SlideShare ist ein Scribd-Unternehmen logo
1 von 6
ENERGY EFFICIENT ROUTING
                                                  PROTOCOL IN WSN



*Neelam Chauhan                                                   * Pearmjeet Singh
*M Tech (Final Year CSE) at BRCM, Behal, Bhiwani                  * M Tech (Microelectronics & VLSI Design)
*er.neelam.choudhary@gmail.com                                     Lecturer, ECE Department, Govt Polytechnic,Loharu,
                                                                    Bhiwani,Haryana, India
                                                                   *chauhan.paramjeet@gmail.com

Abstract: In Nowadays the popularity of Wireless                   wireless channels to form intelligent distributed sensor
Sensor Networks have increased tremendously, due to the            system.
vast potential of the sensor networks to connect the
physical world with the virtual world. Since these devices         A wireless sensor node has very limited energy supply that
rely on battery power and may be placed in hostile                 is usually supplied with battery, and it is almost infeasible
environments replacing them becomes a tedious task. Thus,          for a sensor terminal to recharge or replace the battery
improving the energy of these networks becomes                     power after deployment in distant or urgent issue hazardous
important.                                                         environments. Therefore, in order to prolong the whole
The paper provides an energy efficient protocol for sensor         network lifetime, energy efficiency, especially power
data management. The protocol employs replicated data              saving on each sensor node, becomes an in WSN
sinks to achieve
(1)        Resiliency to data sinks failure.                            11 Background Knowledge
(2)        Efficiency in storing and retrieving sensor data.
A simple address assignment scheme is introduced that              2.1 Energy Efficient Communication Protocol
partitions the sensor field into cells, where each cell
contains one data sink and all sensors that are closest to this    An Energy Efficient Protocol for storing and retrieving
data sink. It is shown that this scheme is scalable and            sensor data. With some new features this protocol also
resilient against data sink and sensor node failures.              provides fault tolerance in the presence of data sink and
Furthermore, the scheme has a reasonably low message               sensor failures. As a result, this protocol can maximize the
complexity and high energy efficiency.                             overall life of the sensor network.

                                                                   Now what is the role of sensor node in wireless sensor
Keywords: WSN Routing ,WSN Protocol , De Bruijn
                                                                   network?
Digraphs ,Energy Efficient Communication Protocol,                 Sensors are usually very simple units that are equipped
FLOC.                                                              with a sensing functionality. One can expect that wireless
                                                                   sensors become smaller, cheaper, and more powerful.
   1 Introduction                                                  Sensors can even carry out simple computations and
                                                                   communicate with each other. However, a wireless sensor
As a revolution of information sensing and collecting,             node has limited resources since it typically runs on battery
wireless sensor network is an emerging distributed sensing         power and usually has a very small memory space. Thus,
technology that has a wide range of applications such as           sensing devices must operate under severe resource
remote environment monitoring, military sensing, and               constraints and one of the foremost goals is to minimize the
intelligence information gathering and so on..                     energy consumption. Therefore, there is a need for an
                                                                   energy-efficient communication scheme to store and
                                                                   retrieve a vast amount of sensor data. But in many
                                                                   applications, the sensing devices are placed outdoors,
                                                                   resulting in a vulnerability to various noises and errors.
                                                                   .

                                                                   2.2 Problem Definition
                                                                   1) What kind of data storage and retrieval structure in a
                                                                   wireless sensor network is energy-efficient?
                                                                   2) How can we make the wireless sensing system fault
Figure.1: Framework of a Wireless Sensor Network                   tolerant, when sensor nodes and data sinks may fail?
                                                                   3) How can we achieve scalability in wireless sensor data
                                                                   management so that the sensor system can be easily
The wireless sensor networks are composed of a large               expanded by deploying new sensors and even adding new
number of inexpensive and small sensor nodes (called as            data sink?
collectors) as well as an information collection center
(called as base station, sink), which are connected via
As an effort to answer these questions, a protocol based on              . . . ,sn}. The data sinks are sensor-oblivious, which means
ideas inspired by de Bruijn digraphs and Voronoi diagrams.               that a sensor can store and retrieve data to and from any
De Bruijn Digraphs:-The basics of de Bruijn digraphs [2]                 data sink. It is assume that the t data sinks are reasonably
let h and k is integer’s ≥ 2. The de Bruijn digraph B(h, k)              regularly deployed over the sensor field.
has vertex set V = {0, 1, . . . , h − 1}k, and there is an edge
from vertex a = (a1, . . . , ak) to vertex b = (b1, . . . , bk) if       The following assumptions about the cost for an interaction
and only if ai = bi+1 for all i in the range 1 ≤ i ≤ k − 1..             between a data sink and a sensor.
Thus every vertex has an out-degree of h, and the diameter               The cost (energy consumption) of storing and retrieving
of B (h, k) is equal to k.                                               data is the same at every data sink.
                                                                         The cost of sending and receiving data to and from a data
                                                                         sink can be computed by the hop count in the routing path
                                                                         to the data sink times a fixed cost per hop.

                                                                         Each sensor tries to minimize the cost of storing and
                                                                         retrieving data by communicating with the nearest data
                                                                         sink, where the distance from a sensor to a data sink is
                                                                         measured in terms of hop counts. It follows that the sensor
                                                                         network is partitioned into cells such that the sensors in the
                                                                         same cell communicate with the same data sink.

