Energy-aware management for cluster-based sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Equitable distribution energy consumption of wsns
Proceedings of the 1st ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing
A distributed energy-efficient cluster formation protocol for wireless sensor networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Hopping sensor relocation in rugged terrains
IROS'09 Proceedings of the 2009 IEEE/RSJ international conference on Intelligent robots and systems
A distributed energy-efficient clustering protocol for wireless sensor networks
Computers and Electrical Engineering
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks
International Journal of Sensor Networks
Hi-index | 0.00 |
Wireless sensor networks are poised to increase the efficiency of many applications, such as target detection and disaster management. Typically sensors collect data about their surrounding and forward it to a command center, either directly or through a basestation (gateway). Due to inhospitable conditions, sensors may not always be uniformly deployed in the area of interest. Some sensors can be unreachable to the gateway due to their distance or the existence of obstacles in their communication path. Additionally, in many applications a large set of sensors is usually deployed and network scalability becomes a major concern. This paper investigates two different methodologies for clustering sensor networks with the goal of increasing the sensor coverage and availability allowing for dependable and efficient operation for large network setups. The first approach deploys multiple gateways and partitions sensors among these gateways. In the second approach some sensors are designated as agents for a single gateway in order to reach out-of-range nodes. The performance of both approaches is compared in a simulated environment.