2018
DOI: 10.1016/j.jnca.2018.02.010
|View full text |Cite
|
Sign up to set email alerts
|

Interconnecting isolated network segments through intermittent links

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 17 publications
0
18
0
Order By: Relevance
“…Similarly, the RCR [3] is proposed to further shorten the vehicle routes by deploying relays. CISIL [1] is develop by exploiting the Delaunay triangulation, in which 3-hyperedges of the 3-hypergraph are chosen as routes. The LEEF [2] is designed to equalize the energy cost through greedy expansion and optimization successively.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, the RCR [3] is proposed to further shorten the vehicle routes by deploying relays. CISIL [1] is develop by exploiting the Delaunay triangulation, in which 3-hyperedges of the 3-hypergraph are chosen as routes. The LEEF [2] is designed to equalize the energy cost through greedy expansion and optimization successively.…”
Section: Related Workmentioning
confidence: 99%
“…The parameters of the experiment are listed in Table 1. We compare IDAS with baseline approaches LEEF [2], CISIL [1], DQNMDC [5] and DRLDC [4] in terms of aggregation ratio, energy cost and maximum energy cost while varying UAV count ( ), velocity ( ), number of nodes ( ), and data collection rate ( ). The terrain parameters are listed in Table 2.…”
Section: Simulation Setupmentioning
confidence: 99%
“…By employing these paths, the mobile sink can play an important role in scenarios where nodes suffer opportunistic connections. For example, in Reference [ 20 ], the authors considered that the WSNs deployed within hostile environments might suffer from large-scale damage where many sensors failed simultaneously and this would cause the WSNs to split into disconnected segments, and they proposed a two-step heuristic for connecting isolated segments through intermittent links, in which a set of mobile nodes served as mobile data carriers. In Reference [ 21 ], the authors considered that in mobile sensor networks, the connectivity between nodes was intermittent due to the blockage of radio signals and nodal mobility, and they proposed a reliable data delivery scheme for the networks with an enhanced delay technique, in which nodes estimated the connectivity and expected inter-encounter time with sink nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, in such hostile environments, sensor nodes are prone to suffer damage which also reduces data gathering efficiency [4][5][6]. Furthermore, when interference levels are high or in case of a jamming attack [7], nodes cannot communicate to a sink node that may be found outside the monitored area.…”
Section: Introductionmentioning
confidence: 99%
“…Performance of WSNs in hostile environments has been studied before in the literature. For instance, in [4,5], nodes may found themselves disconnected from the rest of the network due to such hostile environments that cause unreliable links. To address this issue, the authors propose the use of mobile data carriers to temporarily provide connectivity to the rest of the nodes.…”
Section: Introductionmentioning
confidence: 99%