A Novel Data Retrieving Mechanism in Wireless Sensor Networks with Path-Limited Mobile Sink
|
|
|
- Mae Small
- 10 years ago
- Views:
Transcription
1 A Novel Data Retrieving Mechanism in Wirele Sensor Networks with Path-Limited Mobile Sink Bo Tang 1, Jin Wang 1, Xuehua Geng 1, Yuhui Zheng 1 and Jeong-Uk Kim 2 1 School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing , China 2 Department of Energy Grid, Sangmyung University, Seoul , Korea Abstract Sink mobility has been proposed to optimize energy efficiency and lifetime for wirele sensor networks (WSNs). Many novel data retrieving algorithms or protocols are proposed based on sink mobility; they can be divided into two claes, namely path-unlimited and pathlimited algorithms. In terms of application range, the path-limited algorithms are more applicable in many scenarios. In path-limited WSNs, the challenge is optimizing network energy utilization and lifetime based on the limited conditions. In this paper, we propose a novel data retrieving mechanism named Multiple Enhanced Specified-deployed Subsinks (MESS) mechanism for WSNs with path-limited mobile sink. We argue that deploying some enhanced wirele nodes, namely subsinks to retrieve data locally, and then mobile sink paes though these subsinks and harvests data from them. Simulation results show that MES mechanism can dramatically improve network lifetime compare to traditional mechanism. Keywords: Enhanced subsink, wirele sensor network, path-limited sink mobility 1. Introduction Wirele sensor networks (WSNs) are usually composed of hundreds or thousands of lowcost wirele nodes which are deployed randomly in sensor fields. WSNs have been widely used to many applications such as military surveillance and battlefield, environmental monitoring, wildlife animal protection, home automation and health care etc. In most application scenarios, sensor fields are not acceible, and this asks WSNs for random deployed and communication protocols for self-organized ability [1]. As we know, one reason to deploy sensor nodes randomly is sensor fields are not easy to acce by people like storm area, everglade or pestilence region. In past decades, many regions like mountain areas, forest, wilderne, etc are laid roads or acceible trajectories of other patterns. This enables the emergence of sink mobility which is validated to undoubtedly improve the performance of WSNs [2-5]. For applications where sensor fields are totally acceible, many protocols are proposed to formulate the optimum moving trajectories of mobile sinks [4, 5, 7]. In most scenarios, sensor fields are partly acceible and reachable trajectories are limited. For instance, sensor nodes are randomly deployed in a wilderne area which is traversed by a road and their sensed data should be collected in a fixed interval. In applications like this, we argue that the mobile sink can be aembled in public transportation vehicles (e.g., buses) that repeatedly pa fixed trajectories in sensor fields [8]. Because these vehicles usually move in one direction only and pa only once in one period, so how to guarantee the succeful data transmiion between nodes and moving sink needs to be considered. Many existing algorithms were proposed to deal with this iue such as TSA- MSSN [6], SAFE [9], and TTDD [10]. Data retrieving algorithms based on sink mobility 133
2 should also consider efficient data harvesting and network lifetime prolongation, it mainly refers to how to use those randomly deployed sensors efficiently to prolong network lifetime. Some of existing algorithms based on path-limited mobile sink aims at this [6, 11]. Based on the discuion above, in our work, we propose a novel reliable and efficient data retrieving mechanism named Multiple Enhanced Specified-deployed Subsinks (MESS) for WSNs with path-limited trajectory. It can guarantee succeful data harvesting and abate communication load of normal sensor nodes to improve energy usage efficiency of sensor nodes and lifetime of networks by shifting these load to those enhanced specified-deployed subsinks. 