Documente Academic
Documente Profesional
Documente Cultură
7, JULY 2009
Abstract—The unreachability problem (i.e., the so-called void problem) that exists in the greedy routing algorithms has been studied
for the wireless sensor networks. Some of the current research work cannot fully resolve the void problem, while there exist other
schemes that can guarantee the delivery of packets with the excessive consumption of control overheads. In this paper, a greedy anti-
void routing (GAR) protocol is proposed to solve the void problem with increased routing efficiency by exploiting the boundary finding
technique for the unit disk graph (UDG). The proposed rolling-ball UDG boundary traversal (RUT) is employed to completely guarantee
the delivery of packets from the source to the destination node under the UDG network. The boundary map (BM) and the indirect map
searching (IMS) scheme are proposed as efficient algorithms for the realization of the RUT technique. Moreover, the hop count
reduction (HCR) scheme is utilized as a short-cutting technique to reduce the routing hops by listening to the neighbor’s traffic, while
the intersection navigation (IN) mechanism is proposed to obtain the best rolling direction for boundary traversal with the adoption of
shortest path criterion. In order to maintain the network requirement of the proposed RUT scheme under the non-UDG networks, the
partial UDG construction (PUC) mechanism is proposed to transform the non-UDG into UDG setting for a portion of nodes that
facilitate boundary traversal. These three schemes are incorporated within the GAR protocol to further enhance the routing
performance with reduced communication overhead. The proofs of correctness for the GAR scheme are also given in this paper.
Comparing with the existing localized routing algorithms, the simulation results show that the proposed GAR-based protocols can
provide better routing efficiency.
Index Terms—Greedy routing, void problem, unit disk graph, localized algorithm, wireless sensor network.
1 INTRODUCTION
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.
912 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 7, JULY 2009
existing schemes, feasible routing performance with reduced guaranteed. Before diving into the detail formulation of the
communication overhead can be provided by the GAR-based proposed GAR algorithm, an introductory example is
algorithms within the non-UDG network environment. described in order to facilitate the understanding of the
The remainder of this paper is organized as follows: GAR protocol. As shown in Fig. 1, the data packets initiated
Section 2 formulates the problem of interest by the under- from the source node NS to the destination node ND will
lying network model. The proposed GAR protocol is arrive in NV based on the GF algorithm. The void problem
explained in Section 3, while Section 4 provides the occurs as NV receives the packets, which leads to the adoption
practical realization of the GAR algorithm. Section 5 of the RUT scheme as the forwarding strategy of the GAR
exploits the three enhanced mechanisms, including the protocol. A circle is formed by centering at sV with its radius
HCR, the IN, and the PUC mechanisms. The performance of being equal to half of the transmission range R=2. The circle is
the GAR-based protocols is evaluated and compared in hinged at NV and starts to conduct counterclockwise rolling
Section 6. Section 7 draws the conclusions. until an SN has been encountered by the boundary of the
circle, i.e., NA , as in Fig. 1. Consequently, the data packets in
NV will be forwarded to the encountered node NA .
2 PROBLEM FORMULATION Subsequently, a new equal-sized circle will be formed,
Considering a set of SNs N ¼ fNi j 8 ig within a two- which is centered at sA and hinged at node NA . The
dimensional (2D) euclidean plane, the locations of the counterclockwise rolling procedure will be proceeded in
set N, which can be acquired by their own positioning order to select the next hop node, i.e., NB in this case.
