Aggregation-Friendly Data Collection Protocol of Wireless Sensor Networks for PoI Monitoring

Size: px
Start display at page:

Download "Aggregation-Friendly Data Collection Protocol of Wireless Sensor Networks for PoI Monitoring"

Transcription

1 Aggregation-Friendly Data Collection Protocol of Wireless Sensor Networks for PoI Monitoring Xiaobing Wu,ShenLi, Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University, China Department of Computer Science University of Illinois at Urbana-Champaign, USA Abstract Point of Interest (PoI) coverage problem has been discussed lately. Both practical strategies and theoretical analysis have been proposed. We however argue that coverage solution alone is not enough. In real applications, data from the covered area need to be collected and sent back to the sink. We notice that existing protocols are for general purpose use and not specially designed for PoI monitoring. Accordingly, we propose Smaller tree Collection Protocol () for data collection in this kind of applications. is a distributed approximation for building a minimum Steiner tree connecting all PoI nodes and the sink. aims to activate minimum relay nodes and supports data aggregation better than other collection protocol, e.g., Collection Tree Protocol (), Backpressure Collection Protocol (BCP) and opportunistic routing protocols. We also design low cost distributed mechanisms to handle PoI dynamics. Extensive simulations have been performed to evaluate the proposed protocol. Keywords: Wireless sensor network, PoI routing, collection protocol, distributed Steiner tree. I. INTRODUCTION Data collection is a fundamental functionality for wireless sensor networks. Collection Tree Protocol () [1] [2] is a practical approach which has been used for years and many applications [3] [4] [5] and testbeds [6] [7] have already evaluated its performance. Another approach, Backpressure Collection Protocol (BCP) [8] tries to view the problem from a different standpoint. It was also implemented on real sensor networks with good outcome. Opportunistic routing [9] takes advantage of the broadcasting nature of wireless media. Aggregation, which is another important technique for WSN monitoring applications, has been discussed for many years [13] [14] [15] [16]. The basic idea is to combine packets from different sources into one packet, in order to reduce redundancy and, eventually, save energy. Many researchers have done quite a few works on different aspects of aggregation, including fault tolerance and scalability [14], aggregation architecture [13], network lifetime maximization [16] and etc. Point of Interest (PoI) monitoring scenario needs both collection protocols and aggregation techniques. To the best of our knowledge, PoI coverage was first considered in [10]. In this scenario, instead of the whole area, only a few portion of locations need to be monitored. They use mobile sensors to conduct sweep coverage. Additionally, a single coverage scheme is not enough for monitoring applications. Data collection protocol is also necessary for PoI monitoring applications. Although [1] and BCP [8] have been used in many applications, we argue that they are not suitable for PoI data collection. Since they are designed for general purpose use and could activate too many relay nodes which are precious resources in the application. Data aggregation is not considered either in these two protocols. Therefore data collection protocols using less relay nodes and supporting aggregation are needed for PoI monitoring application. In this paper, we propose Smaller tree Collection Protocol () which aims to use minimum relay nodes and is able to fulfill the PoI monitoring tasks without incurring much unbalanced traffic in the network by means of aggregation. Our contributions are three folds. First, we propose a novel data collection protocol for PoI monitoring applications, which can deal with PoI dynamics with efficient strategies. Second, we theoretically prove that activates no more relay nodes than if the PoI emerges one by one. Third, we have performed extensive simulations to evaluate the proposed scheme. The remainder of this paper is organized as follows. In section II we provide a brief survey of related works. Section III presents our main idea. The detailed design is described in IV. In section V, we show our evaluation results. Finally, we conclude our work in section VI. II. RELATED WORKS Quite a few previous works have addressed the coverage problems in wireless sensor networks, including full coverage and barrier coverage. Liu et al. [10] proposed a new coverage scenario where only certain points of interest (PoI) need to be periodically monitored. Mobile sensors are used to achieve sweep coverage among all those PoIs. Ma et al. [11] propose to employ a steepest descent method to optimize the control parameters for scheduling a mobile sensor s coverage time among a set of PoIs. Their model is based on Markov chain wherein the sensor uses a transition probability to determine next destination. We do not consider mobile sensor in our work. Most existing collection protocols are for general purpose. Collection Tree Protocol () [1] is the most widely used one. They assume expected transmissions (ETX) as the cost /11/$ IEEE

