scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Performance Evaluation of Wireless Sensor Networks for Different Radio Models Considering Mobile Event

TL;DR: The simulation results show that the shadowing phenomena, by destroying the regularity of the network, reduce the mean distance among nodes and at the same time increase the interference level and the latency of packet transmission.
Abstract: In this paper, we consider the behavior of a wireless sensor network for TwoRayGround and Shadowing radio models for the case of mobile event. By means of simulations, we analyse the performance of AODV protocol. In the previous work, we considered that the event node is stationary in the observation field. In this work, we want to investigate how the sensor network performs in the case when the event node moves. The simulation results show that the shadowing phenomena, by destroying the regularity of the network, reduce the mean distance among nodes and at the same time increase the interference level and the latency of packet transmission. We found that for mobile event, the Goodput and routing efficiency of TwoRayGround is better than Shadowing, but the Depletion of Shadowing is better than TwoRayGround.

Summary (1 min read)

1. Introduction

  • In recent years, technological advances have lead to the emergence of distributed Wireless Sensor Networks (WSNs) which are capable of observing the physical world, processing the data, making decisions based on the observations and performing appropriate actions.
  • Also, the goodput for the mobile event node case does not change too much compared with the stationary event case using AODV and Shadowing model, but the goodput is not good when the number of nodes is increased.
  • When source node wants 1By using the theorem in [8], the authors can say that a simple 2 regular network is almost surely strongly 2 connected.
  • Source node broadcasts Route Request (RREQ) packet to its neighbors.

2.3. Propagation Radio Model

  • In order to simulate the detection of a natural event, the authors used the libraries from Naval Research Laboratory (NRL) [10].
  • The transmission range of Shadowing model is random.
  • The energy model concerns the dynamics of energy consumption of the sensor.
  • It is intuitive that in a more realistic scenario, where many phenomena trigger many events, the traffic load can be higher, and then the interference will worsen the performance with respect to that the authors study here.
  • Where Nr(τ) is the number of received packet at the sink, and the Ns(τ) is the number of packets sent by sensor nodes which detected the phenomenon.

5 Simulation Results

  • For AODV routing protocol, the sample averages of Eqs. (5), (6) and (8) are computed over 20 simulation runs, and they are plotted in Fig. 6 ∼ Fig. 11, with respect to the particular radio model used.
  • At a particular value of Tr (∼ 1pps), the Goodput arise abruptly, because the network has reached the maximum capacity.
  • Intuitively one can say that in the case of Shadowing the on-demand routing protocols are affected by the presence of shadowing-induced unidirectional links.the authors.
  • On the other hand, exploiting such links is possible but the performance gains are quite low.
  • Thus, given a fixed detection interval, Nr can be much lower than its value in the case of ideal radio model, i.e. the Two-Rays-Ground model, where the discovered paths do not change over time6.

6. Conclusions

  • The authors presented the implementation of a simulation system for WSNs using ns-2.
  • The authors used AODV protocol and carried out the simulations for mobile event considering two cases: TwoRayGround and Shadowing.
  • When the number of nodes increases the RE of TwoRayGround is better than Shadowing.
  • The authors also would like to carry out simulations for sensor and actor networks.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

