energy aware distributed partitioning detection and connectivity restoration algorithm in wireless sensor networks
Authors
abstract
mobile sensor networks rely heavily on inter-sensor connectivity for collection of data. nodes in these networks monitor different regions of an area of interest and collectively present a global overview of some monitored activities or phenomena. a failure of a sensor leads to loss of connectivity and may cause partitioning of the network into disjoint segments. a number of approaches have been recently proposed that pursue node relocation in order to restore connectivity. dcr is a distributed partitioning detection and connectivity restoration algorithm to tolerate the failure of sensors. dcr proactively identifies sensors that are critical to the network connectivity based on local topological information, and designates appropriate, preferably non-critical, backup nodes. upon failure detection, the backup sensor initiates a recovery process that may involve coordinated relocation of multiple sensors. here we proposed energy aware distributed partitioning detection and connectivity restoration algorithm that is an improvement of dcr algorithm. therefore reducing the message exchange overhead, lower energy consumption, and thus will increase the network lifetime.
similar resources
ENERGY AWARE DISTRIBUTED PARTITIONING DETECTION AND CONNECTIVITY RESTORATION ALGORITHM IN WIRELESS SENSOR NETWORKS
Mobile sensor networks rely heavily on inter-sensor connectivity for collection of data. Nodes in these networks monitor different regions of an area of interest and collectively present a global overview of some monitored activities or phenomena. A failure of a sensor leads to loss of connectivity and may cause partitioning of the network into disjoint segments. A number of approaches have be...
full textEnergy Aware Distributed Partitioning Detection and Connectivity Restoration Algorithm in Wireless Sensor Networks
Mobile sensor networks rely heavily on inter-sensor connectivity for collection of data. Nodes in these networks monitor different regions of an area of interest and collectively present a global overview of some monitored activities or phenomena. A failure of a sensor leads to loss of connectivity and may cause partitioning of the network into disjoint segments. A number of approaches have bee...
full textIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
full textDistributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks
Even if several algorithms were proposed in the literature to solve the coverage problem in Wireless Sensor Networks (WSNs), they still suffer from some weaknesses. This is the reason why we suggest in this paper, a distributed protocol, called Single Phase Multiple Initiator (SPMI). Its aim is to find Connect Cover Set (CCS) for assuring the coverage and connectivity in WSN. Our idea is based ...
full textEnergy Efficiency and Reliability in Underwater Wireless Sensor Networks Using Cuckoo Optimizer Algorithm
Energy efficiency and reliability are widely understood to be one of the dominant considerations for Underwater Wireless Sensor Networks (UWSNs). In this paper, in order to maintain energy efficiency and reliability in a UWSN, Cuckoo Optimization Algorithm (COA) is adopted that is a combination of three techniques of geo-routing, multi-path routing, and Duty-Cycle mechanism. In the proposed alg...
full textintrusion detection in wireless sensor networks using genetic algorithm
wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. routing attacks on the networks, where a malicious node from sending data to the base station is perceived. in this article, a method that can be used to transfer the data securely to prevent attacks...
full textMy Resources
Save resource for easier access later
Journal title:
international journal of mathematical modelling and computationsجلد ۳، شماره ۱ (WINTER)، صفحات ۷۱-۸۲
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023