Professional Documents
Culture Documents
Main Document
Main Document
CHAPTER 1
INTRODUCTION
Sensor networks provide endless opportunities, but at the same time pose formidable
challenges, such as the fact that energy is a scarce and usually non-renewable resource. However,
recent advances in low power VLSI, embedded computing, communication hardware, and in
general, the convergence of computing and communications, are making this emerging technology
a reality. Likewise, advances in nanotechnology and Micro Electro-Mechanical Systems (MEMS)
are pushing toward networks of tiny distributed sensors and actuators.
Smart environments represent the next evolutionary development step in building, utilities,
industrial, home, shipboard, and transportation systems automation. Like any sentient organism,
the smart environment relies first and foremost on sensory data from the real world. Sensory data
comes from multiple sensors of different modalities in distributed locations. The smart
environment needs information about its surroundings as well as about its internal workings; this is
captured in biological systems by the distinction between exteroceptors and proprioceptors. The
challenges in the hierarchy of: detecting the relevant quantities, monitoring and collecting the data,
assessing and evaluating the information, formulating meaningful user displays, and performing
decision-making and alarm functions are enormous.
communication networks, wireless sensor networks and smart sensors, physical transduction
principles, commercially available wireless sensor systems, self-organization, signal processing
and decision-making, and finally some concepts for home automation.
The figure generally consists of a data acquisition network and a data distribution network,
controlled and monitored by a management center. The plethora of available technologies makes
even the selection of components difficult, let alone the design of a consistent, reliable, robust
overall system. The increasing interest in wireless sensor networks can be promptly understood
simply by thinking about what they essentially are: a large number of small sensing self-powered
nodes which gather information or detect special events and communicate in a wireless fashion,
with the end goal of handing their processed data to a base station. Sensing, processing and
communication are three key elements whose combination in one tiny device gives rise to a vast
number of applications.
Using low-power mode for the processor or disabling the radio is generally advantageous,
even though periodically turning a subsystem on and off may be more costly than always keeping
it on. Techniques aimed at reducing the idle mode leakage current in CMOS-based processors are
also noteworthy. Medium Access Control (MAC) solutions have a direct impact on energy
consumption, as some of the primary causes of energy waste are found at the MAC layer:
collisions, control packet overhead and idle listening. Power saving forward error control
techniques is not easy to implement due to the high amount of computing power that they require
and the fact that long packets are normally not practical. Energy-efficient routing should avoid the
loss of a node due to battery depletion. Many proposed protocols tend to minimize energy
consumption on forwarding paths, but if some nodes happen to be located on most forwarding
paths (e.g., close to the base station), their lifetime will be reduced.
4
Possible applications of sensor networks are of interest to the most diverse fields.
Environmental monitoring, warfare, child education, surveillance, micro-surgery, and agriculture
are only a few examplesJust as they can be used to monitor nature, sensor networks can likewise be
used to monitor human behavior. Medical research and healthcare can greatly benefit from sensor
networks: vital sign monitoring and accident recognition are the most natural applications. An
interesting application to civil engineering is the idea of Smart Buildings: wireless sensor and
actuator networks integrated within buildings could allow distributed monitoring and control,
improving living conditions and reducing the energy consumption, for instance by controlling
temperature and air flow. Military applications are plentiful. The network detects the muzzle blast
and the acoustic shock wave that originate from the sound of gunfire. The arrival times of the
acoustic events at different sensor nodes are used to estimate the position of the sniper and send it
to the base station with a special data aggregation and routing service.
Going back to peaceful applications, efforts are underwayatCarnegie Mellon University and
Intel for the design of Iris Net (Internet-scale Resource-Intensive Sensor Network). The network
interface of a PC indeed senses the virtual environment of a LAN or the Internet rather than a
physical environment; with an architecture based on the concept of a distributed database, this
hardware can be orchestrated into a global sensor system that responds to queries from users.
Sensors can be used to capture vital signs from patients in real-time and relay the data to handheld
computers carried by medical personnel, and wearable sensor nodes can store patient data such as
identification, history, and treatments.
6
Military Scenarios: WSN supports tactical network for military communications and automated
battle eldest.
Data Networks: WSN provides support to the net-work for the exchange of data between mobile
devices.
Device Networks: Device Networks supports the wireless connections between various mobile
devices so that they can communicate.
