首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Controlled sink mobility for prolonging wireless sensor networks lifetime   总被引:3,自引:0,他引:3  
This paper demonstrates the advantages of using controlled mobility in wireless sensor networks (WSNs) for increasing their lifetime, i.e., the period of time the network is able to provide its intended functionalities. More specifically, for WSNs that comprise a large number of statically placed sensor nodes transmitting data to a collection point (the sink), we show that by controlling the sink movements we can obtain remarkable lifetime improvements. In order to determine sink movements, we first define a Mixed Integer Linear Programming (MILP) analytical model whose solution determines those sink routes that maximize network lifetime. Our contribution expands further by defining the first heuristics for controlled sink movements that are fully distributed and localized. Our Greedy Maximum Residual Energy (GMRE) heuristic moves the sink from its current location to a new site as if drawn toward the area where nodes have the highest residual energy. We also introduce a simple distributed mobility scheme (Random Movement or RM) according to which the sink moves uncontrolled and randomly throughout the network. The different mobility schemes are compared through extensive ns2-based simulations in networks with different nodes deployment, data routing protocols, and constraints on the sink movements. In all considered scenarios, we observe that moving the sink always increases network lifetime. In particular, our experiments show that controlling the mobility of the sink leads to remarkable improvements, which are as high as sixfold compared to having the sink statically (and optimally) placed, and as high as twofold compared to uncontrolled mobility. Stefano Basagni holds a Ph.D. in electrical engineering from the University of Texas at Dallas (December 2001) and a Ph.D. in computer science from the University of Milano, Italy (May 1998). He received his B.Sc. degree in computer science from the University of Pisa, Italy, in 1991. Since Winter 2002 he is on faculty at the Department of Electrical and Computer Engineering at Northeastern University, in Boston, MA. From August 2000 to January 2002 he was professor of computer science at the Department of Computer Science of the Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas. Dr. Basagni’s current research interests concern research and implementation aspects of mobile networks and wireless communications systems, Bluetooth and sensor networking, definition and performance evaluation of network protocols and theoretical and practical aspects of distributed algorithms. Dr. Basagni has published over four dozens of referred technical papers and book chapters. He is also co-editor of two books. Dr. Basagni served as a guest editor of the special issue of the Journal on Special Topics in Mobile Networking and Applications (MONET) on Multipoint Communication in Wireless Mobile Networks, of the special issue on mobile ad hoc networks of the Wiley’s Interscience’s Wireless Communications & Mobile Networks journal, and of the Elsevier’s journal Algorithmica on algorithmic aspects of mobile computing and communications. Dr. Basagni serves as a member of the editorial board and of the technical program committee of ACM and IEEE journals and international conferences. He is a senior member of the ACM (including the ACM SIGMOBILE), senior member of the IEEE (Computer and Communication societies), and member of ASEE (American Society for Engineering Education). Alessio Carosi received the M.S. degree “summa cum laude” in Computer Science in 2004 from Rome University “La Sapienza.” He is currently a Ph.D. candidate in Computer Science at Rome University “La Sapienza.” His research interests include protocols for ad hoc and sensor networks, underwater systems and delay tolerant networking. Emanuel Melachrinoudis received the Ph.D. degree in industrial engineering and operations research from the University of Massachusetts, Amherst, MA. He is currently the Director of Industrial Engineering and Associate Chairman of the Department of Mechanical and Industrial Engineering at Northeastern University, Boston, MA. His research interests are in the areas of network optimization and multiple criteria optimization with applications to telecommunication networks, distribution networks, location and routing. He is a member of the Editorial Board of the International Journal of Operational Research. He has published in journals such as Management Science, Transportation Science, Networks, European Journal of Operational Research, Naval Research Logistics and IIE Transactions. Chiara Petrioli received the Laurea degree “summa cum laude” in computer science in 1993, and the Ph.D. degree in computer engineering in 1998, both from Rome University “La Sapienza,” Italy. She is currently Associate Professor with the Computer Science Department at Rome University “La Sapienza.” Her current work focuses on ad hoc and sensor networks, Delay Tolerant Networks, Personal Area Networks, Energy-conserving protocols, QoS in IP networks and Content Delivery Networks where she contributed around sixty papers published in prominent international journals and conferences. Prior to Rome University she was research associate at Politecnico di Milano and was working with the Italian Space agency (ASI) and Alenia Spazio. Dr. Petrioli was guest editor of the special issue on “Energy-conserving protocols in wireless Networks” of the ACM/Kluwer Journal on Special Topics in Mobile Networking and Applications (ACM MONET) and is associate editor of IEEE Transactions on Vehicular Technology, the ACM/Kluwer Wireless Networks journal, the Wiley InterScience Wireless Communications & Mobile Computing journal and the Elsevier Ad Hoc Networks journal. She has served in the organizing committee and technical program committee of several leading conferences in the area of networking and mobile computing including ACM Mobicom, ACM Mobihoc, IEEE ICC,IEEE Globecom. She is member of the steering committee of ACM Sensys and of the international conference on Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous) and serves as member of the ACM SIGMOBILE executive committee. Dr. Petrioli was a Fulbright scholar. She is a senior member of IEEE and a member of ACM. Z. Maria Wang received her Bachelor degree in Electrical Engineering with the highest honor from Beijing Institute of Light Industry in China, her M.S. degree in Industrial Engineering/Operations Research from Dalhousie University, Canada and her Ph.D. in Industrial Engineering/Operations Research from Northeastern University, Boston. She served as a R&D Analyst for General Dynamics. Currently MS. Wang serves as an Optimization Analyst with Nomis Solutions, Inc.  相似文献   

