Collaborative Wireless Sensor Network Simulation
|
|
- Clementine Freeman
- 7 years ago
- Views:
Transcription
1 Collaborative Wireless Sensor Network Simulation KHEMAKHEM Ramzy BODENAN Julien SALIM Eliass ENSEIRB, T3, January {khemakhe, bodenan, Abstract. Wireless sensor networks (WSNs) are attracting increased interest for a wide range of applications such as environmental monitoring and vehicle tracking. Resource constraints on nodes in the network and unreliability of radio communication mean that applications have to be developed with an eye on maximizing energy efficiency in order to extend network life [1]. Our goal is to work on an autonomic architecture in order to minimize the energy consumption of the nodes within the network with an adapted distributed algorithm [2] for a WSN environment that enables nodes to stop useless communications between each other. Indeed, sensing and communications consume energy, therefore judicious power management and sensor scheduling can effectively extend network lifetime. This report presents our approach towards this particular problem, the algorithm we worked on and finally its implementation with a simplified distributed knowledge sharing model within a Visidia environment [3]. 1 Introduction Recent advances in digital electronics, embedded systems, and wireless communications have motivated a lot of research in the direction of distributed wireless sensor networks. A wireless sensor network is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations [1]. Originally, wireless sensor network was designed for military applications such as battlefield surveillance. Though, wireless sensor networks are now used in many civilian applications areas, including environment, traffic control, and even in health. Wireless sensor networks differ from conventional network systems in many aspects. They usually involve a large number of spatially distributed, energy-constrained, and self-configuring nodes. The wireless sensor networks are bringing a lot of new challenges and design considerations. One of these challenges is the energy consumption. Indeed, as we have said before, due to limited energy resources, it is vital to maximize the lifetime of sensors in order to operate over a long period of time (from 6 months to 1 year) within a difficult environment such as military zones. Because without energy the network cannot do anything, the problem of energy consumption is the most significant one. That s why WSNs require careful management of energy resources. Thus, we tried in this project to find a way that enables to limit the energy consumption in WSNs. Thus, an autonomic management solution based on distributed algorithms for knowledge sharing was provided within the LABRI laboratory, so the solution outcome seems interesting to be studied and applied to the problematic we have chosen that is to say the energy consumption on WSNs. For this purpose, the simulation tool VISIDIA (Visualization and Simulation of Distributed Algorithms) was used to test the algorithm. 2 State of the art 2.1 Architecture There are two sorts of sensor network architectures, layered architecture and clustered architecture that are shown in Figure 1. The first one has a single powerful base station (BS), and the layers of sensor nodes around it correspond to the nodes that have the same hop-count to the BS. About the clustered architecture, the sensor network is divided into small areas called clusters.
2 Each cluster has a cluster-head (which functions like a base station) which is elected to manage these resources like the communication between sensors. Within each cluster, ordinary node communicates with the cluster head and the cluster head form a backbone network to forward the data to the remote BS. Furthermore, with this architecture, aggregation of data is easier, the management of the network is simplified and it permits to reduce the energy consummation. (a) (b) Figure 1. Layered (a) and clustered (b) architecture Because it s the most used architecture, we have considered in this work a WSN with a clustered architecture. 2.2 Research Challenges in WSN As we have seen before, wireless sensor network problems are not the same as those we can encounter in classical networks. Because the nodes that constituted this kind of network have small size, low battery capacity nonrenewable power supply, small processing power, limited buffer capacity, a low-power radio and lack unique identifiers, WSNs provide new communication and networking paradigms. In order to realize system that can support extreme situations, several obstacles need to be overcome. - Coverage problem: ensure that sensors provide sufficient coverage of the sensing field - Limited source energy and therefore limited communications: Because it is impractical to recharge a depleted battery we need for example to use specific protocols (energy-aware protocols) in order to prolong the network lifetime. Energy is not only spent for communication, but also when sensors are moving around the network - How to decide which sensors need to remain active so that the area is covered as possible and we can save energy - Hot spot problem: It is the long-term connectivity maintenance of networks. Some nodes work more than others and so they deplete their energy faster. It s because nodes that are closer to the sink also transmit others data and not only theirs - Ad hoc deployment, for example when sensors are dropped by a plane above a forest that needs to be staked out - Free maintenance operation, which requires an automatic configuration (for example when the topology of the network changes) - Node identification: Because of the high density of nodes, we need a long ID to avoid the ID conflict. But most WSNs can t afford the large overhead introduced by a long ID - The security in sensor networks: It s the same problems as those we can encounter with wireless ad hoc networks, like availability, confidentiality, integrity, and authentication - Dynamic adaptation, especially for the arrival or fall of sensors, or the case where there is a stimuli modification - Location in a repository in relation to other nodes or absolutely: How to efficiently deliver the message without or with less location information
