Investigating the Energy Sink-Hole Problem in Connected k-covered Wireless Sensor Networks

Size: px
Start display at page:

Download "Investigating the Energy Sink-Hole Problem in Connected k-covered Wireless Sensor Networks"

Transcription

1 Investigating the Energy Sink-Hole Problem in Connected k-covered Wireless Sensor Networks Habib M. Ammari Wireless Sensor and Mobile Ad-hoc Networks (WiSeMAN) Research Lab Department of Computer and Information Science, University of Michigan-Dearborn, Dearborn, Michigan, USA Abstract: In immobile wireless sensor networks with constant data reporting, the sensors nearer the sink are responsible for forwarding data to it on behalf of all other sensors in the network. Those sensors suffer from a severe batter power depletion problem, also known as the energy sink-hole problem. In this paper, we study the above problem in duty-cycled connected k- covered wireless sensor networks, where each point in a field of interest is covered by at least k sensor. In order to change the neighbors of a sink over time, our solutions suggest the use of mobile proxy sinks that collect data from source sensors and drop them off at an immobile sink. Our proposed three-tier architecture has immobile source sensors, immobile sinks, and mobile proxy sinks. First, we present our fundamental results for the design of duty-cycled connected k- covered wireless sensor networks. Second, we provide the first formal analysis of the performance of joint mobility and routing in this type of network. Precisely, we investigate the best mobility strategy of mobile proxy sinks to minimize the total energy consumption for data collection. Third, we propose joint mobility and routing schemes based on the number of immobile sinks and mobile proxy sinks. We provide a thorough analytical model for our schemes. Finally, we evaluate their performance by simulation. Our results show their significant improvement of the network lifetime compared to a solution without mobile proxy sinks. Keywords: Wireless sensor networks, k-coverage, data collection, energy sink-hole problem, mobility. 1. INTRODUCTION A wireless sensor network (WSN) consists of tiny, low-powered sensors that communicate wirelessly with each other and report their data to the sink (i.e., central gathering point), for further analysis and processing. There are two fundamental concepts in the design of WSNs, namely coverage and connectivity. In fact, data collection and routing suggest that a deployment field be covered and that the network be connected [31]. However, some applications require k-coverage [13], [19], [22], where each point in a field is covered by at least k sensors while all those sensors are connected. This problem is referred to as connected k-coverage in WSNs. The challenge is to select a minimum subset of sensors to remain active in order to k-cover a field and ensure connectivity between all active sensors. In this type of duty-cycled WSN, connectivity is time-varying due to the fact that sensors may be on or off. Also, some sensors may deplete their energy and die. Thus, routing on duty-cycled sensors is challenging as those ones that are selected as next forwarders may not be on or have depleted all of their energy when data reached them. Sensors power depletion may have a serious problem that affects the network performance. In particular, this problem gets aggravated in the case of immobile WSNs when some specific sensors deplete their energy. Indeed, the sensors nearer the sink are very critical to this problem as they act as the points of contact between the sink and the rest of the sensors in the network. It is easy to check that the sensors around the sink severely suffer from a battery power depletion problem. Those sensors are responsible for forwarding data on behalf of all other sensors in the network to the immobile sink. Thus, the death of those sensors may yield a coverage hole around the immobile sink, which prohibits the data from reaching it. This phenomenon is known as the energy sink-hole problem. 1.1 Impact of the Energy Sink-Hole Problem It is well known that homogeneous WSNs using only immobile source sensors and immobile sinks suffer from the energy sink-hole problem [15], [20]. Given that k-covered WSNs are dense in nature, the energy sink-hole problem may have negative impact on those sensing applications that require k-coverage of their sensor deployment fields. Precisely, those applications will suffer from some or all of the following problems: The area surrounding the immobile sink may not be k-covered as those sensors near the sensors may have depleted their energy. Therefore, the level of k-coverage required by the sensing application may not be achieved in the whole field. The entire network may be split into at least two disconnected sub-nets. In particular, the immobile sink may be disconnected from the rest of the network. It is worth noting that connectivity to the sink is the true metric that should be considered when considering network connectivity in WSNs. In fact, if the sink is not reachable by the sensors, it is as if the network does not have any existence since no sensed data can reach the immobile sink. 1

2 1.2 Motivations and Problem Formulation In this paper, we attempt to solve the energy sink-hole problem in connected k-covered WSNs. Our study of this problem is motivated by the existence of a wide range of real-world sensing applications that deploy immobile sensors and sinks. It is necessary that this problem be addressed and energy-efficient solution be provided for the network operational effectiveness and lifetime elongation. We believe that the latter depend on two design decisions, namely whether the sensors are homogeneous or heterogeneous, and whether they are mobile or immobile. To solve the energy sink-hole problem, we deploy heterogeneous sensors that have different initial energy. This helps extend the network reliability and lifetime [18], [27]. Also, we use mobile sinks in order to achieve balanced load among all the sensors in the network. We expect that the joint use of sensor heterogeneity and sink mobility be able to efficiently address the problem of energy sink-hole in duty-cycled connected k-covered WSNs. In this paper, we propose to address the following three questions: (1) What would be the sensor deployment architecture and the nature of all participating components so as to avoid the energy sink-hole problem in dutycycled connected k-covered WSNs? (2) What would be the mobility trajectory of the sink to ensure uniform energy consumption of all the sensors and cope with the problem of energy sinkhole in duty-cycled connected k-covered WSNs? (3) How would data be collected from source sensors by mobile sinks and dropped off at the immobile sinks to minimize energy consumption? 1.3 Major Contributions Our contributions in this paper can be summarized as follows. We propose a three-tier architecture that forms the basis for addressing the energy sink-hole problem in duty-cycled connected k-covered WSNs. Precisely, it uses heterogeneous sensors that differ by their initial energy. The first layer has a set of immobile source sensors (i.e., data generating points) that have the same capabilities and are densely and randomly deployed to achieve k-coverage of a circular field. The second layer has one or more immobile sinks (i.e., central gathering points) that have infinite sources of energy. These sinks are positioned at specific locations in the circular field. The third layer contains one or multiple mobile sinks, called mobile proxy sinks. These sinks have the same capabilities, but are more powerful than the source sensors in terms of their initial energy. Their sole task is to collect data from source sensors and drop them off at the immobile sinks. We use our architecture for data collection using joint mobility and routing on top of energy-efficient connected k-coverage configurations. We propose four data collection schemes depending on the numbers of immobile sinks and mobile proxy sinks. First, we divide a circular field into concentric circular bands. Then, we determine the best mobility strategy of a mobile proxy sink so as to minimize the average total energy consumption of all the source sensors. Second, for each data collection scheme, we give the placement of immobile sinks and mobile proxy sinks, and show how the latter collect data from source sensors and deliver them to the former. Third, we provide a rigorous analysis of the performance of each scheme and corroborate it with simulation results. We show that our proposed schemes significantly improve the network lifetime compared to a solution without mobile proxy sinks. To the best of our knowledge, this is the first work that studies the energy sink-hole problem in duty-cycled connected k-covered WSNs and provides a thorough analysis of joint mobility and routing schemes to cope with it. The rest of this paper is organized as follows. Section 2 presents our network and energy models. Section 3 gives an overview of related work while Section 4 summarizes our fundamental results regarding the connected k-coverage problem in WSNs. Section 5 discusses the energy sink-hole problem, while Section 6 describes our three-tier architecture and discusses our proposed solutions to this problem in duty-cycled connected k-covered WSNs. Section 7 evaluates the performance of our joint mobility and routing schemes. Section 8 concludes the paper. 2. DEFINITIONS AND MODELS In this section, we give some definitions and specify our network and energy models to address the problem of energy sink-hole in connected k-covered WSNs. 2.1 Terminology Definition 1: A WSN is said to be homogeneous if it is composed of sensors that have the same sensing, processing, communication, and energy capabilities. Otherwise, it is said to be heterogeneous. Definition 2: A communication neighbor set of a sensor s i is the set of sensors located in the communication range of s i. Definition 3: The sensing neighbor set of a sensor s i consists of all sensors in the sensing range of s i. Definition 4: A point in a field of interest is k-covered if it is covered (sensed) by at least k sensors. A field of interest is k-covered if each point in it is k-covered. Definition 5: The width of closed convex area is the maximum of the distances between any pair of parallel lines that bound it. Definition 6: A mobile proxy sink is a mobile sensor that only collects data from source sensors and delivers it to an immobile sink when it comes close by. 2

