You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

2 October 2020

Ping-Pong Free Advanced and Energy Efficient Sensor Relocation for IoT-Sensory Network

,
and
1
Department of Liberal Arts, Seoul Theological University, Bucheon 14754, Korea
2
Department of Electrical Engineering, Incheon National University, Incheon 22012, Korea
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Distributed and Pervasive Sensing

Abstract

With the growing interest in big data technology, mobile IoT devices play an essential role in data collection. Generally, IoT sensor nodes are randomly distributed to areas where data cannot be easily collected. Subsequently, when data collection is impossible (i.e., sensing holes occurrence situation) due to improper placement of sensors or energy exhaustion of sensors, the sensors should be relocated. The cluster header in the sensing hole sends requests to neighboring cluster headers for the sensors to be relocated. However, it can be possible that sensors in the specific cluster zones near the sensing hole are continuously requested to move. With this knowledge, there can be a ping-pong problem, where the cluster headers in the neighboring sensing holes repeatedly request the movement of the sensors in the counterpart sensing hole. In this paper, we first proposed the near-uniform selection and movement scheme of the sensors to be relocated. By this scheme, the energy consumption of the sensors can be equalized, and the sensing capability can be extended. Thus the network lifetime can be extended. Next, the proposed relocation protocol resolves a ping-pong problem using queues with request scheduling. Another crucial contribution of this paper is that performance was analyzed using the fully-customed OMNeT++ simulator to reflect actual environmental conditions, not under over-simplified artificial network conditions. The proposed relocation protocol demonstrates a uniform and energy-efficient movement with ping-pong free capability.

1. Introduction

Due to the development of IoT devices, it is possible to collect various types of data. Moreover, in areas where humans cannot access, small IoT devices are deployed using unmanned devices such as multirotor and drones to collect data [,]. However, since it is practically impossible to evenly place sensors in areas where data collection is required, it is challenging to collect appropriate data that can accurately reflect the characteristics of the area of interest. Even with proper placement, small IoT devices are likely to be defective due to the inherent problem of energy depletion [,]. The most crucial thing in big data and artificial intelligence technology is data analysis, and correct data collection must be continuously performed for accurate data analysis. However, even if a problem occurs in data collection due to defects in IoT devices, it is difficult to recognize abnormal data collection due to a large amount of data [,].
IoT sensor networking technology can be used to collect a variety of data from such as hard-to-reach military areas or radiation spill disaster areas with many obstacles. In order to analyze the characteristics of these areas, the sensors must be distributed evenly. If data collection frequently occurs in a specific area, sensors in this area are more likely to run out of energy faster than sensors in other areas, increasing the likelihood of device failure. In the worst case, this can cause the entire network to lose communication, making data collection impossible [,]. As such, an area where data collection is no longer possible is called a sensing hole [].
Traditionally, energy consumption can be minimized by adjusting the state of the sensor, Active and Idle to prevent energy defects in the sensor node. Recently, methods based on energy consumption prediction have been proposed. For example, the prediction method of the sleep interval of sensors based upon the remaining battery level, previous usage history, and type of information required for an application is proposed []. Also, since energy consumption for message communication for controlling the terminal operation through node scheduling is significant, research is being conducted to optimize the idle time search and energy consumption model of the terminal through the fuzzy method [].
In addition, various methods of establishing a path that can evenly consume energy when establishing a path for data transmission have been studied. However, these studies have not been able to overcome the fundamental energy defect problem of the sensor node [,]. The most reliable method is a sensor rearrangement method that restores the sensing hole by moving a sensor capable of collecting data to the sensing hole when a sensing hole occurs. The relocation method studied in the early days was a movement using wheels, but it had a limitation that movement was not free in rough terrain [].
In order to overcome the disadvantages of the wheeled sensor, a hopping sensor that can jump and move to the desired direction was applied [,,,]. The initial hopping sensor relocation method assumed that all sensor devices knew information on all network areas, and then the sensor was moved [,,,,,,]. However, this is a very inappropriate assumption in reality. To overcome this problem, our research team proposed a hopping sensor relocation protocol based on a distributed environment suitable for reality [,,], but still, insufficiently researched topics such as mobile sensor requests were found.
In this paper, we explain and analyze the mentioned problem in detail, as shown in Table 1, and simulate the proposed relocation protocol using OMNeT++ for the first time in the world []. OMNeT++ is not a simple and easy-to-use network simulator but requires a lot of self-coding to simulate the real-world distributed environment.
Table 1. Limitations of the previous relocation protocol [] and contributions of this paper.
The rest of our paper is organized as follows. Section 2 reviews the related study and mentions some problems for the previous work. Section 3 analyzes the problems and provides the advanced protocol to overcome the previous drawbacks. In Section 4, we have simulated to prove the better performance of the proposed scheme compared to the previous one. Finally, Section 5 concludes this paper.

