Ad Hoc Networks最新文献

筛选
英文 中文
REACT: Reinforcement learning and multi-objective optimization for task scheduling in ultra-dense edge networks
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-27 DOI: 10.1016/j.adhoc.2025.103834
Smithamol M.B. , Rajeswari Sridhar
{"title":"REACT: Reinforcement learning and multi-objective optimization for task scheduling in ultra-dense edge networks","authors":"Smithamol M.B. ,&nbsp;Rajeswari Sridhar","doi":"10.1016/j.adhoc.2025.103834","DOIUrl":"10.1016/j.adhoc.2025.103834","url":null,"abstract":"<div><div>This paper addresses the challenges of task scheduling and resource allocation in ultra-dense edge cloud (UDEC) networks, which integrate micro and macro base stations with diverse user equipment in 5G environments. To optimize system performance, we propose REACT, a novel two-level scheduling framework leveraging reinforcement learning (RL) for energy-efficient task scheduling. At the upper level, RL-based adaptive optimization replaces conventional power allocation techniques, dynamically minimizing transmission energy consumption under the Non-Orthogonal Multiple Access (NOMA) protocol. At the lower level, the joint task offloading and resource allocation problem is modeled as a multi-objective optimization challenge. This is solved using a hybrid approach combining meta-heuristic algorithms and Long Short-Term Memory (LSTM) predictive models, maximizing response rates and system throughput. Sensitivity analyses explore the effects of user density, channel quality, workload, and request size on performance. Comparative evaluations against state-of-the-art methods demonstrate the proposed framework’s superior efficiency in tackling dynamic scheduling challenges, achieving energy savings and enhancing user experience.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"174 ","pages":"Article 103834"},"PeriodicalIF":4.4,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143725258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero trust-based authentication for Inter-Satellite Links in NextGen Low Earth Orbit networks
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-26 DOI: 10.1016/j.adhoc.2025.103817
Kerry Anne Farrea , Zubair Baig , Robin Doss , Dongxi Liu
{"title":"Zero trust-based authentication for Inter-Satellite Links in NextGen Low Earth Orbit networks","authors":"Kerry Anne Farrea ,&nbsp;Zubair Baig ,&nbsp;Robin Doss ,&nbsp;Dongxi Liu","doi":"10.1016/j.adhoc.2025.103817","DOIUrl":"10.1016/j.adhoc.2025.103817","url":null,"abstract":"<div><div>Next Generation (NextGen) Low Earth Orbit satellite networks are rapidly expanding to support global communication and 6G technology transition. This growth exposes networks to new security challenges due to wide coverage in hostile areas and increased access points in space and on Earth. Traditional static authentication methods prove inadequate in this dynamic environment. We address these challenges by developing a Zero Trust Authentication Protocol for Inter-Satellite Link (ISL) communication. Our protocol implements a novel verification process that leverages orbital signals to authenticate ISLs. This approach ensures secure data access and transmission exclusively among verified satellites, mitigating threats from eavesdropping, signal spoofing, impersonation, and replay attacks. To optimize security and resource efficiency, we integrate Hyperelliptic Curve Cryptography (HECC) into our protocol. We validate our approach through MATLAB and Systems Tool Kit (STK) simulations, complemented by BAN Logic and Scyther analyses. Our findings demonstrate that our protocol enhances the security framework of NextGen LEO networks without compromising their performance or operational capabilities.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"174 ","pages":"Article 103817"},"PeriodicalIF":4.4,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143734789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Q-learning-based semi-fixed clustering routing algorithm in WSNs
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-26 DOI: 10.1016/j.adhoc.2025.103837
Zhang Zhaohui, Zhou Jiaqi, Li Jing
