Professional Documents
Culture Documents
A Thesis Submitted
For the Fulfilment of the Requirements
For the Degree of
MASTER OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
BY
SUMIT BHATT
(Roll No. 210000705007)
FACULTY OF TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
VEER MADHO SINGH BHANDARI
UTTRAKHAND TECHNICAL UNIVERSITY, DEHRADUN
2024
i
CHAPTER 1: INTRODUCTION
DECLARATION
I hereby affirm that the thesis entitled “Optimizing Energy Efficiency and Performance in
Wireless Sensor Networks ” submitted for the award of Master of technology, Computer
Science and Engineering, from Veer Madho Singh Bhandari uttrakhand Technical
University, Dehradun embodies result of Genuine work, and learning done by me and the
content of the thesis does not form the base for the award of any other degree to me or to anyone
SUMIT BHATT
M.Tech(CSE)
Roll No. 210000705007
Faculty of Technology
Dehradun
ii
CHAPTER 1: INTRODUCTION
CERTIFICATE
This is to certify that Sumit Bhatt (210000705007) has carried out the research work presented in
this given thesis entitled "Optimizing Energy Efficiency and Performance in Wireless Sensor
Networks" for the award of Master of Technology in Computer Science and Engineering
from Veer Madho Singh Bhandari Uttarakhand Technical University, Dehradun under my
supervision. The thesis represents the results of genuine efforts and learning done by the scholar,
and the work of this thesis will not be used as grounds for the award of any other degree to me or
to any other person from Uttarakhand Technical University or any other University/Institute.
iii
CHAPTER 1: INTRODUCTION
ACKNOWLEDGEMENT
Sumit Bhatt
MTech(CSE)
Roll No:- 210000705007
Faculty of Technology
Veer Madho Singh Bhandari
Uttarakhand Technical University
Dehradun
iv
CHAPTER 1: INTRODUCTION
ABSTRACT
Wireless Sensor Network (WSN) has been widely used for monitoring and control
applications in our daily lives due to its promising features; such as low cost, low power, and
ease of implementation. The choice of energy efficient routing protocol is a vital task in the
network layer of wireless sensor networks to improve their lifetime. A performance analysis
candidate groups, flow rate, number of packets lost, and lifetime. Based on the simulation
results, we observe that opportunistic routing protocol perform better characteristic than
traditional protocol (TR). Furthermore, our findings disclose that opportunistic routing
In wireless sensor networks, protocols play a major and important role. These protocols vary
depending on the application and network architecture. It has specifically designed data
centric, location based and hierarchical protocols where special attention is taken to energy
awareness. The main objective of this research is to discuss the routing protocol and its
comparison. These are the basic protocols for data centric, location based and hierarchical.
In my research I will be comparing basic routing protocols and finding the most efficient
routing protocols among them. These protocols were originally proposed for wired networks.
But later wireless sensor networks were proposed to increase the efficiency of sensor nodes
and lifespan. These protocols also reduce network overhead and traffic.
v
CHAPTER 1: INTRODUCTION
TABLE OF CONTENTS
Declaration……………………………………………………………………………… ii
Certificate……………………………………………………………………………… iii
Acknowledgements…………………………………………………………………… iv
Abstract………………………………………………….…………………………… v
CHAPTER-1: INTRODUCTION……………………………………………… 2
vi
CHAPTER 1: INTRODUCTION
CHAPTER-3 : METHODOLOGY………………………………………..…… 33
REFERENCES……………………………………………………………… 58
vii
CHAPTER 1: INTRODUCTION
LIST OF FIGURES
Figure No. Title Page No.
viii
CHAPTER 1: INTRODUCTION
Abbreviation Explanation
Sync Synchronization
Fig Figure
CH Cluster Head
BS Base Station
ix
CHAPTER 1: INTRODUCTION
CHAPTER 1
INTRODUCTION
1
CHAPTER 1: INTRODUCTION
CHAPTER 1
INTRODUCTION
a) Terrestrial WSNs: These networks efficiently link with base stations and comprise
numerous wireless sensor nodes. Deployment methods vary, ranging from random
distribution to deliberate placement strategies like optimal positioning or grid-based
arrangements. Energy conservation techniques, including low duty cycle operations and solar
cell utilization as secondary power sources, are employed due to limited battery power.
c) Underwater WSNs: Covering over 70% of the Earth's surface, these networks deploy
sensor nodes and vehicles in aquatic environments. Autonomous underwater vehicles aid in
data collection, yet challenges such as propagation delays and limited bandwidth persist.