Performance Evaluation of Wireless Sensor Networks for Different Radio
Models Considering Mobile Event
Tao Yang, Makoto Ikeda, Leonard Barolli , Arjan Durresi ††, Fatos Xhafa †‡
Graduate School of Engineering
Fukuoka Institute of Technology (FIT)
3-30-1 Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan
E-mail: {bd07003, bd07001}@bene.fit.ac.jp
Department of Information and Communication Engineering
Fukuoka Institute of Technology (FIT)
3-30-1 Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan
E-mail: barolli@fit.ac.jp
††Department of Computer and Information Science
Indiana University Purdue University at Indianapolis (IUPUI)
723 W. Michigan Street SL 280 Indianapolis, IN 46202, USA
E-mail: durresi@cs.iupui.edu
†‡Department of Languages and Informatics Systems
Technical University of Catalonia
C/Jordi Girona 1-3, 08034 Barcelona, Spain
E-mail: fatos@lsi.upc.edu
Abstract
In this paper, we consider the behavior of a wireless sen-
sor network for TwoRayGround and Shadowing radio mod-
els for the case of mobile event. By means of simulations,
we analyse the performance of AODV protocol. In the pre-
vious work, we considered that the event node is stationary
in the observation eld. In this work, we want to inves-
tigate how the sensor network performs in the case when
the event node moves. The simulation results show that the
shadowing phenomena, by destroying the regularity of the
network, reduce the mean distance among nodes and at the
same time increase the interference level and the latency of
packet transmission. We found that for mobile event, the
Goodput and routing efficiency of TwoRayGround is better
than Shadowing, but the Depletion of Shadowing is better
than TwoRayGround.
1. Introduction
In recent years, technological advances have lead to
the emergence of distributed Wireless Sensor Networks
(WSNs) which are capable of observing the physical world,
processing the data, making decisions based on the ob-
servations and performing appropriate actions. These net-
works can be an integral part of systems such as battle-field
surveillance and microclimate control in buildings, nuclear,
biological and chemical attack detection, home automation
and environmental monitoring [1, 2].
Wireless sensor network simulation is an important part
of the current research. A large number of algorithms were
first implemented and evaluated using several network sim-
ulators like ns-2. Most MANET routing protocols have
been developed and tested in that fashion, and only later
they evolved towards real world implementations.
Recently, there are many research works for sensor net-
works [3, 4]. In our previous work [5], we implemented
a simulation system for sensor networks consider different
2010 International Conference on Complex, Intelligent and Software Intensive Systems
978-0-7695-3967-6/10 $26.00 © 2010 IEEE
DOI 10.1109/CISIS.2010.91
180

protocols ( e.g: AODV, DSR, DSDV, OLSR. ) and different
propagation radio models. In [6], we analysised the perfor-
mance of the WSNs considering different topologies with
the irregular radio model. Also, we analysised the perfor-
mance of our proposed simulation systems. But, we con-
sidered that the event node is stationary in the observation
field. However, in many applications the event node may
move. For example, in an ecology environment the animals
may move randomly. Another example is when an event
happens in a robot or in a car.
In this work, we want to investigate how the sensor net-
work performs in the case when the event moves and use
also Shadowing propagation model. We carry out simula-
tions for lattice topology, TwoRayGround and Shadowing
radio model considering Ad-hoc On-demand Distance Vec-
tor (AODV) protocol.We compare the simulation results for
the mobile event using different propagation radio model.
The simulation results have shown that the goodput for the
case of mobile event node is better than the stationary event
node using AODV protocol and TwoRayGround model.
Also, the goodput for the mobile event node case does not
change too much compared with the stationary event case
using AODV and Shadowing model, but the goodput is not
good when the number of nodes is increased.
The paper is organized as follows. In Sections 2, we ex-
plain the proposed network simulation model, simulation
topology, routing protocols and radio models. In Secton 3,
we introduce the event detection and transport. In Section
4, we introduce the goodput, Routing Efficiency (RE) and
energy depletion concepts. In Section 5 we present simula-
tion results. Finally, conclusions of the paper are given in
Section 6.
2. Proposed Network Simulation Model
Proposed network simulation model is shown in Fig. 1.
In our WSNs model, every node detects the physical phe-
nomenon and sends back to the sink node data packets. We
suppose that the sink node is more powerful than sensor
nodes and it is always located at the borders of the service
area. This model can be used for remote monitoring of haz-
ard or inaccessible areas [7]. We analyse the performance of
the network in a fixed time interval. This can be considered
as the available time for the detection of the phenomenon
and its value is application dependent. In this paper, we con-
sider that a mobile event is moving randomly in the WSNs
field. In Fig. 2 is shown one pattern of movement event’s
path. We implemented a simulation system for WSNs con-
sidering moving event using ns-2. We evaluated the good-
put, routing efficiency and consumed energy of AODV pro-
tocol for TwoRayGround and Shadowing propagation mod-
els in case of the lattice topology.
Modeling
Topology
Radio Model
Routing Protocol
Physical & MAC
CSMA
Regular
Random
Shadowing
TwoRayGround
AODV, DSR
OLSR, Others
Simulation System
Protocol Evaluation
Data For Real
Applications
IEEE802.11 Zigbee
Sensor Network
Network Stack
Figure 1. Proposed network simulation
model.
2.1. Topology
For the physical layout of the WSNs, two types of de-
ployment has been studied so far: the random and the lat-
tice deployment. In the former, nodes are supposed to be
randomly distributed, while in the latter nodes are vertexes
of particular geometric shape, e.g. a square grid. For space
constraints, we present results for the square grid topology
only. In this case, in order to guarantee the connectedness
of the network we should set the transmission range of ev-
ery node to the step size, d, which is the minimum distance
between two rows (or columns) of the grid. In fact, by this
way the number of links that every node can establish, a.k.a
the node degree is D =4. By using Cooper’s theorem [8]
along with some power control techniques, one could use
also D =2
1
. However, we assume all nodes to be equal
and then the degree is fixed to 4. Nodes at the borders have
D =2.
2.2. Routing Protocol
We are aware of many proposals of routing protocols
for ad-hoc networks during recent years. Here, we con-
sider AODV protocol [9]. The AODV is an improvement
of DSDV to on-demand scheme. It minimize the broadcast
packet by creating route only when needed. Every node in
network should maintain route information table and par-
ticipate in routing table exchange. When source node wants
1
By using the theorem in [8], we can say that a simple 2 regular network
is almost surely strongly 2 connected.
181

