International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) Research Article June 2017 Wireless Sensor Network Jamuna K M Dept. of Computer Science and Engineering, PA College of Engineering, Manglore, Karnataka, India Abstract: A wireless sensor network (WSN) may be a wireless network consisting of spatially distributed autonomous devices exploitation sensors to watch physical or environmental conditions. The wireless sensor network (WSN) may be a combination of sensing, computation, and communication into one small device. A detector network consists of associate in nursing array of detector networks of diverse varieties interconnected by a wireless communication network. Detector knowledge is shared between these detector nodes and used as input to a distributed estimation system. The system extracts relevant data fromthe offered knowledge. Basic style objectivesof detector networks embody reliableness, accuracy, flexibility, value effectiveness, and easy readying. Every node has a minimum of a detector with associate in nursing embedded processor, and low power radius. It acts as data supply, sensing and aggregation knowledge samples from the setting. Node may act as data sink, receiving dynamic configuration data from alternative nodes or external entities. The top portion of a node will be associate in nursing antenna. A WSN system incorporates a entry that has wireless property back to the wired world and distributed nodes. This Network is predicated on IEEE 802.15.4 and IEEE 802.11 [16,17] Key words: Wireless sensor network, CC, detector, node, LEACH, routing I. INTRODUCTION Wireless sensor networks (WSN), typically known as wireless detector and mechanism networks (WSAN),[1][2] area unit spatially distributed autonomous sensors to observe physical or environmental conditions, like temperature, sound, pressure, etc. and to hand and glove pass their information through the network to a main location. This supported IEEE 802.15.4 & 802.11 stds. Wireless sensor networks are composed of tons of to thousands of partly distributed autonomous detector nodes to hand and glove guide a vicinity of curiosity. These detector nodes will sense, method and transmit the monitored information sure remote sink node or base station during a multi-hop manner. The additional trendy networks area unit bi-directional, conjointly enabling management of detector activity. Now, wireless detector networks have wide applied to military applications, Air traffic management, setting dominant and prediction, life animal protection, Home automation and care etc. [1, 2]. The WSN is made of "nodes" – from some to many tons of or maybe thousands, wherever every node is connected to 1 (or typically several) sensors. every such detector network node has usually many parts: a radio transceiver with an indoor Associate in nursingtenna or affiliation to an external antenna, a microcontroller, Associate in Nursing electronic circuit for interfacing with the sensors Associate in nursing an energy supply, sometimes A battery or Associate in Nursing embedded type of energy harvest WSN consists of a base station conjointly known as sink that communicates with detector nodes. These sizable amount of nodes wirelessly communicate with one another and to the bottom station directly or indirectly, and have capabilities to sense the info from their surroundings, store the info , pass their detected information to their neighbor detector nodes or to the bottom station and perform some computations on the detected information. Wireless detector networks area unit application definitive and energy restricted. every battery power detector node could be a forced device with comparatively tiny memory resources, restricted communication and restricted procedure power capability. Thus, to maximise the network period, energy protection is of predominant importance within the analysis of detector networks. Fig. 1. An example of WSN II. STRUCTURE OF WIRELESS SENSOR NETWORKS The detector nodes are typically scattered in a detector field as shown in Fig. 2. each of those scattered detector nodes has the capabilities to gather information and route information back to the sink and also the finish users. information are © www.ijarcsse.com, All Rights Reserved Page | 588 Jamuna et al., International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) routed back to the top user by a multi point infrastructureless design through the sink as shown in Fig. 2. The sink could communicate with the task manager node via web or Satellite. Fig. 2. Sensor nodes scattered in a sensor field. The protocol stack employed by the sink and every one sensing element nodes is given in Fig. 3. This protocol stack combines power and routing awareness, integrates information with networking protocols, communicates power with efficiency through the wireless medium, and promotes cooperative efforts of sensing element nodes. The protocol stack consists of the application layer, transport layer, network layer, circuit layer, physical layer, power management plane, quality management plane, and task management plane. looking on