Anda di halaman 1dari 7

(IJCNS) International Journal of Computer and Network Security, 109

Vol. 2, No. 2, February 2010

Forward Collision and Delay Avoidance Using


Energy Efficient Collision Sets in WSN
Bhushan N. Mahajan 1, Dr. R. V. Dharaskar 2 and Dr. V. M. Thakare 3
1
Computer Science Department
GHRCE, Nagpur
anupcus123@gmail.com
2
HOD , Computer Science Department
GHRCE, Nagpur.
rvdharaskar@gmail.com
3
HOD , Computer Science Department
SGB Amaravati University.
vilthakare@rediffmail.com

transmission of its specific destination, would need to relay


Abstract: This paper present battery-efficient system design, and
outlines collision and delay avoidance using scheduling method. its information flow through other mobile nodes. This
Batteries power electronic systems and maximizing battery life implies that mobile nodes in Ad Hoc networks bear routing
needs understanding of the capabilities and limitations of the functionality so that they can act both as routers and hosts.
batteries. The amount of energy that can be supplied by a given These networks provide mobile users with everywhere
battery varies significantly. It depend on how the energy is drawn. communication capacity and information access regardless
Researchers are attempting to develop new battery driven of location. The Ad Hoc networks can be seen in to two
approaches to system design. categories whether dynamically changing their position or
Keywords: Collision , Delay , Energy level , power , Battery not, once create communication link. These are wireless
power , Sleep mode , Ideal mode. sensor networks and Mobile Ad Hoc networks (MANETs).
Wireless sensor networks’ mobile nodes are deployed in
1. Introduction large number on small area. Once the nodes are deployed,
they are static. In Mobile Ad Hoc networks the nodes can
Battery powered electronic systems, and the integrated dynamically change their position . An Ad Hoc network can
circuits within them, account for a large and rapidly be used in an area where infrastructures for mobile
growing revenue segment for the computer, electronics, and communication are not available, probably due to high
semiconductor industries. We know “battery gap”, between deployment costs or disaster destruction. The typical
trends in processor power consumption , and improvements application of Ad Hoc networks includes battle field
in battery capacity . Bridging this gap is a challenge that communication, emergency relief and extension of the
system designers must face for the future. Low power design coverage area of cellular networks.
techniques are successful in reducing the energy that is
drawn from the battery, and hence improve battery life to Ad-hoc routing algorithms broadly can be categorized into
some extent. But, truly maximizing battery life requires an pro-active and on-demand routing . The on-demand routing
understanding of both the source of energy and the system algorithms initiate to find out the suitable route when a
that consumes it. [1] route is requested . The pro-active routing algorithm
exchanges routing information periodically and generates
2. Related work the routing table in advance of route request . [3] These
protocols select the routes based on the metrics of minimum
This energy efficient routing protocol is modified version of hop count. Ability to forward packets is depend on Battery
the Ad-hoc on demand distance vector (AODV) protocol by power . Overall network lifetime is depend on battery power
taking into consideration the results of the pre-simulation, Design and manufacturing of less energy consume
the existing feature of AODV for implementation of the components of mobile nodes such processors, memory and
design . An Ad Hoc network Networks that do not require a OS power management strategies is used to reduce non-
pre-established infrastructure . An Ad Hoc network does not communication energy consumption.
guarantee that a mobile node can directly communicate with During communication, energy is consumed in either
destinations all the time. So, there is independence of any inactive state of communication or active communication
fixed infrastructure or centralized administration. [2]An Ad states. The energy consumption of active communication is
Hoc network is capable of operating autonomously. It is more significant than the others for high traffic
completely self-organizing and self-configuring. It has environment.
multi-hop capability. A mobile node, which lies outside the
110 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 2, February 2010

