Coverage Eligibility Rule based Coverage Maintenance Protocol for Energy Conservation in Wireless Sensor Networks

نویسندگان

  • A. Balamurugan
  • T. Purushothaman
چکیده

Problem statement: Wireless Sensor Networks (WSNs) comprise of small nodes with sensing, computation and wireless communication capabilities. Nodes in a sensor network are severely constrained by energy and computing power. Continuous working of sensor nodes leads to quick depletion of battery power and reduces the overall lifetime. To prolong the lifetime of the sensor nodes, efficient routing protocol that could also optimize the energy consumption while maintaining coverage and connectivity is required. Approach: The Coverage Maintenance Protocol (CMP) uses Coverage Eligibility Rule (CER) to find the eligibility of sensor nodes to sleep. After turning off the eligible nodes found out by CER, the network coverage degree was maintained by the remaining active nodes. If these active nodes continuously work, they consumemore energy and decreasethe lifetime. The CMP protocol helps to balance the energy consumed by active nodes,scheduling the work state of active nodes into sleeping, active and listening states. Each node in the sleeping state will not consume energy and remains idle for delay time Td. Results: This maintained the network coverage and increased the lifetime of sensor nodes. Conclusion: The simulation results indicated that the proposed Coverage Maintenance Protocol (CMP) can significantly conserve energy increase the lifetime of sensor networks while maintaining the given coverage.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Representing a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

متن کامل

Representing a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

متن کامل

Design and evaluation of two distributed methods for sensors placement in Wireless Sensor Networks

Adequate coverage is one of the main problems for distributed wireless sensor networks and The effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location to adequate coverage. In this paper, we apply fuzzy logic system to...

متن کامل

Coverage Improvement In Wireless Sensor Networks Based On Fuzzy-Logic And Genetic Algorithm

Wireless sensor networks have been widely considered as one of the most important 21th century technologies and are used in so many applications such as environmental monitoring, security and surveillance. Wireless sensor networks are used when it is not possible or convenient to supply signaling or power supply wires to a wireless sensor node. The wireless sensor node must be battery powered.C...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011