SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
DOI : 10.5121/ijcnc.2015.7108 113
DATA GATHERING IN WIRELESS SENSOR
NETWORKS USING INTERMEDIATE NODES
Ahmad Ali Alhasanat1
, Khitam M. Alatoun2
, Abdullah I. Alhasanat3
and Aws Al-
Qaisi4
1
College of Business Administration & Economics, Al-Hussein Bin Talal University,
Ma‟an, Jordan
2
College of Engineering, Al-Hussein Bin Talal University, Ma‟an, Jordan
3
College of Engineering, Al-Hussein Bin Talal University, Ma‟an, Jordan
4
Faculty of Engineering Technology, Al-Balqa‟ Applied University, Salt, Jordan
ABSTRACT
Energy consumption is an essential concern to Wireless Sensor Networks (WSNs).The major cause of the
energy consumption in WSNs is due to the data aggregation. A data aggregation is a process of collecting
data from sensor nodes and transmitting these data to the sink node or base station. An effective way to
perform such a task is accomplished by using clustering. In clustering, nodes are grouped into clusters
where a number of nodes, called cluster heads, are responsible for gathering data from other nodes,
aggregate them and transmit them to the Base Station (BS).
In this paper we produce a new algorithm which focused on reducing the transmission bath between sensor
nodes and cluster heads. A proper utilization and reserving of the available power resources is achieved
with this technique compared to the well-known LEACH_C algorithm.
KEYWORDS
WSN, BS, Clustering, Cluster head, Data aggregation.
1.INTRODUCTION
Wireless Sensor Networks (WSNs) are composed of large number of low power, small size and
low cost sensor nodes. A sensor node is an electronic device with the capability of detecting
physical conditions, computation and communication. Those sensor nodes can be scattered to
perform a variety of applications such as wildlife monitoring, habitat monitoring, fire
surveillance, etc. Figure 1 shows the basic structure of a WSN.
A general WSN is composed of sensor nodes, a base station (or sink), and the events being
monitored [17].
A sensor node typically consists of several parts including: a radio transceiver, a
sensing unit, a microcontroller and power source usually a buttery. The sensor nodes
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
114
might vary in cost from few to hundreds of dollars depending on the functionality of
each sensor node. The constraints of cost and size of the sensor nodes led to
constraints on its resources such as energy, communication and computation.
A sink node is a resourceful node having unrestricted communication and
computational capabilities in addition to energy source, it can be stationary or
dynamic and act as an interface between the sensor network and management center.
The event being monitored may by stationary or mobile, depending on the
application of WSN. Mounting sensor nodes on wild animals for behaviour
monitoring, where these animal move in an unexpected manner, is an example of
mobile sensor nodes applications. On the other hand, sensor nodes may be deployed
on stationary and known locations.
Figure (1) Basic structure of WSN
Each sensor node can communicate and exchange its data with other nodes and the base station.
In this context, sensor nodes can use variable or fixed power for data transmission; as the distance
between the source and destination nodes is increased, the required power is increased [17]. For
instance, with single-hop communication, the transmission power should be sufficient to deliver
data to the destination node. The direct communication method [18] is an example of dynamic
power transmission power. However, for a static transmission power scheme, multi-hop
communication is required to deliver data to distant nodes. The Minimum Transmission Energy
algorithm (MTE) uses such type of transmission power [19].
The limited energy resource, such as using non-rechargeable battery supplies to each sensor node,
is one of the most crucial challenges in WSNs. Many routing algorithms have been proposed for
WSNs. Most of the hierarchical routing algorithms proposed for WSNs concentrated mainly on
prolonging the lifetime of the network by reducing the energy consumption [16]. Recent research
proved that nodes clustering provided an effective approach for energy conservation in WSNs.
In WSNs, data are collected from the deployed sensor nodes and sent to the sink node and then to
the base station for analysis by the end user or application [1]. Sensor nodes suffer from limited-
power sources and hence it is inefficient to conveytheir data directly to the sink node [7]. Instead,
an appropriate data gathering algorithm is required to gather data from these nodes in an energy
efficient way while maximizing the network lifetime ; the ultimate goal of all sensor networks.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
115
In addition, data gathering would be more efficient with homogenous sensor networks. In this
case, data aggregation is accomplished by collecting and aggregating data from a set of sensor
nodes. The collected data is combined into a single data packet to be sent to the sink node.
Certainly, this leads to minimize the number of transmissions by eliminating data redundancy and
thus reduce the total power consumption in the network [3].
Clustering in WSNs is an important technique to reduce the energy consumption over these
networks and thus prolonging it is network lifetimes. Many energy efficient protocols based on
clustering and data aggregation have been studied [2][3].
In this paper, a new data gathering algorithm is proposed. The key idea behind this algorithm is to
recursively divide the sensor network into four partitions symmetrical about a centroid node.
Furthermore, a set of cluster heads in the middle of each partition are defined in order to
aggregate data from cluster members and transmit these data to cluster heads in the next
hierarchical level. This procedure continues until a prescribed number of sensor nodes in each
partition are reached. At the end of this procedure, a set of partitions of almost equal number of
nodes are produced.
The advantages of this algorithm are threefold. Firstly, equalizing the number of sensor nodes in
each partition would greatly help to distribute the load among sensor nodes and therefore leads to
proper utilization of the available power resources. Secondly, a set of cluster heads are assigned
to each partition in each level. These nodes are selected as intermediate nodes in the cluster. This
step is essential in order to prolong the network life time of cluster heads since these nodes
usually consume their power more quickly compared to other normal nodes.
Moreover cluster heads do not need to send their data for long distances, as proposed in LEACH
[4] where each cluster head transmitsits data directly to the base station. In contrast, inour
algorithm, cluster headsgather data from their cluster member nodes. Then,each cluster head
computes the average and transmit it to the next cluster head in the hierarchical structure.
The reminder of this paper is organized as follows. An introduction to some related works in the
literature is presented in Section 2. A proposed algorithm is presented in section 3. Result and
discussion is section 4. The summary is drawn in section 5.
2. RELATED WORKS
Numerous clustering-based data aggregation protocols have been proposed recently. In this
section we briefly discuss some of these algorithms. For example, in Low Energy Adaptive
Clustering Hierarchy (LEACH) [4] algorithm, the deployed nodes group themselves into clusters
for data aggregation.
In each cluster,a single node is elected to be a cluster head. Each cluster head aggregates data
from its cluster members and sendsthis data directly to the base station. The cluster head
eliminate redundant data and usesone of the aggregated functions to minimize the transmitted
data to the sink node. LEACH protocol consists of two phases: setup phase and steady state
phase. In the setup phase, the clusters are arranged and the cluster heads are elected. Each sensor
node compares a random number between 1 and 0 with a threshold , is given by
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
116
(1)
Where is the predetermine percent of cluster head in the network, is the current round.
If the node was not a cluster head in the previous rounds, and > , then the node becomes a
cluster head and broadcasts a message to all other nodes informing them that it is a cluster head,
all non-cluster head nodes received a broadcast messages and determine to which cluster heads
they belong based on the Received Signal Strength (RSS) of the received message.
In [8], the author proposed LEACH Centralized (LEACH-C). This protocol is identical to the
LEACH protocol but the Base Station (BS) organizes the clusters. In the setup phase, each sensor
node sends information about its location and its residential energy to the BS, where BS organizes
the clusters and defines cluster head. BS then sends a broadcast message with the IDentification
(ID) of cluster head for each sensor node.
Distance-based Clustering Routing Protocol in Wireless Sensor Networks algorithm [6] proposed
