Energy Efficient Schemes for Wireless Sensor Networks with Multiple Mobile Base Stations
|
|
|
- Rosamond Jane Atkinson
- 10 years ago
- Views:
Transcription
1 Energy Efficient Schemes for Wireless Sensor Networks with Multiple Mobile s Shashidhar Rao Gandham, Milind Dawande, Ravi Prakash and S. Venkatesan Department of Computer Science School of Management University of Texas at Dallas, Richardson, TX {gshashi, milind, ravip, venky}@utdallas.edu bstract One of the main design issues for a sensor network is conservation of the energy available at each sensor node. We propose to deploy multiple, mobile base stations to prolong the lifetime of the sensor network. We split the lifetime of the sensor network into equal periods of time known as rounds. Base stations are relocated at the start of a round. Our method uses an integer linear program to determine new locations for the base stations and a flow-based routing protocol to ensure energy efficient routing during each round. We propose four metrics and evaluate our solution using these metrics. Based on the simulation results we show that employing multiple, mobile base stations in accordance with the solution given by our schemes would significantly increase the lifetime of the sensor network. I. INTRODUCTION sensor network is a static ad hoc network consisting of hundreds of sensor nodes deployed on the fly for unattended operation. Each sensor node is equipped with a sensing device, a low computational capacity processor, a short-range wireless transmitter-receiver and a limited battery-supplied energy. Sensor nodes monitor some surrounding environmental phenomenon, process the data obtained and forward this data towards a base station located on the periphery of the sensor network. Base station(s) collect the data from the sensor nodes and transmit this data to some remote control station. Sensor network models considered by most researchers have a single static base station located on the periphery of the sensor network [], [7], [], [4]. Past research has focused on developing energy efficient protocols for Medium ccess Control (MC) [] and routing [], [3], [5], [6], [7].. dvantage of Employing Multiple s Consider two different sensor network deployments as shown in Figure. In Figure (b) sensor node is one hop away from its nearest base station when two base stations are deployed. For sensor node B the hop-count from its nearest base station is same in both the cases. Thus, by employing two base stations instead of one we have effectively either reduced or retained the hop count of each sensor node in the network. Since the energy consumed in routing a message from any sensor node to its nearest base station is proportional to number of hops the message has to travel, employing multiple base stations effectively reduces the energy consumption per message delivered. B (a) Circular Sensor Field (Single ) Fig.. B (b) Circular Sensor Field (Two s) Circular Field of Interest B. Why move s? In [7], the authors demonstrated through experimental results that the sensor nodes which are one-hop away from a base station drain their energy faster than other nodes in the network. The authors attribute this to the fact that nodes which are one hop away from a base station need to forward messages originating from many other nodes, in addition to delivering their own messages. In doing so, these sensor nodes deplete their energy quickly and become inoperational. s a result, many sensor nodes will be unable to communicate with the base stations and the network becomes inoperational. To increase the lifetime of a sensor network, we propose to employ multiple base stations and periodically change their locations. We propose two strategies to choose base station locations and compare the performance of these strategies with three other strategies. We also propose a routing protocol based on flow information. Through simulations we show that our strategies outperform all the other strategies. II. SYSTEM MODEL We make the following assumptions about the network: ) Each sensor node has a unique pre-configured id. ) The sensor network is proactive [] and each node generates equal amount of data per time unit. We assume that each data unit is of same length. 3) The transmission range of each sensor node is fixed. 4) The transceiver exhibits first order radio model characteristics [7], where energy dissipation for the transmitter or receiver circuitry is constant per bit communicated. lso, energy spent in transmitting a bit over a distance d is proportional to d. It can also be argued that transmission energy is proportional to d 4 [8]. GLOBECOM /3/$7. 3 IEEE
