SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010




        Spread Spectrum Based Energy Efficient
              Wireless Sensor Networks
                      Wg Cdr Varghese Thattil (Retd)1, Dr. N Vasantha2, T. Esther Rani3
                 1
                   CVR College of Engineering Electronics and Communication, Hyderabad, India
                                         Email:mailthattil@gmail.com
                               2
                                 Vasavi College of Engineering, Hyderabad, India
                                   Email: vasanthavasantha@rediffmail.com
                 3
                   CVR College of Engineering Electronics and Communication, Hyderabad, India
                                     Email: esterlawrence@rediffmail.com

Abstract—The Wireless Sensor Networks (WSN) is                 energy saving is one of the key issues in the design of
considered to be one of the most promising emerging            systems based on WSNs.
technologies. However one of the main constraints which           It has been experimented and seen that the data
is holding back its wide range of applications is the          communication of sensor nodes consumes more energy
battery life of the sensor node and thus effecting the
network life. A new approach to this problem has been
                                                               than the data processing and therefore there is a need to
presented in this paper. The proposed method is suitable       reduce the communication while achieving the desired
for event driven applications where the event occurrence       network operation [1]. The energy cost of transmitting
is very rare. The system uses spread spectrum as a means       one single bit of information is approximately same as
of communication.                                              that needed for processing a thousand operations in a
                                                               typical sensor node [2]. However, since the sensor
Index Terms—Rare event, Wake-up receiver, Single hop,          network is very dense; composed of nodes with low
Spread spectrum                                                duty-cycles the medium access decision is a hard
                                                               problem. Therefore it is important to know the peculiar
                     I. INTRODUCTION                           features of sensor networks including reasons of
   Wireless Sensor Networks (WSNs) is considered as            potential energy wastes at medium access
a new technological vision because of the rapid                communication.
development in miniaturization; low power wireless             A. Reasons of Energy Wastage
communication, microsensor, and microprocessor
hardware. WSNs may, in the near future, will provide              Energy wastage occurs when there are collided
“Ambient Intelligence” where many different devices            packets, which occurs when a receiver node receives
will gather and process information from many                  more than one packet at the same time or when they are
different sources to both control physical processes and       partially overlapped. All packets that cause the
to interact with human users. Potential applications of        collision have to be discarded and the re-transmissions
WSNs include environmental monitoring, industrial              of these packets are required which increase the energy
control, battlefield surveillance and reconnaissance,          consumption. Although some packets could be
home automation and security, health monitoring, and           recovered by a capture effect, a number of
asset tracking.                                                requirements have to be met to achieve a successful
   Improvements in hardware technology have resulted           capturing. The second reason of energy waste is
in low-cost tiny sensor nodes which are composed of            overhearing, meaning that a node receives packets that
three basic components: a sensing subsystem for data           are destined to other nodes. The third energy waste
acquisition from the surrounding environment, a                occurs as a result of control packet overhead. Minimal
processing subsystem for local data processing and             number of control packets should be used to make a
storage and a wireless communication sub system for            data transmission. One of the major sources of energy
data transmission to a sink node or access point. In           waste is idle listening, i.e., listening to an idle channel
addition to this; the energy required to carry out the         to receive possible traffic. The last reason for energy
programmed task is supplied from battery pack with a           waste is overemitting, which is caused by the
very limited energy budget. In most of the applications        transmission of a message when the destination node is
it has been observed that the energy source can not be         not ready. Given the above facts, an efficiently
replaced due to hostile environment or other practical         designed MAC protocol should reduce these energy
difficulties. However the sensor networks should be            wastes to a large extend.
able to sustain till such time the indented task is            B. Communication Patterns
completed. Though energy scavenging from external                 Kulkarni et al. defines three types of communication
environment can be a possible solution, the technology         patterns in wireless sensor networks [3]: broadcast,
is not yet developed into a reliable source. Therefore         convergecast, and local gossip. Broadcast type of


                                                           1

© 2010 ACEEE
DOI: 01.ijns.01.02.01
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


communication pattern is generally used by a base                Additional components like as location finding system
station (sink) to transmit some information to all sensor        to determine their position, a mobilizer to change their
nodes of the network. Broadcasted information may                location or configuration etc. may be added depending
include query-processing information, program updates            upon the applications where they are used.
for sensor nodes, control packets for the whole system              Out of the above subsystems, the radio component
etc. In some scenarios, the sensors that detect an               account for maximum power consumption. Therefore
intruder communicate with each other locally. This               many protocols have been designed with the idea of
kind of communication pattern is called local gossip,            minimizing the radio communication this in most of the
where a sensor sends a message to its neighboring                cases has been achieved by increased data processing at
nodes within a range. The sensors that detect the                the nodes.
intruder, then, need to send what they perceive to the
information center. That communication pattern is
called convergecast, where a group of sensors
communicate to a specific sensor. The destination node
could be a clusterhead, data fusion center, base station.
C. Properties of a Well-defined MAC Protocol
   To design a good MAC protocol for the wireless
sensor networks, the following attributes must be
considered [4]. The first attribute is the energy
efficiency. We have to define energy efficient protocols
in order to prolong the network lifetime. Other
important attributes are scalability and adaptability to                 Figure 1 Wireless Sensor Node Architecture
changes. Some of the reasons behind these network
property changes are limited node lifetime, addition of             The communication distances in WSNs are typically
new nodes to the network and varying interference                small; a few meters in most of the applications and it
which may alter the connectivity and hence the                   has been found that power consumed for reception is
network topology.                                                almost same or even more as compared to transmission.
   Other typical important attributes such as latency,           One of the most power efficient designs for WSN could
throughput and bandwidth utilization may be secondary            be the one where in the radio, which consumes
in sensor networks. Contrary to other wireless                   maximum power could be kept in sleep mode. The
networks, fairness among sensor nodes is not usually a           radio should be switched on only when there is a
design goal, since all sensor nodes share a common               specific need to transmit or receive data. Therefore the
task.                                                            radio should alternate between active and sleep mode
   There are mainly two approaches to energy                     keeping the duty cycle as low as possible.
conservation: In-network processing and through duty                However since the WSN is a cooperative system the
cycle controlling. In–network processing is a method             sleep/wakeup schedule normally follows a distributive
wherein the amount of data being transmitted is being            algorithm. An efficient distributive algorithm should
reduced; either by compression or aggregation                    ensure that the neighboring nodes in the radio range
techniques. It typically exploits the temporal or spatial        should be able to receive whenever a node is
correlation among data acquired by sensor nodes. On              transmitting keeping the duty cycle as low as possible.
the other hand, duty cycling schemes define                         Many WSN applications are event based wherein a
coordinated sleep/wakeup schedules among nodes in                communication of data is to be essentially carried out
the network.                                                     only on detection of an event. Massively deployed
                                                                 sensor nodes simultaneously detect the event and hence
          II. ENERGY CONSUMPTION REDUCTION                       can cause duplication of information. Therefore
                                                                 application layer energy efficiency can be achieved by
A. Possible Energy Saving Approaches                             in-network processing or data aggregation. The energy
   To tackle the problem of energy consumption it is             efficiency processing can be either through data quality
essential to know how much power each node                       or avoiding unwanted data redundancy [7].
component dissipates during normal operating                        It is important to note at this stage that while
conditions, i.e., which are the power dissipation                improving the energy efficiency in a single layer it
characteristics of sensor noses [6]. In a typical wireless       should not effect the overall energy consumption in the
sensor node there are four main components: Sensing              node as a whole. In many applications, a cross layer
subsystem having sensors for data acquisition and                approach may be more suitable to reduce the overall
analog to digital converter, processing subsystem                energy consumption in a particular node. The topology
consisting of micro-controller and memory for local              control [8] and power management are the two
processing, radio subsystem for wireless data                    approaches to energy efficiency. In the case of
communication and a power supply unit Figure 1.                  topology control, the network redundancy is exploited