a different approach to picks cluster heads based on distance. In this algorithm, non-cluster head
nodesfined the cluster head which is closest to the center point between the node itself and the
sink node. Each round in this method is consists of two phases; the setup and steady phases. The
setup phase defines clusters and cluster heads as proposed in LEACH [4], and each node selects
its cluster according to the distance.
In the Power-Efficient Gathering in Sensor Information Systems algorithm (PEGASIS) [5], each
node sends data to its nearest neighbor and only a single node transmits the aggregated data to the
sink node. The chain of nodes is formed using a greedy algorithm that collects data in each round,
the chain leader aggregates data to transmit to the sink node.
Ying Liang and Hongwei Gao [11] proposed a clustering algorithm referred to as OCABTR. In
this algorithm, the authors suggested a strategy for forming clusters using a genetic algorithm,
and selecting the cluster-head. Each round in OCABTR is composed of setup phase, which
organizes adjacent nodes into clusters then elect the cluster heads, and steady-state phase when
each node sends its data to a cluster-head. The cluster-head aggregate the received data and
transmit them to the BS.
This technique expends intra-cluster communication cost for electing cluster heads but select
them based-on residual energy.
In addition, authors in [12] proposed an approach called unequal clustering size (UCS) where the
sensor network is organized into different size clusters. The cluster heads are determined a priori
and located around the BS.
The nodes around the cluster head form the cluster. The number of nodes in each cluster depends
on the number of node in the next cluster. This algorithm assumes that the BS is located in the
middle of the network.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
117
Another clustering algorithm, known as Energy-Aware Routing Protocol (EAP), was introduced
[13]. In this protocol a novel scheme for inter-cluster communication is proposed and used new
parameters for selecting cluster heads. Each node has a table of the remaining energy of all
neighboring nodes within its cluster area. This table helps each node to compute the average
remaining energy of its neighbors. Any node whose remaining energy is higher than the average
value will be assigned higher probability to become a cluster head.
In EAP, each round begins with constructing a routing tree of cluster heads followed by
transmitting data from nodes to cluster heads, where the data are aggregated and sent to the BS.
EAP uses a computation model to determine routing tree.
In [14], a clustering and leveling algorithm, called Energy Efficient Threshold Sensitive
Hierarchical Routing Algorithm for Cognitive Wireless Sensor Networks (ETSHRA), was
proposed. ETSHRA is composed of four phases. In the first phase, which is called leveling, nodes
are divided into logical levels based on the power level of the received signal from BS. After
leveling, clustering phase is initiated, first cluster heads are selected randomly, and then the nodes
start to belong to a cluster head based on the level which they locate.
Once the leveling and clustering phases are completed, a chain from cluster heads to BS is
established. At the last phase, the soft and hard thresholds are used to allow sensors to transmit
their data.
The authors in [15] developed a model to form clustering in sensor area. The clusters formulated
in this method are heterogeneous-sized clusters, where the largest clusters are those located
farther from the sink. A greedy algorithm was used to choose cluster heads. Firstly, the nodes
with the highest energy needed to reach the sink are marked, and then every node computes the
gain achieved by being a cluster head. Those with the highest gain are selected to act as cluster
heads.
3.THE PROPOSED ALGORITHM
In this work, we assume a homogenous WSN consists of N sensor nodes that are uniformly and
randomly distributed within an area of meter square. The sink node is locatedat
. The problem considered in this paper is to gather data generated from sensor nodes
every seconds. Cluster-heads are defined to receive data from all member nodes of their
clusters and transmit the aggregated data to the sink node directly or through other cluster heads.
The network is assumed to be homogenous in that sensor nodes are required to sense identical
type of information. The goal of this algorithm is to present a strategy fordefining intermediate
cluster heads to minimize the distance between the cluster heads and their member node, so that
the total energy consumed in the WSN is reduced.
Our algorithm is divided into two phases; setup phase and steady state phase. In the setup phase a
recursive algorithm is used to define clusters and cluster heads, which remain fixed over the
network lifetime. The setup phase is occurred once over the network lifetime, as a result ofthis
phase, the network is grouped into clusters,where each cluster defines its cluster heads. During
steady state phase, data transmission continues until the network lifetime is over.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
118
With this algorithm, the network is firstly partitioned into four areas of almost equal numbers of
nodes. Then, each area is furtherpartitioned into four sub regions. This recurs until the constraint
is matched, where is the number of nodes in the partition and is the maximum
number of nodes allowed in each partition. There is no optimal value of such number.
The objective of this algorithm is to select a cluster head that is close to all other nodes in the
cluster, which then minimize the transmission power needed to transmit data from a cluster
member to a cluster head. Therefore, the cluster heads are defined as the intermediate nodes in the
cluster. These nodes can be described as the nodes that have the median of the sum of the
pairwise Received Signal Strength (RSS) values with other nodes in the cluster. Hence, the
cluster head for cluster in the th level is computed as
where is the RSS value between node and , for and is the number of cluster‟s
members. For each cluster a number of cluster heads are assigned so that they can share the
function of gathering and sending cluster‟s data in a round robin fashion.
Figure 2 shows the hierarchical clustering scheme used with the proposed algorithm. The circle
represents a network partition.
Figure 3 shows the flow chart of the proposed algorithm through the setup phase. During the
steady state phase, each node maintains a table of cluster heads. In each round r the node select its
cluster head h from number of cluster heads as:
Figure (2) The hierarchical clustering scheme used with the proposed algorithm.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
119
Figure (3) The flow chart of the algorithm
The algorithm can be briefly described by the following steps:
Input (Network graph topology (G), Threshold number of nodes (Nth), Sink node (S))
Output (network cluster, cluster heads)
1. Compute number of nodes in graph (N).
2. If N is greater than Nth, then partition the graphs into four sub graphs from the centroid
node and return to step 1.
3. If N is less than Nth, then define the cluster heads. Each node in the area maintains a
tableof the cluster heads.
4.RESULTS AND DISCUSSION
The performance of the proposed algorithm is evaluated using 200 independent simulation runs
through Matlab. This algorithm is compared to the LEACH-C algorithm. The performance of
both algorithms was assessed in terms of total energy dissipation under different network
diameter, network lifetime of the network and number of dead nodes over the simulation time.
4.1 Simulation Scenario
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
120
For our experiments, 200 sensor nodes are uniformly and randomly distributed within an area of
200 x 200 meter square, the sink is fixed outside the network area at (210,100)m. Each sensor
node has 1 Joule initial energy, the size of data message (k) is set to 100 Kbits.
4.2 Radio Model
We assume simple radio model, where the energy dissipated to run the receiver‟s and
transmitter‟s circuitry is set to Eelec= 50nJ/bit, and the transmitter‟s amplifier Єamp=10
pJ/bit/m2.The cost to transmit a message depends on the distance between the transmitter and
receiver [9],both the free space (d2
power loss) and the multipath fading (d4
power loss) channel
models were used, depending on the distance between the transmitter and receiver [9], if the
distance is less than a threshold ( ), the free space (d2
) model is used; otherwise, the multipath
(d4
) model is used.
The distance threshold is set to 44 meters, which represents a typical communication range for
IEEE std. 802.15.4 (ZigBee) nodes at environments with moderate number of obstructions [10].
Thus, the transmission cost considered in this paper is given as
(4)
and the receiving cost is given as
(5)
With this algorithm there is no fixed number of clusters; it depends on the number of sensor
nodes in the area. In our experiments, we used a threshold value of 50 nodes. Therefore, the