2 5) There exists a contention free MC protocol [] which provides channel access to all the nodes. 6) There exists a multi-hop routing protocol. For example, the Minimum Cost Forwarding (MCF) protocol for large sensor networks [5] can be used. 7) n upper bound on the number of base stations available is fixed and is known a priori. 8) We consider equal periods of time called rounds. t the beginning of each round new base station locations are computed and stay fixed during that round. 9) Base stations can be located only at certain sites, called feasible sites. Base stations are mounted on unmanned remote controlled vehicles and can be moved from one feasible site to another. III. PROBLEM FORMULTION t the beginning of each round, we need to determine the location of the base stations at feasible sites. We refer to this problem as the Location (BSL) problem. The sensor network is represented as a graph G(V, E) where (a) V = V s V f where V s represents the sensor nodes and V f represents the feasible sites. (b) E V V represents the set of wireless links. Let K max be the maximum number of base stations. Let a round consist of T timeframes. Each sensor node generates one packet of data in every timeframe. t the beginning of a round, let a sensor node i have residual energy RE i. constraint we impose is that during the round, the total energy spent by sensor node i is at most αre i, where <α is a parameter. Next, we describe an integer linear program formulation for the BSL problem. IV. N INTEGER LINER PROGRM FORMULTION Let y l be a - integer variable for each l V f such that y l = if a base station is located at feasible site l; otherwise. N(i) = {j : (i, j) E}. GivenG(V, E), α and K max, the following Integer Linear Program (ILP) [9], [5], denoted by BSL mm (G, α, K max ), minimizes the maximum energy spent, E max, by a sensor node in a round. E t E t Minimize E max x ij x ki = T, i V () x ij + E r x ij + E r x ki αre i, i V () y l K max (3) l V f x ik T V s y k, k V f (4) i V s x ki E max, i V (5) x ij, i V s,j V ; y k {, }, k V f (6) Wireless links between sensor nodes and a feasible site refer to the links that would exist if a base station is located at that particular site. ssuming no data aggregation, the balance of flow of messages at each node is represented by (), where x ij represents number of messages node i transmits to j N(i) in a particular round. Let E r (resp. E t ) be the energy spent by a sensor node in receiving (resp. transmitting) a message. E r and E t can be calculated from antenna characteristics. Then the total energy spent by all the nodes during a particular round is bound by (). The number of feasible sites selected to locate the base stations is limited to at most K max by (3). Constraints (4) ensure that transmission of messages to a feasible site is possible only if a base station exists at that site. The objective function and constraint set (5) minimize the maximum energy spent by any sensor node during the round. nother reasonable objective is to minimize total energy consumption during a round. To optimize this objective function we remove the constraint set (5) and change the objective function to Minimize E t i V s x ij + E r i V s x ki. We refer to this problem as BSL me (G, α, K max ). Solving any of these ILPs would give us the locations of base stations and flow of messages in the network. Since solving integer linear programs can be time consuming, good feasible solutions are sufficient. Next, we describe how the flow information (values of x ij ) can be used to route messages to the selected base stations. V. FLOW BSED ROUTING PROTOCOL Sensor nodes can use the flow information obtained by solving the integer linear program to route messages in an energy efficient manner. Consider sensor node with its incoming and outgoing number of messages as shown in Figure. Once a sensor node has this information it would perform its routing as described below i j k Fig.. l m n Flow Based Routing (i) For every outgoing link a counter is maintained. The value of the counter is set to the floor of the flow going out on that particular link. (ii) Whenever a node needs to transmit its packets, it would select one of the outgoing links in a round robin fashion. (iii) If the counter value of the selected link is greater than the number of packets that have to be transmitted, then all the packets are transmitted on that link and counter value is decremented by the number of packets Data aggregation refers to the local processing of data carried out at each sensor node. For example, if the goal is to monitor the maximum temperature in a region then it is inefficient to forward all the temperature data to the base station. Instead, each sensor node would transmit only the maximum among the values it has seen so far. GLOBECOM /3/$7. 3 IEEE
3 transmitted; otherwise the number of packets equal to the counter value of the link are transmitted along the link and its counter value is set to. To transmit the remaining messages outgoing links are selected in a round robin fashion. (v) If the counter value of all the outgoing links is zero then a link is selected arbitrarily and all the packets are transmitted on this link. Example: Suppose node in Figure had 5 packets to transmit. If link l was selected then packets would be transmitted on this link and its new counter value would be set to. The remaining 5 packets would be transmitted on m and its counter values would be updated to 45. The main idea behind this heuristic is that when the number of packets to be transmitted is large, the routes taken by the packets