the sensing tasks, differing types of application software system will be designed and used on the application layer. The transport layer helps to take care of the flow of information if the sensing element networks application needs it. The network layer takes care of routing the info equipped by the transport layer. Since the setting is creaky and sensing element nodes will be mobile, the waterproof protocol should be power awareand able to minimize collision with neighbors' broadcast. The physical layer addresses the wants of a straightforward however strong modulation, transmission and receiving techniques. Fig. 3. WSN OSI layer / The sensor networks protocol stack The remaining power is reserved for sensing. The quality management plane detects and registers the movement of detector nodes, therefore a route back to the user is often maintained, and therefore the detector nodes will keep track of who are their neighbor detector nodes. By knowing who are the neighbor detector nodes, the detector nodes will balance their power and task usage. The task management plane balances and schedules the sensing tasks given to a selected region. Not all detector nodes in this region are needed to perform the sensing task at identical time. As a result, some detector nodes perform the task over the others betting on their power level. These management planes are required, in order that detector nodes will work along in an exceedingly power economical means, route information in an exceedingly mobile detector network, and share resources between detector nodes. while not them, every detector node can simply work on an individual basis. From the full detector network stand, it's a lot of economical if detector nodes will collaborate with one another, that the life of the detector networks may be prolonged. Before we tend to discuss the requirement for the protocol layers and management planes in detector networks, we tend to map 3 existing work [42], [69] and [77] to the protocol stack as shown in Fig. 3. Wireless sensor networks follows commonest design OSI model. Basically, there square measure 5 layers in detector network. These square measure application layer, transport layer, network layer, circuit layer and physical layer. There square measure 3 cross layers planes else to those higher than 5 layers of OSI model i.e. power management plane, association management plane, task management plane. These layers square measure wont to manage the network property and permits the nodes to figure along to extend the potency of the network. 1). Transport Layer The function of this layer is to supply congestion rejection and irresponsibleness and there are plenty of protocols designed to supply this function are either applied on downstream and upstream. This layer is especially required once a system is organized to access different network. the fundamental function of this layer is to © www.ijarcsse.com, All Rights Reserved Page | 589 Jamuna et al., International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) just accept information from on top of layers and split it up into smaller units then pass these to the network layer and make sure the delivery of all items at the opposite finish. It contains a range of protocols like TCP, UDP, SCTP, DCCP, SPX. 2)Network Layer The main function of the network layer is routing. This layer includes a heap of challenges relying upon the application however in all probability, the key challenges are within the restricted memory and buffers, power saving, sensing element doesn't have a world ID and got to be self organized. 3)Data link layer The data link layer is accountable to keep up the error correction and error detection mechanisms. it's conjointly in charge of the multiplexing of information frame detection, information streams, error management and medium access. 4) Physical layer This layer will give an interface to transmit a stream of bits over physical medium. chargeable for generating carrier frequencies, frequency choice, detection, signals modulation and encoding. 5)Application layer Responsible for traffic management and supply package for various applications that translate data in an evident type or send queries to get information. detector networks deployed in several applications in numerous fields, for example; medical, military, surroundings, agriculture fields. It contains a spread of protocols like NNTP, SIP, SSI, DNS, FTP, GOPHER, NFS, NTP, SMTP, SMPP, ANMP and TELNET. The 3 cross planes or layers are: 1) Power management plane: it's responsible for managing the ability level of detector nodes for process, sensing and communication. 2) Connection management plane: it's responsible for configuration or reconfiguration of detector nodes in decide to establish or maintain network property. 