Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Similar documents
An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Message Transport With The User Datagram Protocol

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

within unicast packets that are organized into multicast data when they reach their destination. I.INTRODUCTION

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Study of Network Optimization Method Based on ACL

Coupling the User Interfaces of a Multiuser Program

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Module13:Interference-I Lecture 13: Interference-I

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

On the Placement of Internet Taps in Wireless Neighborhood Networks

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Online Appendix to: Generalizing Database Forensics

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

PAPER. 1. Introduction

Interference and diffraction are the important phenomena that distinguish. Interference and Diffraction

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

Supporting Fully Adaptive Routing in InfiniBand Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Estimating Velocity Fields on a Freeway from Low Resolution Video

A Framework for Dialogue Detection in Movies

Classical Mechanics Examples (Lagrange Multipliers)

1 Surprises in high dimensions

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Two Dimensional-IP Routing

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

A T-Step Ahead Constrained Optimal Target Detection Algorithm for a Multi Sensor Surveillance System

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Calculation on diffraction aperture of cube corner retroreflector

Skyline Community Search in Multi-valued Networks

A Plane Tracker for AEC-automation Applications

MODULE VII. Emerging Technologies

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Loop Scheduling and Partitions for Hiding Memory Latencies

Figure 1: Schematic of an SEM [source: ]

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ad-Hoc Networks Beyond Unit Disk Graphs

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved.

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment

Digital fringe profilometry based on triangular fringe patterns and spatial shift estimation

PART 2. Organization Of An Operating System

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Efficient Recovery from False State in Distributed Routing Algorithms

Enabling Rollback Support in IT Change Management Systems

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

Computer Organization

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Multicast Routing : Computer Networking. Example Applications. Overview

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Optimal path planning in a constant wind with a bounded turning rate

Comparison of Methods for Increasing the Performance of a DUA Computation

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

A Cost Model For Nearest Neighbor Search. High-Dimensional Data Space

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Robust Camera Calibration for an Autonomous Underwater Vehicle

AnyTraffic Labeled Routing

A Hybrid Routing Algorithm for Delay Tolerant Networks

Waleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

An Infrastructureless End-to-End High Performance Mobility Protocol

Lab work #8. Congestion control

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

Fast Window Based Stereo Matching for 3D Scene Reconstruction

I DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

Transcription:

Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI 4884, USA. Air Force Research Laboratory, Wright-Patterson Air Force Base, Dayton, OH, 45433 USA. Abstract This paper consiers architecture esign of mobile access coorinate wireless sensor networks (MC-WSN) for reliable an efficient information exchange. In sensor networks with mobile access points (SENMA), the mobile access points collect information irectly from iniviual sensors as they traverse the network, such that no routing is neee in ata transmission. While being energy efficient, a major limitation with SENMA is the large elay in ata collection, making it unesirable for timesensitive applications. In the propose MC-WSN architecture, the sensor network is coorinate by powerful mobile access points (MA), such that the number of hops from each sensor to the MA is minimize an limite to a pre-specifie number through active network eployment an network topology esign. Unlike in SENMA, where the ata collection elay epens on the physical spee of the MA, in MC-WSN, the elay epens on the number of hops an the electromagnetic wave spee, an is inepenent of the physical spee of the MA. This innovative architecture is energy efficient, resilient, fast reacting an can actively prolong the lifetime of sensor networks. Our simulations show that the propose MC-WSN can achieve higher energyefficiency an orers of magnitue lower elay over SENMA, especially for large-scale networks. Inex Terms Mobile access coorinator, wireless sensor networks, sensor network security an reliability. I. INTRODUCTION Wireless sensor networks have receive significant attention from the research community ue to their potential impact on various military an civilian applications. For efficient an reliable communication over large-scale networks, sensor networks with mobile access points (SENMA) was propose in [1]. In SENMA, the mobile access points (MAs) traverse the network to collect the sensing information irectly from the sensor noes; when the energy consumption at the MAs is not of a concern, SENMA improves the energy-efficiency of the iniviual sensor noes over a-hoc networks by relieving sensors from the energy-consuming routing functions [1], []. While being energy efficient, a major limitation with SENMA is the large elay in the ata collection process. This elay epens on the physical spee of the MA an the length of the MA trajectory, which woul increase ramatically as the network size increases. Large elay makes SENMA unesirable for time-sensitive applications. Along with the recent avances in the remote control technologies, UAVs have been use for management an coorination functions in wireless networks. For example, network eployment through UAV has been recently explore in the literature [3], [4]. For sensor eployment, the UAV basically carries one or more sensor noes, then flies to the require location an gets own to a specific altitue where it is safe to rop the sensor for eployment. A possible network eployment metho using UAV was experimente in [4]. In this paper, mobile access coorinate wireless sensor networks (MC-WSN) architecture is consiere for energyefficient, reliable, an time-sensitive information exchange. In MC-WSN, the whole network is ivie into cells, each is covere by one MA. The MAs coorinate the network through eploying, replacing an recharging noes. They are also responsible for enhancing the network security, by etecting compromise noes then replacing them [5]. Data transmission from sensor noes to the MA goes through simple routing with the cluster heas along a ring or a powerful center cluster hea locate at the mile of each cell. Base on active network eployment an topology esign, the number of hops from any sensor to the MA is minimize an limite to a pre-specifie number. Unlike in SENMA, the elay in MC-WSN epens on the number of hops an the electromagnetic wave spee, an is inepenent of the physical spee of the MA. For MC-WSN, the energy consumption at the iniviual sensors is mainly etermine by the istance from the nearest cluster hea, which is one hop away, an is inepenent of the coverage area of the MA an the noe ensity. We emonstrate the effectiveness of the propose architecture through simulation examples, which show that the MC-WSN architecture achieves higher energy-efficiency an orers of magnitue lower elay over SENMA, especially for large-scale networks. II. REVISIT THE SENMA SYSTEM To reuce the routing buren on iniviual sensors, SENMA networks utilize mobile access points to collect the sensing reports from all sensors noes [1]. The access point traverses the network at a height H S broacasting beacon signals at ranom locations. The coverage area of the access point is moele as a circle of raius r. The access point activates sensors within its coverage area, an each time only a single sensor respons to the beacon message by reporting its sensing information. In SENMA, since sensors communicate irectly to the mobile access point without any routing, the energy consumption at the iniviual sensors is significantly reuce over a-hoc networks [1]. For this to happen, the mobile access point nees to traverse its footprint exhaustively to cover all sensors, resulting in a very long mobile access trajectory an consequently