closely follow the flow information on the outgoing links. VI. IMPLEMENTTION DETILS To implement the proposed solution, we need to address the following issues.. Gathering topology information. B. Tracking residual energy of nodes. C. Updating routing information of all the nodes. D. Solving ILP. t the beginning of the first round, network topology, required to formulate the ILPs, is not available. In the first round, we propose to select the base station locations randomly and use a modified Minimum Cost Forwarding (MCF) routing protocol 3 [5]. Once the network topology is obtained in the first round, it can be used in subsequent rounds to solve the ILPs.. Gathering Topology Information To formulate the ILPs described we need to know the topology of the sensor network. contention-free MC protocol, say SMCS [], will let each node learn about the identities of its neighbors. Each node then transmits its neighbor list to its nearest base station. The complete sensor network topology can be constructed at one of the base stations. part from the topology information, we need to know which sensor nodes are one-hop away from the feasible sites. We propose to manually deploy one special sensor at each feasible site. The node ids of these special sensors are known a priori. These special sensors participate in the MC protocol as ordinary sensors. Once the neighbor list of all the nodes is collected at the base stations, sensor nodes one hop away from feasible sites can be determined. B. Tracking Residual Energy of Nodes In the beginning, every sensor node has the same amount of energy and this value is known. s routing is deterministic, we know the exact route taken by each message and hence the 3 Each sensor node would keep track of all the nodes that are on the shortest path from itself to the base station. When a packet is to be forwarded, the packet is transmitted to only one of these nodes. energy spent by each node. We can thus compute the residual energy of each node at the end of a round. To account for the possibility of sensor node failure due to environmental reasons we need to either include mechanisms to track source node id of each message or expect each sensor node to transmit a heart beat packet periodically. C. Updating Routing Information of Each Node To perform flow-based routing, the sensor nodes need the flow information. We propose to transmit this flow information directly to the sensor nodes from the base station. In doing so, sensor nodes would spend energy only in receiving the messages. In other routing protocols, each node is required to transmit and receive multiple messages to establish routing information [5]. Thus transmitting the flow information directly to sensor nodes would conserve energy in the sensor network. D. Solving ILP ny efficient integer linear programming solver (e.g. CPLEX, Xpress-MP) can be used to solve the BSL problem in each round. s stated earlier, our goal in formulating the integer linear program is not to solve it to optimality but to obtain good feasible solutions in the available time. The integer programs can be solved at one of the base stations. VII. EVLUTION METRICS The main objective of this study is to increase the useful lifetime of sensor networks. However, a precise definition of the lifetime is application dependent. Some applications might tolerate a loss of considerable number of nodes and still be deemed functional, while in others losing a single sensor node will render the network worthless. Below we discuss some evaluation metrics. ) Time until the first node dies: This metric indicates the duration for which the sensor network is fully functional. ) Time until a β fraction of nodes die: The suitability of this measure is application dependent. cross applications, choosing β =.5 seems to be appropriate. Unless specified otherwise, we use this metric to indicate the lifetime of the network. 3) Total number of messages received: Total number of messages received until a β fraction of the nodes die indicates the amount of information collected until that time. This measure is an indicator of the total amount of information collected during its lifetime. 4) Energy spent per round: The total amount of energy spent in routing messages in a round is a short-term measure designed to provide an idea of the energy efficiency of any proposed method in a particular round. VIII. SIMULTION RESULTS To compare the proposed solutions, we simulated a sensor network of 3 nodes randomly distributed in a 3 3 metersquare sensor field. feasible sites were located randomly on the periphery of the sensor field. maximum of 3 base stations were made available. Each sensor node was provided with an GLOBECOM /3/$7. 3 IEEE
