A Novel Sub-optimum Data Transmission Algorithm for Wireless Sensor Networks

نویسندگان

  • Jin Wang
  • Bo Tang
  • Tinghuai Ma
  • Yuhui Zheng
  • Jeong-Uk Kim
چکیده

Wireless sensor networks (WSNs) are composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it. Energy efficiency and network lifetime are two challenges that most of researchers deal with. In general, base station (BS) used to retrieve data from sensor nodes is far from the sensor field and how to adjust the communication between nodes and BS to achieve energy efficiency and long network lifetime is very important. In this paper, we propose a novel sub-optimum Average Lifetime-oriented Long-distance (ALL) data transmission algorithm. It makes tradeoff between energy cost and residual energy and balances lifetime among all sensor nodes to achieve dramatic lifetime prolongation for network. Simulation results validate that ALL algorithm outperforms traditional protocols or algorithms and prolongs network lifetime dramatically.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks

Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Optimization of Energy Consumption in Image Transmission in Wireless Sensor Networks (WSNs) using a Hybrid Method

In wireless sensor networks (WSNs)‎, ‎sensor nodes have limited resources with regard to computation‎, ‎storage‎, ‎communication bandwidth‎, ‎and the most important of all‎, ‎energy supply‎. ‎In addition‎, ‎in many applications of sensor networks‎, ‎we need to send images to a sink node‎. ‎Therefore‎, ‎we have to use methods for sending images in which the number and volume of packets are optim...

متن کامل

A Priority-based Routing Algorithm for Underwater Wireless Sensor Networks (UWSNs)

Advances in low-power electronics design and wireless communication have enabled the development of low cost, low power micro-sensor nodes. These sensor nodes are capable of sensing, processing and forwarding which have many applications such as underwater networks. In underwater wireless sensor networks (UWSNs) applications, sensors which are placed in underwater environments and predicted ena...

متن کامل

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012