2. Related Work Based on the activity range of mobile sink in sensor fields, existing data retrieving algorithms for WSNs with single mobile sink can be divided into two claes, namely algorithms based on non-location-limitation mobile sink [4, 5, 7, 12, 13] and algorithms based on path-limited mobile sink [6, 11, 14, 15, 16]. Actually, non-location-limitation mobile sink is not familiar in most real applications. In [6], the architecture of MSSNs is proposed. And based on this, authors consider that sensors are sparsely deployed on both sides of roads, and then further propose a transmiion scheduling algorithm for MSSN (TSA-MSSN). However, TSA-MSSN considers the direct transmiion between nodes and mobile sink and is only applicable to sparsely and alongroads deployed WSNs. Reference [11] proposes a data collection scheme called the Maximum Amount Shortest Path (MASP) for WSNs with mobile sinks. It poses significant challenges in jointly to improve the amount of data collected and reduce the energy consumption. It needs to store much data in subsinks and it chooses subsinks from sensor nodes directly which is obviously not fair to those ordinary nodes because their ma storage is usele. In [14, 15], multi-hop communication algorithms based on WSNs with path-constrained mobile sink are proposed. Reference [14] proposes a fluid infrastructure for path-constrained sink based on realistic applications. And reference [15] proposes a communication protocol and a speed control algorithm of the mobile sink to improve the network energy efficiency. In this algorithm, authors aume that mobile sink can control its speed freely which obviously is not practical at present. Authors in [16] propose a routing protocol called MobiRoute for WSNs with pathconstrained mobile sink. It achieves network lifetime prolongation succefully. But it needs every node to maintain current location of sink in real time. When sink moves, it should inform the whole network of the topological changes, and this would cause much extra delay. So it requires that the sojourn time to be much longer than the moving time. In our mechanism, mobile sink pa subsinks once with a steady speed in one period which is more practical. 3. Our Proposed ALL Algorithm 3.1 Introduction of MESS Mechanism In WSNs with path-limited mobile sink, it is a good idea to set some subsinks to harvest data from other nodes which are far from the path. This can reduce the long distance transmiion between nodes and mobile sink and abate delay caused by long-distance. For these advantages, many researchers choose to select some sensor nodes from the WSNs as subsinks. This method is unfair to those non-subsinks because of their functionality is 134
3 different from sub-sinks. In WSNs with path-limited mobile sink, after the sensor nodes are deployed, we can further deploy some enhanced wirele nodes along the acceible path to serve as sub-sinks. By doing this, without impacting the random deployed sensor network, these enhanced wirele nodes can retrieve and restore data for end users temporarily. MESS mechanism has two phases for mobile sink to harvest data from sensor network. To help to comprehend chapters below, we use following symbols to refer to respective concepts as shown in Table 1. Table 1. Symbols and Illustration Symbols Refer to Units r Radio communication range of sub-sinks. Meter d Distance between two sub-sinks. Meter N Number of sub-sinks. - Vol Storage volume of subsink. Packet T el k Time of establishing link between mobile sink and subsink. Length of each sensed data. In our work, it is fixed. Data transfer rate between mobile sink and subsink. Second Dr Bit/Second v Speed of mobile sink, it is fixed. Meter/Second L Width of sensor field in road direction. Meter (1) Phase 1: transmiion path establishment The procedure of establishing transmiion path can be divided into several sub-procedures and each sub-procedure should be finished in one time slot. In the first time slot, sub-sinks broadcast a meage named ESTABLISHPATH which contains their ID (denote by S1). Every sensor node who receives ESTABLISHPATH sets its next hop node as S1. If sensor node receives multiple meages of ESTABLISHPATH, it chooses the one with highest signal intensity. As shown in Figure 1, circles refer to radio coverage range of sub-sinks. In first time slot, node 1 and node 2 set their next hop as S1 ; In second time slot, node 3 and node 4 set their next hop as 1 and 2 respectively. In third time slot, node 5 sets its next hop as 4, and in last time slot, node 6 sets its next hop as 5. Bit Figure 1. Communication Path Establishment 135