2 metric and a tree topology is employed implicitly. works well in some specific applications [3] [4] [5]. But in PoI monitoring, only sparse spots generate data, a much smaller collection tree is adequate. Moeller et al. [8] consider the same problem in another way. In their Backpressure Collection Protocol, routing and forwarding decisions are made on a per-packet basis. BCP is more agile and can handle local congestions well. However, this agility makes aggregation, an important and useful functionality, hard to be applied. When, where and how to conduct aggregation becomes difficult in BCP. Different from the above two protocols, opportunistic routing [9] chooses a candidate subset rather than a determined node to forward packets. All the candidate are prioritized by distance. But for PoI monitoring cases, minimizing ETX is not the only objective. In our work, we propose Smaller tree Collection Protocol for PoI monitoring, which employs a much smaller collection tree in which aggregations can be easily conducted. Data aggregation in wireless sensor networks has been discussed for years. But it always acts as an auxiliary part. Kalpakis et al. [16] focus on how to maximize lifetime of a WSN. Given the location of both sensors and base station together with energy storage at each sensor, they designed a polynomial time algorithm to find an efficient manner which defined the data collection and transmission strategy. Li et al. [17] find that correlations between data generated by different sensors can help to reduce data gathering cost. They thus employ a compression tree and use conditional distribution to compress observed value. Joo et al. [18] analyze the performance of optimal scheduling with in-network aggregation in tree-topology networks while aiming at minimizing sum delay of sensed data. In [13], Zhao et al. describe an architecture for sensor network monitoring, which consists of three classes of software, namely continuously collects aggregates, scans and dumps. They also designed protocols to continuously compute network digests which help to implicitly build a energyefficient aggregation tree and showed the impact of packet loss on the aggregation performance. Gupta et al. [14] design a gossip strategy to calculate global aggregate functions over the votes of individual group members. Aggregation is better supported in our proposed protocol since the generated tree has more convergence points. III. OVERVIEW Different from traditional WSN routing protocols, our approach does not aim at serving each individual node with a minimum expected transmission (ETX) path. We consider a task-intensive scenario where the wireless sensor nodes are highly loaded such that the nodes themselves are precious resources. Accordingly, aims to build a collection tree with minimum active relay nodes. Meanwhile it does not increase the load on each sensor to a great extent with data aggregation. A. Assumptions We assume that the sensors in the field are evenly deployed and there are approximately the same number of sensors in each unit area. Points of interest (in the form of events that the system is interested in) can emerge and disappear in random. The sensors are able to detect events occurred near them. We call the sensor closest to one point of interest a PoI agent. The PoI agents use a routing path to relay data to the sink node. B. Approach to Build Data Collection Tree The PoI monitoring problem can be modeled as a Steiner tree problem. Let G = {V,E} represent the whole WSN, where V and E denote the set of nodes and links respectively. Each edge e(u, v) represents a neighboring pair u and v, where they can both hear each other. The subset U V consists of all PoI agents covering all PoIs. The minimum Steiner tree T is thus the data collection tree we try to build. However, it is well known that minimum Steiner tree problem is an NP-hard problem [12]. Most of the known Steiner tree approximation algorithms are too complicated and call for heavy calculation, which is not practical to be implemented into distributed sensor networks. Thus, we propose, which is an aggregation-friendly data collection protocol for point of interest applications of WSNs. The basic idea of is that we treat every active node in WSN as a virtual sink. We call a node active when it is awake and can be selected as a relay for data reception and transmission. This method allows a new PoI agent connects to the nearest virtual sink (an active node) which might be much closer than to the real sink. In this way, the number of active nodes are reduced because different agents might connect to the same virtual sink. Whenever a new PoI agent joins the collection tree, all the nodes on its path towards its virtual sink are activated. Then they can serve as virtual sinks for future PoI agents. Actually, as shown in Fig. 1, all the virtual sinks on our collection tree divide the whole network into a Voronoi diagram due to the fact that every PoI agent connects to the nearest active node. Accordingly, when a new PoI emerges, the new routing path for its agent is limited inside the Voronoi cell covering the PoI. Another problem has to be handled is the PoI dynamics. According to the assumption, PoIs may emerge and disappear. The PoI agent and related active relay nodes might turn to dormant due to the disappearance of a PoI, and they cannot be virtual sinks before be activated again. Thus, their Voronoi cells should be disabled and the nodes inside the original cells need new routing information. We denote the disabled Voronoi cell a hole. There is backup route option provided in design. In specific, we keep two routing information on each node from and respectively. Whenever the routing decision for is out-of-date, the node starts to use the next hop provided by. It is worth noticing that the routing decisions apply only to those node inside holes. When a data packet is forwarded into an active Voronoi cell, takes over routing decision again. As time goes by, new PoI