           Figure 2 : Illustrate the digraph B (2, 2).                   The nodes on the border of two or more cells “border
                                                                         nodes”. It assumes that unique identifiers (ID) are given to
                                                                         data sinks. It also assumes that every sensor node has a
Thus every vertex has an out-degree of h, and the diameter               unique identifier, such as a MAC address . There is no
of B (h, k) is equal to k. One possible routing scheme in a              functional difference among data sinks, that is, they all act
de Bruijn digraph works as follows. Suppose that the                     as final data storage and gateway to the outside networks.
destination address is b = (b1. . . bk) and the source address           Data can be sent to any of the data sinks as long as the data
is a = (a1, . . . , aℓ, b1, . . . , bk−ℓ), where (b1, . . . , bk−ℓ) is   sink is alive.
the longest prefix of b at the tail of a. Then the routing can
be done by left-shifting the source address ℓ times,
inserting one digit of the destination address in each step,             It also assume that the wireless sensor nodes as well as the
starting from digit bk−ℓ+1.                                              data sinks are stationary, i.e. not mobile. It also assume that
                                                                         the data sink servers know the total number n of sensor
It is noted that it is not possible to use de Bruijn routing in a        nodes, and that only a subset of the sensors are within one-
sensor network, since the de Bruijn digraph cannot, in                   hop range from the data sinks (if all the sensors are within a
general, be embedded into the available communication                    radio range from the data sinks, then there is no need for
topology of the sensor network. However, we can retain                   routing). The wireless signal (message) that a sensor node
much of the routing principle for the communication of                   sends is broadcast within the radio range, that is, every
sensor nodes to data sinks.                                              node within the radio range of a sensor node ith will hear
It is well-known that de Bruijn networks can provide                     the messages broadcast by ith. Delivering a message
efficient routing among large number of nodes. In this                   requires more processing power than receiving a message.
routing scheme imitates certain aspects de Bruijn routing,               Therefore, in the design of the energy efficient protocol, it
but is simpler, more flexible, and dynamically                           tries to minimize the redundant delivery of messages
reconfigurable. In this scheme, the address of a sensor node             without compromising the fault-tolerance in data
already indicates the length of the path to the closest data             transmission.
sink.

                                                                              111 WSN Protocol

 2.3 System Model and Assumption                                         3.1 The Protocol

The communication architecture uses a hybrid model that                  In this section, the description of protocol for energy-
effectively utilizes a variation of the peer-to-peer                     efficient, fault-tolerant data storage and retrieval, without
communication paradigm among the sensors, and a                          relying on any geographic or physical location information
variation of the client server paradigm between the sensors              of the sensors as well as the servers. The new protocol uses
and the data sinks. The wireless sensors act as clients in the           the five types of messages:
networked sensor system and the data sinks act as servers.               1) The initialization message (init) is used in the
The data sinks process the return feedback control data to               initialization step to assign hop-count based addresses.
the sensor nodes.                                                        2) The toSink message is used to send a message from a
                                                                         sensor node to the data sink to perform a data storage
Let W (t, n) denote a wireless sensor network with t                     operation.
replicated data sinks D = {d1. . . dt}, and n sensors S = {s1,
3) The fromSink message is used to broadcast a message
from the data sink server to every sensor node. This
message carries the ID of the sending data sink. This type
of message is used when the server proactively retrieves
data from the sensors or when it needs to broadcast control
messages to the sensors.
4) The peer message is used to communicate among the
peer sensors.
5) The node Fail message is used to inform nodes about a
failed node. This type of message is used by successors of a
failed node to negotiate new routing paths.                                    Figure 1 : Sensor Network with three Data Sinks

First, the description about how the initial setup is
performed, where one or more de Bruijn-style addresses are                Figure 1 shows a sensor network with three data sinks (that
assigned to each sensor node. Then I illustrate how                       are depicted by black circles) and several sensor nodes (that
message routing is performed. Finally, The explanation                    are depicted by white circles). If two nodes are within
about how resilience against node failures is achieved                    radio-range of each other, then there is an edge between
                                                                          these nodes.
3.2 Initialization of WSN
The data sink servers start the initialization step by a
dynamic address assignment procedure. The t data sink
servers have addresses 1. . . t. Suppose that the data sink
server i has h sensors within its one-hop radio range. The
data sink server i assigns the h sensor nodes the addresses
(i, 0), (i, 1). . . (i, h − 1). When a sensor node s with h′ one-
hop neighbors receives an address a = (a1, a2. . . aℓ) from
an one-hop neighbor j, then it takes one of the following
actions:
If s does not have a valid address, then s takes a as its
address. And it assigns each one-hop neighbor, except j, an
address in the range of (a1, a2, . . . , aℓ, 0), . . . , (a1, a2, . . .
, aℓ, h′ − 2). • If s already has a valid address of length ℓ,                    Figure 2 : Result after Address Assignment
then it keeps a as an alias address. Notice that all aliases of
a sensor node have the same length.
                                                                          Sensor network after address assignment. Some nodes have
If s has a valid address of length ℓ′ > ℓ, then it deletes all its
                                                                          several address aliases that lead to different routes in to
address aliases and keeps a as a new address. And it once
                                                                          Sink messages
again assigns each one-hop neighbor, except j, an address
in the range of (a1, a2. . . aℓ, 0), . . . , (a1, a2, . . . , aℓ, h′
−2).
In this way, every sensor node that is reachable from a data
sink will receive at least one address. The number of
address aliases of a sensor node does not exceed the
number of its one hop neighbors. A sensor node informs its
one-hop neighbors about its address aliases.
This simple address assignment scheme has some
remarkable properties:

If a sensor node has an address alias (a1, a2. . . aℓ), then
there is a path of ℓ−1 hops to the data Sink a1, and there is
no shorter path to a1. This assignment scheme realizes the                  Figure 3 : illustrates the subdivision into different cells.
partitioning into cells. If a node has only address aliases
that start with a1, then it is within the cell of a1.                     Induced partition of the network. All nodes that have an
                                                                          address alias beginning with the same digit belong to the
The border nodes are characterized by the fact that they                  same cell. Border nodes belonging to two different cells are
have address aliases that start with different digits. The                shaded grey.
main features of the address assignment.
                                                                           Each cell contains a data sink and all sensor nodes that are
                                                                          closer to this data sink than to any other in terms of hop-
                                                                          count. If a sensor node has the same distance from more
                                                                          than one data sink, then it belongs to the cell of each of
                                                                          those data sinks; such nodes are called border nodes.
The nodes 120, 230, 310 are examples of such border                     Example 3: Suppose that node 130 wants to send a peer
nodes. If a sensor node s has address (a1, a2, . . . , aℓ−1,            message to node 210 in the sensor network given in Figure
aℓ), then there exists a node p with address (a1, a2, . . . ,           3.6(c). Then the message is routed through 130 → 13 → 1,
aℓ−1).p a predecessor of s, and s a successor of p. The                 and then forwarded to data sink 2, and the final hops are 2
associates of s are all one-hop neighbors of s that are                 → 21 → 210.
neither predecessor nor successors.
                                                                        A straightforward routing rule for peer messages could use
3.3 Routing                                                             a sequence of predecessors until the node with the longest
                                                                        common prefix of a and b is reached, from which b can be
After the addresses have been assigned to the nodes,
                                                                        reached through successors. Our peer message routing rule
routing is performed. The most common type of message is
                                                                        improves upon this rule by taking shortcuts whenever
a to Sink message from a sensor node to a data sink, which
                                                                        Information about one-hop neighbors reveals such a
is typically routed through predecessors. Occasionally, a
                                                                        possibility, as was shown in Example 1. Unlike to Sink
data sink may send from Sink messages to the sensor
                                                                        routing, it should be noted that peer routing is not
nodes, which are forwarded through successors. A peer
                                                                        necessarily optimal; this is the price one has to pay for the
message is routed through any combination of
                                                                        very limited memory usage. In view of the fact that peer
predecessors, associates, and successors.
                                                                        messages are rare and typically local, this does not appear
                                                                        to be a significant disadvantage.
A to Sink message is routed by randomly selecting one
predecessor; this is done by right-shifting one randomly
                                                                        The energy efficient protocol makes typically multiple
selected address alias. Then the same process is repeated
                                                                        paths available while routing from sensor node to a data
until the data sink is reached. For instance, one possible
                                                                        sink; unlike many other routing protocols for sensor
path from the address (a1, . . . , aℓ) is through the
                                                                        networks, such as directed diffusion, ours will always
predecessors (a1, . . . , aℓ−1), (a1, . . . , aℓ−2), . . . , (a1, a2)
                                                                        ensure that the selected route is optimal, so that load
to the data sink a1.
                                                                        balancing does not come at the cost of energy efficient.
 A from Sink message is broadcast by sending the message
from the data sink to its successors, and each sensor node
receiving such a message forwards it to all its successors.
                                                                                   IV Related Work and Comparison
Suppose that a peer message is sent from a node with
address a = (a1. . . aℓ) to a node with address b = (b1, . . . ,
bk). The node a or any node receiving the message
forwards it to the one-hop neighbor that has an address                 The work is related to two intertwined themes in wireless
alias with the longest common prefix with b; if several one-            sensor networks: routing and data aggregation. Numerous
hop neighbors qualify, then the one with the shortest                   architectures and protocols have been proposed to solve
address alias is chosen. If a data sink 6= b1 receives such a           both problems at the same time.
message, then it will forward it to the data sink b1.                   Initial Flooding of Message:-An initial flooding of
                                                                        messages in the sensor field to establish the routing paths.
The design of the protocol ensures that the routing of the to           This step is somewhat similar to directed diffusion ,a
Sink messages is optimal; in a typical sensor network                   mechanism that uses limited flooding of queries towards
application the to Sink messages are by far the most                    events and sets up reverse gradients for the best path. One
frequent ones, since they are used to communicate the                   fundamental difference is that directed diffusion is
sensor data.                                                            designed for the single data sink scenario, whereas the
                                                                        energy efficient routing protocol can serve multiple data
Example 1: Suppose that the node 131=310 in the sensor                  sinks.
network given in Figure 3 wants to send a to Sink message               GPSR: is an efficient routing scheme that relies on the
to a data sink. If it chooses its alias 131, then the resulting         localized nodes and restricts flooding to a geographical
route will be 131 → 13 → 1. If it chooses its address alias             region . One drawback of this approach, however, is its
310, then the resulting route will be 310 → 31 → 3. Peer                assumption that the locations of the sensor nodes are
messages can be used, for example, by a sensor to check                 known to all nodes in the network. Where new change in
whether its sensor readings are reasonable. Although such               the protocol such that knowledge of locations is not
messages are rare or not used at all in typical sensor                  required.
network applications, we remark that routing between any                SHORT: is a self-healing, path- and energy-aware routing
two nodes is possible. An example shows the above                       framework shows a good performance with the reduced
routing rule.                                                           energy costs .In a path-aware scheme, shorter paths are
