{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:39Z","timestamp":1750306719568,"version":"3.41.0"},"reference-count":42,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T00:00:00Z","timestamp":1406505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Irish HEA PRTLI-IV NEMBES Grant"},{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2014,11,7]]},"abstract":"<jats:p>Opportunistic data collection in wireless sensor networks uses passing smartphones to collect data from sensor nodes, thus avoiding the cost of multiple static sink nodes. Based on the observed mobility patterns of smartphone users, sensor data should be preforwarded to the nodes that are visited more frequently with the aim of improving network throughput. In this article, we construct a formal network model and an associated theoretical optimization problem to maximize the throughput subject to energy constraints of sensor nodes. Since a centralized controller is not available in opportunistic data collection, data pre-forwarding (DPF) must operate as a distributed mechanism in which each node decides when and where to forward data based on local information. Hence, we develop a simple distributed DPF mechanism with two heuristic algorithms, implement this proposal in Contiki-OS, and evaluate it thoroughly. We demonstrate empirically, in simulations, that our approach is close to the optimal solution obtained by a centralized algorithm. We also demonstrate that this approach performs well in scenarios based on real mobility traces of smartphone users. Finally, we evaluate our proposal on a small laboratory testbed, demonstrating that the distributed DPF mechanism with heuristic algorithms performs as predicted by simulations, and thus that it is a viable technique for opportunistic data collection through smartphones.<\/jats:p>","DOI":"10.1145\/2629369","type":"journal-article","created":{"date-parts":[[2014,8,6]],"date-time":"2014-08-06T12:16:33Z","timestamp":1407327393000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Data Pre-Forwarding for Opportunistic Data Collection in Wireless Sensor Networks"],"prefix":"10.1145","volume":"11","author":[{"given":"Xiuchao","family":"Wu","sequence":"first","affiliation":[{"name":"University College Cork, Ireland"}]},{"given":"Kenneth N.","family":"Brown","sequence":"additional","affiliation":[{"name":"University College Cork, Ireland"}]},{"given":"Cormac J.","family":"Sreenan","sequence":"additional","affiliation":[{"name":"University College Cork, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2014,7,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.44"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190334"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182838"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1869997"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644040"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature06958"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2010.07.002"},{"volume-title":"Proceedings of the ACM International Conference on Pervasive Services (ICPS\u201910)","year":"2010","author":"Kiukkonen Niko","key":"e_1_2_1_10_1"},{"volume-title":"Proceedings of the 8th International Conference on Information Processing in Sensor Networks. IEEE","year":"2009","author":"Kusy Branislav","key":"e_1_2_1_11_1"},{"volume-title":"Proceedings of the Mobile Data Challenge Workshop (MDC) in Conjunction with the International Conference on Pervasive Computing.","year":"2012","author":"Laurila Juha K.","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935040"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.21"},{"volume-title":"Proceedings of the 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems. IEEE","year":"2009","author":"Liu Wang","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031501"},{"volume-title":"Retrieved","year":"2013","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791246"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Rajeev Motwani and Prabhakar Raghavan. 1995. Randomized Algorithms. Cambridge University Press.   Rajeev Motwani and Prabhakar Raghavan. 1995. Randomized Algorithms. Cambridge University Press.","DOI":"10.1017\/CBO9780511814075"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.10"},{"key":"e_1_2_1_21_1","unstructured":"Nordic Semiconductor. 2007. Nordic Semiconductor Figures for nRF24AP1. Nordic Semiconductor.  Nordic Semiconductor. 2007. Nordic Semiconductor Figures for nRF24AP1. Nordic Semiconductor."},{"volume-title":"Proceedings of the European Conference on Wireless Sensor Networks (Poster\/Demo Session).","year":"2007","author":"Osterlind Fredrik","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070960"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428679"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031508"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147744"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958513"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860037"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203354"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.109"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1602165.1602171"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460414"},{"volume-title":"Proceedings of the 30th IEEE International Conference on Computer Communications. IEEE","author":"Tang Lei","key":"e_1_2_1_34_1"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.182479"},{"volume-title":"Proceedings of Royal Irish Academy Research Colloquium on Wireless as an Enabling Technology.","author":"Truong Thuy T.","key":"e_1_2_1_36_1"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080829.1080858"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.23"},{"volume-title":"Proceedings of the 1st International Workshop on Cyber-Physical Networking Systems. IEEE","author":"Wu Xiuchao","key":"e_1_2_1_39_1"},{"volume-title":"Proceedings of the 9th International Conference on Networked Sensing Systems. 1--8.","author":"Wu Xiuchao","key":"e_1_2_1_40_1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.07.003"},{"volume-title":"Proceedings of the 2nd International ICST Conference on Mobile Lightweight Wireless Systems Workshops. 330--337","author":"Wu Xiuchao","key":"e_1_2_1_42_1"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2009.5336976"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2629369","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2629369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:30Z","timestamp":1750231170000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2629369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,28]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,11,7]]}},"alternative-id":["10.1145\/2629369"],"URL":"https:\/\/doi.org\/10.1145\/2629369","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2014,7,28]]},"assertion":[{"value":"2013-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}