4 (2) Phase 2: Data storing & retrieving Our proposed MESS mechanism is highly self-organized. And in MESS mechanism, sensor nodes sense data periodically. In each round, every sensor node generates one k-bits data packet, and then transmits it to next hop node. Its next hop node forwards this packet to own next hop node. This packet is forwarded one by one until meeting a subsink. In this procedure, those sub-sinks who have no leisure storage early can shift those overflow packets to other nodes using our proposed equal distribution of storing load (EDSL) algorithm. The main idea is that after one subsink s storage is full, it forwards the new coming data packet to next adjacent subsink. To avoid duplicated storing, the full subsink first broadcasts a FULL_MSG which contains its ID (denoted by A) to its adjacent subsinks. These adjacent subsinks broadcast this meage to their adjacent subsinks respectively, and this operation is repeated until meeting one subink whose volume is not full (denoted by B). The subsink B sends a UNFULL_MSG which contains its ID (B) to subsink A via multihop transmiion. When subsink receives two or more UNFULL_MSG, it chooses the first one as the forwarding target. After all packets are stored at subsink averagely, mobile sink can pa these sub-sinks and harvest sensory data packets at any time. 3.2 Problem Formulation In our simulations we set default values as follows: r equals to 20, r sn equals 20 and L equals to 100 which refers to road length of the part in sensor field. we define the network lifetime as the time when half amount of sensor nodes dies. Firstly, we can know L by measuring width of the sensor field in the road direction as shown in Figure 2. Figure 2. Compute Width of Sensor Field As shown in Figure 3, because each subsink may communicate with its adjacent subsink, r subjects to: r d (1) Distance between arbitrary two adjacent subsink is fixed, and we deploy subsinks as Figure 3 shows. 136
5 Figure 3. Deployment Pattern of Subsinks From Figure 3, we can conclude the relationship between d, N Subsinks need to store data for all sensor networks, let nodes, so we can compute N and L. L d (2) Vol by equation below. N N sn denotes for number of sensor sn Vol (3) N Let TDL stands for total data length (bits) for every subsink to transmit. TDL Vol k (4) To make sure all packets can be harvested by mobile sink, the least total communication time (TCT ) for mobile sink can be computed by equation below. TCT TDL Tel (5) Dr We consider that d is much more than the width of road and we think the line segment length for mobile sink can keep a link with one subsink is twice of its radio coverage range, namely 2 *r. Denote the time of mobile sink paing a subsink as T pa and it can be computed by equation (6) below. T pa r 2 (6) v To guarantee the harvesting procedure, T pa must be greater than TCT. Combined with equation (1) to (6), we can draw our conclusion that r, d, N sn, L, T el, k, Dr and v should be satisfied with equation (7) below. 2 r v T el d Nsn k L D r (7) 137
6 This equation is significant to practical design of capacities of subsink and mobile sink. If we lead into a tolerance value denoted by. Then equation (7) can be written like equation (8). 2 r v T el d Nsn k L D r (8) The practical purport of is the time used to tackle with packet lo, data retransmiion or other suddenne. 4. Performance Evaluation In our simulations we set default values as follows: r equals to 20, r sn equals 20 and L equals to 100 which refers to road length of the part in sensor field. We define the network lifetime as the time when half amount of sensor nodes dies. For convictive summary, we count network lifetime based on five experiments with different randomly deployed network. The result is shown in Figure 4 from which we can know the best number of sub-sinks in our simulation background we supposed above is four. We can conclude that this number is not the more the better. We argue that in practical applications, we can firstly design a math model and estimate the best number of sub-sinks. Figure 4. Network Lifetime using Different Number of Sub-sinks Figure 5 shows us the comparison of network time between using MESS and conventional approach of direct choosing from sensors (DCFS). For each different number of sub-sinks, MESS outperforms DCFS obviously. This proves that our proposed MESS is energy efficient and can prolong network lifetime. 138
