2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET) 2014
DOI: 10.1109/medhocnet.2014.6849114
|View full text |Cite
|
Sign up to set email alerts
|

Improving the energy efficiency of WSN by using application-layer topologies to constrain RPL-defined routing trees

Abstract: The deployment of thousands of tiny devices inter-networked together and accessible through the Internet is the result of the increasing trend towards enabling the concepts of Internet-of-Things. As these devices may be scattered in a unplanned way, a routing protocol is needed. The RPL protocol is the IETF proposed standard protocol for IPv6-based multi-hop Wireless Sensor Networks (WSN). RPL requires that communication paths go through a central router which may provide suboptimal paths, making no distinctio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…The RPL requires that the communication paths pass through a central router that can provide subroutine routes, leaving no distinction between the applications run by nodes. In [8] author proposed an application driven extension to RPL with a goal to increase the life time of WSN. It does so by limiting the routing and forwarding functions of the network.…”
Section: Related Workmentioning
confidence: 99%
“…The RPL requires that the communication paths pass through a central router that can provide subroutine routes, leaving no distinction between the applications run by nodes. In [8] author proposed an application driven extension to RPL with a goal to increase the life time of WSN. It does so by limiting the routing and forwarding functions of the network.…”
Section: Related Workmentioning
confidence: 99%
“…The application-driven WSN paradigm [6] assumes that each application defines its own network and set of nodes so that the exchange of information can be confined to the nodes associated to the application. The nodes share information about the applications they run and their duty cycles, and nodes are put asleep when there is no activity related to their applications.…”
Section: Application-driven Wsnmentioning
confidence: 99%
“…In [6] and in [7], two different applications were used in three different scenarios, being the nodes distributed as shown in Fig. 28.…”
Section: Simulationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The DAG creation scheme will use mainly the nodes running the same application; the nodes not associated to the application will not participate in DAG creation process, in a first attempt [28]. Algorithm 1 shows how to create DAGs in our solution.…”
Section: Dag Creationmentioning
confidence: 99%