Node Degree based Clustering for WSN
|
|
|
- Moses Ryan
- 10 years ago
- Views:
Transcription
1 Node Degree based Clustering for WSN Sanjeev Kumar Gupta Dept. of Electronics & Comm. SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Neeraj Jain Dept. of Computer Science SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Poonam Sinha Prof. & Head CS IT, BU IT Barkatullah University, Bhopal (INDIA) ABSTRACT Wireless Sensor Network (WSN) is widely used for monitoring and gathering data in an autonomous fashion. Since sensors are small and power constrained devices, it is the most important to minimize the energy consumption. We propose Node Degree Based Clustering (NDBC) for enhancing life time of heterogeneous wireless networks. In this paper, two types of sensor nodes, i.e., advanced and normal nodes are used. Advance nodes are having more energy than normal nodes. The advanced nodes are selected as cluster head based on its energy and node degree in the network. Normal nodes are used for sensing and data forwarding. Using NDBC we have reduced communication cost among sensor nodes used for transmitting and receiving the messages for cluster head selection. Simulation results show that by selecting the optimum position of cluster head on the basis of density, the consumption of energy for communication is minimized. It also increases the overall lifetime compared with the existing schemes. KEYWORDS Clustering, density, degree, efficiency, lifetime, WSN. 1. INTRODUCTION With recent advancement in Micro Electro Mechanical System (MEMS) technologies, low-cost and low-power wireless micro sensor nodes have become popular. The Wireless sensor network consists of tiny sensor nodes. Sensor nodes form an ad hoc distributed network to collect the information on the surrounding environment. It is widely used in both the military as well as civil applications such as target tracking, surveillance, security management. It can also be used for sensing of physical environment in terms of temperature, humidity, light, sound, vibration etc. Each sensor node consists of four basic units: sensing unit, processing unit, radio unit, and power unit. Sensor nodes are capable for monitoring, controlling and sensing. The sensor network can provide a fine global picture of the target area through the integration of the data collected from many sensors [1]. We propose NDBC, a distributed clustering scheme which considers energy, node Degree and topological features of a heterogeneous WSN. NDBC provides an efficient solution to handle large scale networks using high energy advance nodes which can work as cluster head. By use of advance nodes in NDBC, it reduces number of packets for communication amongst sensor nodes to select cluster heads, thereby network lifetime increases. NDBC is fast and scalable and it achieves a good distribution of cluster heads within the network. Furthermore, as advance nodes are energy-constrained, they frequently receive data from normal nodes and aggregate it. The aggregated data is forwarded to base station. 2. BACKGROUND DETAILS The sensor nodes have limited power and cannot be easily recharged or replaced when the battery power runs out. The limited energy at each node affects the lifetime of the entire network. As a result energy efficiency becomes important criteria for the protocols and algorithms developed for WSN. Various network architectures and protocols have been developed for organizing the energy to function efficiently [2,3,4,5]. Many clustering schemes have been proposed in recent past. Low Energy Adaptive Clustering Hierarchy (LEACH) [6], is one of the most recognized cluster based protocol. LEACH selects cluster heads dynamically and frequently by a round mechanism and it allows different nodes to become cluster heads at each round. However, the scheme cannot guarantee a good cluster distribution. Power Efficient Gathering in Sensor Information Systems (PEGASIS) [7], is an extension of LEACH, in which all nodes are organized as a chain and each node transmits data to its nearest neighbor. Both LEACH and PEGASIS require strict time synchronization mechanisms. The Hybrid Energy-Efficient, Distributed (HEED) [8], clustering protocol uses a hybrid criterion for cluster head selection. It considers the residual energy of each node and a secondary parameter, such as the node s proximity to its neighbors or the number of its neighbors. The clustering process terminates in O (1) iterations and does not