Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Towards efficient deployment of wireless sensor networks

Published: 25 November 2016 Publication History

Abstract

Applications over wireless sensor networks WSNs are various and different. Many routing protocols have been proposed for WSNs since a decade. Medium access control protocols can differ from a network to another. The transmission range can also be variable from a sensor to another depending on their battery capacities. All these various protocols have an influence on the WSNs performance, in particular, the quality of service QoS they provide. It is worthy to choose the appropriate protocol for each specific situation in order to ensure a high security of the network. In this paper, we show that the type of application, the type of routing protocol, and the transmission range value have a real impact on WSN performance. Indeed, if we do not choose the right protocol in the right situation, the network could provide a low QoS in terms of lost packet rate and energy consumption. We have undertaken a set of experimentations in order to extract a road map that could be useful for any designer who intend to deploy a WSN with a high QoS degree. For the application layer, we have handled three types of applications: regular applications, applications requiring a high communication rate, and burst rate based applications. We have also considered different network sizes. For the routing layer, we have investigated the Ad hoc On-demand Distance Vector, ad hoc on-demand multipath distance vector routing, dynamic source routing, and Destination-Sequenced Distance Vector protocols. Various transmission range values have been used. We have conducted many simulations through the NS-2 simulator in order to analyze two relevant QoS indicators on WSNs: energy consumption and lost packet rate. Copyright © 2014 John Wiley & Sons, Ltd.

References

[1]
Baronti P, Pillai P, Chook VWC, Chessa S, Gotta A, Hu YF. Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards. Computer Communications 2007; Volume 30 Issue 7: pp.1655-1695, Wired/Wireless Internet Communications.
[2]
Cardell-oliver R, Smettem K, Kranz M, Mayer K. Field testing a wireless sensor network for reactive environmental monitoring, International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Melbourne, 2004; pp.14-17.
[3]
Akkaya K, Younis M. A survey on routing protocols for wireless sensor networks. Ad Hoc Networks 2005; Volume 3: pp.325-349.
[4]
Al-karaki JN, Kamal AE. Routing techniques in wireless sensor networks: a survey. IEEE Wireless Communications 2004; Volume 11: pp.6-28.
[5]
Biradar RV, Patil VC, Sawant SR, Mudholkar RR. Classification and comparison of routing protocols in wireless sensor networks. UbiCC Journal 2009; Volume 4: pp.704-711.
[6]
Broch J, Maltz DA, Johnson DB, Hu Yc, Jetcheva J. A performance comparison of multi-hop wireless ad hoc network routing protocols, Mobicom 1998, Dallas, Texas, 1998; pp.85-97.
[7]
Thakare AN, Joshi MY. Performance analysis of AODV & DSR routing protocol in mobile ad hoc networks. IJCA Special Issue on MANETs 2010; Volume 4: pp.211-218, Published by Foundation of Computer Science.
[8]
Das SR, Perkins CE. Performance Comparison of Two On-Demand Routing Protocols for Ad hoc Networks. IEEE: Israel, 2000.
[9]
Goel DA, Sharma A. Performance analysis of mobile ad-hoc network using AODV protocol. International Journal of Computer Science and Security 2009; Volume 3 Issue 5: pp.334.
[10]
Marina MK, Das SR. On-demand multipath distance vector routing in ad hoc networks, Proceedings of IEEE International Conference on Network Protocols ICNP, Riverside, California, 2001; pp.14-23.
[11]
Boukerche A. Performance evaluation of routing protocols for ad hoc wireless networks. Mob. Netw. Appl. 2004; Volume 9: pp.333-342.
[12]
Kohvakka M, Kuorilehto M, Hännikäinen M, Hämäläinen TD. Performance analysis of IEEE 802.15.4 and ZigBee for large-scale wireless sensor network applications, Proceedings of the 3rd ACM International Workshop on Performance Evaluation of Wireless ad hoc, Sensor and Ubiquitous Networks, PE-WASUN '06, New York, NY, USA. 2006; pp.48-57. ACM.
[13]
Kabara J, Calle M. MAC protocols used by wireless sensor networks and a general method of performance evaluation, 2012.
[14]
Buettner M, Yee GV, Anderson E, Han R. X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks, Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, SenSys '06, New York, NY, USA, 2006; pp.307-320. ACM.
[15]
Suarez P, Renmarker CG, Dunkels A, Voigt T. Increasing ZigBee network lifetime with X-MAC, Proceedings of the workshop on Real-world wireless sensor networks, REALWSN '08, New York, NY, USA, 2008; pp.26-30. ACM.
[16]
Ben-Othman J, Yahya B. Energy efficient and QoS based routing protocol for wireless sensor networks. Journal of Parallel and Distributed Computing JPDC 2010; Volume 70 Issue 8: pp.849-857.
[17]
Yahya B, Ben-Othman J. Towards a classification of energy-aware MAC protocols for wireless sensor networks. Wireless Communications and Mobile Computing WCMC 2009; Volume 12 Issue 3: pp.1572-1607.
[18]
Mohamed Y, Kemal A. A survey on routing protocols for wireless sensor networks. Ad Hoc Networks 2005; Volume 3 Issue 5: pp.325-349.
[19]
Lin PC, Lin T, Wang C. Performance analysis of a cross-layer handoff ordering scheme in wireless networks. IEEE Transactions on Wireless Communications 2008; Volume 7: pp.5166-5171.
[20]
Zhang X, Heys HM, Li C. Energy efficiency of encryption schemes applied to wireless sensor networks. Security and Communication Networks 2012; Volume 5 Issue 7: pp.789-808.
[21]
Ben-Othman J, Mokdad L. Enhancing data security in ad hoc networks based multipath routing. Journal of Parallel and Distributed Computing JPDC 2010; Volume 70 Issue 3: pp.309-316.
[22]
Guechari M, Mokdad L, Tan S. Dynamic solution for detecting denial of service attacks in wireless sensor networks, IEEE International Conference on Communications ICC'2012, Ottawa, Canada, June 2012.
[23]
Huang YK, Pang AC. A comprehensive study of low-power operation in IEEE 802.15.4, Proceedings of the 10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems, MSWiM '07, New York, NY, USA, 2007; pp.405-408. ACM.
[24]
Perkins C, Belding-Royer E, Das S. Ad hoc on-demand distance vector AODV routing, 2003.
[25]
Schmidt D, Krämer M, Kuhn T, Wehn N. Energy Modelling in Sensor Networks. Copernicus Publications on behalf of the URSI Landesausschuss: Bundesrepublik, Deutschland, 2007.