number of clusters varies as a function of number of sensor nodes; at the end of the setup phase
each cluster will contain almost the same number of nodes around .
The percentage of cluster heads is set to 5% of the cluster size. In each communication round one
cluster head is selected through round robin basis in order to gather, and transmit the cluster data.
Our algorithm and LEACH_C use the same constants (Eelec, amp , and k) for calculating energy
costs, therefore our algorithm achieves its energy savings by minimizing d (the distance between
sensor nodes and cluster head nodes) and the number of transmissions and receives for each node
by reducing multi-hop communication.
4.3 Energy dissipation under different network diameters
It is important to examine the performance of our algorithm and LEACH-C algorithm for
different network sizes. Figure 4 shows the energy dissipated at the area of sensor fields is varied
from 100 to 550 meter square.
As notice from this figure that our algorithm consumed less energy than LEACH-C at different
network diameters. It is also shown that further improvement of consumed energy is achieved
with our algorithm as the diameter of the network increases. For a small network diameter both
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
121
algorithms exhibited an identical performance. In fact, when the network diameter is increased,
transmission path between sensor nodes and cluster heads is also increased and so higher
transmission power is needed. In addition, in the presence of large inter-sensor distances the
shadowing channel model described by equation (4) is used, which greatly affected the energy
dissipated of the network.
Despite this, dividing the network into smaller cluster sizes as in our algorithm and select the
intermediate nodes to play as cluster headsled tominimize the total amount of the dissipated
energy.
Figure (4) Total energy dissipation of LEACH-C and our algorithms at different network sizes.
4.4 Number of dead nodes
To evaluate the total number of dead nodes over the simulation time, we used a network with 200
nodes and saved the number of dead nodes at each rounds, as seen in Figure 5.
The results of the two algorithms showed that the death of the first set of nodes appeared around
2000 rounds. After that, the nodes for LEACH-C sharply die, in contrast to the proposed
algorithm which showed gradual death of sensor nodes.
This indicates that the dissipation energy in the proposed algorithm is distributed over a longer
time period in comparison to LEACH-C; allowing sensor nodes in this algorithm to live longer.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
122
Figure (5) Total number of dead nodes over the simulation time.
4.5 Network lifetime with different death node percentage
The network lifetime is described as the amount of time elapsed during which the network is
functioning properly. One important factor that affects the network from functioning well is a
number of dead nodes. Determining the number of dead nodes for which the network is
considered failed is not an easy task since it mostly depends on the network type, the applications
itself, and the protocol being used.
In our simulations, we evaluate the lifetime of the sensor network for several percentages of dead
nodes. Figure 6 shows the network lifetime until 10%, 20%, 30%, 40%, 50% and 60% of nodes
die. 200 nodes were randomly distributed in 200x200 meter square.
Figure (6) Network lifetime versus percentage of dead nodes
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
123
As can be shown from this figure, when the percentage of dead nodes increased, it allowed the
sensor nodesto live longer, and this is true for the two algorithms. More interestingly, the
proposed algorithm showed significant savings in the network lifetime, which outperformed the
LEACH-C over the entire range of the percentage dead nodes. This result emphasized the
benefits of using our algorithm for any percentage of dead nodes.
5.CONCLUSION
In this paper, we proposed a new energy efficient data aggregation protocol in wireless sensor
networks. The key idea behind this algorithm is to recursively divide the sensor network into four
partitions symmetrical about a centroid node. Furthermore, a set of cluster heads in the middle of
each partition are defined in order to aggregate data from cluster members and transmit these data
to cluster heads in the next hierarchical level. The new algorithm adopts the concept of
hierarchical clustering which prevents cluster heads from sending their data for long distances
and thus the energy consumption of the sensor nodes is significantly improved.
This algorithm focused on avoiding the overhead of dynamic clustering, reducing the
transmission path between sensor nodes and cluster head nodes, and minimizing the direct
communication between the sink node and cluster heads. Simulation results showed that the
proposed algorithm achieved better performance in comparison with the LEACH-C algorithm in
terms of energy consumption, network lifetime, and number of dead nodes.
As a future work, the intermediate nodes in each cluster can serve as cache points in WSN with
mobile elements, in an attempt to reduce the contact time of mobile sink, and then reduce the
latency of the network. Also, it would be useful if the residual energy is taken into account for
cluster heads selection in each transmission round.
ACKNOWLEDGMENTS
The authors would like to thank the anonymous reviewers of the paper.
REFERENCES
[1] Jasmine Norman, J. Paulraj Joseph and P. PrapoornaRoja, “A Faster Routing Scheme for Stationary
Wireless Sensor Networks - A Hybrid Approach”, International Journal of Ad Hoc, Sensor &
Ubiquitous Computing, Issn: 09762205, EIssn: 09761764 ,Volume: 1 ,Issue: 1 , pages: 1-10, 2010 .
[2] Ramesh Rajagopalan and Pramod K. Varshney; “Data aggregation techniques in sensor networks: A
survey”, Communications Surveys and Tutorials, IEEE Issn: 1553-877X , Volume:8 , Issue: 4 , pages:
48 – 63, 2006.
[3] KiranMaraiya, Kamal Kant and Nitin Gupta; “Wireless Sensor Network: A review on Data
Aggregation”, International Journal of Scientific & Research, Volume 2, Issue 2, 2011.
[4] Wendi RabinerHeinzelman et al. “Energy-Efficient Communication Protocol for Wireless Microsensor
Networks”, in Proceeding of the 33rd
Hawaii International Conference on System Sciences,January
2000, pages: 1-10.
[5] S. Lindsey, C. Raghavendra, and K.M. Sivalingam, “Data gathering algorithms in sensor networks
using energy metrics,” IEEE Trans. Parallel and Distributed Systems, Volume 13, no. 9, September
2002, pages: 924-935.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
124
[6] WANG Jun, Zhang, Junyuan and Zhengkun “A Distance-based Clustering Routing Protocol in
Wireless Sensor Networks”, Communication Technology (ICCT), 2010, 12th IEEE International
Conference, Nov. 2010.
[7] X. Lin and I. Stojmenovic. “Power-Aware Routing in Ad Hoc Wireless Networks”, In SITE,
University of Ottawa, TR-98- 11, Dec. 1998.
[8] Heinzelman W. B., Chandrakasan A. P., Balakrishnan H., ”An application specific protocol
architecture for wireless microsensor networks,” IEEE Trans on Wireless Communications, Volume
1, No. 4, 2002, pages: 660-670.
[9] T. Rappaport, Wireless Communications: Principles & Practice. Englewood Cliffs, NJ: Prentice-Hall,
1996.
[10] “PIC microcontroller with 2.4GHz IEEE 802.15.4 transceiver and ZigBee stack,” FlexiPanel Ltd,
2008.
[11] Ying Liang and Hongwei Gao, “An energy-efficient clustering algorithm for data gathering and
aggregation in sensor networks,” Industrial Electronics and Applications, 2009. ICIEA 2009. 4th
IEEE Conference on 25-27 May2009.
[12] Soro, Heinzelman, W.B., „„Prolonging the Lifetime of Wireless Sensor Networks via Unequal
Clustering‟‟, 19th IEEE International Parallel and Distributed Processing Symposium, 2005.
[13] Ming Liu, Jiannong Cao, Guihai Chen and Xiaomin Wang, “An Energy-Aware Routing Protocol in
Wireless Sensor Networks,” Sensors, ISSN 1424-8220, 2009.
[14] Shahansha Quadri and Garimella R. Murthy, “ETSHRA: Energy Efficient Threshold Sensitive
Hierarchical Routing Algorithm for Cognitive Wireless Sensor Networks”, International Journal of
Information and Electronics Engineering, Volume 2, No. 3, 2012.
[15] Ali Dabirmoghaddam, Majid Ghaderi and Carey Williamson,” Cluster-Based Correlated Data
Gathering in Wireless Sensor Networks,” Modeling, Analysis & Simulation of Computer and
Telecommunication Systems (MASCOTS), 2010 IEEE International Symposium on.
[16] Chaurasiya, S.K., Pal, T., Bit, S.D., “An Enhanced Energy-Efficient Protocol with Static Clustering for
WSN”. International Conference on Information Networking (ICOIN), 2011 Kuala Lumpur,
Malaysia, pages: 58 – 63
[17] Jamal N. Al-Karaki Ahmed E. Kamal,” Routing Techniques in Wireless Sensor Networks: ASurvey,
”Wireless Communications, IEEE Publication, Volume: 11,Issue: 6, pages: 6-28, 2004.
[18] X. Lin and I. Stojmenovic. “Power-Aware Routing in Ad Hoc Wireless Networks”, In SITE,
University of Ottawa, TR-98- 11, Dec. 1998.
[19] T. Meng and R. Volkan. “Distributed Network Protocols for Wireless Communication”, In Proc.
IEEEE ISCAS, May 1998.

