DOI QR코드

DOI QR Code

Self-Identification of Boundary's Nodes in Wireless Sensor Networks

  • 투고 : 2015.07.27
  • 심사 : 2016.01.19
  • 발행 : 2017.02.28

초록

The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.

키워드

참고문헌

  1. T. T. Vu, V. D. Nguyen, and H. M. Nguyen, "An energy-aware routing protocol for wireless sensor networks based on k-means clustering," in AETA 2013: Recent Advances in Electrical Engineering and Related Sciences. Heidelberg: Springer, 2014, pp. 297-306.
  2. A. Cerpa and D. Estrin, "ASCENT: adaptive self-configuring sensor networks topologies," IEEE Transactions on Mobile Computing, vol. 3, no. 3, pp. 272-285, 2004. https://doi.org/10.1109/TMC.2004.16
  3. A. S. K. Pathan, H. W. Lee, and C. S. Hong, "Security in wireless sensor networks: issues and challenges," in Proceedings of the 8th International Conference Advanced Communication Technology (ICACT), Phoenix Park, Korea, 2006.
  4. J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communications, vol. 11, no. 6, pp. 6-28, 2004.
  5. Khan, H Mokhtar, and M. Merabti, "A new self-detection scheme for sensor network boundary recognition," in Proceedings of IEEE 34th Conference on Local Computer Networks, Zurich, Switzerland, 2009, pp. 241-244.
  6. G. X. Wu, T. L. Huang, P. Liu, and X. Y. Zhou, "Boundary recognition by topological methods in wireless sensor networks," in Proceedings of IEEE Conference Anthology, China, 2013, pp. 1-5.
  7. V. Sukumaran and T. P. Saravanabava, "Modified sensor deployment algorithm for hole detection and healing using NS2," International Journal of Engineering Research and Applications, vol. 4, no. 4, pp. 43-50, 2014
  8. M. Aissani, S. Bouznad, S. E. Allia, and A. Hariza, "Efficient forwarding approach on boundaries of voids in wireless sensor networks," International Journal on Advances in Telecommunications, vol. 5, No. 3-4, pp. 2012.
  9. W. Merrill, L. Girod, B. Schiffer, D. McIntire, G. Rava, K. Sohrabi, F. Newberg, J. Elson, and W. Kaiser, "Defense systems: self healing land mines," in Wireless Sensor Networks: A Systems Perspective. Boston, MA: Artech House; 2005, pp. 273-288.
  10. M. P. Durisic, Z. Tafa, G. Dimic, and V. Milutinovic, "A survey of military applications of wireless sensor networks," in Proceedings of 2012 Mediterranean Conference on Embedded Computing (MECO), Bar, Montenegro, 2012, pp. 196-199.
  11. R. Dulski, M. Kastek, P. Trzaskawka, T. Piatkowski, M. Szustakowski, and M. Zyczkowski, "Concept of data processing in multisensor system for perimeter protection," in Proceedings of SPIE 8019: Defense, Security, and Sensing. Bellingham, WA: International Society for Optics and Photonics, 2011.
  12. Saukh, R. Sauter, M. Gauger, P. J. Marron, and K. Rothermel, "On boundary recognition without location information in wireless sensor networks," in Proceedings of International Conference on Information Processing in Sensor Networks, St. Louis, MO, 2008, pp. 207-218.
  13. Khan, H. Mokhtar, and M. Merabti, "A survey of boundary detection algorithms for sensor networks," in Proceedings of the 9th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, 2008, pp. 1-5.
  14. A. Boudhir, B. Mohamed, and B. A. Mohamed, "New technique of wireless sensor networks localization based on energy consumption," International Journal of Computer Applications, vol. 9, no. 12, pp. 25-28, 2010.
  15. A. Pal, "Localization algorithms in wireless sensor networks: current approaches and future challenges," Network Protocols and Algorithms, vol. 2, no. 1, pp. 45-73, 2010.
  16. K. Y. Hsieh and J. P. Sheu, "Hole detection and boundary recognition in wireless sensor networks," in Proceedings of 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, Tokyo, Japan, 2009, pp. 72-76.
  17. Zhang, Y. Zhang, and Y. Fang, "Detecting coverage boundary nodes in wireless sensor networks," in Proceedings of 2006 IEEE International Conference on Networking, Sensing and Control, Ft. Lauderdale, FL, 2006, pp. 868-873.
  18. F. Yan, P. Martins, and L. Decreusefond, "Connectivity-based distributed coverage hole detection in wireless sensor networks," in Proceedings of IEEE Global Telecommunications Conference, Houston, TX, 2011, pp. 1-6.
  19. P. Antil and A. Malik, "Hole detection for quantifying connectivity in wireless sensor networks: a survey," Journal of Computer Networks and Communications, vol. 2014, article ID. 969501, 2014.
  20. A. Varga, "The OMNeT++ discrete event simulation system," in Proceedings of the European Simulation Multiconference (ESM2001), Prague, Czech Republic, 2001, pp. 1-7.
  21. M. Aissani, S. Bouznad, A. Hariza, and S. E. Allia, "An effective mechanism for handling open voids in wireless sensor networks," in Proceedings of the 5th International Conference on Sensor Technologies and Applications, Nice, France, 2011, pp. 24-29.
  22. N. Senouci, M. K. El Ouahed, and H. Haffaf, "Detecting boundary nodes in WSN," in Proceedings of the International Conference on Wireless Networks (ICWN), Las Vegas, NV, 2014, pp. 47-52.
  23. A. Varga, "OMNeT++," in Modeling and Tools for Network Simulation. Heidelberg: Springer, 2010, pp. 35-59.
  24. A. Boulis, "Castalia: revealing pitfalls in designing distributed algorithms in WSN," in Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, Sydney, Australia, 2007, pp. 407-408.
  25. B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, 2000, pp. 243-254.