A routing layer based approach for energy efficient service discovery in mobile ad hoc networks

被引:7
|
作者
Ververidis, Christopher N. [1 ]
Polyzos, George C. [1 ]
机构
[1] Athens Univ Econ & Business, Dept Comp Sci, Mobile Multimedia Lab, Athens 11362, Greece
来源
关键词
service discovery; service advertisement; energy efficiency; service availability; Zone Routing Protocol; cross layer;
D O I
10.1002/wcm.618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Service discovery can be greatly enhanced in terms of efficiency, both regarding service discoverability and energy consumption, by piggybacking service information into routing messages. Thus, service discovery does not generate additional messages and a node requesting a service, in addition to discovering that service, it is simultaneously informed of the route to the service provider. We extended the Zone Routing Protocol in order to encapsulate service information in its routing messages. Our extended protocol, E-ZRP, may be seen as a representative of routing layer protocols providing service discovery functionality. Simulations demonstrate the superiority of this routing layer-based service discovery scheme over that of a similar, but application layer based service discovery scheme. In order to have a thorough evaluation of our approach we introduced a new metric, called Service Availability Duration (SAD), which characterizes the 'quality' of discovered services and experimentally examines the implications of network density and node mobility on the availability of services discovered with E-ZRP, as a typical representative of routing layer based service discovery protocols. Copyright (c) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:655 / 672
页数:18
相关论文
共 50 条
  • [31] Energy efficient routing with secure and adaptive trust threshold approach in mobile ad hoc networks
    M. Venkata Krishna Reddy
    P. V. S. Srinivas
    M. Chandra Mohan
    [J]. The Journal of Supercomputing, 2023, 79 : 13519 - 13544
  • [32] Service discovery in mobile ad-hoc networks: Better at the network layer?
    Garcia-Macias, JA
    Torres, DA
    [J]. 2005 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2005, : 452 - 457
  • [33] Optimization and routing discovery for Ad Hoc wireless networks: A cross layer approach
    Casaquite, Reizel
    Hwang, Won-Joo
    [J]. ADVANCES IN HYBRID INFORMATION TECHNOLOGY, 2007, 4413 : 647 - 658
  • [34] Routing-based and Location-aware Service Discovery in Mobile Ad-hoc Networks
    Schellenberg, Sebastian
    Saliminia, Amirhossein
    Krug, Silvia
    Seitz, Jochen
    Finke, Thomas
    Schroeder, Juergen
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2014), 2014, : 7 - 12
  • [35] MASD: Mobile agent based service discovery in ad hoc networks
    Nehra, Neeraj
    Patel, R. B.
    Bhat, V. K.
    [J]. HIGH PERFORMANCE COMPUTING - HIPC 2007, PROCEEDINGS, 2007, 4873 : 612 - +
  • [36] A Cluster Based Service Discovery Model for Mobile Ad hoc Networks
    Artail, Hassan
    Safa, Haidar
    Hamze, Hicham
    Mershad, Khaleel
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007, 2007,
  • [37] Gossip-based service discovery in mobile ad hoc networks
    Lee, Choonhwa
    Helal, Sumi
    Lee, Wonjun
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2006, E89B (09) : 2621 - 2624
  • [38] Proximity-based service discovery in mobile ad hoc networks
    Meier, R
    Cahill, V
    Nedos, A
    Clarke, S
    [J]. DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, 2005, 3543 : 115 - 129
  • [39] Scalable service discovery in mobile ad hoc networks
    Mohan, U
    Almeroth, KC
    Belding-Royer, EM
    [J]. NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 137 - 149
  • [40] Geographically secure routing for mobile ad hoc networks:: A cross-layer based approach
    Koenig, Andre
    Hollick, Matthias
    Steinmetz, Ralf
    [J]. LONG-TERM AND DYNAMICAL ASPECTS OF INFORMATION SECURITY: EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, 2007, : 45 - 59