Contenu connexe

Tendances

A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networkspraveen369
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Aayush Gupta
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing ProtocolSantosh Regmi
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOL
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOLENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOL
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOLijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)IJCNCJournal
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL9914814928
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on ClusteringEnergy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on ClusteringIJCNCJournal
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
 

Tendances (17)

Kianoosh&sajjad
Kianoosh&sajjadKianoosh&sajjad
Kianoosh&sajjad
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
B0330811
B0330811B0330811
B0330811
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOL
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOLENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOL
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOL
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on ClusteringEnergy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 

En vedette

A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for networkIJCNCJournal
 
Server congestion control
Server congestion controlServer congestion control
Server congestion controlIJCNCJournal
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of theIJCNCJournal
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcastIJCNCJournal
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination inIJCNCJournal
 
Performance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemPerformance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemIJCNCJournal
 
Radio propagation models in wireless
Radio propagation models in wirelessRadio propagation models in wireless
Radio propagation models in wirelessIJCNCJournal
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based onIJCNCJournal
 
Real time wireless health monitoring
Real time wireless health monitoringReal time wireless health monitoring
Real time wireless health monitoringIJCNCJournal
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...IJCNCJournal
 
Analyzing the performance of the dynamic
Analyzing the performance of the dynamicAnalyzing the performance of the dynamic
Analyzing the performance of the dynamicIJCNCJournal
 