depend on the network size. M. Gerla et. al. has proposed the Highest-Degree scheme [9]. In this method, node with the maximum number of neighbors is chosen as a cluster head and any tie is broken by the unique IDs. In Energy Efficient Clustering with Self-organized ID Assignment (EECSIA) [10], a network first selects the nodes in the high-density areas as cluster heads and then assigns a unique ID to each node based on local information. In addition, EECSIA periodically updates cluster heads according to the nodes residual energy and density. This method is independent of time synchronization. It does not rely on the nodes geographic locations. Simulation results show that the scheme performs well in terms of cluster scale and number of nodes alive over rounds. There are many ID assignment schemes use IDs to distinguish the nodes in the network. There are many algorithms generated to assign the ID either in a predefined manner or locally generated. C. Schurgers et. al. [11] utilizes a proactive conflict detection procedure for a general sensor network. When a node joins the network, it 49
2 first chooses a random physical ID and then informs to all neighbors periodically. By exchanging this kind of HELLO messages, 2-hop neighbor information is acquired from which ID conflicts can be resolved. H. B. Zhou et.al. [12] has proposed a method in which the nodes randomly choose an ID when is likely to be unique within a 2-hop neighborhood. No conflict resolution is performed until data communications are initiated. O.A.V. EL Moustapha [13] proposed a scheme that assigns globally unique IDs. It uses a tree structure to compute the size of the network and then unique IDs are assigned using the minimum number of bytes. However, this protocol has to use not only temporary ID and final ID but also sub-tree size, which results in high communication cost. After going through above literature it appears that all normal nodes are intending to compete for becoming cluster head. During this process all nodes are degrading their energy in transmission and reception of packets. In the present paper only the few number of nodes are competing for becoming cluster head. The rest of the paper is organized as follows: Section 3 describes the network model, energy consumption model and clustering objectives. Section 4 presents the NDBC in detail and analyzes its properties. Section 5 verifies the effectiveness of the NDBC via simulations. In Section 6, we conclude the paper with summary and possible directions for future work. 3. NETWORK MODEL, ENERGY CONSUMPTION MODEL AND CLUSTERING OBJECTIVES 3.1 Network model Network model consist of N nodes in M x M network field as shown in Fig 1. In our network model the following assumptions have been made for sensor nodes as well as the networks. The sensor nodes are randomly deployed or scattered in the network. There is one base station which is located at the centre of sensing field. Nodes are not aware of location. All nodes have similar capabilities in term of processing and communicating range. They are having equal significance. It arises the need for extending the lifetime of every sensor. The network is heterogeneous therefore energy heterogeneity is used. Two types of sensor nodes are deployed i.e. advanced nodes and normal nodes. Advanced nodes have more energy than normal nodes. In this network unique IDs are used for identification of advanced nodes as well as normal nodes so as to make Fig. 1: Wireless Sensor Network 3.2 Energy Consumption Model We use the same energy consumption model as suggested by A.P. Chandra Kasan et.al. [6]. Energy is consumed to serve: (i) digital electronics, E elec (depending on factors such as the digital coding, modulation and spreading of the signal) (ii) communication, E com. In our work, both the free space (d 2 power loss) and multi-path-fading (d 4 power loss) channel models are used, depending on the distance d between the transmitter and receiver. E com = ε f s assuming a free space model when d < d 0, while E com = ε mp assuming a multi path model when d d 0, where ε f s and ε mp are the amplifier energy factors for free space and multi path fading channel models, respectively d 0 is the threshold distance which depends on the environment. Thus, it transmits an l bit message with distance d, the radio expends as follows: E TX (l,d) = le elec + l ε fs d 2, d > d 0 le elec + l ε mp d 4, d > d 0 (1) To receive an l bit message, the radio expends E RX (l) = le