3 - Quality of service: the aim is to provide better services than just best effort services Most of these problems enounced above have not been entirely resolved and it represents a real challenge for researchers. The bibliographical analysis on the wireless sensor networks we have done in the first phase of this project has enabled us to become aware of the energetic problem. Thus, because it is impractical to recharge a depleted battery we need for example to use specific protocols (energy-aware protocols) or specific algorithm in order to prolong the network lifetime. We also noticed that other problematic of this field are more or less linked with the energy one. So, if we success to minimize the energy consumption of sensors it would open many barriers. 2.3 Energy consumption problem The energy consumption problem in wireless sensor networks is investigated. Because of constrained battery, the problem is to expend as little energy as possible receiving and transmitting data. Several works have been done in the last few years in order to find a way to improve the routing performance, especially the lifetime for WSNs. The authors in [4] present a taxonomy about most of the routing protocols for WSNs and categorize them into three classes which are data-centric [5, 6], hierarchical [7-9], and location based [10, 11] protocols. To reduce the energy consumption, an important technique is the data aggregation which is a technique adopted by the data-centric routing protocols [5, 6]. It uses the fact that that many nearby sensor nodes might sense and collect similar information. This method enables to reduce both the size and the number of transmissions. SPIN (Sensor Protocols for Information via Negotiation [6]) can be viewed as the first data-centric routing protocol which uses data negotiation method among sensor nodes to reduce data redundancy and save energy. Direct Diffusion [6] is a famous and representative data-centric routing protocol for WSNs. In WSNs with hierarchical structure [7-9], the whole network is further divided into smaller areas called clusters. In this way, the energy consumption can be greatly reduced since the communication range is largely reduced within one cluster and the ordinary sensor nodes can be set to sleeping mode according to certain Time Division Multiple Access (TDMA) schedule, which is sent by cluster head. Location-based routing protocols [10, 11] require sensor location information which can be gained either through global positioning system (GPS) devices or through certain estimation algorithms based on received signal strength. The advantage of this type of routing protocols is that there is no need to make blind broadcasting, so the routing overhead can be largely reduced, and so it reduces the energy consumption. 3 Our Approach The major stake of WSN technology is to deploy this kind of network on a large scale environment, and to make sensors cooperating while taking into account problematic we can encounter in this environment, but to do so we need to introduce an autonomic notion. IBM was the first to develop an autonomic architecture [13]. However, in all autonomic architectures which have been developed there was no cognitive infrastructure for knowledge management, a knowledge plane. This knowledge plan would provide the ability to the networks elements to be self-organizing and to follow the global objectives provided by administrators while optimizing network resources like energy. As we said before, communication between nodes is the main energy consumer, that s why we tried in a clustered architecture to limit useless communications between nodes. To do so, we have adapted a distributed algorithm for knowledge sharing in the context of wireless sensor network.
4 3.1 Initial Algorithm Having a self-organized sensor network implies designing a distributed collaborative environment in which all the component should be able to share their knowledge and to take decisions according to the information they received from other components. Those components should also be able to analyze shared knowledge and eventually reject it if it is necessary. To realize the knowledge sharing, a distributed algorithm that is shown Figure 2 is proposed. The main objective of this algorithm is to define the situated view of the knowledge that a component wants to share with the others. The situated view means the domain limits where a piece of knowledge is useful and then should be propagated. The notion of situated view is similar to the notion of neighborhood. Figure 2: Knowledge sharing algorithm with situated view In fact, when receiving knowledge, a component decides either to be the neighbor of the root component by accepting the knowledge and by propagating it, or not by stopping it propagation. This is the notion of acceptance. This notion is necessary to avoid useless information exchanges between nodes, and by this way the knowledge plan is constructed progressively. Then, there is the notion of neighborhood. It is necessary that elements have the ability to identify their direct neighbors. Several criteria can be used to define the neighborhood. Without going into details there is the physical neighborhood and the logical one (based on similarities between nodes, e.g. the type of equipment, the role of the equipment). 3.2 Adapted algorithm In our work, we have considered that this notion of neighborhood corresponds to the physical neighbor that is somewhat reducing but sufficient for our simulation. So, when a sensor gets an information that it picks up from its area coverage or from another node, it decides or not to spread it to its neighborhood. Thus, before the node retransmits the knowledge (or the information) to all its neighbors, it first has to determine if the knowledge is coherent with its state and if the knowledge is pertinent or not. The criterion we used to check if the knowledge is pertinent or not will be seen in the next part. So, the procedure defined in Figure 2 is executed by all nodes when receiving the knowledge and it is according to this procedure that the knowledge is propagated in the network.