Sensor node Event Sink
Figure 2. One pattern of event movement
path.
to send data to the destination node, it first initiates route
discovery process. In this process, source node broadcasts
Route Request (RREQ) packet to its neighbors. Neighbor
nodes which receive RREQ forward the packet to its neigh-
bor nodes. Neighbor nodes which receive RREQ forward
the packet to its neighbors, and so on. This process con-
tinues until RREQ reach to the destination or the node who
know the path to destination. When the intermediate nodes
receive RREQ, they record in their tables the address of
neighbors, thereby establishing a reverse path. When the
node which knows the path to destination or destination
node itself receive RREQ, it send back Route Reply (RREP)
packet to source node. This RREP packet is transmitted by
using reverse path. When the source node receives RREP
packet, it can know the path to destination node and it stores
the discovered path information in its route table. That is
the end of route discovery process. Then, AODV performs
route maintenance process. In route maintenance process,
each node periodically transmits a Hello message to detect
link breakage.
2.3. Propagation Radio Model
In order to simulate the detection of a natural event, we
used the libraries from Naval Research Laboratory (NRL)
[10]. In this framework, a phenomenon is modeled as a
wireless mobile node. The phenomenon node broadcasts
packets with a tunable synchrony or pulse rate, which repre-
sents the period of occurrence of a generic event
2
. These li-
2
As a consequence, this model is for discrete events. By setting a suit-
able value for the pulse rate, it is possible in turn to simulate the continuous
braries provide the sensor node with an alarm variable. The
alarm variable is a timer variable. It turns off the sensor if
no event is sensed within an alarm interval. In addition to
the sensing capabilities, every sensor can establish a multi-
hop communication towards the Monitoring Node (MN) by
means of a particular routing protocol. This case is the op-
posite of the polling scheme.
Although not optimal for multi-hops WSNs, we assume
that the MAC protocol is the IEEE 802.11 standard. This
serves to us as a baseline of comparison for other con-
tention resolution protocols. The receiver of every sensor
node is supposed to receive correctly data bits if the received
power exceeds the receiver threshold, γ. This threshold de-
pends on the hardware
3
. As reference, we select param-
eters values according to the features of a commercial de-
vice (MICA2 OEM). In particular, for this device, we found
that for a carrier frequency of f = 916MHz and a data
rate of 34KBaud, we have a threshold (or receiver sensitiv-
ity) γ|
dB
= 118dBm [11]. The calculation of the phe-
nomenon range is not yet optimized and the phenomenon
propagation is assumed to follow the propagation laws of
the radio signals. Table 1 shows some typical values of
Shadowing deviation. In Fig. 3 and Fig. 4 are shown the
transimisson range of TwoRayGround and Shadowing mod-
els [12]. TwoRayGround model considers both the direct
path and a ground reflection path. It is applied in the envi-
ronments which are like plains and have no obstacles. How-
ever, the transmission range of Shadowing model is random.
This model is applied in the environments which have ob-
stacles and are hardly to transmit data directly. In particular,
the emitted power of the phenomenon is calculated accord-
ing to a TwoRayGround propagation model. The received
power at distance d is predicted by:
P
r
(d)=
P
t
G
t
G
r
h
2
t
h
2
r
d
4
L
(1)
where G
t
and G
r
are the antenna gains of the transmitter
and the receiver, h
t
and h
r
are the heights of the transmit
and receive antennas respectively, and L (L 1) is the sys-
tem loss.
The Shadowing model assumes that the received power
at the sensor node is:
P
r
(d)|
dB
= P
t
|
dB
β
0
10α log
d
d
0

