Analysis of wireless sensor networks with sleep mode and threshold activation

2021 ◽  
Author(s):  
Zhanyou Ma ◽  
Xiangran Yu ◽  
Shanshan Guo ◽  
Yang Zhang
2014 ◽  
Vol 13 (9) ◽  
pp. 4868-4880
Author(s):  
Sukhvinder Singh Bamber

This paper investigates the radio receiver Bit Error Rate (BER) at different types of devices in IEEE 802.15.4 Wireless Sensor Networks (WSNs) for the different current draw parameters: transmit mode, receive mode, sleep mode and idle mode keeping other parameters like: initial energy and power supply same for all motes; Clearly proving that if BER is to be taken into consideration for the performance enhancement then Z1 mote should be implemented in IEEE 802.15.4 WSNs as they produce minimal BER. 


Sensors ◽  
2019 ◽  
Vol 19 (4) ◽  
pp. 945 ◽  
Author(s):  
Yi Xu ◽  
Guiling Sun ◽  
Tianyu Geng ◽  
Jingfei He

Sparse sensing schemes based on matrix completion for data collection have been proposed to reduce the power consumption of data-sensing and transmission in wireless sensor networks (WSNs). While extensive efforts have been made to improve the recovery accuracy from the sparse samples, it is usually at the cost of running time. Moreover, most data-collection methods are difficult to implement with low sampling ratio because of the communication limit. In this paper, we design a novel data-collection method including a Rotating Random Sparse Sampling method and a Fast Singular Value Thresholding algorithm. With the proposed method, nodes are in the sleep mode most of the time, and the sampling ratio varies over time slots during the sampling process. From the samples, a corresponding algorithm with Nesterov technique is given to recover the original data accurately and fast. With two real-world data sets in WSNs, simulations verify that our scheme outperforms other schemes in terms of energy consumption, reconstruction accuracy, and rate. Moreover, the proposed sampling method enhances the recovery algorithm and prolongs the lifetime of WSNs.


2014 ◽  
Vol 11 (3) ◽  
pp. 1017-1035 ◽  
Author(s):  
Young-Long Chen ◽  
Mu-Yen Chen ◽  
Fu-Kai Cheung ◽  
Yung-Chi Chang

Energy is limited in wireless sensor networks (WSNs) so that energy consumption is very important. In this paper, we propose a hybrid architecture based on power-efficient gathering in sensor information system (PEGASIS) and low-energy adaptive clustering hierarchy (LEACH). This architecture can achieve an average distribution of energy loads, and reduced energy consumption in transmission. To further extend the system lifetime, we combine the intersection-based coverage algorithm (IBCA) with LEACH architecture and the hybrid architecture to prolong the system lifetime that introducing sensor nodes to enter sleep mode when inactive. This step can save more energy consumption. Simulation results show that the performance of our proposed LEACH architecture with IBCA and the hybrid architecture with IBCA perform better than LEACH architecture with PBCA in terms of energy efficiency, surviving nodes and sensing areas.


2002 ◽  
Vol 03 (03n04) ◽  
pp. 213-229 ◽  
Author(s):  
Mihaela Cardei ◽  
David MacCallum ◽  
Maggie Xiaoyan Cheng ◽  
Manki Min ◽  
Xiaohua Jia ◽  
...  

A critical aspect of applications with wireless sensor networks is network lifetime. Battery-powered sensors are usable as long as they can communicate captured data to a processing node. Sensing and communications consume energy, therefore judicious power management and scheduling can effectively extend the operational time. One important class of wireless sensor applications of deployment of large number of sensors in an area for environmental monitoring. The data collected by the sensors is sent to a central node for processing. In this paper we propose an efficient method to achieve energy savings by organizing the sensor nodes into a maximum number of disjoint dominating sets (DDS) which are activated successively. Only the sensors from the active set are responsible for monitoring the target area and for disseminating the collected data. All other nodes are into a sleep mode, characterized by a low energy consumption. We define the maximum disjoint dominating sets problem and we design a heuristic that computes the sets. Theoretical analysis and performance evaluation results are presented to verify our approach.


Author(s):  
Zeydin Pala

Wireless sensor networks (WSNs) still attract the attention of researchers, users and the private sector despite their low power and low range tendency for malfunction. This attraction towards WSNs results from their low cost structure and the solutions they offer for many prevalent problems. Many conditions, which remain unforeseen or unexpected during the design of the system, may arise after the initialization of the system. Similarly, many situations where security vulnerabilities take place may emerge in time in WSNs operating normally. In this study, we called nodes which enter sleeping mode without any further waking up and causing a sparser number of nodes in the network without any function in data transmission as Long-Term Sleep Nodes (LT-SN); and considered energy spaces caused by such nodes as a problem; and established two Linear Programming (LP) models based on the efficiency of the present nodes. We offered two different models which present the effect of sensor nodes, which were initially operating in wireless sensor network environment and did not wake up following sleep mode, on network lifetime. The results of the present study report that as the number of LT-SN increases, the lifetime of the network decreases.


2010 ◽  
Vol 9 (7) ◽  
pp. 955-968 ◽  
Author(s):  
Raja Jurdak ◽  
Antonio G Ruzzelli ◽  
Gregory M P O'Hare

Author(s):  
Christophe Guyeux ◽  
Abdallah Makhoul ◽  
Ibrahim Atoui ◽  
Samar Tawbi ◽  
Jacques M. Bahi

Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework, the authors emphasize the following areas: (1) secure communication infrastructure, (2) secure scheduling, and (3) a secure data aggregation algorithm. Due to resource constraints, specific strategies are often necessary to preserve the network's lifetime and its quality of service. For instance, to reduce communication costs, data can be aggregated through the network, or nodes can go to sleep mode periodically (nodes scheduling). These strategies must be proven as secure, but protocols used to guarantee this security must be compatible with the resource preservation requirement. To achieve this goal, secure communications in such networks will be defined, together with the notions of secure scheduling and secure aggregation. The concepts of indistinguability, nonmalleability, and message detection resistance will thus be adapted to communications in wireless sensor networks. Finally, some of these security properties will be evaluated in concrete case studies.


Sign in / Sign up

Export Citation Format

Share Document