2010
DOI: 10.1016/j.comcom.2010.01.026
|View full text |Cite
|
Sign up to set email alerts
|

Random walk with jumps in large-scale random geometric graphs

Abstract: a b s t r a c tThe information dissemination problem in large-scale networking environments like wireless sensor networks and ad hoc networks is studied here considering random geometric graphs and random walk based approaches. A new type of random walk based agent is proposed in this paper and an analytical expression with respect to coverage (i.e., the proportion of the network nodes visited by the random walk agent) as a function of the number of the agent movements is derived. It is observed that the cover… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0
2

Year Published

2011
2011
2019
2019

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 31 publications
0
6
0
2
Order By: Relevance
“…Tzevelekas et al in [16] present the same problem addressed in this work with the technique of a random walker with jumps. Oikonomou et al in [25] investigate the use of multiple random walkers and related replication mechanisms.…”
Section: Related Workmentioning
confidence: 77%
See 2 more Smart Citations
“…Tzevelekas et al in [16] present the same problem addressed in this work with the technique of a random walker with jumps. Oikonomou et al in [25] investigate the use of multiple random walkers and related replication mechanisms.…”
Section: Related Workmentioning
confidence: 77%
“…The choice of the model of a geometric random graph to represent WSN and ad hoc networks is quite common in the literature, e.g., [16,[23][24][25][26][27][28][29]. One of the most most comprehensive studies on geometric random graphs can be found in [18] by Penrose.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Either variants of flooding [15][16][17] or single random walk [18][19][20] or their combinations (e.g., hybrid probabilistic schemes [21]) were used for this purpose. Different approaches have been adopted to minimize the redundant node visits by the message packet, e.g., use of topological features of the network [22,23] and entropy information measurement based cost effective path selection [24,25].…”
Section: Introductionmentioning
confidence: 99%
“…Exploiting the store-carry-and-forward paradigm [32,33], messages are locally stored at intermediate nodes that are deemed most suitable to bring them closer to the eventual destination(s), until a new node appears (e.g., thanks to mobility), which is an even better candidate for reaching the destinations. A number of research topics are been addressed in the area of opportunistic networking, including forwarding protocols [34][35][36][37], privacy-preserving solutions [38,39], resource management and service-oriented systems [40,41], support for participatory sensing [42][43][44], and characterisation of foundational theoretical properties [45][46][47]. Some of the solutions investigated in this area exploit information about human social relationships, e.g.…”
Section: Introductionmentioning
confidence: 99%