Boundary Nodes Selection and Routing Protocol in Wireless Sensor Network with Holes
博士 === 國立中央大學 === 資訊工程研究所 === 97 === Wireless Sensor Network (WSN) is an emerging research filed and its technology can be widely utilized in many applications especially in environmental surveillance. However, there are exist some holes within the WSNs caused by some factors such as non-uniform dep...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/85294481490086160318 |
id |
ndltd-TW-097NCU05392047 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097NCU053920472016-05-02T04:10:58Z http://ndltd.ncl.edu.tw/handle/85294481490086160318 Boundary Nodes Selection and Routing Protocol in Wireless Sensor Network with Holes 在具有空洞的無線感測網路中邊界點的選擇及其資訊繞徑之通訊協定設計 Kun-Ying Hsieh 謝坤穎 博士 國立中央大學 資訊工程研究所 97 Wireless Sensor Network (WSN) is an emerging research filed and its technology can be widely utilized in many applications especially in environmental surveillance. However, there are exist some holes within the WSNs caused by some factors such as non-uniform deployment of sensor nodes or the existence of physical obstacle such as mountains and lakes or some sensor nodes deplete their energy or be destroyed by outside forces. These holes will degrade the performance of several routing protocols. Hence, how to discover the boundary nodes surrounding the holes and then utilize the information of boundary nodes for routing protocols to avoid holes in advance and to improve the performance of various applications is a significant research issue. In order to solve this problem, firstly, we propose the Boundary Node Selection and Target Detection protocol where each node has location information. This protocol, in short time, prior to discover some extreme nodes having extreme value of coordinates as the initial boundary nodes surrounding the holes and monitoring region in distributed manner. Then the protocol finds out other remaining boundary nodes based on these extreme nodes. The simulation results show that this protocol can cost few control packets overhead to find out boundary nodes soon and the number of selected boundary nodes comparing the optimal value is approximate. However, in some situations, the sensor nodes cannot obtain location information. Therefore, we propose the Hole Detection and Boundary Recognition protocol. This protocol can discover the boundary nodes by only utilizing the connectivity information among nodes when nodes have no location information. The protocol creates the Virtual Hexagonal Landmarks and then selects the landmarks surrounding the holes and sensing field. Based on this selected landmarks, the protocol further finds out correct boundary nodes. The simulation results show that the protocol has better performance of the accuracy ratio of selecting correct boundary nodes even in low node degrees. Eventually, the information of these boundary nodes should be transmitted to the Sink or some specific data centric nodes and the data packets can avoid the holes when transmitting. Therefore, we propose Routing with Hexagonal Virtual Coordinations protocol. Based on the Virtual Hexagonal Landmarks of previous protocol, the virtual coordination is created. Before transmitting data packets, the protocol uses this virtual coordination to create an Auxiliary Routing Path to indicate the direction of the journey from the source to the destination. When transmitting the data packets, the routing paths assisted by the Auxiliary Routing Path are not always fixed even from same source to destination. The simulation results show that the protocol can find a load balancing routing path to the destination and then prolong the network lifetime. Jang-Ping Sheu 許健平 2009 學位論文 ; thesis 91 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立中央大學 === 資訊工程研究所 === 97 === Wireless Sensor Network (WSN) is an emerging research filed and its technology can be widely utilized in many applications especially in environmental surveillance. However, there are exist some holes within the WSNs caused by some factors such as non-uniform deployment of sensor nodes or the existence of physical obstacle such as mountains and lakes or some sensor nodes deplete their energy or be destroyed by outside forces. These holes will degrade the performance of several routing protocols. Hence, how to discover the boundary nodes surrounding the holes and then utilize the information of boundary nodes for routing protocols to avoid holes in advance and to improve the performance of various applications is a significant research issue. In order to solve this problem, firstly, we propose the Boundary Node Selection and Target Detection protocol where each node has location information. This protocol, in short time, prior to discover some extreme nodes having extreme value of coordinates as the initial boundary nodes surrounding the holes and monitoring region in distributed manner. Then the protocol finds out other remaining boundary nodes based on these extreme nodes. The simulation results show that this protocol can cost few control packets overhead to find out boundary nodes soon and the number of selected boundary nodes comparing the optimal value is approximate. However, in some situations, the sensor nodes cannot obtain location information. Therefore, we propose the Hole Detection and Boundary Recognition protocol. This protocol can discover the boundary nodes by only utilizing the connectivity information among nodes when nodes have no location information. The protocol creates the Virtual Hexagonal Landmarks and then selects the landmarks surrounding the holes and sensing field. Based on this selected landmarks, the protocol further finds out correct boundary nodes. The simulation results show that the protocol has better performance of the accuracy ratio of selecting correct boundary nodes even in low node degrees. Eventually, the information of these boundary nodes should be transmitted to the Sink or some specific data centric nodes and the data packets can avoid the holes when transmitting. Therefore, we propose Routing with Hexagonal Virtual Coordinations protocol. Based on the Virtual Hexagonal Landmarks of previous protocol, the virtual coordination is created. Before transmitting data packets, the protocol uses this virtual coordination to create an Auxiliary Routing Path to indicate the direction of the journey from the source to the destination. When transmitting the data packets, the routing paths assisted by the Auxiliary Routing Path are not always fixed even from same source to destination. The simulation results show that the protocol can find a load balancing routing path to the destination and then prolong the network lifetime.
|
author2 |
Jang-Ping Sheu |
author_facet |
Jang-Ping Sheu Kun-Ying Hsieh 謝坤穎 |
author |
Kun-Ying Hsieh 謝坤穎 |
spellingShingle |
Kun-Ying Hsieh 謝坤穎 Boundary Nodes Selection and Routing Protocol in Wireless Sensor Network with Holes |
author_sort |
Kun-Ying Hsieh |
title |
Boundary Nodes Selection and Routing Protocol in Wireless Sensor Network with Holes |
title_short |
Boundary Nodes Selection and Routing Protocol in Wireless Sensor Network with Holes |
title_full |
Boundary Nodes Selection and Routing Protocol in Wireless Sensor Network with Holes |
title_fullStr |
Boundary Nodes Selection and Routing Protocol in Wireless Sensor Network with Holes |
title_full_unstemmed |
Boundary Nodes Selection and Routing Protocol in Wireless Sensor Network with Holes |
title_sort |
boundary nodes selection and routing protocol in wireless sensor network with holes |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/85294481490086160318 |
work_keys_str_mv |
AT kunyinghsieh boundarynodesselectionandroutingprotocolinwirelesssensornetworkwithholes AT xièkūnyǐng boundarynodesselectionandroutingprotocolinwirelesssensornetworkwithholes AT kunyinghsieh zàijùyǒukōngdòngdewúxiàngǎncèwǎnglùzhōngbiānjièdiǎndexuǎnzéjíqízīxùnràojìngzhītōngxùnxiédìngshèjì AT xièkūnyǐng zàijùyǒukōngdòngdewúxiàngǎncèwǎnglùzhōngbiānjièdiǎndexuǎnzéjíqízīxùnràojìngzhītōngxùnxiédìngshèjì |
_version_ |
1718252982837968896 |