3 Fig. 1. Voronoi Diagram : all virtual sinks divide the WSN into different Voronoi cells. Fig. 2. Collection tree generated by. Circles are PoI agents and triangle is the sink. emergence and periodical beacon broadcasting by the virtual sinks can help to fill up holes. IV. PROTOCOL DESIGN Since the PoI can emerge and disappear in random, we need handle the PoI dynamics in the protocol design. The emergence and disappearance of the PoIs brings holes. Although nodes inside disabled areas have an alternative routing option, it undermines the global efficiency. We now elaborate the details of protocol in four parts: Network Initialization, Handling PoI Emergence, Dealing with PoI Disappearance, Beacon Broadcasting and Data Aggregation Support. A. Network Initialization Our approach requires each node maintain two different forwarding parents and two ETX items for and seperately. The sink node first broadcasts a control beacon which contains three data fields and two control bits. The three data fields store ETX (ETX ) information, ETX (ETX ) information and the ID of the sender. The control bits are virtual bit (V) and quit bit (Q). The Q bit is used when an active node turns into dormant. We present its usage in the PoI Disappearance section. The V bit denotes whether one beacon is initialized by a virtual sink. During network initialization, all packets are initialized by the real sink and virtual bit is set to 0. When receiving this beacon, the receiver compares the new ETX inside the beacon with its own. If the new ETX is at least 1 lower, then the receiver uses the sender ID and ETX to update its parent and ETX field. Then, this node informs neighbors by broadcasting its ETX and node ID. In this way, a static data collection tree is built and maintained in the network. The ETX is set to the same as ETX in this phase. A node needs to update expected transmission only when it hears a beacon whose V bit is 1 and carries a lower ETX, i.e., this beacon indicates a shorter path towards a virtual sink. Fig. 3. Collection trees generated by. Circles are PoI agents and triangle is the sink. B. Handling PoI Emergence In, the PoI agent connects itself to the nearest virtual sink when a new PoI appears. Fig. 2 and 3 present the collection trees generated by and respectively. It is obvious that a much smaller data collection tree is used in, compared to the tree used in. Therefore is more suitable for task-intensive scenarios where every node is highly loaded and data collection trees with small sizes are needed. When a node is activated after the path towards some virtual sink is built, it starts to broadcast a beacon whose ETX field is set to 0 and V bit set to 1. If the ETX in the beacon is smaller than receiver s ETX, the receiver will use this beacon to update its own information, increase the ETX field by 1 and forward this beacon to further nodes. Otherwise, if the ETX inside the beacon is greater, the receiver just simply drops it. So, turning on one node affects only sensors inside the same Voronoi cell. We also have the following theorem regarding to the number of relays used in data collection trees by and. Theorem 4.1: activates no more relay nodes than does when PoI emerges one by one. Proof: We prove this theorem by contradiction. Suppose connecting a new PoI agent to the sink activates less relay nodes than. Let G(V,E) denote the whole network where V and E represent the set of all nodes (b)

