Sie sind auf Seite 1von 7

IPASJ International Journal of Computer Science (IIJCS)

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


A Publisher for Research Motivation ........ Email:editoriijcs@ipasj.org
Volume 5, Issue 7, July 2017 ISSN 2321-5992

Improving Energy efficiency scheme using


Mobile coordinated n-hop wireless sensor
networks
G. SWETHA1, V.USHA2
1
(Mtech, Computer Networks and Information Security, G. Narayanamma Institute of Technology & Science,
Hyderabad, India)
2
(Assistant Professor, Department of Information Technology, G. Narayanamma Institute of Technology & Science,
Hyderabad, India)

ABSTRACT
This paper introduces the mobile access coordinated wireless device network (MC-WSN) a unique energy economical theme for
time-sensitive applications. In typical device networks with mobile access points (SENMA), the mobile access points (MAs)
traverse the network to gather data directly from individual sensors. Within the routing method, a serious limitation with device
network with mobile access is that information transmission is restricted by the speed of the MAs and their flight length,
leading to low throughput and huge delay. So as to resolve this downside, we tend to introduce the MC-WSN design, that a
serious feature is that: through active network readying and topology style, the hop count from any device to the MA are often
restricted to a pre-specified variety. During this we tend to investigate the topology style that minimizes the typical variety of
hops from device to MA, and supply the throughput analysis. Moreover, MC-WSN within the larger image of network style and
development, we offer a unified framework for wireless network modeling and characterization. In this n hop is minimized to
average number of hops in MC-WSN, minimizing the number of hops has a direct impact on maximizing the throughput.

Index TermsWireless sensor networks, mobile access point, N-hop network, energy efficiency, clustering.

1 .INTRODUCTION
Wireless sensor network (WSN) has been identified as a key technology in green communications, due to its
indispensable role in both civilian and military applications, such as reconnaissance, surveillance, environmental
monitoring, emergency response, smart transportation, and target tracking. Along with recent advances in remote
control technologies, Unmanned Aerial Vehicles (UAVs) have been utilized in wireless sensor networks for data
collection as well as for sensor management and network coordination. Network deployment through UAV .For
efficient and reliable communication over large-scale networks, sensor network with mobile access points (SENMA). In
SENMA, the mobile access points (MAs) traverse the network to collect the sensing information directly from the
sensor nodes. SENMA has been considered for military applications, where small low-altitude unmanned aerial
vehicles (UAVs) serve as the mobile access points that collect sensing information for surveillance, reconnaissance and
collaborative spectrum sensing. When the energy consumption at the MAs is not of a concern, SENMA improves the
energy efficiency of the individual sensor nodes over ad-hoc networks by relieving sensors from complex and energy-
consuming routing functions. In the routing process, a major limitation with sensor network with mobile access is that
a transmission is made only if an MA comes near source node; thus, data transmission is limited by the speed of the
MAs and the length of their trajectory, it shows in low throughput and large delay.

In addition to SENMA, ad hoc networks with mobile sinks have also been explored by other researchers. A mobile sink
is utilized for data collection, where it visits a limited number of pre-defined collection points in the network. Each
sensor routes its information to the nearest collection point through multi hop routing, then data is delivered to the sink
when it visits the corresponding location. As in the case of the conventional SENMA, the main limitation of these
approaches is that data transmission depends on the physical speed of the access point, which is not desirable for time-
sensitive applications. A different network set-up with a mobile sink is presented. In this approach, certain nodes along
a ring in the network are informed about the location of the sink. For data transmission, a node first acquires the sinks
location, then forwards the packet to an anchor node which is closest to the current sink location. If the sink moves to a

Volume 5, Issue 7, July 2017 Page 28


IPASJ International Journal of Computer Science (IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email:editoriijcs@ipasj.org
Volume 5, Issue 7, July 2017 ISSN 2321-5992

new location, the old anchor node will be updated with the new anchor node that is closest to the sink. One limitation
of this approach is the overhead associated with the sink location acquisition, which would impact the throughput and
delay of data transmission as well as the energy efficiency due to the frequent transmission and reception of control
messages. Mobile relays are utilized to facilitate data collection. However, this would be inefficient in terms of energy
consumption as well as delay.