Energy conservation is crucial in this context, necessitating advancements in underwater
communication techniques.
d) Multimedia WSNs: Proposed to enable event tracking using multimedia forms like
images, videos, and audio, these networks feature cost-effective sensor nodes equipped with
microphones and cameras. However, challenges such as high energy consumption and
intricate data processing techniques hinder their efficiency.
e) Mobile WSNs: These networks comprise sensor nodes capable of autonomous movement
and interaction with the physical environment, offering versatility and advantages like
improved coverage and energy efficiency compared to static networks.
Each type of WSN serves distinct purposes and faces its own set of challenges, yet they
collectively contribute to various applications including military operations such as
command, control, surveillance, and reconnaissance.
b) Area Monitoring: Deployed sensor nodes monitor specific regions for events such as
heat, pressure, or motion. When an event is detected, base stations take relevant actions. For
instance, oil refineries in places like Hoima benefit from this monitoring.
c) Transportation:
WSNs play a crucial role in real-time traffic systems.Sensors collect data, which is then used
by transportation models (such as traffic lights) to alert drivers about congestion and traffic
issues.This technology is also aiding research on self-driving cars.
a) Health Applications: Wireless Sensor Networks (WSNs) are seamlessly integrated into
wearable devices like smartwatches to cater to a variety of health-related needs. These
applications encompass interfaces designed for individuals with disabilities, continuous
patient monitoring, diagnostics, precise drug administration within hospital settings, tele-
monitoring of physiological data, and real-time tracking of doctors or patients within hospital
premises.
b) Environmental Sensing: Dedicated Environmental Sensor Networks serve a broad
spectrum of applications relevant to earth science research. These networks are instrumental
in monitoring various environmental phenomena such as volcanoes, oceans, glaciers, and
forests. Specific areas of focus within this domain include air pollution monitoring, forest fire
detection, greenhouse gas monitoring, and landslide detection.
c) Structural Monitoring: Wireless Sensor Networks are also employed for structural
monitoring purposes to ensure the safety and stability of various structures. They enable the
detection and response to changes in structural conditions, thereby enhancing maintenance
efforts and safety protocols.
d) Other application:Wireless Sensor Networks (WSNs) find utility in a plethora of other
applications, including rapid emergency response, industrial process monitoring, automated
building climate control, ecosystem and habitat monitoring, and civil structural health
monitoring. These diverse uses demonstrate the versatility and effectiveness of WSNs across
various domains.
Internet, facilitating data access for end-users.. The choice of network topology (star, mesh,
or tree) impacts the network's performance and is selected based on application requirements.
2. Data Transfer:
OIn this joint approach, both discovery and data transfer are considered together.
It aims to efficiently transfer data from sensor nodes to the mobile sink.
3.Routing:
OFlat routing treats all nodes equally, while proxy-based routing involves specialized nodes
(proxies) that assist in data forwarding.
OThe trajectory of the mobile sink can be static, dynamic, or a combination of both
a) RELATED WORK
Researchers have extensively studied wireless sensor networks (WSNs) with diverse
objectives, all centered around the critical goal of enhancing WSNs for better, secure, and
efficient use across various domains.
1. Security Focus: One research paper delves into WSN security, highlighting the
vulnerability of wireless networks due to their broadcast nature. Additionally, WSNs
face heightened susceptibility because nodes are often deployed in aggressive or
hazardous environments where safety cannot be guaranteed.
2. Operational Overview: Another journal provides a comprehensive understanding of
WSNs, emphasizing spectrum sensing as a fundamental aspect. It further explores the
challenges associated with the cognitive cycle, particularly the task of detecting
spectrum usage and identifying potential primary users.
3. QoS Provision: In a distinct investigation, the author assesses the provision of
Quality of Service (QoS) in Wireless Sensor Networks (WSNs). In contrast to
conventional end-to-end multimedia applications, QoS requirements for mission-
critical WSN applications introduce new considerations. The distinct characteristics of
WSNs, featuring resource-constrained sensors and innovative communication
protocols, pose unprecedented challenges in achieving effective QoS.