3 2.2 Network Model We consider static WSNs with constant data reporting to the sink, where all the source sensors and sink are static. Moreover, all those source sensors are randomly and uniformly distributed in a circular field of diameter D. In addition, we assume that all the sensors and the sink are aware of their geographic locations via some localization technique [4]. Furthermore, all the source sensors are supposed to be homogeneous, i.e., have the same sensing range, communication range, and initial energy. Also, the sensing and communication ranges of a sensor s i are represented by disks of radii r and R, respectively. Besides, we consider a deterministic sensing model, where a point p in a field is covered by a sensor s i if,, where, stands for the Euclidean distance between p and s i. 2.3 Energy Model We assume that the energy consumption of the sensors is due to data reception, transmission, and mobility. According to [10], the energy spent in transmitting one message of size bits over a distance d, is given by = + = + where =50 10 is the electronics energy, is the transmitter amplifier =10 for =2, and =13 10 for 3, and is the path-loss exponent 2 4 [10]. Also, the energy spent in receiving one message is given by: = Hence, the total energy consumed when a sensor s i transmits a message over a distance d to s j, and s i receives it, is given by = +2 Following [23], the energy spent due to mobility, denoted by, is computed as = where is the energy cost for a mobile sensor to move one unit distance, and is the total distance traveled by the mobile sensor. We assume = RELATED WORK In this section, we review a sample approaches for connected coverage in WSNs. We also discuss existing work on the energy sink-hole problem in WSNs. 3.1 Connected k-coverage The problem of joint coverage and connectivity in WSNs was originally introduced by Xing et al. [25]. They proposed the first joint coverage and connectivity protocol in WSNs, called connected coverage protocol (CCP), to provide different degrees of full coverage of a convex region [25]. Yang et al. [26] formalized the k-connected coverage set problem in terms of linear programming and proposed a non-global solution to it. In [11], Huang et al. studied the relationship between coverage and connectivity of sensor nets and proposed distributed protocols to ensure both of them. Bai et al. [2] proposed an optimal deployment strategy to achieve coverage and 2-connectivity regardless of the relationship between sensing and communication radii of the sensors. Gupta et al. [9] proposed centralized and distributed algorithms for connected sensor cover so the WSN self-organizes its topology in response to a query and activate the necessary sensors to process the query. Zhang and Hou [29] proposed an optimal geographical density control protocol to keep a small number of sensors active regardless of the ratio of the sensors communication range to their sensing range. 3.2 Energy Sink-Hole Problem The energy sink-hole problem in WSNs has gained relatively less attention in the literature. It is worth noting that this problem was originally addressed by Guo et al. [8]. They proposed an energy-balanced transmission scheme that adjusts the ratio between direct transmission and next-hop transmission. Precisely, sensors far away from the sink send larger percent of data to the next hop, while sensors near the sink send more data directly to the sink. Zhang et al. [30] also exploited this combination of hop-by-hop transmission and direct transmission to find a trade-off between them. Efthymiou et al. [5] proposed a probabilistic data propagation algorithm for balancing energy consumption among all sensors. Powell et al. [21] used the probabilistic data propagation algorithm in [5] and proved that there is a relationship between energy balancing and lifespan maximization [12]. Leone et al. [14] considered non-uniform sensor distribution and proposed a blind algorithm that computes a solution to the energy-balancing problem on-line without prior knowledge on the occurrences of the events. Li and Mohapatra [15] proposed an analytical model and investigated the effectiveness of a few approaches for mitigating the energy hole problem. Olariu and Stojmenovic [20] proved that energy-efficient routing can be guaranteed when the coronas of a circular field have the same width, but this leads to uneven energy depletion of sensors. To cope with this, they computed the widths of coronas and their number. They also proved that uneven energy depletion is unavoidable for the free space model but can be prevented for the multi-path model. Lian et al. [16] showed that up to 90% of the total initial energy is unused due to the static WSN model with uniformly distributed homogenous sensors and a stationary sink. Wu et al. considered a non-uniform node distribution to achieve balanced energy depletion [24]. Luo and Hubaux [17] proposed a data collection protocol for WSNs that makes use of multi-hop routing and base station mobility to solve the energy-sink-hole problem. 3

4 4. CONNECTED k-coverage In our study of the energy sink-hole problem in dutycycled connected k-covered WSNs, we exploit previous results on connected k-coverage in WSNs and a randomized distributed protocol [1], which are based on Helly s Theorem [3] a fundamental result of the theory of convexity. In this section, we give a brief summary of these results and distributed protocol. 4.1 Fundamental Results Helly s Theorem [3]: Let E be a family of convex sets in R n such that for m n+1 any m members of E have a non-empty intersection. Then, the intersection of all members of E is non-empty. Lemma 1 [1] is an instance of Helly s Theorem [3] in a two-dimensional space that characterizes the intersection of k sensing disks, with n = 2 and k = m. Lemma 1 [1]: Let k 3. The intersection of k sensing disks is not empty if and only if the intersection of any three of those k sensing disks is not empty. Based on Lemma 1, Lemma 2 [1] gives a sufficient condition for k-coverage of a field. Lemma 2 [1]: Let k 3. A field is k-covered if any Reuleaux triangle of width r (or slice as shown in Figure 1) in the field contains at least k active sensors, where r is the radius of the sensors sensing disks. Theorem 1 [1]: Let k 3. The sensor spatial density that guarantees k-coverage of a field is given by 6,= with r being the radius of the sensors sensing disks. 4.2 Distributed k-coverage Protocol Each sensor s i runs a k-coverage checking algorithm [1] to check whether its sensing disk is k-covered. Precisely, s i divides its sensing disk into six overlapping slices as shown in Figure 3 such that two adjacent slices intersect in a lens. For each slice, s i computes its coverage degree. To this end, s i checks whether the number of active sensors in each lens of two adjacent slices, including itself, is equal to k. Based on this result, s i activates a necessary number of its sensing neighbors to k-cover its sensing disk. For more details about this distributed randomized connected k-coverage protocols, the interested reader is referred to [1]. Figure 5 Figure 6: Plot of Figure 1 [1] Figure 2 [1] Figure 3 [1] Figure 4 [1] Figure 2 shows a slicing grid while Figure 3 shows that the sensing disk of a sensor can be covered by six overlapping slices of width r. Thus, the minimum overlap area of two adjacent slices forms a lens as shown in Figure 4. Lemma 3 characterizes k-coverage. Lemma 3 [1]: k active sensors located in the lens of two adjacent slices can k-cover both slices. Theorem 1 [1] computes the sensor spatial density needed for k-coverage of a field based on Lemma ENERGY SINK HOLE PROBLEM In this section, we study the basic architecture that has only one immobile sink, zero mobile proxy sink, and densely deployed source sensors to k-cover the field. As stated earlier, this architecture suffers from the energy sink-hole problem. We assume that the source sensors report their data constantly to the sink using a short-path routing protocol [7]. We will show that the source sensors around the sink consume higher energy compared to all other source sensors in the network. In order to compute the maximum average energy consumption of the source sensors, we use a model that is similar to the one in [6]. Precisely, the average energy consumption of a node located in an area of size that forwards traffic for other nodes located in another area of size is proportional to + /. We focus on the source sensors within a distance from the sink, where stands for the radius of the communication range of the source sensors and is an infinitesimal value, as shown in Figure 5. More specifically, we consider a circle of radius around the immobile sink. It is clear that includes the source sensors that are actively forwarders data on behalf of all other source sensors to. The 4