huge elay. The elay epens on the physical spee of the MA an the length of the MA trajectory, which woul increase significantly as the network size increases. Thus, SENMA coul be unesirable for time-sensitive applications. Motivate by this observation, we propose a mobile access coorinate wireless sensor networks architecture. III. THE PROPOSEOBILE ACCESS COORDINATED WIRELESS SENSOR NETWORK (MC-WSN) In this section, we escribe the propose MC-WSN architecture that aims at proviing reliable, energy-efficient an scalable network structure for prolonge-network lifetime an time-sensitive ata exchange. We assume the network is ivie into hexagonally shape cells, with sies of length. Each cell contains a single powerful mobile access point (MA) an K SN uniformly eploye sensor noes (SNs) that are arrange into K CH clusters, each is of raius R CH. Each cluster is manage by a cluster hea (CH), to which all the cluster members report their ata. CHs then route the ata to the MA. A powerful center cluster hea (CCH) is employe in the mile of each cell. The CCH can establish irect communication with the MA as long as it is insie the cell. After receiving the ata of the sensors, the MA elivers it to the Base Station (BS), which in turn makes the final ecisions. To improve the network reliability, efficiency an scalability, multiple BSs can be employe. The overall network architecture is illustrate in Figure 1. sensor noes an cluster heas. It moves physically for ata collection only in the case when the routing paths o not work. Otherwise, for security reasons, it stays at a ranom location on a circular path of a raius an at an angle φ from the CCH as shown in Figure. φ is uniformly istribute with PDF f φ (φ) = 1 π. The CHs along the circular path forms a ring, through which the ata can be elivere to the MA. The ring is esigne such that there is at least one CH on it can communicate irectly with the MA, which we refer to as the RCH. This shoul be the one nearest to the MA location. Note that, since the MA moves ranomly over the ring, the RCH is not fixe. It is also note that the ring may not be a strict circle, an it epens on the coverage area of the MA. Data transmission from any SN to the MA goes through simple routing, either with the CCH or the RCH. Let the communication range of each sensor noe be r c. SNs only communicate with their corresponing CH, which then route the ata to the MA. CHs have larger storage capacity an longer communication range than SNs. To minimize the elay in ata transmission from the sensors to the MA, the number of hops neee in routing shoul be minimize. Therefore, we consier iviing the CHs in the cell into two groups base on their location. The first group contains CHs within the area of raius R o from the CCH. While the secon group contains all CHs locate outsie the raius R o, where R o <. CHs in the first group will mainly route their information to the MA through the CCH, which can eliver the ata irectly to the MA. While CHs in the secon group route their information to the MA either irectly or through the RCH. The latter case happens by first routing the ata to the nearest CH on the ring, which then broacasts the ata in both irections along the ring until it reaches the RCH as shown in Figure. The RCH then eliver the ata to the MA. To minimize the number of hops, if a CHs in the secon group is very far from RCH, it can irectly forwars its ata to the CCH, as will be illustrate in Section V. Cluster hea Sensor noe Center cluster hea Mobile access Point Base Station Fig. 1. Propose MC-WSN architecture. c In the propose MC-WSN architecture, the MA coorinates the sensor network an resolves the noe eployment issue as well as the energy consumption problem of wireless sensor networks. More specifically, the MAs are responsible for (i) eploying noes, (ii) replacing an recharging noes, (iii) etecting malicious sensors, then removing an replacing them, (iv) collecting the information from sensors an elivering it to the BS. When an MA nees to be recharge or reloae, it sens a request to the MA base. The base will sen a new MA to the cell, an the ol MA will be taken back to the base for maintenance services. The MAs can move on the groun, an can also fly. Each MA traverses its cell mainly for removing the malicious noes an replacing or recharging low-energy R o RCH RCH Cluster hea Mobile access point Sensor noe Center cluster hea Fig.. The topology use in the MC-WSN architecture. Here CH c has a packet to eliver to the MA. 171

