An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks
Abstract
:1. Introduction
- (1)
- An Adaption Broadcast Radius-based Code Dissemination (ABRCD) scheme is proposed to achieve lower code dissemination delays while retaining a higher network lifetime for WSNs. What is fundamentally different from previous strategies is that the strategy in this paper is to reduce the number of broadcasts and delay for code dissemination by adjusting the broadcast radius. At the same time, the network lifetime is not lower than in previous strategies. We note that the main task for WSNs is to monitor events and objects. Once a predefined event or physical phenomenon occurs, sensor nodes send the perceived data to the sink. Since the sink is the center of the entire network, the energy consumption of the nodes near to the sink is high, and the energy consumption of the nodes far from sink is low. Since the network lifetime depends on lifetime of the first dead node in the network, this paper proposes an ABRCD scheme that uses the same broadcast radius as the previous strategy in areas near to sink where the energy remain is tight, while the areas with energy surplus use a larger broadcast radius. In this paper, a theoretical analysis is given to determine the value of the broadcast radius in different areas of the network. This can make the code diffusion strategy with unequal broadcast radius get closer to energy consumption balance and improve the energy utilization ratio without affecting the network lifetime.
- (2)
- An efficient and unequal-radius-based code dissemination algorithm is given in this paper for reducing transmissions and broadcast delay of code dissemination. The proposed code disseminating algorithm improves upon previous algorithms. The algorithm first constructs a broadcast backbone under an unequal broadcast radius scenario, and then broadcasts along the broadcast backbone. Since the broadcast radius of most areas in the ABRCD strategy is larger than that of previous strategy, the length of the constructed broadcast backbone path is shorter than the previous strategy and the number of nodes that can be transmitted to in a broadcast is also more than with the previous strategy, so the code diffusion algorithm proposed in this paper can effectively reduce the time and the number of transmissions required for code diffusion.
- (3)
- Through our extensive theoretical analysis and simulation, we demonstrate that ABRCD scheme proposed in this paper has better performance. Compared to the previous schemes, our ABRCD scheme outperforms them in terms of all important performance indicators: (a) The number of transmissions can be effectively reduced. As confirmed by a large number of experiments, the transmissions of ABRCD are reduced compared with previous schemes by 36.18~94.27%; (b) The time for code dissemination is reduced by 41.11~78.42%; (c) The proposed strategy can effectively improve the energy efficiency by up to 583.42%. Finally, when all major performances are improved, its network life is higher than in previous strategies, which was difficult to achieve with those strategies.
2. Related Work
3. System Model and Problem Statement
3.1. System Model
3.2. The Energy Consumption Model
3.3. Problem Statement
4. The Design of the ABRCD Scheme
4.1. Research Motivation of ABRCD
- ①
- Find a node v covering most uncovered nodes in slot i as covering node and mark nodes covered already. Add i to covering time slots of v. That is, ST(v) = ST(v)∪{i}.
- ②
- Find other covering nodes until all nodes in time slot i are all covered.
- Case 2: If two covering nodes, u and v, cover each other and they are at the same level, like in Figure 8b, then the one with more neighbors is selected to be the parent of the other. If they have the same number of neighbors, then use id to break the tie. Suppose u is the parent of v. If Root(u) is not set yet, u itself is selected as the root. And Root(v) = Root(u). In subsequent Figure 13, and covers each other, while has more neighbors, so Pr() is and itself is a root, so Root() is set as .
- Case 3: If two covering nodes, u and v are at the same level and u covers v, like in Figure 8c, then Pr(v) = u and no cycle shall be generated. If Root(u) is not set yet, u itself is selected as the root. And Root(v) = Root(u). In Figure 6, covers , so Pr() is . Root() is set as Root(), That is, Root() = .
- Default Case: If a covering node doesn’t trigger any of the above cases and it just forms a covering sub-tree with a single node itself, like in Figure 8d, it is the default case. Then is selected to be the root. Like in Figure 6, when and first added to build the sub-tree, they are added itself, with no parent.