                                                             2
© 2010 ACEEE
DOI: 01.ijns.01.02.01
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


to improve the energy efficiency whereas in power             power management service based on wake-up/sleep
management sleep/wakeup timings are controlled to             scheduling.
achieve minimum duty cycle.                                      The study of the energy consumption throughout the
                                                              lifespan of a typical surveillance systems network node
B.   Power management
                                                              shows that most of the energy is used up in operations
   Power management schemes need to control when a            that do not actively fulfill the system’s purpose. A node
network node should enter a high-power wakeup mode            without power management is always turned on, but
and when to enter a low-power sleep mode. Under               there is no target most of the time. Hence, most of its
certain conditions, the nodes’ hardware components            energy is dissipated in a waiting status. Only one per
may be shut down to low-power state. The low-power            cent of the energy is used in actually tracking targets,
to high-power transition is, however, a tricky problem        the other 99% of the energy is used in waiting for
because the network node has its CPU halted and is            targets to show up. With a rotation based power
unaware of the external events. Power management              management, the energy efficiency is much better.
techniques can either be done strictly at MAC layer or
using sleep/wakeup protocols at higher layers (Network        D. Low Energy Wakeup Receiver
or application layer) which are integrated on top of             L. Gu et al. proposed to use passive components to
MAC layer. In the case of MAC layer power                     collect radio energy similar to the case of RFID (Radio
management, lower duty cycle is achieved by TDMA              frequency       Identification)     technology.      The
(Time Division Multiple Access), Contention-based             microcontroller is interrupted when the induced RF
procedures or their combinations. In the case of              power input is large enough and this in turn wakes up
TDMA, the nodes need to turn on their radio only              the sensor node for data communication. However the
during the allotted time slots. However this poses            disadvantage in such a system is that any strong RF
problem of flexibility and scalability. The scheme also       signal can wakeup the node and also the range of
has to ensure tight synchronization [9].                      operation will be limited. A modified system which
   Energy efficiency in the case of Contention-based          was proposed is to have an addressing mechanism with
protocols is achieved by tightly integrating channel          the help different RF triggering frequencies. The
access functionalities with sleep/wakeup schemes [10].        system will however require additional wakeup
                                                              hardware for each frequency [13]. In this case
C. Sleep/wakeup protocols
                                                              minimum required active components are added to the
   The power management schemes can be broadly                passive wake up radio so that messages could be sent to
divided into three categories, depending upon the             particular nodes to wake up the nodes. The wakeup
method used to wake up the node. They are on-                 receiver consists of an impedance matching circuit
demand, schedule based and asynchronous. In the case          followed by a voltage multiplier (charge pump). The
of on-demand the node wakes only when there is an             charge pump consisting of capacitances along with
external interrupt from another node [11]. The main           schottky diodes, increases the weak input voltage to a
problem associated with on-demand schemes is how to           level at which the microcontroller can be triggered. The
inform the sleeping node that some other node is              schematic diagram has been shown in Figure 2.
willing to communicate with it. To achieve this,                 Wakeup signal transmitter sends amplitude
additional wake up radios with low data rate and low          modulated carrier signal. The received output is finally
power consumption is used for signaling. In the case of       passed through a digital comparator to recover the
schedule based approach each node should wake up at           envelope. The comparator also helps to have a noise
the same time as its neighbors. However this requires         rejection as well as to have square pulse output. In this
rigorous synchronization between the nodes causing            architecture digital comparator is the only active
increase in latency.                                          component which will draw power from the source.
    The node synchronization between nodes can be             Lower distance of wake up radio communication is a
avoided by asynchronous power management. In this             big disadvantage in this case.
case, the nodes can wake up when ever they want and
still be able to communicate with their neighbors. This
is achieved by having a pattern of wake up wherein at
least two nodes have an overlapping wake up duration.
In this approach the nodes are expected to wake up
more often and hence the duty cycle tends to be higher
as compared to synchronous protocols [12].
    The implementation of the wakeup/sleep scheduling
often involves a timer that wakes up the CPU via an
interrupt. The wake-up/sleep scheduling approach has
some disadvantages. First, the design of a good wake-                 Figure 2. Wakeup Receiver Block Diagram
up/sleep schedule is often application dependent and
complicated. Hence, it is hard to design a general


                                                          3
© 2010 ACEEE
DOI: 01.ijns.01.02.01
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


