Memory Based Message Efficient Clustering (MMEC) for Enhancement of Lifetime in Wireless Sensor Networks Using a Node Deployment Protocol Joydeep Banerjee1, Souvik Kumar Mitra2 Department of E.T.C.E Jadavpur University Kolkata-700032 1

Mrinal K. Naskar

Pradipta Ghosh

Department of E.T.C.E Jadavpur University Kolkata-700032

Department of E.T.C.E Jadavpur University Kolkata-700032

[email protected]

[email protected]

[email protected] [email protected]

2

.

ABSTRACT The most important property of the wireless sensor networks deployed for their numerous applications is their self-organizing property. The self-organizing property calls for network decomposition into clusters of specific bound. Several clustering algorithms have been proposed. Message efficiency and attainment of cluster bound are the most important parameters of any clustering algorithm. Lack of sufficient power and bandwidth makes the task of clustering even more challenging. In this paper we propose a memory based message efficient clustering algorithm incorporating a probabilistic approach which predetermines the number of nodes to be included in the next hop. This ensures a message complexity much smaller compared to the other clustering algorithms as no extra message is required for deletion of nodes that exceeds the cluster bound and the cluster bound is attained by acquisition of persistent algorithm on the nodes included in last hop. Moreover along with the message efficient clustering we also propose a node deployment protocol which enhances the lifetime of the network.

Categories and Subject Descriptors C.2.2 [Routing Protocols]: Clustering and efficient node deployment of wireless sensor networks.

General Terms Algorithms, Performance.

Keywords Memory based Message Efficient Clustering (MMEC), persistent algorithm, sensor distribution protocol, message complexity, network lifetime Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ICCCS’11, February 12–14, 2011, Rourkela, Odisha, India. Copyright 2011 ACM 978-1-4503-0464-1/11/02…$10.00.

1. INTRODUCTION Wireless sensor network technology finds its applications in diverse fields:-military, environmental monitoring, health, smart households and offices. Wireless sensor networks possess certain characteristics such as rapid deployment, fault tolerance etc. which makes them suitable for use in military communication and intelligence systems. In the field of healthcare, sensor nodes have been deployed to monitor the condition of patients [1]. Sensor nodes have also been deployed for cattle ranch monitoring [2], cattle control [3], zebra herd monitoring [4], etc. Efficient flood forecasting systems utilizing wireless sensor network technology are also being developed [5, 6]. They have an enormous potential to minimize the devastations caused by severe floods in rural and developing regions. With the growing use of wireless sensor networks the size and complexity of the networks will increase. The sensor nodes are essentially low-cost, low-power devices capable of communicating in short distances and processing some data. These sensor nodes are generally densely deployed in the concerned region either in a regular or irregular manner. Wireless sensor networks could get exposed to adverse environments [7] e.g.-wireless sensor networks used for disaster monitoring. Therefore these networks should have a self organizing capability and immune to node failures. Thus it becomes necessary to prevent single points of failure which in turn calls for distributed algorithms. The self-organizing property of wireless sensor networks requires network decomposition into clusters of specific sizes. The main aim should be to minimize the message complexity of the clustering algorithms and to ensure the cluster formed attain the specific bound. Lack of sufficient power in the nodes and limited bandwidth of the wireless medium [1] makes the task of clustering more challenging. The very first clustering algorithm was the expanding ring algorithm. However the no. of messages used by the algorithm in case of dense topologies is too large. Rajesh Krishnan and David Storobinski [8] suggested message-efficient algorithms, based on allocation of local growth budget to neighbors. The two algorithms suggested were the Rapid and Persistent approach. Both are far more efficient in terms of message complexity than the expanding ring approach. The Rapid algorithm generally uses fewer messages than the persistent approach but very often fails to achieve the specified cluster size. The second algorithm is an

improved version of the Rapid approach as it persistently tries to produce a cluster of the specific size in exchange of some extra messages. In this paper we propose a Memory based Message Efficient Clustering (MMEC) algorithm incorporating a probabilistic approach which predetermines the number of nodes to be included in the next hop. The algorithm was developed in the basis of achieving a pinnacle in the lifetime of the network by maintaining its self organization property. It focuses mainly in reducing message complexity. For reducing the energy consumption to a greater extent we also propose an efficient node deployment protocol and we apply our algorithm on the topology created by this protocol. We have also used the latest network programming tool - NS 2.33 in evaluating the performance along with MATLAB 7.8 for the other relevant experimentations. The rest of the paper is organized as follows. Section 2 presents previous work in the field of wireless sensor networks. Section 3 describes our proposed algorithm. Section 4 provides the simulation results. Section 5 concludes our manuscript.