deterministic part
+ S
dB

random part
(2)
where β
0
is a constant. The term S
dB
is a random variable,
which accounts for random variations of the path loss. This
signal detection such as temperature or pressure.
3
Other MAC factors affect the reception process, for example the Car-
rier Sensing Threshold (CST) and Capture Threshold (CP) of IEEE.802.11
used in ns-2.
182

20
40
60
80
100
30
210
60
240
90
270
120
300
150
330
180 0
Case of deterministic model (σ
2
=0)
Figure 3. Transimisson range of TwoRay-
Ground model.
50
100
150
200
250
30
210
60
240
90
270
120
300
150
330
180 0
Case of random model, σ
2
=2dB
Figure 4. Transimisson range of Shadowing
model.
variable is also known as log-normal shadowing, because it
is supposed to be Gaussian distributed with zero mean and
variance σ
2
dB
,thatisS
dB
∼N(0
2
dB
). Given two nodes,
if P
r
,whereγ is the hardware-dependent threshold,
the link can be established. The case of σ =0, α =4,
d>d
0
is the TwoRaysGround model. In Shadowing model
in addition to the direct ray from the transmitter towards the
receiver node, a ground reflected signal is supposed to be
present. Accordingly, the received power depends also on
Table 1. Some typical values of Shadowing
deviation S
dB
.
Environment S
dB
Outdoor 4 to 12
Office, Hard partition 7
Office, Soft partition 9.6
Factory, Line-of-sight 3 to 6
Factory, Obstructed 6.8
Table 2. Topology settings.
Lattice
Step d =
L
N1
m
Service Area Size L
2
= (800x800)m
2
Number of Nodes N =12, 64, 100, 256
Transmission Range r
0
= d
the antenna heights and the pathloss is:
β =10log
(4πd)
4
L
G
t
G
r
h
t
h
r
λ
2
(3)
Energy Model The energy model concerns the dy-
namics of energy consumption of the sensor. A widely used
model is as follows [13]. When the sensor transmits k bits,
the radio circuitry consumes an energy of kP
Tx
T
B
,where
P
Tx
is the power required to transmit a bit which lasts T
B
seconds. By adding the radiated power P
t
(d),wehave:
E
Tx
(k, d)=kT
B
(P
Tx
+ P
t
(d)) .
Since packet reception consumes energy, by following the
same reasoning, we have:
E(k, d)=E
Tx
(k, d)+E
Rx
(k, d)=kP
Tx
T
B
+ kT
B
P
t
(d)
+ kP
Rx
T
B
(4)
where P
Rx
is the power required to correctly receive (de-
modulate and decode) one bit. In Tables 2 and 3, we sum-
marise the values of parameters used in our WSNs. Let us
note that the power values concern the power required to
transmit and receive one bit, respectively. They do not refer
to the radiated power at all. This is also the energy model
implemented in the widely used ns-2 simulator. It is take a
long time to simulate a simulation system with large num-
ber of nodes. So, we investgated the performance of WSNs
with the number of nodes shown in Table 2.
183

