1,203 research outputs found
Survey: energy efficient protocols using radio scheduling in wireless sensor network
An efficient energy management scheme is crucial factor for design and implementation of any sensor network. Almost all sensor networks are structured with numerous small sized, low cost sensor devices which are scattered over the large area. To improvise the network performance by high throughput with minimum energy consumption, an energy efficient radio scheduling MAC protocol is effective solution, since MAC layer has the capability to collaborate with distributed wireless networks. The present survey study provides relevant research work towards radio scheduling mechanism in the design of energy efficient wireless sensor networks (WSNs). The various radio scheduling protocols are exist in the literature, which has some limitations. Therefore, it is require developing a new energy efficient radio scheduling protocol to perform multi tasks with minimum energy consumption (e.g. data transmission). The most of research studies paying more attention towards to enhance the overall network lifetime with the aim of using energy efficient scheduling protocol. In that context, this survey study overviews the different categories of MAC based radio scheduling protocols and those protocols are measured by evaluating their data transmission capability, energy efficiency, and network performance. With the extensive analysis of existing works, many research challenges are stated. Also provides future directions for new WSN design at the end of this survey
Minimum Power Configuration in Wireless Sensor Networks
This paper proposes the minimum power configuration (MPC) approach to energy conservation in wireless sensor networks. In sharp contrast to earlier research that treats topology control, power-aware routing, and sleep management in isolation, MPC integrates them as a joint optimization prob-lem in which the power configurationof a network consists of a set of active nodes and the transmission powers of the nodes. We show through analysis that the minimum power configu-ration of a network is inherently dependent on the data rates of sources. We propose several approximation algorithms with provable performance bounds compared to the optimal solu-tion, and a practical Minimum Power Configuration Protocol (MPCP) that can dynamically (re)configure a network to mini-mize the energy consumption based on current data rates. Sim-ulations based on realistic radio models of the Mica2 motes show that MPCP can conserve significantly more energy than existing minimum power routing and topology control protocols
Design Aspects of An Energy-Efficient, Lightweight Medium Access Control Protocol for Wireless Sensor Networks
This document gives an overview of the most relevant design aspects of the lightweight medium access control (LMAC) protocol [16] for wireless sensor networks (WSNs). These aspects include selfconfiguring and localized operation of the protocol, time synchronization in multi-hop networks, network setup and strategies to reduce latency.\ud
The main goal in designing a MAC protocol for WSNs is to minimize energy waste - due to collisions of messages and idle listening - , while limiting latency and loss of data throughput. It is shown that the LMAC protocol performs well on energy-efficiency and delivery ratio [19] and can\ud
ensure a long-lived, self-configuring network of battery-powered wireless sensors.\ud
The protocol is based upon scheduled access, in which each node periodically gets a time slot, during which it is allowed to transmit. The protocol does not depend on central managers to assign time slots to nodes.\ud
WSNs are assumed to be multi-hop networks, which allows for spatial reuse of time slots, just like frequency reuse in GSM cells. In this document, we present a distributed algorithm that allows nodes to find unoccupied time slots, which can be used without causing collision or interference to other nodes. Each node takes one time slot in control to\ud
carry out its data transmissions. Latency is affected by the actual choice of controlled time slot. We present time slot choosing strategies, which ensure a low latency for the most common data traffic in WSNs: reporting of sensor readings to central sinks
Minimum Power Configuration for Wireless Communication in Sensor Networks
This paper proposes the Minimum Power Configuration (MPC) approach to power management in wireless sensor networks. In contrast to earlier research that treats different radio states (transmission/reception/idle) in isolation, MPC integrates them in a joint optimization problem that depends on both the set of active nodes and the transmission power. We propose four approximation algorithms with provable performance bounds and two practical routing protocols. Simulations based on realistic radio models show that the MPC approach can conserve more energy than existing minimum power routing and topology control protocols. Furthermore, it can flexibly adapt to network workload and radio platforms
Energy Efficiency and Traffic Pattern Discovery for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are regularly framed by the joint effort of the expansive measure of insignificant sensor nodes, which are associated through a wireless medium. In wireless sensor organize, security is a fundamental position in well-lit of its utilization in applications like monitoring, tracking, controlling, surveillance etc. Secure correspondence is greatly critical in conveying key data precisely and on the time through asset imperative sensor nodes. In this paper, our commitment is triple. Firstly, we have outlined the system layer routing assaults on WSNs. Also, we have given a scientific categorization of secure routing protocols of WSNs. Thirdly, we have given a subjective correlation of existing secure routing protocols. This situation is practically equivalent to conveying US Mail through USPS: express sends cost more than customary sends; be that as it may, sends can be conveyed quicker. The convention additionally gives a secure message conveyance alternative to amplify the message conveyance proportion under antagonistic assaults. What's more, we likewise give quantitative secure investigation on the proposed routing convention in light of the criteria proposed. In this way, unauthenticated individual can't get to the first information. By along these lines, the convention gives a secure message conveyance alternative to augment the message conveyance proportion under ill-disposed assaults
- …