You are on page 1of 7

S.-S. Chiang et al.

: A Minimum Hop Routing Protocol for Home Security Systems Using Wireless Sensor Networks 1483

A Minimum Hop Routing Protocol for Home Security Systems


Using Wireless Sensor Networks
Shao-Shan Chiang, Member, IEEE, Chih-Hung Huang, and Kuang-Chiung Chang

Abstract — A wireless sensor network is a data range of the sensor could be longer than 300 meters.
communication system that consists of from several to However, sending data at such high transmission power could
thousands of tiny wireless sensor nodes. These battery- lead to excessive drain of power and high possibility of sensor
powered sensor nodes cooperate with each other to failures. Regarding to the wireless sensor networks interested
accomplish data transmission. A variety of wireless sensor in this paper, on the other hand, sensor nodes use relatively
networks have been developed for different applications in the low transmission power to communicate with each other. As a
recent years. In this paper, a data routing protocol, which is consequence, the lifetime of the sensor nodes is longer than
designed for a wireless home security network, is proposed. that of the sensors used in the traditional home security
Due to the lifetime of such a network depends entirely on the networks.
lifetime of the battery power, the proposed routing protocol In a wireless sensor network, a sensor node cooperates with
chooses hop counts and battery power levels as metrics, in neighbor nodes to accomplish data transmission. This is so
order to conserve as much energy as possible in both
called the multihop relay. When such a network is used in a
computations and data communications. In addition, when
specific application, it usually scatters sensor nodes in a
some of the nodes fail or run out of battery, the routing
protocol could effectively adapt the change and find an specific area to collect data. By means of a multihop relay
alternative path. The robustness and the energy efficiency of scheme, the collected data is transmitted to a base station for
the proposed routing protocol were tested, and the results further analysis or for remote monitoring and controlling.
turned out to be successful.1 Therefore, a routing protocol is needed to guarantee the
message delivery. Even if there are node failures, a robust
Index Terms —wireless sensor networks, routing protocols, routing protocol could dynamically adjust the transmission
energy-efficient, home security systems. path accordingly. There has been much research in the field of
network layer protocols for wireless sensor networks, such as
I. INTRODUCTION flooding [4]-[5], directed diffusion [6], sequential assignment
Recent advances in micro fabrications and wireless routing [7], gradient-based routing [8] to mention a few.
communications technology have enabled the development of Classic flooding is an old technique that can also be used
low-cost, small-sized, low-power-consuming, multifunctional for routing in sensor networks [4]-[5]. When a sensor node
sensor nodes, which are capable of communicating wirelessly detects an event, it broadcasts the message to other sensor
in short distances with each other. A wireless sensor network nodes within its radio transmission range, which is called one
could consist of from several to thousands of these tiny hop. Again, all the receiving nodes broadcast the message to
wireless sensor nodes, which can be added and removed all of their neighbor nodes within one hop, except the node
conveniently to the network whenever it is necessary. It from which they receive the message. This process is
achieves the goals of low-cost and flexibility of deployment. recursively performed until the message reaches the sink node,
Wireless sensor networks are being developed for a wide which is a designated node directly linked to the base station
range of civil and military applications, such as health care or until a maximum number of hops for the message is
[1], bridge monitoring [2], and home automation [3]. Home reached. This routing method has several deficiencies such as
security is one of the potential applications that the wireless implosion, overlap, and resource blindness [5].
sensor network technologies could be applied, where In this paper, we present an energy-efficient, reliable and
consumer electronics and wireless communication robust routing algorithm for wireless sensor networks. Our
technologies are merged. In most wireless home security approach is to flood a special setup packet to establish a local
systems, many battery-powered sensors such as camera, routing table for every node in the network before data
motion detector, glassbreak detector are distributed inside or transmission actually takes place. The routing table consists of
outside the house for detecting events. When a break-in is parent, sibling, and child nodes, together with their
detected, the sensor passes information directly to the base identification numbers and energy levels, within one hop
station through a wireless channel. The radio transmission distance. Based on the routing table, each sensor node can
determine the best next-hop node, which has the highest
1
S. S. Chiang and K. C. Chang are with the Department of Electrical energy level, to relay the message.
Engineering, Lunghwa University of Science and Technology, Taoyuan The rest of the paper is organized as follows. Section II is a
33306, Taiwan. (e-mail: schiang@ieee.org). brief literature review on this topic. Section III describes the
C. H. Huang is with the Department of Information Management, Lunghwa
University of Science and Technology, Taoyuan 33306, Taiwan. system model of the proposed routing scheme in details. The
Contributed Paper
Manuscript received October 9, 2007 0098 3063/07/$20.00 © 2007 IEEE
1484 IEEE Transactions on Consumer Electronics, Vol. 53, No. 4, NOVEMBER 2007