5 number of source sensors inside is, while that of source sensors outside is, where is the radius of the circular deployment field and is the sensor spatial density to k-cover the field. Let be the radius of an infinitesimal circular region A whose area is =, where 0 and 0 2. The average distance between a source sensor in and the immobile sink is computed as follows: = 1 = 1 = 2 3 The energy consumption per source sensor in is given by =, +, where, is the average energy consumption per source sensor in C σ to directly send its data to the immobile sink, and, is the average energy consumption per source sensor in to forward a subset of data packets originated from source sensors in = to the sink. Using the energy model in Section 2, we obtain, = 1 = , = Thus, the energy consumption per source sensor using the base protocol is given by = Figure 6 shows that increases significantly as we approach the center of the sensor field (i.e., location of the sink). It is clear that all sensed data will be forwarded by sensors whose distance from the sink is at most equal to R = 300m. 6. JOINT MOBILITY AND ROUTING In this section, we propose four different approaches for data collection to address the problem of energy sink-hole problem in connected k-covered WSNs. We assume that there is at least one immobile sink, where the collected data is stored. Also, we suppose that any immobile sink has an infinite source of energy [27]. Specifically, these approaches are based on the number of immobile sinks and that of mobile proxy sinks. First, we give a decomposition of a deployment field. Then, we investigate the optimum mobility of a mobile proxy sink to minimize the average total energy consumption of the source sensors. Finally, we discuss each of our data collection approaches in details and compute their average total energy consumption. 6.1 Sensor Field Deployment Decomposition We divide a circular field of interest of diameter D into n concentric circular bands of width R as shown in Figure 7, where n = D/R with R being the radius of the sensors communication range. Our proposed data collection schemes are based on this decomposition. Particularly, the placement of the immobile sinks and the mobility of mobile proxy as well as their numbers sinks depend on this deployment field decomposition. Figure 7 Figure Optimum Proxy Sink Mobility Trajectory To ensure energy-efficient data collection, we need to specify the mobility trajectory of the mobile proxy sink and how data is being collected from source sensors. The mobile proxy sink will have circular trajectories interrupted by short linear moves. First, we determine the optimum mobility trajectory of the mobile proxy sink that yields the minimum energy consumption when collecting data. Theorem 2 states this result under the energy model specified in Section 2.3. Theorem 2: Let = 1. The optimum proxy sink mobility trajectory inside a band b i of width that yields the minimum energy consumption during data collection, corresponds to a circle of radius given by = Proof: Consider Figure 8. Assume that a mobile proxy sink mps 1 moves inside band b i on the perimeter of a circle of radius + denoted by,+, where 0. We distinguish two groups of source sensors in band b i. The first group is in band b i,1 of interior and exterior radii and +, respectively. The second group belongs to band b i,2 of interior and exterior radii + and +, respectively. That is, band b i is split into bands b i,1 and b i,2. Let N 1 and N 2 be the numbers of source sensors in bands b i,1 and b i,2, respectively. Based on spatial sensor density stated in Theorem 1 above to ensure k-coverage of a field,, and, can be computed as follows:, =, =+, =, =+ + where, and, stand for the areas of bands b i,1 and b i,2, respectively, and = 1. 5

6 To minimize the average energy consumption due to data transmission and reception, it is necessary that both subsets of sensors in bands b i,1 and b i,2 consume the same amount of energy. Given that the energy consumption depends on the number of source sensors transmitting their data, a balanced energy consumption between bands b i,1 and b i,2 is achieved when, =,. Hence, we have the equality: + =+ + Thus, the optimum value of, denoted by, which yields the minimum total energy consumption by all source sensors in both bands b i,1 and b i,2, is given by = Thus, the radius =+ of the mobility circle, of mobile proxy sink mps 1 is given by =+ = Table 1: Values of depend on Figure 9: vs. b i Notice that depends on the band being visited by mps 1. As increases, b i,1 and b i,2 tend to have the same area, and, thus, the same number of source sensors. tends to decrease and reach a value close to. Table 1 gives the values of for a few bands, while Figure 9 plots as a function of band b i Immobile Sink 1 Mobile Proxy Sink There are various scenarios for a mobile proxy sink to collect data. Next, we discuss two specific ones. Figure 10 Figure 11 Scenario 1 (Single band-based data collection): In this scenario, the mobile proxy sink mps 1 moves inside each band to gather data from the sensors located inside that band. More precisely, mps 1 starts its movement at one location l s in band b i, moves on the perimeter of a circle of radius + inside b i, and returns to l s. Once mps 1 revisits l s, it goes to the next band by moving through a linear trajectory (see Figure 10). We assume that mps 1 moves at a constant speed between 0 and v max, and stops at some locations to collect data. The mobile proxy sink mps 1 follows the same trajectory pattern until it visits all bands b 1,, b n and collects data from their respective source sensors. Let us compute the average transmission distance used by all the source sensors. As shown in Figure 11, each source sensor s i sends its data to the mobile proxy sink mps 1 only when the segment connecting the respective locations of s i and mps 1, say and, is orthogonal to the tangential passing by located at the perimeter of the mobility circle,+. In fact, this scenario corresponds to the minimum transmission distance s i can use to minimize its energy consumption when sending its data. While source sensors in b i,1 transmit their data to mps 1 over distances ranging between 0 and, those in b i,2 send their data to mps 1 over distances ranging between 0 and. Lemma 2 computes the average distance between source sensors in band b i,1 and mps 1. Lemma 2: The average Euclidean distance,,,, between a source sensor in band b i,1 whose width is, and the mobile proxy sink mps 1 is computed as,, = 1 3 Figure 12 6

