Energy-Hole Minimization in WSN Using Active Bonding and Separating Coverage

A wireless sensor network (WSN) is typically comprised of a large number of nodes spread over a large area sensors. Sensor nodes are small, low battery, limited storage and processing power. Each node is usually equipped with a wireless radio transceiver, a small micro-controller, a source of power sensors and multiple types such as temperature, light, pressure, sound, vibration nodes etc. These ways to communicate directly with network among themselves or through other nodes. The first objective is to collect data on WSN sensor nodes. If the data on the web passes through the one or more sensor nodes, power consumption in the first node differs from the second node. Therefore, the loaded nodes too quickly lose battery power and shut down. Imagine this situation happens to a group of neighboring nodes and fall of premature death, leading energy gap in the network. Energy gap affects other nodes in the network nodes that share the power load port has a load to the other nodes in the network. As a result, life of a network will end soon. Our research is aimed at maximizing the coverage area, increasing the detection range of remaining sensor nodes when a node fall in premature death, to prevent the formation of holes in the supply network of wireless sensors.

[1]  Mani B. Srivastava,et al.  Critical density thresholds for coverage in wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[2]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[3]  Antonio Alfredo Ferreira Loureiro,et al.  Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[4]  Manoranjan Pradhan,et al.  Minimization of energy-holes By DBPC (Dynamic Bonding and Partitioning Coverage) in a WSN , 2015 .

[5]  Xiuzhen Cheng,et al.  Localized fault-tolerant event boundary detection in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  M. W. Youssef Securing computer networks communication by modifying computer network communication protocols , 2011, 2011 11th International Conference on ITS Telecommunications.

[7]  Daniel Curiac,et al.  Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).

[8]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[9]  Tomasz Bednarz,et al.  Neural Network Based Approach for Malicious Node Detection in Wireless Sensor Networks , 2007 .

[10]  Sanjay Jha,et al.  The holes problem in wireless sensor networks: a survey , 2005, MOCO.

[11]  Zoran Bojkovic,et al.  A survey on wireless sensor networks deployment , 2008 .

[12]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[13]  Guoliang Xing,et al.  Integrated coverage and connectivity configuration in wireless sensor networks , 2003, SenSys '03.

[14]  Yu-Chee Tseng,et al.  The Coverage Problem in a Wireless Sensor Network , 2003, WSNA '03.