{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:12:41Z","timestamp":1755839561766,"version":"3.41.0"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T00:00:00Z","timestamp":1697587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF China","award":["42050105, 62020106005, 62061146002, 61960206002"],"award-info":[{"award-number":["42050105, 62020106005, 62061146002, 61960206002"]}]},{"name":"Shanghai Pilot Program for Basic Research - Shanghai Jiao Tong University"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2024,1,31]]},"abstract":"<jats:p>This article studies time-sensitive multicast in wireless sensor networks (WSNs) with link uncertainty, where information from the source needs to be delivered to multiple receivers within an imposed delay constraint. Prior art on static WSNs minimizes the multicast delay via the construction of a multicast tree that approximates the Steiner tree in length, which, however, may be invalidated by the time-varying network topology of WSNs with uncertain link states. Moreover, for multicast in WSNs with link uncertainty, the possible link failure necessitates a suitable measurement of the uncertain communication distance and calls for the performance guarantee in both delay and delivery ratio. In this work, by modeling a WSN as a random graph with each link associated with a transmission probability, we propose FlowerCast, an efficient multicast scheme, to jointly minimize the expected multicast delay and to maximize the expected delivery ratio of multicast under delay constraint. The core of FlowerCast is to quantify the uncertain communication distance by the expected transmission delay of a time-varying path, based on which a delay-optimal multicast tree is constructed in accordance with the directionality of delay. Candidate paths with a high expected delivery ratio and low expected delay are then selected in a distributed manner to conditionally connect adjacent multicast members and thus transform the multicast tree into a multicast flower. Despite the NP-hardness of optimal candidate paths\u2019 addition, the transformation with the highest expected delivery ratio of multicast under delay constraint can be guaranteed through a pseudo-polynomial time derandomization-based greedy approach. We further demonstrate the time and energy efficiency of FlowerCast through asymptotic analysis. To make full use of the possible overlapping links in a multicast flower, a hybrid routing strategy is presented to wisely switch between sequential routing and synchronous routing for extra enhancement of the multicast performance. Extensive experiments on various datasets verify the superiority of FlowerCast and hybrid routing over baselines and indicate their wide applicability to practical scenarios.<\/jats:p>","DOI":"10.1145\/3605551","type":"journal-article","created":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T11:14:38Z","timestamp":1687605278000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["FlowerCast: Efficient Time-sensitive Multicast in Wireless Sensor Networks with Link Uncertainty"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3206-6912","authenticated-orcid":false,"given":"Jianzhi","family":"Tang","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7796-9168","authenticated-orcid":false,"given":"Luoyi","family":"Fu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1395-575X","authenticated-orcid":false,"given":"Shiyu","family":"Liang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4121-4163","authenticated-orcid":false,"given":"Fei","family":"Long","sequence":"additional","affiliation":[{"name":"Xinhua News Agency, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3123-5270","authenticated-orcid":false,"given":"Lei","family":"Zhou","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0357-8356","authenticated-orcid":false,"given":"Xinbing","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3331-2302","authenticated-orcid":false,"given":"Chenghu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,18]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437024"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3183338"},{"key":"e_1_3_3_4_2","doi-asserted-by":"crossref","DOI":"10.1142\/12324","volume-title":"Algorithms: Design Techniques and Analysis","author":"Alsuwaiyel Muhammad H.","year":"2021","unstructured":"Muhammad H. Alsuwaiyel. 2021. Algorithms: Design Techniques and Analysis. Vol. 15. World Scientific."},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9592836"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2859325"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1137\/S1052623498348481"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3274783.3274835"},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647642"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461013"},{"issue":"2","key":"e_1_3_3_11_2","first-page":"1460","article-title":"Efficient top-k vulnerable nodes detection in uncertain graphs","volume":"35","author":"Cheng Dawei","year":"2021","unstructured":"Dawei Cheng, Chen Chen, Xiaoyang Wang, and Sheng Xiang. 2021. Efficient top-k vulnerable nodes detection in uncertain graphs. IEEE Transactions on Knowledge and Data Engineering 35, 2 (2021), 1460\u20131472.