2. PREVIOUS WORKS The clustering algorithms should be able to form bounded-size clusters that too with few messages. The no. of nodes in a cluster should always be as close as possible to the specified bound. However the early clustering algorithms treated size as a secondary factor. Ramamoorthy et al. [9] applied an expanding ring approach which requires an initiator and proceeds in rounds with continuously increasing hop limits. In each round the nodes at a distance of the hop limit for that round get clustered. Eventually on most occasions, the cluster size exceeds the specified bound. Extra nodes were un-clustered using additional message. This approach however could lead to a larger number of messages. Heinzelman et al. [10] proposed a clustering-base approach, called LEACH (Low Energy Adaptive Clustering Hierarchy) with 2 main assumptions: existence of a unique base station and ability of all sensors to communicate directly with the base station. The LEACH protocol selects a certain no. of cluster-heads, which then communicate directly with the base station whereas other nodes send data to the base station through the cluster-heads. Also the LEACH protocol allows different nodes to be cluster-heads at different times, thus allowing conservation of energy. Other work related to LEACH includes the PEGASIS protocol [11] in which nodes form a chain to facilitate further energy conservation. The LEACH protocol is a very important work in the field of wireless sensor networks. But our work substantially differs from it. Subramanium and Katz [12] proposed general architectural guidelines for wireless sensor networks and also explained the superiority of multi-hop communication over single-hop communication. They also proposed a clustering approach quite similar to the Expanding Ring algorithm of Ramamoorthy et al [8]. The only difference is that the initiator increases its power rather than the hop count. For each round the initiator sends message and all the sensors within the initiator’s communication range respond to it and get clustered. At the end of each round the initiator increases its power and hence its communication range. This process continues till the cluster size attains a value between a certain minimum and maximum bound. It has been already

shown that the message efficiency of this approach can be very low but the energy of the node that becomes an initiator on any round loses its power exponentially and hence affects the lifetime of the network. Rajesh Krishnan and David Starobinski [8] proposed two clustering algorithms namely Rapid and Persistent both of which have a far lower message complexity compared to the Expanding Ring approach especially in case of dense topologies. Both of them are based on allocation of local growth budgets to neighbors. For the Rapid algorithm, the initiator is assigned a budget B, of which it accounts for itself and evenly distributes the remaining B-1 among its neighbors. The neighbors who are allocated budgets then account for themselves and distribute the remaining among its neighbors. This process continues till the budget gets exhausted. In case of Rapid algorithm if a node doesn’t have a neighbor to allocate budget then that budget doesn’t get allocated and hence the specified cluster bound might not be attained. The Persistent algorithm is nothing but a recursive elaboration of the Rapid algorithm which provides a much better worst case performance in terms of the cluster size produced. In Persistent algorithm, if a budget doesn’t get allocated by a node then it returns that budget to its parent for reallocation of that budget. This way Persistent algorithm manages to achieve the specified cluster bound which the Rapid algorithm failed to achieve in many cases. In the same paper Rajesh Krishnan and David Starobinski [8] showed the worst case message complexities of the clustering algorithms. They proved that the worst case message complexity of the Rapid and the Persistent algorithms are B and 2B2 respectively where B is the specified cluster bound. So in extreme cases persistent algorithm may use a large number of messages for achieving the desired budget. In next section we describe our algorithm which attains the budget with a very low message complexity even in those extreme cases where the persistent algorithm fails in achieving low message complexity.