Free Internet Connection Sharing: It also allows us to share the internet with other mobile
devices.
Sensor Network: It consists of devices that have capability of sensing, computation and wireless
networking. Wireless sensor network combines the power of all three of them, like smoke
detectors, electricity, and gas and water meters.
7
Lifetime
Lifetime is extremely critical for most applications, and its primary limiting factor is the energy
consumption of the nodes, which need to be self-powering.
Flexibility
Sensor networks should be scalable, and they should be able to dynamically adapt to changes in
node density and topology, like in the case of the self-healing minefields. In surveillance
applications, most nodes may remain quiescent as long as nothing interesting happens.
Maintenance
The only desired form of maintenance in a sensor network is the complete or partial update of
the program code in the sensor nodes over the wireless channel. All sensor nodes should be
updated, and the restrictions on the size of the new code should be the same as in the case of wired
programming.
8
Data Collection
Data collection is related to network connectivity and coverage. An interesting solution is the
use of ubiquitous mobile agents that randomly move around to gather data bridging sensor nodes
and access points, whimsically named data MULEs (Mobile Ubiquitous LAN Extensions) in.
Communication
Most sensor networks use radio communication, even if alternative solutions are offered by
laser and infrared. Nearly all radio-based platforms use COTS (Commercial Off-The-Shelf)
components
9
CHAPTER 2
LITERATURE SURVEY
PAPER 1:
Md Nafees Rahman, Tsinghua Science 562 and Technology, December 2011, 16(6): 561-568
Abstract: One of the fundamental design challenges in designing a Wireless Sensor Network
(WSN) is to maximize the network lifetime, as each sensor node of the network is equipped with a
limited power battery. To overcome this challenge, different methods were developed in the last
few years using such techniques as network protocols, data fusion algorithms using low power,
energy efficient routing, and locating optimal sink position. This paper focuses on finding the
optimal sink position. Relay nodes are introduced in conjunction with the sensor nodes to mitigate
network geometric deficiencies since in most other approaches the sensor nodes close to the sink
become heavily involved in data forwarding and, thus, their batteries are quickly depleted. A
Particle Swarm Optimization (PSO) based algorithm is used to locate the optimal sink position
with respect to those relay nodes to make the network more energy efficient. The relay nodes
communicate with the sink instead of the sensor nodes. Tests show that this approach can save at
least 40% of the energy and prolong the network lifetime.
This paper presents a simple scheme for improving the network lifetime without compromising any
of the strict requirements of wireless sensor networks. a scheme is proposed where relay nodes are
used to collect data from the sensor nodes to pass them to the sink. We have calculated the required
number of relay nodes to maintain the network connectivity successfully and then investigated
their effect on network lifetime.
10
PAPER 2:
C.Karthik Sendhil Kumar, R.Sukumar- Department of ECE, ISSN: 2249-9555,Vol. 3, No.2, April
2013
This paper presents a survey of different techniques to enhance the lifetime of the sensors in WSN
and identifies future trends in designing energy efficient WSN protocols.In this paper; we made an
attempt to summarize the results of major contributions of various researchers in the field of energy
efficiency in wireless sensor networks. These energy saving methods are basically used to increase
the life time of sensor nodes in wireless sensor networks. We have also stressed the importance of
design issues of Wireless Sensors Networks such as power consumption, hardware constraints,
environment, and transmission media. There are still many issues to be resolved around energy
management.
11
PAPER 3:
Sunil Kumar, Jaswinder Kaur, International Journal of P2P Network Trends and Technology
Abstract— Sensor nodes are limited in power, computational capacities, and memory. So the
routing protocols used in ad hoc networks usually cannot be used in sensor networks even different
routing mechanisms are used in sensor networks. Since energy awareness is an essential design
issue, many routing protocols have been proposed for WSNs based on network structure and
protocol operation. Furthermore, these protocols can be classified into multipath-base three
categories, namely, proactive, reactive, and hybrid protocols.
In this paper we present a survey of the state-of-the-art routing techniques for WSNs from the
recent work; highlighting their objectives, features, complexity, etc. Since energy awareness is an
essential design issue, many routing protocols have been proposed for WSN based on network
structure and protocol operation. Based on network structure routing protocols are divided into flat,
hierarchical, and location based network, while based on protocol operation routing protocols are
divided into coherent, negotiation, multipath, QoS and query-based.