7 Proof: Consider band b i,1 whose width is equal to. If we unfold b i,1, we get a diagram that can be modeled by the segment 0,, where each source sensor is located at position 0, whereas mps 1 is positioned at location =0, with, as shown in Figure 12. All the locations of the source sensors form a uniform distribution. We pick a source sensor s i randomly located at =0,. The average Euclidean distance between and is given by,,,, =,,,, = = 1 2 Given that =0,, =0,, and, we deduce that =. Thus, we have,, = = 1 6 We conclude that,,, =. Corollary 1 states the average distance between a source sensor s i in band b i,2 and mps 1, using Lemma 1. Corollary 1: The average Euclidean distance,,,, between a source sensor in band b i,2 whose width is, and the mobile proxy sink mps 1 is given by,, = Let,, be the average energy consumption that is due to the transmission of data by all the source sensors located inside band b i,1 and its reception by the mobile proxy sink mps 1. Knowing the number of source sensors in band b i,1 and the average distance,,, the energy,, is given by,, =,, = +,, +2 = Likewise, we denote by,, the average energy consumption, which results from the transmission of data by all the source sensors located inside band b i,2 and its reception by the mobile sink mps 1. Based on the number of source sensors in band b i,2 and the average distance,,, the energy,, is computed as follows:,, =,, = + +,, +2 = Thus, the total average energy consumption,,, due to data transmission by all source sensors located inside band b i and its reception by mps 1, is given by:, =,, +,, Now, the energy spent by mps 1 when moving on the circle,+ located inside band b i is given by,, = 2+ Also, the energy spent by mps 1 to move up to the next band b i+1 using a rectilinear trajectory of length R is,, = Moreover, after collecting all data from all sources sensors in all bands, mps 1 should deliver it to the static sink located in band b1 at the center of the field. Let,, be the energy consumed by mps 1 to move from band b n to band b 1, where it drops off all collected data to the sink. As It is clear that mps 1 has to traverse n 1 bands (b n-1,,b 1 ), each of which has width equal to R. The distance that mps 1 has to travel while in band b n is equal to. Hence, we have,, = 1+ The total energy consumption is due to the mobility of mps 1 and data transmission by source sensors in band b i to mps 1, and its reception by mps 1. Thus, the total average energy consumption,, per round of data collection from all n bands b 1,,b n, is given by =,, + +, +,,,, Scenario 2 (Adjacent bands-based data collection): We assume that mps 1 moves on the perimeters of the bands. During its mobility on the perimeter of band b i, mps 1 collects data from the source sensors located in the two adjacent bands b i and b i+1. Then, it takes a linear trajectory to move up to band b i+2 in order to collect data from source sensors in bands b i+2 and b i+3. As can be seen, in every round of movement for data collection, mps 1 gathers data from a new pair of adjacent bands. The mobile proxy sink mps 1 repeats the same movement strategy until it collect data from source sensors in all bands b 1,,b n. Corollary 2: The average Euclidean distance,, between a source sensor located in band b i whose width is and the mobile proxy sink mps 1 moving on the outer circle of band b i is computed as follows: = 7

8 Let us compute the total energy consumption due to data collection from the source sensors in all bands b 1,,b n as well as the proxy sink mobility. We distinguish two cases depending on whether the number of bands n is odd or even. Case 1: n is even (n = 2m) The mobile proxy sink mps 1 collects data from a pair of adjacent bands. Let, be the average energy consumption for data collection from all the source sensors located in band b i. We have:, = Thus, the total average energy consumption,, which is due to the transmission of data by the source sensors located in all bands b 1,, b n and its reception by mps 1, is given by: =, = = where = =+. Now, the mobile proxy sink mps 1 moves on the outer circles of the bands b 1, b 3, b 5,,b 2m-1. That is, mps 1 moves on the circles,2 1, where = 1,2,3,...,. Thus, the energy spent by mps 1 during its mobility on the circle,2 1is given by,, = 22 1 On the other hand, mps 1 should move until band b n-1 to collect data from both bands b n-1 and b n. Thus, the energy consumed by mps 1 to move from b 1 to b n-1, denoted by,,, is given by,, = 2 1= 1 Let,, be the energy consumed by mps 1 to move from band b n-1 to band b 1, where it drops off all collected data to the sink. It is clear that mps 1 has to traverse n 1 bands (b n-1,,b 1 ), each of which has width equal to R. Thus,,, is given by,, = 1 Thus, the total energy spent per round of data collection, denoted by, is given by =,, +,, +, +,, Case 2: n is odd (n = 2m + 1) Now, the mobile proxy sink mps 1 collects data from a pair of adjacent bands during each move. However, in the last move, mps1 collects data from only one band, i.e., b n. Thus, the total average energy consumption,, which is due to the transmission of data by all source sensors located inside all bands b 1,, b n and its reception by the mobile sink mps 1, is given by: =, = = Now, mps 1 moves on the outer circles of the bands b 1, b 3, b 5,,b 2m-1. That is, mps 1 moves on the circles,2 1, where =1,2,3,...,. Thus, the energy spent by mps 1 during its mobility on the circle,2 1 is given by,, = 22 1 Notice that mps 1 should move until band b n to collect data from this band only. Thus, the energy consumed by mps 1 to move from band b 1 to band b n, denoted by,,, is given by,, = 2+1= Let,, be the energy consumed by mps 1 to move from band b n-1 to band b 1, where it drops off all collected data to the sink. It is clear that mps 1 has to traverse bands (b n,,b 1 ), each of which has width equal to R. Thus, we have,, = Therefore, the total energy spent for data collection, denoted by, is computed as follows: =,, +,, +, +,, Immobile Sink n Mobile Proxy Sinks Assuming there are n bands, our architecture requires n mobile proxy sinks, namely mps 1, mps 2, mps 3,,mps n. As stated in Theorem 2, each mobile proxy sink mps i should be moving inside its band b i along a circular trajectory of radius +, where is is the inner radius of band b i and 0< < with being the outer radius of band b i, where == 1 and =. Thus, mps i moves on the perimeter of a circle of radius 1+. Given that the bands do not have the same inner and outer radii, it is easy to check that the mobile proxy sinks located in the upper (or outer) bands would consume more energy compared to their counterparts that are located in the lower (or inner) bands. It is clear that mobile proxy sinks in the outer bands would receive more data than those located in the inner 8

9 bands, thus, yielding more energy consumption due to data reception. For instance, the number of source sensors in bands 1 and 2 are respectively given by = = = =2 =3 with >. Also, the energy spent by a mobile proxy sink due to its mobility depends on the traveled distance. As can be seen, the mobility trajectory of mobile proxy sinks in the outer bands is longer than that of mobile proxy sinks in the inner bands, thus, causing more energy consumption due to mobility. For instance, the lengths of the trajectories of the mobile proxy sinks mps 1 and mps 2 that are moving inside their respective bands b 1 and b 2, are respectively given by =2 =2 + with >. Therefore, to achieve load balancing between all n mobile proxy sinks in terms of their energy consumption, which is due to data reception and their mobility for data collection, we divide the entire circular field into n cones centered at the field center. Each cone has an angle equal to 2π/n, as shown in Figure 13. Now, each mobile proxy sink collects data from only one cone. Assuming a uniform sensor deployment, all mobile proxy sinks collect data from the same size set of source sensors. Also, these mobile proxy sinks have the same mobility trajectory as stated below. Thus, this cone-based decomposition strategy of the field ensures load balancing among all of the mobile proxy sinks in their data collection task. mobile proxy sink mps i is a sequence of arcs and segments, (epc i, v n ), [v n, v n-1 ], (v n-1, u n-1 ), [u n-1, u n-2 ], (u n- 2, v n-2 ), [v n-2, v n-3 ], (v n-3, u n-3 ),, as shown in Figure 13. After dropping off the data to the immobile sink is 1 in this first round, the mobile proxy sink mps i moves back to its original position epc i at a constant speed v max, where it pauses for some time t pause. It is clear that the sum of time spent by mps i to reach epc i and t pause are needed for the sources sensors to obtain data that will be picked up in the next round of data collection. Let us compute the total energy consumption due to data transmission by all the source sensors in a cone and their reception by the corresponding mobile proxy sink. Let be a cone centered at the circular field. Consider the portion of band b i, denoted by, which is included in the cone that is being managed by mobile proxy sink mps j. As can be seen in Figure 14, is divided into, and,. Let, and, be the number of source sensors in, and,, respectively. Then, we have:, = 1 + = 1 +2, = = 1 +2 The energy spent due to data transmission and reception to collect the data from all source sensors in is denoted by,,,, and given by:,,,,=,,, +,,, = +2,, ,, +2 Figure 13 Figure 14 Initially, each mobile proxy sink mpsi is positioned on the perimeter of the circle that divides b n into, and, at one of the two endpoints, say epc i, of its respective cone, as shown on Figure 13. For instance, in the first round, mobile proxy sink mps i follows a top-down movement from the outmost band b n until the inmost band b 1. Precisely, it moves along the arc (epc i, v n ) inside band b n, then segment [v n, v n-1 ] whose length is, then arc (v n-1, u n-1 ) inside band b n-1, etc. This mobility pattern repeats until mobile proxy sink reaches the first band b 1, where it delivers all collected data to the sink s m. Thus, the trajectory mobility of Thus, the total transmission and reception energy, denoted by,,,, which is needed to collect the data from all portions of bands, =1.., in the cone is given by:,,,=,,,, Now, let us compute the energy spent by a mobile proxy sink in one round of data collection due to its mobility. As discussed earlier, the mobility trajectory of a mobile proxy sink is a sequence of alternated segments and arcs. Each segment has length equal to except the last segment whose length is. On the 9

