{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T12:02:43Z","timestamp":1717761763576},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,4,19]],"date-time":"2012-04-19T00:00:00Z","timestamp":1334793600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2012,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Mobility of nodes is one of the main causes of broken links in wireless networks. Although several theoretical models for links and routes selection have been proposed in the literature, so far little effort has been made to apply them to the existing routing protocols. In this article, a decision tree has been incorporated in a reactive routing protocol in order to select the most long-lived routes. The decision tree is based on nodes' mobility parameters typically considered by the theoretical models, such as distance between nodes, relative speed, and nodes' directions. The flooding techniques used within the routing protocols for the routing discovery procedures cause a massive usage of control packets which in turn has negative impact on the performance of the networks. So, an improved flooding control is presented in this article that enhances the performance of the proposed route selection based on a decision tree, in turn reducing overheads and the power consumption caused by the control packets. These two proposed approaches have been implemented over a widely used reactive routing protocol such as Ad Hoc On-Demand Distance Vector (AODV) to obtain performance results using Network Simulator 2 simulation tool. The performances of the proposed approaches have been compared with that of the AODV implementation in terms of general performance and path duration. The simulation results show that the proposed route selection significantly improves the results of AODV.<\/jats:p>","DOI":"10.1186\/1687-1499-2012-147","type":"journal-article","created":{"date-parts":[[2012,4,19]],"date-time":"2012-04-19T10:16:23Z","timestamp":1334830583000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Route duration improvement in wireless sensor and actuator networks based on mobility parameters and flooding control"],"prefix":"10.1186","volume":"2012","author":[{"given":"Daniel G","family":"Reina","sequence":"first","affiliation":[]},{"given":"Sergio L","family":"Toral","sequence":"additional","affiliation":[]},{"given":"Princy","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Federico J","family":"Barrero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,19]]},"reference":[{"key":"314_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77690-1","volume-title":"Wireless Sensor and Actuator Networks","author":"R Verdone","year":"2008","unstructured":"Verdone R, Dardani D, Mazzini G, Conti A: Wireless Sensor and Actuator Networks. Elsevier; 2008."},{"issue":"12","key":"314_CR2","doi-asserted-by":"publisher","first-page":"4219","DOI":"10.1109\/TIE.2010.2043038","volume":"57","author":"C Jimming","year":"2010","unstructured":"Jimming C, Xianghui C, Peng C, Xiao Y, Youxian S: Distributed collaborative control for industrial automation with wireless sensor and actuator networks. IEEE Trans Ind Electron 2010, 57(12):4219-4230.","journal-title":"IEEE Trans Ind Electron"},{"issue":"8","key":"314_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2004.93","volume":"37","author":"D Culler","year":"2004","unstructured":"Culler D, Estrin D, Srivastava M: Overview of sensor networks. IEEE Comput 2004, 37(8):41-49.","journal-title":"IEEE Comput"},{"key":"314_CR4","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.adhoc.2003.09.010","volume":"3","author":"K Akkaya","year":"2003","unstructured":"Akkaya K, Younis M: A survey on routing protocols for wireless sensor networks. Ad Hoc Netw 2003, 3: 325-349.","journal-title":"Ad Hoc Netw"},{"key":"314_CR5","volume-title":"Unicast Routing Techniques for Mobile Ad Hoc Networks","author":"R Beraldi","year":"2003","unstructured":"Beraldi R, Baldoni R: Unicast Routing Techniques for Mobile Ad Hoc Networks. Edited by: Mohammad Llyas. The Handbook of Ad Hoc Networks Electrical Engineering Handbook Series; 2003."},{"key":"314_CR6","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1109\/DEST.2010.5610631","volume-title":"Paper presented at 4th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2010)","author":"S Mohseni","year":"2010","unstructured":"Mohseni S, Hassan R, Patel A, Razali R: Comparative review study of reactive and proactive routing protocols in MANETs. In Paper presented at 4th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2010). Dubai; 2010:304-309."