3. The Proposed Relocation Protocol for Ping-Pong Free

In this section, we look at the mentioned problems through a case study in detail, and we propose a relocation protocol to overcome the ones.

3.1. The Relocation Scheme to Evenly Distribute Sensors

Figure 3 shows an example of the problem that sensor member nodes relocated to recover the sensing hole are around the cluster header. Let us consider that at least five sensor member nodes have to be retained to recover a sensing hole and adequately collect data. As shown in Figure 3a, we assume that the cluster zones A and B have ten and two nodes. As soon as the header HB detects its sensing hole, it sends RELAY messages to relay nodes R1 and R2 (①). The relay nodes R1 and R2 reply to HB with RELAY-ACK message, respectively (②, ③). If HB first received RELAY-ACK from R1, it sends REQ messages to R1 and then ignores RELAY-ACK from R2. Here, it adds the information of the needed number of sensor nodes to recover the sensing hole to the REQ message. The relay node R1 forwards the received REQ message to the header HA in cluster zone A (⑤). The header HA chooses appropriate three sensor members and sends MOVE messages to them to migrate to the sensing hole (⑥).
Figure 3. An example of the problem that the moved sensor nodes are relocated near the header of the sensing hole, HB.
In the previous scheme [], the MOVE message contained GPS coordinate information of the sensing hole header’s destination. In Figure 3b, the member nodes M1, M2, and M3 that have received MOVE messages may migrate to the header HB’s adjacent area. As shown in Figure 3b, this migration would overcome the sensing hole with five members of cluster zone B. However, it would not be able to collect data reflected representative characteristics of cluster zone B as a whole. It would be desirable to modify GPS information in MOVE messages so that the members who move as much as possible could be distributed evenly. Thus, a coordinate (x, y) of the destination HB has to be modified as Equation (1):
x , y = x H ± r a n d 0 , r c o s θ ,   y H ± r a n d 0 , r s i n θ
where (xH, yH) is a coordinate of a destination cluster header, rand(a, b) is a function generating an arbitrary number between two real numbers a and b, r is a maximum transmission radius, and θ is a direction of movement from a member node to a destination cluster header.

