{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:56Z","timestamp":1750307816581,"version":"3.41.0"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2008,7,1]],"date-time":"2008-07-01T00:00:00Z","timestamp":1214870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2008,7]]},"abstract":"<jats:p>In the last few years, several studies have analyzed the performance of flooding and random walks as querying mechanisms for unstructured wireless sensor networks. However, most of the work is theoretical in nature and while providing insights into the asymptotic behavior of these querying mechanisms, does not account for the non-idealities faced by the network in real deployments. In this paper, we propose a 3-way handshake protocol as a reliable implementation of a random walk and compare its performance with flooding in real environments. The metrics considered are delay, reliability and transmission cost. Our initial results suggest that flooding is better suited for low-interference environments, while random walks might be a better option in networks with high interference. We also present possible research directions to improve the performance oflooding and random walks.<\/jats:p>","DOI":"10.1145\/1384609.1384612","type":"journal-article","created":{"date-parts":[[2008,7,2]],"date-time":"2008-07-02T12:09:19Z","timestamp":1215000559000},"page":"17-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Empirical evaluation of querying mechanisms for unstructured wireless sensor networks"],"prefix":"10.1145","volume":"38","author":[{"given":"Joon","family":"Ahn","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Shyam","family":"Kapadia","sequence":"additional","affiliation":[{"name":"Cisco Systems Inc., San Jose, CA, USA"}]},{"given":"Sundeep","family":"Pattem","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Avinash","family":"Sridharan","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Marco","family":"Zuniga","sequence":"additional","affiliation":[{"name":"National University of Ireland, Galway, Ireland"}]},{"given":"Jung-Hyun","family":"Jun","sequence":"additional","affiliation":[{"name":"University of Cincinnati, Cincinnati, OH, USA"}]},{"given":"Chen","family":"Avin","sequence":"additional","affiliation":[{"name":"Ben Gurion University of The Negev"}]},{"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[{"name":"University of Southern, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,7]]},"reference":[{"key":"e_1_2_1_4_1","volume-title":"WiOpt","author":"Krishnamachari B.","year":"2006","unstructured":"B. Krishnamachari , J. Ahn, Optimizing data replication for expanding ring-based queries in wireless sensor networks , WiOpt , Boston, MA , April 2006 . B. Krishnamachari, J. Ahn, Optimizing data replication for expanding ring-based queries in wireless sensor networks, WiOpt, Boston, MA, April 2006."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/514191.514206"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024591915518"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958502"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203367"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023730"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892880"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-3516-7"},{"key":"e_1_2_1_12_1","volume-title":"4th Workshop on Applications and Services in Wireless Networks (ASWN '04)","author":"Cheng Z.","year":"2004","unstructured":"Z. Cheng and W. Heinzelman , Searching Strategy for Multi-Target Discovery in Wireless Networks , 4th Workshop on Applications and Services in Wireless Networks (ASWN '04) , August 2004 . Z. Cheng and W. Heinzelman, Searching Strategy for Multi-Target Discovery in Wireless Networks, 4th Workshop on Applications and Services in Wireless Networks (ASWN '04), August 2004."},{"volume-title":"Draft Monograph, online at http:\/\/www.stat.berkeley.edu\/~aldous\/RWG\/book.html","author":"Aldous D.","key":"e_1_2_1_13_1","unstructured":"D. Aldous and Fill , Reversible Markov Chains and Random Walks on Graphs , Draft Monograph, online at http:\/\/www.stat.berkeley.edu\/~aldous\/RWG\/book.html D. Aldous and Fill, Reversible Markov Chains and Random Walks on Graphs, Draft Monograph, online at http:\/\/www.stat.berkeley.edu\/~aldous\/RWG\/book.html"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203365"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2003.08.001"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570742"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958493"},{"key":"e_1_2_1_18_1","first-page":"446","volume-title":"GLOBECOM 2003 - IEEE Global Telecommunications Conference, no.","author":"Lal D.","year":"2003","unstructured":"D. Lal , A. Manjeshwar , F. Herrmann , E. Biyikoglu , A. Keshavarzian, Measurement and characterization of link quality metrics in energy constrained wireless sensor networks , GLOBECOM 2003 - IEEE Global Telecommunications Conference, no. 1, Dec 2003 pp. 446 -- 452 . D. Lal, A. Manjeshwar, F. Herrmann, E. Biyikoglu, A. Keshavarzian, Measurement and characterization of link quality metrics in energy constrained wireless sensor networks, GLOBECOM 2003 - IEEE Global Telecommunications Conference, no. 1, Dec 2003 pp. 446--452."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147701"},{"key":"e_1_2_1_21_1","volume-title":"First IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON)","author":"Zuniga M.","year":"2004","unstructured":"M. Zuniga , B. Krishnamachari , Analyzing the Transitional Region in Low Power Wireless Links , First IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON) , Santa Clara, CA , October 2004 . M. Zuniga, B. Krishnamachari, Analyzing the Transitional Region in Low Power Wireless Links, First IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON), Santa Clara, CA, October 2004."},{"key":"e_1_2_1_22_1","volume-title":"The Second IEEE Workshop on Embedded Networked Sensors (EmNetS-II)","author":"Whitehouse K.","year":"2005","unstructured":"K. Whitehouse , A. Woo , F. Jiang , J. Polastre , D. Culler , Exploiting the Capture Effect for Collision Detection and Recovery , The Second IEEE Workshop on Embedded Networked Sensors (EmNetS-II) . Sydney, Australia. May 30-31, 2005 . K. Whitehouse, A. Woo, F. Jiang, J. Polastre, D. Culler, Exploiting the Capture Effect for Collision Detection and Recovery, The Second IEEE Workshop on Embedded Networked Sensors (EmNetS-II). Sydney, Australia. May 30-31, 2005."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570741"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984663"},{"key":"e_1_2_1_26_1","unstructured":"R. Stevens and G. Wright TCP\/IP Illustrated Vol.2 - The Implementation Addison-Wesley 1995.   R. Stevens and G. Wright TCP\/IP Illustrated Vol.2 - The Implementation Addison-Wesley 1995."},{"key":"e_1_2_1_27_1","unstructured":"http:\/\/www.moteiv.com\/products\/tmotesky.php.  http:\/\/www.moteiv.com\/products\/tmotesky.php."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1384609.1384612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1384609.1384612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:42Z","timestamp":1750255062000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1384609.1384612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,7]]}},"alternative-id":["10.1145\/1384609.1384612"],"URL":"https:\/\/doi.org\/10.1145\/1384609.1384612","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2008,7]]},"assertion":[{"value":"2008-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}