Username   Password       Forgot your password?  Forgot your username? 


Communication Protocols for Distributed Wireless Sensor Network based on Viterbi Algorithm

Volume 14, Number 11, November 2018, pp. 2553-2560
DOI: 10.23940/ijpe.18.11.p1.25532560

Binbin Yua,b

aCollege of Computer Science and Technology, Jilin University, Changchun, 130012, China
bCollege of Information Technology and Media, Beihua University, Jilin, 132013, China

(Submitted on August 10, 2018; Revised on September 12, 2018; Accepted on October 11, 2018)


Routing is one of the most important technologies in wireless sensor networks. The energy efficiency of the sensor network is realized by combining other technologies with routing protocols in this paper. First, through the analysis of the energy model of the clustering routing algorithm, the local signal to noise ratio (SNR) is used to purposefully select the nodes in the cluster to transmit data. In order to avoid the energy consumption of a large number of nodes to transmit data, a simple architecture is proposed to combine the distributed source code with the cluster routing protocol. The method uses the data on the cluster head as the edge information to decode the compressed information transmitted from the cluster nodes. The simulation result shows that the energy efficiency of the network can be achieved through this combination.


References: 20

                1. K. Römer, P. Blum, and L. Meier, “Time Synchronization and Calibration in Wireless Sensor Networks,” Desalination, Vol. 262, No. 1-3, pp. 21-30, 2005
                2. S. V. Vajdi, A. R. Hilal, O. A. Basir, and S. A. Abeer, “ Multi-Hop Interference-Aware Routing Protocol for Wireless Sensor Networks,” Procedia Computer Science, Vol. 10, pp. 933-938, 2012
                3. J. Sarkis, C. Bai, C. J. C. Jabbour, and V. A. Sobreiro, “Connecting the Pieces of the Puzzle Toward Sustainable Organizations: A Framework Integrating OM Principles with GSCM,” Benchmarking: An International Journal, Vol. 23, No. 6, pp. 1605-1623, 2016
                4. A. A. Rani, “A New Energy Efficient Communication Protocol (NEEP) for Wireless Sensor Networks,” International Journal of Applied Engineering Research, Vol. 10, No. 14, pp. 34618-34624, 2015
                5. V. Sharma and P. Jain, “Various Hierarchical Routing Protocols in Wireless Sensor Network: A Survey,” International Journal of Computer Science and Mobile Computing, Vol. 2, No. 5, pp. 67-72, May 2013
                6. Z. G. Zheng, A. K. Sangaiah, K. K. Mishra, and N. Saxena, “Guided Dynamic Particle Swarm Optimization for Optimizing Digital Image Watermarking in Industrial Applications,” Future Generation Computer Systems, Vol. 88, pp. 92-106, 2018
                7. T. Ngo-Quynh, V. Tran-Quang, and N. T. Quan, “A Low-Latency Communication Protocol for Target Tracking in Wireless Sensor Networks,” Eurasip Journal on Wireless Communications & Networking, Vol. 67, No. 1, pp. 1-15, August 2016
                8. P. Kansal, D. Kansal, and A. Balodi, “Compression of Various Routing Protocol in Wireless Sensor Network,” International Journal of Computer Applications, Vol. 5, No. 11, pp. 275-283, August 2010
                9. E. Yang, A. T. Erdogan, T. Arslan, and N. H. Barton, “Adaptive Formation Control and Bio-Inspired Optimization of a Cluster-based Satellite Wireless Sensor Network,” in Proceedings of NASA/ESA Conference on Adaptive Hardware & Systems, pp. 432-439, June 2008
                10. J. Zheng, R. Chellappa, and Z. Jiang, “Cross-View Action Recognition via Transferable Dictionary Learning,” IEEE Transactions on Image Processing a Publication of the IEEE Signal Processing Society, Vol. 25, No. 5, pp. 2542, June 2016
                11. K. Mashal and K. Mungase, “Secure Anonymity Communication Protocol for Wireless Sensor Network,” International Journal of Science & Research, Vol. 54, No. 17, pp. 580-585, 2016
                12. Z. C. Yu, G. Lauritsch, F. Dennerlein, Y. F. Mao, J. Hornegger, and F. Noo, “Extended Ellipse-Line-Ellipse Trajectory for Long-Object Cone-Beam Imaging with a Mounted C-Arm System,” Physics in Medicine & Biology, Vol. 61, No. 4, pp. 1829-1851, February 2016
                13. A. Anwar and D. Sridharan, “A Survey on Routing Protocols for Wireless Sensor Networks in Various Environments,” International Journal of Computer Applications, Vol. 112, No. 5, pp. 13-29, 2015
                14. S. Feng, “Research on Routing Protocol of Wireless Sensor Network for Electric Energy Monitoring,” Wireless Internet Technology, Vol. 6, No. 8, pp. 883, May 2016
                15. S. Said, “Energy-Efficient Communication Protocol for Wireless Sensor Networks,” Adhoc & Sensor Wireless Networks, Vol. 18, No. 9, pp. 8020, 2015
                16. S. Boulfekhar, A. Arab, D. Aïssani, and M. Ourbih, “MAC Protocol Design based on Satellites Presence for Low-Energy Wireless Sensor Networks,” Wireless Personal Communications, Vol. 86, No. 3, pp. 1299-1319, February 2016
                17. X. H. Shi, B. Liu, H. Jin, L. G. He, Q. S. Hua, Y. L. Zhou, et al., “Graph Processing on GPUs: A Survey,” ACM Computing Surveys, Vol. 50, No. 6, pp. 1-35, January 2018
                18. L. Lazos and R. Poovendran, “SeRLoc: Robust Localization for Wireless Sensor Networks,” ACM Transactions on Sensor Networks, Vol. 1, No. 1, pp. 73-100, August 2005
                19. S. Soimakallio, A. Cowie, M. Brandão, G. Finnveden, T. Ekvall, and M. Erlandsson, “Attributional Life Cycle Assessment: Is a Land-Use Baseline Necessary?” The International Journal of Life Cycle Assessment, Vol. 20, No. 10, pp. 1364-1375, October 2015
                20. S. Mitra and A. Roy, “Communication Void Free Routing Protocol in Wireless Sensor Network,” Wireless Personal Communications, Vol. 82, No. 4, pp. 2567-2581, June 2015


                              Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                              Download this file (IJPE-2018-11-01.pdf)IJPE-2018-11-01.pdf[Communication Protocols for Distributed Wireless Sensor Network based on Viterbi Algorithm]218 Kb
                              This site uses encryption for transmitting your passwords.