• Title/Summary/Keyword: energy aware routing

Search Result 113, Processing Time 0.021 seconds

Power-aware Ad hoc On-Demand Distance Vector Routing for prolonging network lifetime of MANETs

  • Hoang, Xuan-Tung;Ahn, So-Yeon;Lee, Young-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1317-1320
    • /
    • 2002
  • We present in this paper a new version of AODV that incorporates with "Minimizing Maximum node cost" by formulating that metric as a cost function of residual energy of nodes. An additional parameter is added to the cost function to consider the routing performance along with power-efficiency. The motivation of adding that new parameter is originated from the trace off between power-saving behaviors and routing performance.

  • PDF

A Study on EVBT Improvement Scheme for Energy Efficient Routing in Wireless Sensor Networks (센서 네트워크에서 에너지 효율적인 라우팅을 위한 EVBT 개선방안에 관한 연구)

  • Lee, Sang-Hyeok;Jeong, Je-Hui;Yun, Tae-Bok;Lee, Ji-Hyeong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.11a
    • /
    • pp.249-252
    • /
    • 2007
  • 센서 네트워크에서의 에너지 효율적인 통신을 위한 infrastructure를 제공하고자 가상 백본(Virtu Backbone) 개념이 등장했다. 최근에는 트리 구조를 이용하여 가장 백본을 구성한 EVBT (Energy-aware Virtual Backbone Tree)가 제안되었다. 본 논문에서는 EVBT의 문제점을 개선한 m-EVBT(modified-EVBT) 생성 알고리즘에 대해 다룬다. EVBT와 달리 m-EVBT 생성 알고리즘은 백본 트리에 속하지 않은 센서 노드들의 업스트림 링크의 선정에 물리적 거리가 아닌 에너지 소모량 청보를 이용한다. 이 정보는 백본 트리를 만들 때 이용되는 ECR(EVBT Construction Request) 패킷에 포함되어 전송된다. 시뮬레이션을 통해 m-EVBT는 EVBT에 비해 데이터 전송시 에너지를 절약하고, 백본 트리 구축에 드는 추가적인 비용도 작다는 것을 확인할 수 있었다.

  • PDF

A Modified E-LEACH Routing Protocol for Improving the Lifetime of a Wireless Sensor Network

  • Abdurohman, Maman;Supriadi, Yadi;Fahmi, Fitra Zul
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.845-858
    • /
    • 2020
  • This paper proposes a modified end-to-end secure low energy adaptive clustering hierarchy (ME-LEACH) algorithm for enhancing the lifetime of a wireless sensor network (WSN). Energy limitations are a major constraint in WSNs, hence every activity in a WSN must efficiently utilize energy. Several protocols have been introduced to modulate the way a WSN sends and receives information. The end-to-end secure low energy adaptive clustering hierarchy (E-LEACH) protocol is a hierarchical routing protocol algorithm proposed to solve high-energy dissipation problems. Other methods that explore the presence of the most powerful nodes on each cluster as cluster heads (CHs) are the sparsity-aware energy efficient clustering (SEEC) protocol and an energy efficient clustering-based routing protocol that uses an enhanced cluster formation technique accompanied by the fuzzy logic (EERRCUF) method. However, each CH in the E-LEACH method sends data directly to the base station causing high energy consumption. SEEC uses a lot of energy to identify the most powerful sensor nodes, while EERRCUF spends high amounts of energy to determine the super cluster head (SCH). In the proposed method, a CH will search for the nearest CH and use it as the next hop. The formation of CH chains serves as a path to the base station. Experiments were conducted to determine the performance of the ME-LEACH algorithm. The results show that ME-LEACH has a more stable and higher throughput than SEEC and EERRCUF and has a 35.2% better network lifetime than the E-LEACH algorithm.

An Energy Efficient Routing Protocol using MAC-layer resources in Mobile Ad Hoc Networks (이동 애드혹 네트워크에서 MAC 계층 자원을 이용한 에너지 효율 라우팅 프로토콜)

  • Yoo, Dae-Hun;Choi, Woong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.219-228
    • /
    • 2007
  • End-to-end path setup and maintenance are very important for mobile ad-hoc wireless communications, because of the mobility and the limited battery capacity of the nodes in the networks. the AODV routing protocol is the one of mary proposed protocols. However, there are route failure problem with the Proposed protocols between intermediate nodes due to such mobility and exhausted battery characteristics, and this is because only the shortest hop count is considered for the route setup. If route failure happens. Problem such as the waste of bandwidth and the increment of the energy consumption occur because of the discarding data packets in the intermediate nodes and the path re-setup process required by the source node. In addition, it obviously causes the network lifetime to be shortened. This paper proposes a routing protocol based on the AODV routing protocol that it makes use of the remaining energy, signal strength and SNR of the MAC layer resources to setup a path.