4. QoS Provision in WSNs:The author initiates the exploration by scrutinizing methods
for Quality of Service (QoS) provision in traditional networks. Subsequently, they
scrutinize the emerging QoS requisites specific to Wireless Sensor Networks (WSNs),
taking into account a varied array of applications categorized by data delivery models.
Additionally, the author suggests collective QoS parameters that are not solely end-to-
end. Challenges associated with QoS provision in this pioneering paradigm are also
deliberated upon, alongside an investigation of ongoing research endeavors and
identification of unexplored research areas to stimulate further inquiry in this
relatively untapped domain
5. Protocol Stack for WSNs: In an alternate publication, the author explores the
protocol stack designed for wireless sensor networks. Recent progress in wireless
communication and electronics has enabled the creation of economical sensor
networks. These networks are applied across diverse domains, including health,
military, and home environments.. Each application area presents unique technical
challenges that researchers are actively addressing. The article provides insights into
the current state of sensor networks, discussing solutions within the context of
relevant protocol stack layers. Additionally, it highlights open research issues, aiming
to inspire new interests and advancements in this field
Wireless Sensor Networks (WSNs) play a pivotal role in supporting systems in e-health.
The integration of large-scale wireless telecommunication technologies such as 3G, Wi-Fi
Mesh, and WiMAX with telemedicine has garnered attention in the research community.
However, further advancements hinge on the seamless coexistence of small-scale
personal area technologies like radio frequency identification (RFID), Bluetooth, ZigBee,
and WSNs alongside robust large-scale wireless networks, enabling the development of
context-aware applications.
The realization of pervasive healthcare relies on leveraging existing mature wireless
network technologies while also developing unobtrusive small sensor devices.
Researchers from various fields collaborate to achieve the ambitious vision of smart
healthcare, ensuring accurate information and dependable data delivery. At the heart of
this integration is the application layer, serving as the conduit between caregivers,
caretakers, sensor devices, and the entire system ecosystem. Context-aware healthcare
applications are crucial for delivering high-quality healthcare services and will play an
increasingly vital role.
6 Remote Monitoring: Remote monitoring is a primary advantage of pervasive
healthcare systems, enabling real-time monitoring of patients during their daily lives. This
capability allows healthcare professionals to promptly identify emergency conditions in
at-risk individuals. Additionally, individuals with varying degrees of cognitive and
physical disabilities gain greater independence.
7 Child and Baby Care: WSNs enhance child and baby care by providing a more secure
environment even when parents are away. These systems alleviate the dependence on
specialized caregivers.
1. Prototypes and Commercial Products: Both prototypes and commercially available
products contribute to the advancement of WSN-based healthcare solutions.
2. Shared charactersticks: Numerous current applications exhibit similar attributes.
Typically, patients utilize one or more sensor types, establishing a Body Area
Network (BAN). Concurrently, environmental sensors form a Personal Area Network
(PAN). These networks link to a central network through a gateway node.
8 Real time monitoring : Healthcare providers and caregivers have immediate access to
essential health data through graphical user interfaces (GUIs). The application generates
alerts for emergency situations, and this crucial information is accessible through mobile
devices like laptops, Personal Digital Assistants (PDAs), and smartphones.
CHAPTER 2
LITERATURE REVIEW
CHAPTER 2
LITRATURE REVIEW
Sunil Kumar Singh, Prabhat Kumar,Jyoti Prakash et.al (2007) propossed a survey
on successor of leach protocol authored by Singh provides a comprehensive and
insightful literature review on the Low Energy Adaptive Clustering Hierarchy (LEACH)
protocol and its successors in the domain of wireless sensor networks (WSN). The
authors highlight the enduring significance of LEACH, even 16 years after its
Fan Xiangning Song Yulin et.al (2007) propossed The Improvement on LEACH Protocol
of Wireless Sensor Network by and investigates the enhancement of the Low-Energy
Optimizing Efficiency and Performance in Wireless Sensor Networks Page 15
CHAPTER 2: LITERATURE REVIEW
Adaptive Clustering Hierarchy (LEACH) protocol within wireless sensor networks (WSN).
