• Title/Summary/Keyword: Efficient networks

Search Result 3,236, Processing Time 0.023 seconds

Energy Efficient Two-Tier Routing Protocol for Wireless Sensor Networks (센서 네트워크에서 에너지 효율성을 고려한 two-tier 라우팅 프로토콜)

  • Ahn Eun-Chul;Lee Sung-Hyup;Cho You-Ze
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.103-112
    • /
    • 2006
  • Since sensor node has a limited energy supply in a wireless sensor network, it is very important to maximize the network lifetime through energy-efficient routing. Thus, many routing protocols have been developed for wireless sensor networks and can be classified into flat and hierarchical routing protocols. Recent researches focus on hierarchical routing scheme and LEACH is a representative hierarchical routing protocol. In this paper, we investigated the problems of the LEACH and proposed a novel energy efficient routing scheme, called ENTER(ENergy efficient Two-tiEr Routing protocol), to resolve the problem. ENTER reduces an energy consumption and increases a network lifetime by organizing clusters by the same distributed algerian as in the LEACH and establishing paths among cluster-heads to transmit the aggregated data to the sink node. We compared the performance of the ENTER with the LEACH through simulation and showed that the ENTER could enhance the network lifetime by utilizing the resources more efficiently.

Interactive Multipath Routing Protocol for Improving the Routing Performance in Wireless Sensor Networks

  • Jung, Kwansoo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.79-90
    • /
    • 2015
  • Multipath routing technique is recognized as one of the effective approaches to improve the reliability of data forwarding. However, the traditional multipath routing focuses only on how many paths are needed to ensure a desired reliability. For this purpose, the protocols construct additional paths and thus cause significant energy consumption. These problems have motivated the study for the energy-efficient and reliable data forwarding. Thus, this paper proposes an energy-efficient concurrent multipath routing protocol with a small number of paths based on interaction between paths. The interaction between paths helps to reinforce the multipath reliability by making efficient use of resources. The protocol selects several nodes located in the radio overlapped area between a pair of paths as bridge nodes for the path-interaction. In order to operate the bridge node efficiently, when the transmission failure has detected by overhearing at each path, it performs recovery transmission to recover the path failure. Simulation results show that proposed protocol is superior to the existing multipath protocols in terms of energy consumption and delivery reliability.

Dual Coalescent Energy-Efficient Algorithm for Wireless Mesh Networks

  • Que, Ma. Victoria;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.6
    • /
    • pp.760-769
    • /
    • 2007
  • In this paper, we consider a group mobility model to formulate a clustering mechanism called Dual Coalescent Energy-Efficient Algorithm (DCEE) which is scalable, distributed and energy-efficient for wireless mesh network. The differences of the network nodes will be distinguished to exploit heterogeneity of the network. Furthermore, a topology control, that is, adjusting the transmission range to further reduce power consumption will be integrated with the cluster formation to improve network lifetime and connectivity. Along with network lifetime and power consumption, clusterhead changes will be measured as a performance metric to evaluate the. effectiveness and robustness of the algorithm.

  • PDF

An Energy Efficient Clustering Scheme with Mobility Prediction for Dynamic Wireless Sensor Networks (동적 무선 센서 네트워크 상의 노드 이동성 예측을 융합한 에너지 효율기반 클러스트링 기법)

  • Jang, Woo-Hyun;Chang, Hyeong-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.412-415
    • /
    • 2011
  • 본 논문에서는 정적 무선 센서 네트워크상의 클러스터링 기법인 EECS(Energy Efficient Clustering Scheme)의 노드와 Base Station간의 거리를 고려한 head 선출 과정에 노드의 이동성 및 미래 위치 예측을 융합하여 확장한 새로운 동적환경상의 클러스터링 기법 EECS-M(Energy Efficient Clustering Scheme in Mobile wireless sensor networks)을 제안한다. 실험을 통하여 EECS-M이 동적 환경상의 LEACH-M, WCA 및 정적 환경상의 EECS, LEACH 클러스터링 알고리즘들에 비해 life time 및 life time 대비 네트워크의 잔여 에너지 측면에서 성능향상을 가진다는 것을 보인다.

A Survey of Energy Efficiency Optimization in Heterogeneous Cellular Networks

  • Abdulkafi, Ayad A.;Kiong, Tiong S.;Sileh, Ibrahim K.;Chieng, David;Ghaleb, Abdulaziz
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.462-483
    • /
    • 2016
  • The research on optimization of cellular network's energy efficiency (EE) towards environmental and economic sustainability has attracted increasing attention recently. In this survey, we discuss the opportunities, trends and challenges of this challenging topic. Two major contributions are presented namely 1) survey of proposed energy efficiency metrics; 2) survey of proposed energy efficient solutions. We provide a broad overview of the state of-the-art energy efficient methods covering base station (BS) hardware design, network planning and deployment, and network management and operation stages. In order to further understand how EE is assessed and improved through the heterogeneous network (HetNet), BS's energy-awareness and several typical HetNet deployment scenarios such as macrocell-microcell and macrocell-picocell are presented. The analysis of different HetNet deployment scenarios gives insights towards a successful deployment of energy efficient cellular networks.

