International Conference on Algorithms and Architectures for Parallel Processing

Algorithms and Architectures for Parallel Processing pp 430-444 | Cite as

Energy Efficient Sleep Scheduling for Wireless Sensor Networks

  • Paul Chiedozie Uzoh
  • Jilong Li
  • Zhenbo Cao
  • Jinbae Kim
  • Aamir Nadeem
  • Kijun Han
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9528)

Abstract

Recently, wireless sensor network (WSN) has become a formidable force in almost all areas of our everyday life. However, there are still many issues with wireless sensor networks among which is the energy problem. One of the numerous techniques that have been introduced as a way of solving the problem of energy deficit inherent in a WSN is sleep scheduling. Sleep scheduling allows sensor nodes to periodically take turns to sleep in order to minimize energy cost in a WSN. Apparently, Overemission in a WSN is one of the main causes of energy drainage in sensor nodes. Traditional schemes fail to take into consideration the sleeping timetable of other nodes; hence they let transmitter nodes repeatedly send RTS preamble packets and similar control packets to sleeping nodes. Our proposed sleep scheduling scheme addresses this problem from a whole new perspective using a system called Designated Sensor Node (DSN) mechanism. The DSN scheme significantly reduces flooding of the network with unnecessary control packets. The effect in turn leads to the minimization of unnecessary energy waste in a WSN.

Keywords

DSN WSN Sleep scheduling Overemission RTS packets Control packets 

References

  1. 1.
    Liu, F., Tsui, C.-Y., Zhang, Y.: Joint Routing and Sleep Scheduling for Lifetime Maximization of Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 9(7), 2258–2267 (2010)CrossRefGoogle Scholar
  2. 2.
    Ye, W., Heidemann, J., Estrin, D.: Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Trans. Networking 12(3), 493–506 (2004)CrossRefGoogle Scholar
  3. 3.
    Choi, S.-C., Lee, J.-W., Kim Y., Chong, H.: An energy-efficient mac protocol with random listen-sleep schedule for wireless sensor networks. In: TENCON 2007 - 2007 IEEE Region 10 Conference, Taipei (2007)Google Scholar
  4. 4.
    Dam, V.T., Langendoen, K.: An adaptive energy-efficient mac protocol for wireless sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked SenSys, California (2003)Google Scholar
  5. 5.
    Niu, J., Cheng, L., Gu, Y., Jun, J., Zhang, Q.: Minimum-delay and energy-efficient flooding tree in asynchronous low-duty-cycle wireless sensor networks. In: Wireless Communications and Networking Conference (WCNC), 2013 IEEE, Shanghai (2013)Google Scholar
  6. 6.
    Rasouli, H., Kavian, Y., Rashvand, H.: ADCA: adaptive duty cycle algorithm for energy efficient IEEE 802.15.4 beacon-enabled wireless sensor networks. Sens. J. IEEE 14(11), 3893–3902 (2014)CrossRefGoogle Scholar
  7. 7.
    Yuan, X., Bagga, S., Shen, J., Balakrishnan, M., Benhaddou, D.: DS-MAC: differential service medium access control design for wireless medical information systems. In: Engineering in Medicine and Biology Society, 2008, EMBS 2008, 30th Annual International Conference of the IEEE, Vancouver, BC (2008)Google Scholar
  8. 8.
    Cunha, F., Mini, R., Loureiro, A.: Sensor-MAC with dynamic duty cycle in wireless sensor networks. In Global Communications Conference (GLOBECOM), 2012 IEEE, Anaheim, CA (2012)Google Scholar
  9. 9.
    Raghunathan, V., Ganeriwal, S., Srivastava, M.: Emerging techniques for long lived wireless sensor networks. IEEE Commun. Mag. 44(4), 108–114 (2006)CrossRefGoogle Scholar
  10. 10.
    Li, J., AlRegib, G.: Network lifetime maximization for estimation in multihop wireless sensor networks. IEEE Trans. Sig. Process. 57(7), 2456–2466 (2009)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Dagher, J., Marcellin, M., Neifeld, M.: A theory for maximizing the lifetime of sensor networks. IEEE Trans. Commun. 55(2), 323–332 (2007)CrossRefGoogle Scholar
  12. 12.
    Shang, Y.: Vulnerability of networks: fractional percolation on random graphs. Am. Phys. Soc. 89(1), 012813-1–012813-4 (2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Paul Chiedozie Uzoh
    • 1
  • Jilong Li
    • 1
  • Zhenbo Cao
    • 1
  • Jinbae Kim
    • 1
  • Aamir Nadeem
    • 1
  • Kijun Han
    • 1
  1. 1.Department of Computer Science and EngineeringKyungpook National UniversityBuk-gu, DaeguSouth Korea

Personalised recommendations