5 4 Implementation 4.1 The chosen scenario The performance of the algorithm is not yet approved. Thus, to come over this, a concrete scenario of a sensor network use should be fixed in order to measure its auto-organization performance. The chosen scenario deals with a fire scenario in forest. The architecture envisaged for this scenario consists of a network composed by several temperatures sensors and one based station. In our simulation, at a given instant one temperature sensor detects an abnormal high temperature and decides to transmit this information. As we have said before, we want here to reduce the energy consumption by limiting communications. Thus, we have to compare the propagation of the information in the wireless sensor network with and without the algorithm. To do so we have used a model of fire propagation. That is to say, that according to this model we assigned a given temperature to each node in the network as a function of its position from the node where the fire has been detected. So, we know how far the information needs to be spread from the fire source, and we know which nodes are not concerned by this event. The model of fire propagation we used is shown in Figure 3. Figure 3: Model of fire propagation In our simulation, we have considered that the knowledge was the information of a detected fire by a given sensor (or node). So what we propagate in the network is that the sensor number X (each sensor is defined by an Id number) has detected an abnormal temperature. Then, each node that receives this information checks if this information is pertinent, and if it needs to be propagated, the criterion we have chosen is to compare the temperature that the node receives with the temperature it gets from its area coverage. Thus, if the difference between temperatures is to important, the information is considered as not pertinent, and so it is not spread to the neighborhood. To test the algorithm and to set up our scenario, we had to use a network simulator that has specific criteria. 4.2 The chosen simulator We needed a tool that can visualize distributed algorithms not necessarily a Network Simulator like NS-2. Thus, we just need a middleware vision which means that we need to simulate the logical network. To do so, there are lots of tools that can fit, but we chose Visidia mostly because it has many properties that aren t found in other applications, and for its good performance with distributed algorithmic. VISIDIA is a software tool for the visualization and the simulation of distributed algorithms based on a solid theoretical base. It is kitted up by a graphical user interface which will be used to draw the sensor network architecture of our scenario.
6 After we had learnt how the VISIDIA graphical interface works and how we can create a graph, we had to learn how we can execute the algorithm on it. To do so, we needed first to implement in java the algorithm on our favorite editor (we used eclipse), and then we needed to generate the.class file. And this is that.class file that is used on VISIDIA to launch the algorithm on each node. But as we have said before, we first have had to adapt and implement the algorithm to our scenario. This part of our work is explained in the next section. 4.3 The implementation of the algorithm VISIDIA is implemented in Java, so we worked on the VISIDIA package, and we used the VISIDIA API. We encountered some difficulties to establish relationships between classes, in order to use the methods that we needed to implement the algorithm. We defined a class EnergyAlgo that inherit from the class Algorithm, the main function of our class is the method init()that is executed by a thread launched by the class simulator which takes the algorithm as a parameter. As we have said before, we used the model of fire propagation. To do so, we defined four ellipses in order to get the level lines we needed for the model. These ellipses are defined according to the hearth, that is to say the first sensor that detects the fire. When the sensor detects the fire it sends a message to its neighborhood. Then, its neighbors decide if the information is pertinent or not, and if so they send it to their neighbors (except the node they received the information from). To check if the information is pertinent or note we compare the temperature that the local node detects to the temperature of the sensor that detects the fire. If the difference between the two temperatures is inferior to 20 degrees, the information is considered as pertinent and is transmitted. Each ellipsis defines a space that has a specific temperature, in other word, to attribute a temperature to a node, we have to check if it is inside an ellipsis, and if so we need to find to which one it belongs. //check if the point is inside an ellipse public boolean isinellipse(int x,int y,int a, int b){ System.out.println((Math.pow((float)((float)(Math.PI/4)*(x-y))/a,2)+ Math.pow((float)(float)(Math.PI/4)*(x+y)/b, 2))); return ((Math.pow((float)((float)(Math.PI/4)*(x-y))/a, 2)+ Math.pow((float)(float)(Math.PI/4)*(x+y)/b, 2)) < 1); } Thus, the four ellipses define 5 temperatures areas, four are inside an ellipsis and a last one is outside and represents the rest of the network that is not concerned by the fire. With the method isinellipse()defined below, it is easy to check if the node is inside an ellipsis or not. But some nodes can be inside two or more ellipses, that is why we defined for each ellipsis a specific table that contains the IDs of the nodes that are inside of it. Hashtable<Integer, Integer> zone3 = new Hashtable<Integer, Integer>(); for(int i = 0;i < netsize; i++){ if( i!= this.getid() && isinellipse(vuegraphe.recherchersommet(integer.tostring(i)).centrex(), vuegraphe.recherchersommet(integer.tostring(i)).centrey(), 600, 600)){ if(!zone1.containskey(i) &&!zone2.containskey(i)) zone3.put(i, i); } } By this way we can attributes a temperature for all the nodes according to its position in the network and according to the model fire propagation.