3) Task management plane: it's responsible for distribution of tasks among detector nodes to prolong network time period and improve energy potency. III. WSN NETWORK TOPOLOGIES WSN nodes are generally organized in one among 3 kinds of network topologies. During a star topology, every node connects on to a entrance. during a cluster tree network, every node connects to a node higher within the tree so to the entrance, and information is routed from very cheap node on the tree to the entrance. Finally, to supply accrued responsibility, mesh networks feature nodes that may connect with multiple nodes within the system and pass information through the foremost reliable path offered. This mesh link is usually named as a router (see below Figure 4). Figure 4. Common WSN Network Topologies IV. DESIGN ISSUES 1). Energy Consumption it's one in every of the main problems in wireless detector network. detector nodes are equipped with battery that's used as their energy supply. The detector network will be deployed in risky condition thus it becomes troublesome recharging or dynamic batteries. The energy consumption depends upon major operations of the detector nodes that are sensing, processing, communication. the big quantity of energy is consumed throughout communication. So, the economical routing protocols got to be used at every layer to stop energy consumption. 2.) Localization detector localization may be a basic and important issue for network operations and management. The detector nodes are deployed in ad-hoc manner so that they don't have any data concerning their position. the matter of determinant the physical location of the sensors when they need been deployed is named localization. This drawback will be resolved by beacon nodes, GPS, proximity primarily based localization. 3). Coverage It says however well a region of interest is controlled as copied by the sensing element. These sensing element nodes use coverage algorithmic rule to sense information and send them to sink victimization routing algorithmic rule. For the great coverage, sensing element nodes should be elect in such a way so whole network ought to be coated. There economical technique like negligible and top exposure path algorithms and coverage configuration protocol square measure advised. 4). Clocks Clock synchronization may be a vital service in WSN. The goal of your time synchronization is to produce a typical timescale for native clocks of nodes in sensing element networks. Clocks got to be synchronous in some applications like following and watching. 5). Computation the number of knowledge issue by each node is named computation. the main drawback in computation is that it ought to minimize the utilization of resources. If the life of base station is a lot of vital then processing will be completed at each node before causing information to base station. just in case after we have few resources at each node then entire computation should be done at sink. © www.ijarcsse.com, All Rights Reserved Page | 590 Jamuna et al., International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) 6). cost As we all know, massive numbers of nodes square measure deployed within the sensing element networks, therefore if value of one node are going to be terribly high then we are able to assume the general cost of the network will be terribly high. Eventually, the value of each sensing element node needs to be unbroken low. therefore price of every sensing element node within the network may be a difficult issue. 7). Hardware style whereas planning any hardware of sensing element network, it should be energy-efficient. Hardware like power management, micro-controller, and communication unit ought to be style in such the simplest way that it consumes less energy. 8). Quality of Service (QOS) suggests that information ought to be delivered inside fundamental measure. There square measure some real time sensing element applications that square measure supported time i.e. if information mustn't be delivered on time to the receiver from the instant it's sensed; information can become useless. there's numerous quality of service problems in sensing element networks like configuration could amendment regularly and also the offered state data for routing is constitutionally general [18,19,20,22] V. ALGORITHMS& PROTOCOLS There are different actual algorithms or protocols targeting at improving the performance of sensor networks, such as LEACH (Low-Energy Adaptive Clustering Hierarchy)[3], a HEED (Hybrid Energy-Efficient Distributed Clustering Approach)[4], and so on. All these techniques improve the energy utilization in data transmission and prolong the network lifetime. Compared with low routing protocols, hierarchical routing protocols can efficaciouslyguide sensor nodes and provide an energy efficient way to find apossible route and guarantee the good scalability of networks. The most existing studies assume that the sink node is static, and the traffic follows a many-to one pattern. Sensor nodes adjoining to the sink have to participate in forwarding data to the sink node for other sensor nodes. These sensor nodes carry larger traffic loads and diminish their energy very faster, leading to the formation of energy holes. Thus data can’t be forwarded to the sink node and a considerable amount of energy is wasted, resulting in the limitation of the network lifetime [5, 6, 8]. To shun the structure of energy holes, using