  • PDF

A Study on an Efficient Routing Algorithm for Wireless Sensor Network (무선 센서네트워크에서 효율적인 라우팅 알고리즘에 관한 연구)

  • Kim, Byoung-Chan;Yim, Jae-Hong;Choi, Hong-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.887-898
    • /
    • 2009
  • Conventional routing protocols proposed for wireless sensor networks (WSNs) cannot fully accommodate the characteristics of WSNs. In particular, although it is possible to largely obtain benefits in the solution of energy consumption and global identification problems through applying position information, there are few protocols that actively apply such position information. In the case of geographical and energy aware routing (GEAR) that is a typical algorithm, which uses position information, it does not fully represent the characteristics of WSNs because it is limited to forward query messages and assumed as fixed network environments. The routing protocols proposed in this paper defines the direction of data, which is routed based on the position information of individual and target nodes, in which each node configures its next hop based on this direction and routes signals. Because it performs data-centric routing using position information, it does not require certain global identifications in order to verify individual nodes and is able to avoid unnecessary energy consumption due to the forwarding of packets by defining its direction.

Optimization Algorithm for Energy-aware Routing in Networks with Bundled Links (번들 링크를 가진 네트워크에서 에너지 인식 라우팅을 위한 최적화 알고리즘)

  • Jang, Kil-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.4
    • /
    • pp.572-580
    • /
    • 2021
  • In order to reduce transmission delay and increase reliability in networks, mainly high-performance and high-power network equipment is used to guarantee network quality. In this paper, we propose an optimization algorithm to minimize the energy consumed when transmitting traffic in networks with a bundle link composed of multiple physical cables. The proposed optimization algorithm is a meta-heuristic method, which uses tabu search algorithm. In addition, it is designed to minimize transmission energy by minimizing the cables on the paths of the source and destination nodes for each traffic. In the proposed optimization algorithm, performance evaluation was performed in terms of the number of cables used in the transmission and the link utilization for all traffic on networks, and the performance evaluation result confirmed the superior performance than the previously proposed method.

QoS-guaranteed Routing for Wireless Sensor Networks (무선 센서 네트워크를 위한 QoS 보장 라우팅)

  • Heo, Jun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.23-29
    • /
    • 2011
  • In some applications of wireless sensor networks, requirements such as energy efficiency, real-time, and reliable delivery need to be considered. In this paper, we propose a novel routing algorithm for wireless sensor networks. It provides real-time, reliable delivery of a packet, while considering energy awareness. In the proposed algorithm, a node estimates the energy cost, delay and reliability of a path to the sink node, based only on information from neighboring nodes. Then, it calculates the probability of selecting a path, using the estimates. When packet forwarding is required, it randomly selects the next node. A path with lower energy cost is likely to be selected, because the probability is inversely proportional to the energy cost to the sink node. To achieve real-time delivery, only paths that may deliver a packet in time are selected. To achieve reliability, it may send a redundant packet via an alternate path, but only if it is a source of a packet. Experimental results show that the proposed algorithm is suitable for providing energy efficient, real-time, reliable communications.

TECDS Protocol for Wireless Ad Hoc Networks (무선 에드혹 네트워크를 위한 타이머를 이용한 CDS 구축)

  • Kim, Bo-Nam;Yang, Jun-Mo
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.365-370
    • /
    • 2007
  • Connected Dominating Set(CDS) has been used as a virtual backbone in wireless ad hoc networks by numerous routing and broadcast protocols. Although computing minimum CDS is known to be NP-hard, many protocols have been proposed to construct a sub-optimal CDS. However, these protocols are either too complicated, needing non- local information, not adaptive to topology changes, or fail to consider the difference of energy consumption for nodes in and outside of the CDS. In this paper, we present two Timer-based Energy-aware Connected Dominating Set Protocols(TECDS). The energy level at each node is taken into consideration when constructing the CDS. Our protocols are able to maintain and adjust the CDS when network topology is changed. The simulation results have shown that our protocols effectively construct energy-aware CDS with very competitive size and prolong the network operation under different level of nodal mobility.

Analyses of Dynamic Crypto Mechanism in Sensor Network Security (센서 네트워크 보안을 위한 정적인 보안 메카니즘에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.514-515
    • /
    • 2010
  • Security has become a major concern for many real world applications for wireless sensor networks. Usually, all these approaches are based on well known cryptographic algorithms. At the same time, performance analyses have shown that the applicability of sensor networks strongly depends on effective routing sessions or energy aware wireless communication. Based on our experiments, we provide some analyses and considerations on practical feasibility of such cryptographic algorithms in sensor networks.

  • PDF