- Case 1: Node v can find a covering node u that covers it at lower level, but Root(u) is at upper level, like in Figure 9, then Pr(v) = u. Root(v) is updated as Root(u). Our example doesn’t trigger this case, but it is obvious that the first stage only connects the lower covering nodes to the upper ones or covering nodes at the same level. There could be a covering sub-tree whose root node v is at the upper level compared with its covering node u, but at the lower level compared with Root(u).
- Case 2: If node v can’t find a parent in Case 1, then it tries to find a neighbor u as parent. u must satisfy one of the following two conditions: (1) u is a covering node in the sub-trees and Root(u) is at upper level than v. Like in Figure 10a, then Pr(v) = u. (2) u is a connector, and Root(CovNode(u)) is at upper level than v, like in Figure 10b, then u is added to the backbone, and Pr(v) = u, Pr(u) = CovNode(u), Root(v) = Root(CovNode(u)). For all the above two cases, the active time slot of v is added to covering time slots of u. That is, ST(u) = ST(u)∪{AT(v)}. In Figure 7, Pr() is , because is a node satisfying condition (1).
- Case 3: If node v can’t find a parent in all two above cases, then it tries to find a covered node u as parent. u must satisfy one of the following two conditions: (1) u is a connector, and u has a neighbor N(u) already in the backbone, whose root is at upper level than that of v. Like in Figure 11a, then u is added to the backbone and Pr(u) = N(u), Pr(v) = u, Root(v) = Root(N(u)). (2) u is a connector, and u can find a neighbor N(u) as another connector, and CovNode(N(u)) is at upper level than that of v. Like in Figure 11b, then u and N(u) are added to the backbone and Pr(N(u)) = CovNode(N(u)), Pr(u) = N(u), Pr(v) = u. For all the above two cases, the active time slot of v is added to covering time slots of u. That is, ST(u) = ST(u)∪{AT(v)}. And ST(N(u)) = ST(N(u))∪{AT(u)}.
- “Physical link” in Case 2 is replaced by “Directed or double link”, because it should be guaranteed that codes can be transmitted from node u to node v. “Physical link” and the “Covering link” of v in Case 3 is replaced by “Directed or double link” for the same reason.
- “N(u)” is replaced by “f” in Case 3, because when adopting ABRCD, u is required to be the neighbor of f, so that program codes can be transmitted from f to u.
4.2. Algorithm of ABRCD
- Case 2: If node v can’t find a parent in Case 1, then it tries to find a node u that can cover it. That is, vN(u). u must satisfy one of the following two conditions: (a) u is a covering node in the sub-tree and Root(u) is at upper level than v. Then Pr(v) = u. (b) u is a connector, and Root(CovNode(u)) is at upper level than v. Then u is added to the backbone, and Pr(v) = u, Pr(u) = CovNode(u), Root(v) = Root(CovNode(u)). For all the above two cases, the active time slot of v is added to covering time slots of u. That is, ST(u) = ST(u)∪{AT(v)}.
- Case 3: If node v can’t find a parent in all two above cases, then it tries to find two forwarders u and f. vN(u), uN(f). u and f must satisfy one of the following two conditions: (a) u is a connector, f is a covering node already in the backbone, and Root(f) is at upper level than v. Then Pr(u) = f, Pr(v) = u, Root(v) = Root(f). (b) u is a connector, f is another connector, and Root(CovNode(f)) is at upper level than v. Then Pr(N(u)) = CovNode(N(u)), Pr(u) = f, Pr(v) = u. For all the above two cases, the active time slot of v is added to covering time slots of u. That is, ST(u) = ST(u)∪{AT(v)}. And the active time slot of u is added to covering time slots of f, ST(f) = ST(f)∪{AT(u)}.