3.2. The Relocation Scheme to Uniformly Choose Relay Nodes for Ping-Pong Free

Figure 4 shows the case of continuously sending a message to request the needed members only to a specific relay node. We assume that there are three cluster zones, and cluster zone B is a sensing hole. A cluster zone is determined as a sensing hole if the number of member nodes is less than 5. Figure 4a shows that the header HB of the sensing hole broadcasts RELAY message to relay nodes R1 and R2 (①). Upon receiving the RELAY message, the relay nodes R1 and R2 reply RELAY-ACK messages to HB, respectively (②, ③). Suppose that HB first received the RELAY-ACK transmitted from R1. HB adds the information of the number of members (i.e., 3) to the REQ message and transmits it (④), and then R1 delivers the message to the header HA (⑤). Finally, HA sends MOVE messages to three appropriately selected nodes among all members (⑥).
Figure 4. An example of continuously sending a message to request the needed members only to a specific relay node, R1.
Suppose that two members are exhausted of energy in cluster zone B, so the sensing hole occurs again, as shown in Figure 4c. To recover the sensing hole, HB broadcasts RELAY message to relay nodes R1 and R2 (①). As explained in Figure 4a (②~⑤), R1 forwards the REQ message to HA to relocate some needed members. In the relocation protocol of [], as each relay node replies RELAY-ACK message as soon as it receives the RELAY message from its header, it could be regarded as the shortest distance-based protocol. The reason is that the purpose of the previous relocation protocol is to pursue a short recovery time. However, this has to request some needed members to a specific relay node, and nodes relocation continuously appears in a duplicated neighbor cluster zone. Therefore, although the sensing hole could be recovered quickly, there is a disadvantage in which the neighbor zone can be quickly turned into a sensing hole. As shown in Figure 4d, cluster zone A would become a sensing hole if one more request happens.
Figure 5 describes the ping-pong problem such that two neighboring cluster zones are sensing holes, and each cluster header continuously requests the needed members to the same relay node. As shown in Figure 5a following Figure 4d, cluster zone B is a sensing hole, so the cluster header HB transmits an REQ message, including the number of needed sensors (i.e., 2) to the relay node R1 (④). The neighbor cluster header HA relocates appropriate members to the sensing holes (⑥), and the sensing hole could be recovered in Figure 5b.
Figure 5. A case study of the ping-pong problem.
Just in time, cluster zone B becomes a sensing hole again due to a node failure in Figure 5c. Another sensing hole also occurs due to some member relocation of Figure 5b. Each cluster header (i.e., HA, HB) chooses the relay node R1 to request the required member (①~④). Although each cluster zone is a sensing hole, relay node R1 delivers the REQ message received from HA to HB, but HB ignores the received REQ message because its cluster zone is a sensing hole (⑥, ⑧). Besides, the relay node R1 forwards the REQ message received from HB to HA, but the HA ignores the received REQ message since its zone is also a sensing hole (⑦, ⑨). As a result, the recovery of each sensing hole fails. After a certain period (i.e., HELLO message interval time), as shown in Figure 5d, the header of each sensing hole selects the relay node as R1 again for recovering each sensing hole (HA: ⑩, ⑫, HB: ⑪, ⑬), it could fail to recover them like Figure 5c.