{"title":"Q-learning-based semi-fixed clustering routing algorithm in WSNs","authors":"Zhang Zhaohui,&nbsp;Zhou Jiaqi,&nbsp;Li Jing","doi":"10.1016/j.adhoc.2025.103837","DOIUrl":"10.1016/j.adhoc.2025.103837","url":null,"abstract":"<div><div>In recent years, cluster-based routing protocols have emerged as a core technology for Wireless Sensor Networks (WSNs), attracting significant attention from researchers. This paper introduces a novel semi-fixed clustering algorithm, SFC-QL-IACO, designed to maintain energy balance in WSNs. The algorithm employs semi-fixed clustering to redistribute cluster nodes for initial load balancing and utilizes Q-Learning and enhanced ant colony optimization to construct data transmission paths. Clusters are dynamically adjusted when the energy difference exceeds a specified threshold to ensure energy balance. A dynamic energy threshold is implemented to prevent network disruptions caused by the depletion of cluster head energy, with cluster head rotation occurring as needed. Simulation results show that SFC-QL-IACO outperforms existing algorithms in terms of energy consumption, load balancing, and network lifetime.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"174 ","pages":"Article 103837"},"PeriodicalIF":4.4,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143739841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint aerial base station placement and user association for aerial–terrestrial networks: A whale optimization approach
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-23 DOI: 10.1016/j.adhoc.2025.103836
Yong Hao Chin , Shengqi Jiang , Ying Loong Lee , Yee Kai Tee , Chen Chen , Muhammad Sheraz , Teong Chee Chuah , Yoong Choon Chang
{"title":"Joint aerial base station placement and user association for aerial–terrestrial networks: A whale optimization approach","authors":"Yong Hao Chin ,&nbsp;Shengqi Jiang ,&nbsp;Ying Loong Lee ,&nbsp;Yee Kai Tee ,&nbsp;Chen Chen ,&nbsp;Muhammad Sheraz ,&nbsp;Teong Chee Chuah ,&nbsp;Yoong Choon Chang","doi":"10.1016/j.adhoc.2025.103836","DOIUrl":"10.1016/j.adhoc.2025.103836","url":null,"abstract":"<div><div>Aerial–terrestrial networks have been envisaged as a key feature of sixth generation (6G) communications to resolve the capacity and coverage issues of the existing terrestrial ground base stations (GBSs) via unmanned aerial vehicle-mounted base stations (ABSs). However, with the introduction of ABSs into the mobile networks, load balancing among ABSs becomes more challenging, as it additionally requires careful placement of ABSs in the three-dimensional (3D) airspace for coverage provisioning. Also, user quality of service (QoS) requirements and interference between ABSs and GBSs require meticulous management during the user association process for effective load balancing. In this paper, we propose a new joint ABS placement and user association scheme based on a whale optimization algorithm (WOA) for throughput maximization and load balancing in aerial–terrestrial networks. Firstly, a multi-objective ABS placement and user association problem is formulated for an aerial–terrestrial network to jointly maximize an <span><math><mi>α</mi></math></span>-fairness-based load balancing utility function and the network throughput. Then, we develop a WOA algorithmic framework to solve the multi-objective problem, with each whale representing a candidate ABS placement solution, whose optimality is evaluated using a fitness function designed based on network throughput maximization and physical isolation constraints. Also, a QoS-aware greedy user association algorithm that maximizes the load balancing utility function is developed to facilitate the fitness evaluation of each whale. Simulation results show that the proposed scheme outperforms several state-of-the-art schemes in terms of Jain’s fairness index, probability of blocking and total throughput.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103836"},"PeriodicalIF":4.4,"publicationDate":"2025-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143680581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lyapunov optimization-based power control policy for time-critical applications in a hybrid cognitive radio IoT network
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-22 DOI: 10.1016/j.adhoc.2025.103833
Mohamed F. El-Sherif , Sherif I. Rabia , Ahmed H. Abd El-Malek , W.K. Zahra