Cited By

View all
  • (2019)Research on the intrusion detection model based on improved cumulative summation and evidence theory for wireless sensor networkPhotonic Network Communications10.1007/s11107-018-0810-837:2(212-223)Online publication date: 17-May-2019
  • (2018)Enhanced reliable reactive routing (ER3) protocol for multimedia applications in 3D wireless sensor networksMultimedia Tools and Applications10.1007/s11042-017-5261-177:13(16927-16946)Online publication date: 1-Jul-2018
  • (undefined)Delay-Bounded Virtual Emotion Recognition Using IoT Barriers in Advanced Smart Environment2019 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOBECOM38437.2019.9013423(1-6)
  1. Towards efficient deployment of wireless sensor networks

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Security and Communication Networks
        Security and Communication Networks  Volume 9, Issue 17
        November 2016
        900 pages
        ISSN:1939-0114
        EISSN:1939-0122
        Issue’s Table of Contents

        Publisher

        John Wiley & Sons, Inc.

        United States

        Publication History

        Published: 25 November 2016

        Author Tags

        1. MAC layer
        2. NS-2
        3. QoS analysis
        4. routing protocol
        5. simulation
        6. wireless sensor networks

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 13 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2019)Research on the intrusion detection model based on improved cumulative summation and evidence theory for wireless sensor networkPhotonic Network Communications10.1007/s11107-018-0810-837:2(212-223)Online publication date: 17-May-2019
        • (2018)Enhanced reliable reactive routing (ER3) protocol for multimedia applications in 3D wireless sensor networksMultimedia Tools and Applications10.1007/s11042-017-5261-177:13(16927-16946)Online publication date: 1-Jul-2018
        • (undefined)Delay-Bounded Virtual Emotion Recognition Using IoT Barriers in Advanced Smart Environment2019 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOBECOM38437.2019.9013423(1-6)

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media