International Scholarly Research Notices

International Scholarly Research Notices / 2014 / Article

Research Article | Open Access

Volume 2014 |Article ID 518268 |

R. Velmani, B. Kaarthick, "An Energy Efficient Data Gathering in Dense Mobile Wireless Sensor Networks", International Scholarly Research Notices, vol. 2014, Article ID 518268, 10 pages, 2014.

An Energy Efficient Data Gathering in Dense Mobile Wireless Sensor Networks

Academic Editor: G. Mazzini
Received06 Feb 2014
Accepted20 Mar 2014
Published16 Apr 2014


Amidst of the growing impact of wireless sensor networks (WSNs) on real world applications, numerous schemes have been proposed for collecting data on multipath routing, tree, clustering, and cluster tree. Effectiveness of WSNs only depends on the data collection schemes. Existing methods cannot provide a guaranteed reliable network about mobility, traffic, and end-to-end connection, respectively. To mitigate such kind of problems, a simple and effective scheme is proposed, which is named as cluster independent data collection tree (CIDT). After the cluster head election and cluster formation, CIDT constructs a data collection tree (DCT) based on the cluster head location. In DCT, data collection node (DCN) does not participate in sensing, which is simply collecting the data packet from the cluster head and delivering it into sink. CIDT minimizes the energy exploitation, end-to-end delay and traffic of cluster head due to transfer of data with DCT. CIDT provides less complexity involved in creating a tree structure, which maintains the energy consumption of cluster head that helps to reduce the frequent cluster formation and maintain a cluster for considerable amount of time. The simulation results show that CIDT provides better QoS in terms of energy consumption, throughput, end-to-end delay, and network lifetime for mobility-based WSNs.

1. Introduction

WSNs have recently come into prominence because they hold potential to revolutionize many segments of our economical life, environmental monitoring, health care applications, infrastructure protection, context-aware computing, and battlefield awareness [1]. The strength of WSNs lies in their flexibility, energy consumption, mobility, and scalability. The number of sensors capability and their organized fashion made wireless sensor communication first option to utilize them in remote or hazardous environments. The ultimate goal of such WSNs is often to deliver the sensing data from sensor nodes to sink node and then conduct further analysis at the sink node [2]. To perform such tasks effectively, several network routing protocols have been proposed mainly for data collection.

Topology management plays a vital role in minimizing various constraints such as limited energy, computational resource crisis, latency, and quality of communication. Now, the transmission distance between the sensor nodes is responsible for energy consumption. Power loss is always directly proportional to the distance , where is the distance between sensor nodes, is the environmental fading factor, for free space fading, and for multipath fading [3]. The topology inherently defines the types of routing path as broadcast or unicast and it determines the size, type of packets, and other overheads. Choosing a right topology helps to reduce the communication overhead and energy conservation. An efficient topology ensures that neighbors are at a minimal distance and reduces the probability of a packet being lost between sensor nodes. An efficient topology management may diminish the long range communication within a network, communication failure and improves the network lifetime.

In addition, topologies in WSNs define the dimension of the sensor node group and managing the addition of new members as well as dealing with members who left the group. By considering such aspects, the topology may provide an efficient data collection with low energy utilization and form superior WSN. The existing WSNs topologies are flat, tree, cluster, cluster tree, and chain. Based on the nature of network, different kinds of topologies are followed to gain the maximum data collection efficiency. This paper deals with an existing data collection topology and the proposed logical topology called DCT. It overcomes the existing limitations such as network lifetime and minimizes the energy consumption with effective data collection [4].

Network topology determines the overall efficiency of the WSNs. Based on the data gathering and dissemination applications, various types of logical topologies are defined into (i) flat topology, (ii) cluster based topology, (iii) chain based topology, (iv) tree based topology, (v) cluster tree topology.