The paper introduces two innovative protocols, namely Energy-LEACH and Multihop-
LEACH, with the objective of refining the energy efficiency and communication capabilities
inherent in the traditional LEACH protocol.
Energy-LEACH concentrates on improving the selection process of cluster heads by
introducing an enhanced method. It prioritizes nodes with higher residual energy, designating
them as cluster heads in the subsequent round. This adjustment is geared towards extending
the overall lifespan of the network by strategically selecting cluster heads based on their
energy reserves.
Mu Minghao Tang-B et.al (2010) introduces an innovative protocol named LEACH-B
(LEACH-Balanced), aiming to address shortcomings identified in the Low-Energy Adaptive
Clustering Hierarchy (LEACH) protocol. The study, conducted at the College of Information
Science and Technology, Donghua University, Shanghai, China, identifies specific
deficiencies in LEACH, such as the fluctuation in the number of cluster heads and the
oversight of node residual energy.
LEACH-B incorporates a novel approach to overcome these limitations. After the initial
selection of cluster heads following the LEACH protocol, a second selection process is
introduced in each round. This secondary selection aims to adjust the number of cluster
heads, considering the residual energy of nodes. Consequently, the modified protocol
maintains a constant and near-optimal number of cluster heads per round, addressing the
observed fluctuations and improving the protocol's overall effectiveness.
The simulation, implemented using MATLAB, demonstrates that LEACH-B successfully
balances system energy consumption and exhibits superior performance in prolonging the
network lifetime compared to the original LEACH protocol.
TWu Xinhua; Wang Sheng et.al(2010) they proposed the study focuses on the performance
comparison of the LEACH (Low-Energy Adaptive Clustering Hierarchy) and LEACH-C
protocols using NS2 (Network Simulator 2). The primary objective is to analyze how the
performance of these routing protocols varies concerning the locations of the sink nodes. To
provide a more precise characterization of this variation, the research introduces two novel
concepts: Sensor Node Distribution Gravity and Distance Metric between the sink and
Gravity. These concepts aim to enhance the understanding of the regularity in the
performance changes of LEACH and LEACH-C.
The use of NS2 for performance evaluation underscores the significance of simulation tools
in assessing and comparing routing protocols in a controlled environment. NS2 provides a
platform for researchers to study the behavior of protocols under various conditions,
facilitating the identification of key parameters affecting their performance.
The proposed concepts, Sensor Node Distribution Gravity and Distance Metric between sink
and Gravity, contribute to the methodological framework for evaluating and understanding
the performance characteristics of LEACH and LEACH-C. By introducing these concepts,
the research aims to provide a more nuanced and insightful perspective on the factors
influencing the selection of routing protocols based on sink node locations.
ia Xu, Ning Jin, Xizhong Lou, Ting Peng, Qian Zhou, and Yanmin et.al (2012) addresses
the critical issue of limited power resources in wireless sensor networks (WSNs) by
proposing an improved version of the Low-Energy Adaptive Clustering Hierarchy (LEACH)
protocol, referred to as E-LEACH. This literature review aims to explore the context of
energy consumption in WSNs, the significance of hierarchical routing protocols, and the
contributions made by the E-LEACH algorithm.
A. Rajandekar and B. Sikdar et.al(2015), published in the IEEE Internet of Things Journal
(vol. 2, no. 2, pp. 175–186), investigates Medium Access Control (MAC) layer issues and
protocols in Machine-to-Machine (M2M) communications. Focusing on challenges unique to
M2M, such as scalability and resource constraints, the review evaluates existing MAC layer
protocols, emphasizing their strengths, weaknesses, and energy efficiency considerations. It
explores the trade-offs between latency and throughput and likely discusses emerging trends
for future MAC layer designs in M2M communication. This survey provides valuable
insights for researchers and practitioners in the field.