10 other hand, the length of an arc of a circle of radius and subtending an angle is equal to. In our case, we have = and varies between (i.e., radius of the bottom arc located in the inmost band band ) and 1+ (i.e., radius of the top arc located in the outmost band band ). The length of the arc,, denoted by,, which separates into, and, is equal to 2, = 1+ = 2 + Thus, the length of the mobility trajectory of a mobile proxy sink from band to is denoted by,,,,, and computed as,,,,,= The corresponding mobility energy, denoted by,,,,,, is given by,,,,,=,,,,, = Also, the mobile proxy sink mps j has to move up to its initial location epc i to start a new data collection round. The energy spend in this movement is denoted by,,, and given by,,,,,= 1+ Hence, the energy consumed by a mobile proxy sink during its mobility in its cone, denoted by,,,, is given by,,,= The total energy consumption in the data collection, denoted by,,,, which is due to the transmission of data by all the source sensors and its reception by mobile proxy sink mps j, is given by,,,=,,,+, = ,,,, We conclude that the average total energy consumption, denoted by, by all n mobile proxy sinks in one round of data collection is equal to,, =, =,,,+,,, 6.5 n Immobile Sinks 1 Mobile Proxy Sink Assuming there are n bands, our architecture requires n immobile sinks, namely is 1,, is n. Each immobile sink is in charge of one band and will gather the data from its respective source sensors through the single mobile proxy sink mps 1. All immobile sinks are positioned on a segment line originating from the center of the circular sensor deployment field and ending at one of the points on its perimeter. The distance between any pair of adjacent immobile sinks is equal to R, while the first immobile sink is 1 is located at a distance equal to from the center O of the circular field. In other words, every immobile sink is located at a distance equal to from the inner circle of its corresponding band. In the first round of data collection, mps 1 moves from the inmost band b 1 toward the outmost band b n. Specifically, mps 1 moves on the perimeter of a circle of radius inside band b 1 to collect data and deliver it to the immobile sink is 1. Then, it moves toward band b 2 along a segment of length R and follows a circular trajectory on the perimeter of a circle of radius + inside band b 2 to collect data from source sensors inside b 2 and drop it off to the immobile sink is 2. This pattern repeats until collecting data from all remaining bands b 3,,b n. After collecting data from band b n and delivering it to the immobile sink is n, the mobile proxy sink mps 1 pauses for some time t pause before starting its second round of data collection. This time t pause is required for all source sensors to get data. During the second round of data collection, mps 1 moves from the outmost band b n toward the inmost band b1 using the reverse path while collecting data from the source sensors in their respective bands. This mobility trajectory repeats for the network lifetime. Let,, be the average energy consumption that is due to the transmission of data by all the source sensors located inside band b i,1 and its reception by the mobile proxy sink mps 1.,, is given by,, =,, = +,, +2 = Likewise, we denote by,, the average energy consumption, which results from the transmission of data by all the source sensors located inside band b i,2 and its reception by the mobile proxy sink mps 1.,, is computed as follows:,, =,, = + +,, +2 =

11 The total average energy consumption, denoted by,, which is due to the transmission of data by all the source sensors located inside all bands b 1,, b n and its reception by the mps 1, is given by:, =,, +,, Recall that the mobility trajectory of mps 1 is a sequence of alternated circles and segments. Assuming the mobile proxy sink mps 1 is originally at the center of the field, the length of the first segment is, while the length of any subsequent segment is. Also, the radius of the first mobility circle along which mps 1 moves is, whereas the difference of the radii of two consecutive mobility circles is equal to. To summarize, when it reaches band b i, mps 1 moves on a circle of radius + 1. Thus, the energy spent by mps 1 during its mobility to collect data from all active source sensors is given by:,,= Thus, the total energy consumption,, which is necessary for the data collection process, is given by = +,, 6.6 n Immobile Sinks n mobile proxy sinks Having only one immobile sink would incur significant delay and yield considerable energy consumption due to proxy sink mobility to reach the immobile sink and deliver data to it. Assuming there are n bands, our architecture includes n immobile sinks and n mobile proxy sinks. Each band has one immobile sink and one mobile proxy sink. Each mobile proxy sink moves inside its band at a constant speed between 0 and v max along a circular trajectory to collect data from its source sensors. Then, it moves toward its immobile sink to deliver all gathered data to it. To summarize, mobile proxy sink mps i moves on the perimeter of a circle of radius 1+ inside band b i. Each immobile sink is i is positioned deterministically inside one band. Specifically, is 1 is located at the perimeter of a circle of radius inside band b 1 at location,0 while is 2 is positioned at the perimeter of a circle whose radius is + inside band b 2 at location 0, +. Then, is 3 is positioned at the perimeter of a circle of radius +2 inside band b 3 at location 2,0 whereas is 4 is located at the perimeter of a circle with radius +3 inside band b 4 at location 0, 3. Then, is 5 is positioned at the perimeter of a circle of radius +4 inside band b 5 at location +4,0, etc. To summarize, the immobile sink is i is located at the perimeter of a circle of radius + 1 in band b i at location (x, y), where 1 and x and y are computed as follows:,= + 1,0 if i mod 4 = 1,=0, + 1 if i mod 4 = 2,= 1,0 if i mod 4 = 3,=0, 1 if i mod 4 = 0 It is worth mentioning that we propose such a placement of immobile sinks to avoid interference and collisions due to simultaneous transmission of data by source sensors to their respective mobile proxy sinks. Let,, be the average energy consumption that is due to the transmission of data by all the source sensors in band b i,1 and its reception by mobile proxy sink mps i. This energy,, is computed as:,, =,,, = +,, +2 = Let,, be the average energy consumption that results from the transmission of data by all the source sensors located inside band b i,2 and its reception by the mobile sink mps i. This energy,, is given by,, =,,, = = The total average energy consumption,, due to the data transmission by all the source sensors in band b i and its reception by mps i, is given by:, =,, +,, Also, the energy spent by mps i during its mobility along the perimeter of a circle of radius + 1 inside band b i is given by,,,= Thus, the average total energy, denoted by, which is spent by all the source sensors and mobile proxy sinks in the data collection process is =, +,,, 7. SIMULATION RESULTS In this section, we present the simulation results of our data collection protocols using a high-level simulator written in C language. First, we specify our simulation environment. Then, we discuss our simulation results. 11