3. PROPOSED WORK The Wireless Sensors are spatially distributed in a certain topology to co-operatively monitor physical or environmental conditions. But this spatial distribution must follow certain pattern. Here we also propose a justifiable protocol for distribution of sensors for increasing the energy saving efficiency in a given network. We have used the discrete radio model [13] in framing this protocol. Our intension is to make the motes to operate at the lowest possible power level considering the power level definitions as in [13]. Moreover there is no meaning to place two sensors at some nearby regions as both of them would collect the same data. For an efficient and economic approach one must optimize the deployment of sensors. This is the part of deployment protocol. For achieving this we divide the field in n squares of edge length ‘a/ n’ for the deployment of ‘n’ sensor motes in a square field of edge length ‘a’. This is shown in Figure 1. The nodes are deployed within each such sub squares on a randomly occupying any position in that. For explanation we deployed two motes in one sub square and it can be seen that the sensing region of those nodes are overlapping at the lowest possible power level. Thus there is no need to place two sensors within such close proximity or in more generalized way in same

such square block. But if it is so it would be more power saving to switch one of the sensors off while the other does not get exhausted in terms of power. Now it can be also seen in Figure 1 that by following this protocol each sensor has eight sensors surrounding its sensing region. Now two particular sensors communicate at the lowest power level settings and hence the message transmit cost will also be low and hence enhances the lifetime of the network. As per the above theory it is clear that a single sensor can communicate with at the most of 8 sensors to a minimum of 1.

Figure 2. Ring formation containing the number of nodes included in each hop of expanded ring algorithm in the densest topology criterion

Figure 1. Representation of sensor deployment protocol to be adopted for enhancement of lifetime in wireless sensor network The sensor deployment protocol being briefly described let us come to our main purpose of self organizing the wireless sensor networks. Reduction of the number of message heads, fulfillment of the allocated budget and reduction of the number of cluster formed are the prime initiatives in designing this algorithm. The expanded ring search is sickened with a vast message complexity for a topology where surface sensor density is high and persistent algorithm has a disadvantage when the cluster occurs at the worst case phenomenon. So with the assumption of our defined node deployment protocol a dense topology thus means the condition where one sensor can communicate with all the eight possible neighboring sensors. When Expanded Ring search is employed in the clustering process the cluster size increases somewhat in the form of a ring with increasing radius. Now in a topology where each sensor can communicate with the entire eight possible neighbors, the case of maximum dense topology, the ring expands with the number of nodes included in each hop in the sequence 8, 16, 24, 32… It signifies that the number of nodes included in the first hop is 8, the second hop 16 and so on. The reason for the increase of nodes in this pattern is as follows. In the first hop the initiator that is the node from which the clustering starts includes all the 8 sensor nodes which are its neighbor. Thus the first ring is a square of 8 nodes. Now continuing in such a way the next ring would be a square containing 16 nodes, the next of 24 nodes and so on. This is shown in Figure 2 with the node at the center without marker color as the cluster leader.

Considering the general case where the number of nodes with which a sensor can communicate varies from 1 to 8. So if in the first hop it includes ‘x’ nodes then in the next hop it can include amongst any of the (8-x) un-clustered and the 16 nodes that may be available for clustering in the next ring. So in any hop the number of nodes that can be included includes the number of unclustered nodes that are expected to have been clustered and the number of nodes that are expected to be clustered in the next hop. Here we introduce an expectation ‘e’ which predetermines the expected number of nodes that can be included in the next hop. This expectation is based on the memory of the number of nodes included in the previous hops. By doing so we can predetermine the number of nodes in the cluster that could be present after the next hop and we could prematurely terminate the algorithm if the expected number of nodes included in the next hop is far more that the allocated budget. The action that the algorithm proposed will take after the ith hop is summarized below. Now let us give the name to certain variables which are important for the development of this algorithm. Let xi be the number of nodes included in the cluster in ith hop, the budget allocated that is the maximum number of nodes that are included in the cluster be ‘B’, the total number nodes in the cluster after ith hop be zi, the probability of including nodes in ith hop be pi and the expected number of nodes to be included in ith hop be ei. Here the main motive is to calculate ei.. Now in the (i+1)th hop the maximum number of nodes that can be included is the number of nodes in the (i+1)th ring and the number of un-clustered nodes that could have been clustered within the ith ring. The number of nodes in the (i+1)th ring as per above distribution protocol is equal to 8*(i+1). Now the maximum number of nodes that can be expected to get include in the cluster after ith hop is 1+ 8+ 16+…. + 8*i. By using arithmetic progression summation formula, this sum is equal to 1+4*i*(i+1). So if zi be the number of nodes in the cluster after the ith hop then the number of nodes that could have been not clustered is equal to (1+ 4*i*(i+1) - zi ). So the actual number of nodes that can be included in the cluster in the (i+1)th is equal to 8*(i+1)+ (1+ 4*i*(i+1) - zi ).

