ENERGY EFFICIENT CENTRALIZED DYNAMIC CLUSTERING RESERVATION MAC PROTOCOL FOR MWSN
Journal Title: ICTACT Journal on Communication Technology - Year 2017, Vol 8, Issue 2
Abstract
Mobile wireless sensor networks (MWSN) have recently emerged as a hot research topic as their communication links and topology change due to node mobility. In a dynamically changing environment it is essential to build energy efficient communication routes with least communication overheads. Energy is one of the most important concerns for MWSNs. To have a long lasting network lifetime, we propose a centralized, periodic, selective sensing and dynamic clustering algorithm for delay tolerant and high integrity MWSNs, aimed to enhance the connectivity and performance. All dynamically varying parameters such as location, number of nodes present in each virtual grid, residual energy are considered while forming clusters and selecting cluster head (CH). Reclustering and selection of CH is centralized and performed by sink. Cluster size is not constant and may vary from cluster to cluster in every round. If nodes in any grid is less, then nodes of neighboring grids are clubbed to form clusters. Reclustering is done in every round and to avoid data duplication, some nodes in every cluster are selected based on proximity and are not allowed to sense and transmit in that round. It is assumed in a close vicinity if more than one sensors are present they all generate same data as they sense the same physical quantity, this reduce redundant data generation sensing is performed only by selected nodes. Inter and intra communication slots are reserved depending on size of cluster by sink in every round. The algorithm is evaluated using stationary and mobile sink.
Authors and Affiliations
Suma G, Siddappa M
ON PILOT CONTAMINATION IN MASSIVE MULTIPLE-INPUT MULTIPLE OUTPUT SYSTEM WITH LEAST SQUARE METHOD AND ZERO FORCING RECEIVER
Massive Multiple-Input Multiple-Output (MIMO) wireless communications refers to use of large number of antennas at transmitter and receiver to enhance spectral and energy efficiency. However, its performance is limited b...
AN INVESTIGATION OF SECURITY TECHNIQUES FOR CONCEALED DDOS EXPOSURE ATTACKS
Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an inves...
CERTIFICATE REVOCATION SCHEME BASED ON WEIGHTED VOTING GAME AND RATIONAL SECURE MULTIPARTY COMPUTING
The Mobile Adhoc Network consists of deployed mobile nodes which lead to the frequent changes in network topology. Due to topology changes, required infrastructure is unavailable for communication. Moreover, malicious no...
ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK
This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication...
A TLBO-BASED ENERGY EFFICIENT BASE STATION SWITCH OFF AND USER SUBCARRIER ALLOCATION ALGORITHM FOR OFDMA CELLULAR NETWORKS
Downlink of a cellular network with orthogonal frequency-division multiple access (OFDMA) is considered. Joint base station switch OFF and user subcarrier-allocation with guaranteed user quality of service, is shown to b...