                  III. PROPOSED SCHEME

A. Proposed Scheme Motivation
   There are many applications like habitat monitoring
or movement detection etc. of sensor networks where
event monitoring has to be carried out in a large area.
There are applications where the area of interest has to
be continuously monitored for long duration. This
becomes very difficult unless the system is made
automatic. The system should be able to detect the
                                                                             Figure 4. Sector scanning timings
event and automatically initiate the necessary actions as
required. These can be setting off alarms, send                    A detailed timing diagram for the system
messages switch on cameras/lights in the required               implementation is shown in Figure 5. The antenna
region etc. The advantage of the specific application           dwelling time in each sector is 10 seconds. The
can be made use of by having a cross layer protocol so          positioning of the antenna in the next sector takes 1
that the power energy efficiency can be maximized.              second, however this timing will be lesser if electronic
B. Proposed Scheme Description                                  scanning is used. Once the antenna has been placed to
    The proposed scheme is to deploy the sensor nodes           the sector; the BS transmitter emits 5 microseconds (µ
in the entire region of interest. Each sensor node will         sec) pulses at an interval of 10 milliseconds (msec) for
have its own unique spread spectrum code to identify            duration of 1 second. Immediately after that the BS
it. The distance between the nodes have to be decided           transmitter shuts off and the receiver is tuned to receive
on the basis of the sensing range of the associated             the sensor nodes transmissions.
sensors. The Base station (BS) is having four directive         C. Wake-up Receiver
antennas covering the entire region around it. The                 All sensor nodes will have wake up receivers which
sensor nodes have low power wake-up radios which                are tuned to receive the trigger pulses send from the
can be triggered with the help of Base station directive        Base Station (BS). As the pulses received at the input
antennas. The deployment plan has been shown in                 of the wakeup receiver increases the voltage at the
Figure 3 The Base station will sequentially scan the            input of the voltage multiplier starts rising; refer Figure
four sectors by sending trigger pulses in the form of           2. When the voltage at the output of voltage multiplier
series of square pulses for few milliseconds and                crosses threshold level, the wake up receiver sends an
subsequently the Base Station receivers are switched on         interrupt to the microcontroller to initiate the
to receive the transmissions from the sensor nodes.             transmission of data signals to BS.
     A timing diagram has been shown in Figure.4. The
sensor devices in the sensor nodes will continuously
observe the physical parameters within its range. The
nodes will respond to the wake-up call only incase the
observed parameters crosses a minimum threshold
level. This avoids unwanted transmissions and thus
improving the battery life. At the Base station, the
correlation receivers acquire and track the incoming
signals from the sensor nodes and recover the data.



                                                                Figure 5. Base Station and node transmit and receive timings


                                                                D. Sensor Node Architecture
                                                                   The proposed architecture of the sensor node has
                                                                been shown in the figure 6. The observed analog
                                                                values from the sensor devices are sequentially taken,
                                                                converted to digital and stored in the digital storage
                                                                registers as obs_value. The obs_value from each sensor
                                                                device is stored till such time it is forwarded to digital
                                                                comparator. Max_value registers (MVR) shown in the
   Figure 3. Deployment of Sensor nodes along with Base         architecture are used to store the initial minimum
                         Station                                threshold values. These values are given as input to the
                                                                digital comparator to compare the obs_value stored in

                                                            4
© 2010 ACEEE
DOI: 01.ijns.01.02.01
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


the corresponding registers of the digital storage.             incoming signal with the known PN sequences of the
Incase the obs_value is greater than the Max_value, the         sensors and recover the data. Since there is no
MVR is appended with the current obs_value stored in            synchronization between the nodes and the Base station
digital storage. The obs_value from each sensor is              Asynchronous CDMA communication is required.
converted to digital at an interval of 800 msecs. The
digital comparison is carried out at every 200 msecs.           F. Simulation Results
The total observation time per sensor is 44 seconds                Sensor node architecture has been designed and
before it being transmitted to BS; Figure 5.                    implemented using VHDL language in Xilinx 9.2i. The
   The hostile environment described is such that the           simulation has been carried out by ISE simulator and
intrusion detection is expected to be a rare event.             synthesized by using XST. The digital comparison is
Therefore, MVR will not be appended during most of              simulated with a timing of 10 nano seconds (equivalent
the sensor observation cycles. The sensor architecture          to a real time periodicity of 200 milli seconds of sensor
ensures that the transmission from the sensor node will         multiplexing) for each sensor and sweep timing of 800
take place only if one of the sensors obs_value crosses         nano seconds has been taken. The timing diagram
the minimum threshold value set in MVR. Minimum                 shows that the MVR is getting updated only when the
threshold value is selected such that noise and other           obs_value crosses the threshold value set in the MVR.
interferences will not trigger unwanted transmissions           The wake up trigger required for activating the
from the nodes. This is achieved in the architecture by         transmission section will be available only once during
simply setting a flag when the MVR is appended. The             the antenna scan of 44 seconds. On arrival of the wake
output from the MVR is taken only if the flag for the           up trigger the processor will check whether any of the
corresponding sensor is set.                                    MVRs has been updated. The system will transmit only
                                                                once during the antenna provided MVR is updated. The
E. Spread Spectrum Communication
                                                                system simulation shows substantial saving in energy
   Once the wake up signal has been received, the               consumption as the MVR updation takes place rarely.
Max_value stored in MVR is EXORed with the stored               Some random values have been given as input from the
PN sequence. The output of the EXOR is BPSK                     four sensors. The schematic diagram of the sensor node
modulated with the carrier frequency of 10 GHz. This            architecture is shown in Figure 6. The selection timing
is further amplified and transmitted to the base station.       of obs_value as it crosses the threshold stored MVR is
At the Base station each sensor node is to have a               shown in Figure 7.
separate CDMA receiver. These receivers correlate the




                                           Figure 6. Sensor node architecture




                                     Figure 7. Simulation timings at sensor node

                                                            5
© 2010 ACEEE
DOI: 01.ijns.01.02.01
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