Similarly the actual number of nodes that can be included in the cluster in the ith hop is 8*i+ (1+ 4*i*(i-1) - zi-1) (which is the same equation as above but got by just replacing i by i-1). Now the actual number of nodes included in the ith hop is zi. Now ei was the expected number of nodes that was expected to be included in the ith hop. Ideally zi and ei is expected to be the same but it is not so always. There is always a difference between these two variables. So we have to incorporate this difference in the expected number of nodes to be included in the next hop. Thus we not only determine the expected number of nodes based on the memory of inclusion of nodes in the previous hop but also the result obtained by this algorithm in the previous hop. Hence expected number of nodes ei+1 to be included in the next hop is given by the equation ei+1 = pi+1*(8*(i+1) + (1+ 4*i*(i+1) - zi))+ zi – ei

-(1)

where pi+1, the probability of the inclusion of nodes in the (i+1)th hop is given by the equation pi+1 = zi / (8*i + (1+ 4*i*(i-1) - zi-1))

-(2)

It is quite clear that the expectation e in any hop my not be an integer. So it is rounded of to the nearest possible integer. This expected value of ei+1 is then added to the number of nodes in the cluster after the last hop that is zi. If this summation is less than the budget plus a certain fraction ‘ ’ of it then the cluster is allowed to progress to its next hop and the excess nodes formed will be deleted. But if the opposite happen then a pre-mature termination takes place and the number of nodes which falls short from the budget gets added up by persistent algorithm by choosing a certain number of nodes included in the last ring as the dummy cluster heads. It will always try to approach the budget as much it can. Now this fraction is set at most 10% of the budget ‘B’ to restrict the number of excess nodes added to the cluster beyond the bound B. By doing this not only the message complexity is greatly reduced but also the budget requirement is also fulfilled. Thus memory based message efficient clustering (MMEC), which is the name give to this algorithm, theoretically provides us with enhancement of lifetime of the network with message efficiency and budget fulfillment as the major achievements. The mathematical proof is provided in the lemma discussed below and the experimental proof is discussed in the next section. Now we provide a lemma that proves mathematically the acceptability of this algorithm as compared to expanded ring algorithm and persistent algorithm and here we used the message complexity analysis of [8]. Lemma 1. Finding out the message complexity of MMEC Let the number of nodes deployed in a network be ‘n’ and the budget be ‘B’. If we assume that our algorithm successfully stops the expansion of the ring when it gets the signal of inclusion of excess nodes in the next hop then we let the number of nodes included in the cluster to be ‘x’. So as per [8] the number of messages exchanged till then would be ‘x-1’ and the total maximum number of messages required to form the cluster would be MERmessagemax = x-1+ (B-x) 2 2

-------------------------------------------------------------------------------Our model in algorithm form is given below with assumption that every node has a unique node ID and every node knows it neighbor: -------------------------------------------------------------------------------/*the variables used are first enlisted*/ /* ’layer’ is a 2 D array comprising the nodes in the different layer of the cluster, ith row indicates ith layer and jth column indicates the jth node included in the ith layer */ /* ’node’ is a 1 D array storing the node ID’s of all the nodes */ /* ‘n’ indicates the number of nodes */ /* ‘layer number’ is the last layer number */ /* ‘lastlayersize’ is the layer size of the last layer to be included in the cluster */ /* ‘clust’ keeps the count of the cluster size */ /* ‘e’ is the number of nodes expected to be included in the cluster in the next hop*/ /* ‘Initiator’ is the cluster head */ /* ‘Budget’ is user defined and ‘threshold’ is taken as 0.1*Budget*/ 1. set layer (1, 1) =Initiator 2. set lastlayersize=1 3. set clust=1 4. set e=0; 5. set layernumber=1 6. While clust + e<= Budget + threshold 6.1. Set k=0 6.2. For (i=1; i<= lastlayersize; i++) 6.2.1. For (j=1; j<=n; j++) 6.2.1.1. If node (j) is a non-parent neighbor of layer (layernumber,i) 6.2.1.1.1. Send message to node (j) 6.2.1.1.2. node (j) gets clustered 6.2.1.1.3. set clust=clust+1 6.2.1.1.4. set k=k+1 6.2.1.1.5. layer (layernumber+1, k) =node (j) 6.2.1.1.6. end if 6.2.1.2. end for 6.2.2. end for 6.3. Compute exp according to equation no. 6.4. set last layer size=k 6.5. set layer number=layernumber+1 6.6. If clust>Budget 6.6.1. break 6.6.2. end if 6.7. end while 7. If clust>Budget 7.1. Messages is sent for extra nodes to be deleted 7.2. end if 8. If clust
(3)

This is way less than n and B which is the maximum bound to the message complexity of expanded ring algorithm and persistent algorithm respectively as proved in [8].

