{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:42:57Z","timestamp":1740141777607,"version":"3.37.3"},"reference-count":31,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2015R1D1A1A01060117","GRRCSUWON2015-B2"],"award-info":[{"award-number":["NRF-2015R1D1A1A01060117","GRRCSUWON2015-B2"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"GRRC program of Gyeonggi Province","award":["NRF-2015R1D1A1A01060117","GRRCSUWON2015-B2"],"award-info":[{"award-number":["NRF-2015R1D1A1A01060117","GRRCSUWON2015-B2"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2016,5,1]]},"abstract":"<jats:p> Device-to-device (D2D) communications are expected to offload cellular networks and enhance public safety. In addition to the capability of direct communication between devices, the capability of delivering data over multihops in an ad hoc manner by autonomous decision of each device is highly desired to expand application areas of D2D communications. To address this issue, we propose a fast and energy efficient D2D multihop routing method using the geographic locations of nodes. To expedite data delivery while saving transmission powers of nodes, we devise the next hop selection method considering the congestion levels of potential next hops. In addition, we devise a detour scheme to move around a routing hole that is encountered when a node cannot find a neighbor that is closer to the destination of a packet than itself. We also propose management procedures so that each node acquires the locations of destinations and its neighboring nodes. Through extensive simulations, we validate the proposed method by comparing the performance of the proposed method with those of maximum progress method (MaxP), cost over progress method (CoP), and congestion-aware forwarder selection method (CAFS). Even though the number of hops obtained by the proposed method is larger than those obtained by MaxP and CAFS, our method is superior to them in terms of the probability of successfully delivering packets to destinations and total amount of energy consumption. We also show that our method can reduce end-to-end delay considerably compared with CoP. <\/jats:p>","DOI":"10.1155\/2016\/2148734","type":"journal-article","created":{"date-parts":[[2016,5,4]],"date-time":"2016-05-04T21:01:24Z","timestamp":1462395684000},"page":"2148734","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Fast and Energy Efficient Multihop D2D Routing Scheme"],"prefix":"10.1177","volume":"12","author":[{"given":"Jaesung","family":"Park","sequence":"first","affiliation":[{"name":"Department of Information Security, University of Suwon, San 2-2, Wau-ri, Bongdam-eup, Hwaseong-si, Gyeonggi-do 445-743, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2016,5,4]]},"reference":[{"key":"B4-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2015.2477363"},{"key":"B5-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807945"},{"key":"B7-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2012.0769"},{"key":"B8-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6845058"},{"key":"B9-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2014.2375934"},{"key":"B10-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2014.7063572"},{"key":"B11-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6807947"},{"key":"B12-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2014.6881202"},{"first-page":"212","volume-title":"Proceedings of the IEEE 3rd International Conference on Future Internet of Things and Cloud (FiCloud '15)","author":"Tata C.","key":"B13-2016-2148734"},{"key":"B14-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2015.2450223"},{"key":"B15-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2013.6574664"},{"first-page":"83","volume-title":"Proceedings of the 11th Advanced International Conference on Telecommunications (AICT '15)","author":"Marinho R. P.","key":"B16-2016-2148734"},{"key":"B17-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/camad.2013.6708122"},{"key":"B18-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/msn.2014.25"},{"key":"B19-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2014.6845046"},{"first-page":"65","volume-title":"Proceedings of the IEEE International Workshop on Internet of Things (IOT '13)","author":"Ren P.","key":"B20-2016-2148734"},{"key":"B21-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/tcom.1984.1096061"},{"key":"B22-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/49.779917"},{"key":"B23-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1080\/15501320500259159"},{"key":"B24-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/wowmom.2007.4351801"},{"key":"B25-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2052-0"},{"key":"B26-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/cecnet.2013.6703413"},{"key":"B27-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2015.2475428"},{"key":"B28-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/vtcspring.2015.7146085"},{"key":"B29-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2015.7249190"},{"key":"B30-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/wowmom.2012.6263714"},{"key":"B31-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/glocomw.2013.6825056"},{"key":"B32-2016-2148734","doi-asserted-by":"publisher","DOI":"10.1109\/pimrc.2014.7136312"},{"volume-title":"Proceedings of the IEEE International Conference on Networked Systems (NetSys '15)","author":"Ippisch A.","key":"B33-2016-2148734"},{"key":"B34-2016-2148734","doi-asserted-by":"publisher","DOI":"10.14257\/ijeic.2013.4.6.01"},{"key":"B35-2016-2148734","volume-title":"Wireless Communications Principles and Practice","author":"Rappaport T. S.","year":"2002","edition":"2"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2016\/2148734","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2016\/2148734","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2016\/2148734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T21:22:29Z","timestamp":1620249749000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2016\/2148734"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,1]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,5,1]]}},"alternative-id":["10.1155\/2016\/2148734"],"URL":"https:\/\/doi.org\/10.1155\/2016\/2148734","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2016,5,1]]}}}