G. Energy Saving At The Nodes                             [4] C. C. Enz, A. El-Hoiydi, J-D. Decotignie, V. Peiris,
                                                               “WiseNET: An Ultralow-Power Wireless Sensor Network
    In most of the WSN applications the detection of           Solution”, IEEE Computer, Volume: 37, Issue: 8, August
an event by a sensor device is a rare event and                2004.
therefore the data need to be transmitted only if an      [5] V. Rajendran, K. Obraczka, J.J. Garcia-Luna-Aceves,
event is detected. In the proposed scheme, the sensor          “Energy-Efficient, Collision-Free Medium Access Control
                                                               for Wireless Sensor Networks”, Proc. ACM SenSys 03,
devices continue to observe the physical parameters            Pages:181 - 192, Los Angeles, California, 5-7 November
till such time the wake up signal is arrived. The              2003.
Max_value stored in MVR is appended only when             [6] L. Bao and J.J. Garcia-Luna-Aceves, “A New Approach To
obs_value exceeds the minimum threshold value                  Channel Access Scheduling For Ad Hoc Networks”,
stored in it; which means that only when an event              Seventh Annual International Conference on Mobile
occurs. Once the wake up signal is received, the               Computing and Networking, pp. 210–221, 2001.
system verifies whether the data stored in the            [7] K. Jamieson, H. Balakrishnan, and Y. C. Tay, “Sift: A
corresponding registers of MVR have been                       MAC Protocol for Event-Driven Wireless Sensor
                                                               Networks,” MIT Laboratory for Computer Science, Tech.
appended. The appended data is only selected for
                                                               Rep. 894, May 2003
further transmission. This ensures that the data          [8] Y.C. Tay, K.Jamieson, H. Balakrishnan, “Collision-
communication from the sensor nodes will take place            minimizing CSMA and Its Applications to Wireless Sensor
only if an event occurs.                                       Networks”, IEEE Journal on Selected Areas in
    However, the very low level of communication               Communications, Volume: 22, Issue: 6, Pages: 1048 –
between the Base station and sensor node can pose a            1057, Aug. 2004.
                                                          [9] G. Lu, B. Krishnamachari, C.S. Raghavendra, “An adaptive
problem of identifying dead nodes (dead battery)
                                                               energy efficient and low-latency MAC for data gathering in
over a period of time. The system will have a                  wireless sensor networks”, Proceedings of 18th
mandatory transmission after every ten wakeup                  International Parallel and Distributed Processing
signal cycles even if there is no event detection.             Symposium, Pages: 224, 26-30 April 2004.
                                                          [10] T.V. Dam and K. Langendoen, “An Adaptive Energy-
                     CONCLUSIONS                               Efficient MAC Protocol for Wireless Sensor Networks”,
                                                               The First ACM Conference on Embedded Networked
   One of the prime criteria that differentiate WSN            Sensor Systems (Sensys‘03), Los Angeles, CA, USA,
nodes to other wireless nodes is the energy                    November, 2003.
consumption since most of the WSN nodes are               [11] P. Lin, C. Qiao, and X. Wang, “Medium access control
suppose to have minimum human interaction which                with a dynamic duty cycle for sensor networks”, IEEE
is essential for recharge/replacement of battery. A            Wireless Communications and Networking Conference,
method has been suggested which can be very                    Volume: 3, Pages: 1534 - 1539, 21-25 March 2004.
                                                          [12] A. Safwat, H. Hassanein, H. Mouftah, “ECPS and E2LA:
effectively implemented in many event detection
                                                               new paradigms for energy efficiency in wireless ad hoc and
applications. The full details of the system has not           sensor networks”, IEEE Global Telecommunications
been described, however the paper gives sufficient             Conference, GLOBECOM’03, Volume: 6, Pages: 3547 -
scope for the development of the system.                       3552, 1-5 December 2003.
                                                          [13] S. Cui, R. Madan, A. J. Goldsmith, and S. Lall, “Joint
                     REFERENCES                                Routing, MAC, and Link Layer Optimization in Sensor
                                                               Networks with Energy Constraints”, to appear at ICC'05,
[1] S.S., Kulkarni, “TDMA services for Sensor                  Korea, May, 2005.
    Networks”, Proceedingsof 24th International           [14] J. Ding, K. Sivalingam, R. Kashyapa, L. J. Chuan, “A
    Conference on Distributed Computing Systems                multi-layered architecture and protocols for large-scale
    Workshops, Pages: 604 – 609, 23-24 March 2004.             wireless sensor networks”, IEEE 58th Vehicular
[2] W. Ye, J. Heidemann, D. Estrin, “Medium Access             Technology Conference, 2003, VTC 2003-Fall 2003,
    Control with Coordinated Adaptive Sleeping for             Volume: 3, Pages:1443 - 1447, 6-9 Oct. 2003.
    Wireless Sensor Networks”, IEEE/ACM Transactions      [15] M. Zorzi, “A new contention-based MAC protocol for
    on Networking, Volume: 12, Issue: 3, Pages: 493 -          geographic forwarding in ad hoc and sensor networks”,
    506, June 2004.                                            IEEE International Conference on Communications,
[3] A. El-Hoiydi, “Spatial TDMA and CSMA with                  Pages: 3481 - 3485 Vol.6, 20-24 June 2004.
    preamble sampling for low power ad hoc wireless       [16] R. Rugin, G. Mazzini, “A simple and efficient MAC-
    sensor networks”, Proceedings of ISCC 2002, Seventh        routing integrated algorithm for sensor network”, IEEE
    International Symposium on Computers and                   International Conference on Communications, Volume: 6,
    Communications, Pages:685 - 692, 1-4 July 2002.            Pages: 3499 - 3503, 20-24 June 2




                                                          6
© 2010 ACEEE
DOI: 01.ijns.01.02.01

Weitere ähnliche Inhalte

Was ist angesagt?

BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stackSyed Ariful Islam Emon
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkGaurang Rathod
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network dilip pareek
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ijasuc
 

Was ist angesagt? (17)

BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor network
 
O4102103111
O4102103111O4102103111
O4102103111
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Report
ReportReport
Report
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 

Andere mochten auch

Context-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETsContext-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETsIDES Editor
 
Using Class Frequency for Improving Centroid-based Text Classification
Using Class Frequency for Improving Centroid-based Text ClassificationUsing Class Frequency for Improving Centroid-based Text Classification
Using Class Frequency for Improving Centroid-based Text ClassificationIDES Editor
 
Application of Bio-Inspired Optimization Technique for Finding the Optimal se...
Application of Bio-Inspired Optimization Technique for Finding the Optimal se...Application of Bio-Inspired Optimization Technique for Finding the Optimal se...
Application of Bio-Inspired Optimization Technique for Finding the Optimal se...IDES Editor
 
Illumination-robust Recognition and Inspection in Carbide Insert Production
Illumination-robust Recognition and Inspection in Carbide Insert ProductionIllumination-robust Recognition and Inspection in Carbide Insert Production
Illumination-robust Recognition and Inspection in Carbide Insert ProductionIDES Editor
 
Development and Testing of Feedback Control System for Fused Deposition by El...
Development and Testing of Feedback Control System for Fused Deposition by El...Development and Testing of Feedback Control System for Fused Deposition by El...
Development and Testing of Feedback Control System for Fused Deposition by El...IDES Editor
 
Differential Amplifiers in Bioimpedance Measurement Systems: A Comparison Bas...
Differential Amplifiers in Bioimpedance Measurement Systems: A Comparison Bas...Differential Amplifiers in Bioimpedance Measurement Systems: A Comparison Bas...
Differential Amplifiers in Bioimpedance Measurement Systems: A Comparison Bas...IDES Editor
 
Loss Reduction by Optimal Placement of Distributed Generation on a Radial feeder
Loss Reduction by Optimal Placement of Distributed Generation on a Radial feederLoss Reduction by Optimal Placement of Distributed Generation on a Radial feeder
Loss Reduction by Optimal Placement of Distributed Generation on a Radial feederIDES Editor
 
Analysis and Simulation of Sub-threshold Leakage Current in P3 SRAM Cell at D...
Analysis and Simulation of Sub-threshold Leakage Current in P3 SRAM Cell at D...Analysis and Simulation of Sub-threshold Leakage Current in P3 SRAM Cell at D...
Analysis and Simulation of Sub-threshold Leakage Current in P3 SRAM Cell at D...IDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 

Andere mochten auch (9)

Context-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETsContext-Aware Intrusion Detection and Tolerance in MANETs
Context-Aware Intrusion Detection and Tolerance in MANETs
 
Using Class Frequency for Improving Centroid-based Text Classification
Using Class Frequency for Improving Centroid-based Text ClassificationUsing Class Frequency for Improving Centroid-based Text Classification
Using Class Frequency for Improving Centroid-based Text Classification
 
Application of Bio-Inspired Optimization Technique for Finding the Optimal se...
Application of Bio-Inspired Optimization Technique for Finding the Optimal se...Application of Bio-Inspired Optimization Technique for Finding the Optimal se...
Application of Bio-Inspired Optimization Technique for Finding the Optimal se...
 