2.1. Flat/Unstructured Topology (FT)

FT/UT is a very simple method to collect the data for the sink [5]. FT is used in the case of no topology or the absence of any defined topology shown in Figure 1(a) (i.e., flooding and gossiping). Here, each sensor node plays an equal role to form a network. FT construction is a costly operation. It does not bother about the energy constraints which lead to the implosion and overlapping problems [6]. For example, sensor protocols for information via negotiation (SPIN), directed diffusion, energy-aware routing, rumor routing, gradient based routing (GBR), constrained anisotropic diffusion routing (CADR), and cougar and active query forwarding in sensor networks (ACQUIRE) [714].

2.2. Chain Topology (CT)

The CT constructs a transmission chain to connect the deployed sensor nodes. A node is selected in the chain to act as leader of chain. All the sensor nodes can communicate with each other along the chain. Excessive delay for distant nodes on the chain is the main demerits of this topology (i.e., increasing the length of the chain causes excessive delay where the leaf nodes collected data to reach the leader). When the sensor nodes have high mobility, it leads to the link break problems and affects the network performance. For example, Greedy algorithm, minimum transmission energy (MTE), power efficient gathering in sensor information systems (PEGASIS), chain oriented sensor network (COSEN), and chain routing with even energy consumption (CREEC) [1517].

2.3. Cluster Based Topology (CBT)

CBT has been widely used in WSNs for data gathering, data dissemination, and target tracking. Clustering is a proficient method for specific applications, which requires scalability to hundreds or thousands of nodes (i.e., widely used in dense WSNs) shown in Figure 1(b). Scalability in this context implies the need for load balancing, proficient resource exploitation, and data aggregation. In clustering, cluster head election is an important task. Here, the cluster head election is done by various methods like distributed (i.e., cluster head can be elected with probabilistic, residual energy, random method, and election phase) and centralized (i.e., cluster head have been assigned with nonprobabilistic methods by sink or base station) election [18, 19].

After the cluster head election, all the cluster heads forward the data to the base station with direct hopping (cluster head directly connected with base station) or multihopping (cluster head to cluster head communication) techniques. For mobility-based environments, frequent changes of cluster head and multihop techniques cannot offer a guaranteed data transmission rate. It diminishes the performance of the entire network. For example, low energy adaptive clustering hierarchy (LEACH), hybrid energy efficient distributed clustering (HEED), base-station controlled dynamic clustering protocol (BCDCP), concentric clustering scheme (CCS), energy aware routing protocol (EAR), hierarchical geographic multicast routing (HGMR), cluster head gateway switch routing (CGSR), and mobility-based clustering protocol (MBC) [2026].

2.4. Tree Based Topology (TBT)

In TBT, all the deployed sensor nodes construct a logical tree. Generally, TBT works with DFS (depth first search) or BFS (breadth first search) method [2]. Here, the entire data packet passes from leaf node to the parent nodes. Likewise, data flow from all sensor nodes to the sink is carried out. Constructing a logical tree avoids packet flooding. It uses unicast instead of broadcast, as the flooding is not necessary for data communication. Therefore, tree topology consumes less power than flat topology. When compared with a few basic clustering protocol, tree topology proves to be much more effective on energy utilization [27]. Tree formation for the whole network is a time consuming and costly operation. It cannot tolerate with node failures and power consumption is uneven across the network. For avoiding the interference problem, different access methods are chosen. Otherwise, it causes delay in sending the data packet from leaf nodes to root node, for example, minimum spanning tree (MST), tree based data collection scheme (TBDCS), and efficient convergecast tree (ECT) [2830].