4 and set of all available links respectively. Let Path(u, v) denote a sequence of available links connecting u and v. Let Len(p) represent the number of links on the path p. Wehave Len(Path min (u, v)) = Min{Path(u, v)}. We define set of active nodes as ACT = {v v V v is active}. Suppose the agent of the new PoI is s and its ETX (s) = Min{Len(Path min (s, v)), v ACT }. Let AN C(s) be the set of ancestors of s on the collection tree. If s is connected to its nearest active ancestor, this action will turn on L anc nodes, where L anc = Min{Len(Path min (s, a)), a ACT ANC}. According to the assumption, L anc < ETX (s). However, ETX (s) =Min{Len(Path min (s, v)), v ACT } = Min{Min{Len(Path min (s, v)), v (ACT ANC)},Min{Len(Path min (s, v)), v ACT ANC}} = Min{Min{Len(Path min (s, v)), v (ACT ANC)},L anc } L anc <ETX (s). We get ETX (s) <ETX (s), which is impossible. Thus, the assumption does not hold, i.e., always uses the same or smaller number of relay nodes than to build a collection tree. C. Dealing with PoI Disappearance It is very clear that when a PoI disappears, the agent should disable its Voronoi cell. In order to achieve this, the agent simply broadcasts a control beacon whose Q bit is set to 1 (quit beacon) and node ID field is set to the agent s node ID. As to a receiver, if its own parent (the predecessor on the path) is the same as the node ID in the beacon, the receiver broadcasts another quit beacon with its own ID inside. In this way, ETX of all nodes in the Voronoi cell are disabled. When a PoI emerges in this cell again, the routing path is used. But different from the initial path, we only activate the segment inside the same Voronoi cell. For nodes outside, whenever their parents are still available, the routing path is used. Besides disabling PoI agent, related relay nodes need quit the data collection tree as well. For an illustration, as in Fig.??(d), if the upper-right PoI disappears, both its agent (the gray node) and all of the nearest 5 ancestors should quit. It is possible that some intermediate ancestor quit earlier and the downstream nodes cannot receive the quit beacon and does quit eventually. Here, we present a simple distributed algorithm to deal with this situation. The pseudo codes are given in Algorithm 1. The basic idea of Algorithm 1 is to quit the ancestors one by one until control beacon arrived at the nearest branch on data collection tree. The branch node is parent of more than one PoI agents. Thus, the path above this node should be reserved. D. Beacon Broadcasting The two sections above describe actions when a PoI agent joins or leaves the collection tree. However, since the PoI set changes dynamically, a long path might be used to connect a Algorithm 1: PoI Quit Input: Control beacon (P), Children list (C), Node ID (ID) C.cnt = C.cnt - 1; if C.cnt > 0 then C.remove(P.ID); Drop P; end else P.ID = ID; Broadcast P; end C.cnt the number of items in the children list. C.remove(v) remove v from C. P.ID return the sender ID inside the control beacon. PoI agent to the sink. As shown in Fig. 4, dashed squares and circles are previous agents and activated nodes respectively. They were in the same collection tree before. But, after their departure, current PoI agent still use previous path for data collection, which is longer than the path formed by gray circles. Another problem is that, each time when an active node leaves, an hole appears. Although the newly-activated sensors will help to fill it up, it depends on the location of the newly-emerged PoI agents. Periodic beacon broadcasting is used in to reshape the collection tree. This beacon is launched by the virtual sinks and the real sink and broadcasted among the whole network. On receiving the first beacon, every sensor sets parent into its parent and broadcasts to inform other nodes. When the sensor heard later beacons, it just simply drops it. As to PoI agents, they randomly pick a back-off interval. And when the timer fired, the very agents start to join the collection tree as described in the PoI emergence section. u Active Path in Use Sink v Previous PoI w Better Active Path Current PoI Fig. 4. Excessively Long Path. Pink nodes are previous PoI agents. As they quit from the Collection tree, the routing path for the current PoI agent becomes excessively long.

5 E. Data Aggregation Support For some aggregation functions, e.g., MAX, MIN, COUNT, SUM and etc., can significantly save the volume of packets. Because no matter how large a subtree is, the root node just receives one packet. In fact, all aggregates which has the property of decomposability [14] [15] can be supported in. Function f is decomposable by a function g if it can be formulated as: f(v 1,,v n )=g(f(v 1,,v k ),f(v k+1,,v n )) Collection tree size V. EVALUATION Simulations are performed under situation where information is not decomposable, which is the most unfavorable scenario for. We have examined the performance of in terms of collection tree size and packets volume under both static and dynamic environments. Here, being static means PoI emerges one by one and will not disappear. We have compared the results of with and BCP (when it is applicable). For all the simulations below, we employ the disk model and the communication radius is set to 70 meters. The density of WSN is 1/70 which means there is one sensor every 70 square meters on average. The nodes and PoIs are randomly deployed. As to BCP, since its initialization step generates many data packets, we use the ETX to initialize its floating queue [8]. It does not restrict BCP to obey a topology even though ETX implies intuition. Since data packets are continuously generated, the queue size changes overtime and it does not rely on the infrastructure. A. Collection Tree Size We consider a scenario where a collection tree with small size is prioritized. We first look at how the collection tree grows with the increasing network size. Since the WSN is randomly deployed, we conduct five experiments with the same parameter configuration for both and. As shown in Fig. 5(a), the number of PoI agents are set to 30 for all cases and we can see that collection tree grows much slower than does. For the case where the WSN consists of 100 nodes, almost use only PoI agents themselves to build collection tree. Fig. 5(b) shows the performance when network size is 500 and the number of PoI agents grows. The squared line is for reference purpose and indicates the number of PoI agents. We notice that no matter how number of PoIs increases, constantly uses about 20 extra sensors for data collection. This indicates that performs quite well in terms of collection tree size. B. Performance of dealing with PoI Dynamics Result of dynamic situations are shown in Fig. 6. We define an action PoI shift as an event that a previous PoI disappears and a new one emerges. Thus, PoI shift does not change total number of PoI agents. Simulation is conducted with 500 sensor nodes in total and 30 of them are PoI agents. We let and walk through 450 PoI shifts. For, the interval of periodical beaconing is set to 60 PoI shifts. From the result Collection tree size Number of active nodes Network size POI (a) Number of POIs Fig. 5. (b) Collection Tree Size Number of POI shifts Fig. 6. Dynamic Collection Tree size we can see that use much less active nodes than and the number of activated nodes fall down apparently after each beaconing. C. Overall Number of Packets in the Network Another advantage of is that it can save overall number of packets on the network. During experiment, we let our system runs for 10 minutes in each scenario and count all the packets sent in the network. For both simulations, 30 PoI agents are deployed randomly. Each PoI agent generates one packet every minute and we assume that all links are perfect, i.e., sensors do not need to retransmit any data packet or control beacon. In Fig. 7, it is obvious to see that BCP uses