Energy efficient routing protocols can be designed to • Same set of nodes will not get over utilized again and
formulate energy efficient active communications . Energy again
efficient virtual topology can be designed to formulate
Existing wake-up schemes
energy efficient active communications . Minimum hops ,
Nodes have to remain awaken when they are not receiving
Minimum message exchange , Minimum collision ,
any data. Nodes have to listen idle channel . Network nodes
Minimum retransmission strategies can be designed to
cannot easily know exactly when events happen. The delay
formulate energy efficient active communications . Result is
exist between receiving wake up message and actual waking
Energy efficient active communications. It will prolong the
up of node. That delay is called as wake-up latency. Node
network life time . The network life time is defined as the
wakes up itself when it senses an communication from other
time when a node runs out of its own battery power for the
nodes. Then, it wakes up the MCU and RF transceiver.
first time . [4] Active communication energy efficient
routing protocols can be categorized into two categories:
Time-based wake-up mechanisms
• Transmission power control approach
It require each node wake up periodically to listen to the
• Load distribution approach.
radio channel .It is time-based wake-up mechanisms. Low
For protocols that belong to the former category, the active
power sleeping nodes wake up at the same time periodically
communication energy can be reduced by adjusting each
to communicate. Data are transferred from sensor nodes to
node’s radio power just enough to reach the receiving node
the sink through a multi-hop communication paradigm [3].
but not more than that. This transmission power control
By choosing a good time synchronized sleep and wake-up
approach can be extended to determine the optimal routing
mechanism the network may save much power
path that minimizes the total transmission energy required
consumption. Drawbacks to this mechanism is the high
to deliver data packets to the destination. The specific goal
quality clock synchronization requirement. It makes it hard
of the load distribution approach is to balance the energy.
to be implemented in large WSN. [6 , 11] If the packet
How active transmission energy can be reduced? . Answer arrives at node at the end of the listening cycle, then wake
is by adjusting each node’s radio power just enough to reach up call will be delayed while the node sleeps. It is wake up
the receiving node but not more than that , by determining latency .
the optimal routing path , by determining the task
distribution approach to balance the energy usage of all Asynchronous wake-up mechanisms
mobile nodes . by Selecting a route with underutilized nodes Each node follows its own wake-up schedule in idle states,
rather than the shortest route, by Selecting energy levels to as long as the wake-up intervals among neighbors overlap.
minimizes transmission energy to deliver data packets to It do not require time synchronization among the different
the destination. nodes in the network. Energy harvesting for sensor is still
All above approaches prolong the network life time in in its early stages, and is gaining momentum in the research
different ways. [5] Two approaches are mutually community [11]. Drawbacks to this mechanism are this
contradicting each other with some extent. strategy can lead to large packet delays within the network
Advantages- .It cannot achieve the same level of power savings that
• Increased the life time of the node. synchronous approach can.
• Increased packet delivery fraction
• Reduced the Variance of the nodes residual battery Energy. On-demand wake-up mechanism
• Minimized energy consumed per packet. Possible solution is to design an on-demand wake-up In this
The purpose of energy-aware routing protocols is to mechanism , Here out-band signal is used to wake up
maximize the network lifetime. The energy-efficient routing sleeping nodes in an on-demand manner. For example, a
protocols should consider energy consumption from the transceiver is woken up by a special wake-up signal from a
viewpoints of both the network and the node level. terminal that wants to communicate with a sleeping
Why task distribution approach is required from node point transceiver. By this way, a transceiver is woken up on
of view ? demand instead of periodical wake-up so that the power
consumption can be dramatically reduced .
Nodes have limited remaining battery energy. Nodes can
perform every kind of task and while working they consume
Span [11] is a connectivity-driven protocol that adaptively
energy. But equal consumption should occur among all
elects “coordinators” of all nodes in the network.
nodes. So, work should not be assigned to same set of nodes
Coordinators stay awake continuously and perform
again and again. It may lead to over consumption of those
multihop routing, while the other nodes stay in sleeping
nodes battery power . Constant amount of power of all nodes
mode and periodically check if there is a need to wake up
should get utilized. It is called as balancing .The way for
and become a coordinator. The protocol achieves the
achieving balancing is –
following four goals. First, it ensures that there is always a
• Equal distribution of work. sufficient number of coordinators so that every node is in the
transmission range of at least one coordinator. Second, to
• Selecting different routing path at different time instance. spread energy consumption as uniformly as possible among
• Changing routing path frequently. network nodes Span rotates the coordinators. Third, it tries
to minimize the number of coordinators (to increase the
• Same routing path will not be repeatedly used again and network lifetime) while avoiding a performance degradation
again. in terms of network capacity and message latency. Fourth, it
(IJCNS) International Journal of Computer and Network Security, 111
Vol. 2, No. 2, February 2010