12
PAPER 4:
Achieving Source Location Privacy and Network Lifetime Maximization through Tree-Based
Diversionary Routing in Wireless Sensor Networks
Jun Long1, Mianxiong Dong2, Kaoru Ota3, and Anfeng Liu1, IEEE Acess, Volume 2, 2014
Abstract—Wireless sensor networks (WSNs) have been proliferating due to their wide applications
in both military and commercial use. However, one critical challenge to WSNs implementation is
source location privacy. In this paper, we propose a novel tree-based diversionary routing scheme
for preserving source location privacy using hide and seek strategy to create diversionary or decoy
routes along the path to the sink from the real source, where the end of each diversionary route is a
decoy (fake source node), which periodically emits fake events. Meanwhile, the proposed scheme
is able to maximize the network lifetime of WSNs.
The main idea is that the lifetime of WSNs depends on the nodes with high energy consumption or
hotspot, and then the proposed scheme minimizes energy consumption in hotspot and creates
redundancy diversionary routes in non hotspot regions with abundant energy. Hence, it achieves
not only privacy preservation, but also network lifetime maximization. Furthermore, we
systematically analyze the energy consumption in WSNs, and provide guidance on the number of
diversionary routes, which can be created in different regions away from the sink.
13
PAPER 5:
GUO Jianli, LIU Hongwei Department of Computer Science and Technology, Harbin Institute of
Technology
Abstract—Mobile ad hoc networks rely on the cooperation of nodes for routing and forwarding.
However, it may not be advantageous for individual nodes to cooperate. In order to make the
mobile ad hoc network more robust, we propose a scheme called HEAD (a hybrid mechanism to
enforce node cooperation in mobile ad hoc networks) to make the misbehaviour unattractive.
HEAD is an improvement to OCEAN (observation- based cooperation enforcement in ad hoc
networks). It employs only first hand information and works on the top of DSR (dynamic source
routing) protocol. By interacting with the DSR, HEAD can detect the misbehavior nodes in the
packet forwarding process and isolate them in the route discovery process. In order to detect the
misbehavior nodes quickly, HEAD introduces the warning message.
In this paper, we also classify the misbehavior nodes into three types: malicious nodes, misleading
nodes, and selfish nodes. They all can be detected by HEAD, and isolated from the network. In this
paper we give a detail description on HEAD. It deletes the avoid list field in the RREQ message,
keeping the DSR protocol unmodified. By introducing the reputation table and warning message,
HEAD can detect misbehaving nodes quickly.
14
PAPER 6:
Abstract- Traditional wireless communication networks like Mobile Ad hoc Networks (MANET)
differs from WSN. WSN have unique characteristics such as denser level of node deployment,
higher unreliability of sensor nodes and severe energy, computation and storage constraints which
present many challenges in the development and application of WSN.WSN has a design trade-off
between energy and communication overhead which forms the nerve center of the routing
techniques.
In this paper we present a survey of state-of-the-art routing techniques in WSNs under all the three
categories. We epitomize these routing techniques and bring out the advantages and disadvantages
followed by their application domain. Regardless, the sensor nodes can also be grouped for
efficient data dissemination to the sink. Hierarchical routing protocols adopt the clustering
approach by grouping sensor nodes. This approach is highly scalable and thus used in a number of
applications.
15
PAPER 7:
Abstract-In wireless sensor networks (WSN), two major challenges are how to conserve the battery
power and a series of security challenges. The power conservation and security are important for
reliability and longevity of a WSN. This paper proposes an approach called “priority based
approach (PBA)” which empowers the node to choose the most important packet based on the
priority and the current energy status of the forwarding node. Thus we can minimize the average
delay and energy spent and maximizes the throughput and packet delivery ratio (PDR) when
compared to game theory approach.
In this paper, we proposed an approach called “priority based approach (PBA)” and established a
relationship between packet priority and current energy status of a sensor node which decides the
most urgent message to forward first according to its priority and also its energy level. By giving
less priority to the attacker node, we then improved the security of a network. Also, the proposed
priority based approach emphasizes reducing the workload on some nodes depending upon the
energy level and gives time to refill their energy. Therefore PBA ensures a real time
communication in WSN with minimizing the delay and energy spent and maximizing the PDR and
throughput which further maximizes the lifetime of the network.
