2019
DOI: 10.1109/access.2019.2907161
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Hub Location Heuristic for Alert Routing

Abstract: Trigger warning and other delay-sensitive applications for environmental, healthcare, and industrial or military surveillance and monitoring are usually based on networks. Surveillance nodes (like in the Internet of Things or wireless sensor networks) send the data to selected nodes (hubs) that forward the alert or alarm further to the next system level. The maximum length of the shortest paths from the nodes to their nearest hub should be optimized to minimize the maximum necessary number of hops required to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Recently the problem has been optimized by stochastic metaheuristics like tabu search or simulated annealing [11], paying for better results with computational time. Instead of spreading an alert through seed hubs, this problem can be interpreted as selecting hubs for sending an alert to a higher level of the network, so that an alert occurring in any node of the network is sent through the closest hub in the shortest time [12]. The alert routing can be employed e.g., in security [13].…”
Section: Introductionmentioning
confidence: 99%
“…Recently the problem has been optimized by stochastic metaheuristics like tabu search or simulated annealing [11], paying for better results with computational time. Instead of spreading an alert through seed hubs, this problem can be interpreted as selecting hubs for sending an alert to a higher level of the network, so that an alert occurring in any node of the network is sent through the closest hub in the shortest time [12]. The alert routing can be employed e.g., in security [13].…”
Section: Introductionmentioning
confidence: 99%
“…The Dijkstra algorithm was used to obtain the optimal path for information transfer. However, GA is computationally intensive and fuzzy rules apply simple if–then rules to distribute computing whether it is machine learning, other intelligent algorithms, or natural-based heuristic evolutionary algorithms [43], which require nodes and BSs with high computing performance and high memory capacity. In particular, when the number of networks is large, the system delay increases [26].…”
Section: Introductionmentioning
confidence: 99%