elect coordinators in a decentralized way by using only local actually leads to in shorter network lifetime because in
information. essence the average energy consumption per delivered
packet of user data has been increased. [10]
STEM (Sparse Topology and Energy Management) [11] Conditional Max-Min Battery Capacity Routing
It uses two different radios for wakeup signals and data (CMMBCR):
packet transmissions, respectively. The wakeup radio is not If there are nodes that have more battery power than
a low power radio (to avoid problems associated with threshold power, it applies MTPR to the nodes. Otherwise, it
different transmission ranges). Therefore, an asynchronous mimics MMBCR. When battery power is plentiful, it
duty cycle scheme is used on the wakeup radio as well. Each minimizes the total energy consumption like MTPR, and the
node periodically turns on its wakeup radio for Tactive other case it considers the nodes with lower energy like
every T duration. When a source node (initiator) has to MMBCR. When the current drawn is sufficiently large,
communicate with a neighboring node (target), it sends a the rate of diffusion fails to keep up with the rate at which
stream of periodic beacons on the wakeup channel. As soon ions are consumed at the cathode. As a result, the
as the target node receives a beacon it sends back a wakeup concentration of positively charged ions decreases near the
acknowledgement, and turns on its data radio. [7] cathode and increases near the anode, degrading the
If we select longer-hop routes, which spend more energy end battery’s output voltage. However, if the battery is allowed
to end. to idle for a period of time, the concentration gradient
decreases (due to diffusion), and charge recovery takes place
Minimum total power routing (MTPR):
at the cathode. As a result, the capacity and lifetime of the
S is the set containing all the possible routes. Rth route is
battery increase..
selected . Transmission power for route R is P .
R

3. Algorithm
This approach may select the route that includes one or
more mobile node with least energy level or min-hop Nodelist={all nodes as per pre-defined index};
routing . it makes no effort to use energy evenly among the
nodes . This leads to “die” of the first node sooner and it Hierarchy _ I = {set of nodes in level I} ;
causes partition of the network early. Hierarchy _II = {set of nodes in level II} ;
Power aware localized routing: Hierarchy _III = {set of nodes in level III} ;
It is assumed that the power neededα for transmission and Hierarchy _IV = {set of nodes in level IV} ;
reception is a linear function of d where d is distance
between the two neighboring nodes and α a parameter that Threshold = x ; // pre-set
depends on the physical environment. [8] The authors make
use of GPS position information to transmit packets with the Send_Nodelist = nodelist;
minimum required transmit energy. Two drawbacks Rev_Nodelist = nodelist;
are,GPS cannot provide useful information about the SendDoneNodelist={set all zero} ;
physical environment and the second is that the power RecvDoneNodelist={set all zero} ;
dissipation overhead of the GPS device is an additional
power draw on the battery source of the mobile node. do
Minimum Battery Cost Routing (MBCR): {
It tries to use battery power evenly by using a cost function slot = new Slot();
which is inversely proportional to residual battery power. // set flags here .
One possible choice for the cost function of a node i is given // flag may be Fwd or Rev
as
check_direction (node);