窗体底端
T. Zheng, M. Gidlund, and J. Åkerberg et.al(2016) The paper "WirArb: A New MAC
Protocol for Time-Critical Industrial Wireless Sensor Network Applications" by
published in the IEEE Sensors Journal, introduces WirArb, a specialized Medium
Access Control (MAC) protocol tailored for time-critical operations in industrial
wireless sensor networks (WSNs). WirArb addresses the challenges of real-time
communication in industrial settings, offering enhanced efficiency and reliability. The
literature review emphasizes the protocol's unique features, performance evaluation,
and its significance in advancing industrial automation and the Industrial Internet of
Things (IIoT). The authors position WirArb as a promising solution for meeting the
stringent requirements of time-sensitive applications in industrial WSNs.
its advantages. The authors may provide simulation results or analytical assessments
demonstrating NEECP's effectiveness. The review concludes by suggesting future research
directions and practical implications of NEECP in diverse WSN scenarios, contributing
valuable insights to the field.
CHAPTER 3
METHODOLOGY
CHAPTER 3
METHODOLOGY
Area Dimensions: The field dimensions denote the spatial extent of the wireless sensor
network (WSN) deployment. In this simulation, the field takes the form of a square with
dimensions xm×ym meters. • Sink Location: The sink coordinates, representing the central
point or base station for data aggregation, are fixed at 0.5×xm, 0.5×ym.
• Node Count (n): The simulation incorporates n nodes, distributed randomly across the
field. Nodes serve as integral components within the WSN.
• Election Probability (p): The optimal election probability (p) governs the likelihood of a
node assuming the role of a cluster head in each round, thereby influencing the dynamic
clustering process.
3.3.Energy Modeling:
• Initial Energy (Eo): The initial energy level (Eo) designates the starting energy for each
node within the network.
• Transmit and Receive Energy (ETX, ERX): These parameters (ETX, ERX) quantify the
energy consumption during the transmission and reception of data.
• Transmit Amplifier Characteristics (EFS, Emp): These parameters (EFS, Emp) indicate
the energy consumption associated with various types of transmit amplifiers. • Data
Aggregation Energy (EDA): The data aggregation energy (EDA) represents the energy
utilized during the aggregation of data at cluster heads.
.
Alpha (α): The parameter α defines the degree of heterogeneity in the network. It
could represent the variation in initial energy levels, transmission power, or other
characteristics among nodes.
Random Election of Node Types: The simulation randomly elects nodes as either
normal or advanced based on the specified percentage (m) of advanced nodes.
Differential Initial Energy: Advanced nodes may start with different initial energy
levels compared to normal nodes, introducing energy heterogeneity.
Impact on Clustering: The presence of advanced nodes can influence the clustering
process, as they may have different probabilities of becoming cluster heads.
Heterogeneity introduces diversity into the network, allowing for more realistic modeling of
sensor nodes with varying capabilities and energy constraints. It is a crucial factor in
understanding the performance and robustness of the wireless sensor network in different
scenarios.
CHAPTER 4
PROPOSED WORK
CHAPTER 4
PROPOSED WORK
1. Energy Efficiency:
Energy Model Parameters: Evaluate and fine-tune the parameters affecting
energy consumption, such as 0E0, ETX,ERX, EFS, Emp, and EDA.
Communication Range (do): Comprehend the effects of the communication
range on energy consumption and fine-tune it to enhance communication
efficiency.
Energy Dissipation Calculation: Develop criteria to optimize energy
dissipation during communication based on distance and amplifier types.
2. Cluster Head Election:
Probabilistic Model (p): Analyze the probabilistic model for cluster head
election and suggest adjustments for optimal p considering factors like energy
levels and proximity to the sink.
Load Balancing: Consider load balancing strategies to ensure a fair
distribution of cluster heads, preventing early exhaustion of specific nodes.
3. Adaptability to Heterogeneity:
Node Types (Advanced Nodes): Develop criteria to adapt routing protocols
to heterogeneous node characteristics, particularly advanced nodes.
Energy-Aware Routing for Different Nodes: Propose modifications to
routing algorithms to consider the varying energy characteristics of different
node types.
3. Cross-Layer Optimization:
Information Integration: Develop algorithms that integrate information from
multiple protocol layers, such as combining physical layer details with routing
decisions.
Joint Optimization: Propose protocols that jointly optimize decisions across
layers for improved network performance, addressing challenges like
interference, energy consumption, and data routing.
CHAPTER 5
CHAPTER 5
1. Parameter Initialization:
The code begins by initializing various parameters crucial for the simulation.