A new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsA new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsIJCNCJournal
 
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGCONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGIJCNCJournal
 
The influence of information security on
The influence of information security onThe influence of information security on
The influence of information security onIJCNCJournal
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshIJCNCJournal
 
Attack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets withAttack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets withIJCNCJournal
 
Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)IJCNCJournal
 
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSPLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSIJCNCJournal
 
Video contents prior storing server for
Video contents prior storing server forVideo contents prior storing server for
Video contents prior storing server forIJCNCJournal
 

En vedette (19)

A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for network
 
Server congestion control
Server congestion controlServer congestion control
Server congestion control
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of the
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcast
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination in
 
Performance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemPerformance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor system
 
Radio propagation models in wireless
Radio propagation models in wirelessRadio propagation models in wireless
Radio propagation models in wireless
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based on
 
Real time wireless health monitoring
Real time wireless health monitoringReal time wireless health monitoring
Real time wireless health monitoring
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...
 
Analyzing the performance of the dynamic
Analyzing the performance of the dynamicAnalyzing the performance of the dynamic
Analyzing the performance of the dynamic
 
A new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsA new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumns
 
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGCONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
 
The influence of information security on
The influence of information security onThe influence of information security on
The influence of information security on
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d mesh
 
Attack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets withAttack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets with
 
Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)
 
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSPLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
 
Video contents prior storing server for
Video contents prior storing server forVideo contents prior storing server for
Video contents prior storing server for
 

Similaire à Data gathering in wireless sensor networks using intermediate nodes

INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ijwmn
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTCLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTijassn
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSijassn
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksijassn
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)IISRT
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...ijmnct
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...ijdpsjournal
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...ijdpsjournal
 
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...IOSR Journals
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ijasuc
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
 

Similaire à Data gathering in wireless sensor networks using intermediate nodes (20)

C018141418
C018141418C018141418
C018141418
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
B05630814
B05630814B05630814
B05630814
 
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTCLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...Performance evaluation of data filtering approach in wireless sensor networks...
Performance evaluation of data filtering approach in wireless sensor networks...
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
 
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 

Plus de IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

Plus de IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Dernier

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Data gathering in wireless sensor networks using intermediate nodes