Algorithm 1: The ABRCD scheme |
Input: A set of nodes, , with their coordinates. And AT(v), ∀v∊ 1. for each node from to do 2. Calculate using its coordinates 3. Calculate using Equation (11) 4. Calculate using Equation (12) 5. end for 6. Construct graph G = ( ) based on coordinates and radius of each node 7. Conduct BFS on G starting from , obtain the level of each node (v), and take the order of BFS as id for each node 8. Find the Minimum Covering Node Sets , i∊T 9. Build Covering Sub-tree, and obtain the set of root and parent of each node, Root and Pr 10. Finalize Backbone: //Backbone is denoted as B 11. for l in [max({L(x)}) .. 1] do 12. for each node v, L(v) = l do 13. if L(Root(CovNode(v))) < L(v) then //Case 1 14. Pr(v) ← CovNode(v) 15. else 16. Find a forwarderu, satisfying //Case 2 17. (1) vN(u) 18. (2) [uB and L(Root(u)) < L(v)] or [L(Root(CovNode(u))) < L(v)] 19. if such a forwarder u exists then 20. Pr(v) ← u 21. AddToBackbone(u, CovNode(u), AT(v)) 22. else //Case 3 23. Find two forwarders u and f, satisfying 24. (1) vN(u) and uN(f) 25. (2) [fB and L(Root(f)) < L(v)] or [L(Root(CovNode(f))) < L(v)] 26. Pr(v) ← u 27. Pr(u) ← f 28. AddToBackbone (f, CovNode(f), AT(u)) 29. AddToBackbone (u, f, AT(v)) 30. end if 31. end if 32. Root(v) ← Root(Pr(v)) 33. end for 34. end for 35. procedureAddToBackbone(x, p, t) 36. if x∊B then 37. B ← B∪{x} 38. Pr(x) ← p 39. Root(x) ← Root(p) 40. end if 41. ST(x) ← ST(x)∪{t} 42. end procedure Output: B, ST and Pr |
5. Theoretical Analysis
5.1. Analysis of Energy Consumption
Algorithm 2: Discrete method to calculate data load and energy consumption |
Input: The whole network radius R, original broadcast radius r, common ratio q, the probability of generating data and energy parameters in Table 1 1. Initializetotal_Q to all zeros/*total_ denotes a set of total data load in the Sector i */ 2. InitializeQ to all zeros/* is a set of average data load for each node in Sector i */ 3. for i in [R...1] do 4. /*i is the distance from current node v to sink*/ 5. Treat i as and calculate using Equation (11) 6. Calculate using Equation (12) 7. total_Q(i) = total_Q(i) + i 8. tmpi = i − ⌊⌋ 9. if tmpi > 0 then 10. total_Q(tmpi) = total_Q(tmpi) + total_Q(i) 11. end 12. Q(i) = (total_Q(i)/i) 13. Calculate energy consumption E(i) using Equation (3) 14. end for 15. Output: Q and E |
5.2. Analysis of Energyutilization Ratio and Network Lifetime
6. Experimental Results Analysis of the ABRCD Scheme
6.1. Transmissions Analysis
6.2. Delay Analysis
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Aguilar, S.; Vidal, R.; Gomez, C. Opportunistic sensor data collection with bluetooth low energy. Sensors 2017, 17, 159. [Google Scholar] [CrossRef] [PubMed]
- Xiao, F.; Wang, Z.; Ye, N.; Wang, R.; Li, X.Y. One More Tag Enables Fine-Grained RFID Localization and Tracking. IEEE/ACM Trans. Netw. 2018, 26, 161–174. [Google Scholar] [CrossRef]
- Zhu, H.; Xiao, F.; Sun, L.; Wang, R.; Yang, P. R-TTWD: Robust device-free through-the-wall detection of moving human with WiFi. IEEE J. Sel. Areas Commun. 2017, 35, 1090–1103. [Google Scholar] [CrossRef]
