OPTIMIZATION OF LIFETIME IN WIRELESS MONITORING NETWORKS

Authors

  • Yuliia Kovalova
  • Tetyana Babenko
  • Oleksandr Oksiiuk
  • Larysa Myrutenko

Keywords:

wireless monitoring networks, energy efficiency, network lifetime, ZigBee networks.

Abstract

Wireless network finds application in communal facilities monitoring and management systems. One of the basic requirements for the construction of a wireless monitoring network with autonomous power supply is the guaranteed network lifetime. Up-to-date challenges in the field of wireless monitoring networks are creation of universal hardware platforms that allow for usage of widespread proprietary transceivers of different manufacturers aiming at creating network topologies raising energy efficiency and lifetime of WMN. The article describes a model of a wireless network allowing evaluation of its lifetime by energy parameters and dynamic reconfigurations induced by external influence. On the basis of the represented test results one may conclude that energy consumption is defined by the level of the application stack of the protocol ZigBeе and doesn’t depend on PHY and MAC layers of the protocol 802.15.4. Considering energy consumption of the data transmission process, potential increase in the lifetime of the devices and network as a whole is mostly controlled by the sizes of useful messages.

References

D. J. Malan, M. Welsh, M. D. Smith, “Implementing public-key infrastructure for sensor networks,” ACM Transactions on Sensor Networks, vol. 4, no. 4, article 22, 23 p., August 2008.

T. Gao, D. Greenspan, M. Welsh, “Improving patient monitoring and tracking in emergency response,” 2005, [Online]. Available at: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.1956

M. Neugebauer, J. Plonnigs, K. Kabitzsch, “A new beacon order adaptation algorithm for IEEE 802.15.4 networks,” Proceedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN’2005), Jan 31–Feb 2, 2005, pp. 302-311.

X. Ji, H. Zha, “Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling,” Proceedings of the 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’2004), Hong Kong, March 2004, pp. 2652–2661.

N.I. Naumenko, Yu.V. Stasev, A.A. Kuznetsov, “Methods of synthesis of signals with prescribed properties,” Cybernetics and Systems Analysis, vol. 43, issue 3, pp. 321-326, May 2007.

IEEE 802.15.4d-2009 standard, Institute of Electrical and Electronics Engineers, 2009, [Online]. Available at: https://standards.ieee.org /standard/802_15_4d-2009.html.

Y. Semenov, Wireless networks ZigBee and IEEE 802.15.4, [Online]. Available at: http://book.itep. ru/4/41/zigbee.htm.

H. Kwon, H. Seo, S. Kim, B. G. Lee “Generalized CSMA/CA for OFDMA systems: protocol design, throughput analysis, and implementation issues,” Journal of Wireless Communications, vol. 8, no. 8, pр. 4176–4187, 2009.

A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, “SPINS: security for sensor networks,” Proceedings of the International Conference on Mobile Computing and Networking, Italy, 2001, pp. 189-199.

Wei Ye, J. Heidemann and D. Estrin, “Medium access control with coordinated adaptive sleeping for wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 12, no. 3, pp. 493-506, June 2004.

Y. Wang, X. Liu, J. Yin, “Requirements of quality of service in wireless sensor network,” Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, Washington, DC, USA. 2006, pр. 116.

C. Ramassamy, H. Fouchal, P. Hunel, “Impact of application layers over wireless sensor networks,” Proceedings of the 12th International Conference on Innovative Internet Community Systems (I2CS’2012), Trondheim, Norway, June 13-15, 2012 pp. 130-141.

M. Karpinski, V. Chyzh, S. Balaban, J. Gancarczyk, P. Falat, “Increasing the level of information security in wireless sensor networks by improving their geometric models,” Proceedings of the International 18th Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management, SGEM’2018, 2018, vol. 18, pp. 469-476.

ZigBee Alliance, ZigBee Specification, 2008, [Online]. Available at: https://people.ece.cornell.edu/land/courses/ece4760/FinalProjects/s2011/kjb79_ajm232/pmeter/ZigBee%20Specification.pdf.

C. Perkins, Ad hoc On-Demand Distance Vector (AODV), C.E. Belding-Royer, RFC 356, July 2003, 37 p.

J. Balen, D. Zagar, G. Martinovic, “Quality of service in wireless sensor networks: a survey and related patents,” Journal of Recent Patents on Computer Science, vol. 4, pp. 188–202, 2011.

ZigBee Alliance, ZigBee specification overview, 2012, [Online]. Available: http://www.zigbee.org/wp-content/uploads/2014/11/docs-05-3474-20-0csg-zigbee-specification.pdf.

Institute of Electrical and Electronics Engineers, Inc., IEEE Std. 802.15.4-2003, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs), New York, IEEE Press. October 1, 2003, 679 p.

P. Lin, C. Qiao, X. Wang, “Medium access control with a dynamic duty cycle for sensor networks,” Proceedings of the Wireless Communications and Networking Conference (WCNC’2004), Atlanta, GA, USA, March 2004, pp. 1534–1539.

B. Bougard, F. Catthoor, D.C. Daly, A. Chandrakasan, W. Dehaene, “Energy efficiency of the IEEE 802.15.4 standard in dense wireless microsensor networks: modeling and improvement perspectives,” Proceedings of Design, Automation and Test in Europe (DATE), Munich, Germany, March 2005, vol. 1, pp. 196-201.

A.A. Kuznetsov, Smirnov, A.A., D.A. Danilenko, A. Berezovsky. “The statistical nalysis of a network traffic for the intrusion detection and prevention systems,” Telecommunications and Radio Engineering, vol. 74, issue 1, pp. 61-78, 2015. DOI: 10.1615/TelecomRadEng.v74.i1.60.

Downloads

Published

2020-06-14

How to Cite

Kovalova, Y., Babenko, T., Oksiiuk, O., & Myrutenko, L. (2020). OPTIMIZATION OF LIFETIME IN WIRELESS MONITORING NETWORKS. International Journal of Computing, 19(2), 267-272. Retrieved from http://computingonline.net/computing/article/view/1770

Issue

Section

Articles