2015 22nd International Conference on Telecommunications (ICT) 2015
DOI: 10.1109/ict.2015.7124668
|View full text |Cite
|
Sign up to set email alerts
|

A bypassing void routing combining of geographic and virtual coordinate information for WSN

Abstract: Greedy forwarding is efficient in geographic routing, however, it fails inevitably when routing voids are encountered due to the distribution of nodes in wireless sensor network. To solve the void problem, long path and high control packet overhead are usually involved. In this paper, a bypassing void routing protocol combining of geographic and virtual coordinate information is proposed. When routing void is encountered, edges nodes of routing void are assigned virtual coordinates located on a virtual circle … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…In geometric void handling techniques, the basic idea is the use of the geometric characteristics to identify void regions. This category includes void prevention solutions, such as the techniques proposed in [18,19,20,21,22,23,24], where holes are discovered in advance for the future use of routing to avoid holes. These solutions usually start by a network discovering phase to detect the boundary nodes and identify the voids and a forwarding mechanism that exclude nodes located on the voids borders from routing process.…”
Section: Recovery Techniquesmentioning
confidence: 99%
“…In geometric void handling techniques, the basic idea is the use of the geometric characteristics to identify void regions. This category includes void prevention solutions, such as the techniques proposed in [18,19,20,21,22,23,24], where holes are discovered in advance for the future use of routing to avoid holes. These solutions usually start by a network discovering phase to detect the boundary nodes and identify the voids and a forwarding mechanism that exclude nodes located on the voids borders from routing process.…”
Section: Recovery Techniquesmentioning
confidence: 99%