Joint k-coverage, Duty-Cycling, and Geographic Forwarding in Wireless Sensor Networks

Size: px
Start display at page:

Download "Joint k-coverage, Duty-Cycling, and Geographic Forwarding in Wireless Sensor Networks"

Transcription

1 Joint k-coverage, Duty-Cycling, and Geographic Forwarding in Wireless Sensor Networks Habib M. Ammari Wireless Sensor and Mobile Ad-hoc Networks (WiSeMAN) Research Lab Department of Computer Science, Hofstra University, Hempstead, NY 11549, USA Abstract Most of geographic forwarding protocols assume that all sensors are always on. Such an assumption is unrealistic for applications where sensors are switched on or off. This paper focuses on k-covered wireless sensor networks (WSNs), where each point in a field is covered by at least k sensors. First, we characterize k- coverage. Then, we propose an energy-efficient scheduling protocol for k-covered WSNs. Third, we propose the first design of a geographic forwarding protocol for duty-cycled k-covered WSNs with data aggregation. Finally, we evaluate the performance of our joint k-coverage and geographic forwarding protocol and compare it to the Coverage Configuration Protocol (CCP) with BVGF on top of it. Simulation results show that our joint protocol outperforms the resulting protocol, CCP+BVGF. 1. Introduction It is well known that the best approach to save battery-power (or energy) of the sensors is duty-cycling so the sensors can be turned on or off according to a sleep-wakeup scheduling protocol. Geographic forwarding is an energy-efficient and practical scheme for WSNs in that the sensors need only maintain local knowledge on the locations of their one-hop neighbors to select their next forwarders Motivations and Problem Statement Most of geographic forwarding protocols assume that all sensors are always on during forwarding. Such an assumption is not realistic in densely deployed WSNs, where sensors are duty-cycled to save energy. In this paper, we study the problem of joint k- coverage, duty-cycling, and forwarding in WSNs. Precisely, we focus on geographic forwarding in a duty-cycled, k-covered WSN (CWSN k ), where each point in a field is covered by at least k 3 active sensors while all the sensors are connected. Sajal K. Das Center for Research in Wireless Mobility and Networking (CReWMaN) Dept. of Comp. Science and Engineering, The Univ. of Texas at Arlington, TX, 76019, USA das@cse.uta.edu 1.2. Contributions The contributions of this paper are as follows: (1) We propose a sensor scheduling protocol to k-cover a field using a minimum number of active sensors. (2) We propose a geographic forwarding protocol running on a duty-cycled CWSN k based on virtual potential fields and using data aggregation. (3) We show that our joint k-coverage and forwarding protocol outperforms CCP with BVGF on top of it. The rest of the paper is as follows: Section 2 presents the network model. Section 3 describes our duty-cycling protocol for CWSN k. Section 4 presents our geographic forwarding protocol for duty-cycled CWSN k. Section 5 gives simulation results. Section 6 reviews related work. Section 7 concludes the paper. 2. Definitions and Assumptions In this section, we present some key definitions and assumptions useful for the description of our protocol. Definition 1: The sensing range of a sensor s i is a region where each event that takes place in this region can be sensed by s i. The sensing neighbor set SN(s i ) of s i is a set of all the sensors in its sensing range. Definition 2: The communication range of a sensor s i is a region such that s i can communicate with any sensor located in this region. The communication neighbor set CN(s i ) of s i is a set of all the sensors in its communication range. Definition 3: Let A be an area. The area A is said to be k-covered if each point p A belongs to the intersection of the sensing ranges of at least k sensors. A WSN is said to be connected if all the sensors can communicate with each other directly or indirectly. We assume that the sensing and communication ranges of the sensors are modeled by disks, called sensing and communication disks of radii r and R, respectively. Each sensor has a unique id and is aware of its location via a Global Positioning System or a localization technique [4] /09/$ IEEE 487

