You are on page 1of 7

©2010 International Journal of Computer Applications (0975 - 8887)

Volume 1 – No. 28

A Pull Based Energy Efficient Data Aggregation Scheme


for Wireless Sensor Networks
C. Kavitha Dr.K.V.Viswanatha
Assistant Professor, R.V.College of Professor, Department of CSE,
Engineering R.V.College of Engineering
Visvesvaraya Technological University, Visvesvaraya Technological University,
Karnataka, India Karnataka, India

ABSTRACT
In case of wireless routing in sensor networks, data aggregation sources to a single destination that allow in-network consolidation
has been proposed as a predominantly constructive prototype. of redundant data are identified. In this protocol, the data is sent to
Most of the routing algorithms for traditional networks are address the sink by the sources, however, the content of the data is enroute
centric, and the ad hoc nature of wireless sensor network makes looked and some form of aggregation/consolidation function is
them unsuitable for practical applications. Data-centric performed on the data originating at multiple sources by the
technologies that carry out in-network aggregation of data to routing nodes.
capitulate energy-efficient dissemination are essential. In this Data-centric technologies that carry out in-network aggregation of
paper, we propose a Pull based Energy Efficient Data Aggregation data to capitulate energy-efficient dissemination are essential. In
(PEEDA) approach, to effectively deliver the data to the sink. In case of wireless routing in sensor networks, data aggregation has
this approach, the sink will broadcast an interest message been proposed as a predominantly constructive prototype. The
containing its required data model, to all the nodes. We form an combination of the data coming from different sources enroute –
cost effective aggregation tree towards the sink based on the ToD eliminating redundancy, which minimizes the number of
structure. When the aggregator receives the data from the transmissions and hence saves energy, is the design [1]. The
sources, it aggregates the data depending on the interest message network lifetime must be prolonged by utilizing energy efficient
using spatial and temporal convergence. To achieve energy methods for data gathering as sensors have significant power
efficient aggregation, the MAC protocol uses the partially constraints (battery life).
overlapped channels. By simulation results, we show that the Most of the routing algorithms for traditional networks are address
proposed scheme consumes less energy and reduces the overhead centric, and the ad hoc nature of wireless sensor network makes
and delay. them unsuitable for practical applications. Data aggregation may
be implemented in several ways, but duplicate suppression is the
simplest data aggregation function and is implemented in most
Keywords: wireless networks. But in case of networks, where there is an
Sensor Networks, MAC protocol, Data Aggregation, ToD intermediate level of redundancy in transmitted data and data is
structure, Routing algorithm. non-deterministic in nature, it will be difficult to predict the level
of aggregation.
1. Introduction We propose a Pull based Energy Efficient Data Aggregation
In near future, the wireless sensor networks are predicted to (PEEDA) approach, to effectively deliver the data to the sink. In
operate in an unattended mode, comprising of hundreds to the pull based approach, the sink will broadcast an interest
thousands of low-priced wireless nodes, each with some message containing its required data model, to all the nodes. We
computational power and sensing capability. An extensive sort of form an cost effective aggregation tree towards the sink based on
environmental sensing applications from vehicle tracking to the ToD structure [2]. When the aggregator receives the data
habitat monitoring will be supported by them [1]. Rigorous energy from the sources, it aggregates the data depending on the interest
constraints, outmoded low-rate data, and many-to-one flows in message using spatial and temporal convergence. To achieve
sensor networks are some of the numerous factors that energy efficient aggregation, the MAC protocol uses the partially
differentiate it from the conventional networks. The applications overlapped channels (POC) [3].
under these settings are not effectively handled by the end-to end
routing schemes that have been projected in the literature for 2. Related Work
mobile ad-hoc networks.
Wendi Rabiner Heinzelman, et. al., have presented a family of
Address Centric protocols and Data-Centric Protocols are the
adaptive protocols, called Sensor Protocols for Information via
two kinds of sensor routing protocols [1]. Address-centric
Negotiation (SPIN) which efficiently disseminates information
Protocol (AC): In the address centric routing, the short routes
among sensors in an energy- constrained wireless sensor
between pairs of addressable end nodes are identified. On the
networks. SPIN uses meta-data negotiation and resource-
basis of the route that the queries took, this protocol permits each
adaptation to overcome several deficiencies in traditional
source to independently send data along the shortest path to sink.
dissemination approaches. They have also discussed the details of
two specific SPIN protocols namely SPIN-l and SPIN-2. SPIN-l is
Data-centric Protocol (DC): In this process, routes from multiple