{"title":"Lyapunov optimization-based power control policy for time-critical applications in a hybrid cognitive radio IoT network","authors":"Mohamed F. El-Sherif ,&nbsp;Sherif I. Rabia ,&nbsp;Ahmed H. Abd El-Malek ,&nbsp;W.K. Zahra","doi":"10.1016/j.adhoc.2025.103833","DOIUrl":"10.1016/j.adhoc.2025.103833","url":null,"abstract":"<div><div>Ensuring timely quality of service for critical data in internet of things (IoT) networks is vital, demanding adequate spectrum and energy resources. However, these networks face challenges such as spectrum leakage and the limited power capacity of IoT devices. Merging cognitive radio (CR) technology in these networks is a potential solution to mitigate the challenge of the insufficient frequency spectrum. In this paper, we consider a scenario of two secondary users (SUs) accessing a CR network with a single primary user (PU) within the interweave/underlay access scheme. The SUs have two heterogeneous traffic: status update packets and deadline-constrained packets, which are measured using the age of information (AoI) and the timely throughout metrics, respectively. To address the energy limitation issue, an adaptive power allocation strategy for the SUs’ transmissions is initially developed. Subsequently, we investigate the trade-off between power consumption for the secondary system and specific demands of each traffic type independently. A stochastic optimization problem is then constructed to minimize the weighted sum average power consumption of the secondary system while ensuring a maximum average AoI threshold and an average minimum timely throughput per frame requirement for the corresponding SUs. The Lyapunov optimization theory is employed to convert the formulated problem into an unconstrained Markov decision process (MDP) per frame. Moreover, we derive a formula for the outage probability of SUs’ transmissions, considering the presence of multiple primary receivers. Simulation results demonstrate how the total consumed power is affected by the variations in the key system parameters, such as the activity and transmission power of the PU. Furthermore, experimental simulations show that the proposed policy achieves significant enhancement over two baseline policies.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"174 ","pages":"Article 103833"},"PeriodicalIF":4.4,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143715417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open source user mobility and activity datasets: Taxonomy and applications
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-21 DOI: 10.1016/j.adhoc.2025.103835
Sinjoni Mukhopadhyay King , Faisal Nawab , Katia Obraczka
{"title":"Open source user mobility and activity datasets: Taxonomy and applications","authors":"Sinjoni Mukhopadhyay King ,&nbsp;Faisal Nawab ,&nbsp;Katia Obraczka","doi":"10.1016/j.adhoc.2025.103835","DOIUrl":"10.1016/j.adhoc.2025.103835","url":null,"abstract":"<div><div>The study of user mobility and activity (uMA) has numerous applications, including network resource planning, connected healthcare, localization, social media, and e-commerce. Current research in uMA heavily relies on open-source traces captured from pedestrian, vehicular, and application-based activities. These traces are rich in features and diverse, not only in the information they provide but also in their potential applications. However, this diversity presents two main challenges for researchers and practitioners who aim to utilize uMA datasets, classify existing datasets, or create new ones. Firstly, there is no readily available comprehensive classification of existing open-source uMA traces, making it typically labor-intensive and time-consuming to determine whether the identified datasets are suitable. Secondly, it is challenging to identify the key features and their specific use cases without conducting a detailed analysis of the traces.</div><div>This manuscript aims to address these challenges in three ways. First, we propose a taxonomy for classifying open-source mobility traces based on mobility mode, data source, collection technology, and application type. This taxonomy can be used to create tags for both existing and new datasets, making it easier to find problem-specific datasets compared to current search methods. Second, we demonstrate how existing datasets can be classified according to this taxonomy, providing examples of popular open-source uMA traces, along with information about their publishing source, licensing, and anonymization strategy. We also discuss how this taxonomy can guide the collection of new uMA datasets. Finally, we present three case studies using popular publicly available uMA datasets to illustrate how our taxonomy can be used to identify feature sets in the traces, helping to determine their applicability to specific use cases in networking, health, lifestyle, and location-based services.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103835"},"PeriodicalIF":4.4,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143680580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated network-computing resource allocation and optimized scheduling for cyber physical production system