In this paper, by exploiting the most recent advances in Unmanned Aerial Vehicles (UAVs) and wireless charging, we
propose a mobile access coordinated wireless sensor network (MC-WSN) for time-sensitive, reliable, and energy-
efficient information exchange. In MC-WSN, the whole network is divided into cells, each is covered by one MA, and
served with powerful center cluster head (CCH) located in the middle of the cell, and multiple ring cluster heads
(RCHs) uniformly distributed along a ring within the cell. The MAs coordinate the network through deploying,
replacing and recharging the nodes. They are also responsible for enhancing the network security, by detecting
compromised nodes then replacing them. Data transmission from sensor nodes to the MA goes through simple routing
with cluster heads(CHs), CCH or RCHs serving as relay nodes. As in SENMA, the sensors are not involved in the
routing process. A major feature of MC-WSN is that: Through active network deployment and topology design, the
number of hops from any sensor to the MA can be limited to a pre-specified number. As will be shown, the hop number
control, in turn, results in better system performance in throughput, delay, energy efficiency, and security management.

2 .RELATED WORK
In existing system, they use sensor node with mobile access point for collecting the sensing information directly from
the sensor nodes. When the energy consumption at the mobile access point is not of a concern, sensor node with
mobile access point improves the energy efficiency of the individual sensor nodes over ad-hoc networks by relieving
sensors from complex and energy-consuming routing functions. A major limitation with sensor node with mobile
access point is that a transmission is made only if a mobile access point visits the corresponding source node; thus, data
transmission is largely limited by the physical speed of the mobile access point and the length of their trajectory,
resulting in low throughput and large delay.

3 .PROPOSED SYSTEM
In this the mobile access point coordinates the sensors and resolves the node deployment issue as well as the energy
consumption problem of wireless sensor networks. More specifically, the mobile access point are responsible for: (i)
deploying nodes, (ii) replacing and recharging nodes, (iii) detecting malicious sensors, then removing and replacing
them, (iv) collecting the information from sensors and delivering it to a BS. The mobile access coordinated wireless
sensor network for time-sensitive, reliable, and energy-efficient information exchange, from this we get high
throughput and reduce delay when compared to existing one. In this proposed the mobile access point will send the
data to base station whenever there is energy loss to cluster heads. Mobile access point also sends data whenever there
is a flooding attack to cluster head, when mobile access point energy also lost then there will be chosen another cluster
head which is having more energy. Cluster head selection process is shown in section3.3.

In this paper, we have considered the packet with different fields to transfer the data from source to destination by
considering as real time and non real time packet. There are the field given as Source address, Destination address,
Packet type, Packet id, Color of the packet, Sending time Life time ,Hop count, Priority (0 or 1).By using the source
address the destination can find who sent the data. Each node can route the data to specified destination by using the
destination address, and the packet type is used to know whether the packet will be the data or controlling packet. The
color is used to get clear idea while simulation (only for simulation).The hop count is used to check the data is local
data or non local data, the sending time and life time is used to know the ttl value of the packet, The priority field is
used to denote the packet which is transferred from the node is real time or non real time packet. In real time the packet
size will be vary according to size of the each field size, in our project we are assuming that the field will occupy
maximum two bytes. For efficiency we divide process into following small modules.
Topology formation

Isolated node and Repairing node and clusters

Volume 5, Issue 7, July 2017 Page 29


IPASJ International Journal of Computer Science (IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email:editoriijcs@ipasj.org
Volume 5, Issue 7, July 2017 ISSN 2321-5992

3.1 Topology Formation:


Topology formation is an important issue in a wireless sensor network. Performance parameters such as energy
consumption, network lifetime, data delivery delay, sensor field coverage depend on the network topology. Distances
between nodes, physical interconnections, transmission rates, or signal types may differ between two networks, yet their
topologies may be identical. Wireless sensor network used for monitoring such as disaster tactical in military
surveillance. It can be placed in two different manners 1) Regular manner and 2) Irregular manner. Mostly in irregular
manner there may create fault in sensor network. Battery depletion is the attack, it drained the energy of sensors. Fault
are created by these kind of attack also. Each every one of sensors can sense specified events in its sensing range, and
communicate with others in its transmission range.