bi is the residual battery energy of node i. the total cost of Fwd_send_collision_set = null;
the route is defined as the sum of costs of nodes that are the Fwd_recv_collision_set = null;
components of the route, and MBCR selects a route with Rev_send_collision_set = null;
minimum total cost. [9] Rev_recv_collision_set = null;
The Min-Max Battery Cost Routing (MMBCR):
for each node in nodelist
{
It selects the route with the minimum path cost among node->u = check_ Hierarchy (node) ;
possible routes. Because this metric takes into account the node->v = check_ Hierarchy _Energy_Level (node) ;
remaining energy level of individual nodes instead of the node->w = check_incoming_packet_seq_no (node) ;
total energy, the energy of each node can be evenly used. node->x = check_rec_slots(node) ;
The limitation of this algorithm is that since there is no node->y = check_send_slots(node) ;
guarantee that paths with the minimum hop-count or with node->z = check_traffic_over (node) ;
the minimum total power are selected. It can select paths
that results in much higher power dissipation in order to if (
send traffic from a source to destination nodes. This feature (node not in Fwd_send_collision_set)
112 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 2, February 2010

& & (node->dest not in Fwd_recv_collision_set)


& & ( node->z not “over crowding” ) } while (slot.length > 0)
& & ( node->y not “0” ) // do
& & ( node->x == “0” )
& & ( node->w == “No duplication” ) We will see why task distribution approach from network
& & ( node->w == “Above_threshold” ) point of view. The best route in network is that one which
) require minimum total transmission power . The network
{ lifetime is the time when a node runs out of its own battery
power for the first time. If a node stops its operation, it can
// 7à 6 . 7=send , 6 =Recv result in network partitioning and interrupt communication.
We will see why transmission power control approach from
slot[node] = ‘‘SEND’’; node point of view .The nodes with lower power should
slot[node?dest] = ‘‘RECV’’; avoid transmission up to large distance. The node should
balance the energy usage among the neighbor nodes . It
// Nodes those will cause collision minimizes the total transmission energy required to deliver
data packet to the destination .[15] We will see why
Fwd_send_collision_set.add( transmission power control approach at network level . The
node->dest->neighbors.flag Fwd ); best route in network is that one which require minimum
total transmission power . The network lifetime is the time
Fwd_send_collision_set.add( when a node runs out of its own battery power for the first
node->dest.flag.Fwd); time. [16] If a node stops its operation, it can result in
network partitioning and interrupt communication.
// Nodes those will face collision Minimizing the total energy consumption tends to favor the
Fwd_recv_collision_set.add( route that consumes minimum energy .
Node.flag Fwd);
4. Experiment
Fwd_recv_collision_set.add( Now we will concentrate on delay avoidance and collision
node->neighbors.flag Fwd); avoidance . Here is a topology and related routing table .
Node 0 is a cluster head .Routing table contain list of all
// Nodes those will cause collision neighbors and their send slot and receive slots . we will
define a schedule for each node so that path wake up timing
Rev_send_collision_set.add( will get decided [11].
node->dest->neighbors.flag Rev );
5
Rev_send_collision_set.add( 7
6
node->dest.flag.Rev); 4 2
9
// Nodes those will face collision 8
0 11
Rev_recv_collision_set.add( 10
3 1
node->neighbors.flag Rev);
change_priority_algo(node->dest->recv);
SendDoneNodelist.addtoLastPos(node); 13
RecvDoneNodelist.addtoLastPos(node?Dest); 12
14
Send_Nodelist.Remove(node);
Recv_Nodelist.Remove(node?Dest); 15
16
If ( decide_(collision , threshold ) > 1 )
{ Figure 1
Node_List = Recv_Nodelist.
} Node Neighbors
else 6 2, 5, 7, 8
{ 7 6, 9
Node_List = Send_Nodelist. 8 0, 6, 10
} 9 7, 11

} // if Our aim is to reach up to node 0 .