Illumination-robust Recognition and Inspection in Carbide Insert Production
Illumination-robust Recognition and Inspection in Carbide Insert ProductionIllumination-robust Recognition and Inspection in Carbide Insert Production
Illumination-robust Recognition and Inspection in Carbide Insert Production
 
Development and Testing of Feedback Control System for Fused Deposition by El...
Development and Testing of Feedback Control System for Fused Deposition by El...Development and Testing of Feedback Control System for Fused Deposition by El...
Development and Testing of Feedback Control System for Fused Deposition by El...
 
Differential Amplifiers in Bioimpedance Measurement Systems: A Comparison Bas...
Differential Amplifiers in Bioimpedance Measurement Systems: A Comparison Bas...Differential Amplifiers in Bioimpedance Measurement Systems: A Comparison Bas...
Differential Amplifiers in Bioimpedance Measurement Systems: A Comparison Bas...
 
Loss Reduction by Optimal Placement of Distributed Generation on a Radial feeder
Loss Reduction by Optimal Placement of Distributed Generation on a Radial feederLoss Reduction by Optimal Placement of Distributed Generation on a Radial feeder
Loss Reduction by Optimal Placement of Distributed Generation on a Radial feeder
 
Analysis and Simulation of Sub-threshold Leakage Current in P3 SRAM Cell at D...
Analysis and Simulation of Sub-threshold Leakage Current in P3 SRAM Cell at D...Analysis and Simulation of Sub-threshold Leakage Current in P3 SRAM Cell at D...
Analysis and Simulation of Sub-threshold Leakage Current in P3 SRAM Cell at D...
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 

Ähnlich wie Spread Spectrum Based Energy Efficient Wireless Sensor Networks

CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic AlgorithmsIJMER
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065auwalaumar
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...IJNSA Journal
 
Energy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewEnergy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewIOSR Journals
 
Energy consumption mitigation routing protocols for large wsn's final
Energy consumption mitigation  routing protocols for large wsn's finalEnergy consumption mitigation  routing protocols for large wsn's final
Energy consumption mitigation routing protocols for large wsn's finalsumavaidya90
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
A STUDY OF POWER SAVING TECHNIQUE IN WIRELESS NETWORKS
A STUDY OF POWER SAVING TECHNIQUE IN WIRELESS NETWORKSA STUDY OF POWER SAVING TECHNIQUE IN WIRELESS NETWORKS
A STUDY OF POWER SAVING TECHNIQUE IN WIRELESS NETWORKScscpconf
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
 

Ähnlich wie Spread Spectrum Based Energy Efficient Wireless Sensor Networks (20)

Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
G017344246
G017344246G017344246
G017344246
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
 
Chapter
ChapterChapter
Chapter
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
 
Energy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewEnergy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A Review
 
Energy consumption mitigation routing protocols for large wsn's final
Energy consumption mitigation  routing protocols for large wsn's finalEnergy consumption mitigation  routing protocols for large wsn's final
Energy consumption mitigation routing protocols for large wsn's final
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
A STUDY OF POWER SAVING TECHNIQUE IN WIRELESS NETWORKS
A STUDY OF POWER SAVING TECHNIQUE IN WIRELESS NETWORKSA STUDY OF POWER SAVING TECHNIQUE IN WIRELESS NETWORKS
A STUDY OF POWER SAVING TECHNIQUE IN WIRELESS NETWORKS
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 

Mehr von IDES Editor

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 

Mehr von IDES Editor (20)

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Spread Spectrum Based Energy Efficient Wireless Sensor Networks

  • 1. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 Spread Spectrum Based Energy Efficient Wireless Sensor Networks Wg Cdr Varghese Thattil (Retd)1, Dr. N Vasantha2, T. Esther Rani3 1 CVR College of Engineering Electronics and Communication, Hyderabad, India Email:mailthattil@gmail.com 2 Vasavi College of Engineering, Hyderabad, India Email: vasanthavasantha@rediffmail.com 3 CVR College of Engineering Electronics and Communication, Hyderabad, India Email: esterlawrence@rediffmail.com Abstract—The Wireless Sensor Networks (WSN) is energy saving is one of the key issues in the design of considered to be one of the most promising emerging systems based on WSNs. technologies. However one of the main constraints which It has been experimented and seen that the data is holding back its wide range of applications is the communication of sensor nodes consumes more energy battery life of the sensor node and thus effecting the network life. A new approach to this problem has been than the data processing and therefore there is a need to presented in this paper. The proposed method is suitable reduce the communication while achieving the desired for event driven applications where the event occurrence network operation [1]. The energy cost of transmitting is very rare. The system uses spread spectrum as a means one single bit of information is approximately same as of communication. that needed for processing a thousand operations in a typical sensor node [2]. However, since the sensor Index Terms—Rare event, Wake-up receiver, Single hop, network is very dense; composed of nodes with low Spread spectrum duty-cycles the medium access decision is a hard problem. Therefore it is important to know the peculiar I. INTRODUCTION features of sensor networks including reasons of Wireless Sensor Networks (WSNs) is considered as potential energy wastes at medium access a new technological vision because of the rapid communication. development in miniaturization; low power wireless A. Reasons of Energy Wastage communication, microsensor, and microprocessor hardware. WSNs may, in the near future, will provide Energy wastage occurs when there are collided “Ambient Intelligence” where many different devices packets, which occurs when a receiver node receives will gather and process information from many more than one packet at the same time or when they are different sources to both control physical processes and partially overlapped. All packets that cause the to interact with human users. Potential applications of collision have to be discarded and the re-transmissions WSNs include environmental monitoring, industrial of these packets are required which increase the energy control, battlefield surveillance and reconnaissance, consumption. Although some packets could be home automation and security, health monitoring, and recovered by a capture effect, a number of asset tracking. requirements have to be met to achieve a successful Improvements in hardware technology have resulted capturing. The second reason of energy waste is in low-cost tiny sensor nodes which are composed of overhearing, meaning that a node receives packets that three basic components: a sensing subsystem for data are destined to other nodes. The third energy waste acquisition from the surrounding environment, a occurs as a result of control packet overhead. Minimal processing subsystem for local data processing and number of control packets should be used to make a storage and a wireless communication sub system for data transmission. One of the major sources of energy data transmission to a sink node or access point. In waste is idle listening, i.e., listening to an idle channel addition to this; the energy required to carry out the to receive possible traffic. The last reason for energy programmed task is supplied from battery pack with a waste is overemitting, which is caused by the very limited energy budget. In most of the applications transmission of a message when the destination node is it has been observed that the energy source can not be not ready. Given the above facts, an efficiently replaced due to hostile environment or other practical designed MAC protocol should reduce these energy difficulties. However the sensor networks should be wastes to a large extend. able to sustain till such time the indented task is B. Communication Patterns completed. Though energy scavenging from external Kulkarni et al. defines three types of communication environment can be a possible solution, the technology patterns in wireless sensor networks [3]: broadcast, is not yet developed into a reliable source. Therefore convergecast, and local gossip. Broadcast type of 1 © 2010 ACEEE DOI: 01.ijns.01.02.01
  • 2. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 communication pattern is generally used by a base Additional components like as location finding system station (sink) to transmit some information to all sensor to determine their position, a mobilizer to change their nodes of the network. Broadcasted information may location or configuration etc. may be added depending include query-processing information, program updates upon the applications where they are used. for sensor nodes, control packets for the whole system Out of the above subsystems, the radio component etc. In some scenarios, the sensors that detect an account for maximum power consumption. Therefore intruder communicate with each other locally. This many protocols have been designed with the idea of kind of communication pattern is called local gossip, minimizing the radio communication this in most of the where a sensor sends a message to its neighboring cases has been achieved by increased data processing at nodes within a range. The sensors that detect the the nodes. intruder, then, need to send what they perceive to the information center. That communication pattern is called convergecast, where a group of sensors communicate to a specific sensor. The destination node could be a clusterhead, data fusion center, base station. C. Properties of a Well-defined MAC Protocol To design a good MAC protocol for the wireless sensor networks, the following attributes must be considered [4]. The first attribute is the energy efficiency. We have to define energy efficient protocols in order to prolong the network lifetime. Other important attributes are scalability and adaptability to Figure 1 Wireless Sensor Node Architecture changes. Some of the reasons behind these network property changes are limited node lifetime, addition of The communication distances in WSNs are typically new nodes to the network and varying interference small; a few meters in most of the applications and it which may alter the connectivity and hence the has been found that power consumed for reception is network topology. almost same or even more as compared to transmission. Other typical important attributes such as latency, One of the most power efficient designs for WSN could throughput and bandwidth utilization may be secondary be the one where in the radio, which consumes in sensor networks. Contrary to other wireless maximum power could be kept in sleep mode. The networks, fairness among sensor nodes is not usually a radio should be switched on only when there is a design goal, since all sensor nodes share a common specific need to transmit or receive data. Therefore the task. radio should alternate between active and sleep mode There are mainly two approaches to energy keeping the duty cycle as low as possible. conservation: In-network processing and through duty However since the WSN is a cooperative system the cycle controlling. In–network processing is a method sleep/wakeup schedule normally follows a distributive wherein the amount of data being transmitted is being algorithm. An efficient distributive algorithm should reduced; either by compression or aggregation ensure that the neighboring nodes in the radio range techniques. It typically exploits the temporal or spatial should be able to receive whenever a node is correlation among data acquired by sensor nodes. On transmitting keeping the duty cycle as low as possible. the other hand, duty cycling schemes define Many WSN applications are event based wherein a coordinated sleep/wakeup schedules among nodes in communication of data is to be essentially carried out the network. only on detection of an event. Massively deployed sensor nodes simultaneously detect the event and hence II. ENERGY CONSUMPTION REDUCTION can cause duplication of information. Therefore application layer energy efficiency can be achieved by A. Possible Energy Saving Approaches in-network processing or data aggregation. The energy To tackle the problem of energy consumption it is efficiency processing can be either through data quality essential to know how much power each node or avoiding unwanted data redundancy [7]. component dissipates during normal operating It is important to note at this stage that while conditions, i.e., which are the power dissipation improving the energy efficiency in a single layer it characteristics of sensor noses [6]. In a typical wireless should not effect the overall energy consumption in the sensor node there are four main components: Sensing node as a whole. In many applications, a cross layer subsystem having sensors for data acquisition and approach may be more suitable to reduce the overall analog to digital converter, processing subsystem energy consumption in a particular node. The topology consisting of micro-controller and memory for local control [8] and power management are the two processing, radio subsystem for wireless data approaches to energy efficiency. In the case of communication and a power supply unit Figure 1. topology control, the network redundancy is exploited 2 © 2010 ACEEE DOI: 01.ijns.01.02.01
  • 3. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 to improve the energy efficiency whereas in power power management service based on wake-up/sleep management sleep/wakeup timings are controlled to scheduling. achieve minimum duty cycle. The study of the energy consumption throughout the lifespan of a typical surveillance systems network node B. Power management shows that most of the energy is used up in operations Power management schemes need to control when a that do not actively fulfill the system’s purpose. A node network node should enter a high-power wakeup mode without power management is always turned on, but and when to enter a low-power sleep mode. Under there is no target most of the time. Hence, most of its certain conditions, the nodes’ hardware components energy is dissipated in a waiting status. Only one per may be shut down to low-power state. The low-power cent of the energy is used in actually tracking targets, to high-power transition is, however, a tricky problem the other 99% of the energy is used in waiting for because the network node has its CPU halted and is targets to show up. With a rotation based power unaware of the external events. Power management management, the energy efficiency is much better. techniques can either be done strictly at MAC layer or using sleep/wakeup protocols at higher layers (Network D. Low Energy Wakeup Receiver or application layer) which are integrated on top of L. Gu et al. proposed to use passive components to MAC layer. In the case of MAC layer power collect radio energy similar to the case of RFID (Radio management, lower duty cycle is achieved by TDMA frequency Identification) technology. The (Time Division Multiple Access), Contention-based microcontroller is interrupted when the induced RF procedures or their combinations. In the case of power input is large enough and this in turn wakes up TDMA, the nodes need to turn on their radio only the sensor node for data communication. However the during the allotted time slots. However this poses disadvantage in such a system is that any strong RF problem of flexibility and scalability. The scheme also signal can wakeup the node and also the range of has to ensure tight synchronization [9]. operation will be limited. A modified system which Energy efficiency in the case of Contention-based was proposed is to have an addressing mechanism with protocols is achieved by tightly integrating channel the help different RF triggering frequencies. The access functionalities with sleep/wakeup schemes [10]. system will however require additional wakeup hardware for each frequency [13]. In this case C. Sleep/wakeup protocols minimum required active components are added to the The power management schemes can be broadly passive wake up radio so that messages could be sent to divided into three categories, depending upon the particular nodes to wake up the nodes. The wakeup method used to wake up the node. They are on- receiver consists of an impedance matching circuit demand, schedule based and asynchronous. In the case followed by a voltage multiplier (charge pump). The of on-demand the node wakes only when there is an charge pump consisting of capacitances along with external interrupt from another node [11]. The main schottky diodes, increases the weak input voltage to a problem associated with on-demand schemes is how to level at which the microcontroller can be triggered. The inform the sleeping node that some other node is schematic diagram has been shown in Figure 2. willing to communicate with it. To achieve this, Wakeup signal transmitter sends amplitude additional wake up radios with low data rate and low modulated carrier signal. The received output is finally power consumption is used for signaling. In the case of passed through a digital comparator to recover the schedule based approach each node should wake up at envelope. The comparator also helps to have a noise the same time as its neighbors. However this requires rejection as well as to have square pulse output. In this rigorous synchronization between the nodes causing architecture digital comparator is the only active increase in latency. component which will draw power from the source. The node synchronization between nodes can be Lower distance of wake up radio communication is a avoided by asynchronous power management. In this big disadvantage in this case. case, the nodes can wake up when ever they want and still be able to communicate with their neighbors. This is achieved by having a pattern of wake up wherein at least two nodes have an overlapping wake up duration. In this approach the nodes are expected to wake up more often and hence the duty cycle tends to be higher as compared to synchronous protocols [12]. The implementation of the wakeup/sleep scheduling often involves a timer that wakes up the CPU via an interrupt. The wake-up/sleep scheduling approach has some disadvantages. First, the design of a good wake- Figure 2. Wakeup Receiver Block Diagram up/sleep schedule is often application dependent and complicated. Hence, it is hard to design a general 3 © 2010 ACEEE DOI: 01.ijns.01.02.01
  • 4. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 III. PROPOSED SCHEME A. Proposed Scheme Motivation There are many applications like habitat monitoring or movement detection etc. of sensor networks where event monitoring has to be carried out in a large area. There are applications where the area of interest has to be continuously monitored for long duration. This becomes very difficult unless the system is made automatic. The system should be able to detect the Figure 4. Sector scanning timings event and automatically initiate the necessary actions as required. These can be setting off alarms, send A detailed timing diagram for the system messages switch on cameras/lights in the required implementation is shown in Figure 5. The antenna region etc. The advantage of the specific application dwelling time in each sector is 10 seconds. The can be made use of by having a cross layer protocol so positioning of the antenna in the next sector takes 1 that the power energy efficiency can be maximized. second, however this timing will be lesser if electronic B. Proposed Scheme Description scanning is used. Once the antenna has been placed to The proposed scheme is to deploy the sensor nodes the sector; the BS transmitter emits 5 microseconds (µ in the entire region of interest. Each sensor node will sec) pulses at an interval of 10 milliseconds (msec) for have its own unique spread spectrum code to identify duration of 1 second. Immediately after that the BS it. The distance between the nodes have to be decided transmitter shuts off and the receiver is tuned to receive on the basis of the sensing range of the associated the sensor nodes transmissions. sensors. The Base station (BS) is having four directive C. Wake-up Receiver antennas covering the entire region around it. The All sensor nodes will have wake up receivers which sensor nodes have low power wake-up radios which are tuned to receive the trigger pulses send from the can be triggered with the help of Base station directive Base Station (BS). As the pulses received at the input antennas. The deployment plan has been shown in of the wakeup receiver increases the voltage at the Figure 3 The Base station will sequentially scan the input of the voltage multiplier starts rising; refer Figure four sectors by sending trigger pulses in the form of 2. When the voltage at the output of voltage multiplier series of square pulses for few milliseconds and crosses threshold level, the wake up receiver sends an subsequently the Base Station receivers are switched on interrupt to the microcontroller to initiate the to receive the transmissions from the sensor nodes. transmission of data signals to BS. A timing diagram has been shown in Figure.4. The sensor devices in the sensor nodes will continuously observe the physical parameters within its range. The nodes will respond to the wake-up call only incase the observed parameters crosses a minimum threshold level. This avoids unwanted transmissions and thus improving the battery life. At the Base station, the correlation receivers acquire and track the incoming signals from the sensor nodes and recover the data. Figure 5. Base Station and node transmit and receive timings D. Sensor Node Architecture The proposed architecture of the sensor node has been shown in the figure 6. The observed analog values from the sensor devices are sequentially taken, converted to digital and stored in the digital storage registers as obs_value. The obs_value from each sensor device is stored till such time it is forwarded to digital comparator. Max_value registers (MVR) shown in the Figure 3. Deployment of Sensor nodes along with Base architecture are used to store the initial minimum Station threshold values. These values are given as input to the digital comparator to compare the obs_value stored in 4 © 2010 ACEEE DOI: 01.ijns.01.02.01