2.5. Cluster Tree Topology (CTT)

CTT contains cluster and tree topology formation process shown in Figure 2. The network design starts with a special node called designated device (DD). It acts as a cluster head with greater transmission power and receiver sensitivity. The beacon signal contains NetID, CID and NID nodes are added to the DD. Whenever, the node receives a beacon from a neighbor node, which sends a CONNECT REQUEST to DD. The DD acknowledges to the corresponding node with Connect Response and the cluster tree formed. Here, the creation of such topology with node id is a tedious process. Then, the special nodes (DD) should be initiated to make cluster tree [31], for example, ZigBee, 6LoWPAN. The main objective of cluster tree is increasing the network capacity, minimizing the energy consumption and end-to-end delay. But, the effectiveness of cluster tree is based on the network parameters like scalability, data rate, cluster dimension (number of clusters and cluster members for each cluster), tree intensity (number of layers), RSS (received signal strength) and mobility (node position, velocity, and direction), for example, cluster tree data gathering algorithm (CTDGA) [32].

2.6. Mobility Model

The mobility model is designed to describe the location, velocity, and direction change over a time of mobile sensor nodes. The random waypoint model (RWM) is used in mobility management schemes (e.g., ad hoc networks and sensor networks) [33]. The node travels from a starting coordinate to a random ending coordinate with a randomly generated constant velocity. The velocity is picked from interval. When a sensor node reaches the destination point, the node waits for a time earlier than arriving at the next destination [34].

3. Problem Statement

In flat topology, all the sensor nodes directly communicate with the sink or simply forward the data packets to the neighbor nodes. Whenever, the sensor node wants to communicate with a sink, the existing methods have limitation such as delay, data redundancy, and large amount of energy exploitation. Since, it is using flooding, gossiping, direct communication, and so forth. The cluster based data collection suggests better performance with cluster heads. Conversely, the data dissemination from cluster head to cluster head or sink (cluster head to sink communication must be either direct hop or multihop communication) involves reliable stable links, which causes more energy consumption. For mobility-based environments, frequent cluster changes of the sensor node lead to link failure which causes diminishing the network lifetime.

CT provides better performance than flat and cluster topology. However, it increases the data collection time than CBT. Since, it must follow the chain route to reach sink, the entire network dies slowly due to the even energy utilization of overall WSN. TBT can save more energy than CBT. It includes several time stamps in order to collect data from leaf to root node. In mobility environment, it leads to link failure, packet drop, and delayed transmissions.

CTT offers enhanced performance than FT, CT, CBT, and TBT. The cluster head (DD) selection, maintaining the cluster with stable links for mobile sensor nodes is a costy operation. The above topologies are not feasible and mended adapt to mobile sensor ambiance. To overcome the existing limitations in the above FT, CT, CBT, TBT, and CTT, we propose a novel logical topology for data collection, namely, cluster independent data collection tree (CIDT).

Figure 3 shows the simple outline of our proposed scheme named into CIDT structure. It is a unique nature of logical scheme, which helps to improve the network lifetime and effective data collection, thereby increasing network lifetime with minimum delay. CIDT is a best hybrid scheme (which utilizes cluster and tree topology) suitable for dense wireless sensor networks than any other logical topology. On mobility-based environments, it provides better performance than other methods.

4. CIDT (Cluster Independent Data Collection Tree)

The CIDT consists of setup phase and steady state phase. In setup phase, cluster formation and tree construction is initiated to identify the optimal path between cluster member and sink. It is denoted in intracluster and DCT communication. DCT construction for single cluster is shown in Figure 4.

Now, the cluster head is responsible for the data collection from cluster members and cluster maintenance operations. At first, all the sensor nodes elect ahead to the cluster head and form a cluster. Thereafter, tree formation is initiated, which connects the cluster head and sink. Here, the cluster formation and DCT construction is based on the threshold value, connection time, and RSS. After the setup phase completion, data transmission is initiated in steady state phase. Here, all the cluster members send ahead the data packets to sink based on the optimal path.

4.1. CIDT Tree Formation

For a large-scale WSN, numerous number of sensor nodes have been randomly deployed. In this case, the selection of DCN does not affect the data collection of a corresponding cluster. It should have better connection time with the nearest DCN node and cluster head. The DCT formation is based on the location of cluster head, connection time between the cluster head and DCN. After the cluster head election, BS or sink initiates ahead to the DCT formation process. Based on the location of cluster head and connection time, a few numbers of nodes are selected as DCN. Now, the DCN may act as a data collection node and does not participate in sensing. But, it does not belong to any cluster.