2 (a) Figure 1: (a) A slice and two adjacent slices 3. Duty-Cycling for CWSN k In this section, we present our scheduling protocol for CWSN k. First, we provide a sufficient condition for k-coverage of a deployment field Sufficient Condition for k-coverage First, we present Helly s Theorem [3], which characterizes the intersection of convex sets. Helly s Theorem [3]: Let E be a family of convex sets in R n such that for m n+1 any m members of E have a non-empty intersection. Then, the intersection of all members of E is non-empty. From Helly s Theorem [3], we deduce Theorem 1 in a two-dimensional space, i.e., R 2, which will help us find a tight characterization of k-coverage. Theorem 1: Let k 3. The intersection of k sensing disks is not empty if and only if the intersection of any three of those k sensing disks is not empty. Following Theorem 1, Lemma 1 states a sufficient condition for complete k-coverage of a field [1]. Lemma 1 [1]: Let r be the radius of the sensing disks of the sensors and k 3. A field is k-covered if any Reuleaux triangle region of width (i.e., the maximum distance between parallel lines that bound it) r in a field contains at least k active sensors. Note that two adjacent slices intersect in a region shaped as a lens (known as the fish bladder) so that the sides of their associated regular triangles fully coincide (Figure 1b). Note that k sensors located in the lens of two adjacent slices, say C 1 and C 2, k-cover the area associated with their union. Theorem 2 states this result. It refines the result of Lemma 1 by stating a tighter sufficient condition for complete k-coverage of a field. Theorem 2: Let k 3. A field is surely k-covered if for any slice in the field, there is at least one adjacent slice such that their lens contains at least k active sensors A Protocol for Guaranteeing k-coverage Our proposed protocol for full k-coverage of a field consists of two phases: sensor field slicing and sensor selection. Next, we describe both phases in details Sensor Field Slicing. In general, the sink is connected to an infinite source of energy, such as a wall outlet, and thus can be viewed as a line-powered node that has no energy constraint. Hence, we assume that the sensor field slicing task is done by the sink in each scheduling round (or simply round). To exploit the result of Theorem 2, we propose a slicing scheme that divides a field into overlapping slices, such that two adjacent slices intersect in a lens. Intuitively, this implies that a field is sliced into regular triangles of side r. The result of this slicing operation is called slicing grid [1] Sensor Selection for k-coverage. In addition to slicing a field, we assume that the sink is also responsible for forming clusters of slices from the randomly obtained slicing grid. Precisely, each cluster consists of at most six adjacent slices forming a disk. Because of the random generation of slicing grids and the geometry of a field, some clusters consist of an entire disk, and hence called interior clusters, while others are formed by a portion of a disk, and hence called boundary clusters. Moreover, for each cluster, the sink selects a sensor, called cluster-head, which is located as near as possible to the center of its cluster. The random generation of slicing grid ensures that all sensors are equally likely to act as cluster-heads in each round. Each cluster is defined by one point, i.e., (x,y) coordinates, representing its center and at most six other points defining its slices (or slice portions for a non-complete cluster). These seven points define the slicing information of a cluster, which the sink would broadcast to its corresponding cluster-head. Next, we define interior and boundary lenses. Definition 4: An interior lens of a cluster is not shared with any of its adjacent clusters while a boundary lens is shared by two adjacent clusters. Notice that each cluster overlaps with at most six others. By Theorem 2, sensors located in the boundary lenses of a given cluster should be selected first in order to minimize the total number of active sensors to achieve full k-coverage of a field. However, this requires certain coordination between cluster-heads. Each cluster-head is in charge of selecting some of its sensing neighbors to k-cover its cluster based on its slicing information. Precisely, each cluster-head exploits the overlap between the slices of its cluster as well as the overlap between its slices and those of its adjacent cluster-heads to select a minimum number of its sensing neighbors to k-cover its cluster. We assume that each sensor advertises its remaining energy to its sensing neighbors at the start of a round when it turns itself on. Each cluster-head s chi maintains a list E rem _List(s chi ) ={E rem (:s j SN(s chi )} of remaining energy of its sensing neighbors, where E rem ( is the remaining /09/$ IEEE 488

3 energy of s j. It uses this list to select the ones with high remaining energy to stay active by sending a SELECT message including the cluster-head s id as well as the id s of all selected sensors. This would avoid those ones with low remaining energy and help the sensors deplete their energy as slowly and uniformly as possible. We assume that at the beginning of each round, all the sensors are active. Those ones which are selected by their corresponding cluster-heads would remain active during the underlying round, while the others turn themselves off. For the sensor selection, each cluster-head assigns priorities to sensors located in boundary lenses, interior lenses, and middle of slices in descending order. That is, sensors located in boundary lenses have high priority to be selected based on Theorem 2. Given that each cluster has at most six slices, each cluster-head manages at most six interior lenses and at most six boundary lenses. Each clusterhead is responsible for selecting sensors from its interior lenses without any coordination with its adjacent cluster-heads. However, each cluster-head coordinates with at most six adjacent cluster-heads to select sensors from its boundary lenses in order to k- cover its cluster with a minimum number of sensors. Theorem 3 states a condition forconnectivity based on the structure of the clusters of slices. Theorem 3: Let k 3. A CWSN k is connected if R r, where r and R are the radii of the sensing and communication disks of the sensors, respectively. Proof: First, each cluster is connected if R r. Also, the cluster-heads are connected to each other via active sensors. Thus, A CWSN k is connected if R r. Theorem 4 characterizes the performance of CSW k in terms of the number of sensors for k-coverage. Theorem 4: CSW k selects a minimum number of active sensors in each round for k-coverage of a field. Proof: Each cluster-head coordinates with its adjacent ones and ensures that its cluster is k-covered, where each of its slices is covered by exactly k sensors. Hence, by Theorem 2, each slice of a field is k-covered with a minimum number of active sensors. Thus, CSW k guarantees that a field is k-covered with a total minimum number of active sensors. 4. Geographic Forwarding In this section, we present our first potential field [8] based solution for geographic forwarding on a dutycycled CWSN k, called Geographic Forwarding through Fish Bladders (GEFIB), where aggregated data is forwarded through fish bladders (or lenses). We assume that in each round, every active sensor has data to report to the sink. Also, only sensors selected to k- cover a field act as relays A Modeling Approach Sensors can be viewed as particles, and hence are subject to virtual forces, which attract sensors to each other. These virtual attractive forces are due to the remaining energy of the sensors and their geographic locations. Indeed, the sensors with highest remaining energy are preferred to act as relays in order to avoid energy holes (i.e., regions whose sensors depleted their energy) that may disconnect the network. Also, the sensors prefer closer relays to forward data over short distances and save energy. Using potential field terminology, each active sensor is subject to at least one attractive force, called energylocation based force and denoted by F el, which is exerted by some active sensor and defined as the gradient of a unique scalar potential field, called energy-location based potential field and denoted by U el, i.e., F el = - U el. We should mention that this notion of attractive force is symmetric. That is, if a sensor s i exerts a force on sensor s j, the latter also exerts on the former a force with the same magnitude. Also, only active sensors can exert forces on each other. Our approach to modeling the resultant force that a sensor s i exerts on its sensing neighbor s j is borrowed from electromagnetism theory. Using Coulomb s law, the magnitude of the electrostatic force F(i, between two points electric charges q i and q j depends on their magnitudes and the Euclidean distance d(i, between them, and is computed as 1 qi q j F( i, = U ( i, = 4π ε 2 d ( i, ) 0 j where ε 0 is the permittivity of free space. In our model, the charge of a sensor is its remaining energy and permittivity is the transmitter amplifier [7] in the free-space (ε fs ) model (α = 2) or the multi-path (ε mp ) model (2 < α 4), where α is the path-loss exponent. Thus, the magnitude of the force F el (i, that a sensor s i, exerts on its sensing neighbor s j is proportional to the product of their remaining energy and inversely proportional to the Euclidean distance d(i, between them. Moreover, it is important that F el (i, account for the type of model being used, i.e., free-space model vs. multi-path model. Therefore, the attractive force F el (i, is computed as 1 E ( i) E ( F ( i, U ( i, rem rem el = el = 4π ε α d ( i, where E rem (l) is the remaining energy of sensor s l and ε {ε fs, ε mp }. Similarly, there is an interaction between one sensor and a set of sensors. The resultant force exerted by sensor s i on a set of sensors S is given by s S F ( i, S) = F ( i, = U ( i, el j el s S j el /09/$ IEEE 489