48
©2010 International Journal of Computer Applications (0975 - 8887)
Volume 1 – No. 28

a 3-stage handshake protocol for disseminating data, and SPIN-2 Prakash G. L. et al [12] have proposed Tree on DAG (ToD), a
is a version of SPIN-l that backs off from communication semistructured approach that uses Dynamic Forwarding on an
at a low-energy threshold [4]. implicitly constructed structure composed of multiple shortest
S. Selvakennedy, et. al., have exploited the simple heuristics of path trees to support network scalability. The key principle behind
ant colony in foraging and brood sorting to design a hierarchical ToD was that adjacent nodes in a graph will have low stretch in
and scalable data gathering protocol. Also they have one of these trees in ToD, thus resulting in early aggregation of
demonstrated, how it could exploit data correlations in sensor packets.
readings to minimize communications cost in the data gathering Shweta Jain and Samir R. Das [13] have developed an anycast
process towards the sink. A distributed variance estimation mechanism at the link layer for wireless ad hoc networks. The
algorithm was introduced by the authors to capture data goal was to exploit path diversity in the link layer by choosing the
correlations with negligible state maintenance [5]. best next hop to forward packets when multiple next hop choices
Selvadurai Selvakennedy and Sukunesan Sinnappan have were available. Such choices can come from a multipath routing
proposed an efficient dynamic clustering algorithm to achieve a protocol, for example. This technique reduces transmission retries
network-wide energy reduction in a multihop context. They have and packet drop probabilities in the face of channel fading. They
also presented a realistic energy dissipation model based on the have developed an anycast extension of the IEEE 802.11 MAC
results from stochastic geometry to accurately quantify energy layer based on this idea. And implemented the protocol in an
consumption by means of employing their clustering algorithm for experimental proof-of-concept testbed using the Berkeley motes
various sensor node densities, network areas and transceiver platform and S-MAC protocol stack. They have also implemented
properties [6]. it in the popular ns-2 simulator and experiment with the AOMDV
Sooyeon Kim, et. al., have proposed a protocol called SAFE multipath routing protocol and Ricean fading channels.
(sinks accessing data from environments) which attempts to save Michele Zorzi and Ramesh R. Rao [14] have proposed a
energy through data dissemination path sharing among multiple forwarding technique based on geographical location of the nodes
data sinks. The protocol proposed by the authors achieves energy involved and random selection of the relaying node via contention
efficiency as well as scalability, both of which are crucial for among receivers. They have focused on the multihop performance
large-scale battery-powered sensor networks [7]. of such a solution, in terms of average number of hops to reach a
Dandan Liu, et. al., have proposed two information destination as a function of the distance and of the average
dissemination protocols by negotiation in WSNs. The protocols number of available neighbors.
proposed by the authors are based on the quorum and the home Arunesh Mishra et al. [15] have defined a specific mechanisms
agent schemes, respectively. They have also studied and that can transform partially overlapped channels into an
compared their performances in terms of success rate and energy advantage, instead of a peril. They have constructed simple
efficiency through both mathematical analysis in some special analytical and empirical models of such interference occurring in
cases and simulation in general case [8]. IEEE 802.11 networks, and illustrated two scenarios where such
Ragib Hasan and Marianne Winslett have presented Synergy, a interference can be exploited. First, they applied partially
general purpose information sharing framework that uses trust overlapping channels to improve spatial channel re-use in
negotiation to implement scalable authorization in an open Wireless LANs (WLANs). Second, they leveraged such channels
environment. Synergy provides an abstraction for the information to enable nodes with a single radio interface to communicate more
sources and consumers to accommodate new trust-aware systems efficiently with their peers in 802.11 ad-hoc mode potentially
as well as legacy systems. They have also presented a practical using multi-hop paths.
disaster management application that uses this framework [9].
Weifa Liang and Yuzhen Liu have presented a generic cost 3. Pull Based Data Gathering
model of energy consumption for data gathering in sensor
networks. Then they showed that the online data gathering 3. 1.Interest Propagation by the Sink
problem was NP-Complete if the length of the message In wireless sensor networks, a sink generates an interest message
transmitted by each relay node varies, and instead proposed that identifies its requirement. It is then propagated throughout the
heuristic algorithms for the problem [10]. network. When the source receives the interest message, it
Kai-Wei Fan et al. [11] have proposed techniques for data transmits the corresponding data message. The data packets of
aggregation that do not use any explicit structures. Efficient similar interests are gathered and aggregated at intermediate
aggregation requires packets to meet at the same node (spatial aggregators. When a sink transmits the first interest message, it
convergence) at the same time (temporal convergence). For spatial does not have any information on the availability of data. So the
convergence they have proposed a MAC layer anycast based simplest choice for sink is to broadcast interest message to all its
approach called Data-Aware Anycast (DAA). For temporal neighbors. Interest message is an exploratory message and is
convergence they have proposed Randomized Waiting (RW) at broadcast throughout the network. The interest message contains
the application layer at the source. Also they have modeled the the Interest Id, Description and Timestamp. For interest message
network load generated by the combined DAA with RW approach propagation, the features of shortest path algorithm can be used.
and shown that the predictions of the analysis match closely with Each node maintains an interest table which contains the fields
the simulation results. They also defined the normalized network Interest Id, Sender Id, Cost of the message in terms of hop count
load as the number of packets transmitted in the network and Timestamp. When a node receives an interest message, it will
normalized by the number of contributing sources (number of look up in its interest table for the received interest message. An
nodes whose packets reached the sink with or without interest table has only one entry per data type from a particular
aggregation). sink.

