IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.
DOI: 10.1109/mahss.2005.1542801
|View full text |Cite
|
Sign up to set email alerts
|

Energy efficient data management for wireless sensor networks with data sink failure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…We define the network lifetime as the time when the residual energy of the earliest sensor node becomes zero, which is counted by round. We compare the performance of DERVP algorithm with an energy level based routing (ELBR) [26], a shortest path based routing (SPBR) [27], and an energy-balanced routing protocol (EBRP) [28] on the network lifetime, energy balance, and energy efficiency. In our simulations, sensors are randomly and uniformly deployed over the square monitoring area.…”
Section: Resultsmentioning
confidence: 99%
“…We define the network lifetime as the time when the residual energy of the earliest sensor node becomes zero, which is counted by round. We compare the performance of DERVP algorithm with an energy level based routing (ELBR) [26], a shortest path based routing (SPBR) [27], and an energy-balanced routing protocol (EBRP) [28] on the network lifetime, energy balance, and energy efficiency. In our simulations, sensors are randomly and uniformly deployed over the square monitoring area.…”
Section: Resultsmentioning
confidence: 99%
“…In (Che, Al-Khateeb, & Anwar, 2010) the authors enhance the AODV routing protocol to apply a backup route for each node along the routing path, then in case of failure, the backup route is used to forward data immediately, when the detecting node requests a new backup. Hyunyoung Lee et al (Hyunyoung, Klappenecker, Kyungsook & Lan, 2005) have proposed a novel approach based on the graph theory (De Berg, Van Kreveld, Overmars, & Schwarzkopf, 1997;Bollobas, 1986), this method implement a hierarchical variable length addressing scheme in which a special nodes "relay" initiate the address allocation process by sending a message that contain their own addresses ( rel node a a ), the receiving nodes put the received address as a prefix of their own ( rel a ), hen forward the message and so on, in this way each address represent a route, and thus no routing protocol is needed, in case of failure of node N, the nodes which have the address of N as prefix request another address from their neighbors. Author in (Belghachi & Feham, 2009) has modified the routing process of AODV by introducing the number of neighbors and the delay of each as a metric to select the route that can be easily repaired.…”
Section: Related Workmentioning
confidence: 99%