16
CHAPTER 3
SYSTEM ANALYSIS
Existing method uses EESSDA scheme for secure data aggregation in WSNs. Different
from general data aggregation that preserves data privacy by encryption technology, EESSDA
achieves data privacy through secure channel. Because EESSDA does not need it saves much
energy for encryption/decryption operations and reduces the time of data processing, and
consequently leads to improvement of aggregation accuracy. In existing, EESDA method data
aggregation done by aggregation nodes, the sink used to communicate with leaf nodes through
aggregate nodes. ---> The agg. Nodes need to build with more memory unit, apart from leaf nodes.
It performs the slicing and aggregation at agg. Nodes, it adds nodes more traffic in the network and
consumes power. In case if aggregation node tends to failure, the leaf nodes attached along with it
could not be communicated to sink.
In existing method when there is a long time packet transmission is existent between two
nodes, these cause the packet travel through set of nodes and finally make energy drain only on
those set of nodes and causes them to run out of energy at one time and no longer could they exist
in network. We propose dynamic source routing, which is on demand protocol. So it consumes
bandwidth less than proactive protocols. Since it is reactive protocol the data aggregation is not
required.The intermediate nodes does not necessary to have more memory units, since the
intermediate nodes only does forwarding and does not store the data. i.e., only routes its inlet data
to outlet route.The residual energy prediction is proposed among availability of nodes, the high
power nodes are predicted and alternate path will be chosen .Instead of nodes drying along
particular path all availability of nodes utilized to derive uniform power utilization by cockroach
network.
Cockroach Network follows min-cut algorithm. i.e., every node aware of its neighbors and also
aware of its own and its neighbors’ edge capacity. If the adversary may control any z unit-capacity
edges, it is clear that it should always take over edges on the minimum cut of the network.
However, if the adversary may control any s nodes, it is not so obvious: it may have to choose
between proximity to the min-cut and the number of output edges. For example, in the Cockroach
network, node 4 has only one output edge, but it is on the min-cut (which divides nodes S, 1, 2, 3,
4, 5 from D); node 1 has two output edges, so apparently more power, but it is one step removed
from the min-cut, and therefore its impact may be diminished. This uncertainty about where a
network is most vulnerable seems to make the problem hard. Indeed, we find that many standard
network coding techniques—in particular, linear codes over a finite field—fail to achieve capacity.
Since all intermediate nodes will be known to all Source and destination knows and edge capacity.
Source and destination nodes know the current message sequence number and all other messages
intended for it. So successfully destination node can recover all packets intended for it. In case
19
even some of the packets lost also could be informed to source node through their sequence
number. There is no acknowledgement for particular packet which is lost. So source can identify
and resend the part of packet which is not received.
Uniform energy consumption has approach two approaches in communication patterns. The first is
one-to-many, where the base station sends control or management packets to each of the devices in
the system. This mode requires system-wide broadcasting. The second is many-to-one, where each
device transmits its packets up the tree to the gateway. This mode is sometimes called converge
casting. Transforming tree-based LLNs to work within the Iota requires the redesign and
reimplementation of a number of basic Internet protocols. In cockroach network each node varies
its size from certain low level to maximum packet size depends on the number of nodes available
between source and destination.
20
CHAPTER 4
METHODOLOGY
The primary design goal of WSN is to acquire the monitored data from target area and
deliver it to base station for its evaluation, while trying to prolong the lifetime of the network. The
design of routing protocols in WSN is influenced by many challenging factors and these factors
must be considered to achieve efficient communication in WSN. In the following section, we
briefly discuss some of these design issues that affect routing process in WSN.
Fig.4.1.In-network processing
4.2 SPANDSR:
Another improvement to Span-DSR would involve a fast handoff of routes between a
withdrawn coordinator and its replacement, eliminating the latency of routing through a sleeping
node and waiting for a route error to propagate to the source. There are many issues with this
approach, including the fact that a new coordinator may not be able to take over all routes
21
(connectivity may have been restored by two announcing coordinators instead of one). Another
simple way to avoid the latency of routing through a withdrawn coordinator would be to make the
coordinator stay up until all outstanding packets are cleared and a new route has been found.
ensuring a sub-optimal energy dissipation of the individual nodes despite their random deployment
[3].
CHAPTER 5
ALGORITHMS
There are many ways to classify the MANET routing protocols, depending on how the
protocols handle the packet to deliver from source to destination. But Routing protocols are
broadly classified into three types such as Proactive, Reactive and Hybrid protocols.