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 DOI : 10.5121/ijcnc.2015.7108 113 DATA GATHERING IN WIRELESS SENSOR NETWORKS USING INTERMEDIATE NODES Ahmad Ali Alhasanat1 , Khitam M. Alatoun2 , Abdullah I. Alhasanat3 and Aws Al- Qaisi4 1 College of Business Administration & Economics, Al-Hussein Bin Talal University, Ma‟an, Jordan 2 College of Engineering, Al-Hussein Bin Talal University, Ma‟an, Jordan 3 College of Engineering, Al-Hussein Bin Talal University, Ma‟an, Jordan 4 Faculty of Engineering Technology, Al-Balqa‟ Applied University, Salt, Jordan ABSTRACT Energy consumption is an essential concern to Wireless Sensor Networks (WSNs).The major cause of the energy consumption in WSNs is due to the data aggregation. A data aggregation is a process of collecting data from sensor nodes and transmitting these data to the sink node or base station. An effective way to perform such a task is accomplished by using clustering. In clustering, nodes are grouped into clusters where a number of nodes, called cluster heads, are responsible for gathering data from other nodes, aggregate them and transmit them to the Base Station (BS). In this paper we produce a new algorithm which focused on reducing the transmission bath between sensor nodes and cluster heads. A proper utilization and reserving of the available power resources is achieved with this technique compared to the well-known LEACH_C algorithm. KEYWORDS WSN, BS, Clustering, Cluster head, Data aggregation. 1.INTRODUCTION Wireless Sensor Networks (WSNs) are composed of large number of low power, small size and low cost sensor nodes. A sensor node is an electronic device with the capability of detecting physical conditions, computation and communication. Those sensor nodes can be scattered to perform a variety of applications such as wildlife monitoring, habitat monitoring, fire surveillance, etc. Figure 1 shows the basic structure of a WSN. A general WSN is composed of sensor nodes, a base station (or sink), and the events being monitored [17]. A sensor node typically consists of several parts including: a radio transceiver, a sensing unit, a microcontroller and power source usually a buttery. The sensor nodes
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 114 might vary in cost from few to hundreds of dollars depending on the functionality of each sensor node. The constraints of cost and size of the sensor nodes led to constraints on its resources such as energy, communication and computation. A sink node is a resourceful node having unrestricted communication and computational capabilities in addition to energy source, it can be stationary or dynamic and act as an interface between the sensor network and management center. The event being monitored may by stationary or mobile, depending on the application of WSN. Mounting sensor nodes on wild animals for behaviour monitoring, where these animal move in an unexpected manner, is an example of mobile sensor nodes applications. On the other hand, sensor nodes may be deployed on stationary and known locations. Figure (1) Basic structure of WSN Each sensor node can communicate and exchange its data with other nodes and the base station. In this context, sensor nodes can use variable or fixed power for data transmission; as the distance between the source and destination nodes is increased, the required power is increased [17]. For instance, with single-hop communication, the transmission power should be sufficient to deliver data to the destination node. The direct communication method [18] is an example of dynamic power transmission power. However, for a static transmission power scheme, multi-hop communication is required to deliver data to distant nodes. The Minimum Transmission Energy algorithm (MTE) uses such type of transmission power [19]. The limited energy resource, such as using non-rechargeable battery supplies to each sensor node, is one of the most crucial challenges in WSNs. Many routing algorithms have been proposed for WSNs. Most of the hierarchical routing algorithms proposed for WSNs concentrated mainly on prolonging the lifetime of the network by reducing the energy consumption [16]. Recent research proved that nodes clustering provided an effective approach for energy conservation in WSNs. In WSNs, data are collected from the deployed sensor nodes and sent to the sink node and then to the base station for analysis by the end user or application [1]. Sensor nodes suffer from limited- power sources and hence it is inefficient to conveytheir data directly to the sink node [7]. Instead, an appropriate data gathering algorithm is required to gather data from these nodes in an energy efficient way while maximizing the network lifetime ; the ultimate goal of all sensor networks.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 115 In addition, data gathering would be more efficient with homogenous sensor networks. In this case, data aggregation is accomplished by collecting and aggregating data from a set of sensor nodes. The collected data is combined into a single data packet to be sent to the sink node. Certainly, this leads to minimize the number of transmissions by eliminating data redundancy and thus reduce the total power consumption in the network [3]. Clustering in WSNs is an important technique to reduce the energy consumption over these networks and thus prolonging it is network lifetimes. Many energy efficient protocols based on clustering and data aggregation have been studied [2][3]. In this paper, a new data gathering algorithm is proposed. The key idea behind this algorithm is to recursively divide the sensor network into four partitions symmetrical about a centroid node. Furthermore, a set of cluster heads in the middle of each partition are defined in order to aggregate data from cluster members and transmit these data to cluster heads in the next hierarchical level. This procedure continues until a prescribed number of sensor nodes in each partition are reached. At the end of this procedure, a set of partitions of almost equal number of nodes are produced. The advantages of this algorithm are threefold. Firstly, equalizing the number of sensor nodes in each partition would greatly help to distribute the load among sensor nodes and therefore leads to proper utilization of the available power resources. Secondly, a set of cluster heads are assigned to each partition in each level. These nodes are selected as intermediate nodes in the cluster. This step is essential in order to prolong the network life time of cluster heads since these nodes usually consume their power more quickly compared to other normal nodes. Moreover cluster heads do not need to send their data for long distances, as proposed in LEACH [4] where each cluster head transmitsits data directly to the base station. In contrast, inour algorithm, cluster headsgather data from their cluster member nodes. Then,each cluster head computes the average and transmit it to the next cluster head in the hierarchical structure. The reminder of this paper is organized as follows. An introduction to some related works in the literature is presented in Section 2. A proposed algorithm is presented in section 3. Result and discussion is section 4. The summary is drawn in section 5. 2. RELATED WORKS Numerous clustering-based data aggregation protocols have been proposed recently. In this section we briefly discuss some of these algorithms. For example, in Low Energy Adaptive Clustering Hierarchy (LEACH) [4] algorithm, the deployed nodes group themselves into clusters for data aggregation. In each cluster,a single node is elected to be a cluster head. Each cluster head aggregates data from its cluster members and sendsthis data directly to the base station. The cluster head eliminate redundant data and usesone of the aggregated functions to minimize the transmitted data to the sink node. LEACH protocol consists of two phases: setup phase and steady state phase. In the setup phase, the clusters are arranged and the cluster heads are elected. Each sensor node compares a random number between 1 and 0 with a threshold , is given by