systems, are represented by the set P ¼ fPNi j PNi ¼ Similarly, same process will be performed by other inter-
ðxNi ; yNi Þ; 8 ig. It is assumed that all the SNs are homo- mediate nodes (such as NB and NX ) until the node NY is
geneous and equipped with omnidirectional antennas. The reached, which is considered to have a smaller distance to
set of closed disks defining the transmission ranges of N ND than that of NV to ND . The conventional GF scheme will
is denoted as D ¼ fDðPNi ; RÞ j 8 ig, where DðPNi ; RÞ ¼ be resumed at NY for delivering data packets to the
fx j kx PNi k R; 8 x 2 IR2 g. It is noted that PNi is the destination node ND . As a consequence, the resulting path
center of the closed disk with R denoted as the radius of by adopting the GAR protocol becomes fNS ; NV ; NA ;
NB ; NX ; NY ; NZ ; ND g. In the following sections, the formal
the transmission range for each Ni . Therefore, the network
description of the RUT scheme will be described in
model for the WSNs can be represented by a UDG as
Section 3.1, while the detail of the GAR algorithm is
GðP; EÞ with the edge set E ¼ fEij j Eij ¼ ðPNi ; PNj Þ; PNi 2
explained in Section 3.2. The proofs of correctness of the
DðPNj ; RÞ; 8 i 6¼ jg. The edge Eij indicates the unidirectional GAR protocol are given in Section 3.3.
link from PNi to PNj whenever the position PNi is within the
closed disk region DðPNj ; RÞ. Moreover, the one-hop 3.1 Proposed Rolling-Ball UDG Boundary Traversal
neighbor table for each Ni is defined as (RUT) Scheme
The RUT scheme is adopted to solve the boundary finding
TNi ¼ ½IDNk ; PNk j PNk 2 DðPNi ; RÞ; 8 k 6¼ i ; ð1Þ problem, and the combination of the GF and the RUT
where IDNk represents the designated identification num- scheme (i.e., the GAR protocol) can resolve the void
ber for Nk . In the GF algorithm, it is assumed that the source problem, leading to the guaranteed packet delivery. The
node NS is aware of the location of the destination node ND . definition of boundary and the problem statement are
If NS wants to transmit packets to ND , it will choose the described as follows:
next hop node from its TNS , which 1) has the shortest Definition 1 (boundary). If there exists a set B N such that
euclidean distance to ND among all the SNs in TNS and 2) is 1) the nodes in B form a simple unidirectional ring and 2) the
located closer to ND compared to the distance between NS nodes located on and inside the ring are disconnected with
and ND (e.g., NV , as in Fig. 1). The same procedure will be those outside of the ring, B is denoted as the boundary set and
performed by the intermediate nodes (such as NV ) until ND the unidirectional ring is called a boundary.
is reached. However, the GF algorithm will be inclined to Problem 2 (boundary finding problem). Given a UDG
fail due to the occurrences of voids even though some GðP; EÞ and the one-hop neighbor tables T ¼ fTNi j 8 Ni 2 Ng,
routing paths exist from NS to ND . The void problem is how can a boundary be obtained by exploiting the distributed
defined as follows:
computing techniques?
Problem 1 (void problem). The GF algorithm is exploited for
packet delivery from NS to ND . The void problem occurs while There are three phases within the RUT scheme, including
there exists a void node ðNV Þ in the network such that no the initialization, the boundary traversal, and the termina-
neighbor of NV is closer to the destination as tion phases.
fPNk j dðPNk ; PND Þ < dðPNV ; PND Þ; 8 PNk 2 TNV g ¼ ;; ð2Þ 3.1.1 Initialization Phase
where dðx; yÞ represents the euclidean distance between x No algorithm can be executed without the algorithm-
and y. TNV is the one-hop neighbor table of NV . specific trigger event. The trigger event within the RUT
scheme is called the starting point (SP). The RUT scheme
can be initialized from any SP, which is defined as follows:
3 PROPOSED GREEDY ANTI-VOID ROUTING (GAR)
Definition 2 (rolling ball). Given Ni 2 N, a rolling ball
PROTOCOL RBNi ðsi ; R=2Þ is defined by 1) a rolling circle hinged at PNi
The objective of the GAR protocol is to resolve the void with its center point at si 2 IR2 and the radius equal to R=2,
problem such that the packet delivery from NS to ND can be and 2) there does not exist any Nk 2 N located inside the rolling
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.
