Self - adaptable Routing Scheme for In - network Processing

نویسندگان

  • Xiwei Zhao
  • Kami Makki
  • Niki Pissinou
چکیده

The wireless sensor network (WSN), is a type of self-organized distribution system without complex infrastructure requirement. However, WSN’s independence and un-attended usage limit its power supply and life expectancy. These become a critical issue for any WSN implementation. The in-network processing which, intends to minify data volume locally can greatly reduce the energy consumption of data delivery over a long distance to the sink. However, open problems are still remain with in-network processing, such as how to carry out in-network processing, and how to combine routing scheme to the sink (e.g. the long distance delivery). For any WSN application, the following pre-assumption is vital. There exists a physical signal field which bridges physical events to the sensors of WSN, otherwise WSN does not work. In fact, the physical signal field can be depicted by sensory data of all the nodes, and can even be used for local data convergence (e.g. in-network processing). An immediate solution which we propose is that, sensory data of the nodes can be converged to local extremes of the physical signal field along its gradient direction. Furthermore, the physical signal field is integrated with the cost field routing scheme. The cost field routing is in charge of delivering data to the sink. During the in-network processing, the delivery direction is derived by combining linearly the gradient directions of the cost field and physical signal field. Also simulation results show that the proposed schemes are robust, adaptable, and reliable to the variation of physical events. Keyword: Wireless Sensor Network, In-network process, Routing algorithm

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Self-Routing Address Scheme for All-Optical Packet-Switched Networks With Arbitrary Topologies

Pure all-optical packet-switched networks in which both header processing and packet routing are carried out in the optical domain overcome the bandwidth bottlenecks of optoelectronic conversions and therefore are expected to meet the needs of next generation high speed networks. Due to the limited capabilities of available optical logic devices, realizations of pure all-optical packet-switched...

متن کامل

A Novel Method for VANET Improvement using Cloud Computing

In this paper, we present a novel algorithm for VANET using cloud computing. We accomplish processing, routing and traffic control in a centralized and parallel way by adding one or more server to the network. Each car or node is considered a Client, in such a manner that routing, traffic control, getting information from client and data processing and storing are performed by one or more serve...

متن کامل

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007