system implementations and experimental results are strategies to reduce the energy dissipation for the networks.
discussed in Section IV. Some conclusions are given in One is to control the variable-range transmission power of the
Section V. sensor nodes [9]. The other is to develop energy-efficient
routing protocols based on common-range transmission, i.e.,
II. RELATED WORK nodes broadcast using the same transmission power level
An important issue on wireless sensor networks is to find without any power control [4]-[8].
an optimal routing path to transmit the collected data from a The directed data dissemination paradigm is proposed in [6],
source node to the sink. Because wireless sensor networks are where the sink node sends out an interest, which is a task
different from one to another, the optimal path could be description, to all sensors by a diffusion or a flooding
defined in different ways. For example, energy dissipation, mechanism. Each receiving node then stores the interest in its
radio coverage range, and number of nodes used are all cache if no matching entry exists in the cache already. The
possible factors, or called metrics, to consider. When deciding interest entry contains a timestamp and several gradient fields.
an optimal path, these metrics can be taken into account The timestamp marks the time when the last matching interest
separately or in any combinations. As the number of the was received, and the gradient, up to one per neighbor,
sensor nodes increases, a management scheme to choose from indicates the neighbor node from which the interest was
those metrics becomes more important. received. As the interest diffuses throughout the entire sensor
network, the gradients from the source back to the sink node
are set up. Then, any data matching the interest is sent back
toward the sink node through paths that the gradients describe.
The sequential assignment routing (SAR) algorithm creates
multiple trees, or multiple paths from each node to the sink
node, in a wireless sensor network, where the root of each tree
is a one-hop neighbor from the sink node [7]. Each tree grows
from every root node by successively branching to neighbors
with higher hop distances while avoiding nodes with very low
quality of service (QoS) and energy resources. At the end of
this tree-building procedure, most nodes belong to multiple
trees. This allows a sensor node to choose a tree to relay its
data back to the sink node. There are two parameters, energy
resources and additive QoS, associated with each path back to
the sink node. The SAR algorithm selects the path based on
the two parameters of each path. As a result, each sensor node
would select the most energy-efficient path to route the data
back to the sink node.
Fig. 1. Routing metrics of the paths.
The authors in [8] proposed a variant of directed diffusion,
called gradient-based routing (GBR). The key idea in GBR is
Assuming a data packet is to be transmitted from source
to memorize the number of hops when an interest is diffused
node A to destination node F as shown in Fig. 1, where Lxy
through the whole network. As such, each node can calculate
denotes the cost from node x to node y, and Px denotes the
a parameter called the height of the node, which is the
available power of node x. There are three possible paths {A–
minimum number of hops to reach the base station. The
B–F}, {A–B–D–F}, and {A–C–E–F}. By summing the costs
difference between the heights of a node and its neighbor is
and counting the hops along each route, the total cost of {A–
considered as the gradient on that link. Then the data packet is
B–F} is 10 with two hops, the total cost of {A–B–D–F} is 14
forwarded to a link with the largest gradient. To avoid
with three hops, and the total cost of {A–C–E–F} is 10 with
overusing a particular node, when the node’s energy drops
three hops. Consequently, the optimal path from node A to
below a certain threshold, it increases its height so that other
node F will be different depending on the metric chosen. By
sensors are discouraged from sending data to that node. Note
choosing the minimum hop counts as the only metric, the
that when broadcasts are transmitted at the same power level,
route {A–B–F} is the optimal one with only two hops. On the
a minimum hop routing is equivalent to a minimum energy
other hand, by choosing the total cost as the metric, both {A–
routing [5].
B–F} and {A–C–E–F} are optimal with a cost of 10 each.
Lastly, if we choose the maximum available power as the
metric, {A–C–E–F} would be the optimal path because the III. SYSTEM MODEL
total available power along this path is maximal. Our system model consists of a base station, a sink node,
Energy efficiency is one of the most important metrics in and a number of wireless sensor nodes, as shown in Fig. 2.
the routing design for wireless sensor networks because the The base station can be located in any convenient place in the
battery power of each sensor node is limited. There are two house. The sink node is a specially designed sensor node that
S.-S. Chiang et al.: A Minimum Hop Routing Protocol for Home Security Systems Using Wireless Sensor Networks 1485