7 Figure 5. Comparison of Network Lifetime using MESS and DCFS 5. Conclusions In this paper, we propose a novel data retrieving mechanism named Multiple Enhanced Specified-deployed Subsinks (MESS) mechanism for WSNs with pathlimited mobile sink. Its innovation idea is to combine randomly deployed sensors with specified deployed wirele nodes to achieve reliable and efficient data harvesting. To illustrate this mechanism in detail, we analyze poible and potential problems and pose corresponding solutions. Simulation results validate our proposed mechanism and prove that MESS can improve network lifetime dramatically. By simulating this mechanism, we also conclude some rules for constructing such a network and provide theoretical reference for practical applications. We believe in MESS that it could have good performance in practical applications. Acknowledgements This work was supported by the Industrial Strategic Technology Development Program ( ) funded by the Ministry of Knowledge Economy (MKE, Korea). It was also supported by the Natural Science Foundation of Jiangsu Province (No. BK ). Prof. Jeong-Uk Kim is the corresponding author. References [1] I. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, Wirele sensor networks: a survey, Journal of Computer Networks, vol. 38, no. 4, (2002). [2] S. Jain, R.C. Shah, W. Brunette, G. Borriello and S. Roy, Exploiting Mobility for Energy Efficient Data Collection in Sensor Networks, Mobile Networks and Applications, vol. 11, no. 3. (2006). [3] A. Chakrabarti, A. Sabharwal and B. Aazhang, CommunicationPower Optimization in a Sensor Network with a Path-Constrained Mobile Observer, ACM Trans. Sensor Networks, vol. 2, no. 3, (2006). [4] Z. Wang, S. Basagni, E. Melachrinoudis and C. Petrioli, Exploiting sink mobility for maximizing sensor networks lifetime, Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS), (2005) Jan. 3-6; Hawaii, USA. [5] I. Papadimitriou and L. Geogiadis, Maximum life routing to mobile sink in wirele sensor networks, Proceedings of the 13th IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCom), (2005) Sept ; Split, Marina Frapa, Croatia. [6] L. Song and D. Hatzinakos, Architecture of Wirele Sensor Networks with Mobile Sinks: Sparsely Deployed Sensors, IEEE Trans. Vehicular Technology, vol. 56, no. 4, (2007). [7] J. Rao and S. Biswas, Data harvesting in sensor networks using mobile sinks, IEEE Wirele Communications, vol. 15, no. 6, (2008). 139
8 [8] C. Konstantopoulos, G. Pantziou, D. Gavalas, A. Mpitziopoulos and B. Mamalis, A Rendezvous-Based Approach Enabling Energy-Efficient Sensory Data Collection with Mobile Sinks, IEEE Trans. on Parallel and Distributed Systems, vol. 23, no. 5, (2012). [9] S. Kim, S. Son, J. Stankovic, S. Li and Y. Choi, SAFE: a data diemination protocol for periodic updates in sensor networks, Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCSW), (2003) May 19-22; Nis, Yugoslavia. [10] H. Luo, F. Ye, J. Cheng, S. Lu and L. Zhang, TTDD: Two-tier data diemination in large-scale wirele sensor networks, Proceedings of the 8th annual international conference on Mobile computing and networking, (2002) Sep ; New York, NY, USA. [11] S. Gao, H. Zhang and S. K. Das, Efficient Data Collection in Wirele Sensor Networks with Path- Constrained Mobile Sinks, IEEE Transactions on Mobile Computing, vol. 10, no. 4, (2011). [12] Y. Bi, L. Sun, J. Ma, N. Li, I. Khan and C. Chen, HUMS: An Autonomous Moving Strategy for Mobile Sinks in Data-Gathering Sensor Networks, Journal on Wirele Communication and Networking 2007, (2007). [13] M. Ma and Y. Y Yang, SenCar: An energy-efficient data gathering mechanism for large-scale multi-hop sensor networks, IEEE Trans. On Parallel and Distrbuted Systems, vol. 18, no. 10, (2007). [14] A. Kansal, A. Somasundara, D. Jea, M. Srivastava and D. Estrin, Intelligent Fluid Infrastructure for Embedded Networks, Proc. Proceedings of the second annual international conference on ACM MobiSys, (2004) Jun. 6-9; Boston, Maachusetts, USA. [15] A. Somasundara, A. Kansal, D. Jea, D. Estrin and M. Srivastava, Controllably Mobile Infrastructure for Low Energy Embedded Networks, IEEE Trans. Mobile Computing, vol. 5, no. 8, (2006). [16] J. Luo, J. Panchard, M. Piorkowski, M. Groglauser and J.Hubaux, MobiRoute: Routing towards a Mobile Sink for Improving Lifetime in Sensor Networks, IEEE/ACM DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), Lecture Notes in Computer Science, vol. 4026, (2006). Author Bo Tang. Bo Tang received the B.S. degree from Nanjing University of Information Science & Technology, China in Now he is studying for a M.S. degree in his Alma Mater. His research interests include wirele sensor networks, routing protocol and algorithm design, optimization for existed protocols and algorithms. 140