An Energy-Efficient Multi-Hop Scheme Based on Cooperative MIMO for Wireless Sensor Networks

  • Peng, Yu-Yang;Abn, Seong-Beom;Pan, Jae-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9A
    • /
    • pp.796-800
    • /
    • 2011
  • An energy-efficient multi-hop scheme based on cooperative MIMO (multiple-input multiple-output) technique is proposed for wireless sensor networks, taking into consideration the modulation constellation size, transmission distance, and extra training overhead requirement. The scheme saves energy by selecting the hop length. In order to evaluate the performance of the proposed scheme, a detailed analysis of the energy and delay efficiencies in the proposed scheme compared with the equidistance scheme is presented. Results from numerical experiments indicate that by use of the proposed scheme significant savings in terms of total energy cousumption can be achieved.

Implementation of Efficient Routing Algorithm for Heterogeneous Home Networks based on PLC and IEEE 802.15.4 (전력선 통신과 IEEE 802.15.4를 기반한 이종 홈 네트워크를 위한 효율적 라우팅 알고리즘 구현)

  • Ha, Jae-Yeol;Lee, Kam-Rok;Heo, Jong-Man;Kim, Nam-Hun;Choi, Hae-Sul;Jeong, Beom-Jin;Gwon, Uk-Hyeon
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.7-8
    • /
    • 2007
  • In this paper, an efficient routing algorithm for the heterogeneous home network in which IEEE 802.15.4 compensates for limitations of PLC based home networks. The efficient routing algorithm changes the broadcast period of routing information frame according to the mobility of the node. We implemented the routing algorithm and built a test-bed.

  • PDF

Implementation of Multi-Precision Multiplication over Sensor Networks with Efficient Instructions

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.12-16
    • /
    • 2013
  • Sensor network is one of the strongest technologies for various applications including home automation, surveillance system and monitoring system. To ensure secure and robust network communication between sensor nodes, plain-text should be encrypted using encryption methods. However due to their limited computation power and storage, it is difficult to implement public key cryptography, including elliptic curve cryptography, RSA and pairing cryptography, on sensor networks. However, recent works have shown the possibility that public key cryptography could be made available in a sensor network environment by introducing the efficient multi-precision multiplication method. The previous method suggested a broad rule of multiplication to enhance performance. However, various features of sensor motes have not been considered. For optimized implementation, unique features should be handled. In this paper, we propose a fully optimized multiplication method depending on a different specification for sensor motes. The method improves performance by using more efficient instructions and general purpose registers.

KMMR: An Efficient and scalable Key Management Protocol to Secure Multi-Hop Communications in large scale Wireless Sensor Networks

  • Guermazi, Abderrahmen;Belghith, Abdelfettah;Abid, Mohamed;Gannouni, Sofien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.901-923
    • /
    • 2017
  • Efficient key distribution and management mechanisms as well as lightweight ciphers are the main pillar for establishing secure wireless sensor networks (WSN). Several symmetric based key distribution protocols are already proposed, but most of them are not scalable, yet vulnerable to a small number of compromised nodes. In this paper, we propose an efficient and scalable key management and distribution framework, named KMMR, for large scale WSNs. The KMMR contributions are three fold. First, it performs lightweight local processes orchestrated into upward and downward tiers. Second, it limits the impact of compromised nodes to only local links. Third, KMMR performs efficient secure node addition and revocation. The security analysis shows that KMMR withstands several known attacks. We implemented KMMR using the NesC language and experimented on Telosb motes. Performance evaluation using the TOSSIM simulator shows that KMMR is scalable, provides an excellent key connectivity and allows a good resilience, yet it ensures both forward and backward secrecy. For a WSN comprising 961 sensor nodes monitoring a 60 hectares agriculture field, KMMR requires around 2.5 seconds to distribute all necessary keys, and attains a key connectivity above 96% and a resilience approaching 100%. Quantitative comparisons to earlier work show that KMMR is more efficient in terms of computational complexity, required storage space and communication overhead.

An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks

  • Zhao, Zhen;Chen, Jie;Zhang, Yueyu;Dang, Lanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4250-4267
    • /
    • 2015
  • Although many revocable group signature schemes has been proposed in vehicular ad hoc networks (VANETs), the existing schemes suffer from long computation delay on revocation that they cannot adapt to the dynamic VANETs. Based on Chinese remainder theorem and Schnorr signature algorithm, this paper proposes an efficient revocable group signature scheme in VANETs. In the proposed scheme, it only need to update the corresponding group public key when a member quits the group, and in the meanwhile the key pairs of unchanged group members are not influenced. Furthermore, this scheme can achieve privacy protection by making use of blind certificates. Before joining to the VANETs, users register at local trusted agencies (LTAs) with their ID cards to obtain blind certificates. The blind certificate will be submitted to road-side units (RSUs) to verify the legality of users. Thus, the real identities of users can be protected. In addition, if there is a dispute, users can combine to submit open applications to RSUs against a disputed member. And LTAs can determine the real identity of the disputed member. Moreover, since the key pairs employed by a user are different in different groups, attackers are not able to track the movement of users with the obtained public keys in a group. Furthermore, performance analysis shows that proposed scheme has less computation cost than existing schemes.