} // for Node 1-hop Neighbors Dest Hops upto node O


6 2, 5, 7, 8 8 2
frame.add(slot); 7 6, 9 6 3
8 0, 6, 10 0 1
(IJCNS) International Journal of Computer and Network Security, 113
Vol. 2, No. 2, February 2010

9 7, 11 11 3

Node Neighbors Dest Hops Recv Send


6 2, 5, 7, 8 8 2 1 1
7 6, 9 6 3 0 1
8 0, 6, 10 0 1 1 1
9 7, 11 11 3 0 1

Now algorithm will decide slots for receive and send .

Node/ slot 1 2 3 4 5 6 7

6 R S
7 S

The more improved topology construction is suggested Figure 3.


below . It will include delay avoidance strategy . Few other
strategies that can be adopted are also suggested below . Five levels of power should be decided at each node.
Three levels of power should be decided at each node. Level 1 = sleep mode
Level 1 = Nodes those are at one hop . Level 2 = forward data
Level 2 = Nodes those are at two hop . Level 3 = receive data
Level 3 = Nodes those are at three hop . Level 4 = send data to neighbor.
Level 5 = send data up to cluster head .
As shown in figure 2, we can create topology. Node 0 is Level 6 = send busy tone .
currently acting as cluster head . Its task can be handed over
to any other node which is at one hop distance from node 0 . Three types of sleep periods should be created
Node in square boundary can act as cluster heads of their Level 1 = data to be send after x unit of time .
own clusters. They can communicate to other cluster head Level 2 = data to be stored after x unit of time .
by using node 0 using two hops . Node 3,5,1,16 are still Level 3 = data to be forwarded after x unit of time .
available for forming new cluster . Node list = { 17,18,19,20,21,22,23,24,25,26,27,28,
29,30,31,32,33,34,35,36,37,38,39,40 }

Start from 17 .
17->41 ,
[ 17,1] = ”S”
[ 41,1] = ”R”

Node One hop neighbors

16 0.7,15,17,18,19,20
17 41,42,16

Node Choose Dest Hops Send Recv

16 0 1 4 4
Figure 2. 17 16 2 4 4
Cluster head can communicate with node 0 in two hops.
Divide transmission of 17 in two plus two
Scheduling information can be stored at node 0. Task of
slots by blocking alternate reverse paths .
node is to dispatch packet up to cluster head in two hops. It
is now node0 task to forward packet up to destination in
Fwd_send_collision_set = { 16, 0.7,15 }
two hops only . Hierarchical addressing can be also used .
// new nodes // They cause collision
Probability of send , probability of receive , probability of
// 16 and its neighbor
idle , probability of Sleep are depend on four important
factors .Data forward rate , data arrival rate , delay or
Fwd_recv_collision_set = { 17,41,42,16 }
waiting time , time spend in wake up .
// existing nodes // They face collision
Division of task can be designed at different level // 17 and its neighbor
Level 0 = Scheduling information
Level 1 = Routing information . Rev_send_collision_set = { 17,18,19,20 }
Level 3= Energy, collision set information // new nodes
114 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 2, February 2010