49
©2010 International Journal of Computer Applications (0975 - 8887)
Volume 1 – No. 28

If a node delivers the first interest message , it is added in the The total number of transmissions is minimized as the number of
interest table with its parameters. The interest message is then remaining packets in the network is minimized by transmitting
rebroadcast to other nodes. If a duplicate interest message is packets to nodes that can achieve aggregation.
received by a node, it check the interest table . If the cost of the It is based on the DAA method, which contains two phases,
duplicate message is higher than the cost of the earlier message, it DAA and Dynamic Forwarding. In the first phase, packets are
is dropped. On the other hand, if the duplicate message has lower forwarded and aggregated to a specific node, called aggregator. In
cost, it is updated in the table and then forwarded to the next node. the second phase, the remaining un-aggregated packets are
A periodic interest propagation phase exists. Owing to the fact forwarded using a structure Tree on DAG (ToD) [12].
that the initial interest message tries to find a source for the data it DAA is based on anycasting [13], [14] at the MAC layer to
is considered to be investigative. The interest which is a soft state determine the next-hop for each transmission. Anycasting requires
is every so often invigorated by the sink. As it is impossible to the use of RTS packets to elicit CTS responses from the neighbors
transmit interest reliably across the network, refreshing is before transmission of the packet. We define the Aggregation ID
essential. The refresh rate is a protocol design parameter. On the (AID) to associate packets that can be aggregated. The RTS
basis of the previously cached data, either flooding or directional contains the AID of the transmitting packet and any neighbor that
propagation may be employed to propagate the interest. has a packet with the same AID can respond with a CTS. In our
case, it is the Interest Id. Therefore two packets that are having the
4. Constructing a Cost Effective Aggregation same Interest Id can potentially be aggregated. Suppose 5 nodes
n1,n2,n3,n4 and n5 generates packets with interest ids I1, I2, I1, I3
Tree and I2 respectively, then the packets with interest ids I1 can be
aggregated . (ie) The packets of nodes n1 and n3 can be
We propose the following objectives for devising the structure- aggregated. Similarly packets with interest ids I2 can be
free convergence protocol [11]. aggregated. (ie) The packets of nodes n2 and n5 can be
1) Early aggregation: The aggregation of the packets on their aggregated.
way to sink must be performed as early as possible. CTS Priorities: Nodes are assigned different priorities in
2) Tolerance to event dynamics: There should be no increase responding to an RTS. The three classes of priorities are:
in the overhead and change in the performance when there is a Class A: The receiver has a packet with the same AID as
change in the event’s region of influence. specified in RTS and is closer to the sink than the sender.
3) Robust to interference: The aggregation performance Class B: The receiver has a packet with the same AID as
should be uninfluenced by intermittent link failures. specified in RTS but is farther away from the sink than the sender.
4) Fault tolerance: node failures should not influence the Class C: The receiver does not have a packet with the same
aggregation performance. AID but is closer to the sink than the sender.
If the receiver does not have the packet with the same AID and
4.1 Spatial and Temporal Convergence is also farther from the sink than the sender, it does not send a
To reduce the number of transmissions, aggregating the packets CTS.
near the sources is necessary. To reduce the overhead of
construction and maintenance, aggregation is done without Temporal Convergence: Temporal Convergence is used to
constructing an explicit structure. The two conditions essential for further improve the aggregation. Randomized Waiting is a simple
aggregation during transmission are spatial convergence and technique for achieving temporal convergence, in which nodes
temporal convergence. In order to aggregate the packets, they wait for a random delay before transmitting. In mobile event
must be transmitted to the same node at the same time. In the triggered networks, nodes are unable to know which nodes are
structured approaches, nodes transmit packets to their parents in triggered and have packets to transmit in advance. Therefore
the aggregation tree and parents wait for packets from all their nodes can not know if they should wait for their upstream nodes
children before transmitting the aggregated packets, thus and how long they should wait for aggregation.
accomplishing the two conditions. Nodes do not identify where When a node detects an event and generates a packet for
they should send packets to and how long they should wait for reporting, it picks a random delay between 0 and t before
aggregation in the absence of explicit message exchanges in transmitting, where t is a network parameter that specifies the
structure-less aggregation. Consequently, to enhance the chance of maximum delay. After delaying the packet, the node broadcasts an
aggregation, the enhancement of spatial or temporal convergence RTS packet containing an Aggregation ID. In [11], the timestamp
is vital. is used as the Aggregation ID, which means that packets
generated at the same time can be aggregated. When a node
Spatial Convergence Using Data Aware Anycast. Anycast can receives an RTS packet, it checks if it has packets with the same
be employed to forward packets to nodes that can accomplish Aggregation ID. If it does, it has higher priority for replying with
aggregation in order to accomplish Spatial Convergence. Any cast a CTS than nodes that do not have packets for aggregation. The
routing scheme relies upon on some routing metrics to forward priority is decided by the delay of replying a CTS packet. Nodes
packets to the best one or any one, of a group of target with higher priority reply a CTS with shorter delay. If a node
destinations. The any cast mechanism permits the sender to overhears any traffic before transmitting its CTS packet, it cancels
forward packets to any one of the nodes which are capable to the CTS transmission in order to avoid collision of multiple CTS
notify if they can aggregate the transmitting packet by utilizing responses at the sender. Therefore, nodes can send their packets
the nature of wireless radio transmission in sensor networks where for aggregation as long as at least one of its neighbors has a packet
all nodes within the transmission range can receive the packet. with the same Aggregation ID.