LIU AND FENG: GREEDY ROUTING WITH ANTI-VOID TRAVERSAL FOR WIRELESS SENSOR NETWORKS 913
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.
914 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 7, JULY 2009
edges Eij ¼ ðPNi ; PNj Þ for all Ni , Nj 2 U, where U N. 4.2 Implementation of RUT Scheme
Due to the one-to-one mapping between Sðsi ; sj Þ and 4.2.1 Problem Statement for Implementation
Eij , a simple unidirectional ring is constructed by Eij for As mentioned in Section 3.2, the GAR protocol changes its
all Ni , Nj 2 U. routing mode into the RUT scheme while the void problem
According to the RUT scheme, there does not exist occurs at NV . The boundary traversal phase is conducted by
any Ni 2 N within the area traversed by the rolling
assigning an SP (i.e., sV as shown in Fig. 1) associated with the
balls, i.e., inside the light blue region, as in Fig. 2. For all
rolling ball RBNV ðsV ; R=2Þ hinged at NV . While there is no
Np 2 N located inside the simple unidirectional ring, the
doubt regarding the description of boundary traversal, there
smallest distance from Np to Nq , which is located
can be considerable efforts required in order to realize the
outside of the ring, is greater than the SN’s transmission
range R. Therefore, there does not exist any Np 2 N continuous rolling ball mechanism. A brute-force method
inside the simple unidirectional ring that can commu- can be adopted as a potential solution by rotating the rolling
nicate with Nq 2 N located outside of the ring. Based on ball incrementally and verifying if a new SN has been
Definition 1, the set U is identical to the boundary set, encountered at each computing step. However, an infinite
i.e., U ¼ B. It completes the proof. u
t number of computational runs are required by adopting the
brute-force method, which is considered impractical for
Theorem 2. The void problem (Problem 1) in UDGs is solved by
realistic computing machines. Therefore, a feasible and
the GAR protocol with guaranteed packet delivery. efficient mechanism for the boundary traversal should be
Proof. With the existence of the void problem occurred at the obtained in order to overcome the computational limitation.
void node NV , the RUT scheme is utilized by initiating an
SP ðsV Þ with the rolling ball RBNV ðsV ; R=2Þ hinged at NV . 4.2.2 Concept of Boundary Map
The RUT scheme within the GAR protocol will conduct In order to resolve the implementation issue of the
boundary (i.e., the set B) traversal under the condition boundary traversal as mentioned above, a new parameter
that dðPNi ; PND Þ dðPNV ; PND Þ for all Ni 2 B. If the called BM (denoted as MNi for each Ni ) is introduced in this
boundary within the underlying network is completely section. Moreover, the BM MNi is mainly derived from the
traveled based on Theorem 1, it indicates that the SNs one-hop neighbor table TNi via the IMS method, as shown
inside the boundary (e.g., NV ) are not capable of in Algorithm 1. Instead of diving into the IMS algorithm,
communicating with those located outside of the bound- the functionality of MNi is first explained.
ary (e.g., ND ). The result shows that there does not exist a
route from the void node ðNV Þ to the destination node
ðND Þ, i.e., the existence of network partition. On the other
hand, if there exists a node NY such that dðPNY ; PND Þ <
dðPNV ; PND Þ (as shown in Fig. 1), the GF algorithm will be
adopted within the GAR protocol to conduct data delivery
toward the destination node ND . Therefore, the GAR
protocol solves the void problem with guaranteed packet
delivery, which completes the proof. u
t
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.
LIU AND FENG: GREEDY ROUTING WITH ANTI-VOID TRAVERSAL FOR WIRELESS SENSOR NETWORKS 915
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.
916 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 7, JULY 2009
TABLE 1
Notations for IMS Algorithm
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.
LIU AND FENG: GREEDY ROUTING WITH ANTI-VOID TRAVERSAL FOR WIRELESS SENSOR NETWORKS 917
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.
918 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 7, JULY 2009
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.
LIU AND FENG: GREEDY ROUTING WITH ANTI-VOID TRAVERSAL FOR WIRELESS SENSOR NETWORKS 919
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.
920 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 7, JULY 2009
Fig. 7. Evaluation of performance metrics versus the void height for random UDG networks. (a) Packet arrival rate (percent). (b) Average end-to-end
delay (ms). (c) Path efficiency. (d) Communication overhead (byte/sec). (e) Energy consumption (uJ).
owing to the negligence of the void problem, while the also noticed that even though the GAR-E scheme requires
GOAFR++(GG) scheme results in the largest delay value additional NAV_MAP control packets for achieving the IN
due to its bounding techniques [16], [21] that in general mechanism, the total required communication overhead
cause the back-and-forth forwarding attempts around the and energy consumption are smaller than those from the
large void block. The planar graph-based GPSR(GG) and GAR method due to its comparably smaller rerouting
GOAFR++(GG) schemes possess additional delay in number of HCs. Therefore, except for the reference GF
comparison with the proposed UDG-based GAR and scheme, it can be expected that the GAR-E algorithm
GAR-E protocols, owing to the required unnecessary possesses the lowest communication overhead and the
forwarding nodes, as illustrated in Fig. 1. With the energy consumption, which support the merits of the
adoption of both the HCR and IN mechanisms, the most protocol design.
feasible end-to-end delay performance can be observed
6.2 Simulation Results for Non-UDG Networks
from the proposed GAR-E protocol in comparison with
the other schemes. It is also noted that the end-to-end Fig. 8a shows the performance comparison for packet
delays from all the algorithms will be increased with the arrival rate versus the void height under the non-UDG
augmentation of the void height, which can be attributed network. With the adoption of the PUC mechanism,
to the enlarged number of forwarding hops for boundary 100 percent of packet arrival rate can be achieved by
traversal. Owing to the closely related characteristics with exploiting the proposed GAR-E protocol. Moreover, both
the end-to-end delay performance, the path efficiency the GPSR(CLDP) and GOAFR++(CLDP) schemes can also
obtained from these schemes follows similar trends, as attain the same delivery rate. Nevertheless, these CLDP-
can be observed in Fig. 7c. enabled schemes will introduce extremely high commu-
Figs. 7d and 7e illustrate the performance comparisons nication overhead, as illustrated in Fig. 8d. With the
for communication overhead and energy consumption augmentation of the void height, it is intuitive to observe
versus the void height. Except for the BOUNDHOLE that the packet arrival rate obtained from the remaining
scheme, the performance trends from all the other protocols algorithms will be decreased owing to the increasing
can be observed to be similar with those from the path severity of the void problem.
efficiency in Fig. 7c due to the elongated routing path. The performance comparisons for the average end-to-
Excessive communication overhead associated with more
end delay and the path efficiency are shown in Figs. 8b
energy consumption will be produced from the BOUND-
HOLE scheme comparing with the other algorithm, which and 8c. Owing to the guaranteed packet delivery rate, the
can be attributed to its usage of excessive header bytes for GPSR(CLDP) and GOAFR++(CLDP) schemes will result in
preventing the routing loops. It is noted that the decreasing larger delay and worse path efficiency compared to their
trend within the GF method is primarily due to its counterparts, i.e., the GPSR(GG) and GOAFR++(GG) pro-
relatively low packet delivery ratio, which results in less tocols. Other similar results can be found in Figs. 7b and 7c,
communication overhead and energy consumption. It is respectively. It is observed that the proposed GAR-E
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.
