Abstract
In WSN, nodes collect the information from the surrounding environment and transferring to base station. Multiple data transmission in a WSN causes the nodes near the base station to get congested. Here we propose to develop a congestion avoidance and mitigation technique. For that, we select routes based on the distance between sender and receiver, relative success rate (RSR) value of node and buffer occupancy of a node. Based on these three parameters, we define a utility function to be applied to each neighbor of a transmitter node. Hence the transmitter node chooses the highest U-valued node as its next hop node among its neighbors in packet forwarding. Thus we avoid congestion by choosing non-congested nodes as its next hop node and then we mitigate congestion based on RSR values.
Similar content being viewed by others
References
Jayakumari, R. B., & Senthilkumar, V. J. (2013). Priority based congestion detection and avoidance in wireless sensor networks. Journal of Computer Science, 9(3), 350–357.
Li, M., et al. (2013). A survey on topology control in wireless sensor networks: taxonomy, comparative study, and open issues. Proceedings of the IEEE, 101(12), 2538–2557.
Chilamkurti, N., et al. (2009). Cross-layer support for energy efficient routing in wireless sensor networks. Journal of Sensors.
Yao, Y., et al. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. MASS, 182–190.
Yao, Y., et al. (2012). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE/ACM Transactions on Networking, 23(3).
Khanafer, M., Guennoun, M., & Mouftah, H. T. (2010). Intrusion detection system for WSN-based intelligent transportation systems. In IEEE global telecommunications conference (pp. 1–6).
Han, K., et al. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7).
Sheng, Z., et al. (2013). A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, IEEE, 20(6), 91–98.
Xiao, Y., et al. (2012). Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Transactions on Mobile Computing, 11(10), 1538–1554.
Ghanavati, S., Abawajy, J., & Izadi, D. (2013). A fuzzy technique to control congestion in WSN. In International joint conference on neural networks (IJCNN) (pp. 1–5). ISSN: 2161-4393, August 2013.
Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.
Xiang, L., et al. (2011). Compressed data aggregation for energy efficient wireless sensor networks. SECON 46–54.
Sengupta, S., et al. (2012). An evolutionary multiobjective sleep-scheduling scheme for differentiated coverage in wireless sensor networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C, 42(6), 1093–1102.
Wei, G., et al. (2011). Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter. Computer Communications, 34(6), 793–802.
Chakravarthi, R., Gomathy, C., Sebastian, S. K., Pushparaj, K., & Mon, V. B. (2010). A survey on congestion control in wireless sensor networks. International Journal of Computer Science & Communication, 1(1), 161–164.
Liu, X.-Y., et al. (2015). CDC: Compressive data collection for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2188–2197. doi:10.1109/TPDS.2014.2345257.
Song, Y., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.
Liu, Y., et al. (2010). Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Communications, 4(7), 810–816.
Xu, X., et al. (2015). Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN), 11(3).
Visweswaraiya, U. S., & Gurumurthy, K. S. (2013). A novel dynamic data dissemination [D3] technique for congestion avoidance/control in high speed wireless multimedia sensor networks. In Fifth international conference on computational intelligence, modeling and simulation (pp. 351–356).
Bhuiyan, M., et al. (2015). Local area prediction-based mobile target tracking in wireless sensor networks. IEEE Transactions on Computers, 64(7), 1968–1982.
Busch, C., et al. (2012). Approximating congestion + dilation in networks via “Quality of Routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.
Li, P., et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.
Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.
Sun, H. (2010). An active congestion detection mechanism based on network tomography. In Proceedings of the 2nd IEEE international conference on information management and engineering (pp. 497–500). April 2010.
Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.
Liu, L., et al. (2015). Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.
Meng, T., et al. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers. doi:10.1109/TC.2015.2417543.
Lee, J.-H., & Jung, I.-B. (2010). Adaptive-compression based congestion control technique for wireless sensor networks. Sensors, 10, 2919–2945.
Zhou, L., et al. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.
Acampora, G., et al. (2010). Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(2), 8.
Zhou, J., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.
Fadlullah, Z., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.
Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.
Yan, Z., et al. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134.
Bhuiyan, M. M., Gondal, I., & Kamruzzaman, J. (2010). CAM: Congestion avoidance and mitigation in wireless sensor networks. In IEEE, 71st vehicular technology conference (pp. 1–5). ISSN: 1550-2252, May 2010.
Li, M., & Jing, Y. (2012). Feedback congestion control protocol for wireless sensor networks. In 24th Chinese control and decision conference (CCDC) (pp. 4217–4220). May 2012.
Network Simulator: http://www.isi.edu/nsnam/ns
Bhuiyan, M. M., Gondal, I., & Kamruzzaman, J. (2012). CODAR: Congestion and delay aware routing to detect time critical events in WSNs. In International conference on information networking (pp. 357–362). ISSN: 1976-7684, January 2011.
Misra, S., Tiwari, V., & Obaidat, M. S. (2009). LACAS: Learning automata- based congestion avoidance scheme for healthcare wireless sensor networks. IEEE Journal on Selected Areas in Communications, 27(4), 466–479.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ahmed, A.M., Paulus, R. Congestion detection technique for multipath routing and load balancing in WSN. Wireless Netw 23, 881–888 (2017). https://doi.org/10.1007/s11276-015-1151-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-015-1151-5