50
©2010 International Journal of Computer Applications (0975 - 8887)
Volume 1 – No. 28

Dynamic Forwarding over ToD: There is no assurance that ToD in One Dimensional Networks: For illustrating the concept
DAA aggregates all the packets into one packet. So when DAA of ToD, we first describe the construction of ToD for a 1-D (a
can not aggregate packets any more, the Dynamic Forwarding single row of nodes) network, as shown in Fig. 1. We assume that
technique can be used for further aggregation. It uses the ToD the nodes can communicate with their adjacent nodes in the same
structure [12], to avoid the problem of long stretch. row through one hop.

Fig. 1: Architecture of ToD in One Dimensional Networks

We employ a square with side length D which is greater than event. Dynamic Forwarding evades the long stretch problem
the maximum diameter of the area that an event can span to discussed earlier by utilizing this property.
define a cell. The network is split into cells. F-clusters (First- As shown in Fig. 1(c), the F-aggregators connect themselves
level clusters) are the clusters obtained by grouping these to the S-aggregators of S-clusters which its F-cluster overlaps
cells. The size of the F-clusters must be big enough to envelop with, after the construction of S-Tree. For instance, in Fig.
the cells an event can span. When we only consider 1-D cells 1(c), owing to the fact that F-cluster of F-aggregator F4
in the network, the size is two. The packets of all the nodes in overlaps with S-cluster 3 and 4, it connects to S-aggregators
F-clusters are sent to F-aggregators (First level aggregators), S3 and S4. Consequently, a Directed Acyclic Graph which we
their cluster-heads. It is to be noted that the distance between refer to as the ToD (Tree on DAG) is formed by combining F-
the nodes in the F-cluster and the F-aggregator can be multiple Tree and S-Tree.
hops. Subsequently, a shortest path to the sink is created by Nodes initially attempt to aggregate as many packets as
every F-aggregator. Consequently, the structure of a shortest possible by employing the Data Aware Anycast (DAA)
path tree with sink as root and F-aggregators as leaves is approach. Nodes forward their packets to the F-aggregator in
obtained, known as F-Tree. The construction of the F-Tree is its F-cluster when no additional aggregation can be achieved
illustrated in Fig. 1(a). by DAA. The packets of an event triggering only the nodes
We generate the second type of clusters, S-clusters (Second- within a single F-cluster can be aggregated at the F-aggregator
level clusters) for these cells besides the F-clusters. Similar to and the F-Tree can be utilized to forward them to the sink.
F-clusters, the size of an S-cluster must be large enough to Nevertheless, the corresponding packets of the events will be
cover all cells spanned by an event and it should be able to forwarded to different F-aggregators when the event spans
cover adjacent cells in different F-clusters by interleaving with multiple F-clusters. An event on the boundary of F-clusters
the F-clusters. Additionally, for aggregating packets, a cluster- will only trigger nodes in cells on the boundary of the F-
head, S-aggregator is present in every S-cluster. A shortest clusters based on our assumption that the event size is not
path is created to the sink and a second shortest path tree is larger than the size of a cell. The adjacent cells on the
formed in the network by every S-aggregator. We use the term boundary of F-clusters belong to the same S-cluster owing to
“S-Tree” to denote the tree formed. Fig. 1(b) illustrates an S- the construction of S-clusters. Hence, F-aggregators can select
Tree. Either the same F-cluster or the same S-cluster will the S-aggregator that is best suited for further aggregation by
include all sets of nearby cells that can be triggered by an utilizing the information collected from received packets. The
sources of traffic that can be encoded in the packets provide

51
©2010 International Journal of Computer Applications (0975 - 8887)
Volume 1 – No. 28

this information. Such information is readily available in the 6. Performance Evaluation


packet, time and again. If not, the cell from which the packet
comes from can be indicated by employing 4 extra bits. 6.1. Simulation Setup
The performance of PEEDA scheme is evaluated through NS2
simulation. A 100 node random network deployed in an area