4 Figure 2. Cluster-heads Communication 4.2. Forwarding with Data Aggregation In this section, we present our geographic forwarding protocol for clustered duty-cycled CWSN k. All data originated from sensors in a cluster are received by their corresponding cluster-head, which aggregates them with its own data into only one single data. Precisely, each sensor sends its data directly to its cluster-head, where data is aggregated. We distinguish two types of aggregation. In the first scenario, referred to as local data aggregation, aggregation occurs only within clusters and all data aggregated by cluster-heads are forwarded to the sink without further aggregation. Thus, the sink receives data from each cluster-head in each round. In the second scenario, referred to as global data aggregation, the sink receives only one data packet in each round that represents the aggregation of all data aggregated by cluster heads. Precisely, each cluster-head also aggregates its own aggregated data with the aggregated data it has received from a cluster-head and forwards the result to another cluster-head. Before we discuss our geographic data forwarding protocol with data aggregation on a duty-cycled CWSN k, namely GEFIB, we define best slice, best lens, and best relay of a cluster-head. Definition 5: A best slice of a cluster-head s ch with respect to a destination Dest, which could be a clusterhead or the sink, is a slice that is crossed by a line segment connecting s ch and Dest (Figure 2). A visible lens L v (i,dest) of s ch with respect to Dest, is a lens that belongs to the best slice of s ch with respect to Dest, where 1 v 3 (Figure 2). A best lens L b (i,dest) of s ch with respect to Dest, is a visible lens such that F el (i,l b (i,dest)) is the maximum over all resultant forces exerted by s ch on all its visible lenses L v (i,dest) where 1 b,v 3. A best relay s l of a cluster-head s ch with respect to a destination Dest, is a sensing neighbor of s ch selected from a best lens L b (i,dest) such that F el (i,l) is the maximum over all resultant forces exerted by s i on its neighbors located in L b (i,dest). That is, F el (i,l b (i,dest))=max{ F el (i,l v (i,dest)): 1 v 3} and F el (i,l) = max{f el (i,: s j L b (i,dest)}. First, each sensor sends its data directly to its cluster head. When a cluster head s i receives data from all sensors belonging to its cluster, it aggregates them with its own data and forwards the result, called locally aggregated data (LAD), toward the sink. In each round, the sink receives as many LAD packets as cluster-heads. Indeed, when a cluster-head receives LAD packets initiated from other cluster-heads, it just forwards them without any update. Precisely, a clusterhead finds the best slice with respect to the sink and chooses the best lens in terms of attractive force out of the three visible lenses (Figure 2). From this lens, it selects the best relay based on the potential field-based force and forwards data to it. However, when a relay receives the data, it forwards it directly to the closest cluster-head. This forwarding process between clusterheads using relays takes place through fish bladders (or lenses) and repeats until data arrives at the sink. All cluster-heads and relays apply the algorithm GEFIB. 5. Performance Evaluation In this section, we evaluate GEFIB using a highlevel simulator written in the C programming language. We consider a square sensor field of side length 1000m where sensors are randomly and uniformly deployed. We use the energy model given in [14], where energy consumption in transmission, reception, idle, and sleep modes are 60 mw, 12 mw, 12 mw, and 0.03 mw, respectively. Following [15], we define one unit of energy as the energy required for a sensor to stay idle for 1 second. We assume that the initial energy of each sensor is 60 Joules enabling a sensor to operate about 5000 seconds in reception/idle modes [14]. Here, the energy consumption is due to sensing k- coverage and to forwarding/sending data and control information. All simulations are repeated 100 times and the results are averaged Comparing CSW k and CCP In this section, we compare CSW k with CCP (Coverage Configuration Protocol) [13]. When the communication range of sensors is at least double their sensing range, Xing et al. [13] showed that full coverage implies connectivity. Otherwise, Xing et al. [13] integrated CCP with a topology maintenance protocol (Span) [5] to ensure connectivity. In all simulations, we consider r = 25m and k = 3 unless stated otherwise. Figure 3a plots the degree k of coverage versus the number n a of active sensors for CSW k as compared to CCP. It shows that CSW k requires less active sensors than CCP to achieve the same coverage degree, thus yielding significant energy /09/$ IEEE 490