7 5 Experimentations and Results (a) (b) Figure 4. Knowledge Sharing Algorithm (a) and Spread all knowledge Algorithm (b) simulation The figures above show the simulation of the knowledge sharing and the spread all algorithms. The second algorithm does not attribute spread rule to nodes. Thus, the knowledge shared by the starter node has been transmitted to all nodes on the graph. The main difference between those two algorithms is that in the first one, 117 messages have been exchanged whereas in the second one, we count 184 messages. Therefore, as the energy consumption is proportionate to the number of message send, we can conclude that the knowledge Sharing Algorithm is more efficient toward the problem energy dissipation. In fact, especially in large sensor networks, this algorithm limits the area in which a specific knowledge should be shared by establishing criteria of neighborhood. Those neighbors are the only node that can take profits from the content of the knowledge. If we refer to figure4, the neighbors of the starter node are distributed in for zone having respectively red, yellow, orange and black node s color. The blue nodes represent the neighborhood area bounds. However, in the figure5, the neighborhood area of the starter node is not bounded due to the fact that all nodes are neighbors.
8 6 Conclusion The implementation of a simple adaptation of the knowledge share algorithm was sufficient to show the efficacy of this algorithm toward the problem of energy consumption in a WSN. In fact, by introducing the neighborhood concept, this algorithm decrease the number of message exchanged to spread a knowledge and preserve, as a result, the node s energy in an auto-management process. The implementation of such algorithm was not much easy. Indeed, we have faced some difficulties to take profits from the code of VISIDIA in order to implement our algorithm notably, to establish the relationship between the simulation software classes and the algorithm class. Although, it was a very interesting project that necessitated an important personal devotion to come over all the new notions and specificity of WSN and it constitutes a real value-added. References [1] Mbaye Maissa, Krief Francine : Distributed Knowledge Sharing Algorithm for Autonomic Networking. [2] The ViSiDiA Project: Visualization and Simulation of Distributed Algorithms. Please see [3] K. Akkaya and M. Younis, "A Survey of Routing Protocols in Wireless Sensor Networks, in the Elsevier Ad Hoc Network, Vol. 3(3), 2005, pp [4] J. Kulik, W. R. Heinzelman, H. Balakrishnan, "Negotiation-based protocols for disseminat-ing information in wireless sensor networks", ACM/IEEE Int. Conf. on Mobile Computing and Networking, Aug [5] C. Intanagonwiwat, R. Govindan and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks", in the Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'00), Boston, MA, August [6] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless sensor networks," in the Proceeding of the Hawaii International Con-ference System Sciences, Hawaii, January [7] S. Lindsey and C. S. Raghavendra, "PEGASIS: Power Efficient GAthering in Sensor Infor-mation Systems," in the Proceedings of the IEEE Aerospace Conference, Big Sky, Montana, March [8] Wang Jin, Shu Lei, Jinsung Cho, Young-Koo Lee, Sungyoung Lee, Yonil Zhong. "A Load-balancing and Energyaware Clustering Algorithm in Wireless Ad-hoc Networks". The 1st International Workshop on RFID and Ubiquitous Sensor Networks (USN'2005), 2005, pp [9] V. Rodoplu and T.H. Ming, "Minimum energy mobile wireless networks," IEEE Journal of Selected Areas in Communications, Vol. 17, No. 8, 1999, pp [10] IBM Corporation, An architectural blueprint for autonomic computing, White Paper [11] Clark, D. D., Partridge, C., Ramming, J. C., and Wroclawski, J. T A knowledge plane for the internet. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Karlsruhe, Germany, August 25-29, 2003). SIGCOMM '03. ACM, New York, NY, 3-10.