4 initial energy of.5 J. The transmission range of each sensor node was set to meters. The energy spent in transmitting a bit over a meter distance is taken as. nj/bit-m [7] and the energy spent in receiving a bit is set to 5 nj/bit [7]. The packet length is fixed at bits. Each round lasts timeframes. To solve each instance of either BSL mm (G, α, K max ) or BSL me (G, α, K max ) we used CPLEX (version 7.5) with a time limit of 4 minutes. The best feasible solution within this time limit was accepted. For each instance, the value of α was initially set to. and incremented in steps of. in case the instance was infeasible. On this simulated sensor network we implemented following schemes for a comparative study. (a) Scheme. single, static base station. (b) Scheme. Three static base stations. (c) Scheme 3. Three mobile base stations with random positioning among the feasible sites. (d) Scheme 4. Three mobile base stations with locations obtained by solving BSL me (G, α, K max ). (e) Scheme 5. Three mobile base stations with locations obtained by solving BSL mm (G, α, K max ). In the third scheme, at the start of each round base station locations were determined randomly. In schemes,, 3 and 4 we employed modified MCF routing. Flow-based routing was used in scheme 5. For each of the schemes above, Figure 3(a) compares the time until the first node dies. Scheme 5 significantly outperforms other schemes. This is not surprising since BSL mm minimizes the maximum energy spent by a node in a round. Therefore, the outgoing flow from a sensor node is split across various paths (if they exist) leading to the selected base stations. There is an equitable distribution of energy consumption by the sensor nodes in each round. Using flow-based routing, which mimics the network flow obtained by BSL mm, energy dissipation is uniform across all nodes resulting in the network being fully operational for a longer period of time. On the other hand, using BSL me minimizes the total energy usage in a round and does not prevent an individual sensor node from draining more energy than other nodes. s a result, the first node dies relatively quickly when compared to scheme 5. We observed similar trends on networks with 5,, 5 and sensor nodes. It can be concluded that irrespective of size of the network, scheme 5 would be the best option available if all the sensor nodes are required to be functional throughout the lifetime of the network. Figure 3(c) compares the number of messages delivered in each round. Scheme 5 delivers all the messages throughout the lifetime of the network. For all the other schemes, the number of messages delivered decreases with time as the fraction of dead sensor nodes increases. n interesting observation is that with scheme 5, death of the first node (which is a node one-hop away from a base station) is soon followed by the death of all one-hop away nodes and the network becomes inoperational. This will explain the fact that the total number of messages delivered by scheme 5 is less than that of scheme 4 (as shown in Figure 3(b)) Number of Messages Received Single Static 3 Static 3 3 Randomly Mobile 4 Min Total Energy 5 Min Max Schemes (a) for First Node to Die Total Number of Messages Received 6 x 5 Single Static 3 Static Randomly Mobile 4 Min Total Energy 5 Min Max Schemes (b) Number of Messages Received at s Single Static 3 Static 3 Randomly Mobile Min Total Energy Min Max (c) Number of Messages Received at s in Each Round Fig. 3. Simulation Results Figures 4(a) and 4(b) compare the energy spent in each round. s expected, scheme 4, in which BSL me (G, α, K max ) minimizes the total energy spent in a round, is the most energy efficient scheme. When base stations are located randomly (scheme 3), the energy consumption varies widely across rounds depending on whether or not the base station locations constitute a good solution. The energy consumption plot in scheme is similar to a step function. In this scheme, whenever a sensor node dies, some shortest path routes are erased and the energy consumption increases and stays the same until a new set of shortest path routes are found.. Impact of the Number of vailable s We assess the impact of the number of base stations on the lifetime of the sensor network by increasing K max from to. We use scheme 5 to determine the base station locations and message routing. s seen in Figure 5(a) increasing the number of base stations beyond a certain threshold value does not affect the lifetime. We offer the following explanation: the lifetime of the network increases with the number of base stations until every sensor node one hop away from a feasible site is one hop away from some base station. Increasing the GLOBECOM /3/$7. 3 IEEE
5 x 8.8 Single Static 3 Static 3 Randomly Mobile. x 8.8 Min Total Energy Min Max assumed to be proportional to d 4. Similar results were obtained and the maximum lifetime was noticed when the transmission range is 4 meters. Nano Joules (a) Fig. 4. Nano Joules (b) Energy Spent in Each Round IX. CONCLUSIONS In this paper we have proposed an energy efficient usage of multiple, mobile base stations to increase the lifetime of wireless sensor networks. Our approach uses an integer linear program to determine the locations of the base stations and a flow-based routing protocol. We conclude that using a rigorous approach to optimize energy utilization leads to a significant increase in network lifetime. Moreover, the tradeoff between solution quality and computing time allows us to compute near-optimal