Autonomous Clustering Scheme for Wireless Sensor Networks Using Coverage Estimation-Based Self-Pruning(Network, <Special Section>Ubiquitous Networks)
スポンサーリンク
概要
- 論文の詳細を見る
Energy-efficient operations are essential to prolonging the lifetime of wireless sensor networks. Clustering sensor nodes is one approach that can reduce energy consumption by aggregating data, controlling transmission power levels, and putting redundant sensor nodes to sleep. To distribute the role of a cluster head, clustering approaches should be based on efficient cluster configuration schemes. Therefore, low overhead in the cluster configuration process is one of the key constraints for energy-efficient clustering. In this paper, we present an autonomous clustering approach using a coverage estimation-based self-pruning algorithm. Our strategy for clustering is to allow the best candidate node within its own cluster range to declare itself as a cluster head and to dominate the other nodes in the range. This same self-declaration strategy is also used in the active sensor election process. As a result, the proposed scheme can minimize clustering overheads by obviating both the requirements of collecting neighbor information beforehand and the iterative negotiating steps of electing cluster heads. The proposed scheme allows any type of sensor network application, including spatial query execution or periodic environment monitoring, to operate in an energy-efficient manner.
- 社団法人電子情報通信学会の論文
- 2005-03-01
著者
-
Yoon H
Eecs Dept.
-
Yoon Hyunsoo
Eecs Kaist
-
BAE Kichan
EECS Dept.
-
Yoon Hyunsoo
Eecs Department At Kaist
関連論文
- A Velocity-Based Bicasting Handover Scheme for 4G Mobile Systems
- Improving Handover Quality in 4G Mobile Systems
- Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
- A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates(Fundamental Theories for Communications)
- Reactive Key Management Scheme for Access Control in Group Communications(Fundamental Theories for Communications)
- Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment(Application Information Security)
- User-Perceived QoS in a Wireless Packet Network with Multiple Channel Conditions( Multimedia QoS Evaluation and Management Technologies)
- Securing Mobile Agents by Integrity-Based Encryption(Software Agent and Its Applications)
- Autonomous Clustering Scheme for Wireless Sensor Networks Using Coverage Estimation-Based Self-Pruning(Network, Ubiquitous Networks)
- Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks