{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:16Z","timestamp":1740141796280,"version":"3.37.3"},"reference-count":25,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T00:00:00Z","timestamp":1364774400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100002635","name":"Inha University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002635","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"<jats:p> This paper presents RECPE, a reliable collection protocol for aggregating data packets from all the sensor nodes to the sink in a large-scale WSN (wireless sensor network). Unlike some well-known reliable data collection protocols such as CTP (Collection Tree Protocol) that uses ETX (expected transmission count) as the routing metric, RECPE exploits ETF (expected transmission count over forward links) to construct a one-way collection tree, which avoids missing some good routes and reduces the effect of asymmetric link in the network. Crucially, RECPE guarantees the reliability by erasure-resilient codes in the application layer without retransmission required by other reliable protocols. Therefore, some lower layers such as data link layer only need to conduct best-effort data delivery. Meanwhile, to improve efficiency, RECPE also exploits Trickle algorithm to reduce routing beacons and pipeline data delivery to prevent self-interference. We evaluate the performance of RECPE via TOSSIM simulations, and our results show that, in comparison with CTP (the de facto data collection protocol for TinyOS), RECPE can obtain significant performance in terms of delivery cost, latency, and packet loss rate for reliable data collection especially in asymmetric link networks. <\/jats:p>","DOI":"10.1155\/2013\/730819","type":"journal-article","created":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T21:01:40Z","timestamp":1366232500000},"page":"730819","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Reliable Data Collection Protocol Based on Erasure-Resilient Code in Asymmetric Wireless Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Jian-Jun","family":"Lei","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"given":"Taehyun","family":"Park","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Inha University, Incheon 402-751, Republic of Korea"}]},{"given":"Gu-In","family":"Kwon","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Inha University, Incheon 402-751, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,4,17]]},"reference":[{"doi-asserted-by":"publisher","key":"B1-2013-730819","DOI":"10.1145\/190809.190336"},{"doi-asserted-by":"publisher","key":"B2-2013-730819","DOI":"10.1109\/MCSA.1999.749281"},{"doi-asserted-by":"publisher","key":"B3-2013-730819","DOI":"10.1007\/s11276-005-1766-z"},{"doi-asserted-by":"publisher","key":"B4-2013-730819","DOI":"10.1109\/VETECF.2008.17"},{"doi-asserted-by":"publisher","key":"B5-2013-730819","DOI":"10.1145\/1689239.1689242"},{"doi-asserted-by":"publisher","key":"B6-2013-730819","DOI":"10.1145\/1288107.1288110"},{"doi-asserted-by":"publisher","key":"B7-2013-730819","DOI":"10.3837\/tiis.2010.01.004"},{"volume":"1","volume-title":"Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation","author":"Philip L.","key":"B8-2013-730819"},{"doi-asserted-by":"publisher","key":"B10-2013-730819","DOI":"10.1145\/1149283.1149287"},{"doi-asserted-by":"publisher","key":"B11-2013-730819","DOI":"10.1145\/1240226.1240227"},{"volume-title":"Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems","author":"Kannan S.","key":"B12-2013-730819"},{"doi-asserted-by":"publisher","key":"B13-2013-730819","DOI":"10.1109\/SAHCN.2009.5168924"},{"doi-asserted-by":"publisher","key":"B14-2013-730819","DOI":"10.1007\/s10776-009-0103-3"},{"doi-asserted-by":"publisher","key":"B15-2013-730819","DOI":"10.1109\/JSAC.2002.803996"},{"doi-asserted-by":"publisher","key":"B16-2013-730819","DOI":"10.1109\/IPSN.2008.9"},{"volume-title":"Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04)","author":"Jonathan W. H.","first-page":"81","key":"B17-2013-730819"},{"doi-asserted-by":"publisher","key":"B18-2013-730819","DOI":"10.1109\/INFOCOM.2007.211"},{"doi-asserted-by":"publisher","key":"B19-2013-730819","DOI":"10.1109\/TMC.2010.109"},{"doi-asserted-by":"publisher","key":"B20-2013-730819","DOI":"10.1109\/WCNC.2009.4917521"},{"doi-asserted-by":"publisher","key":"B21-2013-730819","DOI":"10.1109\/18.910575"},{"volume-title":"Proceedings of the 34rd Annual IEEE Symposium on Foundations of Computer Science","author":"Luby M.","first-page":"271","key":"B22-2013-730819"},{"volume-title":"Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS '03)","author":"Maymounkov P.","first-page":"247","key":"B23-2013-730819"},{"volume-title":"Proceedings of the 6th International Workshop on Rare Event Simulation","author":"Hyyti\u00e4 E.","key":"B24-2013-730819"},{"volume-title":"Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03)","author":"Philip L.","first-page":"126","key":"B25-2013-730819"},{"doi-asserted-by":"publisher","key":"B27-2013-730819","DOI":"10.1145\/1236360.1236364"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/730819","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/730819","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/730819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T21:55:48Z","timestamp":1621202148000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/730819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,4,1]]}},"alternative-id":["10.1155\/2013\/730819"],"URL":"https:\/\/doi.org\/10.1155\/2013\/730819","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}