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3369782"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2725905"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2790639"},{"issue":"1","key":"e_1_3_3_15_2","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TIT.2016.2623317","article-title":"Distributed multicast tree construction in wireless sensor networks","volume":"63","author":"Gong Hongyu","year":"2016","unstructured":"Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao, Kainan Wang, and Xinbing Wang. 2016. Distributed multicast tree construction in wireless sensor networks. IEEE Transactions on Information Theory 63, 1 (2016), 280\u2013296.","journal-title":"IEEE Transactions on Information Theory"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.011"},{"issue":"3","key":"e_1_3_3_17_2","doi-asserted-by":"crossref","first-page":"2095","DOI":"10.1109\/JIOT.2021.3058982","article-title":"A resource efficient hybrid proxy mobile IPv6 extension for next generation IoT networks","volume":"10","author":"Hussain Anwar","year":"2021","unstructured":"Anwar Hussain, Shah Nazir, Fazlullah Khan, Lewis Nkenyereye, Ayaz Ullah, Sulaiman Khan, Sahil Verma, et\u00a0al. 2021. A resource efficient hybrid proxy mobile IPv6 extension for next generation IoT networks. IEEE Internet of Things Journal 10, 3 (2021), 2095\u20132103.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2706186"},{"issue":"3","key":"e_1_3_3_19_2","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1109\/TMC.2013.30","article-title":"Snapshot and continuous data collection in probabilistic wireless sensor networks","volume":"13","author":"Ji Shouling","year":"2013","unstructured":"Shouling Ji, Raheem Beyah, and Zhipeng Cai. 2013. Snapshot and continuous data collection in probabilistic wireless sensor networks. IEEE Transactions on Mobile Computing 13, 3 (2013), 626\u2013637.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2816653"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24488-9"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2981144"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1214\/22-AOS2191"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1022677261"},{"key":"e_1_3_3_25_2","first-page":"515","volume-title":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS \u201919)","author":"Rathinam D. Devi Kala","year":"2019","unstructured":"D. Devi Kala Rathinam, D. Surendran, A. Shilpa, A. Santhiya Grace, and J. Sherin. 2019. Modern agriculture using wireless sensor network (WSN). In 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS \u201919). IEEE, 515\u2013519."},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460435"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.14778\/3450980.3450988"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2973375"},{"issue":"1","key":"e_1_3_3_29_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3428150","article-title":"QoS\u2013aware mesh-based multicast routing protocols in edge ad hoc networks: Concepts and challenges","volume":"22","author":"Singal Gaurav","year":"2021","unstructured":"Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha, Deepak Garg, and Neeraj Kumar. 2021. QoS\u2013aware mesh-based multicast routing protocols in edge ad hoc networks: Concepts and challenges. ACM Transactions on Internet Technology (TOIT) 22, 1 (2021), 1\u201327.","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1166-y"},{"issue":"6","key":"e_1_3_3_31_2","first-page":"5597","article-title":"Aligning dynamic social networks: An optimization over dynamic graph autoencoder","volume":"35","author":"Sun Li","year":"2022","unstructured":"Li Sun, Zhongbao Zhang, Jian Wen, Feiyang Wang, Pengxin Ji, Sen Su, and Philip Yu. 2022. Aligning dynamic social networks: An optimization over dynamic graph autoencoder. IEEE Transactions on Knowledge and Data Engineering 35, 6 (2022), 5597\u20135611.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0262565"},{"issue":"4","key":"e_1_3_3_33_2","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1109\/TMC.2018.2849416","article-title":"Learning-based outdoor localization exploiting crowd-labeled wifi hotspots","volume":"18","author":"Wang Jin","year":"2018","unstructured":"Jin Wang, Jun Luo, Sinno Jialin Pan, and Aixin Sun. 2018. Learning-based outdoor localization exploiting crowd-labeled wifi hotspots. IEEE Transactions on Mobile Computing 18, 4 (2018), 896\u2013909.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"e_1_3_3_34_2","first-page":"4451","article-title":"Distributed robust optimization algorithms over uncertain network graphs","volume":"52","author":"Wu Zizhen","year":"2020","unstructured":"Zizhen Wu and Zhongkui Li. 2020. Distributed robust optimization algorithms over uncertain network graphs. IEEE Transactions on Cybernetics 52, 6 (2020), 4451\u20134458.","journal-title":"IEEE Transactions on Cybernetics"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2872998"},{"issue":"1","key":"e_1_3_3_36_2","first-page":"261","article-title":"Delay-optimized multicast tree packing in software-defined networks","volume":"16","author":"Zhang Xinchang","year":"2021","unstructured":"Xinchang Zhang, Yinlong Wang, Guanggang Geng, and Jiguo Yu. 2021. Delay-optimized multicast tree packing in software-defined networks. IEEE Transactions on Services Computing 16, 1 (2021), 261\u2013275.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"4","key":"e_1_3_3_37_2","doi-asserted-by":"crossref","first-page":"1150","DOI":"10.1109\/TNET.2013.2270088","article-title":"Node density and delay in large-scale wireless networks with unreliable links","volume":"22","author":"Zhao Shizhen","year":"2013","unstructured":"Shizhen Zhao and Xinbing Wang. 2013. Node density and delay in large-scale wireless networks with unreliable links. IEEE\/ACM Transactions on Networking 22, 4 (2013), 1150\u20131163.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2832780"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605551","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:03Z","timestamp":1750182543000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605551"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,18]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,31]]}},"alternative-id":["10.1145\/3605551"],"URL":"https:\/\/doi.org\/10.1145\/3605551","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2023,10,18]]},"assertion":[{"value":"2022-11-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-10-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}