has more memory than other sensor nodes and is connected to packet to all sensor nodes within its one-hop distance. We
the base station through a wired or wireless link. The sensor define the setup packet as “Setup.ID.hop.energylevel”, where
nodes are distributed in the house and yards so that the radio the “Setup” indicates it is a setup packet and should be
coverage of any sensor node covers at least one other node. flooded throughout the entire network, “ID” is the ID number
While in the network communications, the sink node takes of the sending node, “hop” represents the hop count, which is
commands from the base station and floods them to other the number of hops between the sending node and the sink
sensor nodes wirelessly. On the other hand, the sink node also node, and “energylevel”, as the name says itself, is the battery
collects data from other nodes and delivers them to the base energy level of the sending node. For the setup packet
station. All the sensor nodes are battery-powered except the broadcasted by the sink node, the “hop” value is set to 0 and
sink node, because the sink node is the most frequently used the “energylevel” value is set to a very large value.
node in this sensor network. When deployed, the transmission After receiving the setup packet, all the receiving nodes
power of each sensor node is regulated so that its radio within one hop from the sink node increase the hop count by
coverage is fixed, despite the decline of battery power, until 1, as shown in Fig. 3(a), and mark the sink node as their
the battery is exhausted. It is required that every sensor node parent node by recording the hop count, ID number and
can monitor its own battery power level and has its own energy level on the routing table. Then, each node with hop
identification number (ID) and location information, such as count l, called a relaying node, in turn broadcast a newly
front door, garden, and so on. constructed setup packet, as also shown in Fig. 3(b). The new
setup packet has the same format as that was sent by the sink
node, but with the relaying node’s ID number and energy
level, and the hop count is now set to 1. This broadcasting
process repeats hop-by-hop until all the nodes in the network
have been notified.

Fig. 2. The system model.

There are two phases in wireless sensor network


communications, the routing table establishment phase and the
(a)
data routing phase. The flooding technique [4]-[5] is used to
establish a local routing table for each sensor node in the hop 2
hop 1 hop 2
routing table establishment phase. In this phase, it is required
hop 2
that all the sensor nodes turn their transceivers on to exchange hop 1 G hop 1
information until their routing tables are established. The hop 2
routing table will be used and remain unchanged in the data Sink hop 2
H
B
routing phase until any node failure occurs or a new node is hop 1
added on. Once the routing table is built, the data packets can C
hop 1
only be received and processed by the designated node listed A hop 1 hop 2
hop 2
in the routing table of the sending node. At this data routing D
phase, the energy consumption is very low. F
hop 2 hop 2
In the following, the algorithms to establish and to update E

the routing tables are described, followed by the algorithms to


route data and command packets. (b)
Fig. 3. (a) The setup packet sent from the sink node; (b) The setup packet
A. The Establishment of Routing Tables is flooded one more hop away.
In the sensor network initialization, the base station notifies
the sink node to start a routing table establishment process for As also shown in Fig. 3(b), the setup packets, either sent by
the entire network. Then, the sink node broadcasts a setup the sink node or any of the relaying nodes, may be received by
1486 IEEE Transactions on Consumer Electronics, Vol. 53, No. 4, NOVEMBER 2007