12 7.1 Simulation Environment We consider a circular deployment field of radius D = 1000 m. We assume that the radii of the sensing and communication ranges of all the sensors (including both of the source sensors and mobile proxy sinks) are r = 50 m and R = 100 m, respectively. Thus, the number of concentric circular bands is n = D/R = 10. Moreover, we consider the free-space model, where =2. In addition, according to the energy model given in [28], the energy consumption in transmission, reception, idle, and sleep modes are 60 mw, 12 mw, 12 mw, and 0.03 mw, respectively [28]. We suppose that the initial energy of each source sensor is 60 Joules, while that of each mobile proxy sink is 100 Joules. To the best of our knowledge, there is no experimental result that has reported in the literature regarding the energy e move that is spent per unit of distance due to sensor mobility. In the absence of such an empirical value, we assign two different values to e move to assess the impact of mobility. We assume that the moving speed of each proxy sink is constant and equal to 1m/s. All simulations are repeated 100 times and the results are averaged. Figure 17: Protocol 1 n Figure 18: Protocol n 1 Figure 15: Protocol 1 1 (Scenario 1) Figure 16: Protocol 1 1 (Scenario 2) Figure 19: Protocol n n 7.2 Simulation Results We use the distributed connected k-coverage protocol, called DIRACC k, which is proposed for homogeneous WSNs, where all the source sensors and the single immobile sink are immobile [1]. Here, we focus on the energy consumption due to the data collection process (data transmission, data reception, and mobility). 12

13 In all the experiments related to Figures 15 19, we set the value of to, i.e., = = Let our data collection protocols described in Sections 6.3, 6.4, 6.5, and 6.6, be called 1 1 protocol, 1 n protocol, n 1 protocol, and n n protocol, respectively. Figure 15 shows the results of the first scenarios of the 1 1 protocol, while Figure 16 shows those of the second scenario. We found a match between theoretical and simulation results. Also, the 1 1 protocol in Scenario 1 gives better results than in Scenario 2. This is due to the different transmission distances used by the source sensors. In Scenario 1, the average transmission distances are,, = /3 (in band, ) and,, = /3 (in band, ), while in Scenario 2, it is equal to,, =/3. Figure 17 shows the theoretical and simulation results of the 1 n protocol. Likewise, there is a match between both results. In Figure 18, we plot both of the theoretical and simulation results of the n 1 protocol. Similarly, we notice that there is a match between both results. Figure 19 shows the theoretical and simulation results of the n n protocol, with a good match between them. Comparing Figure 17 and Figure 18, it is easy to see that the n 1 protocol outperforms the 1 n protocol. While they both have the same energy consumption due to data transmission and reception, the 1 n protocol incurs more mobility given that is has n mobile proxy sinks. Indeed, each of the n mobile proxy sinks has to move towards the center of the field to deliver the collected data to the single static sink. Thus, the 1 n protocol is expected to consume more energy than the n 1 protocol. We found that both of the n 1 protocol and n n protocol have comparable energy consumption. We expect the n n protocol to consume the least amount of energy for data collection. Indeed, compared to the n 1 protocol, there is no rectilinear movement in the n n protocol as every mobile proxy sink is in charge of only one band. Also, there is no need for any mobile proxy sink in the n n protocol to move out of its band as there is an immobile sink in its corresponding band to deliver data to. Thus, the energy savings of the n n protocol is due to the absence of rectilinear mobility of mobile proxy sinks. Now, we consider a different value of in the experiments related to Figures 20 21, where = Figure 20 shows the energy consumption during data collection and delivery of the 1 1 protocol, while Figure 21 shows that of the of the 1 n protocol. It is clear that the former outperforms the latter. In fact, the 1 n protocol requires more mobility given that all n mobile proxy sinks have to move toward the center of the field to deliver the collected data to the static sink. Thus, the selection of the best protocol with regard to the number of mobile proxy sinks to solve the energy sink-hole problem should depend on the mobility cost. Figure 20: Protocol 1 1 (e move = J) Figure 21: Protocol 1 n (e move = J) 8. CONCLUSION In this paper, we investigated the problem of energy sink-hole in duty-cycled connected k-covered WSNs. First, we proposed a three-tier architecture that has immobile source sensors, immobile sinks, and mobile proxy sinks. Then, we computed the optimum proxy sink mobility strategy with a goal to minimize the total energy consumption due to data transmission by source sensors and its reception by a mobile proxy sink. Also, we proposed four data collection protocols based on the number of immobile sinks and mobile proxy sinks. Second, we provided a theoretical analysis of each of those data collection protocols. Third, we corroborated our analysis with several simulation results. We found a good match between analytical and simulation results. We also show that our data collection protocols outperform a solution not using mobile proxy sinks. Our future work is three-fold. First, we plan to study delay in our proposed data collection protocols. Second, we focus on the problem of energy sink-hole problem in sparsely deployed WSNs. Third, we plan to extend our work to three-dimensional WSNs. 13

14 REFERENCES [1] H. M. Ammari and S. K. Das, Centralized and clustered k-coverage protocols for wireless sensor networks, IEEE TC, 61(1), [2] X. Bai, S. Kumar, D. Xuan, Z. Yun, and T. Lai, Deploying wireless sensors to achieve both coverage and connectivity, Proc. ACM MobiHoc, [3] B. Bollobás, The Art of Mathematics: Coffee Time in Memphis, Cambridge Univ. Press, [4] N. Bulusu, J. Heidemann, and D. Estrin, GPSless low cost outdoor localization for very small devices, IEEE PCM, 7(5), [5] E. Efthymiou, S. Nikoletseas, and J. Rolim, Energy balanced data propagation in wireless sensor networks, WINET, 12, [6] Y. Ganjali and A. Keshavarzian, Load balancing in ad hoc networks: single-path routing vs. multipath routing, Proc. IEEE Infocom, [7] J. Gao and L. Zhang, Load balanced short path routing in wireless networks, Proc. IEEE Infocom, [8] W. Guo and G. Wu, An energy-balanced transmission scheme for sensor networks, Proc. ACM SenSys, [9] H. Gupta, Z. Zhou, S. Das, and Q. Gu, Connected sensor cover: Self-organization of sensor networks for efficient query execution, IEEE TON, 14, [10] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, An application-specific protocol architecture for wireless microsensor networks, IEEE TWC, 1(4), [11] C. Huang, Y. Tseng, and H. Wu, Distributed protocols for ensuring both coverage and connectivity of a wireless sensor network, ACM TOSN, 3(1), [12] A. Jarry, P. Leone, O. Powell, and J. Rolim, An optimal data propagation algorithm for maximizing the lifespan of sensor networks, Proc. DCOSS, LNCS 4026, [13] L. A. Klein, A boolean algebra approach to multiple sensor voting fusion, IEEE TAES, 29(2), [14] P. Leone, S. Nikoletseas, and J. Rolim, An adaptive blind algorithm for energy balanced data propagation in wireless networks, Proc. DCOSS, LNCS 3560, [15] J. Li and P. Mohapatra, Analytical modeling and mitigation techniques for the energy hole problem in sensor networks, Elsevier PMC, 3, [16] J. Lian, K. Naik, and G. Agnew, Data capacity improvement of wireless sensor networks using non-uniform sensor distribution, IJDSN, 2-2, [17] J. Luo and J.-P. Hubaux, Joint mobility and routing for lifetime elongation in wireless sensor networks, Proc. IEEE Infocom, [18] V. P. Mhatre, C. Rosenberg, D. Kofman, R. Mazumdar, and N. Shroff, A minimum cost heterogeneous sensor network with a lifetime constraint, IEEE TMC, 4(1), [19] D. Nicules and B. Nath, Ad-hoc positioning system using AoA, Proc. IEEE Infocom, [20] S. Olariu and I. Stojmenovic, Design guidelines for maximizing lifetime and avoiding energy holes in sensor networks with uniform distribution and uniform reporting, Proc. IEEE Infocom, [21] O. Powell, P. Leone, and J. Rolim, Energy optimal data propagation in wireless sensor networks, Journal of Parallel and Distributed Computing, 3(67), pp , Mar [22] T. Sun, L. Chen, C. Han, and M. Gerla, Reliable sensor networks for planet exploration Proc. IEEE NSC, [23] Y.-C. Wang and Y.-C.Tseng, Distributed deployment schemes for mobile wireless sensor networks to ensure multi-level coverage, IEEE TPDS, 19(9), [24] X. Wu, G. Chen, and S. K. Das, Avoiding energy holes in wireless sensor networks with nonuniform node distribution, IEEE TPDS, 19(5), [25] G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, and C. Gill, Integrated coverage and connectivity configuration for energy conservation in sensor networks, ACM TOSN, 1(1), pp , [26] S. Yang, F. Dai, M. Cardei, and J. Wu, On connected multiple point coverage in wireless sensor networks, IJWIN, 13(4), [27] M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, and S. Singh, Exploiting heterogeneity in sensor networks, Proc. IEEE Infocom, [28] F. Ye, G. Zhong, J. Cheng, S. Lu, and L. Zhang, PEAS: A robust energy conserving protocol for long-lived sensor networks, Proc. ICDCS, [29] H. Zhang and J. Hou, Maintaining sensing coverage and connectivity in large sensor networks, AHSWN, 1(1-2), pp , [30] H. Zhang, H. Shen, and Y. Tan, Optimal energy balanced data gathering in wireless sensor networks, Proc. IEEE IPDPS, [31] Y. Zou and K. Chakrabarty, A distributed coverage- and connectivity-centric technique for selecting active nodes in wireless sensor networks, IEEE TC, 54-1,