5 savings. This is due not only to a higher number of active sensors required by CCP, but also to the communication overhead caused by the exchange of messages between active sensors running CCP to coordinate among themselves and provide the requested k-coverage service. Thus, CCP consumes more energy than CSW k as shown in Figure 3b. While CCP requires Span [5] to provide connectivity between active sensors when R < 2r, CSW k does not need such a topology maintenance protocol as all it requires is that R r to provide connectivity. (a) Figure 3. CSW k compared to CCP n a of active sensors required for k-coverage does not decrease any further. Indeed, when R 2r, Span [5] is not needed at all as both k-coverage and R 2r guarantee connectivity. Similarly, the performance of CCP improves as the ratio α increases, i.e., R increases (Figure 4b). That is, less number of sensors is needed to provide both k-coverage and connectivity GEFIB versus CCP+BVGF We consider CCP [13] with BVGF [12] on top of it, denoted by CCP+BVGF, and compare it to GEFIB. We have slightly updated BVGF to consider remaining energy of the sensors for a fair comparison. Figure 5 shows that GEFIB yields less average energy consumption and higher data delivery rate than CCP+BVGF. This is due in part to CCP, which uses higher number of active sensors for k-coverage than CSW k. Also, BVGF forwards data over long distances. Hence, it consumes considerable energy. Moreover, data may reach sensors whose remaining energy is not enough to progress data to the sink, which causes data to be dropped. Our potential field-based forwarding protocol selects next forwarders based on their remaining energy and location. Hence, all neighbors of a sensor are equally likely to be selected as forwarders. 6. Related Work (a) Figure 4. CSW k versus CCP (a) Figure 5. GEFIB versus CCP+BVGF Figure 4a plots n a versus R while Figure 4b plots n a versus r for different ratios α = R/r. Given the result reported in [15] with respect to the relationship between r and R for real-world sensor platforms (R r), we consider only the case α 1. Given that α 1, any increase in the communication range of sensors would not have any impact on the performance of CSW k. It would, however, affect the performance of CCP. As can be observed, n a decreases as R increases. Indeed, Span [5] would require less number of sensors to maintain connectivity between active sensors as R increases. However, at some point, (surprisingly enough, this point corresponds to R 2r), the number In this section, we review protocols for coverage, scheduling, and geographic forwarding in WSNs. Huang et al. [9] studied the relation between coverage and connectivity of WSNs and proposed distributed protocols to guarantee both of them. Gupta et al. [6] proposed algorithms for connected sensor cover so the WSN self-organizes its topology in response to a query and activate the necessary sensors to process the query. Zhang and Hou [15] proposed an optimal geographical density control protocol to keep a small number of sensors active to cover a field. Tian and Georganas [11] proved that the network formed by the active nodes is connected if the communication range of the sensors is at least twice their sensing range. The study of joint coverage and geographic forwarding has received little attention. While Biswas and Morris [2] and Zorzi and Rao [16] assumed dutycycling at the MAC layer, Nath and Gibson [10] considered both routing and duty-cycling at the network layer. In traditional routing, a sender chooses the next forwarder before transmitting its data. However, when the link quality is poor, the probability that the selected forwarder receives the data is low. In contrast, using opportunistic routing, any node that overhears the transmission and is closer to the /09/$ IEEE 491