},{"issue":"8","key":"314_CR7","doi-asserted-by":"publisher","first-page":"1890","DOI":"10.1016\/j.comcom.2007.02.015","volume":"30","author":"L Layuan","year":"2007","unstructured":"Layuan L, Chunlin L, Peian Y: Performance evaluation and simulations of routing protocols in ad hoc networks. Comput Commun 2007, 30(8):1890-1898.","journal-title":"Comput Commun"},{"issue":"7","key":"314_CR8","first-page":"261","volume":"9","author":"NSM Usop","year":"2009","unstructured":"Usop NSM, Abdullah A, Abidin AFA: Performance evaluation of AODV, DSDV & DSR routing protocol in grid environment. IJCSNS Int J Comput Sci Netw Secur 2009, 9(7):261-268.","journal-title":"IJCSNS Int J Comput Sci Netw Secur"},{"issue":"2","key":"314_CR9","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/COMST.2004.5342238","volume":"6","author":"C Maihofer","year":"2004","unstructured":"Maihofer C: A survey of geocast routing protocols. IEEE Commun Surv Tutor 2004, 6(2):32-42.","journal-title":"IEEE Commun Surv Tutor"},{"key":"314_CR10","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2005.1458287","volume":"54","author":"N Patwari","year":"2005","unstructured":"Patwari N, Ash JN, Kyperountas S, Hero AO III, Moses RL, Correal NS: Locating the nodes. Cooperative localization in wireless sensor networks. Signal Process Mag 2005, 54: 54-69.","journal-title":"Signal Process Mag"},{"key":"314_CR11","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1023\/A:1019106118419","volume":"6","author":"K Young-Bae","year":"2000","unstructured":"Young-Bae K, Nitin V: Location-aided routing (LAR) in mobile ad hoc networks. Wirel Netw 2000, 6: 307-321.","journal-title":"Wirel Netw"},{"key":"314_CR12","volume-title":"GPS-Based Reliable Routing Algorithms for Ad Hoc Networks","author":"S Young-Joo","year":"2003","unstructured":"Young-Joo S, Won-Ik K, Dong-Hee K: GPS-Based Reliable Routing Algorithms for Ad Hoc Networks. Edited by: Mohammad Llyas. The Handbook of Ad Hoc Networks Electrical Engineering Handbook Series; 2003."},{"key":"314_CR13","first-page":"1","volume-title":"Paper presented at 1st International Symposium on Wireless Pervasive Computing, Xinjiang","author":"C Ruay-Shiung","year":"2006","unstructured":"Ruay-Shiung C, Shing-Jiuan L: Long-lived path routing with received signal strength for ad hoc networks. Paper presented at 1st International Symposium on Wireless Pervasive Computing, Xinjiang 2006, 1-6."},{"issue":"3","key":"314_CR14","first-page":"969","volume":"6","author":"KM Mahesh","year":"2006","unstructured":"Mahesh KM, Das SR: Ad hoc on-demand multipath distance vector routing. Wirel Commun Mob Comput 2006, 6(3):969-988.","journal-title":"Wirel Commun Mob Comput"},{"key":"314_CR15","first-page":"1","volume-title":"Proceedings of the Fourth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom'98)","author":"J Broch","year":"1998","unstructured":"Broch J, Maltz DA, Johson DB, Hu Y, Jetcheva J: A performance comparison of multi-hop wireless ad hoc networks routing protocols. In Proceedings of the Fourth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom'98). New York; 1998:1-13."},{"issue":"2","key":"314_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/COMST.2007.382407","volume":"9","author":"L Hanzo","year":"2007","unstructured":"Hanzo L, Tafazolli R: A survey of QoS routing solutions for mobile ad hoc networks. IEEE Commun Surv Tutor 2007, 9(2):50-70.","journal-title":"IEEE Commun Surv Tutor"},{"key":"314_CR17","doi-asserted-by":"publisher","first-page":"293370","DOI":"10.1155\/2010\/239370","volume":"2010","author":"A Alshanyour","year":"2010","unstructured":"Alshanyour A, Baroundi U: A simulation study: the impact of random and realistic mobility models on the performance of Bypass-AODV in ad hoc wireless networks. EURASIP J Wirel Commun Netw 2010, 2010: 293370.","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"314_CR18","first-page":"3084","volume-title":"Paper presented at IEEE 58th Vehicular Technology Conference","author":"I Rubin","year":"2003","unstructured":"Rubin I, Liu C: Link stability models for QoS ad hoc routing algorithms. In Paper presented at IEEE 58th Vehicular Technology Conference. Volume 5. Florida; 2003:3084-3088."