15 Habib M. Ammari is an Associate Professor in the Department of Computer and Information Science, College of Engineering and Computer Science, University of Michigan-Dearborn, and the Founding Director of Wireless Sensor and Mobile Ad-hoc Networks (WiSeMAN) Research Lab at the University of Michigan-Dearborn since September Prior to that, he was on the faculty of the Department of Computer Science, Hofstra University from September August He obtained his second Ph.D. degree in Computer Science and Engineering from the University of Texas at Arlington in May 2008, and his second Master's degree in Computer Science from Southern Methodist University in December Also, he obtained his first Ph.D. (Highly Honorable with Praise) and Master's degrees in Computer Science from the Faculty of Sciences of Tunis in December 1996 and July 1992, respectively. His main research interests lie in the areas of wireless sensor and mobile ad hoc networking, multi-hop mobile wireless Internet architectures and protocols, and cyber physical systems. In particular, he is interested in coverage, connectivity, energy-efficient data routing and information dissemination, fault tolerance, and security in wireless sensor networks, and the interconnection between wireless sensor networks, mobile ad hoc networks, and the global IP Internet. He has a strong publication record in top-quality journals, such as IEEE TPDS, IEEE TC, ACM TAAS, Elsevier COMNET, Elsevier PMC, Elsevier JPDC, and highquality conferences, such as IEEE SECON, IEEE ICDCS, EWSN, and ICDCN. He published his first Springer book, titled Challenges and Opportunities of Connected k-covered Wireless Sensor Networks: From Sensor Deployment to Data Gathering, in August He received several prestigious awards, including the Certificate of Appreciation Award at the 17 th ACM MobiCom in September 2011, the Outstanding Leadership Award at the 20 th IEEE ICCCN in August 2011, the Best Symposium Award at the 7 th IEEE IWCMC in July 2011, the Lawrence A. Stessin Prize for Outstanding Scholarly Publication from Hofstra University in May 2010, the Faculty Research and Development Grant Award from Hofstra College of Liberal Arts and Sciences in May 2009, the Best Paper Award at the 5 th EWSN in February 2008, and the Best Paper Award at the Google Ph.D. Forum 6 th IEEE PerCom in March Also, he was an ACM Student Research Competition (ACM SRC) nominee at ACM MobiCom He is the recipient of the Nortel Outstanding CSE Doctoral Dissertation Award in February 2009, and the John Steven Schuchman Award for Outstanding Research by a PhD Student in February He received a three-year US National Science Foundation (NSF) Research Grant Award ($400 K) in June 2009, and the US National Science Foundation Faculty Early Career Development (CAREER) Award ($450 K) in January He is the University of Michigan- Dearborn s second NSF CAREER Award recipient, and the Hofstra's first ever NSF CAREER Award recipient. He serves as Associate Editor of several journals, including ACM TOSN, IEEE TC, Wiley WCMC, AHSWN, Wiley IJCS, and NPA. He is on the Editorial board of the International Journal of Mobile Communications and the International Journal on Advances in Networks and Services. Also, he is on the Editorial Review Board of the International Journal of Distributed Systems and Technologies. He serves as Track Co-Chair of IEEE ICCCN 2012 SEP, Demo Co-Chair of IEEE WoWMoM 2012, Program Co- Chair of CPNS 2012, Program Vice-Chair of MUSIC 2012, Workshop Chair of WiMAN 2012, Program Vice-Chair of IEEE/IFIP EUC 2011, Workshop Chair of WiMAN 2011, and Symposium Co-Chair of IWCMC 2011 Wireless Sensor Networks Symposium. Also, he served as Workshop Co-Chair of WiMAN 2010, Symposium Co-Chair of IWCMC 2010 Wireless Sensor Networks Symposium, Program Co-Chair of IQ2S 2009, and Workshop Co-Chair of WiMAN He has served as Publicity (Co) Chair of numerous conferences, symposia, and workshops, including ACM MobiCom Also, he has served as a reviewer for several international journals, including IEEE TMC, IEEE TPDS, IEEE SMC, ACM TOSN, IEEE TVT, IEEE TWireless, IEEE CL, Springer s MONE, Springer s WINET, Elsevier s ADHOC, Elsevier s COMNET, AHSWN, IJSNet, Elsevier s IPL, Elsevier s COMCOM, Elsevier s JPDC, Elsevier s INS, IJCA, and Elsevier s DKE, and as a Technical Program Committee member of numerous IEEE and ACM conferences, symposia, and workshops, including IEEE Infocom, IEEE ICDCS, IEEE DCOSS, IEEE INSS, IEEE PerCom, IEEE GlobeCom, IEEE ICC, SSS, IEEE MASS, IEEE MSN, IEEE LCN, IEEE VTC, IEEE ICCCN, EWSN, ICDCN, and AdHocNets. 15

Coverage Related Issues in Networks

Coverage Related Issues in Networks Coverage Related Issues in Networks Marida Dossena* 1 1 Department of Information Sciences, University of Naples Federico II, Napoli, Italy Email: marida.dossena@libero.it Abstract- Wireless sensor networks

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu A Survey on Rendezvous Data Collection in Wireless Sensor Networks Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu Roadmap Background Introduction of state-of-art solutions Future works References

More information

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer

More information

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)

More information

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran patooghy@iust.ac.ir

More information

Mobile Network Analysis - Hole Healing

Mobile Network Analysis - Hole Healing , pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen

More information

Coverage in Wireless Sensor Networks: A Survey

Coverage in Wireless Sensor Networks: A Survey Coverage in Wireless Sensor Networks: A Survey Raymond Mulligan Wireless Sensor and Mobile Ad-hoc Networks (WiSeMAN) Research Lab Department of Computer Science, Hofstra University Hempstead, NY 11549,

More information

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks 928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:

More information

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng

More information

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu

More information

Distributed Coordinate-free Hole Recovery

Distributed Coordinate-free Hole Recovery Distributed Coordinate-free Hole Recovery Xiaoyun Li Department of Computing and Electronic Systems University of Essex Colchester, UK CO4 3SQ xliw@essex.ac.uk Abstract This paper proposes a distributed

More information

Wireless Sensor Network: Improving the Network Energy Consumption

Wireless Sensor Network: Improving the Network Energy Consumption Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that

More information

Protocol Design for Neighbor Discovery in AD-HOC Network

Protocol Design for Neighbor Discovery in AD-HOC Network International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for

More information

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent Decreusefond.