sink mobility to wireless sensor networks have attracted more attention lately. The advances in the field of robotics make the composed mobile sink possible in wireless sensor networks. The mobile sink can upgrade the network period to some extent by easing the overhead of sensor nodes nearer to the sink location [7, 9]. Proposed Algorithm ENERGY EFFICIENT COMPETITIVE CLUSTERING ALGORITHM WITH CONTROLLED MOBILE SINK In this section, I consider a controlled mobile sink node and propose an energy-efficient competitive clustering algorithm for wireless sensor networks using reserved mobile sink. Competitive Clustering Algorithm Competitive clustering (CC) algorithm is a distributed clustering algorithm which is related to LEACH operating techniques. Cluster heads are rotated among sensor nodes in each round and the selection of final cluster heads is primarily according to the residual energy of candidate cluster heads. Details of the cluster formation and inter-cluster multi-hop routing setup are described in the following. Cluster Formation: Each sensor node is assigned an equal initial energy and become candidate cluster head with the same probability T which is a predefined value. Thus several candidate cluster heads are randomly selected to participate in the final cluster heads competition. Those sensor nodes unchosen keep sleeping until the selection of cluster heads completing. Each sensor node compute its approximate distance d to the location of the sink node and find the minimum distance dmin and the maximum distance dmax. On this basic, sensor node calculate its competition range Riwhich is used to form clusters with unequal cluster sizes. The competition range Riis predefined as follows: In the formula 1, we are able to observe that the competition vary Ridecreases because the distance to the sink node decreases. and so the candidate cluster heads contend to be the ultimate cluster head supported their competition vary Ocean State,their residual energy and their ID. every candidate cluster head have to be compelled to broadcast a message together with its competition vary and its residual energy to its neighbor candidate cluster head. Here we tend to outline those candidate cluster heads inside the boundaries of the competition vary Ocean State are the neighbor candidate cluster heads of Ci. At the tip of the competition, there'll not be another candidate cluster head Cj existing within the competition vary of candidate cluster head Ci that becomes a final cluster head. In Figure 5, we are able to see that candidate cluster heads c1 and c3 might become final cluster heads. The candidate cluster heads c1 and c2 can't become final cluster heads at identical time. we tend to use the competition vary to come to a decision the neighbor candidate cluster heads of every candidate nodes. And if candidate cluster head Ci has the biggest residual energy in its neighbors, it'll win the competition and broadcast a message to its neighbors. If the residual energy is equal, the candidate cluster head with the smaller ID are going to be chosen. therefore the distribution of cluster heads © www.ijarcsse.com, All Rights Reserved Page | 591 Jamuna et al., International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) are often controlled and clusters nearer to the sink node can have smaller cluster sizes. Compared with LEACH, when at random choosing the candidate cluster heads, these candidate cluster heads still have to be compelled to contend for changing into final cluster heads in every spherical. Finally cluster heads selected, standard detector nodes can be a part of the near cluster head. Figure 5. Competition for cluster Heads Inter-cluster Multi-hop Routing Setup: In the inter-cluster routing setup section, we have a tendency to adopt a multi-hop communication protocol to save lots of energy and set a threshold dthreshold. If the gap between the cluster head and therefore the sink node is smaller than the edge, the cluster head transmits the aggregative information to the sink node directly; otherwise, it'll realize associate degree adjacent node as its relay node. we elect the relay cluster head node supported distance and residual energy. the value of the relay node are often computed by the formula 2 shown because the follows [5].After every cluster head has chosen the minimum price node as its relay node, associate degree inter-cluster route is made. Performance Analysis: In this paper, we tend to projected Associate in Nursing energy-efficient competitive cluster formula for wireless device networks employing a controlled mobile sink. we tend to think about combining the cluster formula and also the mobile sink going to improve the network performance, like reducing energy consumption and prolonging network period to some extent. within the competitive cluster formula, each device node participate in competitive for cluster heads and cluster heads area unit revolved in every spherical. throughout the choice of candidate cluster heads, we tend to set a parameter T to haphazardly choose candidate cluster heads among all device nodes. so in