solutions within a reasonable time for the network sizes considered. To adopt the approach presented in this paper to very large sensor fields, it might be appropriate to decompose the underlying flow network into sub-networks and optimize energy usage in each sub-network independently. challenging and promising direction for future work is to explore the use of graph partitioning algorithms [4], particularly those for finding balanced partitions [6], [], within such a framework Number of s (a) Number of s Fig Transmission Range (b) Transmission Range Parameters Effecting Network Lifetime number of base stations any further has no advantage and hence does not affect the network lifetime. B. Impact of Transmission Range Increasing the transmission range of the sensor nodes changes the topology of the sensor network since the number of one-hop neighbors for a sensor node increases [3]. To study the impact of the transmission range on network lifetime, we simulated a sensor network consisting of nodes randomly distributed in a x field with 3 base stations. Scheme 5 was used to determine the base station locations and message routing. Hundred experiments, where experiment i, i =,..., used a transmission range of i meters for each sensor node, were performed. Figure 5(b) shows a plot of the results. For a very small transmission range (less than 3 meters), there is little or no transmission as for most sensors there is no route to any feasible site. Beyond this point, as the transmission range increases, the connectivity of network increases resulting in an increase in network lifetime. The lifetime reaches a maximum when the transmission range is around 45 meters. further increase in the transmission range has little impact on the connectivity and the quadratic rate of increase in energy consumption becomes dominant resulting in a quadratic rate of decrease in the network lifetime. We repeated the experiments with energy of each sensor node set to J. The energy spent in transmitting a message was REFERENCES []. Manjeshwar and D.P. grawal. TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. Intl. Proc. of 5th Parallel and Distributed Processing Symp., pages 9 5,. [] C. M. Okino and M.G. Corr. Statistically ccurate Sensor Networking. Wireless Communications and Networking Conference,. [3] C. Schurgers and M.B. Srivastava. Energy Efficient Routing in Wireless Sensor Networks. Military Communications Conference,. [4] D.B. Shmoys. Cut problems and their application to divide-and-conquer. pproximation lgorithms for NP-hard Problems, PWS Publishing Company, Boston, pages 9 35, 997. [5] F. Ye,. Chen, S. Liu and L. Zhang. scalable solution to minimum cost forwarding in large sensor networks. Proc. of Tenth Intl. Conference on Computer Communications and Networks, pages 34 39,. [6] G. Even, J. Naor, S. Rao, and B. Schieber. Fast approximate graph partitioning algorithms. Proc. 8th nn. CM-SIM Symp. on Discrete lgorithms, CM-SIM, pages , 997. [7] G.J. Pottie. Wireless sensor networks. Information Theory Workshop, pages 39 4, 998. [8] G.J. Pottie and W.J. Kaiser. Wireless integrated network sensors. Communications of the CM, 43(5):5 58,. [9] G.L. Nemhauser and L.. Wolsey. Integer Programming and Combinatorial Optimization. Wiley, 988. [] J. gre and L. Clare. n integrated architecture for cooperative sensing networks. Computer, 33(5):6 8,. [] J. Chlebikova. pproximability of the Maximally balanced connected partition problem in graphs. Inform. Process. Lett., 6:5 3, 996. [] K. Sohrabi, J. Gao, V. ilawadhi and G.J. Pottie. Protocols for selforganization of a wireless sensor network. IEEE Personal Communications, 7(5):6 7,. [3] M.. Youssef, M.F. Younis and K.. risha. Constrained Shortest- Path Energy-ware Routing lgorithm for Wireless Sensor Networks. Wireless Commun. and Networking Conference,, : ,. [4] R. Min, M. Bhardwaj, Seong-Hwan Cho, E. Shih,. Sinha,. Wang and. Chandrakasan. Low-power wireless sensor networks. Fourteenth International Conference on VLSI Design, pages 5,. [5] R.K. huja, T.L. Magnanti, and J.B. Orlin. Network Flows. Prentice Hall, New Jersey, 993. [6] S. Lindsey and C. Raghavendra. PEGSIS: Power-Efficient Gathering in Sensor Information Systems. Intl. Conf. on Communications,. [7] W.R. Heinzelman,. Chandrakasan and H. Balakrishnan. Energyefficient communication protocol for wireless micro sensor networks. Proceedings of the 33rd nnual Hawaii International Conference on System Sciences, pages 35 3,. GLOBECOM /3/$7. 3 IEEE
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks
August 26, 2002 TR CS-02-12 Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks Konstantinos Kalpakis 1,2, Koustuv Dasgupta 1, and Parag Namjoshi 1 Computer Science and Electrical
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Wireless Sensor Network: Improving the Network Energy Consumption
Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)
Energy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Node Degree based Clustering for WSN
Node Degree based Clustering for WSN Sanjeev Kumar Gupta Dept. of Electronics & Comm. SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Neeraj Jain Dept. of Computer Science SCOPE College