Table 3. Radio model and system parameters.
Radio model parameters
Path Loss Coefficient α =2.7
Variance σ
2
dB
= 16dB
Carrier Frequency 916MHz
Antenna omni
Threshold (Sensitivity) γ = 118dB
Other parameters
Reporting Frequency T
r
=[0.1, 1000]pps
1
Interface Queue Size 50 packets
UDP Packet Size 100 bytes
Detection Interval τ 30s
1
packet per seconds
Interference In general, in every wireless network the
electromagnetic interference of neighboring nodes is al-
ways present. The interference power decreases the Signal-
to-Noise-Ratio (SNR) at the intended receiver, which will
perceives a lower bit and/or packet error probability. Given
a particular node, the interference power depends on how
many transmitters are transmitting at the same time of the
transmission of the given node. In a WSNs, since the num-
ber of concurrent transmissions is low because of the low
duty-cycle of sensors, we can neglect the interference. In
other words, if we define duty-cycle as the fraction between
the total time of all transmissions of sensor data and the total
operational time of the net, we get always a value less than
0.5. In fact, the load of each sensor is 1 because sensors
transmit data only when an event is detected [13]. How-
ever, it is intuitive that in a more realistic scenario, where
many phenomena trigger many events, the traffic load can
be higher, and then the interference will worsen the perfor-
mance with respect to that we study here. Consequently,
we can fairly say that the results we get here should be con-
sidered as an upper bound on the system performance with
respect to more realistic scenarios.
3 Event Detection and Transport
Here, we use the data-centric model similar to [14],
where the end-to-end reliability is transformed into a
bounded signal distortion concept. In this model, after sens-
ing an event, every sensor node sends sensed data towards
the MN. The transport used is a UDP-like transport, i.e.
there is not any guarantee on the delivery of the data. While
this approach reduces the complexity of the transport pro-
tocol and well fit the energy and computational constraints
of sensor nodes, the event-reliability can be guaranteed to
some extent because of the spatial redundancy. The sensor
T
0
r
f()
T
r
WSN
Target event−reliability
Event−reliability
Figure 5. Representation of the transport
based on the event-reliability.
node transmits data packets reporting the details of the de-
tected event at a certain transmission rate
4
. The setting of
this parameter, T
r
, depends on several factors, as the quan-
tization step of sensors, the type of phenomenon, and the
desired level of distortion perceived at the MN. In [14], the
authors used this T
r
as a control parameter of the overall
system. For example, if we refer to event-reliability as the
minimum number of packets required at MN in order to re-
liably detect the event, then whenever the MN receives a
number of packets less than the event-reliability, it can in-
struct sensor nodes to use a higher T
r
. This instruction is
piggy-backed in dedicated packets from the MN. This sys-
tem can be considered as a control system, as shown in
Fig. 5, with the target event-reliability as input variable and
the actual event-reliability as output parameter. The target
event-reliability is transformed into an initial T
0
r
. The con-
trol loop has the output event-reliability as input, and on
the basis of a particular non-linear function f (·), T
r
is ac-
cordingly changed. We do not implement the entire control
system, but only a simplified version of it. For instance, we
vary T
r
and observe the behavior of the system in terms of
the mean number of received packets. In other words, we
open the control loop and analyze the forward chain only.
4. Goodput, Routing Efficiency and Consumed
Energy
In this section, we present the simulation results of our
proposed WSNs. We simulated the network by means of ns-
2 simulator, with the support of NRL libraries
5
. The Good-
put is defined at the sink, and it is the received packet rate
divided by the sent packets rate. Thus:
G(τ)=
N
r
(τ)
N
s
(τ)
(5)
4
Note that in the case of discrete event, this scheme is a simple packet
repetition scheme.
5
Since the number of scheduler events within a simulated WSNs can
be very high, we applied a patch against the scheduler module of ns-2 in
order to speed up the simulation time [15].
184

Citations
More filters
Proceedings ArticleDOI
22 Mar 2017
TL;DR: The types of topologies: Bus, ring, star and its evaluation in terms of receiving energy, Residual energy, Idle-state energy, number of packets sent or received in the network are presented.
Abstract: The network technologies development made wireless sensor network (WSN) to have many ways in reducing the complexity, cost and in improving reliability. The objective of this paper is to provide an effective topology modeling to conserve the energy of individual nodes in wireless sensor network and preserving its coverage maintenance and graph connectivity. This paper presents the types of topologies: Bus, ring, star and its evaluation in terms of Receiving energy, Residual energy, Idle-state energy, number of packets sent or received in the network.

8 citations


Cites background from "Performance Evaluation of Wireless ..."