                                                                        found by connecting non-adjacent nodes on a path that are
Example 2: Consider the sensor network given in Figure 3                within communication range of each other. In an energy-
Suppose that node 110 wants to send peer message to node                aware scheme, a routing path is switched when the energy
210. Since both neighbors of 110 have an empty common                   of the nodes on the path is running low. By letting the
prefix with 210, the message is forwarded to 11, the shorter            neighboring nodes of a route, together with the on-route
address alias. Among the neighbors of 11, the node                      nodes, monitor the route, up-to-date information of local
200 have the longest common prefix with 210, so it is                   topology and link quality can be exploited. The work
routed there, and node 200 routes the message to 210.                   resembles their approach regarding self-healing and
                                                                        energy-efficiency. In new case, the routing of messages to a
data sink is optimal, and the advantage of shortcuts in peer     the introduction of alternate paths with neighbor node
message routing, though without introducing much                 (sensor node, data sink) according to the location also.
overhead.                                                        The most common application in sensor networks is the
FLOC: (Clustering service) called FLOC, which can                delivery of sensor data. The protocol ensures that such
achieve efficient and scalable control in large-scale ad hoc     messages from the sensor nodes are always routed in an
wireless sensor networks. To achieve high energy                 optimal way to the closest data sink using the least possible
efficiency and resiliency, role-based hierarchical self-         number of hops.
organized networks are explored in Depending on their            The overhead of keeping routing tables to accommodate the
connectivity and sensing capability, sensor nodes are            memory constraints of sensor nodes is totally avoided. A
assigned the role of data collection and data dissemination.     node simply needs to keep the address aliases of itself and
Based on certain metrics, the network is partitioned into        of its one-hop neighbors. Furthermore, this protocol does
sensing zones, in which the sensor nodes collaborate to          not require any location information. The reasonably low
achieve a sensing objective.                                     message complexity of our scheme can extend the battery
In the energy efficient protocol, this approach relies only on   life of each node, maximizing the overall life of the sensor
local information. However, as a hierarchy-based                 network.
architecture, this approach is vulnerable to failures,
especially when particular roles are prone to become points
of failure. The systematic rotation of roles among the nodes
can resolve this problem. A periodically repeated role
assignment scheme is proposed in for Bluetooth-based                                   VI References
sensor networks.
ACQUIRE : is an active query forwarding mechanism in             1 Andrea Kulakov, Georgi Stojanov and Danco
a sensor network. A query packet is forwarded through the        Davcev,”Sound and video processing in wireless sensor
network that follows a random or guided path. At each step,      networks” Faculty of Electrical Engineering University
a node, upon receiving a query, performs an update to            “Sts Cyril and Methodius”,IEEE, April 2006.
gather data from all of its neighbors within a look-ahead of     2 Anwitaman Datta, Sarunas Girdzijauskas, Karl Aberer,”
d steps. As this query progresses through the network, it is     On de Bruijn routing in distributed hash tables: There and
gradually resolved into smaller components until it is           back again,” IEEE, EPFL 2003.
completely solved and is returned back to the querying           3 Brad Krap, H.T.Kung, “GPSR: Greedy Perimeter
node. This approach works at its best for one-shot, non-         Stateless Routing for Wireless Networks”, Proc, of the 6th
aggregate, complex queries for replicated data.                  Annual Int.Conf.on Mobile Mobile Computing and
TAG: is a high-level abstraction of a declarative interface      Networking (MobiCom), pp.243-245, August 2000.
for data collection and aggregation in wireless sensor           4 Chao Gui and Prasant Mohapatra, “A Self –Healing and
networks of TinyOS motes .It realizes a distributed query        Optimizing Routing Techniques for Ad-Hoc
aggregation scheme that is sensitive to resource constraints     Networks”Proc of the 4th ACM Int.Symp on Mobile Ad
and can cope with lossy communication of wireless sensor         Hoc Networking and Computing (MobiHoc), IEEE,
networks.                                                        pp.279-290, June2003.
                                                                 5 C.Intanagonwiwat, R.Govindan and D.Estrin “Directed
So, finally it is noticed that a mobile agent based systems,     Diffusion: A Scalable and Robust Communication
where agents exchange data with nearby sensors or access         Paradigm for Sensor Networks”, Proc. of the 6th Annual
points that they encounter as they pass by. The advantage        Int.Conf.on Mobile Computing and Networking
of such an approach is that fewer infrastructures are            (MobiCom), pp56-67, of IEEE, August2000.
required and on the other methods there is no overhead           6 DaiZhi-feng, li-Yuan-Xiang, He-gnoliang, Jong Ya-la,
caused by packet routing. When the density of mobile             Shen Xian-Jun, “Uncertain Data Management for Wireless
agents is sufficiently high, the system is more robust than a    Sensor Network Using Rough Set Theory” of IEEE June
fixed network. The primary drawback of such a system is          2006.
that the latency is high, so it is not suitable for all          7 Danco Davcev, Andrea Kulakov, and Stojanco
applications. Unexpected failures such as loss of mobile         Gancev,”Experiments in Data Management for Wireless
agents or limitations on mobility can compromise the fault-      sensor Network” of IEEE, September 2008.
tolerance of such a system.                                      8 F.L.Lewis “Wireless Sensor Network” Associated
                                                                 director for Research Head, Advance Controls, sensors &
                       V Conclusion                              MEMS Group of Automation & Robotics Research
                                                                 Institution the University of Texas,http://arri.uta.edu/acs,
During the conduct of study done as a part of paper, on          Feb 2004.
energy efficient communication protocol for data storage         9 Haiying Shen, Ting Li “Data Management of Wireless
and retrieval in a wireless sensor network is vulnerable.        Sensor Network” of IEEE, May 2009.
                                                                 10 Hyunyonng Lee, Andreas Klappenecker and
Energy Efficient protocol employs replicated data sinks to       Kyoungsook Lee, LAN Lin,”Energy Efficient Data
improve fault tolerance in the face of data sink failures. The   Management for Wireless Sensor Network with Data Sink
achievement of resiliency against sensor node and data sink      Failure” of IEEE, June 2005.
failures through a dynamic Re-assignment of addresses and        11 Li Qun Zhuang, Jing Bing Zhang, Dan Hong Zhang and
                                                                 Yi Zhi Zhao,” Data Management for Wireless Sensor
Networks: Research Issues and Challenges of IEEE June
2005.
12 Mudasser Iqbal, Hock Beng Lim, Wenqiang Wang,
Yuxia Yao “A Service-Oriented Model for Semantics-
based Data Management in Wireless Sensor Networks” of
IEEE Intelligent Systems center,Nanyang Technological
University,Singapore, Feb 2009.
13 Qian Wang, Kui Ren, and Cong Wang and Wenjing
Lou,” Efficient Fine-grained Data Access Control in
Wireless Sensor Networks”, of IEEE,PID:901523.pdf Feb
2009.
14 Qian Wang, Kui Ren ,Yanchao Zhang and Wenjing
Lou,” Dependable and Secure Sensor Data Storage with
Dynamic Integrity Assurance” of IEEE May 2009.
15 M.Handy,J.Blumenthal and D.Timmermann,”Energy-
Efficient Data Collection for Bluetooth-Based Sensor
Networks”EUROMICRO Symposium on Digital System
Design,pp.566-573,2004.