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationHybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
More informationDynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks
928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications
More informationEvaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network
Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationDAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
More informationRouting and Transport in Wireless Sensor Networks
Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References
More informationWireless Sensor Network: Improving the Network Energy Consumption
Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that
More informationMaximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks
August 26, 2002 TR CS-02-12 Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks Konstantinos Kalpakis 1,2, Koustuv Dasgupta 1, and Parag Namjoshi 1 Computer Science and Electrical
More informationEnhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks
Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Sangeeta Rao Department of Computer Science Central University of Haryana Mahendergarh, Haryana, India
More informationThe Interoperability of Wireless Sensor Networks
The Interoperability of Wireless Sensor Networks Daniela Ballari, Miguel Angel Manso-Callejo, Monica Wachowicz Technical University of Madrid daniela@topografia.upm.es; m.manso@upm.es; m.wachowicz@topografia.upm.es
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks Chaitanya Mankar 1, Vidhya Dhamdhere 2 1 MECN, G. H. Raisoni College of Engineering and Management (GHRCEM), India 2 Faculty, Computer Department, G.H.Raisoni
More informationA Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
More informationA Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu
More informationA Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
More informationPreface. Book Origin and Overview
Preface The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life
More informationSurvey on Network Lifetime Enhancement Method
International Journal of Computer Sciences and Engineering Open Access Survey Paper Volume-4, Issue-03 E-ISSN: 2347-2693 Survey on Network Lifetime Enhancement Method Abdul Jawad 1* and P. B. Mali 2 1*,2
More informationA SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
More informationAn Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
More informationRole of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
More informationOPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
More informationA Network Stability Monitoring Mechanism of Cluster-Oriented
A Network Stability Monitoring Mechanism of Cluster-Oriented Wireless Sensor Network Kuo-Qin Yan Shu-Ching Wang Yu-Ping Tung Chaoyang University of Technology, Taiwan ABSTRACT In wireless sensor network
More informationDesign of a Web-based Application for Wireless Sensor Networks
Design of a Web-based Application for Wireless Sensor Networks Sajid Hussain, Nick Schofield, and Abdul W. Matin Jodrey School of Computer Science, Acadia University Wolfville, Nova Scotia, Canada {Sajid.Hussain,
More informationIsolines: Energy-efficient Mapping in Sensor Networks
Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract
More informationMinimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART
More informationInternational Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
More informationProtocol Design for Neighbor Discovery in AD-HOC Network
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationAn Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)
More informationSome Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
More information3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
More informationEnergy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor
More informationThe Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
More informationLoad Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
More informationCongestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
More informationGossiping using the Energy Map in Wireless Sensor Networks
Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas
More informationA RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
More informationPEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
More informationControl overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More informationKeywords Wireless Sensor Network (WSN), Low Energy adaptive Clustering Hierarchy (LEACH), Cuckoo Search, Cluster Head (CH), Base Station (BS).
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Relative Analysis
More informationMULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS.
MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS. NAUMAN ISRAR and IRFAN AWAN Mobile Computing Networks and Security Research group School of Informatics University of Bradford,
More informationMAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
More informationLoad-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran patooghy@iust.ac.ir
More informationA Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationDesign of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn
More informationA STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,
More informationLBN: Load-balancing Network for Data Gathering Wireless Sensor Networks
LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks Wenlu Yang 1, 2, Chongqing Zhang 2, Minglu Li 2 1 Department of Electronic Engineering, Shanghai Maritime University, Shanghai, China
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
More informationEFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationRecent advances in microelectromechanical
COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area
More informationService Management in Wireless Sensors Network
Service Management in Wireless Sensors Network Linnyer Beatrys Ruiz 1,, Thais Regina M. Braga 1, Fabrício A. Silva 1 José Marcos S. Nogueira 1, Antônio Alfredo F. Loureiro 1 1 Department of Computer Science
More informationApplying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
More informationWireless Sensor Networks Database: Data Management and Implementation
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Wireless Sensor Networks Database: Data Management and Implementation Ping Liu Computer and Information Engineering Institute,
More informationDipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India
Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur
More informationNode Degree based Clustering for WSN
Node Degree based Clustering for WSN Sanjeev Kumar Gupta Dept. of Electronics & Comm. SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Neeraj Jain Dept. of Computer Science SCOPE College
More informationPrediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
More informationin Health Care and Sensor Networks
16 th FFV Workshop Web Services in Health Care and Sensor Networks Fahad Aijaz Department of Communication Networks RWTH Aachen University, Germany FFV Workshop, March 13, 2009 Outline Wireless Sensor
More informationMAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.3, September 2010 DOI : 10.3745/JIPS.2010.6.3.295 MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Mohamed Mostafa
More informationEnergy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network
Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract A Wireless Sensor Network(WSN) is a energy and security constraint
More informationAdaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).