A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu
A Survey on Rendezvous Data Collection in Wireless Sensor Networks Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu Roadmap Background Introduction of state-of-art solutions Future works References
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran [email protected]
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu [email protected] Jen-Hou Liu [email protected] Min-Sheng
Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
Energy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks
A Novel Distributed Algorithm for Complete Targets Coverage in Energy Harvesting Wireless Sensor Networks Changlin Yang School of Electrical, Computer and Telecommunications Engineering University of Wollongong
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks
LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks Wenlu Yang 1, 2, Chongqing Zhang 2, Minglu Li 2 1 Department of Electronic Engineering, Shanghai Maritime University, Shanghai, China
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)
Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity
Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Yonghang Yan*, Linlin Ci*, Ruiping Zhang**, Zhiming Wang* *School of Computer Science, Beiing Institute of Technology,
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART
A Novel Method to Minimize False Alarm Rate of Fall Detection for Wireless Sensor Networks
A Novel Method to Minimize False Alarm Rate of Fall Detection for Wireless Sensor Networks Jin Wang 1, Zhongqi Zhang 1, Liwu Zuo 1, Menglin Wu 2, Jeong-Uk Kim 3 1 Jiangsu Engineering Center of Network
Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India
Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Node Degree based Clustering for WSN
Node Degree based Clustering for WSN Sanjeev Kumar Gupta Dept. of Electronics & Comm. SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Neeraj Jain Dept. of Computer Science SCOPE College
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
Protocol Design for Neighbor Discovery in AD-HOC Network
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for
Wireless Sensor Network: Improving the Network Energy Consumption
Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that
A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways
ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks
928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
Keywords coverage holes, energy efficient, hole detection, hole healing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hole Detection and
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
Access Control And Intrusion Detection For Security In Wireless Sensor Network
Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.
The Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
Mobile Tracking and Resource Reservation Scheme for Cellular Networks
Mobile Tracking and Resource Reservation Scheme for Cellular Networks Subbiah Shenbagaraman, B. Prabhakaran, S. Venkatesan Department of Computer Science, University of Texas at Dallas, Richardson, USA,
Improvisation of The Quality Of Service In ZigBee Cluster Tree Network
Improvisation of The Quality Of Service In ZigBee Cluster Tree Network Trupti Satavse, Vijyalaxmi Kadrolli Information Technology Terna College of Engineering Nerul, Navi-Mumbai, India [email protected]
A Novel Routing and Data Transmission Method for Stub Network of Internet of Things based on Percolation
IEEE INFOCO 2011 Workshop on 2CN-2011 A Novel Routing and Data Transmission ethod for Stub Network of Internet of Things based on Percolation Xiangming Li, Jihua Lu, Jie Yang, and Jianping An School of
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM Mr.S.Iyyappan 1, Mr.V.Nandagopal 2 P.G Scholar, Dept. of EEE, Ganadipathy Tulis s Jain Engineering College, Vellore,
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
A Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
A New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks
Wireless Sensor Network, 2011, 3, 61-72 doi:10.4236/wsn.2011.32007 Published Online February 2011 (http://www.scirp.org/journal/wsn) A New MAC Protocol for Moving Target in Distributed Wireless Sensor
A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks
, pp.100-104 http://dx.doi.org/10.14257/astl.2014.45.19 A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks Li Ma 1,2,3, Jingzhou Yan 1,2,Kuo Liao 3,4, Shuangshuang Yan
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