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-20 DOI: 10.1016/j.adhoc.2025.103831
Xiaoqian Yu , Changqing Xia , Xi Jin , Chi Xu , Dong Li , Peng Zeng
{"title":"Integrated network-computing resource allocation and optimized scheduling for cyber physical production system","authors":"Xiaoqian Yu ,&nbsp;Changqing Xia ,&nbsp;Xi Jin ,&nbsp;Chi Xu ,&nbsp;Dong Li ,&nbsp;Peng Zeng","doi":"10.1016/j.adhoc.2025.103831","DOIUrl":"10.1016/j.adhoc.2025.103831","url":null,"abstract":"<div><div>Edge computing plays a crucial role in cyber physical production system (CPPS) by connecting the cloud, thereby enhancing system flexibility, intelligence, and agility. However, current scholarly work predominantly focuses on the tight binding of tasks and platforms to meet the real-time and deterministic requirements of CPPS, but does not fully utilize the flexibility and customization characteristics of CPPS. Therefore, there is an urgent need for intelligent and flexible task platform decoupling in the future to meet various quality of service (QoS) requirements such as flexibility, energy consumption and real-time performance, which also brings the challenge of meeting CPPS requirements. To address this issue, this work studies the decoupled flexible manufacturing dynamical scheduling problem with the aim of jointly optimizing real-time performance and energy consumption. Firstly, a multi-priority feedback queue is designed, which can dynamic adjust priority to ensure real-time performance of tasks. Subsequently, multi-objective optimization models are used to allocate network and computing resources for tasks, taking system latency and energy consumption into account as costs. To narrow the solution space and improve solving speed, a locally optimal resource allocation method is derived. Furthermore, scheduling algorithms for the end-side and edge-side are designed separately. On one hand, considering the energy sensitivity of edge devices, a lightweight scheduling algorithm called terminal double deep Q network (T-DDQN) has been proposed to quickly determine the optimal task execution location. On the other hand, a task offloading strategy named game theory edge device-level task offloading (GTETO) has been introduced to address the load imbalance issues at the edge caused by T-DDQN. Compared to existing algorithms, it can reduce system cost by up to 25.26%, and improve resource utilization of edge devices by 8.34–27.77%.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103831"},"PeriodicalIF":4.4,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143680579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-based Intelligent Vehicular Network: Blockchain perspective
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-20 DOI: 10.1016/j.adhoc.2025.103827
Tariq Ahamed Ahanger , Usman Tariq , Imdad Ullah
{"title":"UAV-based Intelligent Vehicular Network: Blockchain perspective","authors":"Tariq Ahamed Ahanger ,&nbsp;Usman Tariq ,&nbsp;Imdad Ullah","doi":"10.1016/j.adhoc.2025.103827","DOIUrl":"10.1016/j.adhoc.2025.103827","url":null,"abstract":"<div><div>The increasing number of cars worldwide has resulted in significant problems such as fatalities, pollution, and traffic congestion. Developing a smart automotive system that promotes safe driving is a viable solution. However, the current vehicle system faces challenges such as data dependability, security, and ease of deployment. The current study proposes an intelligent vehicular system that is safe, deployable, and of high quality enabled by Unmanned Aerial Vehicle (UAVs). Specifically, the use of UAVs in the communication sector makes the networks vulnerable to cyber-attacks, which can cause significant damage to the industry. Henceforth, a blockchain-assisted registering and verifying mechanism is proposed for UAVs, smart vehicles, and roadside units. The presented research focuses on the blockchain-inspired security technique and the optimized positioning of UAVs to enhance the network’s spectral efficacy. The study considers various communication-related criteria such as available bandwidth, the maximum number of connections a UAV can handle, and constraints when linking remote units to UAVs. The presented technique can be effectively incorporated into the existing vehicular network to provide secure and reliable communications. The performance of the presented technique is validated in experimental simulation in which enhanced results have been registered for statistical parameters.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103827"},"PeriodicalIF":4.4,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143680578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid and self-adaptive QoS and QoE-driven RAT selection strategy for IoT devices