Figure 6, we tend to analyze the residual energy of entire network with totally different T in thirty to fifty spherical. Here, the initial energy of device node is two Joule. Figure 6. Residual Energy with Different T Candidate cluster heads are elect in line with the worth of T. In Figure 3, the residual energy may be the most important once T is adequate zero.1. therefore candidate cluster head may be elect among all sensing element nodes. And final cluster heads are chosen principally supported the competition vary and therefore the residual energy. to investigate the energy consumption of the competitive bunch rule, we tend to simulate it and compare it with the classical bunch rule, LEACH. In Figure 7, we tend to compare the competitive bunch rule (CC) with LEACH within the energy consumption. In Figure four a, CC consumes less energy than LEACH in twenty to forty spherical. And in Figure four b, the residual energy of entire network in CC is far over LEACH. This principally due to the additional equally distribution of cluster head in CC and therefore the multi-hop routing will scale back the energy consumption throughout the remote knowledge transmission. To mitigate the hop spot downside and prolong network period, we tend to use a controlled mobile sink moving at an explicit speed on a predefined path to gather information packets. The network model is shown in Figure 5. © www.ijarcsse.com, All Rights Reserved Page | 592 Jamuna et al., International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) The mobile sink node moves on the predefined path and sojourn at some regular positions. The cluster heads elect by CC can mechanically notice the optimum sojourn position of the mobile sink and forward knowledge packets once the sink node inward the sojourn position. therefore we tend to analyze the energy consumption with completely different distance between sojourn positions, as is shown in Figure 8. Figure 7. Energy Comparison between CC and LEACH Figure 8. Network model using a mobile sink node Figure 9. Energy consumption with different distance Besides, we have a tendency to analyze energy consumed by the fastened sink node and also the mobile sink node in Figure 9. Energy consumption and residual energy of entire network of fastened sink node and mobile sink node is shown severally in Figure 10 a and b. will observe that victimization mobile sink node can save a lot of energy than victimization the fastened sink node. The saving energy contributes to the network period. Figure 10. Energy consumption of fixed sink node and mobile sink node © www.ijarcsse.com, All Rights Reserved Page | 593 Jamuna et al., International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) We will conclude that mobile sink node rather than fastened sink node within the competitive bunch algorithm can mostly cut back the energy consumption throughout the information transmission. Then we have a tendency to analyze the network period adopted competitive bunch supported fastened sink node and mobile sink node respectively, and compare with LEACH. the quantity of alive node in detector network over simulation time is illustrated in Figure 11. Here, we have a tendency to outline the network time because the period of your time till the primary node depletes its energy and therefore the initial energy of detector node is zero.5Joule. The spherical of initial death node seems in detector network is listed in table two. Figure 11 shows that our formula is additional dominant at network period extending. Table 1. The Round of First Death Node Appears Figure 11. Network Lifetime In this paper, I propose an energy-efficient competitive clustering formula for wireless sensing element network employing a controlled mobile sink. In competitive clustering (CC) formula, every sensing element node has to participate in competitory for cluster heads. Cluster heads are going to be elect supported the competition vary and therefore the residual energy. On the essential, we tend to use a controlled mobile sink to rather than the mounted sink node to mitigate the hop spot issues. The mobile sink node moves at a particular speed on a predefined path and sojourn at many park positions to gather information packets from cluster heads elect according the competitive clustering formula. Simulation results validate that competitive clustering formula outperforms LEACH, and therefore the use of mobile sink node will considerably improve the performance of sensing element networks, like rising energy utilization and prolonging network period. In our work, the mobile sink node moves at a particular speed on a predefined path and that we ignore the movement speed of the sink node and therefore the information transmission delay among sensing element nodes. we are going to then study the info transmission delay and therefore the movement speed of the sink node to optimize our rule. VI. APPLICATIONS OF WSN 1). Vehicle Parking WSNs are utilized in applications like vehicle parking for the aim of effective usage of existing parking slots rather than creating new dearly-won installations coupling with low cost sensing element nodes which will track the vehicles effectively. 