2.
Wireless Networks - One big contributor in the future of the Internet of Things is the Periodic Sensor Networks (PSNs) because it has been used by many applications in real life. The main challenge...  相似文献   

3.
Reducing the energy consumption of network nodes is one of the most important problems for routing in wireless sensor networks because of the battery limitation in each sensor. This paper presents a new ant colony optimization based routing algorithm that uses special parameters in its competency function for reducing energy consumption of network nodes. In this new proposed algorithm called life time aware routing algorithm for wireless sensor networks (LTAWSN), a new pheromone update operator was designed to integrate energy consumption and hops into routing choice. Finally, with the results of the multiple simulations we were able to show that LTAWSN, in comparison with the previous ant colony based routing algorithm, energy aware ant colony routing algorithms for the routing of wireless sensor networks, ant colony optimization-based location-aware routing algorithm for wireless sensor networks and traditional ant colony algorithm, increase the efficiency of the system, obtains more balanced transmission among the nodes and reduce the energy consumption of the routing and extends the network lifetime.  相似文献   

4.
In this paper we introduced a novel Linear Programming framework to model sensor network lifetime when data reduction through compression is utilized. Comparative analysis of three data compression and forwarding strategies show that neither data compression nor flow balancing can achieve the maximal possible sensor network lifetime when optimized independently. The comparisons reveal that jointly optimizing data compression and load balancing results in up to an order of magnitude longer network lifetimes than non-optimized data compression and load balancing.  相似文献   

5.
Wireless Networks - The most important quality-of-service metric for wireless sensor networks (WSNs), arguably, is the lifetime. Estimating the network lifetime under optimal operation conditions...  相似文献   

6.
In S-MAC-based sensor networks, border nodes consume more energy since they follow multiple listen and sleep schedules. Therefore they switch into the listen state frequently and reduce the network lifetime. This paper proposes a simple but powerful algorithm, termed the Schedule Unifying Algorithm (SUA), to minimize energy consumption of border nodes by unifying multiple listen and sleep schedules into a single unified schedule. The simulation results show that SUA incorporated SMAC- based nodes consume less energy, thereby extending the network lifetime approximately 2 times more.  相似文献   