This includes defining the field dimensions (xm and yym), sink coordinates
(sink.x and sink.y), the number of nodes in the network (n), the optimal
election probability for a node to become a cluster head (p), and several
energy model parameters such as initial energy (Eo) and energy
consumption rates for transmission and reception (ETX and ERX).
3. First Iteration:
The simulation starts with the first round ( r = 0). Nodes are assigned initial
energy, and the process of energy consumption and node clustering
begins.
Normal nodes decide which cluster head to associate with based on the
minimum distance to available cluster heads. The energy dissipated during
data transmission to the selected cluster head is calculated.
6. Energy Update:
The energy of nodes is updated based on the distance to the sink and the
type of transmission (direct to sink or through a cluster head).
7. Statistics Collection:
Statistics are collected for each round, including the number of dead nodes,
number of dead advanced nodes, number of dead normal nodes, and the
number of cluster heads. 1;
8. Graphical Representation:
The code includes plotting commands to visualize the network, alive nodes,
and various statistics over the rounds. However, there are some missing or
incorrect plotting commands in the provided code.
9. Termination Condition:
10. Output:
The code outputs statistics such as the number of dead nodes, number of
dead advanced nodes, number of dead normal nodes, number of cluster
heads, and other relevant information for each round.
As in this previous graph shows the performance of the basic leach protocol as it shows the
first node is decaying at x=519 and y=99 the performance here is not upto the mark
In the latest leach protocol model implemented by us the first node decay was at x=1367 and
y=99 so here we have increased the stability period by 23 times and first the half node were
decaying at x=841 and y=50 but in the latest implementation the first half node decay was
proposed at x=2431 and y=56 here the stability period was improved by 300 percent
CHAPTER 6
CONCLUSION AND FUTURE SCOPE
CHAPTER 6
CONCLUSION AND FUTURE SCOPE
REFERENCES
REFERENCES
.
[1] In the proceedings of the Fifth Annual International Conference on Mobile Computing
and Networking (MOBICOM) held in Seattle, WA, USA, in August 1999, Rabiner, W.;
Kulik, J.; Balakrishnan, H. presented a paper titled "Adaptive Protocols for Information
Dissemination in Wireless Sensor Networks" (pp. 174–185).
.
.
[2] W. R. Heinzelman's Ph.D. thesis, completed in 2000 at the Massachusetts Institute of
Technology, focuses on "Application-Specific Protocol Architectures for Wireless
Networks."
.
.
[3] Ossama Younis and Sonia Fahmy proposed a "Distributed Clustering in Ad-hoc Sensor
Networks: A Hybrid, Energy-efficient Approach" in September 2002. Their subsequent work,
titled "Heed: A hybrid, Energy-efficient, Distributed Clustering Approach for Ad-hoc
Networks," was published in IEEE Transactions on Mobile Computing (vol. 3, no. 4, Oct.-
Dec. 2004, pp. 366-369).
.
.
[4] A. Manjeshwar and D. P. Agrawal introduced "TEEN: A Protocol for Enhanced
Efficiency in Wireless Sensor Networks" during the 1st International Workshop on Parallel
and Distributed Computing Issues in Wireless Networks and Mobile Computing in San
Francisco, CA, in April 2001.
.
.
[5] S. Lindsey and C.S. Raghavendra presented "PEGASIS: Power-efficient Gathering in
Sensor Information System" at the IEEE Aerospace Conference in Big Sky, MT, in March
2002 (vol. 3, pp. 1125-1130).
.
.
[6] H. Taheri, P. Neamatollahi, O.M. Younis, S. Naghibzadeh, and M.H. Yaghmaee proposed
an energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic
in Ad Hoc Networks (vol. 10, no. 7, 2012, pp. 1469-1481).
.
.
[7] R. Devika, B. Santhi, and T. Sivasubramanian conducted a survey on routing protocols in
wireless sensor networks in the IJET (vol. 5, no. 1, 2013, pp. 350-356).
.
.
[8] H. Lin, P. Chen, and L. Wang introduced "Fan-shaped clustering for large-scale sensor
networks" at the 2014 Int. Conf. Cyber-Enabled Distrib. Comput. Knowl. Discov. CyberC
(2014, pp. 361-364).
.
.