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

How To Balance Network Load In A Wireless Sensor Network

How To Balance Network Load In A Wireless Sensor Network Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com,

More information

The Monitoring of Ad Hoc Networks Based on Routing

The Monitoring of Ad Hoc Networks Based on Routing The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,

More information

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)

More information

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Journal of Information Processing Systems, Vol.6, No.3, September 2010 DOI : 10.3745/JIPS.2010.6.3.295 MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Mohamed Mostafa

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks

LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks Wenlu Yang 1, 2, Chongqing Zhang 2, Minglu Li 2 1 Department of Electronic Engineering, Shanghai Maritime University, Shanghai, China

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing

Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing Balancing in d Hoc Networks: Single-path Routing vs. Multi-path Routing Yashar Ganjali, btin Keshavarzian Department of Electrical Engineering Stanford University Stanford, C 9435 Email:{yganjali, abtink}@stanford.edu

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

Risk Management in Intrusion Detection Applications with Wireless Video Sensor Networks

Risk Management in Intrusion Detection Applications with Wireless Video Sensor Networks Risk Management in Intrusion Detection Applications with Wireless Video Sensor Networks Abdallah Makhoul University of Franche-Comté LIFC Laboratory Email: abdallah.makhoul@iut-bm.univ-fcomte.fr Rachid

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

On Energy-Efficient Trap Coverage in Wireless Sensor Networks

On Energy-Efficient Trap Coverage in Wireless Sensor Networks 211 32nd IEEE Real-Time Systems Symposium On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li Jiming Chen Shibo He Tian He Yu Gu Youxian Sun State Key Lab. of Industrial Control Technology,

More information

A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks

A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks Changlin Yang School of Electrical, Computer and Telecommunications Engineering University of Wollongong

More information

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,

More information

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh

More information

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

Energy Optimal Routing Protocol for a Wireless Data Network

Energy Optimal Routing Protocol for a Wireless Data Network Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.

More information

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

How To Find The Network Lifetime Of A Base Station With An Approximation Algorithm

How To Find The Network Lifetime Of A Base Station With An Approximation Algorithm Optimal Base Station Placement in Wireless Sensor Networks YI SHI and Y. THOMAS HOU Virginia Polytechnic Institute and State University Base station location has a significant impact on network lifetime

More information

Recent advances in microelectromechanical

Recent advances in microelectromechanical COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area

More information

Energy Efficient Coverage for Mobile Sensor Network

Energy Efficient Coverage for Mobile Sensor Network Volume 55 No., October Energy Efficient Coverage for Mobile Sensor Network Richa Singh Krishna Engineering College, Ghaziabad ABSTRACT Wireless sensor networks comprise the platform of a broad range of

More information

Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks

Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks Optimal Hole Coverage Using Hole Detection and Replacing Algorithm in Wireless Sensor Networks 1 D. Jewel, 2 P. Brundha, 3 D. C. Joy Winnie Wise 1,2,3 Department of CSE, Francis Xavier Engineering College

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

Node Degree based Clustering for WSN

Node Degree based Clustering for WSN Node Degree based Clustering for WSN Sanjeev Kumar Gupta Dept. of Electronics & Comm. SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Neeraj Jain Dept. of Computer Science SCOPE College

More information

Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network

Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network Coverage-Hole Trap Model in Target Tracking using Distributed Relay-Robot Network Huawei Miao, Chia Ching Ooi, Xiaowen Wu, and Christian Schindelhauer Computer Networks and Telematics, Department of Computer

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks

Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks J Inf Process Syst, Vol.10, No.2, pp.300~313, June 2014 http://dx.doi.org/10.3745/jips.03.0006 pissn 1976-913X eissn 2092-805X Power Consumption Analysis of Prominent Time Synchronization Protocols for

More information

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

The Self-Protection Problem in Wireless Sensor Networks

The Self-Protection Problem in Wireless Sensor Networks The Self-Protection Problem in Wireless Sensor Networks DAN WANG Simon Fraser University QIAN ZHANG Hong Kong University of Science and Technology and JIANGCHUAN LIU Simon Fraser University Wireless sensor

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

Some Security Trends over Wireless Sensor Networks

Some Security Trends over Wireless Sensor Networks Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -

More information

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University E-mail:

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

Defending Wireless Sensor Networks Against Adversarial Localization

Defending Wireless Sensor Networks Against Adversarial Localization Defending Wireless Sensor Networks Against Adversarial Localization Neelanjana Dutta, Abhinav Saxena and Sriram Chellappan Department of Computer Science Missouri University of Science and Technology Rolla,

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Service Management in Wireless Sensors Network

Service Management in Wireless Sensors Network Service Management in Wireless Sensors Network Linnyer Beatrys Ruiz 1,, Thais Regina M. Braga 1, Fabrício A. Silva 1 José Marcos S. Nogueira 1, Antônio Alfredo F. Loureiro 1 1 Department of Computer Science

More information

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract A Wireless Sensor Network(WSN) is a energy and security constraint

More information

Gossiping using the Energy Map in Wireless Sensor Networks

Gossiping using the Energy Map in Wireless Sensor Networks Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas

More information

LARGE-SCALE wireless sensor networks are an emerging

LARGE-SCALE wireless sensor networks are an emerging 484 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 7, NO. 4, APRIL 2008 General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies Zhao Cheng, Mark Perillo, and Wendi B.

More information

Keywords coverage holes, energy efficient, hole detection, hole healing

Keywords coverage holes, energy efficient, hole detection, hole healing Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hole Detection and

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Routing and Transport in Wireless Sensor Networks

Routing and Transport in Wireless Sensor Networks Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References

More information

Modeling Data Gathering in Wireless Sensor Networks

Modeling Data Gathering in Wireless Sensor Networks Wireless Sensor Networks and Applications SECTION III Data Management Y. Li, M. Thai and W. Wu (Eds.) pp. 572-591 c 2005 Springer Chapter 15 Modeling Data Gathering in Wireless Sensor Networks Bhaskar

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Jing (Selena) He, Shouling Ji, Yi Pan, Zhipeng Cai Department of Computer Science, Georgia State University, Atlanta, GA, USA, {jhe9,

More information

Multi-hop/Direct Forwarding (MDF) for Static Wireless Sensor Networks

Multi-hop/Direct Forwarding (MDF) for Static Wireless Sensor Networks Multi-hop/Direct Forwarding (MDF) for Static Wireless Sensor Networks JING DENG Department of Computer Science University of North Carolina at Greensboro The success of Wireless Sensor Networks (WSNs)

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

Optimal Network Discovery Period for Energy- Efficient WLAN Offloading

Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Dionysia Triantafyllopoulou, Tao Guo, and Klaus Moessner Centre for Communication Systems Research University of Surrey Guildford,

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

A Security Architecture for. Wireless Sensor Networks Environmental

A Security Architecture for. Wireless Sensor Networks Environmental Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Sangeeta Rao Department of Computer Science Central University of Haryana Mahendergarh, Haryana, India

More information

Medial Axis Construction and Applications in 3D Wireless Sensor Networks

Medial Axis Construction and Applications in 3D Wireless Sensor Networks Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

Probabilistic Coverage in Wireless Sensor Networks

Probabilistic Coverage in Wireless Sensor Networks Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed 1,2 nahmed@cse.unsw.edu.au 1 Computer Science and Engineering, University of New South Wales, Sydney, Australia. Salil S. Kanhere 1 salilk@cse.unsw.edu.au

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). 2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs

More information