OPTIMIZATION OF LIFETIME IN WIRELESS MONITORING NETWORKS
Keywords:wireless monitoring networks, energy efficiency, network lifetime, ZigBee networks.
AbstractWireless network finds application in communal facilities monitoring and management systems. One of the basic requirements for the construction of a wireless monitoring network with autonomous power supply is the guaranteed network lifetime. Up-to-date challenges in the field of wireless monitoring networks are creation of universal hardware platforms that allow for usage of widespread proprietary transceivers of different manufacturers aiming at creating network topologies raising energy efficiency and lifetime of WMN. The article describes a model of a wireless network allowing evaluation of its lifetime by energy parameters and dynamic reconfigurations induced by external influence. On the basis of the represented test results one may conclude that energy consumption is defined by the level of the application stack of the protocol ZigBeе and doesn’t depend on PHY and MAC layers of the protocol 802.15.4. Considering energy consumption of the data transmission process, potential increase in the lifetime of the devices and network as a whole is mostly controlled by the sizes of useful messages.
D. J. Malan, M. Welsh, M. D. Smith, “Implementing public-key infrastructure for sensor networks,” ACM Transactions on Sensor Networks, vol. 4, no. 4, article 22, 23 p., August 2008.
T. Gao, D. Greenspan, M. Welsh, “Improving patient monitoring and tracking in emergency response,” 2005, [Online]. Available at: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.1956
M. Neugebauer, J. Plonnigs, K. Kabitzsch, “A new beacon order adaptation algorithm for IEEE 802.15.4 networks,” Proceedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN’2005), Jan 31–Feb 2, 2005, pp. 302-311.
X. Ji, H. Zha, “Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling,” Proceedings of the 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’2004), Hong Kong, March 2004, pp. 2652–2661.
N.I. Naumenko, Yu.V. Stasev, A.A. Kuznetsov, “Methods of synthesis of signals with prescribed properties,” Cybernetics and Systems Analysis, vol. 43, issue 3, pp. 321-326, May 2007.
IEEE 802.15.4d-2009 standard, Institute of Electrical and Electronics Engineers, 2009, [Online]. Available at: https://standards.ieee.org /standard/802_15_4d-2009.html.
Y. Semenov, Wireless networks ZigBee and IEEE 802.15.4, [Online]. Available at: http://book.itep. ru/4/41/zigbee.htm.
H. Kwon, H. Seo, S. Kim, B. G. Lee “Generalized CSMA/CA for OFDMA systems: protocol design, throughput analysis, and implementation issues,” Journal of Wireless Communications, vol. 8, no. 8, pр. 4176–4187, 2009.
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, “SPINS: security for sensor networks,” Proceedings of the International Conference on Mobile Computing and Networking, Italy, 2001, pp. 189-199.
Wei Ye, J. Heidemann and D. Estrin, “Medium access control with coordinated adaptive sleeping for wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 12, no. 3, pp. 493-506, June 2004.
Y. Wang, X. Liu, J. Yin, “Requirements of quality of service in wireless sensor network,” Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, Washington, DC, USA. 2006, pр. 116.
C. Ramassamy, H. Fouchal, P. Hunel, “Impact of application layers over wireless sensor networks,” Proceedings of the 12th International Conference on Innovative Internet Community Systems (I2CS’2012), Trondheim, Norway, June 13-15, 2012 pp. 130-141.
M. Karpinski, V. Chyzh, S. Balaban, J. Gancarczyk, P. Falat, “Increasing the level of information security in wireless sensor networks by improving their geometric models,” Proceedings of the International 18th Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management, SGEM’2018, 2018, vol. 18, pp. 469-476.
ZigBee Alliance, ZigBee Specification, 2008, [Online]. Available at: https://people.ece.cornell.edu/land/courses/ece4760/FinalProjects/s2011/kjb79_ajm232/pmeter/ZigBee%20Specification.pdf.
C. Perkins, Ad hoc On-Demand Distance Vector (AODV), C.E. Belding-Royer, RFC 356, July 2003, 37 p.
J. Balen, D. Zagar, G. Martinovic, “Quality of service in wireless sensor networks: a survey and related patents,” Journal of Recent Patents on Computer Science, vol. 4, pp. 188–202, 2011.
ZigBee Alliance, ZigBee specification overview, 2012, [Online]. Available: http://www.zigbee.org/wp-content/uploads/2014/11/docs-05-3474-20-0csg-zigbee-specification.pdf.
Institute of Electrical and Electronics Engineers, Inc., IEEE Std. 802.15.4-2003, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs), New York, IEEE Press. October 1, 2003, 679 p.
P. Lin, C. Qiao, X. Wang, “Medium access control with a dynamic duty cycle for sensor networks,” Proceedings of the Wireless Communications and Networking Conference (WCNC’2004), Atlanta, GA, USA, March 2004, pp. 1534–1539.
B. Bougard, F. Catthoor, D.C. Daly, A. Chandrakasan, W. Dehaene, “Energy efficiency of the IEEE 802.15.4 standard in dense wireless microsensor networks: modeling and improvement perspectives,” Proceedings of Design, Automation and Test in Europe (DATE), Munich, Germany, March 2005, vol. 1, pp. 196-201.
A.A. Kuznetsov, Smirnov, A.A., D.A. Danilenko, A. Berezovsky. “The statistical nalysis of a network traffic for the intrusion detection and prevention systems,” Telecommunications and Radio Engineering, vol. 74, issue 1, pp. 61-78, 2015. DOI: 10.1615/TelecomRadEng.v74.i1.60.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.