},{"key":"314_CR19","first-page":"350","volume-title":"Proceedings of IEEE Wireless Communications and Networking Conference (WCNC)","author":"R Shah","year":"2002","unstructured":"Shah R, Rabaey J: Energy aware routing for low energy ad hoc sensor networks. In Proceedings of IEEE Wireless Communications and Networking Conference (WCNC). Volume 1. Florida; 2002:350-355."},{"issue":"12","key":"314_CR20","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1109\/LCOMM.2003.821317","volume":"7","author":"S Krco","year":"2003","unstructured":"Krco S, Ducipnov M: Improved neighbor detection algorithm for AODV routing protocol. IEEE Commun Lett 2003, 7(12):584-586.","journal-title":"IEEE Commun Lett"},{"issue":"2","key":"314_CR21","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1049\/iet-com:20070206","volume":"2","author":"G Ferrari","year":"2008","unstructured":"Ferrari G, Malvassori SA, Tonguz OK: On physical-oriented routing with power control in ad hoc wireless networks. IET Commun 2008, 2(2):306-319.","journal-title":"IET Commun"},{"key":"314_CR22","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1002\/wcm.431","volume":"6","author":"T Nadeem","year":"2006","unstructured":"Nadeem T, Parthasarathy S: Mobility control for throughput maximization in ad hoc networks. Wirel Commun Mob Comput 2006, 6: 951-967.","journal-title":"Wirel Commun Mob Comput"},{"key":"314_CR23","doi-asserted-by":"publisher","first-page":"208524","DOI":"10.1155\/2009\/208524","volume":"2009","author":"T-C Tsai","year":"2009","unstructured":"Tsai T-C, Tsai S-T: A cross-layer design routing design for multi-interface wireless mesh networks. EURASIP J Wirel Commun Netw 2009, 2009: 208524.","journal-title":"EURASIP J Wirel Commun Netw"},{"issue":"8","key":"314_CR24","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1109\/LCOMM.2004.833841","volume":"8","author":"C Wei-Ho","year":"2004","unstructured":"Wei-Ho C: Probabilistic analysis of routes on mobile ad hoc networks. IEEE Commun Lett 2004, 8(8):506-508.","journal-title":"IEEE Commun Lett"},{"key":"314_CR25","first-page":"5","volume-title":"Paper presented at the 33rd Annual Conference of IEEE Industrial Electronics Society (IECON)","author":"J Lee","year":"2007","unstructured":"Lee J, Su Y, Shen C: A comparative study of wireless protocols: Bluetooth, UWB, Zigbee, and Wi-Fi. In Paper presented at the 33rd Annual Conference of IEEE Industrial Electronics Society (IECON). Taipei; 2007:5-8."},{"key":"314_CR26","first-page":"1","volume-title":"Proceeding of IEEE Workshop on Mobile Computing Systems and Applications (WMCSA)","author":"CE Perkins","year":"1999","unstructured":"Perkins CE, Royer EM: Ad-hoc on-demand distance vector routing. In Proceeding of IEEE Workshop on Mobile Computing Systems and Applications (WMCSA). New Orleans; 1999:1-11."},{"key":"314_CR27","first-page":"383","volume-title":"Paper presented at 10th International Conference on Telecommunications (ICT 2003)","author":"Y Dan","year":"2003","unstructured":"Dan Y, Hui L: Path availability in ad hoc networks. In Paper presented at 10th International Conference on Telecommunications (ICT 2003). Volume 1. Tahiti; 2003:383-387."},{"issue":"3","key":"314_CR28","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1007\/s11276-009-0166-1","volume":"16","author":"M Pascoe-Chalke","year":"2009","unstructured":"Pascoe-Chalke M, Gomez J, Rangel V, L\u00f3pez-Guerrero M: Route duration modelling for mobile ad hoc networks. Wirel Netw 2009, 16(3):743-757.","journal-title":"Wirel Netw"},{"issue":"7","key":"314_CR29","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1109\/JSAC.2004.829353","volume":"22","author":"F Bai","year":"2004","unstructured":"Bai F, Sadagopan N, Krisgnamachari B, Helmy A: Modeling path duration distributions in MANETs and their impact on reactive routing protocols. IEEE J Sel Areas Commun 2004, 22(7):1357-1373.","journal-title":"IEEE J Sel Areas Commun"},{"key":"314_CR30","first-page":"139","volume-title":"DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks","author":"DB Jonshon","year":"2001","unstructured":"Jonshon DB, Maltz DA, Broch J: DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. Edited by: Charles E. Perkins, Ad Hoc Networking Addison-Wesley; 2001:139-172."},{"key":"314_CR31","first-page":"25","volume-title":"Paper presented at Fourth International Conference on Systems and Networks Communications (ICSNC '09)","author":"Y Khamayseh","year":"2009","unstructured":"Khamayseh Y, Darwish OM, Wedian SA, MA-AODV: mobility aware routing protocols for mobile ad hoc networks. In Paper presented at Fourth International Conference on Systems and Networks Communications (ICSNC '09). Porto; 2009:25-29."