Network topology design


In this section, we investigate network topology design of MC-WSN, and calculate the optimal radius Ro and the ring
radius Rt that minimize the average number of hops from any CH to the MA. Minimizing the number of hops has a
direct impact on maximizing the throughput. Since the basic sensor nodes are not involved in the routing process, the
topology design is therefore focused on the multi hop transmissions between CHs. Note that under shortest path
routing, the number of hops is proportional to the distance between the source and its corresponding sink. To minimize
the number of hops, we design the topology such that the average distance between a cluster head and its nearest sink is
minimized. In the proposed MC-WSN architecture, the average squared distance between any source and the
corresponding sink (CCH/RCH) can be expressed as:

X is the distance from the CH to the center of the cell, is the angle of the CH in the polar system with CCH as the
origin, fX(x) and f_() denote the probability density function (PDF) of X and . In this number of n hop is
minimized to average. In SENMA the hop count is more because the sensors as to move where ever the mobile access
point moves so that hop increases and also throughput decrease, in order to reduce hop count we formed cluster heads
in MC-WSN in this sensors will send their data to nearest cluster heads and will send that data to base station, this
cluster head will collect data of the nearest sensors at a time and send to base station. By this the sensors will not move
and the hop count also reduced and also throughput increases. We show the throughput increase in results section4.

3.2 Isolated Node and Repairing Node:


When there no path or communication to sensor to another sensor, or may receive broken messages, the sensor is an
isolated sensor. Some sensors have irregular communication or unstable connectivity with others, such as the location
not being suitable for wireless sensor node communication, the environmental interference is very high, etc. Missing
RREQ messages can be used to detect the failure of actors. After that it will check whether failed node is critical node
or not.

Volume 5, Issue 7, July 2017 Page 30


IPASJ International Journal of Computer Science (IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email:editoriijcs@ipasj.org
Volume 5, Issue 7, July 2017 ISSN 2321-5992

3.3 Cluster:
1. Cluster Formation:
Cluster formation is the process of grouping the nodes in to a single is known as cluster formation. This cluster has n
number of nodes those are having same characteristics and also they are in the single area. This group of single nodes
forms the network. There are lot of clusters comes under a base station.

2. Cluster Head Selection:


Initially, when clusters are created, each node itself decides whether or not to become a cluster head for each round as
specified by the original LEACH protocol. Each self-selected cluster head, broadcasts an advertisement (ADV) message
using non-persistent carrier sense multiple access (CSMA) protocol. The message contains the header identifier (ID).

3. Cluster Setup:
Each non-cluster head node chooses one of the strongest received signal strength (RSS) of the advertisement as its
cluster head, and transmits a join-request (Join-REQ) message back to the chosen cluster head. The information about
the nodes capability of being a cooperative node, that is, its current energy status is added into the message. If a cluster
head receives the advertisement message from another cluster head y, and if the received RSS exceeds a threshold, it
will mark cluster head y as the neighboring cluster head and it record ID. When the sink receives the advertisement
message, if it get cluster head with the maximum RSS, and sends the sink-position message to that cluster head
marking it as the target cluster head (TCH).

4. Schedule Creation:
When join-REQ message received by all cluster head, then time division multiple access (TDMA) schedule is created
by cluster head and broadcasts the schedule to its cluster members as in original LEACH protocol. This prevents
collision among data messages and allows the non-cluster head node to be turned off until its allocated transmission
time to save energy.

5. Node Failure:

A. Route Discovery:
Route discovery is the process of selecting the route for the destination. It used RREQ and RREP for the route discovery
process. In this process the RREQ is the broadcast message that is called as a route request. When the destination is
identified, the destination sends the RREP through the same path. This is used to find the best path between the source
and destination.

B. Energy Drain:
After finding route, source can make communication with destination. For every data transmission and reception
energy level will be decreased at initial energy level of node. Most Probably intermediate node energy can firstly dry
due to trans-receiver characteristics. If its energy level is below 1 tends to node failure. It will not able to make
communication with others.

4. RESULTS

4.1 Energy efficiency

Figure1: Energy efficiency

Volume 5, Issue 7, July 2017 Page 31


IPASJ International Journal of Computer Science (IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email:editoriijcs@ipasj.org
Volume 5, Issue 7, July 2017 ISSN 2321-5992

This is energy efficiency graph in this x-axis is time and y-axis is consuming energy.