  • ...The consumed energy could be reduced in a large scale sensor network by considering a mobile sink node [6] in the observing area [7]....

    [...]

01 Jan 2010
TL;DR: It is shown that the non-determinism present in some radio propagation models induce randomness which may compromise the performance of many protocols.
Abstract: The deployment of mobile ad hoc networks is dicult in a re- search environment and therefore the performance of protocols for these networks has been mostly evaluated on simulators. A simulator must replicate realistic conditions and one of the most dicult a spects is the radio signal propagation model. The literature shows that many perfor- mance evaluations were conducted using propagation models that are not realistic for the expected application scenarios. This paper shows that the non-determinism present in some radio propagation models induce randomness which may compromise the performance of many protocols. To demonstrate the problem, this paper compares and discusses the per- formance of some routing protocols under dierent propagat ion models.

2 citations


Cites methods or result from "Performance Evaluation of Wireless ..."

  • ...The authors continued their work and presented a similar study for Mobile Event using AODV [11]....

    [...]

  • ...Surprisingly, routing protocol metrics (like those used by AODV, DSR and DSDV) tend to favour routes that include weak links as they are expected to have a lower number of hops (thus reducing cost) and to be discovered faster (which is interpreted as a sign of lower congestion)....

    [...]

  • ...6(b) is bellow 60% for AODV, 50% for DSDV and 30% for DSR....

    [...]

  • ...AODV purges from the routing table routes that have not been used for a predefined time....

    [...]

  • ...One aspect of AODV very relevant for this paper is that every node replies only once to the same route request....

    [...]

References
More filters
Book
01 Jan 2005

9,038 citations

Proceedings Article
01 Jan 2005
TL;DR: This book aims to provide a chronology of key events and individuals involved in the development of microelectronics technology over the past 50 years and some of the individuals involved have been identified and named.
Abstract: Alhussein Abouzeid Rensselaer Polytechnic Institute Raviraj Adve University of Toronto Dharma Agrawal University of Cincinnati Walid Ahmed Tyco M/A-COM Sonia Aissa University of Quebec, INRSEMT Huseyin Arslan University of South Florida Nallanathan Arumugam National University of Singapore Saewoong Bahk Seoul National University Claus Bauer Dolby Laboratories Brahim Bensaou Hong Kong University of Science and Technology Rick Blum Lehigh University Michael Buehrer Virginia Tech Antonio Capone Politecnico di Milano Javier Gómez Castellanos National University of Mexico Claude Castelluccia INRIA Henry Chan The Hong Kong Polytechnic University Ajit Chaturvedi Indian Institute of Technology Kanpur Jyh-Cheng Chen National Tsing Hua University Yong Huat Chew Institute for Infocomm Research Tricia Chigan Michigan Tech Dong-Ho Cho Korea Advanced Institute of Science and Tech. Jinho Choi University of New South Wales Carlos Cordeiro Philips Research USA Laurie Cuthbert Queen Mary University of London Arek Dadej University of South Australia Sajal Das University of Texas at Arlington Franco Davoli DIST University of Genoa Xiaodai Dong, University of Alberta Hassan El-sallabi Helsinki University of Technology Ozgur Ercetin Sabanci University Elza Erkip Polytechnic University Romano Fantacci University of Florence Frank Fitzek Aalborg University Mario Freire University of Beira Interior Vincent Gaudet University of Alberta Jairo Gutierrez University of Auckland Michael Hadjitheodosiou University of Maryland Zhu Han University of Maryland College Park Christian Hartmann Technische Universitat Munchen Hossam Hassanein Queen's University Soong Boon Hee Nanyang Technological University Paul Ho Simon Fraser University Antonio Iera University "Mediterranea" of Reggio Calabria Markku Juntti University of Oulu Stefan Kaiser DoCoMo Euro-Labs Nei Kato Tohoku University Dongkyun Kim Kyungpook National University Ryuji Kohno Yokohama National University Bhaskar Krishnamachari University of Southern California Giridhar Krishnamurthy Indian Institute of Technology Madras Lutz Lampe University of British Columbia Bjorn Landfeldt The University of Sydney Peter Langendoerfer IHP Microelectronics Technologies Eddie Law Ryerson University in Toronto

