2018
DOI: 10.3390/s18061926
|View full text |Cite
|
Sign up to set email alerts
|

A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios

Abstract: It is knotty for current routing protocols to meet the needs of reliable data diffusion during the Internet of Things (IoT) deployments. Due to the random placement, limited resources and unattended features of existing sensor nodes, the wireless transmissions are easily exposed to unauthorized users, which becomes a vulnerable area for various malicious attacks, such as wormhole and Sybil attacks. However, the scheme based on geographic location is a suitable candidate to defend against them. This paper is in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(31 citation statements)
references
References 48 publications
0
31
0
Order By: Relevance
“…Researchers of [21], improve the reliability by finding the best location of CH. RE-AEDG [22] and GIN [23] protocols use the cooperative routing model to enhance reliability, where the transmitted packet is overheard by several neighbors and retransmitted by several neighbors too. Some researches use network coding to improve reliability [24,25].…”
Section: Related Workmentioning
confidence: 99%
“…Researchers of [21], improve the reliability by finding the best location of CH. RE-AEDG [22] and GIN [23] protocols use the cooperative routing model to enhance reliability, where the transmitted packet is overheard by several neighbors and retransmitted by several neighbors too. Some researches use network coding to improve reliability [24,25].…”
Section: Related Workmentioning
confidence: 99%
“…The UPL and TML models were used to represent the distributed loss caused by wireless noise interference and the infrequent continuous loss caused by wireless signal fading, respectively [32]. In addition, in order to simulate the complex behaviors of Internet traffic [33], we attached each of the three paths to a VBR (Variable Bit-Rate) traffic generator to send the VBR cross-traffic to its corresponding sink. The packet size of the VBR cross-traffic utilized in the simulation was chosen as follows [34]: 49% were 44 bytes in length, 1.2% 576 bytes, 2.1% 628 bytes, 1.7% 1300 bytes, and the other 46% 1500 bytes in length, in which 90% of the VBR cross-traffic was transmitted by TCP technology and the remaining 10% by UDP technology.…”
Section: Simulation Topologymentioning
confidence: 99%
“…With the development of information technology such as Cloud Computing (CC), Internet of Things (IoT) [1], Artificial Intelligence (AI), Industrial Internet (II), and so on, a new term 'sharing economy' has rapidly spread around the world [2]. Its typical characteristics include the sharing of access rights, as well as the integration of massive and decentralized resources.…”
Section: Introductionmentioning
confidence: 99%
“…In summary, according to an overview of the production capacity sharing problem, although researchers have made significant progress in this field, the following questions and challenges are still open: (1) what are the low-carbon production capacity? (2) How to formulate and solve the three-player evolutionary game model for LCPC sharing problem?…”
Section: Introductionmentioning
confidence: 99%