6 Data packets BCP does not raise much traffic load on each individual node. Simulation results show that is not only feasible in both static and dynamic scenarios, but also outperforms and BCP in PoI applications when assigns higher priority to smaller collection tree in the network. Fig Network size Fig. 7. Data Packets Overall number of packets as network size grows BCP Number of POI shifts Overall number of packets in each interval under dynamic situation much more packets to collect information from all PoI agents. It can be explained in this way. As BCP has no determined topology, it is hard to employ any aggregation strategy, i.e., each packet can just carry data for one PoI agent. We can also see that the overall cost of is lower than, which verifies that supports data aggregation better. Fig. 8 shows the overall number of packets in, BCP and in each interval under dynamic situations. Each PoI agent generates one data packet every 10 minutes. And there is one PoI shift each hour. The lines display the number of packets between every two PoI shifts. BCP performs the worst as it is hard to conduct aggregation strategy. Although activates less relay node, its total packets is the same as, if not less than, s. VI. CONCLUSION We present the design and evaluation of, a data collection protocol for PoI monitoring. The key idea of is to connect a new PoI agent to the current collection tree rather than the real sink node in order to activate less relay nodes due to the fact that in PoI applications, only a small portion of sensors generate data. By employing aggregation techniques, ACKNOWLEDGMENTS The work is partly supported by China NSF grants ( , , ). REFERENCES [1] O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, Collection tree protocol, ACM SenSys, November [2] R. Fonseca, O. Gnawali, K. Jamieson, S. Kim, P. Levis, and A. Qoo. TEP 123: The Collection Tree Protocol, Augest [3] M. Bathula, M. Ramezanali, I. Pradhan, H. Patel, J. Gotschall, and N. Sridhar. A sensor network system for measuring traffic in shor-term construction work zones. DCOSS 2009, Berlin, Heidelberg, [4] J. Ko, T. Gao, and A. Terzis. Empirical study of a medical sensor application in an urban emergency department. In BodyNets [5] S. Li, A. Zhan, X. Wu, and G. Chen, ERN: emergence rescue navigation with wireless sensor networks, IEEE ICPADS, Shenzhen, China, [6] B. N. Chun, P. Buonadonna, A. AuYoung, Chaki Ng, D. C. Parkes, J. Shneidman, A. C. Snoeren, and A. Vahdat, Mirage: a microeconomic resource allocation system for sensornet testbeds, The 2nd IEEE workshop on Embedded Networked Sensors, April-Ma, [7] G. W. Allen, P. Wieskowski, and M. Welsh, MoteLab: a wireless sensor network testbed, The 4th international symposium on Information processing in sensor networks, Los Angeles, California, April [8] S. Moeller, A. Sridharan, B. Krishnamachari, and O. Gnawali, Routing without routes: the backpressure collection protocol, ACM IPSN, April [9] S. Biswas and R. Morris, Opportunistic Routing in Multi-Hop Wireless Networks, ACM SIGCOMM, August [10] W. Cheng, M. Li, K. Liu, Y. Liu, X. Li, and X. Liao, Sweep coverage with mobile sensors, IEEE International Parallel and Distributed Processing Symposium, pages 1C9, March [11] C.Y.T.Ma,D.K.Y.Yau,N.K.Yip,N.S.V.Rao,andJ.Chen, Stochastic steepest-descent optimization of multiple-objective mobile sensor coverage, IEEE International Conference on Distributed Computing Systems, Genoa, Italy, June [12] D. S. Hochbaum, Approximation algorithms for NP-hard problems, PWS Publishing Company, Boston, MA, [13] J. Zhao, R. Govindan, and D. Estrin, Computing aggregates for monitoring wireless sensor networks, IEEE Sensor Network Protocols and Applications, [14] I. Gupta, R. van Renesse, and K. Birman, Scalable fault-tolerant aggregation in large process groups, International Conference on Dependable Systems and Networks, [15] S. Madden, M. Franklin, J. Hellerstein, and W. Hong, TAG: a tiny aggregation service for ad hoc sensor networks, USENIX symposium on Operating Systems Design and Implementation, [16] K. Kalpakis, K. Dasgupta, and P. Namjoshi, Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks, Computer Networks, 42(6): , August [17] J. Li, A. Deshpande, and S. Khuller, On computing compression trees for data collection in wireless sensor networks, IEEE INFOCOM, San Diego, USA, [18] C. Joo, J. G. Choi, and N. B. Shroff, Delay performance of scheduling with data aggregation in wireless sensor networks, IEEE INFOCOM, San Diego, USA, 2010.

