A pre-determined nodes deployment strategy of two-tiered wireless sensor networks based on minimizing cost

被引:4
|
作者
Fan T. [1 ,2 ]
Teng G. [1 ]
Huo L. [1 ]
机构
[1] College of Mechanical and Electrical Engineering, Agricultural University of Hebei
[2] College of Mathematics and Computer, Hebei University
基金
中国国家自然科学基金;
关键词
Cost per unit area; Integer programming model; Nodes deployment strategy; Two-tiered wireless sensor networks;
D O I
10.1007/s10776-014-0240-1
中图分类号
学科分类号
摘要
Nodes deployment is a fundamental factor in determining the connectivity, coverage, lifetime and cost of wireless sensor networks. In this paper, a two-tiered wireless sensor networks consisting of sensor clusters and a base station is considered. Within a sensor cluster, there are many sensor nodes and a relay node. We focus on the deployment strategy for sensor nodes and relay nodes to minimize cost under some constraints. Several means are used. The regular hexagonal cell architecture is employed to build networks. Based on the analysis of energy consumption of sensors and cost of network, an integer programming model is presented to minimize the cost. By the model, number of layers of sensor cluster is determined. In order to balance the energy consumption of sensors on the identical layer, a uniform load routing algorithm is used. The numerical analysis and simulation results show that the waste of energy and cost of wireless sensor networks can be effectively reduced by using the strategy. © 2014 Springer Science+Business Media New York.
引用
收藏
页码:114 / 124
页数:10
相关论文
共 50 条
  • [31] EFFICIENTLY PRESERVING DATA-PRIVACY RANGE QUERIES IN TWO-TIERED WIRELESS SENSOR NETWORKS
    Nguyen, Thuc D.
    Bui, Thach V.
    Dang, Van H.
    Choi, Deokjai
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 973 - 978
  • [32] Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks
    Fan, Lihong
    Liu, Liang
    Gao, Hang
    Ma, Zuchao
    Wu, Yuting
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (02) : 247 - 256
  • [33] An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
    Fan, Rong
    He, Dao-jing
    Pan, Xue-zeng
    Ping, Ling-di
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 12 (07): : 550 - 560
  • [34] An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
    Rong FAN Daojing HE Xuezeng PANLingdi PING School of Computer Science and TechnologyZhejiang UniversityHangzhou China
    Journal of Zhejiang University-Science C(Computers & Electronics), 2011, 12 (07) : 550 - 560
  • [35] An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
    Rong Fan
    Dao-jing He
    Xue-zeng Pan
    Ling-di Ping
    Journal of Zhejiang University SCIENCE C, 2011, 12 : 550 - 560
  • [36] SET: Secure and Efficient Top-k Query in Two-Tiered Wireless Sensor Networks
    Zhang, Xiaoying
    Peng, Hui
    Dong, Lei
    Chen, Hong
    Sun, Hui
    WEB AND BIG DATA, APWEB-WAIM 2017, PT I, 2017, 10366 : 495 - 510
  • [37] Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks
    Lihong Fan
    Liang Liu
    Hang Gao
    Zuchao Ma
    Yuting Wu
    Digital Communications and Networks, 2021, 7 (02) : 247 - 256
  • [38] Enable Privacy Preservation for k-NN Query in Two-tiered Wireless Sensor Networks
    Peng, Hui
    Zhang, Xiaoying
    Chen, Hong
    Wu, Yao
    Zeng, Juru
    Li, Deying
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 6289 - 6294
  • [40] Dynamic sensing optimization strategy for mobile nodes deployment in wireless sensor networks
    Wang Sheng
    Wang Xue
    Ma Junjie
    SIGNAL ANALYSIS, MEASUREMENT THEORY, PHOTO-ELECTRONIC TECHNOLOGY, AND ARTIFICIAL INTELLIGENCE, PTS 1 AND 2, 2006, 6357