Weitere ähnliche Inhalte

Was ist angesagt?

CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networksijsrd.com
 
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...paperpublications3
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...ambitlick
 
Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNNetwork Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNIJTET Journal
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...IDES Editor
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networksambitlick
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network IJORCS
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...Alexander Decker
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksijwmn
 
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationPrototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationIDES Editor
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNMulti-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNijasuc
 

Was ist angesagt? (19)

CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networks
 
Self Healing
Self HealingSelf Healing
Self Healing
 
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 
Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNNetwork Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSN
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
 
10.1.1.118.4231
10.1.1.118.423110.1.1.118.4231
10.1.1.118.4231
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networks
 
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationPrototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNMulti-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
 

Andere mochten auch

11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols forAlexander Decker
 
11.comparative analysis of qo s aware routing protocols for
11.comparative analysis of qo s aware routing protocols for11.comparative analysis of qo s aware routing protocols for
11.comparative analysis of qo s aware routing protocols forAlexander Decker
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 

Andere mochten auch (7)

11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for
 
550 537-546
550 537-546550 537-546
550 537-546
 
11.comparative analysis of qo s aware routing protocols for
11.comparative analysis of qo s aware routing protocols for11.comparative analysis of qo s aware routing protocols for
11.comparative analysis of qo s aware routing protocols for
 
Sensor net
Sensor netSensor net
Sensor net
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 

Ähnlich wie Energy efficient protocol in wsn WITH ACO

A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...IDES Editor
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor networkJawhar Ali
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...IDES Editor
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksIDES Editor
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Amy Alexander
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 

Ähnlich wie Energy efficient protocol in wsn WITH ACO (20)

A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
Jt2416841691
Jt2416841691Jt2416841691
Jt2416841691
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
 
F0361026033
F0361026033F0361026033
F0361026033
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
G0933443
G0933443G0933443
G0933443
 
Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...
 
G017344246
G017344246G017344246
G017344246
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
358 365
358 365358 365
358 365
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 

Kürzlich hochgeladen

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Energy efficient protocol in wsn WITH ACO