CHAPTER 6
INTRODUCTION TO SIMULATION
6.1 General
Simulation has become a very powerful tool for industrial application as well as in
academics, nowadays. It is now essential for an electrical engineer to understand the concept of
simulation to study the system or circuit behavior without damaging it .The tools for doing the
simulation in various fields are available in the market for engineering professionals. Many
industries are spending a considerable amount of time and money in doing simulation before
manufacturing their product. In most of the research and development (R&D) work, the simulation
plays a very important role. Without simulation it is quiet impossible to proceed further. It should
be noted that in electronics, computer simulation and a proof of concept hardware prototype in the
laboratory are complimentary to each other. However computer simulation must not be considered
as a substitute for hardware prototype. The objective of this chapter is to describe simulation of an
acknowledgement based approach for detecting routing misbehavior occurring in MANETS.
The behavior of the network and the various applications and services it supports can then
be observed in a test lab; various attributes of the environment can also be modified in a controlled
manner to assess how the network would behave under different conditions. While a simulation
program is used in conjunction with live applications and services in order to observe end-to-end
performance to the user desktop. Network simulators serve a variety of needs. Compared to the
cost and time involved in setting up an entire test bed containing multiple networked computers,
routers and data links, network simulators are relatively fast and inexpensive. They allow
engineers, researchers to test scenarios that might be particularly difficult or expensive to emulate
using real hardware - for instance, simulating a scenario with several nodes or experimenting with
a new protocol in the network. Network simulators are particularly useful in allowing researchers
to test new networking protocols or changes to existing protocols in a controlled and reproducible
environment. A typical network simulator encompasses a wide range of networking technologies
and can help the users to build complex networks from basic building blocks such as a variety of
26
nodes and links. With the help of simulators, one can design hierarchical networks using various
types of nodes like computers, hubs, bridges, routers, switches, links, mobile units etc.
There are a wide variety of network simulators, ranging from the very simple to the very
complex. Minimally, a network simulator must enable a user to represent a network topology,
specifying the nodes on the network, the links between those nodes and the traffic between the
nodes. More complicated systems may allow the user to specify everything about the protocols
used to handle traffic in a network. Graphical applications allow users to easily visualize the
workings of their simulated environment. Text-based applications may provide a less intuitive
interface, but may permit more advanced forms of customization.
Since the process of creation of a network simulator that contains a sufficient number of high-
quality validated, tested and actively maintained models requires a lot of work, ns-3 project spreads
this workload over a large community of users and developers. Network Simulator 2 Consists of
6.3.3 Xgraph
One part of the ns-allinone package is 'xgraph‘
A plotting program which can be used to create graphic representations of simulation
results.
Xgraph is an X-Windows application that includes:
interactive plotting and graphing
animation and derivatives
portability and bug fixes
29
CHAPTER 7
DEVELOPMENT OF PROJECT
Simulator : NS2
Front End : OTCL
Back End : C++
Initial energy – 60
Network traffic – 300 Bps
CHAPTER 8
CONCLUSION AND DISCUSSION
CONCLUSION
In this paper, a group nodes involved in cockroach network set is active for part of time and idle
for rest. Based on the no of hops and distance the power level is calculated to enhance the life time
of nodes, where all nodes floods its routing table to all its neighbors using dynamic source routing.
This approach sniffs the energy drain at each nodes and isolate those nodes from packet
transmission when its energy drain beyond certain level, so that keep the entire network to live.
Instead of sending bulk of packets, the proposed method used to split the packets along cockroach
network and each packet would take separate best energy path in their route. Hence no specific
path gets drain soon.
DISCUSSION
EESSDA does not need it saves much energy for encryption/decryption operations and reduces the
time of data processing, and consequently leads to improvement of aggregation accuracy. In DSR
residual energy prediction is proposed among availability of nodes, the high power nodes are
predicted and alternate path will be chosen. So it consumes bandwidth less than proactive
protocols. Cockroach network have uniform capacity.