// They cause collision n = the number of timeslots the sensor


// 16 and its neighbor
node listens
Rev_recv_collision_set = { 17,41,42,16 }
// existing nodes // They face collision
Tf = the length of the total period
// 17 and its neighbor
Tslot = the length of each TDMA timeslot.
n * (Tslot/Tf) = The time a sensor node spends in periodical
Now we will assign a last priority to 7 in
wakeups .
SendDoneNodelist . we will assign a last priority to 6 in
LWait. = The average of waiting time
RecvDoneNodelist. So , the collisions those were likely to
occur will get avoided .and superior priority will be given to
Based on the calculation , the balance energy level is
rest of the nodes of Fwd_send_collision set nodes.
calculated . The balance energy is calculated and it is used
to decide the remaining lifetime of battery of node .
5. Power related parameters
We can use multi channel sender initiated random access 6. Delay related parameter
mac layer protocols - Divide available bandwidth into
multiple channel .Instead of switch off mode , use low The end-to-end delay, is the sum of the transmission delay,
power switch mode . They can be turned on using timer Or the access delay, the queuing delay , the propagation delay.
using wake-up packets. Mac layer can decide turn off/on of The delay is proportional to the number of hops N. Delay
module. [12] is affected by number of hops times the period Tf. The
transmission at each hop is delayed until the next receiving
Various advantages of using this scheme are – sensor node wakes up. [14 ]Small distance between the
• Minimum delay wireless sensor nodes makes the propagation delay small.
• Energy level selection Large distance between the wireless sensor nodes makes the
• Schedule distribution propagation delay large. Say (N - 1)intermediate forwarders
are there between sender node and receiver node .[11]
• Collision level
• Selection of bandwidth and speed. Average delay
• Fast input and fast output
• Allocate function to individual nodes
• Achieve division of work.
When a new packet is generated, the sensor node must wait The delay in the S-MAC protocol
until the next TDMA frame. [13] It transmits the Path-WU
message to wake-up all the nodes. Since the packet is
generated randomly, the average time until the next frame is The delay in the adaptive listening
Tf/2. [11]

The delay in TDMA

tcs = Access time


ttx = Transmission delay.
Here , Power as a function of the arrival rate for the same N = No. of nodes.
delay. Delay as a function of the arrival rate, for the same Tf = No. of hops times.
power consumption. The minimum values for Ti and Tslot Tf/2. = Average time until the next frame is generated.
are limited by the available hardware and by the reception When Tf increase , end to end delay increase . When Tf
sensing time. we consider Ti = Tslot. [11] decrease , nodes must become active more often . It result in
increased power consumption. End to end delay is affected
by term which is proportional to Tf . This is because,
transmission at each hop is delayed until the next receiving
sensor node wakes up . Transmission must wait until the
next wake up time . [11]

L = average size of packets . 7 . Conclusion

. = data packet arrival rate. The study of scheduling algorithm helps to achieve the
. = data packet forward rate. balance between energy saving and delay. By sensing energy
(IJCNS) International Journal of Computer and Network Security, 115
Vol. 2, No. 2, February 2010