4.2 Delay Comparison

Figure2: Delay Comparison


Delay comparison graph in this x-axis is time and y-axis is delay.

4.3 Throughput

Figure3: Throughput

Throughput is the number of packets transmitted per second and x-axis is time and y-axis is packets size.

4.4 Packet delivery ratio

Volume 5, Issue 7, July 2017 Page 32


IPASJ International Journal of Computer Science (IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email:editoriijcs@ipasj.org
Volume 5, Issue 7, July 2017 ISSN 2321-5992

Figure5: Packet Delivery Ratio

Packet delivery ratio is the sum of the data packets received by destination by sum of the data packets generated by
source. here x-axis is time and y-axis is no of packets.

5. CONCLUSION
In this paper, a mobile access coordinated wireless sensor networks architecture was proposed for reliable, efficient, and
time-sensitive information exchange. MC-WSN exploits the MAs to coordinate the network through deploying,
replacing, and recharging nodes, as well as detecting malicious nodes and replacing them. The hierarchical and
heterogeneous structure makes the MC-WSN a highly resilient, reliable, and scalable architecture optimal topology was
designed for mobile coordinated wireless sensor network such that the average number of hops from any sensor to the
MA is minimized. The performance of MC-WSN is analyzed in terms of throughput. It was shown that with active
network deployment and hop number control, MC-WSN will get higher throughput and energy efficiency over the
conventional SENMA. By doing analysis also we come to know that with hop number control, network analysis does
become more tractable. By designing a network for MC-WSN and development, we provided a unified framework for
wireless network modeling and characterization.

REFERENCE
[1] G. Mergen, Z. Qing, and L. Tong, Sensor networks with mobile access: Energy and capacity considerations,
IEEE Transactions on Communications, vol. 54, no. 11, pp. 20332044, Nov. 2006.
[2] W. Liu, K. Lu, J. Wang, G. Xing, and L. Huang, Performance analysis of wireless sensor networks with mobile
sinks, IEEE Transactions on Vehicular Technology, vol. 61, no. 6, pp. 27772788, Jul. 2012.
[3] I. Maza, F. Caballero, J. Capitan, J. Martinez-de Dios, and A. Ollero, A distributed architecture for a robotic
platform with aerial sensor transportation and self-deployment capabilities, Journal of Field Robotics, vol. 28, no.
3, pp. 303328, 2011. [Online]. Available: http://dx.doi.org/10.1002/rob.20383
[4] P. Corke, S. Hrabar, R. Peterson, D. Rus, S. Saripalli, and G. Sukhatme, Autonomous deployment and repair of a
sensor network using an unmanned aerial vehicle, IEEE International Conference on Robotics and Automation,
ICRA04, vol. 4, pp. 36023608, May 2004.
[5] A. Ahmad, M. M. Rathore, A. Paul, and B.-W. Chen, Data transmission scheme using mobile sink in static
wireless sensor network, Journal of Sensors, vol. 2015, 2015.
[6] C. Tunca, S. Isik, M. Donmez, and C. Ersoy, Ring routing: An energy-efficient routing protocol for wireless sensor
networks with a mobile sink, IEEE Transactions on Mobile Computing, vol. 14, no. 9, pp. 19471960, Sept 2015.
[7] W. Liu, K. Lu, J. Wang, L. Huang, and D. Wu, On the throughput capacity of wireless sensor networks with
mobile relays, IEEE Transactions on Vehicular Technology, vol. 61, no. 4, pp. 18011809, May 2012.
[8] M. Abdelhakim, L. Lightfoot, J. Ren, and T. Li, Architecture design of mobile access coordinated wireless sensor
networks, IEEE International Conference on Communications, ICC13, pp. 17201724, Jun. 2013.

Volume 5, Issue 7, July 2017 Page 33


IPASJ International Journal of Computer Science (IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email:editoriijcs@ipasj.org
Volume 5, Issue 7, July 2017 ISSN 2321-5992

[9] M. Abdelhakim, J. Ren, and T. Li, Mobile access coordinated wireless sensor networks topology design and
throughput analysis, IEEE Global Communications Conference, GLOBE-COM13, pp. 46274632, Dec. 2013.

Volume 5, Issue 7, July 2017 Page 34

Das könnte Ihnen auch gefallen