A multi-flooding data transmission mechanism for low-duty-cycle wireless sensor network

Author(s):  
Le Tian
Author(s):  
Ahmad Aiman Shallahuddin ◽  
Mohd Fadzil Abdul Kadir ◽  
Mohamad Afendee Mohamed ◽  
Ahmad Faisal Amri Abidin@Bharun ◽  
Nor Surayati Mohamad Usop ◽  
...  

2016 ◽  
Vol 16 (5) ◽  
pp. 88-96
Author(s):  
Shuhong Cheng ◽  
Wenke Zhang

Abstract This paper presents SRBC, a new design for synchronous rendezvous in low-duty-cycle Wireless Sensor Network (WSN).The main idea of SRBC is utilizing the cluster, which includes a part of the sensor nodes in the WSN. Each node in a cluster alters its clock drift as well as its skew towards the central node of the cluster through exchange of their clock information with normal communication. Then it reduces the overhead of the process usual for the traditional time-stamp exchange. In different clusters, the border nodes exchange the relative clock drift as well as the skew to improve the performance during the synchronous rendezvous. Results show that the design of SRBC is practical and effective.


2015 ◽  
Vol 23 (3) ◽  
pp. 922-930 ◽  
Author(s):  
Zhichao Cao ◽  
Yuan He ◽  
Qiang Ma ◽  
Yunhao Liu

Webology ◽  
2021 ◽  
Vol 18 (05) ◽  
pp. 1226-1235
Author(s):  
Vasuki C ◽  
Dr. Kavitha S ◽  
Bhuvaneswari S

Wireless sensor networks are greatly utilized by various applications and environments to sense and transmit the data. As wireless sensor network doesn’t have any centralized architecture, there will be various issues occurs in the network such as data transmission failure, data security issues, energy resource limitation and so on. Various authors focused these issues and published different research works to resolve these issues. In this analysis work, energy efficient and secured data transmission techniques introduced by various authors has been discussed in detailed based on their working procedure and simulation methods. And also this research work provided the overall analysis of the research work based on merits and demerits and each and every technique discussed in the literature section. And also, this research work concluded with numerical evaluation between most recent works in terms of energy consumption and security level. This numerical evaluation is done in the NS2 simulation environment.


Sign in / Sign up

Export Citation Format

Share Document