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 116 (1) Where is the predetermine percent of cluster head in the network, is the current round. If the node was not a cluster head in the previous rounds, and > , then the node becomes a cluster head and broadcasts a message to all other nodes informing them that it is a cluster head, all non-cluster head nodes received a broadcast messages and determine to which cluster heads they belong based on the Received Signal Strength (RSS) of the received message. In [8], the author proposed LEACH Centralized (LEACH-C). This protocol is identical to the LEACH protocol but the Base Station (BS) organizes the clusters. In the setup phase, each sensor node sends information about its location and its residential energy to the BS, where BS organizes the clusters and defines cluster head. BS then sends a broadcast message with the IDentification (ID) of cluster head for each sensor node. Distance-based Clustering Routing Protocol in Wireless Sensor Networks algorithm [6] proposed a different approach to picks cluster heads based on distance. In this algorithm, non-cluster head nodesfined the cluster head which is closest to the center point between the node itself and the sink node. Each round in this method is consists of two phases; the setup and steady phases. The setup phase defines clusters and cluster heads as proposed in LEACH [4], and each node selects its cluster according to the distance. In the Power-Efficient Gathering in Sensor Information Systems algorithm (PEGASIS) [5], each node sends data to its nearest neighbor and only a single node transmits the aggregated data to the sink node. The chain of nodes is formed using a greedy algorithm that collects data in each round, the chain leader aggregates data to transmit to the sink node. Ying Liang and Hongwei Gao [11] proposed a clustering algorithm referred to as OCABTR. In this algorithm, the authors suggested a strategy for forming clusters using a genetic algorithm, and selecting the cluster-head. Each round in OCABTR is composed of setup phase, which organizes adjacent nodes into clusters then elect the cluster heads, and steady-state phase when each node sends its data to a cluster-head. The cluster-head aggregate the received data and transmit them to the BS. This technique expends intra-cluster communication cost for electing cluster heads but select them based-on residual energy. In addition, authors in [12] proposed an approach called unequal clustering size (UCS) where the sensor network is organized into different size clusters. The cluster heads are determined a priori and located around the BS. The nodes around the cluster head form the cluster. The number of nodes in each cluster depends on the number of node in the next cluster. This algorithm assumes that the BS is located in the middle of the network.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 117 Another clustering algorithm, known as Energy-Aware Routing Protocol (EAP), was introduced [13]. In this protocol a novel scheme for inter-cluster communication is proposed and used new parameters for selecting cluster heads. Each node has a table of the remaining energy of all neighboring nodes within its cluster area. This table helps each node to compute the average remaining energy of its neighbors. Any node whose remaining energy is higher than the average value will be assigned higher probability to become a cluster head. In EAP, each round begins with constructing a routing tree of cluster heads followed by transmitting data from nodes to cluster heads, where the data are aggregated and sent to the BS. EAP uses a computation model to determine routing tree. In [14], a clustering and leveling algorithm, called Energy Efficient Threshold Sensitive Hierarchical Routing Algorithm for Cognitive Wireless Sensor Networks (ETSHRA), was proposed. ETSHRA is composed of four phases. In the first phase, which is called leveling, nodes are divided into logical levels based on the power level of the received signal from BS. After leveling, clustering phase is initiated, first cluster heads are selected randomly, and then the nodes start to belong to a cluster head based on the level which they locate. Once the leveling and clustering phases are completed, a chain from cluster heads to BS is established. At the last phase, the soft and hard thresholds are used to allow sensors to transmit their data. The authors in [15] developed a model to form clustering in sensor area. The clusters formulated in this method are heterogeneous-sized clusters, where the largest clusters are those located farther from the sink. A greedy algorithm was used to choose cluster heads. Firstly, the nodes with the highest energy needed to reach the sink are marked, and then every node computes the gain achieved by being a cluster head. Those with the highest gain are selected to act as cluster heads. 3.THE PROPOSED ALGORITHM In this work, we assume a homogenous WSN consists of N sensor nodes that are uniformly and randomly distributed within an area of meter square. The sink node is locatedat . The problem considered in this paper is to gather data generated from sensor nodes every seconds. Cluster-heads are defined to receive data from all member nodes of their clusters and transmit the aggregated data to the sink node directly or through other cluster heads. The network is assumed to be homogenous in that sensor nodes are required to sense identical type of information. The goal of this algorithm is to present a strategy fordefining intermediate cluster heads to minimize the distance between the cluster heads and their member node, so that the total energy consumed in the WSN is reduced. Our algorithm is divided into two phases; setup phase and steady state phase. In the setup phase a recursive algorithm is used to define clusters and cluster heads, which remain fixed over the network lifetime. The setup phase is occurred once over the network lifetime, as a result ofthis phase, the network is grouped into clusters,where each cluster defines its cluster heads. During steady state phase, data transmission continues until the network lifetime is over.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 118 With this algorithm, the network is firstly partitioned into four areas of almost equal numbers of nodes. Then, each area is furtherpartitioned into four sub regions. This recurs until the constraint is matched, where is the number of nodes in the partition and is the maximum number of nodes allowed in each partition. There is no optimal value of such number. The objective of this algorithm is to select a cluster head that is close to all other nodes in the cluster, which then minimize the transmission power needed to transmit data from a cluster member to a cluster head. Therefore, the cluster heads are defined as the intermediate nodes in the cluster. These nodes can be described as the nodes that have the median of the sum of the pairwise Received Signal Strength (RSS) values with other nodes in the cluster. Hence, the cluster head for cluster in the th level is computed as where is the RSS value between node and , for and is the number of cluster‟s members. For each cluster a number of cluster heads are assigned so that they can share the function of gathering and sending cluster‟s data in a round robin fashion. Figure 2 shows the hierarchical clustering scheme used with the proposed algorithm. The circle represents a network partition. Figure 3 shows the flow chart of the proposed algorithm through the setup phase. During the steady state phase, each node maintains a table of cluster heads. In each round r the node select its cluster head h from number of cluster heads as: Figure (2) The hierarchical clustering scheme used with the proposed algorithm.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 119 Figure (3) The flow chart of the algorithm The algorithm can be briefly described by the following steps: Input (Network graph topology (G), Threshold number of nodes (Nth), Sink node (S)) Output (network cluster, cluster heads) 1. Compute number of nodes in graph (N). 2. If N is greater than Nth, then partition the graphs into four sub graphs from the centroid node and return to step 1. 3. If N is less than Nth, then define the cluster heads. Each node in the area maintains a tableof the cluster heads. 4.RESULTS AND DISCUSSION The performance of the proposed algorithm is evaluated using 200 independent simulation runs through Matlab. This algorithm is compared to the LEACH-C algorithm. The performance of both algorithms was assessed in terms of total energy dissipation under different network diameter, network lifetime of the network and number of dead nodes over the simulation time. 4.1 Simulation Scenario
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 120 For our experiments, 200 sensor nodes are uniformly and randomly distributed within an area of 200 x 200 meter square, the sink is fixed outside the network area at (210,100)m. Each sensor node has 1 Joule initial energy, the size of data message (k) is set to 100 Kbits. 4.2 Radio Model We assume simple radio model, where the energy dissipated to run the receiver‟s and transmitter‟s circuitry is set to Eelec= 50nJ/bit, and the transmitter‟s amplifier Єamp=10 pJ/bit/m2.The cost to transmit a message depends on the distance between the transmitter and receiver [9],both the free space (d2 power loss) and the multipath fading (d4 power loss) channel models were used, depending on the distance between the transmitter and receiver [9], if the distance is less than a threshold ( ), the free space (d2 ) model is used; otherwise, the multipath (d4 ) model is used. The distance threshold is set to 44 meters, which represents a typical communication range for IEEE std. 802.15.4 (ZigBee) nodes at environments with moderate number of obstructions [10]. Thus, the transmission cost considered in this paper is given as (4) and the receiving cost is given as (5) With this algorithm there is no fixed number of clusters; it depends on the number of sensor nodes in the area. In our experiments, we used a threshold value of 50 nodes. Therefore, the number of clusters varies as a function of number of sensor nodes; at the end of the setup phase each cluster will contain almost the same number of nodes around . The percentage of cluster heads is set to 5% of the cluster size. In each communication round one cluster head is selected through round robin basis in order to gather, and transmit the cluster data. Our algorithm and LEACH_C use the same constants (Eelec, amp , and k) for calculating energy costs, therefore our algorithm achieves its energy savings by minimizing d (the distance between sensor nodes and cluster head nodes) and the number of transmissions and receives for each node by reducing multi-hop communication. 4.3 Energy dissipation under different network diameters It is important to examine the performance of our algorithm and LEACH-C algorithm for different network sizes. Figure 4 shows the energy dissipated at the area of sensor fields is varied from 100 to 550 meter square. As notice from this figure that our algorithm consumed less energy than LEACH-C at different network diameters. It is also shown that further improvement of consumed energy is achieved with our algorithm as the diameter of the network increases. For a small network diameter both
