Prolonging Network Lifetime in Wireless Sensor Networks with Path-Constrained Mobile Sink
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 10
Abstract
Many studies in recent years have considered the use of mobile sinks (MS) for data gathering in wireless sensor networks (WSN), so as to reduce the need for data forwarding among the sensor nodes (SN) and thereby prolong the network lifetime. Moreover, in practice, often the MS tour length has to be kept below a threshold, usually due to timeliness constraints on the sensors data (delay-critical applications). This paper presents a modified clustering and data forwarding protocol combined with a MS solution for efficient data gathering in wireless sensor networks (WSNs) with delay constraints. The adopted cluster formation method is based in the 'residual energy' of the SNs and it is appropriately modified in order to fit properly to the requirement of length-constrained MS tour, which involves, among else, the need for inter-cluster communication and increased data forwarding. In addition, a suitable data gathering protocol is designed, based on an approximated TSP route that satisfies the given length constraint, whereas the proper application of reclustering phases guarantees the effective handling of the 'energy holes' caused around the CHs involved in the MS route. Extended simulation experiments show the stable and energy-efficient behavior of the proposed scheme (thus leading to increased network lifetime) as well as its higher performance in comparison to other competent approaches from the literature.
Authors and Affiliations
Basilis Mamalis
Method for Image Portion Retrieval and Display for Comparatively Large Scale of Imagery Data onto Relatively Small Size of Screen Which is Suitable to Block Coding of Image Data Compression
Method for image portion retrieval and display for the relatively large scale of imagery data onto comparatively small size of display is proposed. The method is suitable to the data compression methods based on block co...
Knowledge discovery from database using an integration of clustering and classification
Clustering and classification are two important techniques of data mining. Classification is a supervised learning problem of assigning an object to one of several pre-defined categories based upon the attributes of the...
Video Watermarking System for Copyright Protection based on Moving Parts and Silence Deletion
In recent years, video watermarking has emerged as a powerful technique for ensuring copyright protection. However, ensuring the lowest level of distortion, high transparency and transparency control, integrity of the wa...
Impact of Elliptical Holes Filled with Ethanol on Confinement Loss and Dispersion in Photonic Crystal Fibers
To get a confinement loss value, the weakest possible We have interest to optimize an optical fiber our structure has a cladding which is formed by holes in silica. The geometry of the holes is special because they have...
Improving Image Encryption Using 3D Cat Map and Turing Machine
Security of data is of prime importance. Security is a very complex and vast topic. One of the common ways to protect this digital data from unauthorized eavesdropping is encryption. This paper introduces an improved ima...