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-18 DOI: 10.1016/j.adhoc.2025.103838
Tassadit Sadoun , Sarah Oubabas , Sabrina Mokrani , Rachida Aoudjit , Jaime Lloret
{"title":"A hybrid and self-adaptive QoS and QoE-driven RAT selection strategy for IoT devices","authors":"Tassadit Sadoun ,&nbsp;Sarah Oubabas ,&nbsp;Sabrina Mokrani ,&nbsp;Rachida Aoudjit ,&nbsp;Jaime Lloret","doi":"10.1016/j.adhoc.2025.103838","DOIUrl":"10.1016/j.adhoc.2025.103838","url":null,"abstract":"<div><div>In recent years, the Internet of Things (IoT) has witnessed an explosion, which enables new applications based on connecting numerous devices to the Internet. However, the increasing number of IoT devices utilizing various Radio Access Technologies (RATs), each with distinct communication requirements, presents significant challenges in ensuring reliable Quality of Service (QoS) in such a heterogeneous, multi-technology, multi-user, and multi-application environment. Therefore, for a proper RAT selection, this paper proposes a novel hybrid and adaptive approach based on Deep Reinforcement Learning (DRL) that combines QoS and Quality of Experience (QoE) factors. Unlike previous research, our approach integrates QoS parameters and an adaptive network trust factor that reflects the user's QoE based on reliable past device experiences, ultimately providing users with consistently better connectivity. Within our framework, an IoT device dynamically selects its RAT in a distributed manner based on service requirements and the trust score it assigns to RATs, reflecting its satisfaction with past RAT behavior. The proposed hybrid and adaptive RAT selection approach meets QoS requirements, for various applications at any time as indicated by simulations run using Network Simulator 3 (NS3). Compared to other methods, the energy consumption was reduced by 64.12%, network handovers were decreased by 37.73%, while the average packet delivery ratio was improved by 17.85%. This demonstrates the effectiveness of the proposed approach in optimizing both energy efficiency and network performance, ensuring a more reliable and sustainable system for IoT applications.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"174 ","pages":"Article 103838"},"PeriodicalIF":4.4,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143715418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICMH-CHR: An intra-cluster multi-hop based cluster head rotation protocol for wireless sensor networks
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-17 DOI: 10.1016/j.adhoc.2025.103829
Weibing Zeng , Zhendong Wang , Shuxin Yang , Daojing He , Sammy Chan
{"title":"ICMH-CHR: An intra-cluster multi-hop based cluster head rotation protocol for wireless sensor networks","authors":"Weibing Zeng ,&nbsp;Zhendong Wang ,&nbsp;Shuxin Yang ,&nbsp;Daojing He ,&nbsp;Sammy Chan","doi":"10.1016/j.adhoc.2025.103829","DOIUrl":"10.1016/j.adhoc.2025.103829","url":null,"abstract":"<div><div>In wireless sensor networks (WSN), clustered routing protocols usually require periodic re-clustering to balance the energy among nodes. Frequent clustering aggravates the energy consumed by the network into clusters and ignores whether the network needs to be re-clustered every round, cluster head (CH) rotation is proposed to counter this problem. In this paper, we propose an intra-cluster multi-hop based CH rotation (ICMH-CHR) protocol for WSN. This protocol sets two thresholds based on the average residual energy in the cluster. These thresholds are used to dynamically regulate the network re-clustering and CH rotation strategies, respectively, to reduce the number of network re-clustering and avoid the premature death of CH nodes. In addition, the intra-cluster multi-hop strategy is used to solve the problem of CHs moving away from the cluster center due to intra-cluster rotation. For inter-cluster communication, the CH selects the most energy-efficient relay node by measuring the distance to other CHs through RSSI. Simulation results show that the proposed ICMH-CHR effectively extends the network lifetime and performs well in load balancing compared to LEACH, EEUC, T-LEACH, EEHCCP, and EAUCA.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103829"},"PeriodicalIF":4.4,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143642154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信