All the DCN collects the data from cluster head, which aggregate with the corresponding cluster head and then forward to the next DCN. The DCN selection algorithm is executed by sink in order to select the DCN to form an independent tree structure. Figure 5 presents the flow chart of DCT construction.

Algorithm 1 steps:(a)Initialize the values.(b)Choose a random TIN (temporary independent node) from sink.(c)In case, a very first one-hop distance node from the sink is CH. Then, skip to another one-hop NN (Neighbor Node).(d)Select a one-hop NN as CNI (Current Node Identity) and assign the integrity as TIN.(e)Now, the one-hop distance (NH, NN) CNI from the sink is considered into TIN and select a better TIN among them.(f)Select a one-hop distance NN to the CH as PIN from TIN.(g)In that case, step (c) is not able to find TIN. Then, skip to select a SIN from TIN, which is another one-hop distance NN (Neighbor Node) from CH.(h)Increment the value of NH and NN for next DCN selection.(i)Change the integrity of SIN (Selected Independent Node) to FSIN (Finalized and Selected Independent Node).(j)Choose a FSIN from random TIN.(k)Let the integrity of FSIN considered as DCN, which is used to construct a DCT link between the sink and cluster head.

int i, j, m, N, NH = 1, HC = 1         (a)
for (i 1 to N)              (b)
{ if (CNI == CH)
NH = NH++           (c)
TIN NH            (d)
if (CNI == NN && CNI = CH++ && TIN == CNI)
for (j 0 to m)           (e)
PIN TIN                (f)
SIN TIN             (g)
NN NH++            (h)
if (PIN == TIN && SIN == TIN && SIN == PIN)
FSIN SIN            (i)
FSIN Random (TIN)          (j)
DCT DCN              (k)

The above list represents the algorithm for DCT. Initially sink starts with the one-hop neighbor sensor node to add that particular node to act as a DCN in DCT. The parameters include HC = 1 (hop distance is used to select a one-hop neighbor node from sink to act as a current node identity (CNI)), NH (new hop distance is an additive value, which denotes the current distance of node (CNI) from sink and it is used to finalize the DCN selection). Then, the identified nodes have been stored in temporary structure (TIN). In case, the one-hop distance neighbor node (NN) is found to be CH, one node from the cluster head with HC = 1 is identified as TIN. After finding the NH of the network, starting with the nearest node as cluster head, the node selection is finalized. Then selected nodes are utilized to form the DCT.

DCT is a hierarchical tree structure, which covers the entire WSNs. DCN collects the data from the cluster heads and delivers it to sink or BS. Selecting DCN with better connection time and best communication range reduces energy consumption due to long range node to node data transfer. While the sensor nodes are on high mobility, the selected DCN keeps the communication with the cluster head for a longer time and there is no need to update the tree structure. In order to keep the lifetime of whole network in harmony DCN is also newly selected every time when the new cluster heads are elected. New DCN selection also is carried out by sink, which is based on the mobility of the new cluster head.

4.2. Intracluster Communication

Considering ambiguous large-scale WSNs, sensor nodes have been densely deployed over the region. During the setup phase, the beacon signal is used to identify the sensor nodes location and position. Once the nearby nodes are identified, random algorithm or election algorithm is used to elect the cluster head. After the cluster head selection, the next phase DCT formation is initiated.