Undoubtedly, the method to solve the ping-pong problem as described in Figure 5d is to evenly choose a relay node, not the shortest distance-based selection. As shown in Figure 6, we proposed a queue-based scheme to select a relay node equally in this paper. Each header adds the relay nodes as candidates to its queue using RELAY-ACK messages in order. Each candidate node will be brought out in order of priority when a cluster header chooses a relay node.
Figure 6. An example of using each header’s queue to manage the priority of selecting a relay node for ping-pong free.
In Figure 6a, the cluster header HB of cluster zone B detects a sensing hole and broadcasts a RELAY message (①). Each relay node responds with a RELAY-ACK message as soon as receiving RELAY. Here, if HB received the messages from R1 and R2 sequentially (②, ③), it adds the addresses of R1 and R2 to its queue in order. HB sends a REQ message contained the required number of members (i.e., 2) to the priority R1 and deletes the address of R1 from the queue. HA received the REQ message (⑤), and it orders M1 and M2 to move to the neighbor cluster zone B through MOVE messages (⑥).
In Figure 6b, cluster zone A becomes a sensing hole as the members move. In Figure 6c, cluster zone B is also a sensing hole due to a member node’s failure. The header HA broadcasts a RELAY message (①), and another header HB also broadcasts another RELAY message in its zone (②). In cluster zone A, HA puts the address of R1 in its queue as receiving a RELAY-ACK message from R1 (③). In cluster zone B, HB also adds the addresses of R1 and R2 to its queue when it receives RELAY-ACK messages from R1 and R2 (④, ⑤), respectively. In order to select an appropriate relay node, each cluster header dequeues a candidate relay node with a higher priority in its queue. So, HA selects R1 and transmits a REQ message (⑥), and R1 delivers the message to HB (⑧). HB dequeues the R2 address and sends a REQ message to R2 (⑦). R2 forwards the message to HC (⑨). Therefore, as shown in Figure 6d, the ping-pong problem could be prevented in advance.
In Figure 6a, suppose that the RELAY-ACK message (③) was not received from the relay node R2, which is far away due to network communication failure, and the RELAY-ACK message (⑤) was received only in Figure 6c. In this case, since the address of R1 enters the queue twice in a row, ping-pong may occur, as shown in Figure 5. In fact, the intention of the FIFO policy is to evenly select the relay nodes of the candidate group and evenly request the neighboring headers to move the required hopping sensor. However, in an environment where such an abnormal situation may occur, after sequentially putting the addresses of relay nodes into the queue, managing the frequency of the addresses entered in the queue is separately performed, and relay nodes for the minimum frequency can be selected. In this way, it is possible to solve the ping pong problem that may occur through communication failures such as the example mentioned now. Alternatively, the FIFO can be replaced in a variety of ways, such as using a random function or a hash function when selecting from the queue, or shuffling the addresses of relay nodes in the queue. In this way, various policies other than FIFO can be used for queue-based relay node candidate management, but this paper assumes that the most well-known FIFO method is applied.
Figure 7 is a sequence diagram of the proposed algorithm for Figure 6. We can look at the queue’s changing over time, and it could explain the proposed relocation protocol in detail.
Figure 7. A message sequence diagram for the case study of Figure 6.

