DOI QR코드

DOI QR Code

On Suppressing the Occurrence of Redundant Sensing-Reporting Packets in Assets Monitoring Networks

관심 대상모니터링 네트워크에서의 중복된 감지-보고 패킷들의 발생 억제에 관한 연구

  • 차영환 (상지대학교 컴퓨터정보공학부)
  • Published : 2009.09.30

Abstract

In the application of wireless sensor networks to monitor valuable assets under concern, the appearance of a certain asset can be identified and reported simultaneously by several adjacent nodes, and this may dissipate the power of related nodes and network bandwidth as well. In the proposed method, a node that senses the appearance of some asset is allowed to send the sensing-reporting packet only after it has been being idle for a certain period without receiving any DRP(Don't Report Packet) from neighbors. It turns out that not only the cost of propagating DRPs but also that of reporting the events to the sink becomes minimal when depth of each DRP propagation is 2. In case of depth 1, at least, two routes are set up for the delivery of the sensing-reporting packet hence, reliable transfer to the sink is provided.

무선 센서 네트워크를 이용하여 관심 대상의 출현을 모니터링 하는 응용에서는 동일 사실에 대해 여러 노드로부터 중복된 보고가 이루어져 네트워크 대역폭의 낭비와 관련 노드들의 전력 소모를 야기 할 수 있다. 이 논문에서는 대상을 감지한 각각의 노드로 하여금 일정 기간 동안 대기하면서 보고 제한을 알리는 DRP(Don't Report Packet) 패킷을 수신하지 않는 경우에만 싱크(기지국)로 감지 사실을 보고하는 기법을 제시한다. 제한 깊이가 2인 경우 DRP 전파 비용은 물론, 감지 사실을 알리는 보고 비용 역시 최소가 되어 가장 경제적인 통신이 가능하였다. DRP 전파 깊이를 1로 제한하면 최소 2개의 서로 다른 경로를 경유하는 감지 보고가 가능하여 전달의 신뢰성을 높일 수 있다.

Keywords

References

  1. J. Yick, B. Mukherjee, and D. Ghosal, 'Wireless sensor network survey,' Computer Networks, Vol. 52, No.12, pp.2292-2330, 2008 https://doi.org/10.1016/j.comnet.2008.04.002
  2. P. Kamat, Y. Zhang, W. Trappe, and C.l Ozturk, "Enhancing source-location privacy in sensor network routing," Proc. of the 25th IEEE International Conference on Distributed Computing Systems, pp.599-608, 2005
  3. M.C. Vuran, O.B. Akan, and I.F. Akyildiz, "Spatio-temporal correlation: theory and applications for wireless sensor networks," Computer Networks, Vol.45, No.3, pp.245-259, 2004 https://doi.org/10.1016/j.comnet.2004.03.007
  4. M.C. Vuran and I.F. Akyildiz, "Spatial correlation- based collaborative medium access control in wireless sensor networks," IEEE/ACM Transactions on Networking, Vo.14, No.2, pp.316-329, 2006 https://doi.org/10.1109/TNET.2006.872544
  5. F. Bouabdallah, N. Bouabdallah, and R. Boutaba, "Toward reliable and efficient reporting in wireless sensor networks," IEEE Transactions on Mobile Computing, Vol.7, No.8, pp.978-994, 2008 https://doi.org/10.1109/TMC.2008.21
  6. L. Zhong, R. Shah, C. Guo, and J. Rabaey, "An ultra-low power and distributed access protocol for broadband wireless sensor networks," IEEE Broadband Wireless Summit, 2001
  7. L. Chitnis, A. Dobra, and S. Ranka "Aggregation methods for large-scale sensor networks," ACM Transactions on Sensor Networks, Vol. 4, No. 2, 9:1-9:32, 2008
  8. K.-W. Fan, S. Liu, P. Sinha, "Scalable data aggregation for dynamic events in sensor networks," Proc. of the 4th ACM Conference on Embedded Networked Sensor Systems(SenSys'06), pp.181-194, 2006
  9. C. Intanagonwinwat, R. Govindan, and D. Estrin, "Directed diffusion: a scalable and robust communication paradigm for sensor networks," Proc. of the 6th Annual International Conference on Mobile Computing and Networking, pp.56-67, 2000
  10. The Working Group for WLAN Standards (http://www.ieee802.org/11/)
  11. IEEE 802.15 Working Group for WPAN (http://www.ieee802.org/15)
  12. C. Intanagonwinwat, D. Estrin, R. Govindan, and J. Heidemann, "Impact of network density on data aggregation in wireless sensor networks," Proc. of the 22nd International Conference on Distributed Computing Systems, pp.457, 2002
  13. M. Garey, D. Johnson, Computers and intractability: a guide to the theory of NP-completeness , Freeman, San Francisco, CA, 1979
  14. A.-F. Harris III, Robin Kravets, Indranil Gupta, "Building trees based on aggregation efficiency in sensor networks," Ad Hoc Networks, Vol.5, No.8, pp.1317-1328, 2007 https://doi.org/10.1016/j.adhoc.2007.02.021
  15. IETF RFC 3344(Mobile IPv4) and RFC 3775(Mobile IPv6) (http://www.ietf.org/rfc.html)
  16. B. Karp and H.-T. Kung, "Greedy perimeter stateless routing for wireless networks," Proc. of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 243-254, 2000
  17. S.-A. Borbash, A. Ephremides, and M.-J. McGlynn, "An asynchronous neighbor discovery algorithm for wireless sensor networks," Ad Hoc Networks, Vol.5, pp.998-1016, 2007 https://doi.org/10.1016/j.adhoc.2006.04.006