A Percolation based M2M Networking Architecture for Data Transmission and Routing |
Lu, Jihua
(School of Information and Electronics, Beijing Institute of Technology)
An, Jianping (School of Information and Electronics, Beijing Institute of Technology) Li, Xiangming (School of Information and Electronics, Beijing Institute of Technology) Yang, Jie (School of Information and Electronics, Beijing Institute of Technology) Yang, Lei (School of Information and Electronics, Beijing Institute of Technology) |
1 | Stephen M. Dye, "End-to-end M2M," 3rd Edition, Mind Commerce LLC, pp.222-224, Jan.2010. |
2 | I. Cha, Y. Shah and A. U. Schmidt, "Trust in M2M communication," IEEE Vehicle Technology Magazine., vol.4, no.3, pp.69-75, Sep.2009. |
3 | 3rd Generation Partnership Project (3GPP), "Study on facilitation of machine-to-machine communication in 3GPP systems," 3GPP Tech. Rep. 22.868, Mar.2007. |
4 | 3rd Generation Partnership Project (3GPP), "Feasibility study on remote managements of USIM application on M2M equipment," 3GPP Tech. Rep. 33.812, May.2007. |
5 | Bob Emmerson, "M2M: The Internet of 50 billion devices," Win-Win Magazine, pp.19-22, Jan.2010. |
6 | X. Li, J. Lu, J. Yang and J. An, "A novel routing and data transmission method for stub network of Internet of things based on percolation," IEEE Conference on Computer Communications Workshops on M2MCN, pp.201-205, Apr.2011. |
7 | T. Predojev, J. Alonso-Zarate and M. Dohler, "Energy-delay tradeoff analysis in embedded M2M networks with channel coding," IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, pp.2733-2738, Dec.2010,. |
8 | M. Martsola, T. Kiravuo and J.K.O. Lindqvist, "Machine to machine communication in cellular networks", IEEE International Conference on Mobile Technology, Applications and Systems, pp.1-6, Nov. 2005. |
9 | L. Popova, T. Herpel and W. Koch, "Improving downlink UMTS capacity by exploiting direct M2M data transfer," International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, pp.1-8, Apr.2007. |
10 | C.K.K Toh, "Ad Hoc mobile wireless networks: protocols and systems," Prentice Hall PTR Upper Saddle River, pp.324-326. |
11 | G. Jayakumar and G. Gopinath, "Ad Hoc mobile wireless networks routing protocols - A review," Journal of Computer Science, vol.3, No.8, Aug.2007, pp.574-582. DOI |
12 | M. Franceschetti, O. Dousse, D. Tse, and P. Thiran, "Closing the gap in the capacity of wireless networks via percolation theory," IEEE Transactions on Information Theory, vol.53, no.3, pp.1009-18, Mar.2007,. |
13 | A. Mei and J. Stefa, "SWIM: A simple model to generate small mobile worlds," in Proc. of IEEE Conference on Computer Communications Workshops, pp.2106-13. |
14 | C. Hu, X. Wang, Z. Yang, J. Zhang, Y. Xu and X. Gao, "A geometry study on the capacity of wireless networks via percolation," IEEE Transactions on Communications, 2010. |
15 | Chi-Kin Chau, Richard J. Gibbens and Robert E. Hancock, "Robust multipath routing in large wireless networks," in Proc. of IEEE Conference on Computer Communications Workshops, pp.271-275. |
16 | Bertossi, A.A. and Pinotti, C.M., "Skewed allocation of non-uniform data for broadcasting over multiple channels," 20th International Symposium on Parallel and Distributed Processing, 2006. |
17 | O. Bakun and G. Konjevod, "Adaptive decentralized routing in small-world networks," in Proc. of IEEE Conference on Computer Communications Workshops, pp.1-6, 2010. |
18 | I. Grønbaek and P.K. Biswas, "Ontology-based abstractions for M2M virtual nodes and topologies," International Conference on Ultra Modern Telecommunications & Workshops, pp.1-8, Oct.2009. |
19 | M. Ryu, S. Cha, J. Koh, etc. "Position-based routing Algorithm for improving reliability of Inter-vehicle communication," KSII Transactions on Internet and Information Systems (TIIS), vol.5, no.8, pp.1388-1402, Aug.2011. |
20 | S. Park, S. Yoo, and F. Qiu, "Route reutilization routing in mobile ad hoc networks," KSII Transactions on Internet and Information Systems (TIIS), vol.4, no.2, pp. 78-97, Apr.2010. |
21 | M. Luby, "LT codes," in Proc. of 43rd IEEE Symposium on Foundations of Computer Sciences, pp.271-280, Nov.2002 |
22 | A. Shokrollahi, "Raptor codes," IEEE Transactions on Information Theory, vol.52, no.6, pp.2551-2567, Jun.2006. |
23 | X. Li and T. Jiang. "Fountain codes over GF(q)," Wireless Communications and Mobile Computing, Sep.2011. |
24 | T.Jiang and X. Li. "Using fountain codes to control the Peak-to-Average power ratio of OFDM signals," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 3779-85, 2010. |