7.
This study considers an integrated topology control and routing problem in wireless sensor networks (WSNs), which are employed to gather data via use of sensors with limited energy resources. We employ a hierarchical topology and routing structure with multiple sinks and devise a topology control scheme via usable energy fraction at the sensors. We develop and examine three different mathematical models whose solutions prescribe clusterhead and sink locations and data routing from sensors to sinks in a period of a deployment cycle. We develop a heuristic solution algorithm which provides very small optimality gaps for the models. The approach utilizes two types of solution representations, a combination of multiple neighborhoods, and objective value-based cut inequalities for improving the evaluation of candidate solutions. We present extensive numerical test results and analysis of the models and the solution approach. We determine that our proposed model, which minimizes average energy usage and the range of remaining energy distribution at the sensors, captures important characteristics of topology control and routing integration in WSN design and exhibits significantly better performance than our benchmark models and a well-known protocol HEED in extending network lifetime.  相似文献   

8.
Telecommunication Systems - The sink nodes in large-scale wireless sensor networks (LSWSNs) are responsible for receiving and processing the collected data from sensor nodes. Identifying the...  相似文献   

9.
On the lifetime of wireless sensor networks   总被引:5,自引:0,他引:5  
We derive a general formula for the lifetime-of wireless sensor networks which holds independently of the underlying network model including network architecture and protocol, data collection initiation, lifetime definition, channel fading characteristics, and energy consumption model. This formula identifies two key parameters at the physical layer that affect the network lifetime: the channel state and the residual energy of sensors. As a result, it provides not only a gauge for performance evaluation of sensor networks but also a guideline for the design of network protocols. Based on this formula, we propose a medium access control protocol that exploits both the channel state information and the residual energy information of individual sensors. Referred to as the max-min approach, this protocol maximizes the minimum residual energy across the network in each data collection.  相似文献   

10.
Maximum lifetime routing in wireless sensor networks   总被引:11,自引:0,他引:11  
A routing problem in static wireless ad hoc networks is considered as it arises in a rapidly deployed, sensor based, monitoring system known as the wireless sensor network. Information obtained by the monitoring nodes needs to be routed to a set of designated gateway nodes. In these networks, every node is capable of sensing, data processing, and communication, and operates on its limited amount of battery energy consumed mostly in transmission and reception at its radio transceiver. If we assume that the transmitter power level can be adjusted to use the minimum energy required to reach the intended next hop receiver then the energy consumption rate per unit information transmission depends on the choice of the next hop node, i.e., the routing decision. We formulate the routing problem as a linear programming problem, where the objective is to maximize the network lifetime, which is equivalent to the time until the network partition due to battery outage. Two different models are considered for the information-generation processes. One assumes constant rates and the other assumes an arbitrary process. A shortest cost path routing algorithm is proposed which uses link costs that reflect both the communication energy consumption rates and the residual energy levels at the two end nodes. The algorithm is amenable to distributed implementation. Simulation results with both information-generation process models show that the proposed algorithm can achieve network lifetime that is very close to the optimal network lifetime obtained by solving the linear programming problem.  相似文献   

11.
Cunqing  Tak-Shing   《Ad hoc Networks》2008,6(3):380-392
In this paper, we present a data aggregated maximum lifetime routing scheme for wireless sensor networks. We address the problem of jointly optimizing data aggregation and routing so that the network lifetime can be maximized. A recursive smoothing method is adopted to overcome the non-differentiability of the objective function. We derive the necessary and sufficient conditions for achieving the optimality of the optimization problem and design a distributed gradient algorithm accordingly. Extensive simulations are carried out to show that the proposed algorithm can significantly reduce the data traffic and improve the network lifetime. The convergence property of the algorithm is studied under various network configurations.  相似文献   

12.
陈帅  廖晓纬 《信息技术》2006,30(12):11-13
无线传感器网络是复杂的无线网络。无线传感器网络拥有大量的网络节点。网络节点是无线传感器网络的基础。为了研究复杂的无线传感器网络,采用了神经元描述了WSN的网络节点,用神经元模型表示了无线传感器网络。给出了无线待感器网络节点的神经元模型和无线传感器网络的神经网络模型,并将神经网络应用于无线传感器网络的数据融合应用。结果表明,基于神经网络的无线传感器网络研究可以使得复杂研究变得简单,利于开展WSN的深入研究。  相似文献   