6 destination can participate in forwarding the packet. Zorzi and Rao [16] proposed an opportunistic data transmission scheme, called geographic random forwarding (GeRaF). Biswas and Morris [2] proposed an integrated opportunistic routing and MAC protocol, called ExOR, to enhance throughput in multi-hop wireless networks. Nath and Gibbons [10] presented the first formal analysis of the performance of geographic routing on duty-cycled WSNs, where every sensor has k active neighbors. Why Our Protocol? The problem of joint coverage and geographic forwarding in WSNs has been overlooked intentionally. This is due to the fact that all sensors are assumed to be always on during forwarding. This work is an effort complementing the one by Nath and Gibbons [10]. We believe that our joint protocol could be useful for several applications and particularly those requiring data aggregation at intermediate sensors along paths to the sink. To the best of our knowledge, this is the first study of geographic forwarding on duty-cycled CWSN k. 7. Conclusion In this paper, we have characterized k-coverage of a field and proposed a minimum-energy sleep-wakeup scheduling protocol (CSW k ) for CWSN k. We have also proposed an energy-efficient geographic forwarding protocol on duty-cycled CWSN k. Our joint k-coverage and geographic forwarding (GEFIB) framework can be used for applications that demand high coverage degree, such as intruder detection and tracking. Also, it is useful for applications that require data aggregation. Our future work is three-fold. First, we plan to implement GEFIB on a sensor testbed to assess its real performance. Second, we focus on studying GEFIB using stochastic models of sensing and communication ranges of the sensors. Third, we plan to extend GEFIB to account for heterogeneous CWSN k, where the sensors do not necessarily have the same capabilities. Acknowledgments The authors thank the anonymous reviewers for their helpful comments. The work of H.M. Ammari is partially supported by a New Faculty Start-Up Research Grant from Hofstra College of Liberal Arts and Sciences Dean s Office. The work of S.K. Das is partially supported by the AFOSR grant A and US National Science Foundation (NSF) grants IIS and CNS His work is also supported by (while serving at) the NSF. Any opinion, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF. References [1] H. M. Ammari and S. K. Das, Clustering-based minimum energy m-connected k-covered wireless sensor networks, Proc. EWSN, LNCS 4913, 2008, pp [2] Biswas, S. and Morris, R. ExOR: Opportunistic Multi- Hop Routing for Wireless Networks. Proc. ACM SIGCOMM, pp , [3] B. Bollobás, The Art of Mathematics: Coffee Time in Memphis, Cambridge University Press, [4] Bulusu, N., Heidemann, J., and Estrin, D. GPS-Less Low Cost Outdoor Localization for Very Small Devices. IEEE Pers. Comm. Mag., 7(5), 28-34, [5] Chen, B., Jameson, K., Balakrishnan, H., and Morris, R Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. ACM Wireless Networks 8(5), [6] Gupta, H., Zhou, Z., Das, S., and Gu, Q. Connected Sensor Cover: self-organization of Sensor Networks for Efficient Query Execution. IEEE/ACM TON, 14(1), (2006). [7] Heinzelman, W., Chandrakasan, A., and Balakrishnan, H. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE TWireless, 1(4), pp (2002). [8] Helms, L. L. V. Introduction to Potential Theory. New York, Wiley-Interscience (1969). [9] Huang, C., Tseng, Y., Wu, H. Distributed Protocols for Ensuring Both Coverage and Connectivity of a Wireless Sensor Network. ACM TOSN, 3(1), 1-24 (2007). [10] Nath, S. and Gibbons, P. B. Communicating via fireflies: geographic routing on duty-cycled sensors. Proc. IPSN, pp (2007). [11] Tian, D., Georganas, N.: Connectivity Maintenance and Coverage Preservation in Wireless Sensor Networks. Ad Hoc Networks, 3, (2005). [12] Xing, G., Lu, C., Pless, R., and Huang, Q. On Greedy Geographic Routing Algorithms in Sensing-covered Networks. Proc. ACM MobiHoc, pp (2004). [13] Xing, G., Wang, X., Zhang, Y., Lu, C., Pless, R., Gill, C. Integrated Coverage and Connectivity Configuration for Energy Conservation in Sensor Networks. ACM TOSN, 1(1), (2005). [14] Ye, F., Zhong, G., Cheng, J., Lu, S., Zhang, L. PEAS: A Robust Energy Conserving Protocol for Long-Lived Sensor Networks. Proc. ICDCS, pp (2003). [15] Zhang, H., Hou, J. Maintaining Sensing Coverage and Connectivity in Large Sensor Networks. Ad Hoc & Sensor Wireless Networks, 1(1-2), (2005). [16] Zorzi, M. and Rao, R. Geographic random forwarding (GeRaF) for ad hoc and sensor networks: Multihop performance. IEEE TMC 2(4), (2003) [17] /09/$ IEEE 492

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks Hogil Kim and Eun Jung Kim Department of Computer Science Texas A&M University College Station,

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

DAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost

DAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost DAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost Mark Perillo and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester Rochester,

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Distributed Coordinate-free Hole Detection and Recovery

Distributed Coordinate-free Hole Detection and Recovery Distributed Coordinate-free Hole Detection and Recovery Xiaoyun Li xliw@essex.ac.uk David K. Hunter dkhunter@essex.ac.uk Kun Yang kunyang@essex.ac.uk Abstract A distributed algorithm is introduced which

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Susumu Matsumae Graduate School of Science and Engineering Saga University Saga 840-8502, Japan Fukuhito Ooshita

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks

An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks Zehua Zhou Xiaojing Xiang State University of New York at Buffalo Buffalo, NY, USA {zzhou5, xxiang}@cse.buffalo.edu Xin Wang

More information

Energy Efficient Zonal Stable Election Protocol for WSNs

Energy Efficient Zonal Stable Election Protocol for WSNs Energy Efficient Zonal Stable Election Protocol for WSNs G.Chandini, (M.Tech), Department of Electronics and Communication Engineering., Sri Sivani College Of Engineering, Srikakulam, A.P, India Rajavali

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Energy Efficient Tracking of Land-Based Targets Using Wireless Sensor Networks