  • 1. ENERGY EFFICIENT ROUTING PROTOCOL IN WSN *Neelam Chauhan * Pearmjeet Singh *M Tech (Final Year CSE) at BRCM, Behal, Bhiwani * M Tech (Microelectronics & VLSI Design) *er.neelam.choudhary@gmail.com Lecturer, ECE Department, Govt Polytechnic,Loharu, Bhiwani,Haryana, India *chauhan.paramjeet@gmail.com Abstract: In Nowadays the popularity of Wireless wireless channels to form intelligent distributed sensor Sensor Networks have increased tremendously, due to the system. vast potential of the sensor networks to connect the physical world with the virtual world. Since these devices A wireless sensor node has very limited energy supply that rely on battery power and may be placed in hostile is usually supplied with battery, and it is almost infeasible environments replacing them becomes a tedious task. Thus, for a sensor terminal to recharge or replace the battery improving the energy of these networks becomes power after deployment in distant or urgent issue hazardous important. environments. Therefore, in order to prolong the whole The paper provides an energy efficient protocol for sensor network lifetime, energy efficiency, especially power data management. The protocol employs replicated data saving on each sensor node, becomes an in WSN sinks to achieve (1) Resiliency to data sinks failure. 11 Background Knowledge (2) Efficiency in storing and retrieving sensor data. A simple address assignment scheme is introduced that 2.1 Energy Efficient Communication Protocol partitions the sensor field into cells, where each cell contains one data sink and all sensors that are closest to this An Energy Efficient Protocol for storing and retrieving data sink. It is shown that this scheme is scalable and sensor data. With some new features this protocol also resilient against data sink and sensor node failures. provides fault tolerance in the presence of data sink and Furthermore, the scheme has a reasonably low message sensor failures. As a result, this protocol can maximize the complexity and high energy efficiency. overall life of the sensor network. Now what is the role of sensor node in wireless sensor Keywords: WSN Routing ,WSN Protocol , De Bruijn network? Digraphs ,Energy Efficient Communication Protocol, Sensors are usually very simple units that are equipped FLOC. with a sensing functionality. One can expect that wireless sensors become smaller, cheaper, and more powerful. 1 Introduction Sensors can even carry out simple computations and communicate with each other. However, a wireless sensor As a revolution of information sensing and collecting, node has limited resources since it typically runs on battery wireless sensor network is an emerging distributed sensing power and usually has a very small memory space. Thus, technology that has a wide range of applications such as sensing devices must operate under severe resource remote environment monitoring, military sensing, and constraints and one of the foremost goals is to minimize the intelligence information gathering and so on.. energy consumption. Therefore, there is a need for an energy-efficient communication scheme to store and retrieve a vast amount of sensor data. But in many applications, the sensing devices are placed outdoors, resulting in a vulnerability to various noises and errors. . 2.2 Problem Definition 1) What kind of data storage and retrieval structure in a wireless sensor network is energy-efficient? 2) How can we make the wireless sensing system fault Figure.1: Framework of a Wireless Sensor Network tolerant, when sensor nodes and data sinks may fail? 3) How can we achieve scalability in wireless sensor data management so that the sensor system can be easily The wireless sensor networks are composed of a large expanded by deploying new sensors and even adding new number of inexpensive and small sensor nodes (called as data sink? collectors) as well as an information collection center (called as base station, sink), which are connected via
  • 2. As an effort to answer these questions, a protocol based on . . . ,sn}. The data sinks are sensor-oblivious, which means ideas inspired by de Bruijn digraphs and Voronoi diagrams. that a sensor can store and retrieve data to and from any De Bruijn Digraphs:-The basics of de Bruijn digraphs [2] data sink. It is assume that the t data sinks are reasonably let h and k is integer’s ≥ 2. The de Bruijn digraph B(h, k) regularly deployed over the sensor field. has vertex set V = {0, 1, . . . , h − 1}k, and there is an edge from vertex a = (a1, . . . , ak) to vertex b = (b1, . . . , bk) if The following assumptions about the cost for an interaction and only if ai = bi+1 for all i in the range 1 ≤ i ≤ k − 1.. between a data sink and a sensor. Thus every vertex has an out-degree of h, and the diameter The cost (energy consumption) of storing and retrieving of B (h, k) is equal to k. data is the same at every data sink. The cost of sending and receiving data to and from a data sink can be computed by the hop count in the routing path to the data sink times a fixed cost per hop. Each sensor tries to minimize the cost of storing and retrieving data by communicating with the nearest data sink, where the distance from a sensor to a data sink is measured in terms of hop counts. It follows that the sensor network is partitioned into cells such that the sensors in the same cell communicate with the same data sink. Figure 2 : Illustrate the digraph B (2, 2). The nodes on the border of two or more cells “border nodes”. It assumes that unique identifiers (ID) are given to data sinks. It also assumes that every sensor node has a Thus every vertex has an out-degree of h, and the diameter unique identifier, such as a MAC address . There is no of B (h, k) is equal to k. One possible routing scheme in a functional difference among data sinks, that is, they all act de Bruijn digraph works as follows. Suppose that the as final data storage and gateway to the outside networks. destination address is b = (b1. . . bk) and the source address Data can be sent to any of the data sinks as long as the data is a = (a1, . . . , aℓ, b1, . . . , bk−ℓ), where (b1, . . . , bk−ℓ) is sink is alive. the longest prefix of b at the tail of a. Then the routing can be done by left-shifting the source address ℓ times, inserting one digit of the destination address in each step, It also assume that the wireless sensor nodes as well as the starting from digit bk−ℓ+1. data sinks are stationary, i.e. not mobile. It also assume that the data sink servers know the total number n of sensor It is noted that it is not possible to use de Bruijn routing in a nodes, and that only a subset of the sensors are within one- sensor network, since the de Bruijn digraph cannot, in hop range from the data sinks (if all the sensors are within a general, be embedded into the available communication radio range from the data sinks, then there is no need for topology of the sensor network. However, we can retain routing). The wireless signal (message) that a sensor node much of the routing principle for the communication of sends is broadcast within the radio range, that is, every sensor nodes to data sinks. node within the radio range of a sensor node ith will hear It is well-known that de Bruijn networks can provide the messages broadcast by ith. Delivering a message efficient routing among large number of nodes. In this requires more processing power than receiving a message. routing scheme imitates certain aspects de Bruijn routing, Therefore, in the design of the energy efficient protocol, it but is simpler, more flexible, and dynamically tries to minimize the redundant delivery of messages reconfigurable. In this scheme, the address of a sensor node without compromising the fault-tolerance in data already indicates the length of the path to the closest data transmission. sink. 111 WSN Protocol 2.3 System Model and Assumption 3.1 The Protocol The communication architecture uses a hybrid model that In this section, the description of protocol for energy- effectively utilizes a variation of the peer-to-peer efficient, fault-tolerant data storage and retrieval, without communication paradigm among the sensors, and a relying on any geographic or physical location information variation of the client server paradigm between the sensors of the sensors as well as the servers. The new protocol uses and the data sinks. The wireless sensors act as clients in the the five types of messages: networked sensor system and the data sinks act as servers. 1) The initialization message (init) is used in the The data sinks process the return feedback control data to initialization step to assign hop-count based addresses. the sensor nodes. 2) The toSink message is used to send a message from a sensor node to the data sink to perform a data storage Let W (t, n) denote a wireless sensor network with t operation. replicated data sinks D = {d1. . . dt}, and n sensors S = {s1,