Aggregation-Friendly Data Collection Protocol of Wireless Sensor Networks for PoI Monitoring

Aggregation-Friendly Data Collection Protocol of Wireless Sensor Networks for PoI Monitoring Aggregation-Friendly Data Collection Protocol of Wireless Sensor Networks for PoI Monitoring Xiaobing Wu, Shen Li, Guihai Chen State Key Lab for Novel Software Technology Nanjing University, China Department

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Collection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter

Collection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter Collection Tree Protocol A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter Collection Protocols Why do we need collection protocols? Collecting data at a base station is a

More information

Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs

Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs Rachel Cardell-Oliver School of Computer Science & So8ware Engineering semester-2 2018 MoBvaBon Holes cause WSN to fail its role Holes can

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

Routing for IoT and Sensor Systems

Routing for IoT and Sensor Systems Facoltà di Ingegneria dell Informazione, Informatica e Statistica Internet of Things A.Y. 2017/18 Routing for IoT and Sensor Systems Federico Ceccarelli PhD Student 1 The Collection Tree Protocol (CTP)

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

Opportunistic Transmission Based QoS Topology Control. QoS; Wireless Sensor Networks

Opportunistic Transmission Based QoS Topology Control. QoS; Wireless Sensor Networks Opportunistic Transmission Based QoS Topology Control in Wireless Sensor Networks Jian Ma, Chen Qian, Qian Zhang, and Lionel M. Ni Hong Kong University of Science and Technology {majian, cqian, qianzh,

More information

Delay Efficient Data Gathering in Sensor Networks

Delay Efficient Data Gathering in Sensor Networks Delay Efficient Data Gathering in Sensor Networks Xianjin Zhu, Bin Tang, and Himanshu Gupta Department of Computer Science, State University of New York at Stony Brook, Stony Brook, NY 11794 {xjzhu, bintang,

More information

Energy-Efficient Opportunistic Topology Control in Wireless Sensor Networks

Energy-Efficient Opportunistic Topology Control in Wireless Sensor Networks Energy-Efficient Opportunistic Topology Control in Wireless Sensor Networks Jian Ma, Qian Zhang, Chen Qian, and Lionel M. Ni Department of Computer Science and Engineering Hong Kong University of Science

More information

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Prianka.P 1, Thenral 2

Prianka.P 1, Thenral 2 An Efficient Routing Protocol design and Optimizing Sensor Coverage Area in Wireless Sensor Networks Prianka.P 1, Thenral 2 Department of Electronics Communication and Engineering, Ganadipathy Tulsi s

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

FEDA: Fault-tolerant Energy-Efficient Data Aggregation in Wireless Sensor Networks

FEDA: Fault-tolerant Energy-Efficient Data Aggregation in Wireless Sensor Networks : Fault-tolerant Energy-Efficient Data Aggregation in Wireless Sensor Networks Mohammad Hossein Anisi Department of Electrical and Computer Engineering Azad University of Qazvin, Qazvin, Iran anisi@qazviniau.ac.ir

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

outline Sensor Network Navigation without Locations 11/5/2009 Introduction

outline Sensor Network Navigation without Locations 11/5/2009 Introduction Sensor Network Navigation without Locations Mo Li, Yunhao Liu, Jiliang Wang, and Zheng Yang Department of Computer Science and Engineering Hong Kong University of Science and Technology, outline Introduction

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Cushion: Autonomically Adaptive Data Fusion in Wireless Sensor Networks. Technical Report August 2005