LIU AND FENG: GREEDY ROUTING WITH ANTI-VOID TRAVERSAL FOR WIRELESS SENSOR NETWORKS 921
Fig. 8. Evaluation of performance metrics versus the void height for random non-UDG networks. (a) Packet arrival rate (percent). (b) Average end-to-
end delay (ms). (c) Path efficiency. (d) Communication overhead (byte/sec). (e) Energy consumption (uJ).
scheme can still provide better routing efficiency comparing topology for the RUT scheme under the non-UDG
with other algorithms under the non-UDG networks. networks. All these enhanced mechanisms associated with
Figs. 8d and 8e present the performance comparisons for the GAR protocol are proposed as the enhanced GAR
the communication overhead and the energy consumption (GAR-E) algorithm that inherits the merit of guaranteed
versus the void height. It is especially noticed that delivery. The performance of both the GAR and GAR-E
extremely high-communication overheads are observed protocols is evaluated and compared with existing
within the GPSR(CLDP) and GOAFR++(CLDP) schemes localized routing algorithms via simulations. The simula-
in comparison with the other six protocols. The main reason tion study shows that the proposed GAR and GAR-E
is that according to the CLDP algorithm, all communication algorithms can guarantee the delivery of data packets
links will be probed and traversed via additional control under the UDG network, while the GAR-E scheme further
packets in order to fulfill the required tasks for planariza- improves the routing performance with reduced commu-
tion. Other similar results can be found in Figs. 7d and 7e, nication overhead under different network scenarios.
respectively. As can be expected, except for the GF scheme,
lowered communication overhead and energy consumption
are acquired by the GAR-based algorithms in comparison ACKNOWLEDGMENTS
with the other methods. The merits of the proposed GAR-E This work was in part funded by the MOE ATU Program
scheme can therefore be observed under the non-UDG 95W803C, NSC 96-2221-E-009-016, MOEA 96-EC-17-A-01-
networks. S1-048, the MediaTek research center at National Chiao
Tung University, and the Universal Scientific Industrial
7 CONCLUSION (USI), Taiwan.
In this paper, a UDG-based GAR protocol is proposed to
resolve the void problem incurred by the conventional GF REFERENCES
algorithm. The RUT scheme is adopted within the GAR [1] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, “Next
protocol to solve the boundary finding problem, which Century Challenges: Scalable Coordination in Sensor Networks,”
results in guaranteed delivery of data packets under the Proc. ACM MobiCom, pp. 263-270, Aug. 1999.
UDG networks. The BM and the IMS are also proposed to [2] G.G. Finn, “Routing and Addressing Problems in Large
Metropolitan-Scale Internetworks,” Technical Report ISI/RR-87-
conquer the computational problem of the rolling mechan- 180, Information Sciences Inst., Mar. 1987.
ism in the RUT scheme, forming the direct mappings [3] B. Karp and H.T. Kung, “GPSR: Greedy Perimeter Stateless
between the input/output nodes. The correctness of the Routing for Wireless Networks,” Proc. ACM MobiCom, pp. 243-
RUT scheme and the GAR algorithm is properly proven. 254, Aug. 2000.
[4] I. Stojmenovic and X. Lin, “Loop-Free Hybrid Single-Path/
The HCR and the IN mechanisms are proposed as the Flooding Routing Algorithms with Guaranteed Delivery for
delay-reducing schemes for the GAR algorithm, while the Wireless Networks,” IEEE Trans. Parallel and Distributed Systems,
PUC mechanism is utilized to generate the required vol. 12, no. 10, pp. 1023-1032, Oct. 2001.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.
922 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 7, JULY 2009
[5] R. Jain, A. Puri, and R. Sengupta, “Geographical Routing Using [29] V.C. Giruka and M. Singhal, “Hello Protocols for Ad-Hoc
Partial Information for Wireless Ad Hoc Networks,” IEEE Personal Networks: Overhead and Accuracy Tradeoffs,” Proc. IEEE Int’l
Comm. Magazine, vol. 8, no. 1, pp. 48-57, Feb. 2001. Symp. World of Wireless, Mobile and Multimedia Networks
[6] D. Chen and P.K. Varshney, “On-Demand Geographic Forward- (WoWMoM ’05), pp. 354-361, June 2005.
ing for Data Delivery in Wireless Sensor Networks,” Elsevier [30] E. Horowitz, S. Sahni, and D. Mehta, Fundamentals of Data
Computer Comm., vol. 30, no. 14-15, pp. 2954-2967, Oct. 2007. Structures in C++, second ed. Silicon Press, 2006.