elec (2) In our simulations, the typical parameters are set as: E elec = 50nJ/bit, ε f s = 10pJ/bit/m 2, ε mp = pJ/bit/m 4. In addition, the energy for data aggregation is set as E DA = 5nJ/bit. 3.3 Clustering objectives The proposed clustering approach is directed by two fundamental requirements: energy conservation and degree. Let CH be the set of all cluster heads in the network. Our goal is to select the optimum number of advance nodes as cluster head so that each node in the network belongs to a cluster. A node in NDBC may be in one of the four possible states: cluster head, 1-hop member node (an immediate neighbor of a cluster-head), 2-hop member node (an immediate neighbor of a 1-hop member node) and unclustered node (not a member of any cluster). In the proposed scheme, each node can relay its data within 2 hops to the cluster head and assigns its unique ID based on local information. In NDBC algorithm, only fraction of nodes (advanced node) are becoming cluster head. In NDBC, clustering is completely distributed. Each advanced nodes interacts with the neighbor normal nodes to form clusters. This scheme is better than central controlled schemes because it reduces the amount of central coordination and enables the node to act independently. The advanced nodes make their own 50
3 decision according to their schedules. Also the clustering process will occur within a fixed time interval. 4. THE NDBC Let P be the set of all advanced nodes (P n ) and normal nodes (P m ) deployed in the region of interest. A normal node P m i is considered to be a neighbor of advanced node P ni,if P m i lies within the radio range of P ni, where P ni, P m i P. We define Node Degree (P ni ) as the total number of neighbors of advanced nodep ni, then: Node Degree (P ni ) = count ({P m i dist (P ni, P m i ) < R c, P m i P, P m i P ni }) (3) Where dist (P ni, P m i ) represents the distance between node P ni and node P m i, R c stands for node radio range and count stands for the number of elements in a finite set. In NDBC, no GPS or other location-awareness mechanism is available. We therefore use Node Degree to compare the density of nodes in the network. It is to be noted that each normal node belongs to exactly one cluster. The minimization of clusters number with full coverage is exactly equivalent to maximization of the average cluster size while maintaining a full coverage. We would like to select the advance nodes deployed in dense areas as cluster head. Fig. 2: Clustering Model of NDBC In many cases, the nodes distributed in sparse regions or at the edge of the network cannot directly communicate with cluster heads due to limitation on their radio ranges. There are tradeoffs among connectivity, energy usage, and communication latency. In our work, communication between a cluster head and a node beyond the radio range of the cluster head is achieved through intermediate nodes (1-hop member nodes) which provide relaying service. Four different messages in the clustering process are defined as follows: ABDICATE-MSG: Sent by each cluster head to notify its member nodes of its unwillingness to serve as the cluster head in the next round. 4.1 Detailed NDBC Algorithm Cluster formation phase At the start of the scheme, all nodes advanced and normal are unclustered. Each advanced node broadcasts an update packet of HELLO MESSAGE to its neighbors within the range R C at a random time between 0 and a certain upper bound T max. After getting the received packets from normal nodes, every advanced node calculates its node degree. The delay of node P ni is given by T Pn i, given as T Pn i = αe 1/NodeDegree(P ni )) (4) Where α is a given constant to ensure 0 < T Pm T max. After that, every advanced node sends DEGREE MESSAGE to its neighbor advanced nodes and checks the node degree with in time T max and T max + T Pn. If the node degree of neighbor advanced nodes is less than its own, it will choose a 2 m byte, m is a constant that needs to be selected carefully in practice according to the scale of the sensor network, random integer as its ID and announces itself as a cluster head and then advanced node will send a STATE MESSAGE to its neighbors node to indicate its status as shown in fig 2. As in equation (4), the node delay time is an increasing function. It means a node with the larger node degree among its neighbors.i.e. in a denser area, will have more probability to be selected as a cluster head. If the node degree of any advanced node is less