4. Simulation Results and Analysis

In the past, the relocation algorithm of mobile sensors was only a theoretical study. The simulation also had an assumption that every sensor node was aware of all changed topologies. It could not implement the consideration in reality. One of the contributions of this study is that a distributed networking-based relocation protocol is proposed to advance the mentioned limitations (Table 1) of the previous work, and the simulation is performed using OMNeT++ to increase the possibility of implementation in the real world [,,]. Table 2 describes the simulation environment.
Table 2. Simulation environments.
300 sensors are scattered randomly, as shown in Figure 8; If necessary, the sensors can be distributed in a particular way, but they are generally uniformly distributed in our simulation. Among them, 15 cluster headers are arranged (red color), and the remaining 285 things are sensor member nodes (i.e., 19 member nodes per cluster zone). We consider the scenario in which every sensor member node continuously collects requested data in the central cluster zone and rapidly consumes energy. We set a simulation parameter that each sensor in the middle cluster can generate a data collection event with exponential distribution (average of 5 min). A cluster header can detect an occurrence of a sensing hole (less than ten sensor member nodes) after broadcasting a HELLO message for every specific period (i.e., HELLO message interval time). We also color a sensor member node as yellow when it becomes faulty due to energy depletion after continuous data collection. We indicate the movement of a sensor member node by a solid line.
Figure 8. Simulation snapshots of the movements of sensor member nodes. (a) Previous scheme; (b) Proposed scheme.
Figure 8a shows that the previous relocation algorithm moves required sensor member nodes around the sensing hole header since the destination of the moving sensor is set to the GPS coordinate of the header. However, Figure 8b shows the relocation of the required sensor member nodes through the proposed algorithm in which the destination address of the MOVE message is reset to a random value near the header. As can be seen, the moved sensor member nodes are evenly arranged in the sensing hole area, and appropriate data could be collected.
The cluster header periodically broadcasts a HELLO message to detect that its zone becomes a sensing hole. We set the periodic time to 60, 30, and 15 min, and we considered the simulation time was three days. Figure 9a,c,e show the simulation snapshots of the problem of sending a REQ request message to specific relay nodes in the previous algorithm, as mentioned in Section 3.2. As shown in Figure 9b,d,f, most relay nodes are uniformly involved in the relocation process. The proposed algorithm can evenly move most sensor member nodes and lead to uniform total network energy consumption.
Figure 9. Simulation snapshots for each relocation protocols in terms of HELLO message interval time. (a) Previous scheme w. 60 min; (b) Proposed scheme w. 60 min; (c) Previous scheme w. 30 min; (d) Proposed scheme w. 30 min; (e) Previous scheme w. 15 min; (f) Proposed scheme w. 15 min.
Figure 10 shows the standard deviation values for the frequency of selecting relay nodes to request the needed sensors from the cluster header, which is the middle of the area in Figure 9. Since the header selects a relay node that responds fastest in the previous algorithm, there is a very high possibility that specific relay nodes could be repeatedly selected. It is also improbable that the relay nodes located in the remote place are selected in response to late. In the proposed algorithm, the priority of the relay nodes to be selected is managed as a queue, so the standard deviation value for the frequency of selecting relay nodes is relatively low compared to the previous one. In other words, as can be seen in Figure 9, it is confirmed that the majority of relay nodes are selected in a similar proportion.
Figure 10. Standard deviations of the numbers of relay nodes selected by the middle cluster header in Figure 9.
In the proposed scheme, there was almost no occurrence of a ping-pong phenomenon. However, as shown in Figure 11, the ping-pong phenomenon steadily occurred in the previous scheme due to using specific relay nodes as close as possible. When the HELLO message interval of the cluster header capable of detecting the sensing hole is set to 15 min, there is a cluster zone in which continuous data collection is actively performed. In this case, a continuous sensing hole may occur, which means that a ping-pong state is likely to occur. In Figure 11, it can be seen that many ping-pong problems occurred between 50 and 60 h of simulation.
Figure 11. Occurrence time of ping-pong states in terms of the number of ping-pong states for the previous scheme (currently the proposed scheme has NO ping-pong in this simulation.).
However, in Figure 11, the ping pong of the proposed method could not be examined. As shown in Figure 10, this is because relay nodes are selected almost evenly in the proposed method. In other words, the standard deviation does not exceed 0.5 times for the number of times the relay nodes are selected. Next, an additional simulation was performed by configuring an extreme environment in which a ping-pong state may occur, and additional energy consumption to solve the ping-pong problem was analyzed. Table 3 describes the environment settings.
Table 3. Simulation environments for generating ping-pong states.
Figure 12 is a topology where a lot of ping-pong can occur. Relay node 1 is in the middle between the two cluster headers, and relay nodes 2 and 3 are a little farther apart. Cluster zones 1 and 2 are in a state where the maximum number of sensing holes can occur. In this topology, relay node 1 will be selected in the previous method, but in the proposed method, it can be predicted that relay nodes are sequentially selected. Once ping-pong occurs, many additional messages are generated again. At the moment which the sensing hole cannot be recovered, RELAY, RELAY-ACKs as much as the number of relay nodes, 2 REQs, ADV, ADVs as much as the number of members in the cluster zone, and MOVE as the number of selected members are additionally generated as seen in Figure 2. In Figure 13, even in such an extreme environment, the proposed method achieved a maximum energy efficiency of about 43.5% compared to the previous method after performing the simulation for about 40 h.
Figure 12. Simulation snapshot for generating ping-pong states.
Figure 13. Cumulative additional energy consumptions to resolve the ping-pong states occurred.
When the ping-pong phenomenon occurs, the sensing hole’s recovery time may be delayed, and as a result, it becomes difficult to collect data continuously. Furthermore, the continuous generation of REQ messages occurs, and it may incur serious energy consumption throughout the entire networking area. Therefore, we are confident that our advanced relocation protocol can effectively extend the network lifetime compared to the previous one.

