
confidence: 99%