In the proposed method, the threshold value has been calculated in (1) by adding the flag value with the multiplication of factors such as the total number of neighbor nodes, residual energy, and current speed of the sensor node, where is the flag (set for previous round cluster head and for sensor node having a chance to act as current round cluster head based on ), is the current sensor node energy, is the current speed of the sensor node, is the initial energy, and is the maximum speed of the sensor node. In order to avoid the election of high mobility node as cluster head, instead of may be considered. The expected number of sensor nodes in each cluster is . Those nodes having maximum residual energy, maximum number of cluster members, and maximum connection time can be elected as cluster head in (1): It is visualized that the 2D network position of the cluster head b and sensor node at time is characterized in (2) as follows: where is the primary node location, is the speed, is the moving path angle between , and is the connection time. Then, the subscript corresponds to sensor node and cluster head , respectively. Let the be denoted as (3) At time , each sensor node receives an advertisement message from any one of the cluster heads. Hence, the above 2D network equation (3) is considered and simplified into (4) Now, is the difference between and at time instance and . Let be found using (4): However, for , there is no sensor nodes on mobility within a cluster. is the negative value for sensor nodes in a cluster moving away from the cluster head; is the positive value cluster head and cluster member moving towards to each other. Now, the RSS (received signal strength) can be calculated at any time instance and in (6) whereas is the minimum required threshold value and is the current threshold value at time instance . If RSS is a positive value, the cluster members join in an appropriate cluster and communicate with corresponding cluster head. In this case, is the difference between and , which can be found from (6) wherever, , cluster member move away from the current position of the cluster head. , both cluster member and cluster head move towards each other from their current position. is the value assigned to sensor node a on round, which indicates its robustness for connection with cluster head b. The dimensionless value and is a linear combination with constant coefficients between 0 and 1. The coefficients represent the consequence of each factor and are denoted in (8) as follows: Therefore, (8) can be originated into and in (9) represented as where is the initial energy, is the cluster head current energy, is the number of current cluster members for cluster head , is the minimum required RSS from and , is the current RSS between a and , is the distance between a and b at any time instance , is the maximum coverage distance between b and a, is the estimated connection time for a begins its transmission to b, and is the current duration of the data frame for b.

4.3. DCT Communication

After the intracluster communication phase, DCT formation phase is initiated. It is based on the threshold value, connection time, and network traffic. DCT makes a communication link between the cluster head and sink. Let it be visualized that the 2D network position of the cluster head b and DCN e or h at time t is On each round, the distance between cluster head b to DCN e and h has been calculated from (10). Let the distance and be denoted in (11) Let ; the distance and in (11) can be considered as For any cluster head to DCN or DCN to DCN or sink to DCN communication, the threshold value has been calculated in (13) by adding total number of DCN with multiplied factors such as the residual energy, and current speed between cluster head to DCN or DCN to DCN. Let be considered instead of (it represents that cluster head or sink or DCN), as a substitute of and (it signifies that DCN): where is the count for DCN, is the current cluster head energy, is the current speed of the cluster head, is the initial energy, and is the maximum speed of cluster head. Let be the diversity with and . At the time instance and , is represented in (14) However, , both nodes (cluster head and DCN or any two DCN) not in mobility, which is separated in even distance. is the negative value for both nodes moving away; is the positive value for both nodes moving towards each other. Consequently, the RSS (received signal strength) between any two nodes, at the time instance and is calculated in (15) where is the minimum required threshold value and is the current threshold value. If is a positive value, then the cluster head or DCN has a likelihood to join with nearest DCN, which can establish the communication with corresponding nodes. can be found using (15) as follows: wherever , both nodes moving away from their current position. , both nodes moving towards each other. The dimensionless value , and is a linear combination with constant coefficients between 0 and 1. The coefficients represent the consequence of each factor and are denoted as (17) is the value assigned to all on each round, which indicates its heftiness for connection with : where is the initial energy of v, is the current energy of , is the total number of cluster head or DCN connected with , is the minimum required RSS to make a connection from and , is the current RSS to establish a connection between u and is the maximum coverage distance between and is the distance between and at any time instance , is the estimated connection time for begins its transmission to , and is the current duration of the data frame for .