2). Intra automotive security Wired networks and cables are replaced by wireless networks so as to confirm fuel potency and reduction within the weight of automotives. however the safety problems with such a replacement area unit extremely questionable. however the choice of acceptable security formula and employing a systematic methodology the swiftness and security problems are often resolved. 3). Event Detection Typical characteristic of WSN is chase, particularly instant event chase. In WSN abundant work has been finished sensing element nodes having indistinguishable sensing nodes. a totally distributed protocol cooperative Event Detection and tracking (collect) for tracking and event detection for heterogeneous WSNs is given in[10].But major problems like solutions to the sensing element node preparation and routing is nonetheless to be resolved. 4). inexperienced house police work so as to ascertain the automated system in a very inexperienced house it's necessary to ascertain numerous|the varied|the assorted} climate parameters in various elements of an oversized inexperienced house. however the complete system can get untactful and expensive by victimisation wired network. however the wireless sensing element network with sensing element nodes equipped with radio are going to be a value effective answer for same form of downside. © www.ijarcsse.com, All Rights Reserved Page | 594 Jamuna et al., International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) 5). Military applications WSN is a vital a part of military (C4ISRT) command, communication, computing, control, intelligence, police work, reconnaissance mission and targeting. a number of the applications of WSN in military applications are police work of friendly forces, impedimenta and cartridges, scrutiny of opposing forces, field of honor watching, (NBC) nuclear biological chemical attack detection. 6). Environmental applicationsSome of the applications of WSN embody trailing the movement of birds, insects and little animals. police work of environmental conditions that have an effect on crops and stock, macro instruments for big scale earth watching and planetary survey. fire and flood detection. 7). Health Applications a number of the health applications of the WSN is medicine, drug management in hospital, tele-diagnosis of human physiological knowledge, watching and chase of patients and doctors within a hospital. 8). Home applications sensible sensing element nodes are often inter in several appliances like kitchen appliance, refrigerators, and vacuum cleaners, VCR’s etc. These sensing element nodes within the devices will act with one another and with external network via satellite. the top users will manage the devices a lot of simply and remotely. 9). Biological applications Wireless sensing element networks have tremendous impact for biological issues. a number of the biological issues are biological task mapping and programming, medical specialty signal watching etc. 10). different marketing application different marketing applications are producing virtual key boards, police work product quality, building sensible workplace areas, interactive toys and museums, watching disaster areas, watching transport facilities, police work automotive thefts, watching and management of manufacturing plant processes, chase and detection of vehicles, watching semiconductor process chambers. VII. ADVANTAGE & DISADVANTAGE Advantages: 1. Network setups will be allotted while not fastened infrastructure. 2. appropriate for the non-reachable places like over the ocean, mountains, rural areas or deep forests. 3. versatile if there's random scenario once further digital computer is required. 4. Implementation evaluation is reasonable. 5. It avoids many wiring. 6. it'd accommodate new devices at any time. 7. It's versatile to bear physical partitions. 8. It will be accessed by employing a centralized monitor. Disadvantages: 1. Less secure as a result of hackers will enter the access purpose and acquire all the knowledge. 2. Lower speed as compared to a wired network. 3. a lot of difficult to tack compared to a wired network. 4. simply troubled by surroundings (walls, microwave, massive distances owing to signal attenuation, etc). 5. it's simple for hackers to hack it we tend to couldn’t management propagation of waves. 6. relatively low speed of communication. 7. Gets distracted by varied parts like Blue-tooth. 