scholarly journals Prolonging the Lifetime of Wireless Sensor Networks: A Review of Current Techniques

2018 ◽  
Vol 2018 ◽  
pp. 1-23 ◽  
Author(s):  
Felicia Engmann ◽  
Ferdinand Apietu Katsriku ◽  
Jamal-Deen Abdulai ◽  
Kofi Sarpong Adu-Manu ◽  
Frank Kataka Banaseka

There has been an increase in research interest in wireless sensor networks (WSNs) as a result of the potential for their widespread use in many different areas like home automation, security, environmental monitoring, and many more. Despite the successes gained, the widespread adoption of WSNs particularly in remote and inaccessible places where their use is most beneficial is hampered by the major challenge of limited energy, being in most instances battery powered. To prolong the lifetime for these energy hungry sensor nodes, energy management schemes have been proposed in the literature to keep the sensor nodes alive making the network more operational and efficient. Currently, emphasis has been placed on energy harvesting, energy transfer, and energy conservation methods as the primary means of maintaining the network lifetime. These energy management techniques are designed to balance the energy in the overall network. The current review presents the state of the art in the energy management schemes, the remaining challenges, and the open issues for future research work.

2017 ◽  
Vol 2017 ◽  
pp. 1-19 ◽  
Author(s):  
Ammar M. A. Abu Znaid ◽  
Mohd. Yamani Idna Idris ◽  
Ainuddin Wahid Abdul Wahab ◽  
Liana Khamis Qabajeh ◽  
Omar Adil Mahdi

The advancement of digital technology has increased the deployment of wireless sensor networks (WSNs) in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, especially in critical applications. The pioneering technique in range-free localization schemes is a sequential Monte Carlo (SMC) method, which utilizes network connectivity to estimate sensor location without additional hardware. This study presents a comprehensive survey of state-of-the-art SMC localization schemes. We present the schemes as a thematic taxonomy of localization operation in SMC. Moreover, the critical characteristics of each existing scheme are analyzed to identify its advantages and disadvantages. The similarities and differences of each scheme are investigated on the basis of significant parameters, namely, localization accuracy, computational cost, communication cost, and number of samples. We discuss the challenges and direction of the future research work for each parameter.


Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 504
Author(s):  
Rajan Kadel ◽  
Krishna Paudel ◽  
Deepani B. Guruge ◽  
Sharly J. Halder

Error Correction Schemes (ECSs) significantly contribute to enhancing reliability and energy efficiency of Wireless Sensor Networks (WSNs). This review paper offers an overview of the different types of ECS used in communication systems and a synopsis of the standards for WSN. We also discuss channels and network models for WSN as they are crucial for efficient ECS design and implementation. The literature review conducted on the proposed energy consumption and efficiency models for WSN indicates that existing research work has not considered Single Hop Asymmetric Structure (SHAS) with high performing Error Correcting Codes (ECCs). We present a review on proposed ECS for WSN based on three criteria: Forward Error Correction (FEC), adaptive error correction techniques, and other techniques. Based on our review work, we found that there are limited works on ECS design on a realistic network model i.e., a modified multi-hop WSN model. Finally, we offer future research challenges and opportunities on ECS design and implementation for WSN.


Author(s):  
Ananda Kumar K S ◽  
Balakrishna R

At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.


Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs). Key management schemes are one of the core concepts that ensure the security of WSNs. Prior key management schemes failed to provide required security arrangements in WSNs. Authentication is the core parameters that assess the capability of the deployed sensor nodes in the communication fields. In this paper, we review the existing authentication protocols by stating its merits and demerits. It is observed that the need for a secure and efficient authentication protocol is still in demand, owing to the real issues like identity overheads, information retrieval and location mining. This paper will assist the upcoming researchers to have an insight into the significance of lightweight authentication protocols in WSNs.


2014 ◽  
Vol 13 (9) ◽  
pp. 4898-4906
Author(s):  
Hesham A. El Zouka

The design of secure and survivable nodes is one of the most vital issues in designing energy-efficient protocols for wireless sensor network where the energy, memory and computational power of sensor nodes are limited. In this paper, some of the challenges facing the wireless sensor networks are discussed in attempting to prolong the battery lifetime of the nodes, and to secure the communication channel. While most of these attacks can be dealt with through cryptographic security protocols provided by key management schemes, there are always a few that manage to really cause problems. One such attack that is most common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture and compromise some nodes and inject them into several locations throughout the network in order to conduct other types of attacks. Moreover, if this attack is not detected early, then these replicated injected nodes will consume a large amount of the network resources. Several possible approaches are suggested to improve the security, authentication protocols, and key management schemes in WSNs.  Furthermore, utilizing the existing security protocols in wireless sensor networks has led us to propose a secure framework which incorporates security protocols in a way that minimizes the energy consumption of the sensor nodes. Our algorithm ensures data confidentiality, node authentication, and data integrity while remaining within acceptable memory, time and energy constrains.