4.4. Frame Duration

Let us consider the number of current cluster Members and the number of expected cluster members can be derived from the following equation (19): where is the current cluster member from one cluster, is the expected number of cluster member, is the number of cluster member dead, is the total number of cluster members on sleep state, is the total number of current sensor nodes, is the total number of sensor nodes over a network, is the number of sensor nodes dead, and is the cluster head. Now, the current duration of the data frame from each cluster is denoted in (20) where is the data packet length and is the transmission bit rate.

4.5. Steady State Phase

On steady state phase, each cluster member and the corresponding cluster head build intracluster communication with each other. Initially, all the cluster members send the sensed data to cluster head in an allocated TDMA time slot. Thereafter, the cluster head aggregates the received data, and then forward the data packet to the DCN. Again, DCN aggregates the data packet from its cluster head and then forward to the sink with DCT. In DCT communication, direct sequence spread spectrum techniques can be used to transfer the data packets from the cluster head to DCN and sink. DCT discovers an optimal path between the cluster head and the sink based on the distance, connection time, threshold value, and residual energy. Based on the optimal path, the entire cluster head forwards the data packets to the nearest DCN. Now, the DCT becomes responsible for forwarding an entire data from the cluster head to sink.

5. Results and Discussion

In this section, the simulation results are used to evaluate the performance of the proposed protocol under various parameter settings. The network simulator was used to carry out a performance study of CIDT to compare with LEACH and MBC. Considering 500 nodes of WSNs, all the nodes were randomly deployed in a square region of 1000 × 1000 m2, the size of data packet is 512 bytes, the transmission range within the cluster 40 m, the transmission range between the cluster 80 to 120 m, the sensing range is 20 m, and the base station is located in (, ). Further communication energy parameters can be set as = 50 nJ/bit/m2 and = 0.0013 pJ/bit/m4. Then, the energy required for data aggregation is set into = 50 nJ/bit/signal.

Based on CIDT, the network performance was simulated in terms of the packet delivery ratio (PDR), throughput, delay, total energy, and speed. Figures 6, 7, 8, and 9 illustrate the relationship between the number of deployed nodes and the performance of the network (PDR, throughput, total energy consumption, and delay). It is worth noting that LEACH, HEED, and MBC fail to prolong the PDR, throughput, total energy consumption, and delay as the number of node increases. However, CIDT makes better performance linearly even the number of sensor node increases over the network. In large-scale mobility-based WSNs, unreliable links may cause the packet loss and retransmissions. In that case, it may increase the energy consumption of sensor nodes. In addition, it may reduce the PDR and throughput. Although, CIDT can provide stable links and guarantee the balanced energy conservation over the network. Therefore, it can be conclude that CIDT protocol has been mended adapting to the high mobility environment.

Figures 10 and 11 show that CIDT has superior performance when compared to MBC, HEED, and LEACH in mobile sensor ambience. In the simulation results, it can be enunciated that CIDT protocol has provided stable links and mended adapting to the high mobility environment. On high mobility environment, CIDT makes better PDR and less end-to-end delay.

Finally, it can be concluded that the proposed CIDT protocol can save the sensor nodes residual energy, extend the network lifetime and network reliability. It is mended adapting to the high mobility environment with better communication quality.

6. Conclusions

With the growing impact of WSNs on real time civil and military applications, numerous sensor nodes are required to monitor the large-scale areas. Cluster tree is a proficient method to construct suspicious network management architecture. The ultimate goal is to exploit the network lifetime, residual energy, throughput, PDR, and stable link for mobile sensor nodes. In this paper, CIDT (cluster independent data collection tree) proposed for mobility-based WSNs, each cluster member chooses the cluster head with better connection time, and RSS. Then, forward the data packets to the corresponding cluster head in an allocated time slot. Consequently, the sink or DCN select the one-hop neighbor DCN or cluster head with the maximum of threshold value, RSS, connection time, and less network traffic. From the simulation results, it is evident that CIDT provides more stable links, throughput, PDR with a reduction of network traffic and a condensed sum of energy utilization than LEACH, HEED, and MBC.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.