- Deng, Q.; Li, X.; Li, Z.; Liu, A.; Choi, Y.J. Electricity Cost Minimization for Delay-Tolerant Basestation Powered by Heterogeneous Energy Source. KSII Trans. Internet Inf. Syst. 2017, 11, 5712–5728. [Google Scholar]
- Dai, H.; Liu, Y.; Chen, G.; Wu, X.; He, T.; Liu, A.X.; Ma, H. Safe charging for wireless power transfer. IEEE/ACM Trans. Netw. 2017, 25, 3531–3544. [Google Scholar] [CrossRef]
- Liu, A.; Chen, W.; Liu, X. Delay Optimal Opportunistic Pipeline Routing Scheme for Cognitive Radio Sensor Networks. Int. J. Distrib. Sensor Netw. 2018, 13. [Google Scholar] [CrossRef]
- Zhou, H.; Xu, S.; Ren, D.; Huang, C.; Zhang, H. Analysis of event-driven warning message propagation in vehicular ad hoc networks. Ad Hoc Netw. 2017, 55, 87–96. [Google Scholar] [CrossRef]
- Wu, M.; Wu, Y.; Liu, X.; Ma, M.; Liu, A.; Zhao, M. Learning Based Synchronous Approach from Forwarding Nodes to Reduce the Delay for Industrial Internet of Things. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 10. [Google Scholar] [CrossRef]
- Wang, T.; Zhou, J.; Huang, M.; Bhuiyan, M.Z.A.; Liu, A.; Xu, W.; Xie, M. Fog-Based Storage Technology to Fight with Cyber Threat. Future Gener. Comput. Syst. 2018, 83, 208–218. [Google Scholar] [CrossRef]
- Xie, G.; Ota, K.; Dong, M.; Pan, F.; Liu, A. Energy-efficient routing for mobile data collectors in wireless sensor networks with obstacles. Peer-to-Peer Netw. Appl. 2017, 10, 472–483. [Google Scholar] [CrossRef]
- Liu, X.; Dong, M.; Liu, Y.; Liu, A.; Xiong, N. Construction Low Complexity and Low Delay CDS for Big Data Codes Dissemination. Complexity 2018, 2018, 5429546. [Google Scholar] [CrossRef]
- Liu, X.; Zhao, S.; Liu, A.; Xiong, N.; Vasilakos, A.V. Knowledge-aware Proactive Nodes Selection Approach for Energy Management in Internet of Things. Future Gener. Comput. Syst. 2017. [Google Scholar] [CrossRef]
- Liu, Q.; Liu, A. On the hybrid using of unicast-broadcast in wireless sensor networks. Comput. Electr. Eng. 2017. [Google Scholar] [CrossRef]
- Bhuiyan, M.Z.A.; Wang, G.; Wu, J.; Cao, J.; Liu, X.; Wang, T. Dependable structural health monitoring using wireless sensor networks. IEEE Trans. Dependable Secur. Comput. 2017, 14, 363–376. [Google Scholar] [CrossRef]
- Teng, H.; Liu, X.; Liu, A.; Shen, H.; Huang, C.; Wang, T. Adaptive transmission power control for reliable data forwarding in sensor based networks. Wirel. Commun. Mob. Comput. 2018, 2018, 2068375. [Google Scholar] [CrossRef]
- Liu, X.; Xiong, N.; Zhang, N.; Liu, A.; Shen, H.; Huang, C. A Trust with Abstract Information Verified Routing Scheme for Cyber-physical Network. IEEE Access. 2018, 6, 3882–3898. [Google Scholar] [CrossRef]
- Li, J.; Li, Y.K.; Chen, X.; Lee, P.P.C.; Lou, W. A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1206–1216. [Google Scholar] [CrossRef]
- Tang, J.; Liu, A.; Zhang, J.; Zeng, Z.; Xiong, N.; Wang, T. A Security Routing Scheme Using Traceback Approach for Energy Harvesting Sensor Networks. Sensors 2018, 18, 751. [Google Scholar] [CrossRef] [PubMed]