5. Reducing the Data Aggregation Latency of 500 X 500 m is considered. Initially the nodes are placed
A significant goal in wireless sensor networks (WSNs) is to randomly in the specified area. The base station is assumed to
reduce the latency of data aggregation. For instance, in be situated 100 meters away from the above specified area.
surveillance applications, to carry out suitable actions swiftly, The initial energy of all the nodes assumed as 2.1 joules. In
it is vital that an event detected needs to be reported to the sink the simulation, the channel capacity of mobile hosts is set to
in real time. In data aggregation, Minimum Latency the same value: 2 Mbps. The distributed coordination function
Scheduling (Mls) problem is defined as follows. For a given (DCF) of IEEE 802.11 is used for wireless LANs as the MAC
wireless senor network that consists of a number of sensors layer protocol. The simulated traffic is CBR with UDP source
and a sink, based on an assumption that each sensor has a and sink. Table 1 summarizes the simulation parameters used.
piece of data to be aggregated and transmitted to the sink, the
Mls problem is to design a transmission schedule for all Table 1: Simulation Parameters
sensors such that there is no conflict between any two No. of Nodes 100
concurrent transmissions and a minimum total number of Area Size 500 X 500
timeslots for all data to reach the sink is obtained. The time
Mac 802.11
taken for the transmission of one data packet defines a
Simulation Time 100 sec
timeslot [3].
Most of the existing works assume all the sensors use the Traffic Source CBR
same channel, in which the interference among these sensors Packet Size 512
greatly limits the minimum latency. The introduction of multi- Transmit Power 0.360 w
channel schemes into wireless networks has reduced the Receiving Power 0.395 w
interference. Nevertheless, a single radio transceiver is Idle Power 0.335 w
typically included in the sensors in most of the WSNs. High Initial Enegy 2.1 J
speed channel switching is necessary for a sensor to receive Transmission Range 75m
and transmit data on different channels so as to employ
multiple channels in such single radio sensor networks. This 6.2 Performance Metrics
channel switching is not practical for sensor networks as it The performance of PEEDA is compared with the SAFE [7]
involves additional hardware design cost, non-negligible protocol. The performance is evaluated mainly, according to
switching delay, synchronization overhead and energy cost the following metrics.
[3], [4].
Of late, the utilization of partially overlapped channels for Control overhead: The control overhead is defined as the
communication was proposed by Mishra et al. [15]. For total number of routing control packets normalized by the total
instance, only 11 channels are provided by IEEE 802.11b number of received data packets.
standard. Each channel has a spread of 22 MHz and only 5
MHz separate the center frequencies of neighboring channels. Average end-to-end delay: The end-to-end-delay is averaged
Consequently, a channel and several adjacent channels may over all surviving data packets from the sources to the
overlap. Two nodes can use adjacent channels to communicate destinations.
with each other, provided that there is enough overlapped
frequency between the transmitting channel and the receiving Average Packet Delivery Fraction (PDF): It is the ratio of
channel and receiver must be able to decode the signal which the number .of packets received successfully and the total
is possible only when the physical distance between these two number of packets transmitted.
nodes is close enough. The term “the communication by using
Partially Overlapped Channels (POCs)” is used to denote this Energy Consumption: It is the average energy consumption
technology. The interference can be substantially reduced and of all nodes in sending, receiving and forward operations
there is no need for sensors to switch dynamically among The simulation results are presented in the next section
different channels when POCs is employed in sensor
networks.
Every node has the same fixed transmission power T, which is
measured as the valid distance for a receiver on the same
channel to decode the sender’s signal. By using POCs for
communication, the valid transmission distance between two
nodes decreases (compared with that two nodes use the same
channel), because only a part of the signal power transmitted
by the sender can be picked out by the receiver.