  1. F. Zhao and L. J. Guibas, Wireless Sensor Networks : An Information Processing Approach, Elsevier, 2004.
  2. S. Chen, M. Huang, S. Tang, and Y. Wang, “Capacity of data collection in arbitrary wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 1, pp. 52–60, 2012. View at: Publisher Site | Google Scholar
  3. W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002. View at: Publisher Site | Google Scholar
  4. Q. Mamun, “A qualitative comparison of different logical topologies for wireless sensor networks,” Sensors, vol. 12, no. 11, pp. 14887–14913, 2012. View at: Google Scholar
  5. K.-W. Fan, S. Liu, and P. Sinha, “Structure-free data aggregation in sensor networks,” IEEE Transactions on Mobile Computing, vol. 6, no. 8, pp. 929–942, 2007. View at: Publisher Site | Google Scholar
  6. K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad Hoc Networks, vol. 3, no. 3, pp. 325–349, 2005. View at: Publisher Site | Google Scholar
  7. W. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks,” in Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '99), Seattle, Wash, USA, 1999. View at: Google Scholar
  8. C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 56–67, Boston, Mass, USA, August 2000. View at: Google Scholar
  9. E. Astier, A. Hafid, and A. Benslimane, “Energy and mobility aware clustering technique for multicast routing protocols in wireless Ad hoc networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '09), Orlando, Fla, USA, April 2009. View at: Publisher Site | Google Scholar
  10. D. Braginsky and D. Estrin, “Rumor routing algorithm for sensor networks,” in Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA '02), pp. 22–31, Atlanta, Ga, USA, September 2002. View at: Google Scholar
  11. C. Schurgers and M. B. Srivastava, “Energy efficient routing in wireless sensor networks,” in Proceedings of the Milcom Communications for Network-Centric Operations: Creating the Information Force, pp. 357–361, McLean, Va, USA, October 2001. View at: Google Scholar
  12. M. Chu, H. Haussecker, and F. Zhao, “Scalable information-driven sensor querying and routing for ad hoc heterogeneous sensor networks,” The International Journal of High Performance Computing Applications, vol. 16, no. 3, pp. 293–313, 2002. View at: Google Scholar
  13. Y. Yao and J. Gehrke, “The cougar approach to in-network query processing in sensor networks,” SIGMOD Record, vol. 31, no. 3, pp. 9–18, 2002. View at: Publisher Site | Google Scholar
  14. N. Sadagopan, B. Krishnamachari, and A. Helmy, “The ACQUIRE mechanism for efficient querying in sensor networks,” in Proceedings of the 1st International Workshop on Sensor Network Protocol and Applications, Anchorage, Alaska, USA, 2003. View at: Google Scholar
  15. S. Lindsey and C. S. Raghavendra, “PEGASIS: power-efficient gathering in sensor information systems,” in Proceedings of the IEEE Aerospace Conference Proceedings, vol. 3, pp. 1125–1130, Big Sky, Mont, USA, 2002. View at: Google Scholar
  16. N. Tabassum, Q. E. K. Mamun, and Y. Urano, “COSEN: a chain oriented sensor network for efficient data collection,” in Proceedings of the 3rd International Conference on Information Technology: New Generations (ITNG '06), pp. 262–267, April 2006. View at: Publisher Site | Google Scholar
  17. J. Shin and C. Suh, “CREEC: chain routing with even energy consumption,” Journal of Communications and Networks, vol. 13, no. 1, pp. 17–25, 2011. View at: Google Scholar
  18. M. Ye, C. Li, G. Chen, and J. Wu, “EECS: an energy efficient clustering scheme in wireless sensor networks 10a.2,” in Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference (IPCCC '05), pp. 535–540, Phoenix, Ariz, USA, April 2005. View at: Google Scholar