  • 3. 3) The fromSink message is used to broadcast a message from the data sink server to every sensor node. This message carries the ID of the sending data sink. This type of message is used when the server proactively retrieves data from the sensors or when it needs to broadcast control messages to the sensors. 4) The peer message is used to communicate among the peer sensors. 5) The node Fail message is used to inform nodes about a failed node. This type of message is used by successors of a failed node to negotiate new routing paths. Figure 1 : Sensor Network with three Data Sinks First, the description about how the initial setup is performed, where one or more de Bruijn-style addresses are Figure 1 shows a sensor network with three data sinks (that assigned to each sensor node. Then I illustrate how are depicted by black circles) and several sensor nodes (that message routing is performed. Finally, The explanation are depicted by white circles). If two nodes are within about how resilience against node failures is achieved radio-range of each other, then there is an edge between these nodes. 3.2 Initialization of WSN The data sink servers start the initialization step by a dynamic address assignment procedure. The t data sink servers have addresses 1. . . t. Suppose that the data sink server i has h sensors within its one-hop radio range. The data sink server i assigns the h sensor nodes the addresses (i, 0), (i, 1). . . (i, h − 1). When a sensor node s with h′ one- hop neighbors receives an address a = (a1, a2. . . aℓ) from an one-hop neighbor j, then it takes one of the following actions: If s does not have a valid address, then s takes a as its address. And it assigns each one-hop neighbor, except j, an address in the range of (a1, a2, . . . , aℓ, 0), . . . , (a1, a2, . . . , aℓ, h′ − 2). • If s already has a valid address of length ℓ, Figure 2 : Result after Address Assignment then it keeps a as an alias address. Notice that all aliases of a sensor node have the same length. Sensor network after address assignment. Some nodes have If s has a valid address of length ℓ′ > ℓ, then it deletes all its several address aliases that lead to different routes in to address aliases and keeps a as a new address. And it once Sink messages again assigns each one-hop neighbor, except j, an address in the range of (a1, a2. . . aℓ, 0), . . . , (a1, a2, . . . , aℓ, h′ −2). In this way, every sensor node that is reachable from a data sink will receive at least one address. The number of address aliases of a sensor node does not exceed the number of its one hop neighbors. A sensor node informs its one-hop neighbors about its address aliases. This simple address assignment scheme has some remarkable properties: If a sensor node has an address alias (a1, a2. . . aℓ), then there is a path of ℓ−1 hops to the data Sink a1, and there is no shorter path to a1. This assignment scheme realizes the Figure 3 : illustrates the subdivision into different cells. partitioning into cells. If a node has only address aliases that start with a1, then it is within the cell of a1. Induced partition of the network. All nodes that have an address alias beginning with the same digit belong to the The border nodes are characterized by the fact that they same cell. Border nodes belonging to two different cells are have address aliases that start with different digits. The shaded grey. main features of the address assignment. Each cell contains a data sink and all sensor nodes that are closer to this data sink than to any other in terms of hop- count. If a sensor node has the same distance from more than one data sink, then it belongs to the cell of each of those data sinks; such nodes are called border nodes.
  • 4. The nodes 120, 230, 310 are examples of such border Example 3: Suppose that node 130 wants to send a peer nodes. If a sensor node s has address (a1, a2, . . . , aℓ−1, message to node 210 in the sensor network given in Figure aℓ), then there exists a node p with address (a1, a2, . . . , 3.6(c). Then the message is routed through 130 → 13 → 1, aℓ−1).p a predecessor of s, and s a successor of p. The and then forwarded to data sink 2, and the final hops are 2 associates of s are all one-hop neighbors of s that are → 21 → 210. neither predecessor nor successors. A straightforward routing rule for peer messages could use 3.3 Routing a sequence of predecessors until the node with the longest common prefix of a and b is reached, from which b can be After the addresses have been assigned to the nodes, reached through successors. Our peer message routing rule routing is performed. The most common type of message is improves upon this rule by taking shortcuts whenever a to Sink message from a sensor node to a data sink, which Information about one-hop neighbors reveals such a is typically routed through predecessors. Occasionally, a possibility, as was shown in Example 1. Unlike to Sink data sink may send from Sink messages to the sensor routing, it should be noted that peer routing is not nodes, which are forwarded through successors. A peer necessarily optimal; this is the price one has to pay for the message is routed through any combination of very limited memory usage. In view of the fact that peer predecessors, associates, and successors. messages are rare and typically local, this does not appear to be a significant disadvantage. A to Sink message is routed by randomly selecting one predecessor; this is done by right-shifting one randomly The energy efficient protocol makes typically multiple selected address alias. Then the same process is repeated paths available while routing from sensor node to a data until the data sink is reached. For instance, one possible sink; unlike many other routing protocols for sensor path from the address (a1, . . . , aℓ) is through the networks, such as directed diffusion, ours will always predecessors (a1, . . . , aℓ−1), (a1, . . . , aℓ−2), . . . , (a1, a2) ensure that the selected route is optimal, so that load to the data sink a1. balancing does not come at the cost of energy efficient. A from Sink message is broadcast by sending the message from the data sink to its successors, and each sensor node receiving such a message forwards it to all its successors. IV Related Work and Comparison Suppose that a peer message is sent from a node with address a = (a1. . . aℓ) to a node with address b = (b1, . . . , bk). The node a or any node receiving the message forwards it to the one-hop neighbor that has an address The work is related to two intertwined themes in wireless alias with the longest common prefix with b; if several one- sensor networks: routing and data aggregation. Numerous hop neighbors qualify, then the one with the shortest architectures and protocols have been proposed to solve address alias is chosen. If a data sink 6= b1 receives such a both problems at the same time. message, then it will forward it to the data sink b1. Initial Flooding of Message:-An initial flooding of messages in the sensor field to establish the routing paths. The design of the protocol ensures that the routing of the to This step is somewhat similar to directed diffusion ,a Sink messages is optimal; in a typical sensor network mechanism that uses limited flooding of queries towards application the to Sink messages are by far the most events and sets up reverse gradients for the best path. One frequent ones, since they are used to communicate the fundamental difference is that directed diffusion is sensor data. designed for the single data sink scenario, whereas the energy efficient routing protocol can serve multiple data Example 1: Suppose that the node 131=310 in the sensor sinks. network given in Figure 3 wants