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 121 algorithms exhibited an identical performance. In fact, when the network diameter is increased, transmission path between sensor nodes and cluster heads is also increased and so higher transmission power is needed. In addition, in the presence of large inter-sensor distances the shadowing channel model described by equation (4) is used, which greatly affected the energy dissipated of the network. Despite this, dividing the network into smaller cluster sizes as in our algorithm and select the intermediate nodes to play as cluster headsled tominimize the total amount of the dissipated energy. Figure (4) Total energy dissipation of LEACH-C and our algorithms at different network sizes. 4.4 Number of dead nodes To evaluate the total number of dead nodes over the simulation time, we used a network with 200 nodes and saved the number of dead nodes at each rounds, as seen in Figure 5. The results of the two algorithms showed that the death of the first set of nodes appeared around 2000 rounds. After that, the nodes for LEACH-C sharply die, in contrast to the proposed algorithm which showed gradual death of sensor nodes. This indicates that the dissipation energy in the proposed algorithm is distributed over a longer time period in comparison to LEACH-C; allowing sensor nodes in this algorithm to live longer.
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 122 Figure (5) Total number of dead nodes over the simulation time. 4.5 Network lifetime with different death node percentage The network lifetime is described as the amount of time elapsed during which the network is functioning properly. One important factor that affects the network from functioning well is a number of dead nodes. Determining the number of dead nodes for which the network is considered failed is not an easy task since it mostly depends on the network type, the applications itself, and the protocol being used. In our simulations, we evaluate the lifetime of the sensor network for several percentages of dead nodes. Figure 6 shows the network lifetime until 10%, 20%, 30%, 40%, 50% and 60% of nodes die. 200 nodes were randomly distributed in 200x200 meter square. Figure (6) Network lifetime versus percentage of dead nodes
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 123 As can be shown from this figure, when the percentage of dead nodes increased, it allowed the sensor nodesto live longer, and this is true for the two algorithms. More interestingly, the proposed algorithm showed significant savings in the network lifetime, which outperformed the LEACH-C over the entire range of the percentage dead nodes. This result emphasized the benefits of using our algorithm for any percentage of dead nodes. 5.CONCLUSION In this paper, we proposed a new energy efficient data aggregation protocol in wireless sensor networks. The key idea behind this algorithm is to recursively divide the sensor network into four partitions symmetrical about a centroid node. Furthermore, a set of cluster heads in the middle of each partition are defined in order to aggregate data from cluster members and transmit these data to cluster heads in the next hierarchical level. The new algorithm adopts the concept of hierarchical clustering which prevents cluster heads from sending their data for long distances and thus the energy consumption of the sensor nodes is significantly improved. This algorithm focused on avoiding the overhead of dynamic clustering, reducing the transmission path between sensor nodes and cluster head nodes, and minimizing the direct communication between the sink node and cluster heads. Simulation results showed that the proposed algorithm achieved better performance in comparison with the LEACH-C algorithm in terms of energy consumption, network lifetime, and number of dead nodes. As a future work, the intermediate nodes in each cluster can serve as cache points in WSN with mobile elements, in an attempt to reduce the contact time of mobile sink, and then reduce the latency of the network. Also, it would be useful if the residual energy is taken into account for cluster heads selection in each transmission round. ACKNOWLEDGMENTS The authors would like to thank the anonymous reviewers of the paper. REFERENCES [1] Jasmine Norman, J. Paulraj Joseph and P. PrapoornaRoja, “A Faster Routing Scheme for Stationary Wireless Sensor Networks - A Hybrid Approach”, International Journal of Ad Hoc, Sensor & Ubiquitous Computing, Issn: 09762205, EIssn: 09761764 ,Volume: 1 ,Issue: 1 , pages: 1-10, 2010 . [2] Ramesh Rajagopalan and Pramod K. Varshney; “Data aggregation techniques in sensor networks: A survey”, Communications Surveys and Tutorials, IEEE Issn: 1553-877X , Volume:8 , Issue: 4 , pages: 48 – 63, 2006. [3] KiranMaraiya, Kamal Kant and Nitin Gupta; “Wireless Sensor Network: A review on Data Aggregation”, International Journal of Scientific & Research, Volume 2, Issue 2, 2011. [4] Wendi RabinerHeinzelman et al. “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, in Proceeding of the 33rd Hawaii International Conference on System Sciences,January 2000, pages: 1-10. [5] S. Lindsey, C. Raghavendra, and K.M. Sivalingam, “Data gathering algorithms in sensor networks using energy metrics,” IEEE Trans. Parallel and Distributed Systems, Volume 13, no. 9, September 2002, pages: 924-935.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 124 [6] WANG Jun, Zhang, Junyuan and Zhengkun “A Distance-based Clustering Routing Protocol in Wireless Sensor Networks”, Communication Technology (ICCT), 2010, 12th IEEE International Conference, Nov. 2010. [7] X. Lin and I. Stojmenovic. “Power-Aware Routing in Ad Hoc Wireless Networks”, In SITE, University of Ottawa, TR-98- 11, Dec. 1998. [8] Heinzelman W. B., Chandrakasan A. P., Balakrishnan H., ”An application specific protocol architecture for wireless microsensor networks,” IEEE Trans on Wireless Communications, Volume 1, No. 4, 2002, pages: 660-670. [9] T. Rappaport, Wireless Communications: Principles & Practice. Englewood Cliffs, NJ: Prentice-Hall, 1996. [10] “PIC microcontroller with 2.4GHz IEEE 802.15.4 transceiver and ZigBee stack,” FlexiPanel Ltd, 2008. [11] Ying Liang and Hongwei Gao, “An energy-efficient clustering algorithm for data gathering and aggregation in sensor networks,” Industrial Electronics and Applications, 2009. ICIEA 2009. 4th IEEE Conference on 25-27 May2009. [12] Soro, Heinzelman, W.B., „„Prolonging the Lifetime of Wireless Sensor Networks via Unequal Clustering‟‟, 19th IEEE International Parallel and Distributed Processing Symposium, 2005. [13] Ming Liu, Jiannong Cao, Guihai Chen and Xiaomin Wang, “An Energy-Aware Routing Protocol in Wireless Sensor Networks,” Sensors, ISSN 1424-8220, 2009. [14] Shahansha Quadri and Garimella R. Murthy, “ETSHRA: Energy Efficient Threshold Sensitive Hierarchical Routing Algorithm for Cognitive Wireless Sensor Networks”, International Journal of Information and Electronics Engineering, Volume 2, No. 3, 2012. [15] Ali Dabirmoghaddam, Majid Ghaderi and Carey Williamson,” Cluster-Based Correlated Data Gathering in Wireless Sensor Networks,” Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2010 IEEE International Symposium on. [16] Chaurasiya, S.K., Pal, T., Bit, S.D., “An Enhanced Energy-Efficient Protocol with Static Clustering for WSN”. International Conference on Information Networking (ICOIN), 2011 Kuala Lumpur, Malaysia, pages: 58 – 63 [17] Jamal N. Al-Karaki Ahmed E. Kamal,” Routing Techniques in Wireless Sensor Networks: ASurvey, ”Wireless Communications, IEEE Publication, Volume: 11,Issue: 6, pages: 6-28, 2004. [18] X. Lin and I. Stojmenovic. “Power-Aware Routing in Ad Hoc Wireless Networks”, In SITE, University of Ottawa, TR-98- 11, Dec. 1998. [19] T. Meng and R. Volkan. “Distributed Network Protocols for Wireless Communication”, In Proc. IEEEE ISCAS, May 1998.