any other sensor nodes within one hop. On the other hand, However, in order to fully utilize the available time slots, the
every sensor node may receive more than one setup packets same time slot can be reassigned to nodes whose hop count
from its neighbor nodes. The following scenario describes a values are three or more hops away. Follow up the previous
general procedure to follow while a sensor node receives a example, it is fine to reassign time slot N to all nodes with hop
setup packet. count 5, since no radio interference will occur. Due to lack of
y If the receiving node does not have a hop count set, it precise time synchronization of the network, to prevent sensor
increases the hop count value in the first received packet nodes from missing the assigned communication time, the
by 1 and sets the value as its hop count, and then in turn duration of a time slot is set a longer value. By using a
broadcast a new setup packet. It also records the all the handshake protocol, although the other sibling nodes with the
sending nodes whose hop counts are one less than its own same time slots may receive the same data packets as well,
as parent nodes. As shown in Fig. 3(b), nodes D, and F they would just drop them silently without any extra
record node A as their parent node, and node E records processing and transmission power consumptions.
both node A and B as its parent nodes. A routing table consists of three rows. All the parent, sibling
y If the receiving node has been set a smaller hop count and child nodes, together with their ID numbers, energy levels
than that in the packet received, it marks the sending node and time slots, are put at the bottom, middle and upper row,
as its child node by recording the ID number and energy respectively. The correctness of routing table can be easily
level shown in the packet. As shown in Fig. 3(b), the sink verified when the routing table establishment phase is completed.
node records nodes A, B, C, and G as its child nodes. The hop count values of all the parent, sibling and child nodes
y If the receiving node has the same hop count as that in the should be three consecutive numbers. If it is not true, this sensor
packet received, it marks the sending node as a sibling node. node resets the current routing table and acts as a newly added
In Fig. 3(b), both nodes B and C record node A as a sibling node to establish its routing table (see Section III. B).
node, and nodes A, C and G record node B as a sibling node. B. Deletion and Addition of Sensor Nodes
Flooding the setup packet in this way may cause several When the battery power of a sensor node is going to fall
problems such as collision and incorrect setting of the hop below a predetermined level, it sends an alert packet to all the
count. If several nodes broadcast the packets at the same time, sensor nodes listed in its routing table. In this situation, each
they will collide to each other. To prevent collisions, all nodes receiving node simply deletes the dying-out node from the
receiving the setup packet for first time have to wait for a routing table. As time goes by, sensor nodes will gradually be
fixed time plus a random time, like the back-off algorithm energy-exhausted and be deleted from the routing tables one
used in Ethernet, before relaying the setup packets. The after another. Once the number of deleted nodes increases so
duration of the fixed time depends on the hop count value in that the sensor network becomes disconnected, new sensor
the received packet: the larger the value is the longer the fixed nodes must be added into the network in order to maintain the
time is chosen. The design of the fixed time may lengthen the connectivity of the network.
time needed to establish the routing tables. However, it can
prevent a receiving sensor node from setting its hop count to a
higher value than it should be. In other words, once a
receiving node has set its hop count, it is impossible to receive
any setup packet that has smaller hop count value. To further
reduce the amount of setup packets flooded in the entire
network, every sensor node only relays the setup packet once.
To conserve the battery power in the data routing phase,
every node goes into sleep and wake-up cycles following a
predefined time schedule, called frame. A node can only send
(or receive) data when it is awake. Therefore, determining
time slots in which sensor nodes can communicate with each
other is critical. To ensure the data packet delivery, which is
the main goal of the home security systems, we use a simple
rule to assign time slots to all nodes according to their hop
count values. Since any sensor node communicates mostly Fig. 4. Sensor node addition procedure.
with its parent and child nodes, therefore, the node as well as
its parent and child nodes, should avoid sending packets When a new sensor node appears in the network, it has to
simultaneously. In the wake-up period of a predefined frame, establish its own routing table and updates routing tables of
we assign all sensor nodes that have the same hop count value the sensor nodes within its one hop distance. The new sensor
the same time slots. For example, all nodes with hop count 2 node broadcasts an add packet in the format
are assigned the same time slot, such as slot N, which is “Add.ID.energylevel”, where the “Add” indicates it is an add
different from that for nodes with hop count 1 and 3. packet and should be answered, to notify the sensor nodes
S.-S. Chiang et al.: A Minimum Hop Routing Protocol for Home Security Systems Using Wireless Sensor Networks 1487