52
©2010 International Journal of Computer Applications (0975 - 8887)
Volume 1 – No. 28

6.3. Simulation Results Figure 2 shows the results of average end-to-end delay. From
the results, it can be seen that PEEDA scheme outperforms the
Nodes Vs Delay SAFE scheme by attaining low delay.
Next, the average energy consumption is measured. From
0.002 Figure 3, it can be seen that, PEEDA consumes less energy
when compared with the SAFE.
0.0015
Figure 3 shows the results of average packet delivery fraction
PEEDA
0.001 (PDF). Clearly PEEDA scheme achieves more PDF than the
SAFE
SAFE scheme since it has cost effective aggregation tree
0.0005
architecture.
0 Figure 4 shows the results of routing overhead. From the
25 50 75 100 results, it can be seen that PEEDA scheme outperforms the
N o d es SAFE scheme by attaining low overhead.

Fig. 2 Nodes Vs Delay 7. Conclusion


Address Centric protocols and Data-Centric Protocols are the
Nodes Vs Energy two kinds of sensor routing protocols. In case of wireless
routing in sensor networks, data aggregation has been
0.6 proposed as a predominantly constructive prototype. Most of
the routing algorithms for traditional networks are address
Energy(J)

0.4 PEEDA centric, and the ad hoc nature of wireless sensor network
SAFE makes them unsuitable for practical applications. In case of
0.2
wireless routing in sensor networks, data aggregation has been
0 proposed as a predominantly constructive prototype.
25 50 75 100 In this paper, we have proposed a Pull based Energy Efficient
Data Aggregation (PEEDA) approach, to effectively deliver
Nodes the data to the sink. In this approach, the sink will broadcast
an interest message containing its required data model, to all
Fig. 3 Nodes Vs Energy Consumption the nodes. We form an cost effective aggregation tree towards
the sink based on the ToD structure.
Nodes Vs PDF When the aggregator receives the data from the sources, it
aggregates the data depending on the interest message using
100
spatial and temporal convergence. It uses the Data Aware
Anycast (DAA) approach for the spatial and temporal
80
convergence. To achieve energy efficient aggregation, the
60 PEEDA MAC protocol uses the partially overlapped channels. The
40 SAFE simulation results show that the proposed scheme consumes
20 less energy and reduces the overhead and delay.
0
25 50 75 100
References
N o d es 1. B. Krishnamachari, D. Estrin, and S. Wicker,(2002.)”
Modelling data centric routing in wireless sensor
Fig. 4 Nodes Vs Packet Delivery Fraction networks”, Technical Report CENG 02-14, USC
Computer Engineering.
Nodes Vs Overhead 2. Kai-Wei Fan, Sha Liu and Prasun Sinha,(2006) " Scalable
Data Aggregation for DynamicEvents in Sensor
2000 Networks", in proc. of 4th International Conference on
Embedded Networked Sensor Systems, pp: 181- 194.
1500
3. Baobing Wang, Xiaohua Jia and Xiaodong Hu. “Reduce
PEEDA
1000 Data Aggregation Latency by Using Partially Overlapped
SAFE
Channels in Wireless Sensor Networks” Submitted to
500
IEEE Transactions on Wireless Communications.
0 4. Wendi Rabiner Heinzelman, Joanna Kulik, and Hari
25 50 75 100 Balakrishnan, (1999)"Adaptive Protocols for Information
N o d es Dissemination in Wireless Sensor Networks", in proc. of
5th Annual ACM/IEEE International Conference on
Fig. 5 Nodes Vs Overhead Mobile Computing and Networking", pp: 174- 185.
5. S. Selvakennedy, S. Sinnappan and Yi Shang, (May
Wee vary the number of nodes as 25,50,75 and 100. 2006.)"T-ANT: A Nature-Inspired Data Gathering