to send a to Sink message GPSR: is an efficient routing scheme that relies on the to a data sink. If it chooses its alias 131, then the resulting localized nodes and restricts flooding to a geographical route will be 131 → 13 → 1. If it chooses its address alias region . One drawback of this approach, however, is its 310, then the resulting route will be 310 → 31 → 3. Peer assumption that the locations of the sensor nodes are messages can be used, for example, by a sensor to check known to all nodes in the network. Where new change in whether its sensor readings are reasonable. Although such the protocol such that knowledge of locations is not messages are rare or not used at all in typical sensor required. network applications, we remark that routing between any SHORT: is a self-healing, path- and energy-aware routing two nodes is possible. An example shows the above framework shows a good performance with the reduced routing rule. energy costs .In a path-aware scheme, shorter paths are found by connecting non-adjacent nodes on a path that are Example 2: Consider the sensor network given in Figure 3 within communication range of each other. In an energy- Suppose that node 110 wants to send peer message to node aware scheme, a routing path is switched when the energy 210. Since both neighbors of 110 have an empty common of the nodes on the path is running low. By letting the prefix with 210, the message is forwarded to 11, the shorter neighboring nodes of a route, together with the on-route address alias. Among the neighbors of 11, the node nodes, monitor the route, up-to-date information of local 200 have the longest common prefix with 210, so it is topology and link quality can be exploited. The work routed there, and node 200 routes the message to 210. resembles their approach regarding self-healing and energy-efficiency. In new case, the routing of messages to a
  • 5. data sink is optimal, and the advantage of shortcuts in peer the introduction of alternate paths with neighbor node message routing, though without introducing much (sensor node, data sink) according to the location also. overhead. The most common application in sensor networks is the FLOC: (Clustering service) called FLOC, which can delivery of sensor data. The protocol ensures that such achieve efficient and scalable control in large-scale ad hoc messages from the sensor nodes are always routed in an wireless sensor networks. To achieve high energy optimal way to the closest data sink using the least possible efficiency and resiliency, role-based hierarchical self- number of hops. organized networks are explored in Depending on their The overhead of keeping routing tables to accommodate the connectivity and sensing capability, sensor nodes are memory constraints of sensor nodes is totally avoided. A assigned the role of data collection and data dissemination. node simply needs to keep the address aliases of itself and Based on certain metrics, the network is partitioned into of its one-hop neighbors. Furthermore, this protocol does sensing zones, in which the sensor nodes collaborate to not require any location information. The reasonably low achieve a sensing objective. message complexity of our scheme can extend the battery In the energy efficient protocol, this approach relies only on life of each node, maximizing the overall life of the sensor local information. However, as a hierarchy-based network. architecture, this approach is vulnerable to failures, especially when particular roles are prone to become points of failure. The systematic rotation of roles among the nodes can resolve this problem. A periodically repeated role assignment scheme is proposed in for Bluetooth-based VI References sensor networks. ACQUIRE : is an active query forwarding mechanism in 1 Andrea Kulakov, Georgi Stojanov and Danco a sensor network. A query packet is forwarded through the Davcev,”Sound and video processing in wireless sensor network that follows a random or guided path. At each step, networks” Faculty of Electrical Engineering University a node, upon receiving a query, performs an update to “Sts Cyril and Methodius”,IEEE, April 2006. gather data from all of its neighbors within a look-ahead of 2 Anwitaman Datta, Sarunas Girdzijauskas, Karl Aberer,” d steps. As this query progresses through the network, it is On de Bruijn routing in distributed hash tables: There and gradually resolved into smaller components until it is back again,” IEEE, EPFL 2003. completely solved and is returned back to the querying 3 Brad Krap, H.T.Kung, “GPSR: Greedy Perimeter node. This approach works at its best for one-shot, non- Stateless Routing for Wireless Networks”, Proc, of the 6th aggregate, complex queries for replicated data. Annual Int.Conf.on Mobile Mobile Computing and TAG: is a high-level abstraction of a declarative interface Networking (MobiCom), pp.243-245, August 2000. for data collection and aggregation in wireless sensor 4 Chao Gui and Prasant Mohapatra, “A Self –Healing and networks of TinyOS motes .It realizes a distributed query Optimizing Routing Techniques for Ad-Hoc aggregation scheme that is sensitive to resource constraints Networks”Proc of the 4th ACM Int.Symp on Mobile Ad and can cope with lossy communication of wireless sensor Hoc Networking and Computing (MobiHoc), IEEE, networks. pp.279-290, June2003. 5 C.Intanagonwiwat, R.Govindan and D.Estrin “Directed So, finally it is noticed that a mobile agent based systems, Diffusion: A Scalable and Robust Communication where agents exchange data with nearby sensors or access Paradigm for Sensor Networks”, Proc. of the 6th Annual points that they encounter as they pass by. The advantage Int.Conf.on Mobile Computing and Networking of such an approach is that fewer infrastructures are (MobiCom), pp56-67, of IEEE, August2000. required and on the other methods there is no overhead 6 DaiZhi-feng, li-Yuan-Xiang, He-gnoliang, Jong Ya-la, caused by packet routing. When the density of mobile Shen Xian-Jun, “Uncertain Data Management for Wireless agents is sufficiently high, the system is more robust than a Sensor Network Using Rough Set Theory” of IEEE June fixed network. The primary drawback of such a system is 2006. that the latency is high, so it is not suitable for all 7 Danco Davcev, Andrea Kulakov, and Stojanco applications. Unexpected failures such as loss of mobile Gancev,”Experiments in Data Management for Wireless agents or limitations on mobility can compromise the fault- sensor Network” of IEEE, September 2008. tolerance of such a system. 8 F.L.Lewis “Wireless Sensor Network” Associated director for Research Head, Advance Controls, sensors & V Conclusion MEMS Group of Automation & Robotics Research Institution the University of Texas,http://arri.uta.edu/acs, During the conduct of study done as a part of paper, on Feb 2004. energy efficient communication protocol for data storage 9 Haiying Shen, Ting Li “Data Management of Wireless and retrieval in a wireless sensor network is vulnerable. Sensor Network” of IEEE, May 2009. 10 Hyunyonng Lee, Andreas Klappenecker and Energy Efficient protocol employs replicated data sinks to Kyoungsook Lee, LAN Lin,”Energy Efficient Data improve fault tolerance in the face of data sink failures. The Management for Wireless Sensor Network with Data Sink achievement of resiliency against sensor node and data sink Failure” of IEEE, June 2005. failures through a dynamic Re-assignment of addresses and 11 Li Qun Zhuang, Jing Bing Zhang, Dan Hong Zhang and Yi Zhi Zhao,” Data Management for Wireless Sensor
  • 6. Networks: Research Issues and Challenges of IEEE June 2005. 12 Mudasser Iqbal, Hock Beng Lim, Wenqiang Wang, Yuxia Yao “A Service-Oriented Model for Semantics- based Data Management in Wireless Sensor Networks” of IEEE Intelligent Systems center,Nanyang Technological University,Singapore, Feb 2009. 13 Qian Wang, Kui Ren, and Cong Wang and Wenjing Lou,” Efficient Fine-grained Data Access Control in Wireless Sensor Networks”, of IEEE,PID:901523.pdf Feb 2009. 14 Qian Wang, Kui Ren ,Yanchao Zhang and Wenjing Lou,” Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance” of IEEE May 2009. 15 M.Handy,J.Blumenthal and D.Timmermann,”Energy- Efficient Data Collection for Bluetooth-Based Sensor Networks”EUROMICRO Symposium on Digital System Design,pp.566-573,2004.