Author(s):  
Fernando Gielow ◽  
Michele Nogueira ◽  
Aldri Santos

The use of Wireless Sensor Networks (WSNs) has increased over the past years, supporting applications such as environmental monitoring, security systems, and multimedia streaming. These networks are characterized by a many-to-one traffic pattern. Hence, sensor nodes near to the sink have higher energy consumption, being prone to earlier deaths and failures. Those areas overloaded with high traffic rates are called Hot Spots, and their emergence creates and expands energy holes that compromise network lifetime and data delivery rates, and may result in disconnected areas. This chapter provides an overview of techniques to mitigate Hot Spot impacts, such as the uneven distribution of sensors, routes that balance energy consumption, sink mobility, and the use of unequal clustering. Further, it depicts the approach for achieving mitigation of sink centered Hot Spots. Finally, this chapter presents conclusions and future research perspectives.


2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Ranganathan Mohanasundaram ◽  
Pappampalayam Sanmugam Periasamy

The current high profile debate with regard to data storage and its growth have become strategic task in the world of networking. It mainly depends on the sensor nodes called producers, base stations, and also the consumers (users and sensor nodes) to retrieve and use the data. The main concern dealt here is to find an optimal data storage position in wireless sensor networks. The works that have been carried out earlier did not utilize swarm intelligence based optimization approaches to find the optimal data storage positions. To achieve this goal, an efficient swam intelligence approach is used to choose suitable positions for a storage node. Thus, hybrid particle swarm optimization algorithm has been used to find the suitable positions for storage nodes while the total energy cost of data transmission is minimized. Clustering-based distributed data storage is utilized to solve clustering problem using fuzzy-C-means algorithm. This research work also considers the data rates and locations of multiple producers and consumers to find optimal data storage positions. The algorithm is implemented in a network simulator and the experimental results show that the proposed clustering and swarm intelligence based ODS strategy is more effective than the earlier approaches.


Author(s):  
Sumit Kumar ◽  
Deepti Singhal ◽  
Garimella Rama Murthy

Scarcity of spectrum is increasing not only in cellular communication but also in wireless sensor networks. Adding cognition to the existing wireless sensor network (WSN) infrastructure has helped. As sensor nodes in WSN are limited with constraints like power, efforts are required to increase the lifetime and other performance measures of the network. In this article, the authors propose Doubly Cognitive WSN, which works by progressively allocating the sensing resources only to the most promising areas of the spectrum and is based on pattern analysis and learning. As the load of sensing resource is reduced significantly, this approach saves the energy of the nodes and reduces the sensing time dramatically. The proposed method can be enhanced by periodic pattern analysis to review the strategy of sensing. Finally the ongoing research work and contribution on cognitive wireless sensor networks in Communication Research Centre (IIIT-H) is discussed.


2020 ◽  
Vol 8 (5) ◽  
pp. 1049-1054

Wireless Sensor Networks (WSN) are constructed by interconnecting miniature sensor nodes for monitoring the environment uninterrupted. These miniature nodes are having the sensing, processing and communication capability in a smaller scale powered by a battery unit. Proper energy conservation is required for the entire system. Clustering mechanism in WSN advances the lifetime and stability in the network. It achieves data aggregation and reduces the number of data transmission to the Base station (BS). But the Cluster Head (CH) nodes are affected by rapid energy depletion problem due to overload. A CH node spends its energy for receiving data from its member nodes, aggregation and transmission to the BS. In CH election, multiple overlapping factors makes it difficult and inefficient which costs the lifetime of the network. In recent years, Fuzzy Logic is widely used for CH election mechanism for WSN. But the underlying problem of the CHs node continues. In this research work, a new clustering algorithm DHCFL is proposed which elects two CHs for a cluster which shares the load of a conventional CH node. Data reception and aggregation will be done by CH aggregator (CH-A) node and data transmission to the BS will be carried over by CH relay (CH-R) node. Both CH-A and CH-R nodes are elected through fuzzy logic which addresses the uncertainty in the network too. The proposed algorithm DHCFL is compared and tested in different network scenarios with existing clustering algorithms and it is observed that DHCFL outperforms other algorithms in all the network scenarios.


Author(s):  
Ghalib A. Shah ◽  
Shaleeza Sohail ◽  
Faisal B. Hussain

Wireless Sensor Networks (WSNs) have been envisioned as a new and effective means for creating and deploying previously unimaginable applications. These networks generally have the capabilities of observing the physical phenomena, communication, data processing and dissemination. Limited resources of sensor nodes like energy, bandwidth and processing abilities, make these networks excellent candidates for incorporating QoS framework. The possible applications of WSNs are numerous while being diverse in nature which makes analyzing and designing QoS support for each application a non-trivial task. At the same time, these applications require different type of QoS support from the network for optimum performance. A single layer cannot address all these issues, hence, numerous researchers have proposed protocols and architectures for QoS support at different network layers. In this chapter, the authors identify the generic QoS parameters which are usually supported at different layers of WSNs protocol stack and investigate their importance in different application models. A brief overview of significant research contribution at every network layer is provided. It is worthwhile to mention that same QoS parameter may be supported at multiple layers, hence, adequate selection of suitable mechanism would be application’s choice. On the other hand, it is quite possible that a single QoS parameter, such as energy conservation or real-time delivery, can be efficiently supported through interaction of multiple layers. It is difficult, if not impossible to optimize multi layer QoS architecture. Hence, a number of researchers have also proposed the idea of cross layer architecture for providing QoS support for a number of sensor applications, which is also discussed in this chapter. At the end, the authors highlight the open research issues that might be the focus of future research in this area.


Sign in / Sign up

Export Citation Format

Share Document