2017
DOI: 10.3390/s17030580
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Position Aware Mobility Pattern of AUVs for Avoiding Void Zones in Underwater WSNs

Abstract: In this paper, we propose two schemes; position-aware mobility pattern (PAMP) and cooperative PAMP (Co PAMP). The first one is an optimization scheme that avoids void hole occurrence and minimizes the uncertainty in the position estimation of glider’s. The second one is a cooperative routing scheme that reduces the packet drop ratio by using the relay cooperation. Both techniques use gliders that stay at sojourn positions for a predefined time, at sojourn position self-confidence (s-confidence) and neighbor-co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…To minimize the energy use and avoid the void zone occurrence, two new techniques are presented in [19]. In the first technique the mobile sink nodes play the key role to reduce consumption of the nodes' energy.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…To minimize the energy use and avoid the void zone occurrence, two new techniques are presented in [19]. In the first technique the mobile sink nodes play the key role to reduce consumption of the nodes' energy.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Loses the reliability and drops maximum packets. [19] Both the cooperative and non-cooperative schemes used the node position information by considering distance and mobile sinks for information advancement.…”
Section: Citations Yearmentioning
confidence: 99%
“…Therefore, the IoT network faces many issues, which capture the interest of researchers to improve its efficiency. The last few decades have been quite active in IoT research, which resulted in a huge amount of proposals for various routing protocols [5], [6], security models [7], [8] and clustering techniques [9] that provide secure and trustful communication in the IoT networks. However, IoT networks are always threatened to be compromised by the external nodes, which mislead the networks by sending false data for their benefit.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [21] propose a cooperative position-aware mobility pattern. In this protocol, the void zones are avoided by using multiple gliders.…”
Section: Introductionmentioning
confidence: 99%