53
©2010 International Journal of Computer Applications (0975 - 8887)
Volume 1 – No. 28

Protocol for Wireless Sensor Networks", in proceedings 11. Kai-Wei Fan, Sha Liu, and Prasun Sinha, (August 2007)
of Journal on Communications, vol. 1, no. 2. "Structure-free Data Aggregation in Sensor Networks",
6. Selvadurai Selvakennedy and Sukunesan Sinnappan,( April IEEE Transactions on Mobile Computing, vol. 6, no. 8,
2006) "An Energy-Efficient Clustering Algorithm for pp: 929- 942, Doi: 10.1109/TMC.2007.1011.
Multihop Data Gathering in Wireless Sensor Networks", 12. Prakash G L, Thejaswini M, S H Manjula, K R
in proceedings of Journal on Computers, vol. 1, no. 1. Venugopal and L M Patnaik,( Jan. 2009) "Tree-on-DAG
7. Sooyeon Kim, Sang H. Sony, John A. Stankovicy, Shuoqi for Data Aggregation in Sensor Networks", in
Liy and Yanghee Choi, (19- 22 May 2003)"SAFE: A proceedings of World Academy of Science, Engineering
Data Dissemination Protocol for Periodic Updates in and Technology, vol. 37.
Sensor Networks", in proc. of 23rd International 13. Shweta Jain and Samir R. Das,(13- 16 June 2005)
Conference on Distributed Computing Systems "Exploiting Path Diversity in the Link Layer in Wireless
Workshops, pp: 228- 234, Doi: Ad Hoc Networks",in proceedings of sixth IEEE
10.1109/ICDCSW.2003.1203559. International Symposium on World of Wireless Mobile
8. Dandan Liu , Xiaodong Hu and Xiaohua Jia ,(2006) and Multimedia Networks, pp: 22- 30, Doi:
"Energy efficient information dissemination protocols by 10.1109/WOWMOM.2005.42.
negotiation for wireless sensor networks", in proceedings 14. Michele Zorzi and Ramesh R. Rao,(Oct- Dec 2003)
of Journal on Computer Communications, vol. 29, pp: "Geographic Random Forwarding (GeRaF) for adhoc and
2136- 2149. sensor networks: multihop performance", IEEE
9. Ragib Hasan and Marianne Winslett,( May 2006) "Synergy: Transactions on Mobile Computing, vol. 2, no. 4,pp: 337-
A Policy-driven, Trust-aware Information Dissemination 348, Doi: 10.1109/TMC.2003.1255648.
Framework", in proc. of IEEE Conference on Intelligence 15. Arunesh Mishra, Eric Rozner , Suman Banerjee and
and Security, vol. 3975, pp: 516- 521. William Arbaugh, (2005). "Exploiting Partially
10. Weifa Liang and Yuzhen Liu, (January 2007) “Online Overlapping Channels in Wireless Networks: Turning a
Data Gathering for Maximizing Network Lifetime in Peril into an Advantage", in proceedings of 5th ACM
Sensor Networks", IEEE Transactions on Mobile SIGCOMM Conference on Internet Measurement, pp:
Computing, vol. 6, no. 1. 311- 316, October , Berkeley.

54

You might also like