[7] I. Stojmenovic, M. Russell, and B. Vukojevic, “Depth First [31] J. Heidemann, N. Bulusu, J. Elson, C. Intanagonwiwak, K. Lan,
Search and Location Based Localized Routing and QoS Y. Xu, W. Ye, D. Estrin, and R. Govindan, “Effects of Detail in
Routing in Wireless Networks,” Proc. IEEE Int’l Conf. Parallel Wireless Network Simulation,” Proc. SCS Multiconf. Distributed
Processing (ICPP ’00), pp. 173-180, Aug. 2000. Simulation, pp. 3-11, Jan. 2001.
[8] T. He, J.A. Stankovic, C. Lu, and T. Abdelzaher, “SPEED: A
Stateless Protocol for Real-Time Communication in Sensor Net- Wen-Jiunn Liu received the BS degree from
works,” Proc. Int’l Conf. Distributed Computing Systems (ICDCS ’03), National Chiao Tung University, Hsinchu, Tai-
pp. 46-55, May 2003. wan, ROC, in June 2005. Since September 2005,
[9] V.C. Giruka and M. Singhal, “Angular Routing Protocol for Mobile he has been a PhD candidate in the Department
Ad Hoc Networks,” Proc. IEEE Int’l Conf. Distributed Computing of Communication Engineering, National Chiao
Systems Workshops (ICDCSW ’05), pp. 551-557, June 2005. Tung University. His current research interests
[10] W.J. Liu and K.T. Feng, “Largest Forwarding Region Routing include the MAC and network protocol design for
Protocol for Mobile Ad Hoc Networks,” Proc. IEEE Global Comm. mobile ad hoc networks, wireless sensor net-
Conf. (GLOBECOM ’06), pp. 1-5, Nov. 2006. works, and broadband wireless networks. He is a
[11] L. Zou, M. Lu, and Z. Xiong, “A Distributed Algorithm for student member of the IEEE.
the Dead End Problem of Location Based Routing in Sensor
Networks,” IEEE Trans. Vehicular Technology, vol. 54, no. 4,
pp. 1509-1522, July 2005. Kai-Ten Feng received the BS degree from
[12] N. Arad and Y. Shavitt, “Minimizing Recovery State in National Taiwan University, Taipei, in 1992, the
Geographic Ad-Hoc Routing,” Proc. ACM MobiHoc ’06, MS degree from the University of Michigan, Ann
pp. 13-24, May 2006. Arbor, in 1996, and the PhD degree from the
University of California, Berkeley, in 2000. Since
[13] S. Chen, G. Fan, and J.H. Cui, “Avoid “Void” in Geographic
August 2007, he has been with the Department
Routing for Data Aggregation in Sensor Networks,” Int’l J. Ad Hoc
of Communication Engineering, National Chiao
and Ubiquitous Computing, vol. 1, no. 4, pp. 169-178, 2006.
Tung University, Hsinchu, Taiwan, as an associ-
[14] D.D. Couto and R. Morris, “Location Proxies and Intermediate
ate professor. He was an assistant professor
Node Forwarding for Practical Geographic Forwarding,” Techni-
with the same department between February
cal Report MIT-LCS-TR-824, MIT Laboratory for Computer
2003 and July 2007. He was with the OnStar Corp., a subsidiary of
Science, June 2001.