In the architecture esign, we limit the average number of hops from any SN to its corresponing CH to N 1, an limit the average number of hops from any CH to the MA to N, where N 1 an N are pre-specifie numbers. N 1 is controlle through active network eployment, while N is controlle through the network topology esign (i.e. select the ring raius an the raius R o ). The main features of the MC-WSN architecture are: Resolve the network eployment problem an actively prolong the network lifetime The propose MC-WSN allows the MAs to manage the eployment of SNs an CHs. That is, the MA can a more noes, relocate or replace exiting noes. In aition, it can recharge or replace low energy noes. When a noe has low remaining energy, it sens a control message to the MA notifying it with its energy level. The MA can then make the ecision to replace the noe or recharge it. Being coorinate by the MA, the MC-WSN architecture resolves the network eployment issue an can actively prolong the network lifetime. Minimize the elay Unlike in SENMA, where the ata collection elay epens on the physical velocity of the MA, in MC-WSN the elay epens on the number of hops an the electromagnetic wave spee, an is inepenent of the physical spee of the MA. Therefore, the elay is significantly lower than that in SENMA. The elay is further reuce by minimizing the number of hops require to reach the MA; this is achieve through network topology esign an active network eployment. Provie high energy efficiency The SNs have the most limite resources in wireless sensor networks. In the propose MC-WSN, SNs only communicate with their nearest CHs, an are not involve in any inter-cluster routing. Also, in contrast to SENMA, SNs in MC-WSN o not nee to receive the beacon signal from the MA. Enhance network security The MAs can etect malicious SNs an CHs an replace them [5]. It is ifficult to get the MA itself compromise or estroye, since it is much more powerful than other network noes, an it moves ranomly in the network where its location can be kept private [6]. Enhance network resilience, reliability an scalability: The MC-WSN is a self-healing architecture, where the CCH an RCH represent two options for relaying the ata to the MA. Each option can act as an alternative for the other. In the case when the routing paths o not work, the MA can traverse its cell for ata collection. Overall, MC-WSN is a resilient, reliable an scalable architecture. Discussions on Feasibility: Sensor noes an MAs eployment in ifferent cells is possible through the UAV technology. A helicopter, or a larger unmanne aerial vehicle, can eploy the MAs in the network, an can replace existing MAs when they are out of energy. The sensor eployment is initiate by the UAV an then tune by the MA. IV. NETWORK OPERATIONS In this section, we illustrate the main network proceures use in MC-WSN. A. Network Set-Up We assume that the CHs an the MAs are equippe with Global Positioning System (GPS) to obtain their location information. The network set-up is establishe through the following steps: 1) Cluster formation: All CHs broacast Hello messages containing their IDs an locations. Each SN etects it nearest CH, to which it sens a Request to Join (RT J). Upon reception of RT J, CH replies with Confirm to Join (CTJ). ) Ring set-up: The MA traverses the cell along a circular ring of raius broacasting Start messages to the CHs in its coverage area. Denote the set of CHs that are along the ring an within the MA coverage area as χ. All the CHs in χ receive the Start message, an reply to the MA with an ACK. 3) Discover links to the ring: broacast InitCH message to all their neighboring CHs. The InitCH message inclues the ID an location of the sener CH. When a CH receives the InitCH, it will in turn broacast InitCH to its neighbors. This happens until all CHs receive at least a single InitCH message. Confirmation is mae backwar through the same links. 4) Discover links to the CCH: CCH also broacasts a Reference signal to all its neighboring CHs. The Reference signal is forware by CHs, using the same manner iscusse above, until it reaches the CHs on the ring. 5) Establish the links to the ring or the CCH: CHs then establish connections with the CCH an/or the closest CH on the ring by sening Request to Connect (RT C) message. The process is complete when the intene receiver replies with Confirm to Connect (CTC). B. Sensing an Collecting The sensing an collecting stage is performe perioically, where the iniviual sensors monitor the environment an report their information to the CHs. When TDMA is use within clusters, each SN reports to its corresponing CH a ata message in its allotte time slot. In orer to minimize the interference between clusters (inter-cluster interference), Direct Sequence Sprea Spectrum (DSSS) can be use, where the noes of the ifferent clusters use ifferent spreaing coes [7]. Also, ata transmissions from SNs to CHs, between CHs, from CHs to the MA, an from the CCH to the MA are mae over ifferent frequencies to avoi interference between the ifferent communication links. CHs route the sensing information to the MA through their establishe links with the CCH or any noe in χ. When the MA visits a region, it sens a beacon signal to the CHs within its coverage area. If a CH receives the beacon signal, then it can respon irectly by sening its ata to the MA. If the ata is receive correctly, the MA respons with an ACK. It