  • 5. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 the corresponding registers of the digital storage. incoming signal with the known PN sequences of the Incase the obs_value is greater than the Max_value, the sensors and recover the data. Since there is no MVR is appended with the current obs_value stored in synchronization between the nodes and the Base station digital storage. The obs_value from each sensor is Asynchronous CDMA communication is required. converted to digital at an interval of 800 msecs. The digital comparison is carried out at every 200 msecs. F. Simulation Results The total observation time per sensor is 44 seconds Sensor node architecture has been designed and before it being transmitted to BS; Figure 5. implemented using VHDL language in Xilinx 9.2i. The The hostile environment described is such that the simulation has been carried out by ISE simulator and intrusion detection is expected to be a rare event. synthesized by using XST. The digital comparison is Therefore, MVR will not be appended during most of simulated with a timing of 10 nano seconds (equivalent the sensor observation cycles. The sensor architecture to a real time periodicity of 200 milli seconds of sensor ensures that the transmission from the sensor node will multiplexing) for each sensor and sweep timing of 800 take place only if one of the sensors obs_value crosses nano seconds has been taken. The timing diagram the minimum threshold value set in MVR. Minimum shows that the MVR is getting updated only when the threshold value is selected such that noise and other obs_value crosses the threshold value set in the MVR. interferences will not trigger unwanted transmissions The wake up trigger required for activating the from the nodes. This is achieved in the architecture by transmission section will be available only once during simply setting a flag when the MVR is appended. The the antenna scan of 44 seconds. On arrival of the wake output from the MVR is taken only if the flag for the up trigger the processor will check whether any of the corresponding sensor is set. MVRs has been updated. The system will transmit only once during the antenna provided MVR is updated. The E. Spread Spectrum Communication system simulation shows substantial saving in energy Once the wake up signal has been received, the consumption as the MVR updation takes place rarely. Max_value stored in MVR is EXORed with the stored Some random values have been given as input from the PN sequence. The output of the EXOR is BPSK four sensors. The schematic diagram of the sensor node modulated with the carrier frequency of 10 GHz. This architecture is shown in Figure 6. The selection timing is further amplified and transmitted to the base station. of obs_value as it crosses the threshold stored MVR is At the Base station each sensor node is to have a shown in Figure 7. separate CDMA receiver. These receivers correlate the Figure 6. Sensor node architecture Figure 7. Simulation timings at sensor node 5 © 2010 ACEEE DOI: 01.ijns.01.02.01
  • 6. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 G. Energy Saving At The Nodes [4] C. C. Enz, A. El-Hoiydi, J-D. Decotignie, V. Peiris, “WiseNET: An Ultralow-Power Wireless Sensor Network In most of the WSN applications the detection of Solution”, IEEE Computer, Volume: 37, Issue: 8, August an event by a sensor device is a rare event and 2004. therefore the data need to be transmitted only if an [5] V. Rajendran, K. Obraczka, J.J. Garcia-Luna-Aceves, event is detected. In the proposed scheme, the sensor “Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks”, Proc. ACM SenSys 03, devices continue to observe the physical parameters Pages:181 - 192, Los Angeles, California, 5-7 November till such time the wake up signal is arrived. The 2003. Max_value stored in MVR is appended only when [6] L. Bao and J.J. Garcia-Luna-Aceves, “A New Approach To obs_value exceeds the minimum threshold value Channel Access Scheduling For Ad Hoc Networks”, stored in it; which means that only when an event Seventh Annual International Conference on Mobile occurs. Once the wake up signal is received, the Computing and Networking, pp. 210–221, 2001. system verifies whether the data stored in the [7] K. Jamieson, H. Balakrishnan, and Y. C. Tay, “Sift: A corresponding registers of MVR have been MAC Protocol for Event-Driven Wireless Sensor Networks,” MIT Laboratory for Computer Science, Tech. appended. The appended data is only selected for Rep. 894, May 2003 further transmission. This ensures that the data [8] Y.C. Tay, K.Jamieson, H. Balakrishnan, “Collision- communication from the sensor nodes will take place minimizing CSMA and Its Applications to Wireless Sensor only if an event occurs. Networks”, IEEE Journal on Selected Areas in However, the very low level of communication Communications, Volume: 22, Issue: 6, Pages: 1048 – between the Base station and sensor node can pose a 1057, Aug. 2004. [9] G. Lu, B. Krishnamachari, C.S. Raghavendra, “An adaptive problem of identifying dead nodes (dead battery) energy efficient and low-latency MAC for data gathering in over a period of time. The system will have a wireless sensor networks”, Proceedings of 18th mandatory transmission after every ten wakeup International Parallel and Distributed Processing signal cycles even if there is no event detection. Symposium, Pages: 224, 26-30 April 2004. [10] T.V. Dam and K. Langendoen, “An Adaptive Energy- CONCLUSIONS Efficient MAC Protocol for Wireless Sensor Networks”, The First ACM Conference on Embedded Networked One of the prime criteria that differentiate WSN Sensor Systems (Sensys‘03), Los Angeles, CA, USA, nodes to other wireless nodes is the energy November, 2003. consumption since most of the WSN nodes are [11] P. Lin, C. Qiao, and X. Wang, “Medium access control suppose to have minimum human interaction which with a dynamic duty cycle for sensor networks”, IEEE is essential for recharge/replacement of battery. A Wireless Communications and Networking Conference, method has been suggested which can be very Volume: 3, Pages: 1534 - 1539, 21-25 March 2004. [12] A. Safwat, H. Hassanein, H. Mouftah, “ECPS and E2LA: effectively implemented in many event detection new paradigms for energy efficiency in wireless ad hoc and applications. The full details of the system has not sensor networks”, IEEE Global Telecommunications been described, however the paper gives sufficient Conference, GLOBECOM’03, Volume: 6, Pages: 3547 - scope for the development of the system. 3552, 1-5 December 2003. [13] S. Cui, R. Madan, A. J. Goldsmith, and S. Lall, “Joint REFERENCES Routing, MAC, and Link Layer Optimization in Sensor Networks with Energy Constraints”, to appear at ICC'05, [1] S.S., Kulkarni, “TDMA services for Sensor Korea, May, 2005. Networks”, Proceedingsof 24th International [14] J. Ding, K. Sivalingam, R. Kashyapa, L. J. Chuan, “A Conference on Distributed Computing Systems multi-layered architecture and protocols for large-scale Workshops, Pages: 604 – 609, 23-24 March 2004. wireless sensor networks”, IEEE 58th Vehicular [2] W. Ye, J. Heidemann, D. Estrin, “Medium Access Technology Conference, 2003, VTC 2003-Fall 2003, Control with Coordinated Adaptive Sleeping for Volume: 3, Pages:1443 - 1447, 6-9 Oct. 2003. Wireless Sensor Networks”, IEEE/ACM Transactions [15] M. Zorzi, “A new contention-based MAC protocol for on Networking, Volume: 12, Issue: 3, Pages: 493 - geographic forwarding in ad hoc and sensor networks”, 506, June 2004. IEEE International Conference on Communications, [3] A. El-Hoiydi, “Spatial TDMA and CSMA with Pages: 3481 - 3485 Vol.6, 20-24 June 2004. preamble sampling for low power ad hoc wireless [16] R. Rugin, G. Mazzini, “A simple and efficient MAC- sensor networks”, Proceedings of ISCC 2002, Seventh routing integrated algorithm for sensor network”, IEEE International Symposium on Computers and International Conference on Communications, Volume: 6, Communications, Pages:685 - 692, 1-4 July 2002. Pages: 3499 - 3503, 20-24 June 2 6 © 2010 ACEEE DOI: 01.ijns.01.02.01