  19. X. Liu, “A survey on clustering routing protocols in wireless sensor networks,” Sensors, vol. 12, no. 8, pp. 11113–11153, 2012. View at: Google Scholar
  20. O. Younis and S. Fahmy, “HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366–379, 2004. View at: Publisher Site | Google Scholar
  21. S. D. Muruganathan, D. C. F. Ma, R. I. Bhasin, and A. O. Fapojuwo, “A centralized energy-efficient routing protocol for wireless sensor networks,” IEEE Communications Magazine, vol. 43, no. 3, pp. S8–S13, 2005. View at: Publisher Site | Google Scholar
  22. S.-M. Jung, Y.-J. Han, and T.-M. Chung, “The concentric clustering scheme for efficient energy consumption in the PEGASIS,” in Proceedings of the 9th International Conference on Advanced Communication Technology (ICACT '07), vol. 1, pp. 260–265, Gangwon-Do, Korea, February 2007. View at: Publisher Site | Google Scholar
  23. M. Liu, J. Cao, G. Chen, and X. Wang, “An energy-aware routing protocol in wireless sensor networks,” Sensors, vol. 9, no. 1, pp. 445–462, 2009. View at: Publisher Site | Google Scholar
  24. D. Koutsonikolas, S. M. Das, Y. C. Hu, and I. Stojmenovic, “Hierarchical geographic multicast routing for wireless sensor networks,” Wireless Networks, vol. 16, no. 2, pp. 449–466, 2010. View at: Publisher Site | Google Scholar
  25. H. Raza, P. Nandal, and S. Makker, “Selection of cluster-head using PSO in CGSR protocol,” in Proceedings of the 2nd International Conference on Methods and Models in Computer Science, pp. 91–94, December 2010. View at: Publisher Site | Google Scholar
  26. S. Deng, J. Li, and L. Shen, “Mobility-based clustering protocol for wireless sensor networks with mobile nodes,” IET Wireless Sensor Systems, vol. 1, no. 1, pp. 39–47, 2011. View at: Google Scholar
  27. Z. Zhang and F. Yu, “Performance analysis of cluster-based and tree-based routing protocols for wireless sensor networks,” in Proceedings of the International Conference on Communications and Mobile Computing (CMC '10), vol. 1, pp. 418–422, Shenzhen, China, April 2010. View at: Publisher Site | Google Scholar
  28. H. Li, H. Yu, and A. Liu, “A tree based data collection scheme for wireless sensor network,” in Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICN/ICONS/MCL '06), p. 119, Morne, Mauritius, April 2006. View at: Publisher Site | Google Scholar
  29. D. Messina, M. Ortolani, and G. L. Re, “A network protocol to enhance robustness in tree-based WSNs using data aggregation,” in Proceedings of the IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS '07), pp. 1–4, Pisa, Italy, October 2007. View at: Publisher Site | Google Scholar
  30. M. R. Saadat and G. Mirjalily, “Efficient convergecast tree for data collection in wireless sensor networks,” in Proceedings of the 20th Iranian Conference on Electrical Engineering (ICEE '12), pp. 1534–1539, Tehran, Iran, 2012. View at: Google Scholar
  31. E. Callaway, “Cluster Tree Network—IEEE P802. 15 Wireless personal Area Networks,” 2001, View at: Google Scholar
  32. J. Yang, B. Bai, and H. Li, “A cluster-tree based data gathering algorithm for wireless sensor networks,” in Proceedings of the International Conference on Automatic Control and Artificial Intelligence (ACAI '12), pp. 22–25, Xiamen, China, 2012. View at: Google Scholar
  33. E. Hyytia, H. Koskinen, P. Lassila, A. Penttinen, and J. Virtamo, Random Waypoint Model in Wireless Networks, Networking Laboratory, Helsinki University of Technology, Helsinki, Finland, 2005.
  34. O. Demigha, W. K. Hidouci, and T. Ahmed, “On energy efficiency in collaborative target tracking in wireless sensor network : a review,” IEEE Communications Surveys and Tutorials, vol. 15, no. 3, pp. 1210–1222, 2013. View at: Google Scholar

Copyright © 2014 R. Velmani and B. Kaarthick. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.