Cushion: Autonomically Adaptive Data Fusion in Wireless Sensor Networks. Technical Report August 2005 Cushion: Autonomically Adaptive Data Fusion in Wireless Sensor Networks Jungmin So Jintae Kim Indranil Gupta Department of Computer Science, University of Illinois at Urbana-Champaign {jso1, kim28, indy}@cs.uiuc.edu

More information

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs Changyan Yi and Ken Ferens Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada yic3@cc.umanitoba.ca,

More information

Opportunistic Overlay Multicast in Wireless Networks

Opportunistic Overlay Multicast in Wireless Networks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom proceedings. Opportunistic Overlay Multicast in Wireless

More information

The Capacity of Wireless Networks

The Capacity of Wireless Networks The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks Hogil Kim and Eun Jung Kim Department of Computer Science Texas A&M University College Station,

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

A REVIEW ON DATA AGGREGATION TECHNIQUES IN WIRELESS SENSOR NETWORKS

A REVIEW ON DATA AGGREGATION TECHNIQUES IN WIRELESS SENSOR NETWORKS A REVIEW ON DATA AGGREGATION TECHNIQUES IN WIRELESS SENSOR NETWORKS Arshpreet Kaur 1, Simarjeet Kaur 2 1 MTech Scholar, 2 Assistant Professor, Department of Computer Science and Engineering Sri Guru Granth

More information

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

Reliable and Energy Efficient Protocol for Wireless Sensor Network

Reliable and Energy Efficient Protocol for Wireless Sensor Network Reliable and Energy Efficient Protocol for Wireless Sensor Network Hafiyya.R.M 1, Fathima Anwar 2 P.G. Student, Department of Computer Engineering, M.E.A Engineering College, Perinthalmanna, Kerala, India

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

Onroad Vehicular Broadcast

Onroad Vehicular Broadcast Onroad Vehicular Broadcast Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian, Marwan Krunz Electrical and Computer Engineering University of Arizona

More information

State-Based Synchronization Protocol in Sensor Networks

State-Based Synchronization Protocol in Sensor Networks State-Based Synchronization Protocol in Sensor Networks Shang-Chih Hsu Wei Yen 1 1 Department of Computer Science and Engineering, Tatung University, Taipei, Taiwan, ROC shanzihsu@yahoo.com.tw, wyen@ttu.edu.tw

More information

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing

More information

On optimal placement of relay nodes for reliable connectivity in wireless sensor networks

On optimal placement of relay nodes for reliable connectivity in wireless sensor networks J Comb Optim (2006) 11: 249 260 DOI 10.1007/s10878-006-7140-y On optimal placement of relay nodes for reliable connectivity in wireless sensor networks Hai Liu Pengjun Wan Xiaohua Jia Received: 25 September

More information

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks A Novel Hierarchical Routing Protocol for Wireless Sensor Networks TrongThuaHuynh 1 and Choong Seon Hong 2 Department of Computer Science, Kyung Hee University, 1 Seocheon, Giheung, Yongin, Gyeonggi 449-701

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee, and Young-Bae Ko College of Information and Communication, Ajou University,

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Research Article Research on Dynamic Routing Mechanisms in Wireless Sensor Networks

Research Article Research on Dynamic Routing Mechanisms in Wireless Sensor Networks e Scientific World Journal, Article ID 165694, 7 pages http://dx.doi.org/10.1155/2014/165694 Research Article Research on Dynamic Routing Mechanisms in Wireless Sensor Networks A. Q. Zhao, 1 Y. N. Weng,

More information

Ad Hoc Networks. WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous wireless sensor networks

Ad Hoc Networks. WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous wireless sensor networks Ad Hoc Networks 67 (2017) 40 52 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous

More information

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

An Adaptive Self-Organization Protocol for Wireless Sensor Networks An Adaptive Self-Organization Protocol for Wireless Sensor Networks Kil-Woong Jang 1 and Byung-Soon Kim 2 1 Dept. of Mathematical and Information Science, Korea Maritime University 1 YeongDo-Gu Dongsam-Dong,

More information

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department

More information

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Flávio V. C. Martins, cruzeiro@dcc.ufmg.br Frederico P. Quintão, fred@dcc.ufmg.br Fabíola G. Nakamura fgnaka@dcc.ufmg.br,fabiola@dcc.ufam.edu.br

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

904 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008

904 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 904 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 Optimizing Lifetime for Continuous Data Aggregation With Precision Guarantees in Wireless Sensor Networks Xueyan Tang, Member, IEEE,

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation ata Aggregation in Wireless Sensor Networks with Minimum elay and Minimum Use of Energy: A comparative Study Bushra Qayyum Mohammed Saeed Jason Roberts Ph Student ean of Research Senior Lecturer University

More information

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

Outline. Introduction. Outline. Introduction (Cont.) Introduction (Cont.)