than its any neighbor s advanced node, it will work as normal node. If normal node will receives a cluster head state message from the advanced node and not belonging to any other cluster than it will send a confirm message to advance node. Now the normal node becomes a 1 hop node. It will create its own ID and send a state message to its neighbors within their region. If an unclustered node receives a state message from a 1 hop member node, it will declare itself as a 2 hop member node. The 2 hop member node also chooses its own ID, which is m byte random integer added at the end of the selected 1 hop member nodes ID. It may rarely happen that two sensor nodes within a same cluster choose the same random number. This conflict can be solved through the cluster head by giving one of the nodes a different ID. Thus, at the end of this phase every node has its locally unique ID and knows which cluster it belongs to. DEG-MSG: Sent by each advance sensor node to its neighbors advance sensor node to indicate its Node Degree. STATE-MSG: Sent by each sensor node to its neighbors to indicate its current state. JOIN-MSG: Sent by an unclustered node to notify the cluster head/1-hop member node that it wants to be a 1-hop member node/2-hop member node. 51
4 Fig. 3: The flow chart of NDBC for Advanced Nodes Fig. 4: The flow chart of NDBC for Normal Nodes 52
5 4.1.2 Cluster head migration phase Note that the ID of cluster head is same as its 1-hop members IDs without the last m bytes, similarly the 1- hop member nodes IDs are same as its members IDs without the last m bytes. Therefore it is not necessary for the cluster head to store the information of nodes belonging to another cluster. For a given cluster, let S 1 be the set of all 1-hop member nodes and S 2 be the set of all 2-hop member nodes. When the TDMA schedule is executed by all nodes in the cluster, each 2-hop member node in S 2 (denoted by S 2 i) starts transmitting the sensing data to the 1-hop member node during its allocated transmission slot. Then each 1- hop member node in S 1 (denoted by S 1 j ) aggregates all the received data and sends them to the cluster head (denoted by CH k ). Assume the distance among the nodes in a cluster is less than d 0. The energy dissipation follows the free space model. The energy consumption for S 2 i and S 1 j is shown as following: E S1i = l E elec + kl εf s dist2(s 1i, S 1j ) (5) E S1j = l E elec count (M2 hop (S 1j )) + l E DA (count(m2 hop(s 1j )) +) + l (E elec + εfsdist2(s 1j, CH k )) (6) Where l is the length in bits in each data message, S 2 i M2 hop (S 1 j), S 1 j M1 hop (CH k ). M2 hop (S 1 j) denotes the set of all members of S 1 j, and M1 hop (CH k ) denotes the set of all 1-hop members of each cluster head CH k. Finally, the cluster head aggregates the data from the 1- hop members and transmits the final aggregated data to the base station. Assume the distance to the base station is greater than d 0, therefore the multi-path model is used as given in equation (7). Otherwise it follows free space model as given in equation (8). The energy dissipated in CH k is: E CH k = l E elec count M1 hop CH k + l E DA count M1 hop CH k l (E elec + mpdist4(ch k, BS)) (7) E CH k = l E elec count(m1 hop(ch k )) + l E DA (count(m1 hop(ch k )) + 1) + l (E elec + mpdist2(ch k, BS)) (8) Where dist (CH k, BS) is the distance between CH k and the base station. We introduce the energy threshold E th for each cluster head to decide whether to continue to serve as a cluster head in the next round. If the residual energy, E re of the current cluster head is below E th. It will be replaced by one of its neighbor advance node having node degree maximum among its neighbor advance nodes. It will work as a normal node in the next round. The flow chart of the algorithm shown in fig 3 and 4 for clustering process. 5. SIMULATION AND ANALYSIS We have simulated the wireless sensor networks in MATLAB environment in 100x100 fields. The table 1 shows the basic simulation parameters used. Initial energy Table 1: Simulation parameters Parameter Network size Value (100m x100m) Node number 200 BS Position (50m, 50m) E th d 0 Normal Nodes Advanced Nodes 2 J 4J 1 J 87m ε f s 10pJ/bit/m 2 ε mp pJ/bit/m 4 Message Size (l) T max R c 4000 bits 500ms 20m 5.1 Network lifetime It is the time interval from the start of operation of the sensor network until the death of the last alive node. We observe the performances of NDBC, EECSIA, LEACH and Highest Degree for number of node alive over number of rounds in the network as shown in fig 5. In case of NDBC lifetime is more as compared to others. Fig. 5: Number of nodes alive over rounds 53