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu [email protected] Jen-Hou Liu [email protected] Min-Sheng
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.3, September 2010 DOI : 10.3745/JIPS.2010.6.3.295 MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks Mohamed Mostafa
Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks
928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks
Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Sangeeta Rao Department of Computer Science Central University of Haryana Mahendergarh, Haryana, India
The Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*
Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Abhishek Kashyap, Anuj Rawat and Mark Shayman Department of Electrical and Computer Engineering, University
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Hybrid Data Gathering Scheme in Wireless Sensor Networks
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 19 No. 2 (2011), pp. 73-88 Hybrid Data Gathering Scheme in Wireless Sensor Networks Swarup Kumar Mitra 1, Ayon Chakraborty 2, Mrinal Kanti Naskar 2 1 MCKV Institute
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
Design of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks
LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks Wenlu Yang 1, 2, Chongqing Zhang 2, Minglu Li 2 1 Department of Electronic Engineering, Shanghai Maritime University, Shanghai, China
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
Energy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
Copyright 2 IEEE. Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4-7, 2, Maui, Hawaii. Energy-Efficient Communication Protocol for Wireless Microsensor
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,
A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways
ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
How To Balance Network Load In A Wireless Sensor Network
Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : [email protected],
Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks
J Inf Process Syst, Vol.10, No.2, pp.300~313, June 2014 http://dx.doi.org/10.3745/jips.03.0006 pissn 1976-913X eissn 2092-805X Power Consumption Analysis of Prominent Time Synchronization Protocols for
MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS.
MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS. NAUMAN ISRAR and IRFAN AWAN Mobile Computing Networks and Security Research group School of Informatics University of Bradford,
An Optimization Approach for Cooperative Communication in Ad Hoc Networks
An Optimization Approach for Cooperative Communication in Ad Hoc Networks Carlos A.S. Oliveira and Panos M. Pardalos University of Florida Abstract. Mobile ad hoc networks (MANETs) are a useful organizational
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
WIRELESS communication channels have the characteristic
512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,
THE development of media access control (MAC) protocols
710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen
On Profitability and Efficiency of Wireless Mesh Networks Fang Fang, College of Business Administration, Cal State San Marcos, [email protected]; Lili Qiu, Department of Computer Science, The Univ of
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
Multiobjective Multicast Routing Algorithm
Multiobjective Multicast Routing Algorithm Jorge Crichigno, Benjamín Barán P. O. Box 9 - National University of Asunción Asunción Paraguay. Tel/Fax: (+9-) 89 {jcrichigno, bbaran}@cnc.una.py http://www.una.py
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows
TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents
Optimizing the Placement of Integration Points in Multi-hop Wireless Networks
Optimizing the Placement of Integration Points in Multi-hop Wireless Networks Lili Qiu, Ranveer Chandra, Kamal Jain, and Mohammad Mahdian ABSTRACT Efficient integration of a multi-hop wireless network
Protocol Design for Neighbor Discovery in AD-HOC Network
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for
Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India
Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur
Energy Efficiency of Load Balancing in MANET Routing Protocols
Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques
Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing
Balancing in d Hoc Networks: Single-path Routing vs. Multi-path Routing Yashar Ganjali, btin Keshavarzian Department of Electrical Engineering Stanford University Stanford, C 9435 Email:{yganjali, abtink}@stanford.edu
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
On the effect of forwarding table size on SDN network utilization
IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz
Local Load Balancing for Globally Efficient Routing in Wireless Sensor Networks
International Journal of Distributed Sensor Networks, 1: 163 185, 2005 Copyright Taylor & Francis Inc. ISSN: 1550-1329 print/1550-1477 online DOI: 10.1080/15501320590966431 Local Load Balancing for Globally
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