within one hop, as node N shown in Fig. 4. Every receiving has the highest energy level among the parent nodes in its
node replies a packet with its hop count, energy level and ID routing table.
number destined to the new sensor node after a random time y Otherwise, if there is no parent node available, the sensor
delay. Waiting for a predefined time interval to ensure that all node forwards the data packets to a sibling node, which
receiving sensor nodes have responded, the new sensor node has the highest energy level among the sibling nodes in its
generates its routing table according to the following criteria: routing table.
y The new sensor node marks the responding nodes tied with y Otherwise, if there is no sibling node available, the sensor
the least hop count as parent nodes, increases the least hop node returns the data packet to its predecessor, i.e. the
count by 1 and then set the value as its hop count; node where the packet came from. In this case, the
y If there are responding nodes with the same hop count as predecessor removes the dead route by deleting the
its own, it marks them as sibling nodes; former designated node from the routing table and tries to
y If there are responding nodes with a larger hop count than find an alternative path.
its own, it marks them as child nodes. y If a sensor node deletes a parent node from its routing table,
In Fig. 4, for example, node N sets its hop count as 2 and it sends an alert packet to all the remaining sibling and
marks the nodes with hop count 1 as its parent nodes, the parent nodes in the routing table. Each receiving node
nodes with hop count 2 as its sibling nodes, and the nodes simply deletes the node from its routing table. This node
with hop count 3 as its child nodes. The correctness of the failure notification can prevent other nodes from sending
routing table created by this addition procedure also needs to data to the dead node, and thus conserve the battery power.
be checked. If it is correct, the new sensor node broadcasts an D. The Command Routing Scheme
update packet in the format “Update.ID.hop.energylevel”,
There are two types of commands in the proposed home
which includes its hop count, energy level and ID number, to
security network: one is to all sensor nodes, namely,
all sensor nodes listed in the routing table. The receiving
CommALL, and the other is to a designated node. The
sensor nodes append the new sensor node into their routing
algorithm to deliver CommALL from the sink node is similar
tables according to its hop count.
to that of the routing table establishment expect the packet is
C. The Data Routing Scheme relayed according to the communication timeslots of each
Having shown methods for establishing a local routing table node defined. The delivery of this command stops when the
for each sensor node in the home security network, we now relaying node has no child nodes. To reduce the amount of
focus on developing a data routing scheme, based on the routing information flooded in the network, when a relaying node
tables, to ensure the data transmission. When a sensor node receives the same command from different parent nodes, it
detects an event, the data collected must be sent back to the sink only relays the command once.
node and then to the base station by the relay scheme. Since Sending a command to a designated node may use same
processing and transmitting data packets both consume energy, mechanism as that in CommALL. However, this mechanism
the purpose of the proposed data routing scheme is not only to requires the participation of all the nodes in the network,
find a path to the sink node, but also to conserve as much which may unnecessarily consume battery power.
battery energy as possible. Besides, to avoid overuse of certain Alternatively, the sink node builds a global routing table
nodes in data packet delivery process to extend the lifetime of showing the entire tree structure of the network. The global
the wireless sensor network has to be taken into account as well. routing table can be established by using the CommALL
The proposed routing algorithm searches an optimal path to command to ask every sensor node to forward its routing table
the sink node by choosing the hop count and the energy level to the sink node. According to the global routing table, the
as the metrics. When several optimal paths exist, the sensor sink node could find a path to the destination and fill the path
nodes that have the most energy should be chosen as the next into the command packet. Due to the global routing table
recipient to relay data packets. Every data packet has a field, building process is energy and time consuming, it is not
which is filled with the designated recipient’s ID before necessarily updated every time the sink node sends a
sending. All nodes other than the designated recipient would command. The node failure detection mechanism in the data
ignore the packet when receiving it. Beside the designated routing algorithm could detect dead routes and return the
recipient, the data packet also contains the energy level, ID message to the sink node for updating the global routing table.
number, event description, and location information of the
sending node. In addition to process and relay the data packet, IV. IMPLEMENTATION AND RESULTS
the designated recipient must acknowledge the reception with The design of the sensor node has been implemented in our
its energy level to prevent the loss of the data packet. The laboratory by using off-the-shelf components. The sensor
algorithm to select the next relay node in an energy-based node mainly consists of a sensing unit, an 8-bit
manner is described as follows: microprocessor with a 10-bit build-in analog-to-digital
y When a sensor node detects an event or receives a data converter, an external flash memory, a power management
packet, it forwards the data packet to a parent node that unit, and a 2.4 GHz RF transceiver module (IEEE 802.15.4
1488 IEEE Transactions on Consumer Electronics, Vol. 53, No. 4, NOVEMBER 2007