Energy Efficient Tracking of Land-Based Targets Using Wireless Sensor Networks Energy Efficient Tracking of Land-Based Targets Using Wireless Sensor Networks Ali Berrached Le Phan University of Houston-Downtown One Main Street S705, Houston, Texas 77002 (713)221-8639 Berracheda@uhd.edu

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Prianka.P 1, Thenral 2

Prianka.P 1, Thenral 2 An Efficient Routing Protocol design and Optimizing Sensor Coverage Area in Wireless Sensor Networks Prianka.P 1, Thenral 2 Department of Electronics Communication and Engineering, Ganadipathy Tulsi s

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

PERFORMANCE EVALUATION OF TOPOLOGY CONTROL ALGORITHMS FOR WIRELESS SENSOR NETWORKS

PERFORMANCE EVALUATION OF TOPOLOGY CONTROL ALGORITHMS FOR WIRELESS SENSOR NETWORKS PERFORMANCE EVALUATION OF TOPOLOGY CONTROL ALGORITHMS FOR WIRELESS SENSOR NETWORKS Zahariah Manap 1, M. I. A Roslan 1, W. H. M Saad 1, M. K. M. Nor 1, Norharyati Harum 2 and A. R. Syafeeza 1 1 Faculty

More information

Performance of a Novel Energy-Efficient and Energy Awareness Scheme for Long-Lifetime Wireless Sensor Networks

Performance of a Novel Energy-Efficient and Energy Awareness Scheme for Long-Lifetime Wireless Sensor Networks Sensors and Materials, Vol. 27, No. 8 (2015) 697 708 MYU Tokyo S & M 1106 Performance of a Novel Energy-Efficient and Energy Awareness Scheme for Long-Lifetime Wireless Sensor Networks Tan-Hsu Tan 1, Neng-Chung

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks

Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks AUTHORS: B. CHEN, K.JAMIESON, H. BALAKRISHNAN, R. MORRIS TARGET: A power saving technique 2 Multi-hop

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CONCLUSIONS AND SCOPE FOR FUTURE WORK Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Adaptive Opportunistic Routing Protocol for Energy Harvesting Wireless Sensor Networks

Adaptive Opportunistic Routing Protocol for Energy Harvesting Wireless Sensor Networks Adaptive Opportunistic Routing Protocol for Energy Harvesting Wireless Sensor Networks Zhi Ang Eu and Hwee-Pink Tan Institute for Infocomm Research, Singapore Email: {zaeu,hptan}@ir.a-star.edu.sg Abstract

More information

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,

More information

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning By: Eunjoon Cho and Kevin Wong Abstract In this paper we present an algorithm for a location based adaptive

More information

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe Sensor Deployment, Self- Organization, And Localization Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley, 2007 5/20/2008 WiSeLab@WMU; www.cs.wmich.edu/wise

More information

Mobility Control for Complete Coverage in Wireless Sensor Networks

Mobility Control for Complete Coverage in Wireless Sensor Networks Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

Implementation of Energy Efficient Clustering Using Firefly Algorithm in Wireless Sensor Networks

Implementation of Energy Efficient Clustering Using Firefly Algorithm in Wireless Sensor Networks 014 1 st International Congress on Computer, Electronics, Electrical, and Communication Engineering (ICCEECE014) IPCSIT vol. 59 (014) (014) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.014.V59.1 Implementation

More information

An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks

An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks J. Shanbehzadeh, M. Mehrani, A. Sarrafzadeh, and Z. Razaghi Abstract an important issue in WSN is the regional covering. A coverage

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Available online at ScienceDirect. Procedia Computer Science 92 (2016 )

Available online at  ScienceDirect. Procedia Computer Science 92 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 92 (2016 ) 425 430 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016) Srikanta

More information

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Jie Wu, Mihaela Cardei, Fei Dai, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

The Effect of Physical Topology on Wireless Sensor Network Lifetime

The Effect of Physical Topology on Wireless Sensor Network Lifetime 1 JOURNAL OF NETWORKS, VOL., NO. 5, SEPTEMBER 7 The Effect of Physical Topology on Wireless Sensor Network Lifetime Debdhanit Yupho Planning Department Aeronautical Radio of Thailand Limited, Bangkok,

More information

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Wireless Sensor Networks (WSN) Tanyar Pooyeh 2pooyeh@informatik.uni-hamburg.de Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Outline Multi-hop Wireless Networks MANETs, VANETs, WSNs Routing

More information

Coverage by directional sensors in randomly deployed wireless sensor networks

Coverage by directional sensors in randomly deployed wireless sensor networks J Comb Optim (26) : 2 4 DOI.7/s878-6-5975-x Coverage by directional sensors in randomly deployed wireless sensor networks Jing Ai Alhussein A. Abouzeid Accepted: 25 October 25 C Science + Business Media,

More information

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department

More information

1 Introduction. Networking and Computing (MobiHoc), Author Samir Das s work has been partially supported by NSF grant ANI

1 Introduction. Networking and Computing (MobiHoc), Author Samir Das s work has been partially supported by NSF grant ANI Connected Sensor Cover: Self-Organization of Sensor Networks for Efficient Query Execution 1 Himanshu Gupta, Zongheng Zhou, Samir R. Das, Quinyi Gu Department of Computer Science State University of New

