HAUNT-24: 24-bit Hierarchical, Application-Confined Unique Naming Technique

  • Authors:
  • Ashwini Raina;Shruti Patil;V. Muthukumar;Ajith Abraham

  • Affiliations:
  • S.P.C.E, India;University of Nevada Las Vegas, USA;University of Nevada Las Vegas, USA;Chung Ang University, Korea

  • Venue:
  • ISDA '05 Proceedings of the 5th International Conference on Intelligent Systems Design and Applications
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The advent of tiny, inexpensive, low-power, autonomously functioning wireless sensors, has paved a way for high quality research, by posing unique challenges to researchers. Energy, cost and size of such sensors limit their communication and computation capabilities and thus robust and highly energy efficient algorithms need to be incorporated at every layer of the network model, along with an efficient network aware addressing scheme This paper proposes a 24-bit Hierarchical, Application-Confined Unique Naming Technique (HAUNT-24), which ensures mutual distinctiveness of addresses within an application, with the primary focus on in-network data aggregation. Various issues relating to the proposed addressing scheme are analyzed and its future scope is discussed. The simple aggregate queries such as MIN/MAX and AVG are applied over the proposed HAUNT-24 addressed network and it's shown how it helps in achieving in-network data aggregation.