5. Conclusions

Our research team has previously proposed practical sensor relocation protocols for mobile sensors used in real-world environments. However, it was found that sensors in the specific cluster zones near the sensing hole were continuously requested to relocate. Thus, there can be an unbalanced sensor selection and ping-pong problem, and as a result, fast energy exhaustion makes the overall sensor network lifetime shorter.
The proposed algorithm, designed by a fully-customed OMNeT++ simulator, first focuses on a uniform selection of the sensors to be relocated. We could confirm that the proposed relocation protocol showed a uniform and energy-efficient sensor movement as possible compared to previously proposed algorithms. Thus, a more uniform distribution of sensors can reflect the characteristic of the zone better. It also expects to reduce energy consumption by saving send-messages to request the necessary sensors. Then, the ping-pong problem was solved by the proposed protocol based on the queue-dequeue process using the queue considering the priority of the request.

Author Contributions

M.K. is the first author, and W.L. is the corresponding author. M.K., S.P., and W.L. designed the protocol and the simulation process. M.K., S.P., and W.L. coordinated the grant funding, conducted the study, analyzed the data, and drafted the first version of the manuscript. The simulation was conducted by M.K., S.P., and W.L. supervised the software development. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Ministry of Science, ICT & Future Planning (No. NRF -2019R1G1A1007832).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ray, P.P.; Mukherjee, M.; Shu, L. Internet of Things for Disaster Management: State-of-the-Art and Prospects. IEEE Access 2017, 5, 18818–18835. [Google Scholar] [CrossRef]
  2. Alioto, M.; Shahghasemi, M. The Internet of Things on Its Edge: Trends Toward Its Tipping Point. IEEE Consum. Electron. Mag. 2018, 7, 77–87. [Google Scholar] [CrossRef]
  3. Zhang, Y.; Xiong, Z.; Niyato, D.; Wang, P.; Kim, D.I. Toward a Perpetual IoT System: Wireless Power Management Policy with Threshold Structure. IEEE Internet Things J. 2018, 5, 5254–5270. [Google Scholar] [CrossRef]
  4. Yaqoob, I.; Ahmed, E.; Hashem, I.A.T.; Ahmed, A.I.A.; Gani, A.; Imran, M.; Guizani, M. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges. IEEE Wirel. Commun. 2017, 24, 10–16. [Google Scholar] [CrossRef]
  5. Yu, S.; Liu, M.; Dou, W.; Liu, X.; Zhou, S. Networking for Big Data: A Survey. IEEE Commun. Surv. Tutorials 2017, 19, 531–549. [Google Scholar] [CrossRef]
  6. Chen, M.; Mao, S.; Liu, Y. Big Data: A Survey. Mob. Networks Appl. 2014, 19, 171–209. [Google Scholar] [CrossRef]
  7. Chudzikiewicz, J.; Furtak, J.; Zielinski, Z. Fault-tolerant techniques for the internet of military things. In Proceeding of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 14–16 December 2015. [Google Scholar]
  8. Kim, M.; Park, S.; Lee, W. A Robust Energy Saving Data Dissemination Protocol for IoT-WSNs. KSII Trans. Internet Inf. Syst. 2018, 12, 5744–5764. [Google Scholar] [CrossRef]
  9. Kosar, R.; Onur, E.; Ersoy, C. Redeployment based sensing hole mitigation in wireless sensor networks. In Proceedings of the 2009 IEEE Wireless Communications and Networking Conference; Institute of Electrical and Electronics Engineers (IEEE), Budapest, Hungary, 5–8 April 2009. [Google Scholar]
  10. Kaur, N.; Sood, S.K. An Energy-Efficient Architecture for the Internet of Things (IoT). IEEE Syst. J. 2015, 11, 796–805. [Google Scholar] [CrossRef]
  11. Ding, X.; Wu, J. Study on Energy Consumption Optimization Scheduling for Internet of Things. IEEE Access 2019, 7, 70574–70583. [Google Scholar] [CrossRef]
  12. Kim, M.; Jeong, E.; Bang, Y.-C.; Hwang, S.; Shin, C.; Jin, G.-J.; Kim, B. An Energy-Aware Multipath Routing Algorithm in Wireless Sensor Networks. IEICE Trans. Inf. Syst. 2008, 91, 2419–2427. [Google Scholar] [CrossRef]
  13. Elappila, M.; Chinara, S.; Parhi, D.R. Survivable Path Routing in WSN for IoT applications. Pervasive Mob. Comput. 2018, 43, 49–63. [Google Scholar] [CrossRef]
