Effect of location inaccuracy on deterministic coverage and connectivity protocol in wireless sensor network
Abstract
Sensor networks have a wide range of potential, practical and useful applications. Energy saving is one critical issue for sensor networks since most sensors are equipped with non rechargeable batteries that have limited lifetime. Many of the current literature of Energy efficient scheduling protocols assumed that sensing range of a sensor node is always uniform in all directions (unitdisc model). Unfortunately, this is not appropriate for the realistic sensing model, as the sensing
capabilities of networked sensors are affected by environmental factors. The other issue is that most of the protocol used the location information of sensors for accurate data analysis. GPS technology and localization algorithms provide location information. But these technologies do
not give accurate information, there is some uncertainty or error is exist in location information. Most of the protocols are location depended and will not work efficiently when inaccurate information is given. The main goal of this work is to analyze the performance of deterministic
energy efficient scheduling protocol with location inaccuracy.
Collections
- M Tech Dissertations [923]
Related items
Showing items related by title, author, creator and subject.
-
Design of cutom wireless protocol for signal transmission inside space equipment
Sanghani, Hardik Jayesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)There are many sensors and devices inside the satellite. All these devices need to communicate with each other, those devices can be sensor nodes or control device. According to current technology communication between ... -
Design and analysis of energy aware protocol-MPEARLE
Mythili, S. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)Due to the technological advances and development in the field of micro electronic devices, the availability of compact, high-performance, customizable, intelligent devices at low cost has become reality. 'Wireless Sensor ... -
Modeling and detecting attacks against key agreement protocols
Yadav, Anshu (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)Key agreement protocols establish a shared secret key between two or more communicating parties willing to exchange data over insecure channels using symmetric key cryptography. Based on the number of members involved ...