EEC : Evaluation of Energy Consumption in Wireless Sensor Networks

Wireless Sensor Networks (WSN) consists of battery-powered sensor nodes which collect data and route the data to the Base Station. Centralized Cluster-based routing protocols efficiently utilize limited energy of the nodes by selecting Cluster Heads (CHs) in each round. Selection of CHs and Cluster formation is performed by the Base Station. In each round, nodes transmit their location information and their residual energy to the Base Station. This operation is a considerable burden on these resource hungry sensor nodes. In this paper we propose a scheme whereby a small number of High-Energy nodes gather location information and residual energy status of the sensing nodes and transmit to the Base Station . This scheme eliminates CH advertisement phase in order to conserve energy. Based on the energy consumption by various types of nodes, we have derived an energy model, also known as EEC, for our algorithm which depicts the total energy consumption in the network.

[1]  Sameerchand Pudaruth,et al.  PEOPLE FACTORS IN AGILE SOFTWARE DEVELOPMENT AND PROJECT MANAGEMENT , 2012 .

[2]  Xiangjian He,et al.  Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..

[3]  Shahzad Khan,et al.  Applications, limitations, and improvements in visible light communication systems , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).

[4]  Iftikhar Ahmad,et al.  A New Robust Video Watermarking Technique Using H.264/AAC Codec Luma Components Based On DCT , 2016 .

[5]  Kenji Nakagawa,et al.  Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[6]  Kenji Nakagawa,et al.  B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks , 2012 .

[7]  Xiangjian He,et al.  PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..

[8]  Jan L. Harrington Denial of Service Attacks , 2005 .

[9]  Mian Ahmad Jan,et al.  Energy-efficient routing and secure communication in wireless sensor networks , 2016 .

[10]  U.S. Tiwary,et al.  Base station initiated dynamic routing protocol for Heterogeneous Wireless Sensor Network using clustering , 2008, 2008 Fourth International Conference on Wireless Communication and Sensor Networks.

[11]  Jinjun Chen,et al.  A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.

[12]  Fahim Arif,et al.  Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[13]  Shahzad,et al.  RECOMMENDER SYSTEM ON STRUCTURED DATA , 2016 .

[14]  Nazia Azim,et al.  Offsite 2-Way Data Replication towards Improving Data Refresh Performance , 2016 .

[15]  Majid Sarrafzadeh,et al.  Optimal Energy Aware Clustering in Sensor Networks , 2002 .

[16]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[17]  Farman Ullah,et al.  Survey: Dealing Non-Functional Requirements at Architecture Level , 2016 .

[18]  Syed Roohullah Jan,et al.  Issues In Global Software Development (Communication, Coordination and Trust) - A Critical Review , 2016 .

[19]  Jinjun Chen,et al.  DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[20]  Farman Ullah,et al.  A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.

[21]  Abdelkrim Haqiq,et al.  Secure Communication and Routing Architecture in Wireless Sensor Networks , 2014 .

[22]  Xiangjian He,et al.  Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[23]  Muhammad Babar,et al.  Applications and Challenges Faced by Internet of Things - A Survey , 2016 .

[24]  Sher Afzal Khan,et al.  Delay and throughput performance improvement in wireless sensor and actor networks , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).

[25]  Xiangjian He,et al.  PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.

[26]  Fazlullah Khan,et al.  An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .

[27]  Xiangjian He,et al.  A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[28]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[29]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[30]  F. Khan,et al.  Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.

[31]  Xiangjian He,et al.  A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, TrustCom 2015.

[32]  Xiangjian He,et al.  Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.

[33]  Wendi B. Heinzelman,et al.  Application-specific protocol architectures for wireless networks , 2000 .

[34]  Jinjun Chen,et al.  A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..

[35]  Deepak Puthal,et al.  Effective Machine to Machine Communications in Smart Grid Networks , 2012 .

[36]  Aries Kusdaryono,et al.  A Clustering Protocol with Mode Selection for Wireless Sensor Network , 2011, J. Inf. Process. Syst..