compliant) for short-range transmission. For long-range corner. The number of sensor nodes changes from 50 to 100
transmission to the base station, the sink node equips with an with increments of 10. Each sensor node has a maximum
additional 27 MHz RF transceiver. A photograph of the transmission range of 10 m and a detection range of 5 m. The
prototype of the sink node is shown in Fig. 5, where the sensing maximum hop count is set 8. Before data delivery, the routing
unit is not shown. The sensing unit includes a passive infrared table has been set up at each sensor node. The energy
motion detector, which has a built-in amplifier, and a noise dissipated in the routing table establishment process is not
filter. The filtered output signal is fed into the microprocessor. included in the total energy consumption, because the
When an event is detected, the microprocessor transmits this proposed scheme uses a technique similar to the classic
information through the short distance RF transceiver to another flooding method to establish the routing table. At the time
sensor node. The sensor node is powered by a 6 V battery. The between the end of the routing table establishment and
power management unit regulates the battery voltage to 3.3 V beginning of the data delivery, for each test, a 10% of the
for the microprocessor and the RF transceiver and to 5.0 V for sensor nodes are randomly selected as failure nodes, in order
the sensing unit, respectively. This unit also includes a battery to test the robustness of the proposed algorithm. To make a
power lever monitor. The sensor node was tested. With respect fair comparison, in each test, each scheme uses exactly the
to the power consumption, the current measuring at power input same network topologies where 20 nodes were randomly
terminals, excluding the sensing unit, in different conditions is selected as source nodes. Each source node sends one data
shown in Table I. From a pure energy/bit standpoint, the sensor packet to the sink node, using the two different schemes. The
node consumes 353 nJ for transmitting a bit and 360 nJ for sizes of the data packet, handshaking packet and acknowledge
receiving a bit, for the raw data rate of 250 Kb/sec. packet, are 1, 0.5 and 0.5 Kbit, including header, respectively.
Thus, the energy dissipated in relaying one data packet of a
sensor node is 1.7825 mJ. With 20 successful deliveries of the
data packet, the average energy consumption per data packet
delivery for the proposed algorithm is shown in Fig. 6.

Fig. 6. Energy consumptions of the proposed method (real line) and the
classic flooding method (dotted line).

Fig. 5. Prototype of the sink node.