In the section to follow the experimental results are provided which supports the method been proposed here.

4. EXPERIMENTAL SIMULATIONS We made the first simulation of our algorithm in NS 2.33 in Fedora 12 operating system for clustering of 80 sensor motes as budget among 400 motes. We obtained the actual number of nodes included in each hop and in each hop. We included the above mentioned data in Table I for 10 distinct topologies. A star mark indicates that the expansion of ring is stopped and rest of the nodes is included by persistent algorithm in the next hop. Table I. The number of nodes included in a cluster in each hop and the number for MMEC when a budget of 80 is allocated. From the table we see that the error in estimation the number of TOPOLOGY

Actual number of nodes included in each hop

No.

1

No. 1

No. 2

No. 3

No. 4

No. 5

No. 6

5

8

12

17

No. 7

16

19*

29

*

35

-

-

2

8

11

21

29

3

7

14

23

26*

31

-

-

26

*

22

-

-

27

-

4 5

8 7

14 12

16

23 17

23 *

*

6

8

16

20

23

23

-

-

7

7

13

21

24*

33

-

-

19

*

41

-

8 9

7 7

13 10 15

11 16

23 16 25

*

14

18

33

-

of the ring. Keeping this in mind we employed MMEC, expanded ring algorithm and persistent algorithm in topologies of varying node density. We have excluded rapid algorithm for performance evaluation as if MMEC outperforms persistent there is no need to compare its performance with rapid and here it happens to be so. By node density we mean the number of nodes per unit area of the field. We have varied the node density from 0.01 to 0.1 and performed the simulation in clustering of 500 motes as a bound among 5000 deployed motes as per the mentioned node deployment protocol in Section 3. This simulation was carried out in MATLAB 7.8. We could have done that in NS but it is quite laborious as we would have to define the node connection for all nodes. Moreover we have obtained the applicability of our algorithm and hence it is justified to simulate in MATLAB platform. Taking into consideration the discrete radio model we also calculated the power lost in the single cluster formation for varied values using the node deployment protocol as discussed above and in random node deployment without any discipline. In Figure 3. we have plotted the number of message exchanged for each algorithm with varying node density. From the Figure we see that with increase in node density the number of message exchanged for MMEC remains fairly the same. The persistent algorithm however follows the message exchanged with MMEC for lower values of node density but shows a increase at higher values of it. Expanded ring algorithm comes nowhere in the picture as it has very high message complexity. MMEC proves 11.2% better than persistent and 153% better than expanded ring algorithm at the node density value of 0.1in terms of number of message exchanged. Thus a significant improvement in messages exchanged is observed for the MMEC clustering algorithm.

*

26

10

7

TOPOLOGY

Error in determining the number of nodes included in each hop

-

No. No. 1

No. 2

No. 3

No. 4

No. 5

No. 6

No. 7

1

-

-4

-2

0

1

0

0

2

-

-3

3

-2

1

-

-

3

-

4

-2

0

-1

-

-

4

-

4

1

-1

0

-

-

5

-

7

-4

2

1

-1

-

6

-

2

-3

-2

-5

-

-

7

-

1

2

-1

0

-

-

8

-

-1

0

1

0

-

-

9

-

-2

-5

-4

-2

-1

-1

10

-

-5

-3

1

-1

-

-

nodes to be included in the next hop converges almost to 0 for greater hops and hence when the budget size increases our algorithm estimates the number of to be included in the next hop more appropriately and hence can effectively stops the expansion

Figure 3. It shows the number of message exchanged for various values of node density for the discussed and proposed clustering algorithms of clustering of 500 nodes In Figure 4. we have shown the energy expense in one cluster formation for varying node density. The energy required for formation of cluster of 500 nodes using the node deployment

protocol is much less as compared to random deployment and hence justifies its suitability for clustering and even employing routing algorithms for wireless sensor network.