General Motors Corporation, as an in-vehicle development manager/
[15] J. Na, D. Soroker, and C.K. Kim, “Greedy Geographic Routing senior technologist between 2000 and 2003, working on the design of
Using Dynamic Potential Field for Wireless Ad Hoc Networks,” future Telematics platforms and the in-vehicle networks. His current
IEEE Comm. Letters, vol. 11, no. 3, pp. 243-245, Mar. 2007. research interests include cooperative and cognitive networks, mobile
[16] H. Frey and I. Stojmenovic, “On Delivery Guarantees of Face and ad hoc and sensor networks, embedded system design, wireless
Combined Greedy Face Routing in Ad Hoc and Sensor Net- location technologies, and Intelligent Transportation Systems (ITSs). He
works,” Proc. ACM MobiCom ’06, pp. 390-401, Sept. 2006. received the Best Paper Award from the IEEE Vehicular Technology
[17] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing with Conference Spring 2006, which ranked his paper first among the
Guaranteed Delivery in Ad Hoc Wireless Networks,” ACM/ 615 accepted papers. He is also the recipient of the Outstanding Young
Kluwer Wireless Networks, vol. 7, no. 6, pp. 609-616, Nov. 2001. Electrical Engineer Award in 2007 from the Chinese Institute of Electrical
[18] E. Kranakis, H. Singh, and J. Urrutia, “Compass Routing on Engineering (CIEE). He has served on the technical program
Geometric Networks,” Proc. Canadian Conf. Computational Geome- committees of VTC, ICC, and APWCS. He is a member of the IEEE.
try (CCCG ’99), pp. 51-54, Aug. 1999.
[19] F. Kuhn, R. Wattenhofer, and A. Zollinger, “Asymptotically
Optimal Geometric Mobile Ad-Hoc Routing,” Proc. Int’l Workshop
. For more information on this or any other computing topic,
Discrete Algorithms and Methods for Mobile Computing and Comm.
please visit our Digital Library at www.computer.org/publications/dlib.
(Dial-M ’02), pp. 24-33, Sept. 2002.
[20] F. Kuhn, R. Wattenhofer, and A. Zollinger, “Worst-Case Optimal
and Average-Case Efficient Geometric Ad-Hoc Routing,” Proc.
ACM MobiHoc ’03, pp. 267-278, June 2003.
[21] F. Kuhn, R. Wattenhofer, Y. Zhang, and A. Zollinger, “Geometric
Ad-Hoc Routing: Of Theory and Practice,” Proc. ACM Symp.
Principles of Distributed Computing (PODC ’03), pp. 63-72, July 2003.
[22] B. Leong, S. Mitra, and B. Liskov, “Path Vector Face Routing:
Geographic Routing with Local Face Information,” Proc. IEEE Int’l
Conf. Network Protocols (ICNP ’05), pp. 147-158, Nov. 2005.
[23] Q. Fang, J. Gao, and L. Guibas, “Locating and Bypassing
Routing Holes in Sensor Networks,” Proc. IEEE INFOCOM ’04,
pp. 2458-2468, Mar. 2004.
[24] D.B. West, Introduction to Graph Theory, second ed. Prentice Hall,
2000.
[25] K.R. Gabriel and R.R. Sokal, “A New Statistical Approach to
Geographic Variation Analysis,” Systematic Zoology, vol. 18, no. 3,
pp. 259-278, Sept. 1969.
[26] G.T. Toussaint, “The Relative Neighborhood Graph of a Finite
Planar Set,” Pattern Recognition, vol. 12, no. 4, pp. 261-268, 1980.
[27] Y.J. Kim, R. Govindan, B. Karp, and S. Shenker, “On the Pitfalls of
Geographic Face Routing,” Proc. ACM/SIGMOBILE Joint Workshop
Foundations of Mobile Computing (DIALM-POMC ’05), pp. 34-43,
Sept. 2005.
[28] S. Datta, I. Stojmenovic, and J. Wu, “Internal Node and Shortcut
Based Routing with Guaranteed Delivery in Wireless Networks,”
Kluwer Cluster Computing, vol. 5, no. 2, pp. 169-178, 2002.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on June 3, 2009 at 11:40 from IEEE Xplore. Restrictions apply.