Implementation of Tree Based Itinerary Design (TBID) Algorithm Over Wireless Sensor networks by Using Mobile Agent
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 9, Issue 4
Abstract
In many sensor network applications viz., environmental monitoring, spatial exploration and battlefield surveillance, sensed data is aggregated and transmitted to the sinks for analysis. Thus, in- network data aggregation [2] becomes an important technique in wireless sensor networks and has been well studied in recent years. In general, any sensory network suffers with two problems i.e., i) the time latencies of the existing scheduling algorithms are still high, and ii) the other one is that all the existing algorithms are centralized,which are inherently inefficient. Hence, in this paper, we present a distributed scheduling algorithm generating collision-free schedules with latency bound, based on TBID, which employs multiple Mobile Agents (MAs) for completing the aggregation task on WSNs. The algorithm not only determines the proper number of MAs for minimizing the total aggregation cost but also constructs low-cost itineraries for each of them. In this paper, we adopt TBID that improves upon NOID by following a more direct approach to the problem of determining low-cost MA itineraries. Specifically, based on an accurate formula for the total energy expended during MA migration, we follow a greedy- like approach for distributing SNs in multiple MA itineraries,and algorithm determines a spanning forest of trees in the network, calculates efficient tree traversal orders (itineraries), and eventually, assigns these itineraries to individual MAs.)
Authors and Affiliations
Ganapathi R
Cryptanalysis and Improvement of Kang et al. Certificateless Aggregate Signature Scheme
The most important contribution of modern cryptography is the invention of digital signatures. To deal with specific application scenarios, digital signature schemes have been evolved with different variants. One of such...
An Indepth Understanding of eGovernance initiatives: eAuctionA Case Study Approach
Performance Analysis of Different Clustering Algorithm
Abstract: Clustering is the process of grouping objects into clusters such that the objects from the sameclusters are similar and objects from different clusters are dissimilar. The relationship is often expressed...
Efficient Network Design Parameters for Packet Switching Using Poisson distribution Methode
Abstract: Wireless sensor network is a group of sensor nodes with inadequate processor and partial memory unit embedded with other equipment for communication through the networking banding system. Sensor networks is one...
Solution against BGP vulnerabilities
Abstract: The Border Gateway Protocol (BGP) is the only inter-domain routing protocol.Routing informationamong Autonomous Systems (AS) is exchanged using BGP. BGP protocol does not provide any securitymechanism, so it is...