13.
Multidimensional Systems and Signal Processing - Wireless sensor networks (WSN) consists of dedicated sensors, which monitor and record various physical and environmental conditions like...  相似文献   

14.
A probabilistic and distributed routing approach for multi-hop sensor network lifetime optimization is presented in this paper. In particular, each sensor self-adjusts their routing probabilities locally to their forwarders based on its neighborhood knowledge, while aiming at optimizing the overall network lifetime (defined as the elapsed time before the first node runs out of energy). The theoretical feasibility and a practical routing algorithm are presented. Specifically, a sufficient distributed condition regarding the neighborhood state for distributed probabilistic routing to achieve the optimal network lifetime is presented theoretically. Based on it, a distributed adaptive probabilistic routing (DAPR) algorithm, which considered both the transmission scheduling and the routing probability evolvement is developed. We prove quantitatively that DAPR could lead the routing probabilities of the distributed sensors to converge to an optimal state which optimizes the network lifetime. Further, when network dynamics happen, such as topology changes, DAPR can adjust the routing probabilities quickly to converge to a new state for optimizing the remained network lifetime. We presented the convergence speed of DAPR. Extensive simulations verified its convergence and near-optimal properties. The results also showed its quick adaptation to both the network topology and data rate dynamics.  相似文献   

15.
3D wireless sensor network (3D-WSN) has attracted significant interests in recent years due to its applications in various disciplinary fields such as target detection, object tracking, and security surveillance. An important problem in 3D WSN is the sensor energy optimization which determines a topology of sensors to prolong the network lifetime and energy expenditure. The existing methods for dealing with this matter namely low energy adaptive clustering hierarchy, LEACH-centralized, K-Means, single hop clustering and energy efficient protocol, hybrid-LEACH and fuzzy C-means organize the networks into clusters where non-cluster head nodes mainly carry out sensing tasks and send the information to the cluster head, while cluster head collect data from other nodes and send to the base station (BS). Although these algorithms reduce the total energy consumption of the network, they also create a large number of network disconnect which refers to the number of sensors that cannot connect to its cluster head and the number of cluster heads that cannot connect to the BS. In this paper, we propose a method based on fuzzy clustering and particle swarm optimization to handle this problem. Experimental validation on real 3D datasets indicates that the proposed method is better than the existing methods.  相似文献   

16.
Energy consumption has been the focus of many studies on Wireless Sensor Networks (WSN). It is well recognized that energy is a strictly limited resource in WSNs. This limitation constrains the operation of the sensor nodes and somehow compromises the long term network performance as well as network activities. Indeed, the purpose of all application scenarios is to have sensor nodes deployed, unattended, for several months or years.This paper presents the lifetime maximization problem in “many-to-one” and “mostly-off” wireless sensor networks. In such network pattern, all sensor nodes generate and send packets to a single sink via multi-hop transmissions. We noticed, in our previous experimental studies, that since the entire sensor data has to be forwarded to a base station via multi-hop routing, the traffic pattern is highly non-uniform, putting a high burden on the sensor nodes close to the base station.In this paper, we propose some strategies that balance the energy consumption of these nodes and ensure maximum network lifetime by balancing the traffic load as equally as possible. First, we formalize the network lifetime maximization problem then we derive an optimal load balancing solution. Subsequently, we propose a heuristic to approximate the optimal solution and we compare both optimal and heuristic solutions with most common strategies such as shortest-path and equiproportional routing. We conclude that through the results of this work, combining load balancing with transmission power control outperforms the traditional routing schemes in terms of network lifetime maximization.  相似文献   

17.
Zhu  Xiaojun  Wu  Xiaobing  Chen  Guihai 《Wireless Networks》2015,21(1):281-295

In wireless sensor networks, maximizing the lifetime of a data gathering tree without aggregation has been proved to be NP-complete. In this paper, we prove that, unless P = NP, no polynomial-time algorithm can approximate the problem with a factor strictly greater than 2/3. The result even holds in the special case where all sensors have the same initial energy. Existing works for the problem focus on approximation algorithms, but these algorithms only find sub-optimal spanning trees and none of them can guarantee to find an optimal tree. We propose the first non-trivial exact algorithm to find an optimal spanning tree. Due to the NP-hardness nature of the problem, this proposed algorithm runs in exponential time in the worst case, but the consumed time is much less than enumerating all spanning trees. This is done by several techniques for speeding up the search. Featured techniques include how to grow the initial spanning tree and how to divide the problem into subproblems. The algorithm can handle small networks and be used as a benchmark for evaluating approximation algorithms.