7,826 citations

Journal ArticleDOI
TL;DR: It is proved that, with appropriate bounds on node density and intracluster and intercluster transmission ranges, HEED can asymptotically almost surely guarantee connectivity of clustered networks.
Abstract: Topology control in a sensor network balances load on sensor nodes and increases network scalability and lifetime. Clustering sensor nodes is an effective topology control approach. We propose a novel distributed clustering approach for long-lived ad hoc sensor networks. Our proposed approach does not make any assumptions about the presence of infrastructure or about node capabilities, other than the availability of multiple power levels in sensor nodes. We present a protocol, HEED (Hybrid Energy-Efficient Distributed clustering), that periodically selects cluster heads according to a hybrid of the node residual energy and a secondary parameter, such as node proximity to its neighbors or node degree. HEED terminates in O(1) iterations, incurs low message overhead, and achieves fairly uniform cluster head distribution across the network. We prove that, with appropriate bounds on node density and intracluster and intercluster transmission ranges, HEED can asymptotically almost surely guarantee connectivity of clustered networks. Simulation results demonstrate that our proposed approach is effective in prolonging the network lifetime and supporting scalable data aggregation.

4,889 citations


"Performance Evaluation of Wireless ..." refers background in this paper

  • ...These networks can be an integral part of systems such as battle-field surveillance and microclimate control in buildings, nuclear, biological and chemical attack detection, home automation and environmental monitoring [1, 2 ]....

    [...]

Journal ArticleDOI
TL;DR: A survey of state-of-the-art routing techniques in WSNs is presented and the design trade-offs between energy and communication overhead savings in every routing paradigm are studied.
Abstract: Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. Routing protocols in WSNs might differ depending on the application and network architecture. In this article we present a survey of state-of-the-art routing techniques in WSNs. We first outline the design challenges for routing protocols in WSNs followed by a comprehensive survey of routing techniques. Overall, the routing techniques are classified into three categories based on the underlying network structure: flit, hierarchical, and location-based routing. Furthermore, these protocols can be classified into multipath-based, query-based, negotiation-based, QoS-based, and coherent-based depending on the protocol operation. We study the design trade-offs between energy and communication overhead savings in every routing paradigm. We also highlight the advantages and performance issues of each routing technique. The article concludes with possible future research areas.

4,701 citations


"Performance Evaluation of Wireless ..." refers background in this paper

  • ...We found that for mobile event, the Goodput and routing efficiency of TwoRayGround is better than Shadowing, but the Depletion of Shadowing is better than TwoRayGround....

    [...]

Journal ArticleDOI
TL;DR: This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks that enables low-duty-cycle operation in a multihop network and reveals fundamental tradeoffs on energy, latency and throughput.
Abstract: This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining largely inactive for long time, but becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from traditional wireless MACs such as IEEE 802.11 in several ways: energy conservation and self-configuration are primary goals, while per-node fairness and latency are less important. S-MAC uses a few novel techniques to reduce energy consumption and support self-configuration. It enables low-duty-cycle operation in a multihop network. Nodes form virtual clusters based on common sleep schedules to reduce control overhead and enable traffic-adaptive wake-up. S-MAC uses in-channel signaling to avoid overhearing unnecessary traffic. Finally, S-MAC applies message passing to reduce contention latency for applications that require in-network data processing. The paper presents measurement results of S-MAC performance on a sample sensor node, the UC Berkeley Mote, and reveals fundamental tradeoffs on energy, latency and throughput. Results show that S-MAC obtains significant energy savings compared with an 802.11-like MAC without sleeping.

2,843 citations

Frequently Asked Questions (2)
Q1. What are the future works in "Performance evaluation of wireless sensor networks for different radio models considering mobile event" ?

In the future, the authors would like to carry out more extensive simulations for mobile sensor nodes and mobile sink. 

In this paper, the authors consider the behavior of a wireless sensor network for TwoRayGround and Shadowing radio models for the case of mobile event. By means of simulations, the authors analyse the performance of AODV protocol. In the previous work, the authors considered that the event node is stationary in the observation field. In this work, the authors want to investigate how the sensor network performs in the case when the event node moves.