6 5.2 Normal nodes alive over advanced nodes In this case we have calculated the number of normal nodes alive if number of advanced nodes varies for fixed 300 rounds. But after some time, numbers of nodes are alive is decreasing due to advance nodes threshold as shown in fig 6. Table 2 shows the percentage of alive normal node varied with the advanced node. Table 2: Normal Nodes alive over advanced nodes %Advanced Node Normal node Alive Fig. 6: Number of nodes alive over advanced nodes 5.3 Stability period It is the time interval from the start of network operation until the death of the first sensor node. We also refer to this period as stable region. In this parameter advanced nodes are deployed with two times more energy than normal nodes. The first node dies after 56 rounds when we use the percentage of advanced nodes as 0.05 as shown in table 3. On increasing number of advance node stable region is also increasing, as shown in fig 7. %Advanced Node Table 3: Stability period First Node Die Fig. 7 : First node die over Advance Nodes 6. CONCLUSION AND FUTURE WORK This paper presents NDBC, a distributed energy efficient clustering approach based on its energy and node degree for the selection of cluster head. We have decreased the overall communication cost for selecting cluster-head and thereby it increases overall network lifetime. The present simulation gives better results than EECSIA LEACH and Highest Degree. The future scope will be to extend the NDBC with mobile nodes. 7. REFERENCES [1] I. F. Akyildiz, W. Su, Y.Sankarasubramaniam, and E.Cayirci, Wireless sensor networks: a survey, Computer Networks, vol. 38, no. 4, March 2002, pp [2] J.N. Al-Karaki and A.E. Kamal, Routing techniques in wireless sensor networks: a survey, IEEE Wireless Communications, vol. 11, no. 6, Dec 2004, pp [3] E. Hansen, M. Nolin, M. Bjorkman, A Study of Maximum Lifetime Routing in Sparse Sensor Networks, in Proceedings of International Conference on Complex, Intelligent and Software Intensive Systems (CISIC), Spain, Mar 2008, pp [4] S. M. Guru, M. Steinbrecher, S. Halgamuge, and R. Kruse, Multiple Cluster Merging and Multihop Transmission, LNCS 4459: AGPC, Springer, 2007, pp [5] M. Kochhal, L. Schwiebert, and S. Gupta, Selforganizing of wireless sensor networks, in Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to- Peer Networks, J. Wu, Ed. Auerbach Publications, 2006, pp [6] A. P. Chandrakasan, A. C. Smith and W. B. Heinzelman, An Application Specific Protocol Architecture for Wireless Microsensor Networks, IEEE Transactions on Wireless Communication, vol. 1, no. 4, 2004, pp [7] S.Lindsey and C. S.Raghavendra, PEGASIS: powerefficient gathering in sensor information systems, In Proc. of the IEEE Aerospace Conference, 2002, pp
7 [8] O. Younis and S. Fahmy, HEED: A hybrid, energyefficient, distributed clustering approach for ad hoc sensor networks, IEEE Trans. on Mobile Computing, vol. 3, no. 4, 2004, pp [9] M. Gerla and J.T.-C. Tsai, Multicluster, mobile, multimedia radio network, Wireless Networks, vol. 1, no. 3, 1995, pp [10] Qingchao Zheng, Z. Liu, Liang Xue, Yusong Tan, Dan Chen, and Xinping Guan, An Energy Efficient Clustering Scheme with Self-organized ID Assignment for Wireless Sensor Networks th IEEE International Conference on Parallel and Distributed Systems, [11] C. Schurgers, G. Kulkarni and M. B. Srivastava, Distributed On-Demand Address Assignment in Wireless Sensor Networks, IEEE Trans. Parallel Distributed System, vol. 13, no. 10, 2002, pp [12] H. B. Zhou, M. W. Mutka and L. M. Ni, Reactive ID Assignment vfor Sensor Networks, Proceedings of IEEE MASS 2005: 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, [13] O. A. V. ELMoustapha, Distributed unique global ID assignment for sensor networks, Ad Hoc Networks, vol. 7, no. 6, 2005, pp
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks
Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Sangeeta Rao Department of Computer Science Central University of Haryana Mahendergarh, Haryana, India
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Keywords Wireless Sensor Network (WSN), Low Energy adaptive Clustering Hierarchy (LEACH), Cuckoo Search, Cluster Head (CH), Base Station (BS).
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Relative Analysis
The Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS.
MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS. NAUMAN ISRAR and IRFAN AWAN Mobile Computing Networks and Security Research group School of Informatics University of Bradford,
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks Chaitanya Mankar 1, Vidhya Dhamdhere 2 1 MECN, G. H. Raisoni College of Engineering and Management (GHRCEM), India 2 Faculty, Computer Department, G.H.Raisoni
Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks
August 26, 2002 TR CS-02-12 Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks Konstantinos Kalpakis 1,2, Koustuv Dasgupta 1, and Parag Namjoshi 1 Computer Science and Electrical
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
Hybrid Data Gathering Scheme in Wireless Sensor Networks
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 19 No. 2 (2011), pp. 73-88 Hybrid Data Gathering Scheme in Wireless Sensor Networks Swarup Kumar Mitra 1, Ayon Chakraborty 2, Mrinal Kanti Naskar 2 1 MCKV Institute
Research Article CAPNet: An Enhanced Load Balancing Clustering Algorithm for Prolonging Network Lifetime in WSNs
International Distributed Sensor Networks, Article ID 234394, 8 pages http://dx.doi.org/1.1155/214/234394 Research Article CAPNet: An Enhanced Load Balancing Clustering Algorithm for Prolonging Network
Wireless Sensor Network: Improving the Network Energy Consumption
Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
BIO-INSPIRED, CLUSTER-BASED DETERMINISTIC NODE DEPLOYMENT IN WIRELESS SENSOR NETWORKS. Vergin Raja Sarobin M. 1*, R. Ganesan 1
International Journal of Technology (2016) 4: 673-682 ISSN 2086-9614 IJTech 2016 BIO-INSPIRED, CLUSTER-BASED DETERMINISTIC NODE DEPLOYMENT IN WIRELESS SENSOR NETWORKS Vergin Raja Sarobin M. 1*, R. Ganesan
Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks
J Inf Process Syst, Vol.10, No.2, pp.300~313, June 2014 http://dx.doi.org/10.3745/jips.03.0006 pissn 1976-913X eissn 2092-805X Power Consumption Analysis of Prominent Time Synchronization Protocols for
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India
Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
Fuzzy-Based Clustering Solution for Hot Spot Problem in Wireless Sensor Networks
Fuzzy-Based Clustering Solution for Hot Spot Problem in Wireless Sensor Networks Mahmoud Naghibzadeh Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran [email protected]
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran [email protected]
Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks
928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Data Aggregation and Gathering Transmission in Wireless Sensor Networks: A Survey
Data Aggregation and Gathering Transmission in Wireless Sensor Networks: A Survey PHANI PRIYA KAKANI THESIS WORK2011-2013 SUBJECT Master of Electrical Engineering: Specialization inembedded Systems Postadress:
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks
LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks Wenlu Yang 1, 2, Chongqing Zhang 2, Minglu Li 2 1 Department of Electronic Engineering, Shanghai Maritime University, Shanghai, China
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu [email protected] Jen-Hou Liu [email protected] Min-Sheng
Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks
Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks Navyasree Veeramallu M.Tech DECS Gudlavalleru Engineering College Gudlavalleru- 521356, Krishna District, Andhra
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
Recent advances in microelectromechanical
COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas
I.J.Computer Network and Information Security, 21, 2, 26-32 Published Online December 21 in MECS (http://www.mecs-press.org/) Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
Local Load Balancing for Globally Efficient Routing in Wireless Sensor Networks
International Journal of Distributed Sensor Networks, 1: 163 185, 2005 Copyright Taylor & Francis Inc. ISSN: 1550-1329 print/1550-1477 online DOI: 10.1080/15501320590966431 Local Load Balancing for Globally
Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm
Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm Damianos Gavalas, Grammati Pantziou, Charalampos Konstantopoulos, Basilis Mamalis Department of Cultural Technology
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
Access Control And Intrusion Detection For Security In Wireless Sensor Network
Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
Copyright 2 IEEE. Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4-7, 2, Maui, Hawaii. Energy-Efficient Communication Protocol for Wireless Microsensor
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Remote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: [email protected] #D.Upender 2, Asst.Professor, E mail: [email protected] #Department
Multipath fading in wireless sensor mote
Multipath fading in wireless sensor mote Vaishali M.Tech (VLSI), IMSEC, Ghaziabad/MTU, Noida Abstract: In this paper we study about the new technology as to transfer the data with the help of smart device,
MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.3, September 2010 DOI : 10.3745/JIPS.2010.6.3.295 MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Mohamed Mostafa
Design of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]