  相似文献   

18.
The media access control (MAC) performance of a large-scale wireless sensor network (L-WSN) determines the efficiency of the wireless communication channel. A good MAC protocol could reduce network energy consumption and network delay, which are two problems to be solved urgently in L-WSN. In this paper, we proposed a multi-level integrated MAC protocol (MI-MAC) to solve the overall performance optimization problem of L-WSN. Compared with other protocols, MI-MAC has two mainly improved performances: (1) It improved binary exponential backoff algorithm by twice back off strategy; (2) It designed a sending and receiving algorithm based on the threshold value to recognize control frames (small frames), which effectively avoids the collision probability of data frame. The simulation results show that the MI-MAC protocol improves network throughput and delay performance, significantly reduces energy consumption, and obtains overall network optimization.  相似文献   

19.
The lifetime of a network can be increased by increasing the network energy. The network energy can be increased either increasing the number of sensors or increasing the initial energy of some sensors without increasing their numbers. Increasing network energy by deploying extra sensors is about ten times costlier than that using some sensors of high energy. Increasing the initial energy of some sensors leads to heterogeneous nodes in the network. In this paper, we propose a multilevel heterogeneous network model that is characterized by two types of parameters: primary parameter and secondary parameters. The primary parameter decides the level of heterogeneity by assuming the values of secondary parameters. This model can describe a network up to nth level of heterogeneity (n is a finite number). We evaluate the network performance by applying the HEED, a clustering protocol, on this model, naming it as MLHEED (Multi Level HEED) protocol. For n level of heterogeneity, this protocol is denoted by MLHEED-n. The numbers of nodes of each type in any level of heterogeneity are determined by the secondary model parameter. The MLHEED protocol (for all level heterogeneity) considers two variables, i.e., residual energy and node density, for deciding the cluster heads. We also consider fuzzy implementation of the MLHEED in which four variables are used to decide the cluster heads: residual energy, node density, average energy, and distance between base station and the sensor nodes. In this work, we illustrate the network model up to seven levels (\(1\le n\le 7\)). Experimentally, as the level of heterogeneity increases, the rate of energy dissipation decreases and hence the nodes stay alive for longer time. The MLHEED-m, \(m=2,3,4,5,6,7\), increase the network lifetime by \(73.05, 143.40, 213.17, 267.90, 348.60, 419.10\,\%\), respectively, by increasing the network energy as \(40, 57, 68.5, 78, 84, 92.5\,\%\) with respect to the original HEED protocol. In case of fuzzy implementation, the MLHEEDFL-m, \(m=2,3,4,5,6,7,\) increases the network lifetime by \(282.7, 378.5, 435.78, 498.50, 582.63, 629.79\,\%\), respectively, corresponding to the same increase in the network energy as that of the MLHEED (all levels) with respect to the original HEED. The fuzzy implementation of the HEED, MLHEEDFL-1, increases the network lifetime by \(176.6\,\%\) with respect to the original HEED with no increase in the network energy.  相似文献   

20.
This paper presents a robust data authentication scheme for protecting data integrity and availability in unattended wireless sensor networks. Such networks are vulnerable to several types of attacks. In particular, attackers can compromise a subset of nodes and use these nodes to transmit modified data or to prevent genuine data from being verified. The presented scheme combines security against data modification and denial of service attacks with traffic and storage efficiency. This is achieved by involving all sensor nodes in the network in the authentication process, implementing cooperative authentication with multiple authenticators, and using dual storage. Detailed analysis and extensive simulation tests show that our scheme achieves better performance compared to related schemes published in the literature in terms of traffic, storage, security against DoS attacks, and security against data replacement attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号