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks

Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks Chao-Lieh Chen 1, Jeng-Wei Lee 2, Cheng-Zh Lin 3, Yi-Tsung Chen 2, Jar-Shone Ker 3, and Yau-Hwang Kuo 2 1 Department of Electronic

More information

A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks

A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks Lan Wang and Yang Xiao Department of Computer Science The University of Memphis 373 Dunn Hall Memphis, TN 38152 USA Emails: lanwang@memphis.edu,

More information

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR) INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR) R.Sudha

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks

Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks Ted Brown, Deniz Sarioz, Amotz Bar-Noy, Tom LaPorta, Dinesh Verma, Matthew Johnson, Hosam Rowaihy November 20, 2006 1 Introduction

More information

Clustering Routing Protocol Based on Location Node in Wireless Sensor Networks

Clustering Routing Protocol Based on Location Node in Wireless Sensor Networks Clustering Routing Protocol Based on Location Node in Wireless Sensor Networks NURHAYATI, KYUNG OH LEE Department of Computer Science Sun Moon University Kalsan-ri, Tangjeong-myeon, Asan-si, Chungnam 336-708

More information

NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS

NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS CHAPTER 6 NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS Abstract Localization of sensor nodes in a wireless sensor network is needed for many practical purposes. If the nodes are considered

More information

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Dezhen Song CS Department, Texas A&M University Technical Report: TR 2005-2-2 Email: dzsong@cs.tamu.edu

More information

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level Ali Abdi Seyedkolaei 1 and Ali Zakerolhosseini 2 1 Department of Computer, Shahid Beheshti University, Tehran,

More information

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical

More information

Maximizing Angle Coverage in Visual Sensor Networks

Maximizing Angle Coverage in Visual Sensor Networks Maximizing Angle Coverage in Visual Sensor Networks Kit-Yee Chow, King-Shan Lui and Edmund Y. Lam Department of Electrical and Electronic Engineering The University of Hong Kong Pokfulam Road, Hong Kong,

More information

Homogeneous vs Heterogeneous Clustered Sensor Networks: A Comparative Study

Homogeneous vs Heterogeneous Clustered Sensor Networks: A Comparative Study 1 Homogeneous vs Heterogeneous Clustered Sensor Networks: A Comparative Study Vivek Mhatre, Catherine Rosenberg School of Electrical and Computer Eng., Purdue University, West Lafayette, IN 47907-1285

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network

Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network Shikha Swaroop Department of Information Technology Dehradun Institute of Technology Dehradun, Uttarakhand. er.shikhaswaroop@gmail.com

More information

The Complexity of Connectivity in Wireless Networks. Roger WISARD

The Complexity of Connectivity in Wireless Networks. Roger WISARD The Complexity of Connectivity in Wireless Networks Roger Wattenhofer @ WISARD 2008 1 The paper Joint work with Thomas Moscibroda Former PhD student of mine Now researcher at Microsoft Research, Redmond

More information

BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks

BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks Abstract HANY MORCOS IBRAHIM MATTA AZER BESTAVROS {hmorcos, matta, best}@cs.bu.edu Computer Science Department, Boston University

More information

Energy Efficient Clustering Protocol for Wireless Sensor Network

Energy Efficient Clustering Protocol for Wireless Sensor Network Energy Efficient Clustering Protocol for Wireless Sensor Network Shraddha Agrawal #1, Rajeev Pandey #2, Mahesh Motwani #3 # Department of Computer Science and Engineering UIT RGPV, Bhopal, India 1 45shraddha@gmail.com

More information

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Volume 2 Issue 9, 213, ISSN-2319-756 (Online) An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Nishi Sharma Rajasthan Technical University Kota, India Abstract: The popularity of Wireless

More information

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

An Adaptive Self-Organization Protocol for Wireless Sensor Networks An Adaptive Self-Organization Protocol for Wireless Sensor Networks Kil-Woong Jang 1 and Byung-Soon Kim 2 1 Dept. of Mathematical and Information Science, Korea Maritime University 1 YeongDo-Gu Dongsam-Dong,

More information

Coverage by Directional Sensors in Randomly Deployed Wireless Sensor Networks

Coverage by Directional Sensors in Randomly Deployed Wireless Sensor Networks Coverage by Directional Sensors in Randomly Deployed Wireless Sensor Networks Jing Ai and Alhussein A. Abouzeid Electrical, Computer and Systems Engineering Department Rensselaer Polytechnic Institute,

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Algorithms for minimum m-connected k-tuple dominating set problem

Algorithms for minimum m-connected k-tuple dominating set problem Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

More information

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang School of Electrical and Computer Engineering, Purdue University,

More information

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data

More information

NETWORK coding is an area that has emerged in 2000 [1],

NETWORK coding is an area that has emerged in 2000 [1], 450 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 2, APRIL 2008 Efficient Broadcasting Using Network Coding Christina Fragouli, Jörg Widmer, and Jean-Yves Le Boudec, Fellow, IEEE Abstract We consider

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor

More information

Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs

Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs Prabhleen Kaur Punjab Institute of Technology, Kapurthala (PTU Main Campus), Punjab India ABSTRACT Wireless Sensor Network has gained

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract

More information

Pervasive and Mobile Computing. Improved sensor network lifetime with multiple mobile sinks