- Xu, J.; Liu, A.; Xiong, N.; Wang, T.; Zuo, Z. Integrated Collaborative Filtering Recommendation in Social Cyber-Physical Systems. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717749745. [Google Scholar] [CrossRef]
- Li, J.; Li, J.; Chen, X.; Jia, C.; Lou, W. Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 2015, 64, 425–437. [Google Scholar] [CrossRef]
- Huang, M.; Liu, Y.; Zhang, N.; Xiong, N.; Liu, A.; Zeng, Z.; Song, H. A Services Routing based Caching Scheme for Cloud Assisted CRNs. IEEE Access 2018, 6, 15787–15805. [Google Scholar] [CrossRef]
- Xin, H.; Liu, X. Energy-balanced transmission with accurate distances for strip-based wireless sensor networks. IEEE Access 2017, 5, 16193–16204. [Google Scholar] [CrossRef]
- Bhuiyan, M.Z.A.; Wu, J.; Wang, G.; Wang, T.; Hassan, M.M. e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems. ACM Trans. Auton. Adapt. Syst. (TAAS) 2017, 12, 1. [Google Scholar] [CrossRef]
- Li, Z.; Chang, B.; Wang, S.; Liu, A.; Zeng, F.; Luo, G. Dynamic Compressive Wide-band Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Internet of Things. IEEE Trans. Ind. Inform. 2018. [Google Scholar] [CrossRef]
- Liu, X.; Li, G.; Zhang, S.; Liu, A. Big Program Code Dissemination Scheme for Emergency Software-Define Wireless Sensor Networks. Peer-to-Peer Netw. Appl. 2017. [Google Scholar] [CrossRef]
- Zhang, N.; Yang, P.; Zhang, S.; Chen, D.; Zhuang, W.; Liang, B.; Shen, X.S. Software defined networking enabled wireless network virtualization: Challenges and solutions. IEEE Netw. 2017, 31, 42–49. [Google Scholar] [CrossRef]
- Le Duc, T.; Le, D.T.; Zalyubovskiy, V.V.; Kim, D.S.; Choo, H. Level-based approach for minimum-transmission broadcast in duty-cycled wireless sensor networks. Pervasive Mob. Comput. 2016, 27, 116–132. [Google Scholar] [CrossRef]
- Hong, J.; Cao, J.; Li, W.; Lu, S.; Chen, D. Minimum-transmission broadcast in uncoordinated duty-cycled wireless ad hoc networks. IEEE Trans. Veh. Technol. 2010, 59, 307–318. [Google Scholar] [CrossRef]
- Ren, J.; Zhang, Y.; Zhang, K.; Liu, A.; Chen, J.; Shen, X.S. Lifetime and energy hole evolution analysis in data-gathering wireless sensor networks. IEEE Trans. Ind. Inform. 2016, 12, 788–800. [Google Scholar] [CrossRef]
- Le Nguyen, P.; Ji, Y.; Liu, Z.; Vu, H.; Nguyen, K.V. Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing. Comput. Netw. 2017, 129, 232–250. [Google Scholar] [CrossRef]
- Liu, X. Node Deployment Based on Extra Path Creation for Wireless Sensor Networks on Mountain Roads. IEEE Commun. Lett. 2017, 21, 2376–2379. [Google Scholar] [CrossRef]
- Chen, X.; Pu, L.; Gao, L.; Wu, W.; Wu, D. Exploiting massive D2D collaboration for energy-efficient mobile edge computing. IEEE Wirel. Commun. 2017, 24, 64–71. [Google Scholar] [CrossRef]
- Xu, Q.; Su, Z.; Zheng, Q.; Luo, M.; Dong, B. Secure Content Delivery with Edge Nodes to Save Caching Resources for Mobile Users in Green Cities. IEEE Trans. Ind. Inform. 2017. [Google Scholar] [CrossRef]
- Cui, J.; Zhang, Y.; Cai, Z.; Liu, A.; Li, Y. Securing Display Path for Security-Sensitive Applications on Mobile Devices. CMC Comput. Mater. Contin. 2018, 55, 17–35. [Google Scholar]
