Cargando…
PAtCH: Proactive Approach to Circumvent Holes in Wireless Sensor Networks
The occurrence of hole regions in Wireless Sensor Networks is a significant challenge when applying a greedy technique in a geographic routing approach. The local minimum phenomenon is commonly attributed to physical obstacles, energy depletion of the nodes, failures in communication between neighbo...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10535415/ https://www.ncbi.nlm.nih.gov/pubmed/37765918 http://dx.doi.org/10.3390/s23187862 |
Sumario: | The occurrence of hole regions in Wireless Sensor Networks is a significant challenge when applying a greedy technique in a geographic routing approach. The local minimum phenomenon is commonly attributed to physical obstacles, energy depletion of the nodes, failures in communication between neighbors, or even the incorrect deployment of the nodes in the sensing field. To address the problem of hole regions, most approaches choose to abandon the traditional greedy forwarding mechanism to temporarily adopt the well-known perimeter routing scheme applied to nearby nodes or along the edge of a region of a hole. However, this mechanism does not satisfy the network load balance requirement, because it imposes too much traffic to the nodes in the hole’s edge, making them overloaded when compared to other network nodes more distant from holes. In this work, we propose a novel location-free geographic routing technique called PAtCH (Proactive Approach to Circumvent Holes in Wireless Sensor Network) to avoid routing holes in WSNs. Our solution can circumvent hole regions and create routing paths toward the destination. We consider that our sink has a higher communication range, and the Received Signal Strength Indicator (RSSI) is used to assist the construction of the routing paths. Our results show the efficiency achieved by our proposed solution in scenarios with hole regions, also maintaining all the benefits of a classic greedy forwarding technique. |
---|