8. Still expensive (most importantly). VIII. CONCLUSIONS In conclusion to the current report, one can say that the top of analysis on WSNs isn't nearby. Wireless sensing element Network technology has an implausible potential to boost quality of life altogether aspects and is probably going to be wide employed in the medium-term future.To realize the complete potential of this technology, there's lots of extra work to be wiped out additional times. analysis should target security aspects and better dependableness for these systems and tips for aspects of privacy protection ought to be mentioned. With these challenges in mind, the quick speed, with that additional developments of the technology flood on the sphere, will result in optimism and excitement on coming applications. REFERENCES [1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “Wireless sensor networks: A survey”, Computer Networks, vol. 38, no. 4, (2002), pp. 393-422. [2] K. Akkaya and M. Younis, “A survey on routing protocols in wireless sensor networks”, in the Elsevier Ad Hoc Network, vol. 3, no. 3, (2005), pp. 325-349. [3] W. R. Heinzelman, A. Chandrakasan and H. Balakishnan, “Energy-efficient communication protocol for worelessmicrosensor networks”, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (2000) January 4-7; Maui, Hawaii, USA. [4] O. Younis and S. Fahmy, “HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks”, IEEE Transactions on Mobile Computing, vol. 3, no. 4, (2004), pp. 366-379. [5] B. Gong, L. Li, S. Wang and X. Zhou, “Multihop routing protocol with unequal clustering for wireless sensor networks”, ISECS International Colloquium on Communication, Control, and Management (2008) August 3-4, Guangzhou, China, pp. 552-556. [6] G. Chen, C. Li, M. Ye and J. Wu, “An unequal cluster-based routing protocol in wireless sensor networks”, Wireless Networks, vol. 15, no. 2, (2009), pp. 193-207. © www.ijarcsse.com, All Rights Reserved Page | 595 [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24]. [25] Jamuna et al., International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) E. B. Hamida and G. Chelius, “Strategies for data dissemination to mobile sinks in wireless sensor networks”, IEEE Wireless Communications, vol. 15, no. 6, (2008). M. Marta and M. Cardei, “Improved sensor network lifetime with multiple mobile sinks”, Pervasive and Mobile Computing, vol. 5, no. 5, (2009), pp. 542-555. J. Rao and S. Biswas, “Data harvesting in sensor networks using mobile sinks”, IEEE Wireless Communications, vol. 15, no. 6, (2008), pp. 63-70. W. Wang, V. Srinivasan and K. Chua, “Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks”, Proceeding of the 11th annual international conference on Mobile computing and networking (2005), pp. 270-283, August; Cologne, Germany. E. B. Hamida and G. Chelius, “A Line-Based data dissemination protocol for wireless sensor networks with mobile sink”, IEEE International Conference on Communications (2008) May 19-23; Beijing, China, pp. 22012205. M. Gatzianas and L. Georgiadis, “A distributed algorithm for maximum lifetime routing in sensor networks with mobile sink”, IEEE Transactions on Wireless Communications, vol. 7, no. 3, (2008). W. F. Liang, J. Luo and X. Xu, “Prolong network lifetime via a controlled mobile sink in wireless sensor networks”, IEEE Global Telecommunications Conference (GLOBECOM 2010), December; Florida, USA, (2010). B. Nazir and H. Hasbullah, “Mobile sink based routing protocol (MSRP) for prolonging network lifetime in clustered wireless sensor network”, International Conference on Computer Applications and Industrial Electronics (ICCAIE 2010), (2010) December 5-8; Kuala Lumpur, Malaysia. J. W. Kim, J. S. In, K. Hur, J. W. Kim, D. S. Eom, “An intelligent agent-based routing structure for mobile sinks in WSNs”, IEEE Transactions Consumer Electronics, vol. 56, no. 4, (2010), pp. 2310-2316. IEEE 802.15.4 Standard on Wireless MAC and PHY Specifications for Low-Rate WPANs. http://en.wikipedia.org/wiki/File:IEEE_802.15.4_Star_ P2P.svg Gowrishankar.S 1, T.G.Basavaraju 2, Manjaiah D.H 3, Subir Kumar Sarkar,” Issues in Wireless Sensor Networks”, Proceedings of the World Congress on Engineering 2008 Vol I, WCE 2008, July 2 - 4, 2008, London, U.K., ISBN:978-988-98671-9-5. [14]EikoYoneki, Jean Bacon,” A survey of David Kohanbash*, AbhinavValada, George Kantor,” Base Station Design and Architecture for Wireless Sensor Networks”, Carnegie Mellon University Robotics Institute, 5000 Forbes Ave, Pittsburgh, PA, 15213 USA. [10]Miguel Angel Erazo Villegas Seok Yee TangYiQian,” Wireless Sensor Network Communication Architecture for Wide-Area Large Scale Soil Moisture Estimation and Wetlands Monitoring”. Ahmad Abed AlhameedAlkhatib, Gurvinder Singh Baicher,” Wireless Sensor Network Architecture”, IPCSIT vol.35(2012),University of Wales Newport, City Campus, Usk Way, NP20 2BP, Newport, U.K. Yazeed Al-Obaisat, Robin Braun,” On Wireless Sensor Networks: Architectures, Protocols, Applications, and management”, Institute of Information and Communication Technologie Cayirci,” Wireless sensor networks: a survey,” Broadband and Wireless Networking Laboratory, School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA. J.M. Kahn, R.H. Katz, K.S.J. Pister, Next century challenges: mobile networking for smart dust, Proceedings of the ACM MobiCom'99, Washington, USA, 1999, pp. 271–278 J. Pottie, W.J. Kaiser, Wireless integrated network sensors, Communications of the ACM, 43 (5) (2000), pp. 551–558 E. Shih, S. Cho, N. Ickes, R. Min, A. Sinha, A. Wang, A. Chandrakasan, Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks, Proceedings of ACM MobiCom'01, Rome, Italy, July 2001, pp. 272–286 © www.ijarcsse.com, All Rights Reserved Page | 596
© Copyright 2026 Paperzz