2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs
More informationAn Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
More informationTopology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey
Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey Zhongliang Zhao, Torsten Braun Institute of Computer Science and Applied Mathematics, University of Bern Neubrückstrasse 10, 3012
More informationStudy And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
More informationA Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
More informationSecuring wireless sensor networks
Securing wireless sensor networks ODU Sensor Network Research Group Stephan Olariu Ashraf Wadaa Larry Wilson Kennie Jones ODU ODU ODU NASA LANGLEY Agenda What are wireless sensor networks (WSNs)? Security
More informationFrom reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
More informationResearch Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationConsecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
More informationThe Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
More informationCoverage Related Issues in Networks
Coverage Related Issues in Networks Marida Dossena* 1 1 Department of Information Sciences, University of Naples Federico II, Napoli, Italy Email: marida.dossena@libero.it Abstract- Wireless sensor networks
More informationRemote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department
More informationMonitoring Large-Scale Wireless Sensor Networks
Monitoring Large-Scale Wireless Sensor Networks using Epidemic Protocols Daniela Gavidia, Spyros Voulgaris, Maarten van Steen Vrije Universiteit Amsterdam Faculty of Science Department of Computer Science
More informationENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
More informationEnergy Efficient Coverage for Mobile Sensor Network
Volume 55 No., October Energy Efficient Coverage for Mobile Sensor Network Richa Singh Krishna Engineering College, Ghaziabad ABSTRACT Wireless sensor networks comprise the platform of a broad range of
More informationTask-based Self-Organization in Large Smart Spaces: Issues and Challenges 1
Task-based Self-Organization in Large Smart Spaces: Issues and Challenges 1 P. Basu and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, Massachusetts 02215, USA
More informationScaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
More informationRouting Techniques in Wireless Sensor Networks: A Survey
Routing Techniques in Wireless Sensor Networks: A Survey Jamal N. Al-Karaki Ahmed E. Kamal Dept. of Electrical and Computer Engineering Iowa State University, Ames, Iowa 50011 Email: {jkaraki, kamal}@iastate.edu
More informationFoundation University, Islamabad, Pakistan qasim_1987@hotmail.com
Kerberos Authentication in Wireless Sensor Networks Qasim Siddique Foundation University, Islamabad, Pakistan qasim_1987@hotmail.com ABSTRACT We proposed an authentication mechanism in the wireless sensor
More informationA Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng
More informationEfficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
More informationMedium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
More informationEnergy-Efficient Communication Protocol for Wireless Microsensor Networks
Copyright 2 IEEE. Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4-7, 2, Maui, Hawaii. Energy-Efficient Communication Protocol for Wireless Microsensor
More informationFundamentals of Mobile and Pervasive Computing
Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:
More informationSecure Routing in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks
More informationAn Enhanced Hierarchical Energy Efficient Intrusion Detection System for Malicious Packet Dropping Attacks in Wireless Sensor Networks
An Enhanced Hierarchical Energy Efficient Intrusion Detection System for Malicious Packet Dropping Attacks in Wireless Sensor Networks A Thesis Submitted in Partial Fulfillment of the Requirements for
More informationDoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech
More informationReview of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
More informationDelay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng
Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng chi-tsun.cheng@polyu.edu.hk http://www.eie.polyu.edu.hk/~bcheng/ An Overview Introduction Wireless Sensor
More informationA Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy
More informationAn Improved Wireless Sensor Network Protocol to Increase the Network Throughput and Life
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.275
More informationLoad Balanced Data Transmission within the Probabilistic Wireless Sensor Network
Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Jyoti P.Desai 1, Prof Abhijit Patil 2 1 Student, ME Computer Engineering, Yadavrao Tasgaonkar college of Engineering and
More informationPreventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
More informationA Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks
2013 IEEE 27th International Conference on Advanced Information Networking and Applications A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks Daichi Amagata, Yuya Sasaki, Takahiro Hara,
More informationAn Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
More informationSensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao
Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks
More information