IX. CONCLUSION
TABLE I We have presented an energy-efficient routing scheme for
EXPERIMENT RESULTS OF CURRENT CONSUMPTION the wireless sensor network used in home security systems.
CPU TX RX I (mA) By using the proposed routing table establishment and data
routing scheme, sensor nodes with more energy level is
green sleep sleep 2.5
active sleep active 15.0 selected in data packet transmission relays. Since the battery
active active sleep 14.7 power of the network is utilized efficiently and evenly among
all the sensor nodes, the lifetime of the wireless home security
Next, we compare the energy-efficient performance of the system could be extended to its optimum. When any data
proposed method with the classic flooding scheme using the packet transmission fails due to sensor node’s fault or battery
same data listed in Table I. Experiments were carried out exhaustion, the proposed scheme would quickly adapt the
using random network topologies. In each network topology, change by updating the routing tables and resending the
sensor nodes are randomly scattered in a fixed 50×50 m2 packet via a new optimal path. Therefore, the proposed system
deployed area, and the sink node is located at the lower left is robust and reliable.
S.-S. Chiang et al.: A Minimum Hop Routing Protocol for Home Security Systems Using Wireless Sensor Networks 1489

REFERENCES Shao-Shan Chiang (S’98-M’01-) received the M.S. and


Ph.D. degrees, both in electrical engineering, from
[1] R.-G. Lee, C.-C. Lai, S.-S. Chiang, H.-S. Liu, C.-C. Chen, and G.-Y. University of Maryland Baltimore County (UMBC),
Hsieh, “Design and implementation of a mobile-care system over Baltimore, in 1999 and 2001 respectively. Since 2001, he
wireless sensor network for home healthcare applications,” in Proc. of has been an Assistant Professor in the Department of
the 28th IEEE EMBS Annual International Conference, New York, NY, Electrical Engineering, Lunghwa University of Science
pp. 6004-6007, 2006. and Technology, Taoyuan, Taiwan. His research interests
[2] R.-G. Lee, K.-C. Chen, C.-C. Lai, S.-S. Chiang, H.-S. Liu, and M.-S. include signal processing, pattern recognition, and communication.
Wei, “A backup routing with wireless sensor network for bridge
monitoring system,” Measurement, vol. 40, pp. 55-63, 2007. Chih-Hung Huang received his B.S. degree in Chemical
[3] H. Oh, H. Bahn, and K. J. Chae, “An energy-efficient sensor routing Engineering from Tatung University, Taipei, Taiwan in
scheme for home automation networks,” IEEE Transactions on 1980, and the M.S. degree in Computer Science from
Consumer Electronics, vol. 51, pp. 836-839, 2005. Worcester Polytechnic Institute, Worcester, Mass., USA in
[4] J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor 1987. Since 1990, he has been with the Department of
networks: A survey,” IEEE Wireless Communications, pp. 6-28, Dec. Information Management, Lunghwa University of Science
2004. and Technology, where he is currently a Lecturer. His current
[5] I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, and E. Cayirci, “A interests include image processing and 3D on-line games.
survey on sensor networks,” IEEE Communications Magazine, vol. 40,
no. 8, pp. 102-114, 2002. Kuang-Chiung Chang received his B.S. and M.S.
[6] C. Intanagonwiwat, R. Govindan, and D. Estrin, “ Directed diffusion: A degrees in electrical engineering from Tatung University,
scalable and robust communication paradigm for sensor networks,” in Taipei, Taiwan in 1979 and 1987, respectively, and the
Proceedings of the ACM Mobi-Com, Boston, MA, pp. 56-67, 2000. Ph. D. degree in electrical engineering from National
[7] K. Sohrabi, J. Gao, V. Ailawadhi, and G. Pottie, “Protocols for self- Taiwan University, Taipei, in 1993. Since 1987, he has
organization of a wireless sensor network,” IEEE Personal been with the Department of Electrical Engineering,
Communications, pp. 16-27, 2000. Lunghwa University of Science and Technology, where
[8] C. Schurgers and M. B. Srivastava, “Energy efficient routing in wireless he is currently a Professor. His current interests include digital imaging, neural
sensor networks,” in MILCOM Proc. Communications for Network- networks, and sensor networks.
Centric Operations: Creating the Information Force, McLean, VA, pp.
357-361, 2001.
[9] J. Gomez and A. T. Campbell, “A case for variable-range transmission
power control in wireless multihop networks,” in Proceedings of
Infocom, Hong Kong, pp. 1425-1436, 2004.

You might also like