Outline. Introduction. Outline. Introduction (Cont.) Introduction (Cont.) An Energy-Efficient Distributed Algorithm for Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks Yingshu Li, Longjiang Guo, and Sushil K. Prasad Department of Computer Science, Georgia

More information

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-

More information

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 1 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0005 Mitigating Hot Spot Problems

More information

Energy-efficient routing algorithms for Wireless Sensor Networks

Energy-efficient routing algorithms for Wireless Sensor Networks Energy-efficient routing algorithms for Wireless Sensor Networks Chao Peng Graduate School of Information Science Japan Advanced Institute of Science and Technology March 8, 2007 Presentation Flow Introduction

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks

An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks J. Shanbehzadeh, M. Mehrani, A. Sarrafzadeh, and Z. Razaghi Abstract an important issue in WSN is the regional covering. A coverage

More information

RWPS: A Low Computation Routing Algorithm for Sensor Networks

RWPS: A Low Computation Routing Algorithm for Sensor Networks RWPS: A Low Computation Routing Algorithm for Sensor Networks Pierpaolo Bergamo, Daniela Maniezzo, Gianluca Mazzini Engineering Dept., University of Ferrara, Italy Mario Gerla Computer Science Dept., UCLA,

More information

Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks

Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks Mohammad Mehrani, Ali Shaeidi, Mohammad Hasannejad, and Amir Afsheh Abstract Routing is one of the most important issues

More information

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Wireless Sensor Networks (WSN) Tanyar Pooyeh 2pooyeh@informatik.uni-hamburg.de Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Outline Multi-hop Wireless Networks MANETs, VANETs, WSNs Routing

More information

Energy Balancing Routing Schemes for Low-Power Wireless Networks

Energy Balancing Routing Schemes for Low-Power Wireless Networks 2009 Seventh Annual Communications Networks and Services Research Conference Energy Balancing Routing Schemes for Low-Power Wireless Networks Eun-Sook Sung, Miodrag Potkonjak Computer Science Department

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

A Fault-recovery Routing Approach for Loop-based Clustering WSN

A Fault-recovery Routing Approach for Loop-based Clustering WSN A Fault-recovery Routing Approach for Loop-based Clustering WSN Ming Xu 1, Shengdong Zhang 1, Jiannong Cao 2, Xiaoxing Guo 3 ( 1 School of Computer, National Univ. of Defense Technology, Changsha, China)

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

On the Minimum k-connectivity Repair in Wireless Sensor Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu

More information

Asynchronous Data Aggregation for Real-time Monitoring in Sensor Networks

Asynchronous Data Aggregation for Real-time Monitoring in Sensor Networks Asynchronous Data Aggregation for Real-time Monitoring in Sensor Networks Jie Feng, Derek L. Eager, and Dwight Makaroff Department of Computer Science, University of Saskatchewan, Saskatoon, SK S7N 5C9,

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

Variable Power Broadcasting in Ad Hoc Networks

Variable Power Broadcasting in Ad Hoc Networks Variable Power Broadcasting in Ad Hoc Networks Avinash Chiganmi, Kamil Sarac, and Ravi Prakash Department of Computer Science, University of Texas at Dallas Email: {avinash.chiganmi@student., ksarac@,

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

On QoS Mapping in TDMA Based Wireless Sensor Networks

On QoS Mapping in TDMA Based Wireless Sensor Networks On QoS Mapping in TDMA Based Wireless Sensor Networks Wassim Masri and Zoubir Mammeri IRIT Paul Sabatier University Toulouse, France {Wassim.Masri, Zoubir.Mammeri}@irit.fr Abstract Recently, there have

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

Rumor Routing Algorithm

Rumor Routing Algorithm Aleksi.Ahtiainen@hut.fi T-79.194 Seminar on Theoretical Computer Science Feb 9 2005 Contents Introduction The Algorithm Research Results Future Work Criticism Conclusions Introduction is described in paper:

More information

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Ali Al-Dhaher, Tricha Anjali Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks

Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks Kazuya Sakai Department of CSSE Auburn University Auburn, AL 36849, USA Min-Te Sun Department of CSIE National Central University Jhongli

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,

More information