Figure 4. Comparison graph of the energy required for cluster formation of 500 nodes by using deployment protocol and random deployment

5. CONCLUSION AND FUTURE WORK Thus MMEC reduces the message complexity to a greater extent than persistent algorithm. The number of messages exchanged in the worst case scenario is far less as compared with persistent, as proved mathematically in lemma 1, is the magnificent outcome of MMEC. Further the node deployment protocol provides an added advantage in increasing the lifetime of the network. This algorithm can be modified to a greater extend by reducing the error factor to as low as possible. If the error factor reduces to zero in the early hops then the expectation of the number of nodes included in each hop can be correctly judged and hence the result would be a message complexity tending more towards the allocated budget in various distinct topologies.

6. REFERENCES Akyildiz et al. Georgia Institute of Technology. “A Survey on Sensor Networks”. IEEE Comunication Magazine, August 2002. [2] P. Sikka, P. Corke, P. Valencia, C. Crossman, D. Swain, and G. Bishop-Hurley. Wireless adhoc sensor and actuator [1]

networks on the farm. In IPSN ’06: Proceedings of the 5th International Conference on Information Processing in Sensor Networks, pages 492-499, New York, NY, USA, 2006. ACM Press. [3] Z. Butler, P. Corke, R. Peterson, and D. Rus. From robots to animals: Virtual fences for controlling cattle. Int. J. Rob. Res., 25(5-6):485-508, 2006. [4] P. Zhang, C. M. Sadler, S. A. Lyon, and M.Martonosi. Hardware design experiences in ZebraNet. In SenSys ’04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pages 227-238, New York, NY, USA, 2004. ACM Press. [5] D. Hughes, P. Greenwood, G. Blair, G. Coulson, F. Pappenberger, P. Smith, and K. Beven. An intelligent and adaptable grid-based flood monitoring and warning system. In Proceedings of the 5th UK eScience All Hands Meeting, 2006. [6] E. A. Basha, S. Ravela, and D. Rus.Model-Based Monitoring for Early Warning Flood Detection. SenSys ’08, November 5-7, 2008, Raleigh, North Carolina, USA.ACM Press. [7] J.P.G. Sterbenz, R. Krishnan, R.R. Hain, A.W. Jackson, D. Levin, R. Ramanathan, J. Zao, Survivable mobile wireless networks: issues, challenges, and research directions, ACM Workshop on Wireless Security (WiSe), Atlanta, GA, USA, 28 September 2002, vol. 1, pp. 31–40. [8] R. Krishnan and D. Starobinski. Efficient clustering algorithms for self-organizing wireless sensor networks. AdHoc Networks 4 (2006) 36-59. [9] C.V. Ramamoorthy, A. Bhide, J. Srivastava, Reliable Clustering techniques for large, mobile packet radio networks, in: Proceedings of the 6th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM _87), San Francisco, CA, USA, 31 March–2 April 1987, vol. 1, pp. 218–226. [10] W. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocols for wireless micro sensor networks, in: Proceedings of the 33rd Hawaiian International Conference on Systems Science (HICSS-33), Maui, HI, USA, 4–7 January 2000. [11] S. Lindsey, C. S. Raghavendra. PEGASIS: Power Efficient Gathering in Sensor Information Systems, in: Proceedings of IEEE Aerospace Conference, Big Sky, MT, USA, 9–16 March 2002, vol. 3, pp. 3-1125–3-1130. [12] L. Subramanian, R.H. Katz, An architecture for building self-configurable systems, in: Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking and Computing, Boston, MA, USA, 2000, pp. 63–73. [13] M.Mallinson, P. Drane, and S. Hussain, ‘Dsicrete Radio Power Level Consumption Model in Wireless Sensor Network, Mobile Ad-Hoc and Sensor Systems’ MASS 2007, IEEE International Conference pp-1-6.

for Enhancement of Lifetime in Wireless Sensor ...

Wireless sensor network technology finds its applications in diverse fields:-military .... squares of edge length 'a/√n' for the deployment of 'n' sensor motes in a ...