},{"key":"314_CR32","first-page":"17","volume":"3","author":"B Ramachandran","year":"2008","unstructured":"Ramachandran B, Shanmugavel S: Impact of node density on cross layer design for reliable route discovery in mobile ad-hoc networks. Ubiquitous Comput Commun J 2008, 3: 17-23.","journal-title":"Ubiquitous Comput Commun J"},{"issue":"7","key":"314_CR33","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1049\/iet-com.2009.0141","volume":"4","author":"PL Yang","year":"2010","unstructured":"Yang PL, Qin GC, Wang H, Zhang L, Chen G: MOTOROLA, MObility, TOlerable ROute seLection algorithms in wireless networks. IET Commun 2010, 4(7):837-849.","journal-title":"IET Commun"},{"issue":"7","key":"314_CR34","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1049\/iet-com.2009.0138","volume":"4","author":"SK Dhueandher","year":"2004","unstructured":"Dhueandher SK, Misra S, Obaidar MS, Gupta M, Diwakar K, Gupta P: Efficient angular routing protocol for inter-vehicular communication in vehicular ad hoc networks. IET Commun 2004, 4(7):826-836.","journal-title":"IET Commun"},{"key":"314_CR35","first-page":"26","volume-title":"Paper presented at 40th Annual Conference on Information Sciences and Systems","author":"Y Han","year":"2006","unstructured":"Han Y, La RJ: Maximizing path durations in mobile ad hoc networks. In Paper presented at 40th Annual Conference on Information Sciences and Systems. Princenton; 2006:26-31."},{"issue":"5","key":"314_CR36","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/TNET.2007.896241","volume":"15","author":"Y Han","year":"2007","unstructured":"Han Y, La RJ: Distribution of path durations in mobile ad hoc networks and path selection. IEEE Trans Netw 2007, 15(5):993-1006.","journal-title":"IEEE Trans Netw"},{"issue":"2","key":"314_CR37","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/18.825799","volume":"46","author":"P Gupta","year":"2000","unstructured":"Gupta P, Kumar PR: The capacity of wireless networks. IEEE Transaction on Inf Theory 2000, 46(2):388-403.","journal-title":"IEEE Transaction on Inf Theory"},{"key":"314_CR38","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1145\/190809.190336","volume":"24","author":"CE Perkins","year":"1994","unstructured":"Perkins CE, Bhagwat P: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. Comput Commun 1994, 24: 234-244.","journal-title":"Comput Commun"},{"issue":"18","key":"314_CR39","doi-asserted-by":"publisher","first-page":"2185","DOI":"10.1016\/j.comcom.2010.09.006","volume":"33","author":"L Weng","year":"2010","unstructured":"Weng L, Yang J: A cross-layer design stability based routing mechanism for ultra wideband networks. Comput Commun 2010, 33(18):2185-2194.","journal-title":"Comput Commun"},{"issue":"4","key":"314_CR40","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1145\/581771.581775","volume":"49","author":"K Bhargavan","year":"2002","unstructured":"Bhargavan K, Obradovic D, Gutner CA: Formal verification of standards for distance vector routing protocols. J ACM 2002, 49(4):538-576.","journal-title":"J ACM"},{"key":"314_CR41","volume-title":"The ns Manual (formerly ns Notes and Documentation)","author":"K Fall","year":"2010","unstructured":"Fall K, Varadhan K: The ns Manual (formerly ns Notes and Documentation).2010. [http:\/\/www.isi.edu\/nsnam\/ns\/ns-documentation.html]"},{"issue":"5","key":"314_CR42","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T Camp","year":"2002","unstructured":"Camp T, Boleng J, Davies V: A survey of mobility models for ad hoc network research. Wirel Commun Mob Comput 2002, 2(5):483-502.","journal-title":"Wirel Commun Mob Comput"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-147.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2012-147\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-147.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T19:06:05Z","timestamp":1630523165000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2012-147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,19]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["314"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2012-147","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,19]]},"assertion":[{"value":"25 July 2011","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2012","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2012","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"147"}}