2019
DOI: 10.1109/jsen.2019.2924153
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Downward Routing for Wireless Sensor Networks Actuation

Abstract: In this paper, we study the downward routing for network control/actuation in large-scale and heterogeneous wireless sensor networks (WSNs) and Internet of Things (IoT). We propose the Opportunistic Source Routing (OSR), a scalable and reliable downward routing protocol for WSNs/IoT. OSR introduces opportunistic routing into traditional source routing based on the parent set of a node's upward routing in data collection, significantly addressing the drastic link dynamics in low-power and lossy WSNs. We devise … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…Observe that 7 • 11 • 13 = 1001. Furthermore, the F P R of a 3DBF scheme of dimension (7,11,13) with C = 0.2 and β = 64 is 0.075081 < 0.1.…”
Section: A Empirical Relationship Between Occupancy Level and The Fal...mentioning
confidence: 99%
See 2 more Smart Citations
“…Observe that 7 • 11 • 13 = 1001. Furthermore, the F P R of a 3DBF scheme of dimension (7,11,13) with C = 0.2 and β = 64 is 0.075081 < 0.1.…”
Section: A Empirical Relationship Between Occupancy Level and The Fal...mentioning
confidence: 99%
“…Other recent developments related to BF were conducted by Zhong et al who implemented a novel adaptive BF to decrease source-route length in the packet header facing frame size limitation in the resource-constraint environment [13] and An et al who used the acquisition of BF to detect missing RFID tag in an efficient way [14]. Furthermore, integration between attribute BF and improvement of the ciphertext-policy attribute-based encryption (CP-ABE) is proposed by Ramu to guarantee confidentiality in the cloud framework [15].…”
Section: A State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…However packets still have to flow along the DAG and in turn encounter crowding along few nodes. OSR [28], is an opportunistic source routing protocol that was suggested as an alternate to RPL's non-storing mode. It identifies alternate downward paths opportunistically and compresses the source routing header with the use of bloom filters for lengthier routes.…”
Section: Relevant Work In Literaturementioning
confidence: 99%
“…Zhong et al [9] introduced Opportunistic Source Routing (OSR), which provides a flexible and trustworthy downward routing mechanism for WSNs. The authors discussed an analytical model and assesses the performance of OSR using simulations and testbed experiments conducted in the real world.…”
Section: Related Workmentioning
confidence: 99%