95KB Sizes 3 Downloads 240 Views

Recommend Documents

Bounds on the Lifetime of Wireless Sensor Networks Employing ...
Wireless Research Lab: http://wrl.ece.iisc.ernet.in ... Key issues in wireless sensor networks ... NW lifetime can be enhanced by the use of multiple BSs. – deploy ...

Bounds on the Lifetime of Wireless Sensor Networks Employing ...
each sensor node can send its data to any one of these BSs (may be to the ... deployed as data sinks along the periphery of the observation region R.

Bounds on the Lifetime of Wireless Sensor Networks Employing ...
Indian Institute of Science. Bangalore – 560012. INDIA .... deployed as data sinks along the periphery of the observation region R. – obtaining optimal locations ...

The Next Generation of Sensor Node in Wireless Sensor Networks
good choice for a battery-limited device likes sensor node. This paper ... Index Terms—Wireless sensor network, Dynamic Partial Reconfigurable, FPGA.

Sensor Data Cryptography in Wireless Sensor Networks - IEEE Xplore
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 2, JUNE 2008. 273. Sensor Data Cryptography in. Wireless Sensor ...

enhancement of wireless communication in the ism ...
An example of an intentional interferer is a cordless phone. (since it ..... power output level of Panasonic KX-TG2356 can range 0.04 to 0.1 W. We again used.

WIRELESS SENSOR NETWORKS FOR MEDICAL SERVICE
Abstract: The present work surveys and classifies various applications of the Wireless Sensor Networks. (WSNs) technology in bio-medical service. A review.

Communication–aware Deployment for Wireless Sensor Networks
which is the case for many sensor network applications in the environmental ... example for an environmental monitoring application scenario (temperature ...

Simulation Study for the ANSWER Architecture in Wireless Sensor ...
Wireless Sensor Networks ... Abstract—Wireless sensor devices have continuously under- ... micro-sensors have a wider exploitation of IC technology, and.

Local Positioning for Environmental Monitoring in Wireless Sensor ...
I. INTRODUCTION. Wireless sensor and actor networks (WSANs) are geograph- .... represents the minimum number of hops required to reach the actor from that ...

WIRELESS SENSOR NETWORKS FOR MEDICAL SERVICE
concerning the involvement of WSNs in bio-medical service is ... sors is to replace existing wired telemetry systems for ... consequence management needs.

Robust Computation of Aggregates in Wireless Sensor Networks ...
gossip[4] because DRG takes advantage of the broadcast nature of wireless ... For more discussions on the advantages of distributed localized algorithms, we ...

A Survey of Key Management Schemes in Wireless Sensor Networks
F. Hu is with Computer Engineering Dept., Rochester Institute of Technology, ...... sensor networks, 3G wireless and mobile networks, and network security.

A Survey of Key Management Schemes in Wireless Sensor Networks
Wireless sensor network, key management, security, key predistribution, pairwise key, ... F. Hu is with Computer Engineering Dept., Rochester Institute of Technology, Rochester, ..... phases that perform a particular job each, including Sender Setup,

Robot Localization Sensor for Development of Wireless ... - IEEE Xplore
issues for mobile robot. We describe a novel localization sensor suite for the development of a wireless location sensing network. The sensor suite comprises ...

Maximum Network Lifetime in Fault Tolerant Sensor ...
The sender node uses erasure coding and splits each packet into multiple fragments and transmits the fragments over multiple parallel paths. The erasure ...

WIRELESS SENSOR NETWORKS.pdf
ii) Attribute-based routing. iii) MICA mote architecture. iv) TOSSIM simulator. ______. Page 2 of 2. WIRELESS SENSOR NETWORKS.pdf. WIRELESS SENSOR ...

WIRELESS SENSOR NETWORKS.pdf
3. a) Write the principle of the following unicast geographic routing techniques and. explain with an example for each. 10. i) Greedy distance routing. ii) Compass ...

Energy-Aware Distributed Tracking in Wireless Sensor Networks
In wireless sensor network (WSN) applications, a common .... Said formulation uses ..... in a power constrained sensor network,” in Vehicular Technology Con-.

Connectivity-based Skeleton Extraction in Wireless Sensor Networks
boundary of the sensor network to identify the skeleton points, then generating the skeleton arcs, connecting these arcs, and ..... boundary partition with skeleton graph generation. As .... into skeleton arcs which will be described in next section.