- Li, J.; Chen, X.; Li, M.; Li, J.; Lee, P.; Lou, W. Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1615–1625. [Google Scholar] [CrossRef]
- Jiang, W.; Wang, G.; Bhuiyan, M.Z.A.; Wu, J. Understanding graph-based trust evaluation in online social networks: Methodologies and challenges. ACM Comput. Surv. (CSUR) 2016, 49, 10. [Google Scholar] [CrossRef]
- Liu, Y.; Ota, K.; Zhang, K.; Ma, M.; Xiong, N.; Liu, A.; Long, J. QTSAC: A Energy Efficient MAC Protocol for Delay Minimized in Wireless Sensor Networks. IEEE Access 2018, 6, 8273–8291. [Google Scholar] [CrossRef]
- Chen, X.; Li, J.; Weng, J.; Ma, J.; Lou, W. Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 2016, 65, 3184–3195. [Google Scholar] [CrossRef]
- Huang, M.; Liu, A.; Zhao, M.; Wang, T. Multi Working Sets Alternate Covering Scheme for Continuous Partial Coverage in WSNs. Peer-to-Peer Netw. Appl. 2018. [Google Scholar] [CrossRef]
- Liu, Y.; Liu, A.; Guo, S.; Li, Z.; Choi, Y.J. Context-aware collect data with energy efficient in Cyber-physical cloud systems. Future Gener. Comput. Syst. 2017. [Google Scholar] [CrossRef]
- Xu, Q.; Su, Z.; Yang, K. Optimal Control Theory-Based Epidemic Information Spreading Scheme for Mobile Social Users with Energy Constraint. IEEE Access 2017, 5, 14107–14118. [Google Scholar] [CrossRef]
- Yang, G.; He, S.; Shi, Z. Leveraging crowdsourcing for efficient malicious users detection in large-scale social networks. IEEE Internet Things J. 2017, 4, 330–339. [Google Scholar] [CrossRef]
- Zhou, H.; Leung, V.C.; Zhu, C.; Xu, S.; Fan, J. Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks. IEEE Trans. Veh. Technol. 2017, 66, 10372–10383. [Google Scholar] [CrossRef]
- Ning, Z.; Wang, X.; Kong, X.; Hou, W. A social-aware group formation framework for information diffusion in narrowband internet of things. IEEE Internet Things J. 2017. [Google Scholar] [CrossRef]
- Li, X.; Liu, A.; Xie, M.; Xiong, N.; Zeng, Z.; Cai, Z. Adaptive Aggregation Routing to Reduce Delay for Multi-Layer Wireless Sensor Networks. Sensors 2018, 18, 751. [Google Scholar] [CrossRef] [PubMed]
- Zhou, K.; Gui, J.; Xiong, N. Improving cellular downlink throughput by multi-hop relay-assisted outband D2D communications. EURASIP J. Wirel. Commun. Netw. 2017, 2017, 209. [Google Scholar] [CrossRef]
- Guo, Y.; Liu, F.; Cai, Z.; Xiao, N.; Zhao, Z. Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage. Sensors 2018, 18, 1189. [Google Scholar] [CrossRef] [PubMed]
- Gui, J.S.; Hui, L.H.; Xiong, N.X. Enhancing Cellular Coverage Quality by Virtual Access Point and Wireless Power Transfer. Wirel. Commun. Mob. Comput. 2018, 2018, 9218239. [Google Scholar] [CrossRef]
- Pu, L.; Chen, X.; Xu, J.; Fu, X. D2D fogging: An energy-efficient and incentive-aware task offloading framework via network-assisted D2D collaboration. IEEE J. Sel. Areas Commun. 2016, 34, 3887–3901. [Google Scholar] [CrossRef]
- Liu, A.; Zhao, S. High Performance Target Tracking Scheme with Low Prediction Precision Requirement in WSNs. Int. J. Ad Hoc Ubiquitous Comput. 2017. Available online: http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijahuc (accessed on 3 March 2018).