[9] S. Chand, R. Kumar, B. Kumar, S. Singh, and A. Malik proposed "NEECP: novel energy-
efficient clustering protocol for prolonging the lifetime of WSNs" in IET Wirel. Sens. Syst.
(vol. 6, no. 5, 2016, pp. 151-157).
.
.
[10] S. Arjunan and S. Pothula conducted a survey on unequal clustering protocols in
Wireless Sensor Networks in the J. King Saud Univ. - Comput. Inf. Sci. (2016).
.
.
[11] Jing Sun, Zhongxiao Wang, Hong Wang, and Xiaofen Zhang presented "Research on
Routing Protocols Based on ZigBee Network" at the IEEE Third International Conference on
Intelligent Information Hiding and Multimedia Signal Processing in November 2007 (pp.
639–642).
.
.
[12] Ran Peng, Sun Mao-heng, and Zou You-min proposed a "ZigBee Routing Selection
Strategy Based on Data Services and Energy-balanced ZigBee Routing" at the IEEE Asia-
Pacific Conference on Services Computing in December 2006 (pp. 400–404).
.
.
[13] Jianpo Li, Xuning Zhu, Ning Tang, and Jisheng Sui conducted a study on "ZigBee
Network Architecture and Routing Algorithm" at the 2nd International Conference on Signal
Processing Systems in July 2010 (pp. 389-392).
.
.
[14] Mohamed Kasraoui, Adnane Cabani, and Joseph Mouzna worked on the "Improvement
of Zigbee Routing Protocol," presented at the IEEE International Conference on Green
Computing and Communications in November 2012 (pp. 788-793).
.
.
[15] Kwang Koog Lee, Seong Hoon Kim, Yong Soon Choi, and Hong Seong Park introduced
"A Mesh Routing Protocol using Cluster Label in the ZigBee Network" at the IEEE
International Conference on Mobile Adhoc and Sensor Systems in October 2006 (pp. 801-
806).
.
.
[16] C. C. Enz, A. El-Hoiydi, J.-D. Decotignie, and V. Peiris presented "WiseNET: an
ultralow-power wireless sensor network solution" in the journal Computer (vol. 37, no. 8,
2004, pp. 62–70).
.
.
[17] W. Sun, Z. Yang, X. Zhang, and Y. Liu conducted a survey on "Energy-efficient
neighbor discovery in mobile Ad Hoc and wireless sensor networks" published in IEEE
Communications Surveys and Tutorials (vol. 16, no. 3, 2014, pp. 1448–1459).
.
.
[18] A. Rajandekar and B. Sikdar surveyed MAC layer issues and protocols for machine-to-
machine communications in the IEEE Internet of Things Journal (vol. 2, no. 2, 2015, pp.
175–186).
.
.
[19] T. Zheng, M. Gidlund, and J. Åkerberg proposed "WirArb: a new MAC protocol for
time-critical industrial wireless sensor network applications" in the IEEE Sensors Journal
(vol. 16, no. 7, 2016, pp. 2127–2139).
.
.
[20] G. Dai, C. Miao, K. Ying, K. Wang, and Q. Chen introduced "An energy-efficient MAC
protocol for linear WSNs" in the Chinese Journal of Electronics (vol. 24, no. 4, 2015, pp.
725–728).
.
.
[22] Yong Wang, Garhan Attebury, and Byrav Ramamurthy conducted a survey on "Security
Issues In Wireless Sensor Networks" published in the IEEE Communications Surveys &
Tutorials (2nd Quarter, 2006, pp. 223-237).
.
.
[23] Al-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon Hong addressed "Security in
Wireless Sensor Networks: Issues and Challenges" at ICACT 2006, with ISBN 89-5519-129-
4, on pages 25-32.
.
.
[24] Pallavi Jindal, Vikas Gupta, conducted a study on "Energy Efficient Routing Protocols
of Wireless Sensor Networks and their further researches: a Survey" published in IJCSCE
(vol. 2, 2013, ISSN 2319-7080, pp. 57-62).
.
.
[25] B.V. Manikyala Rao, S. Pallam Setty, and G. Lavanya Devi explored "Energy Efficient
Routing Protocols in Wireless Sensor Networks" published in IJCC (vol. 2, 2013, ISSN 2319
– 8869, pp. 16-23).