35
CHAPTER 9
APPENDICES
9.1 APPENDIX 1
A.1.1 SAMPLE CODEING IN WIRELESS
# Define options
set val(chan) Channel/WirelessChannel ;# channel type
set val(prop) Propagation/TwoRayGround ;# radio-propagation model
set val(netif) Phy/WirelessPhy ;# network interface type
set val(mac) Mac/802_11 ;# MAC type
set val(ifq) Queue/DropTail/PriQueue ;# interface queue type
set val(ll) LL ;# link layer type
set val(ant) Antenna/OmniAntenna ;# antenna model
set val(ifqlen) 50 ;# max packet in ifq
set val(nn) 50 ;# number of mobilenodes
set val(rp) DSDV ;# routing protocol
set val(x) 1000 ;# X dimension of topography
set val(y) 1000 ;# Y dimension of topography
set val(stop) 150 ;# time of simulation end
create-god $val(nn)
-agentTrace ON \
-routerTrace ON \
-macTrace OFF \
-movementTrace ON
#defining heads
$ns at 0.0 "$n(0) label CH"
$ns at 0.0 "$n(1) label Source"
#$ns at 0.0 "$n(2) label N2"
$ns run
38
9.2 APPENDIX 2
A.2.1 SNAPSHOTS
Delay time:
start at 0.015374 end at 0.044187 end to end delay is 0.021664
start at 0.011727 end at 0.034747 end to end delay is 0.017308
start at 0.079962 end at 0.082936 end to end delay is 0.002236
start at 0.087744 end at 0.096028 end to end delay is 0.006228
start at 0.050000 end at 0.051914 end to end delay is 0.001439
start at 0.100000 end at 0.142098 end to end delay is 0.031652
start at 0.150000 end at 0.164722 end to end delay is 0.011069
start at 0.200000 end at 0.206460 end to end delay is 0.004857
start at 0.250000 end at 0.254704 end to end delay is 0.003536
start at 0.300000 end at 0.328074 end to end delay is 0.021108
start at 0.350000 end at 0.351970 end to end delay is 0.001481
41
9.3 APPENDIX 3
LIST OF PUBLICATION
CHAPTER 10
BIBLIOGRAPHY
[1] Sami Halawani, Abdul Wahid Khan, “Sensors Lifetime Enhancement Techniques in
Wireless Sensor Networks - A Survey”- Journal of Computing, Volume 2, Issue 5, ISSN
2151-9617, May 2010.
[2] Md Nafees Rahman, M A Matin,” Efficient Algorithm for Prolonging Network Lifetime of
Wireless Sensor Networks”, Tsinghai Science and Technology, December 2011, 16(6):
561- 568.
[3] M.Sheik Dawood, S.Sadasivam, “Energy Efficient Wireless Sensor Networks based on QoS
Enhanced Base Station controlled Dynamic Clustering Protocol”, International Journal of
Computer Applications (0975 – 8887) Volume 13– No.4, January 2011.
[4] Oliver Kosut, Lang Tong, Fellow, and David N. C. Tse, “Polytope Codes Against
Adversaries in Networks”, IEEE Transactions on Information Theory, Vol. 60, No. 6, June
2014.
[5] TaochunWang, Xiaolin Qin, and Liang Liu –“An Energy-Efficient and Scalable Secure Data
Aggregation for Wireless Sensor Networks”, International Journal of Distributed Sensor
Networks Vol. -2013.
[6] Alkalbani “Energy Consumption Evaluation in Trust and Reputation Models for Wireless
Sensor Networks”, 5th International Conference IEEE Mar-2013.
[7] Minakov “A methodology for power consumption evaluation of wireless sensor networks”,
Emerging technologies and factory automation- 2009.
[8] Ettus M. “System capacity, latency, and power consumption in multi-hop routed SS-CDMA
wireless networks”, In: Proc.Radio and Wireless Conf. Colorado Springs, USA, 1998: 55-58.
43
[9] S. He, J. Chen, Y. Sun, D. K. Y. Yau, and N. K. Yip, “On optimal information capture by
energy- constrained mobile sensor”, IEEE Trans.Veh. Technol., vol. 59, no. 5, pp.
2472_2484, Jun. 2010.
[10] A. Jarry, P. Leone, S.Nikoletseas, and J.Rolim, “Optimal data gathering paths and energy-
Balance mechanisms in wireless networks”, Ad Hoc Network, vol. 9, no. 6, pp. 1036_1048,
2011.
[11] K.Akkaya and M.Younis, “An Energy-Aware QoS Routing Protocol for Wireless Sensor
Networks”, in the Proceedings of the IEEE Workshop on Mobile and Wireless Networks
(MWN 2003), Providence, Rhode Island, May 2003.