Pervasive and Mobile Computing. Improved sensor network lifetime with multiple mobile sinks Pervasive and Mobile Computing 5 (2009) 542 555 Contents lists available at ScienceDirect Pervasive and Mobile Computing journal homepage: www.elsevier.com/locate/pmc Fast track article Improved sensor

More information

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,

More information

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,

More information

Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN

Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN Fangting Sun, Mark Shayman Department of Electrical and Computer Engineering University of Maryland,

More information

Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks

Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang *, Chenyang Lu, Robert Pless, Christopher Gill Department of Computer Science

More information

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs Changyan Yi and Ken Ferens Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada yic3@cc.umanitoba.ca,

More information

Dynamic Cooperative Routing (DCR) in Wireless Sensor Networks

Dynamic Cooperative Routing (DCR) in Wireless Sensor Networks Dynamic Cooperative Routing () in Wireless Sensor Networks Sivasankari H. 1, Leelavathi R. 1, Shaila K. 1, Venugopal K.R. 1, S.S. Iyengar 2, and L.M. Patnaik 3 1 Department of Computer Science and Engineering,

More information

Energy-efficient Data Dissemination in Wireless Sensor Networks

Energy-efficient Data Dissemination in Wireless Sensor Networks Energy-efficient Data Dissemination in Wireless Sensor Networks Ji-Han Jiang 1 Kuo-Hua Kao 2 Singing ee 2 1 Department of Computer Science and Information Engineering National Formosa University, Yun-in,

More information

SPATIAL CORRELATION BASED CLUSTERING ALGORITHM FOR RANDOM AND UNIFORM TOPOLOGY IN WSNs

SPATIAL CORRELATION BASED CLUSTERING ALGORITHM FOR RANDOM AND UNIFORM TOPOLOGY IN WSNs SPATIAL CORRELATION BASED CLUSTERING ALGORITHM FOR RANDOM AND UNIFORM TOPOLOGY IN WSNs Bhavana H.T 1, Jayanthi K Murthy 2 1 M.Tech Scholar, Dept. of ECE, BMS College of Engineering, Bangalore 2 Associate

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Sensor Network Protocols

Sensor Network Protocols EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted

More information

Cluster Head Selection using Vertex Cover Algorithm

Cluster Head Selection using Vertex Cover Algorithm Cluster Head Selection using Vertex Cover Algorithm Shwetha Kumari V M.Tech Scholar (Computer Network Engineering), Dept. of Information Science & Engineering, NMAMIT, Nitte Vasudeva Pai Assistant Professor,

More information

Power aware routing algorithms for wireless sensor networks

Power aware routing algorithms for wireless sensor networks Power aware routing algorithms for wireless sensor networks Suyoung Yoon 1, Rudra Dutta 2, Mihail L. Sichitiu 1 North Carolina State University Raleigh, NC 27695-7911 {syoon2,rdutta,mlsichit}@ncsu.edu

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,

More information

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks Appl. Math. Inf. Sci. 8, No. 1L, 349-354 (2014) 349 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l44 Energy Optimized Routing Algorithm in Multi-sink

More information

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive

More information

Free-CLASH Improved Localization-Free Clustering in Large Wireless Sensor Networks

Free-CLASH Improved Localization-Free Clustering in Large Wireless Sensor Networks Free-CLASH Improved Localization-Free Clustering in Large Wireless Sensor Networks Jakob Salzmann, Ralf Behnke, Jiaxi You, Dirk Timmermann University of Rostock Institute of Applied Microelectronics and

More information

Lecture 2 September 3

Lecture 2 September 3 EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give

More information

Networking Sensors, II

Networking Sensors, II Networking Sensors, II Sensing Networking Leonidas Guibas Stanford University Computation CS321 ZG Book, Ch. 3 1 Class Administration Paper presentation preferences due today, by class time Project info

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

Networking Wireless Sensors: New Challenges

Networking Wireless Sensors: New Challenges Networking Wireless Sensors: New Challenges Bhaskar Krishnamachari Autonomous Networks Research Group Department of Electrical Engineering-Systems USC Viterbi School of Engineering http://ceng.usc.edu/~anrg

More information

3D Wireless Sensor Networks: Challenges and Solutions

3D Wireless Sensor Networks: Challenges and Solutions 3D Wireless Sensor Networks: Challenges and Solutions Hongyi Wu Old Dominion University Ph.D., CSE, UB, 2002 This work is partially supported by NSF CNS-1018306 and CNS-1320931. 2D PLANE, 3D VOLUME, AND

More information

SAMPLING SENSOR-FIELDS USING A MOBILE OBJECT: A BAND-BASED APPROACH FOR DIRECTIONAL BROADCAST OF SENSOR-DATA

SAMPLING SENSOR-FIELDS USING A MOBILE OBJECT: A BAND-BASED APPROACH FOR DIRECTIONAL BROADCAST OF SENSOR-DATA SAMPLING SENSOR-FIELDS USING A MOBILE OBJECT: A BAND-BASED APPROACH FOR DIRECTIONAL BROADCAST OF SENSOR-DATA Juzheng Li and Sol M. Shatz Department of Computer Science, University of Illinois at Chicago

More information