  14. Luo, R.C.; Huang, J.-T.; Chen, O. A triangular selection path planning method with dead reckoning system for wireless mobile sensor mote. In Proceedings of the 2006 IEEE International Conference on Systems, Man and Cybernetics; Institute of Electrical and Electronics Engineers (IEEE), Taipei, Taiwan, 8–11 October 2006. [Google Scholar]
  15. Zhao, J.; Xu, J.; Gao, B.; Xi, N.; Cintron, F.J.; Mutka, M.W.; Xiao, L. MSU Jumper: A Single-Motor-Actuated Miniature Steerable Jumping Robot. IEEE Trans. Robot. 2013, 29, 602–614. [Google Scholar] [CrossRef]
  16. Cintron, F.J.; Pongaliur, K.; Mutka, M.W.; Xiao, L.; Zhao, J.; Xi, N. Leveraging Height in a Jumping Sensor Network to Extend Network Coverage. IEEE Trans. Wirel. Commun. 2012, 11, 1840–1849. [Google Scholar] [CrossRef]
  17. Cintr’on, F. Network Issues for 3D Wireless Sensors Networks. Ph.D. Thesis, Michigan State University, East Lansing, MI, USA, 2013. [Google Scholar]
  18. Kim, M.; Kim, T.; Shon, M.; Kim, M.; Choo, H. Design of a transmission process for hopping sensors to enhance coverage. In Proceedings of the International Conference Wireless Networks (ICWN 10), Las Vegas, NV, USA, 12–15 July 2010. [Google Scholar]
  19. Cen, Z.; Mutka, M.W. Relocation of hopping sensors. In Proceedings of the 2008 IEEE International Conference on Robotics and Automation; Institute of Electrical and Electronics Engineers (IEEE), Pasadena, CA, USA, 19–23 May 2008. [Google Scholar]
  20. Kim, M.; Mutka, M.W. On relocation of hopping sensors for balanced migration distribution of sensors. In Proceedings of the Computational Science and Its Applications – ICCSA 2009, Seoul, Korea, 29 June–2 July 2009. [Google Scholar]
  21. Kim, M.; Mutka, M.W. Multipath-based relocation schemes considering balanced assignment for hopping sensors. In Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems; Institute of Electrical and Electronics Engineers (IEEE), St. Louis, MO, USA, 10–15 October 2009. [Google Scholar]
  22. Kim, M.; Mutka, M.W.; Choo, H. On Relocation of Hopping Sensors for Rugged Terrains. In Proceedings of the 2010 International Conference on Computational Science and Its Applications; Institute of Electrical and Electronics Engineers (IEEE), Fukuoka, Japan, 23–26 March 2010. [Google Scholar]
  23. Chellappan, S.; Snyder, M.; Thakur, M. Distributed exploratory coverage with limited mobility. Int. J. Space-Based Situated Comput. 2014, 4, 114. [Google Scholar] [CrossRef]
  24. Snyder, M.E. Foundations of Coverage Algorithms in Autonomic Mobile Sensor Networks. Ph.D. Thesis, Missouri University of Science and Technology, Rolla, MO, USA, 2014. [Google Scholar]
  25. Kim, M.; Park, S.; Lee, W. Energy and Distance-Aware Hopping Sensor Relocation for Wireless Sensor Networks. Sensors 2019, 19, 1567. [Google Scholar] [CrossRef] [PubMed]
  26. Park, S.; Kim, M.; Lee, W. Energy-Efficient Wireless Hopping Sensor Relocation Based on Prediction of Terrain Conditions. Electronics 2019, 9, 49. [Google Scholar] [CrossRef]
  27. Park, S.; Kim, M.; Lee, W. Success Rate Queue-based Relocation Algorithm of Sensory Network to Overcome Non-uniformly Distributed Obstacles. Comput. Mater. Contin. 2020, 65, 1181–1201. [Google Scholar] [CrossRef]
  28. OMNeT Web Site. Available online: https://www.omnetpp.org (accessed on 1 October 2020).
  29. Rostami, A.S.; Badkoobe, M.; Mohanna, F.; Keshavarz, H.; Hosseinabadi, A.A.R.; Sangaiah, A.K. Survey on clustering in heterogeneous and homogeneous wireless sensor networks. J. Supercomput. 2017, 74, 277–323. [Google Scholar] [CrossRef]
  30. Sabor, N.; Sasaki, S.; Abo-Zahhad, M.; Ahmed, S.M. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions. Wirel. Commun. Mob. Comput. 2017, 2017, 1–23. [Google Scholar] [CrossRef]
  31. Zarrad, A.; Alsmadi, I. Evaluating network test scenarios for network simulators systems. Int. J. Distrib. Sens. Networks 2017, 13, 1550147717738216. [Google Scholar] [CrossRef]
  32. Virdis, A.; Kirsche, M. Recent Advances in Network Simulation: The OMNeT++ Environment and Its Ecosystem; Springer: Cham, Switzerland, 2019. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.