Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks

被引:0
|
作者
Xu Qin
Guanglun Huang
Baoxian Zhang
Cheng Li
机构
[1] University of Chinese Academy of Sciences,Research Center of Ubiquitous Sensor Networks
[2] Memorial University,Faculty of Engineering and Applied Science
关键词
Opportunistic routing; Data fusion; Data correlation; Wireless sensor networks; Mutual information maximization;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we study the design of data correlation aware opportunistic routing protocol for wireless sensor networks (WSNs) constituent of lossy links for improved network performance. We focus on a scenario where only M < N sensor nodes are required to report their readings, where N is the number of sensor nodes in the network. We formulate the problem of selecting M such reporting sensors among the N nodes as a mutual information maximization problem such that minimal information loss is resulted. Due to the NP-hardness of this issue, we present a greedy informative sensor selection algorithm. To reduce the transmission redundancy and improve the network lifetime performance, we design an energy efficient correlation aware hop-by-hop opportunistic routing protocol EECAR, which takes the following factors into account: spatial correlation characteristics among sensor readings, broadcast nature of wireless channels, and residual battery energy of sensor nodes. EECAR requires very limited routing information to be kept at nodes in the network. Extensive simulation results demonstrate the effectiveness of our greedy informative sensor selection algorithm and also show that EECAR outperforms existing work in terms of network lifetime and data gathering.
引用
收藏
页码:1963 / 1975
页数:12
相关论文
共 50 条
  • [1] Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks
    Qin, Xu
    Huang, Guanglun
    Zhang, Baoxian
    Li, Cheng
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 1963 - 1975
  • [2] Data Correlation Aware Opportunistic Routing Protocol for Wireless Sensor Networks
    Huang, Guanglun
    Zhang, Baoxian
    Yao, Zheng
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [3] A new QoS aware and energy efficient opportunistic routing protocol for wireless sensor networks
    Tiab, Amal
    Bouallouche-Medjkoune, Louiza
    Boulfekhar, Samra
    [J]. INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2018, 33 (01) : 52 - 68
  • [4] Energy Aware Opportunistic Routing in Wireless Sensor Networks
    Spachos, Petros
    Chatzimisios, Periklis
    Hatzinakos, Dimitrios
    [J]. 2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 405 - 409
  • [5] Efficient Energy and Position Aware Routing Protocol for Wireless Sensor Networks
    Shivalingagowda, Chaya
    Jayasree, P. V. Y.
    Sah, Dinesh K.
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (05) : 1929 - 1950
  • [6] REVIEW ON ENERGY EFFICIENT OPPORTUNISTIC ROUTING PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS
    Ismail, Nasarudin
    Mohamad, M. M.
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (07): : 3064 - 3094
  • [7] Opportunistic Routing and Data Dissemination Protocol for Energy Harvesting Wireless Sensor Networks
    Bouachir, Ons
    Ben Mnaouer, Adel
    Touati, Farid
    Crescini, Damian
    [J]. 2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
  • [8] Energy Aware Opportunistic Routing for Energy Harvesting Wireless Sensor Networks
    Li, Yuanyang
    He, Xinxin
    Yin, Changchuan
    [J]. 2020 IEEE 31ST ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (IEEE PIMRC), 2020,
  • [9] Congestion-Aware Opportunistic Routing Protocol in Wireless Sensor Networks
    Shelke, Maya
    Malhotra, Akshay
    Mahalle, Parikshit N.
    [J]. SMART COMPUTING AND INFORMATICS, 2018, 77 : 63 - 72
  • [10] Energy Aware Routing Protocol in Wireless Sensor Networks
    Kim, Backhyun
    Kim, Iksoo
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (1A): : 201 - 207