- Liu, A.; Huang, M.; Zhao, M.; Wang, T. A Smart High-Speed Backbone Path Construction Approach for Energy and Delay Optimization in WSNs. IEEE Access 2018, 6, 13836–13854. [Google Scholar] [CrossRef]
- Xu, X.; Li, X.Y.; Mao, X.; Tang, S.; Wang, S. A delay-efficient algorithm for data aggregation in multihop wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2011, 22, 163–175. [Google Scholar]
- Liu, X.; Liu, Y.; Xiong, N.; Zhang, N.; Liu, A.; Shen, H.; Huang, C. Construction of Large-Scale Low Cost Deliver Infrastructure Using Vehicular Networks. IEEE Access 2018. [Google Scholar] [CrossRef]
- Guha, S.; Khuller, S. Approximation algorithms for connected dominating sets. Algorithmica 1998, 20, 374–387. [Google Scholar] [CrossRef]
- Wieselthier, J.E.; Nguyen, G.D.; Ephremides, A. On the construction of energy-efficient broadcast and multicast trees in wireless networks. In Proceedings of the IEEE Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2000), Tel Aviv, Israel, 26–30 March 2000; pp. 585–594. [Google Scholar]
- Zhao, D.; Chin, K.W.; Raad, R. Approximation algorithms for broadcasting in duty cycled wireless sensor networks. Wirel. Netw. 2014, 20, 2219–2236. [Google Scholar] [CrossRef]
- Liu, A.; Zheng, Z.; Zhang, C.; Chen, Z.; Shen, X. Secure and energy-efficient disjoint multipath routing for WSNs. IEEE Trans. Veh. Technol. 2012, 61, 3255–3265. [Google Scholar] [CrossRef]
- Gomez, J.; Campbell, A.T. Variable-range transmission power control in wireless ad hoc networks. IEEE Trans. Mob. Comput. 2007, 6, 87–99. [Google Scholar] [CrossRef]
Parameter | Value |
---|---|
Threshold distance () (m) | 87 |
(nJ/bit) | 50 |
(pJ/bit/) | 10 |
(pJ/bit/) | 0.0013 |
Initial energy (J) | 0.5 |
Period | Slot | Data Received at Node |
---|---|---|
1 | 0 | |
1 | ||
2 | ||
2 | 0 | |
1 | ||
2 | ||
3 | 0 | |
1 | ||
2 | ||
4 | 0 | |
1 | ||
2 | ||
5 | 0 | |
1 | ||
2 |
Period | Slot | Data Received at Node |
---|---|---|
1 | 1 | |
2 | ||
2 | 0 | |
1 | ||
2 | ||
3 | 0 | |
1 | ||
2 | ||
4 | 0 | |
1 | ||
2 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yu, S.; Liu, X.; Liu, A.; Xiong, N.; Cai, Z.; Wang, T. An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks. Sensors 2018, 18, 1509. https://doi.org/10.3390/s18051509
Yu S, Liu X, Liu A, Xiong N, Cai Z, Wang T. An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks. Sensors. 2018; 18(5):1509. https://doi.org/10.3390/s18051509
Chicago/Turabian StyleYu, Shidi, Xiao Liu, Anfeng Liu, Naixue Xiong, Zhiping Cai, and Tian Wang. 2018. "An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks" Sensors 18, no. 5: 1509. https://doi.org/10.3390/s18051509
APA StyleYu, S., Liu, X., Liu, A., Xiong, N., Cai, Z., & Wang, T. (2018). An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks. Sensors, 18(5), 1509. https://doi.org/10.3390/s18051509