is note that the ata a CH sens to the MA can be information from its own cluster members, or from other clusters that relay their ata through it. C. Malicious Noe Detection When the MA receives ata from a noe, it first authenticates the source an checks its ientity. If the noe passes the authentication proceure, its ata woul be use in the final ecision making process. Some authenticate sensors can be compromise an may report fictitious ata. This is known as Byzantine attacks [5]. The MA shoul be able to etect these malicious noes an avoi their harmful effect. One way to etect compromise noes is to use a reliable ata fusion scheme [5], on the information collecte from many sensors, an obtain the final ecision. The MA monitors the reports of each iniviual noe an compares it with the final ecision obtaine by the ata fusion. Base on the observations over several sensing perios, the malicious noes can be etecte an remove. V. THE NETWORK TOPOLOGY DESIGN In this section, we obtain the optimal raius R o an the ring raius that minimize the require number of hops from any CH to the MA. Define θ as the smaller angle between the MA position an the CH on the ring that first receive the ata; the PDF of θ is f θ (θ) = 1 π. Assume that two cluster heas separate by a istance can communicate irectly. Then, for a given θ, routing along the ring requires θr approximately t hops to reach the RCH. While, the R routing from the ring to the CCH requires t hops. Therefore, to minimize the number of hops for noes outsie the ring, the routing over the ring is mae uner the conition that θ < 1, i.e., θ < 57.3. If this conition is not satisfie, noes reach the MA mainly through the CCH. Noes in the region between R o an route their ata through the ring if θ Rt x < x. That is, if θ < x 1, the noes at istance R o x< route their ata to the RCH. Otherwise, they route the ata to the CCH. We assume that CHs along the ring can estimate θ from the beacon signal they receive. The RCH notifies the noes in the region between R o an that are connecte to it. If the noes in this region o not receive a notification from the RCH, then they forwar their ata to the CCH. Let N hops be the average number of hops require to route the ata from any CH in the network to the CH that can establish irect communication with the MA, i.e., the CCH or the RCH. Note that the number of hops to reach the MA is N = N hops 1. N hops is given by: N hops = 1 Rt [ Ro 0 π x=r o θ= R x 1 t x 1 Rt x=r o θ=0 xf X(x)x xf X(x)f θ (θ)θx ( x θ) f X(x)f θ (θ)θx π x= θ=1 1 x= θ=0 xf X(x)f θ (θ)θx ] (x θ) f X(x)f θ (θ)θx,(1) where x is the istance from any CH to the center of the cell, f X (x) is the PDF of x an can be approximate by f X (x) = x assuming that the CHs are uniformly istribute in a circle of raius. By setting N hops R o =0, we obtain the optimal R o =0.5. Then, we substitute in (1) with the optimal R o, an obtain the optimal by setting N hops =0. We get =0.686 ; it then follows that R o =0.343. Proposition: To minimize the ata collection elay in MC- WSN, the following conitions shoul be met. (1) The CHs within a istance R o =0.343 from the center of the cell eliver their ata to the MA through the CCH. () Noes at a istance x from CCH, where R o x<, eliver their ata to the MA through the ring if θ < x 1, or through the CCH if θ > x 1. (3) Other noes at a istance x from the CCH, eliver their ata to the MA through the ring if θ < 1, or through the CCH if θ > 1. The ring raius is =0.686. The elay is proportional to the number of hops require for routing the ata to the MA. The average istance travele corresponing to N hops is N hops ; therefore, the elay in packet elivery is N hops V EM, where V EM =3 10 8 m/s is the electromagnetic wave (EM) propagation spee. VI. NUMERICAL RESULTS Example 1: Delay comparisons For elay calculations, we assume that there are no collisions or retransmissions. We also assume that each SN reaches its nearest CH in one hop, which can be ensure with the active network eployment, an the number of hops from the RCH or CCH to the MA is one. Therefore, we use the number of hops to reach the RCH or the CCH as an inication of the elay. To show the effectiveness of our propose architecture, we compare two topologies: (a) Topology 1: all noes in the cell use the CCH to eliver their ata to the MA. (b) Topology : both the CCH an the RCH are employe to eliver the ata to the MA. For topology 1, let N hops,1 be the average number of hops for a CH to reach the CCH. Then, N hops,1 = x 0 f X (x)x = 3R CH. For topology, the number of hops is obtaine using (1). By substituting with =0.686, we get N hops, = N hops =0.97 R CH. Comparing N hops, with N hops,1, it can be seen that lower elay can be achieve with the propose topology (topology ). This is further illustrate in Figure 3, where the number of hops is plotte versus for both topologies. The elay in ata elivery ( ) can be expresse as: = C 1 V EM, where C 1 is a constant. In SENMA, the SNs wait for the MA visit to report their ata; hence, the elay epens on the velocity of the MA, as well as the cell size; that is, the average elay for a noe to report its ata to the MA in SENMA is D S = C V MA [1], where V MA is the MA spee