from the radio signals, the node provides a interrupt to the Authors Profile
MCU. The MCU detects the preamble and wakes up RF
transceiver when wake-up signal is indeed to wake itself up. Bhushan N. Mahajan received
The analysis results show that, based on the scheduling, Diploma in Mechanical Engineering
nodes can be woken up timely when it is necessary to wake [DME] in 1999 , A.M.I.E. [CSE]
up with the aid of extremely low power. Engineering degree in 2007 , BCA
degree in 2007 , qualified GATE 2008
and MCA degree in 2009 . He is perusing
Reference Master of Engineering degree [M.E.] in
WCC in Computer Science department at
[1] V. Raghunathan, C. Schurghers, S. Park, M. Srivastava, GHRCE , Nagpur university , India . He is a professional
“Energy-aware Wireless Microsensor Networks”, IEEE software developer . He is now working on energy and power
Signal Processing Magazine, March 2002, pp. 40-50. management topics and various schedule development strategies in
[2] G. Pottie, W. Kaiser, “Wireless Integrated Network WSN . He has a special interest in topology modeling of ad-hoc
Sensors, Communication of ACM, Vol. 43, N. 5, pp. network i.e. wireless sensor network , wireless mesh network and
MANET . He has simulated various network scenario using ns2
51- 58, May 2000.
network simulator software and other programming languages .
[3] I. Akyildiz, W. Su, Y. Sankarasubramaniam and E.
Cayirci, “Wireless Sensor Networks: a Survey”,
Dr. Rajiv Dharaskar is presently working
Computer Networks , Volume 38, N. 4, March 2002. as Professor at PG Department of Computer
[4] IEEE Pervasive Computing, “Energy Harvesting and Science and Engineering, G.H. Raisoni
Conservation”, Vol. 4, Issue 1, Jan-Mar. 2005. College of Engineering, Nagpur. He is Ph.D.
[5] A. Kansal, J. Hsu, V. Raghunathan, J. Friedman, and in Computer Science & Engineering in the
M.B. Srivastava, UCLA Energy-Harvesting Project, Faculty of Engineering & Technology,
http://nesl.ee.ucla.edu/projects/heliomote. M.Tech. in Computers, P.G. Dip., M.Phil.,
[6] L. Doherty, B.A. Warneke, B.E. Boser, K.S.J. Pister, and M.Sc. He is having 24 years of teaching
“Energy and Performance Considerations for Smart and 18 years of R&D experience in the field of Computers & IT.
He is approved PhD guide for Computer Engineering and Science
Dust,” International Journal of Parallel Distributed
for Nagpur and Amravati University and 22 research scholars are
Systems and Networks, Volume 4, Number 3, 2001, pp. perusing Ph.D. degree under his guidance. He is an author of
121-133. number books on Programming Languages..
[7] J.A. Paradiso and T. Starnar, “Energy Scavenging for
Mobile and Wireless Electronics”, IEEE Pervasive Dr V M Thakare is Professor and Head
Computing, Vol. 4, Issue 1, pp.18-26, Jan-Mar. 2005. of PG department of computer Science and
[8] J. Krikke, “Sunrise for Energy Harvesting Products”, Engg in SGB Amravati University
IEEE Pervasive Computing, Vol. 4, Issue 1, pp. 4-8, Amravati, Maharastra (India) and has
Jan-Mar. 2005. completed ME in Advance Electronics and
[9] M. Philipose, J.R. Smith, B. Jiang, A. Mamishev, S. Ph.D. In computer Science/Engg. His Area
of Research are Robotics and Artificial
Roy, and K. Sundara-Rajan, “Battery-Free Wireless
Intelligence, Information Technology. He is
Identification and Sensing”, IEEE Pervasive Recognized Giude for computer science and computer engineering
Computing, Vol. 4, Issue 1, pp. 37-45, Jan-Mar. 2005. in this University and In other universities also. He has also
[10] C. Schurgers, V. Tsiatsis, M. B. Srivastava, “STEM: received received national level Award for excellent paper award.
Topology Management for Energy Efficient Sensor More than 10 candidates are working for Ph D Under his
Networks”, IEEE Aerospace Conference '02, Big Sky, supervision. He has Published and presented more than 115
MT, March 10-15, 2002. papers at National and international level. He has worked on
[11] Energy efficiency in wireless sensor networks using sleep mode various national level bodies like AICTE/UGC and also worked on
TDMA scheduling Nikolaos A. Pantazis , Dimitrios J. Vergados , various bodies of other universities. He is presently member of
Dimitrios D. Vergados , Christos Douligeris . BOS, RRC, BUTR of this university and also chairman and
[12] Y. Xu, J. Heidemann, D. Estrin, “Geography-informed Member of various committees of this university .
Energy Conservation for Ad Hoc”, Proc. ACM
MobiCom 2001, pp. 70 – 84. Rome, 2001.
[13] P. Santi, “Topology Control in Wireless Ad Hoc and
Sensor Networks, ACM Computing Survey, Vol. 37, n.
2, p. 164-194, June 2005.
[14] A. Cerpa, D. Estrin, “Ascent: Adaptive Self-
Configuring Sensor Network Topologies, Proc. IEEE
INFOCOM 2002.
[15] B. Chen, K. Jamieson, H. Balakrishnan, R. Morris. “Span: An
Energy-Efficient Coordination Algorithm for Topology Maintenance in
Ad Hoc Wireless Networks”, ACM Wireless Networks, Vol. 8, N. 5,
September 2002.

[16] F. Koushanfar, N. Taft and M. Potkonjak, “Sleeping


Coordination for Comprehensive Sensing Using
Isotonic Regression and Domatic Partitions”, Proc. of
Infocom 2006, Barcelona, Spain, April 2006.

Anda mungkin juga menyukai