an C is a constant. Therefore, we have D S = C V EM V MA, where C is a constant. This implies that the propose MC- WSN architecture coul result in several orers of magnitue lower elay over SENMA. The elay reuction is proportional to the ratio between the spee of light (EM spee) an the physical spee of the MA. Table I shows the elay ratio D S for ifferent cell sizes. TABLE I DELAY COMPARISON WITH V MA =30m/s. Energy (J/bit) 6 x 10 6 5 4 3 1 MC WSN SENMA Cell ege length (m): 100 1000 D Delay ratio: S 10 9 10 10 D S : Average elay in SENMA, : Average elay in MC-WSN. Average number of hops 10 9 8 7 6 5 4 3 CCH only Ring an CCH 100 10 140 160 180 00 0 40 60 80 300 (m) Fig. 3. The average number of hops in the cases when the communication with the MA is establishe through the CCH only (N hops,1 ), an both the CCH an the ring (N hops, ). Here we use R CH =10m. Example : Energy efficiency We focus on the energy issipate in the iniviual SNs, since they have the most limite resources. We use the circuitry raio energy issipation moel to evaluate the energy efficiency [7]. We assume that the raius of the cluster is R CH = r c. Let E tx an E rx be the energy issipate in the transmitter an receiver electronics of the SNs, respectively. Then, in MC-WSN, the maximum energy issipate in SN to transmit a bit to the CH is E SN,M = E tx ϵ pa rc γ (J/bit), where ϵ pa is the energy consume by the power amplifier, γ is the path loss exponent. In SENMA, each SN must first receive a beacon signal from the MA in orer to report its ata. Therefore, the energy issipate by a noe to report a single bit to the MA is E SN,S = E tx ϵ pa H γ S E rxπr K SN A c [1], where A c is the area of the cell. Figure 4 shows E SN,M an E SN,S as the number of sensor noes increases. It can be seen from the figure that the MC-WSN is significantly more energy-efficient than SENMA, especially when the ensity of the sensors increases. It shoul be note that energy issipation in the CHs an MAs are ignore here. However, if their energy issipation is taken into account, the MC-WSN woul still be more efficient than SENMA architecture; since in SENMA, the MA is assume to traverse the network continuously leaing to a very high energy consumption. 0 0 1 3 4 5 6 7 8 9 Number of sensors K SN x 10 4 Fig. 4. The energy issipation (J/bit) vs. the number of SNs in the MC-WSN an SENMA networks, when =100m, r c = r =10m, H S =10m, γ =, E tx = E rx =50pJ/bit an ϵ =10pJ/bit/m VII. CONCLUSIONS In this paper, we propose a reliable an energy-efficient architecture esign for mobile access coorinate wireless sensor networks (MC-WSN). In the propose architecture, the network exploits the mobile access points to actively eploy noes, perform ata collection, etect malicious sensors an enhance the network security. Not only oes the MC-WSN resolve the network eployment problem, but it also prolongs the network lifetime actively an provies an efficient framework for time-sensitive information exchange. Simulation results showe that the propose MC-WSN architecture can achieve higher energy efficiency an several orers of magnitue lower elay over SENMA. The gains achieve by the propose architecture increase as the network size increases. REFERENCES [1] G. Mergen, Z. Qing, an L. Tong, Sensor networks with mobile access: Energy an capacity consierations, IEEE Transactions on Communications,, vol. 54, no. 11, pp. 033 044, Nov. 006. [] A. Poornima an B. Amberker, Agent base secure ata collection in heterogeneous sensor networks, 010 Secon International Conference on Machine Learning an Computing (ICMLC), pp. 116 10, Feb. 010. [3] I. Maza, F. Caballero, J. Capitan, J. Martinez-e Dios, an A. Ollero, A istribute architecture for a robotic platform with aerial sensor transportation an self-eployment capabilities, Journal of Fiel Robotics, vol. 8, no. 3, pp. 303 38, 011. [Online]. Available: http://x.oi.org/10.100/rob.0383 [4] P. Corke, S. Hrabar, R. Peterson, D. Rus, S. Saripalli, an G. Sukhatme, Autonomous eployment an repair of a sensor network using an unmanne aerial vehicle, IEEE International Conference on Robotics an Automation, ICRA 04, vol. 4, pp. 360 3608 Vol.4, 6-May 1, 004. [5] M. Abelhakim, L. Lightfoot, an T. Li, Reliable ata fusion in wireless sensor networks uner byzantine attacks, IEEE Military Communications Conference, MILCOM, Nov. 011. [6] J. Ren, Y. Li, an T. Li, Spm: Source privacy for mobile a hoc networks, EURASIP J. Wireless Comm. an Networking, 010. [7] W. Heinzelman, A. Chanrakasan, an H. Balakrishnan, An applicationspecific protocol architecture for wireless microsensor networks, IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660 670, Oct. 00.