An Efficient Mobile Charger Based Scheduling for Design of Mobility-based Algorithms for Wireless Sensor Networks
Keywords:
WSN, SN, MC, CH, WET, WDWWOAbstract
Mobility in sensor nodes, targets, base stations, or charging vehicles can increase performance in a resource-constrained wireless sensor network (WSN) in terms of the energy economy, minimizing the latency with a longer lifespan, and increasing throughput. It is suggested to use mobile charger scheduling algorithms to recharge the SNs. According to the network scale, single and multiple mobile charger scheduling techniques are suggested in this context. When a new or developing request is received, the charging activity is interrupted when a single MC uses pre-emptive scheduling of the MC. This strategy increases the length of the mobile charger's journey path while maximizing its utility. Unfortunately, a single charger is unable to fulfil the needs of a big network, hence several chargers are required. As a result, multiple mobile charger scheduling for WSNs that is delay-tolerant is also suggested. This clustering algorithm groups the sensors into equal-sized clusters using a new K-medoid structure. The cluster head (CH) is then chosen using the WDWWO (Wind Driven Water Wave Optimization) algorithm, which considers both the distance to the cluster's midway position and the remaining energy. The mobile charger has a WET that may traverse the network either on demand or along a predetermined path to recharge the SNs. One or more chargers are utilized to recharge the SNs depending on the size of the WSNs. To validate the efficacy of the projected strategy, the performance of the projected algorithms is compared to that of a number of already-existing algorithms. From this, we can conclude that our suggested method achieves better charging scheduling to charge the lifetime important sensors than the current works based on the simulation results.
Downloads
References
K. Cho and Y. Cho, “Hyperledger fabric-based proactive defense against inside attackers in the WSN with trust mechanism,” Electronics, vol. 9, no. 10, p. 1659, 2020.
M. N. U. Islam, A. Fahmin, M. S. Hossain, and M. Atiquzzaman, “Denial-of-service attack on wireless sensor network and defense techniques,” Wireless Personal Communications, vol. 116, no. 3, pp. 1993–2021, 2021.
M. Chandrakala, G. Dhanalakshmi, and K. Rajesh, “Iot-based autonomous energy-efficient WSN platform for home/office automation using raspberry pi,” in Computer Networks and Inventive Communication Technologies. Springer, 2022, pp. 399–411.
M. A. Y. Yamin and B. A. Alyoubi, “Adoption of telemedicine applications among Saudi citizens during covid-19 pandemic: An alternative health delivery system,” Journal of Infection and Public Health, vol. 13, no. 12, pp. 1845–1855, 2020.
Y. Zhang, L. Sun, H. Song, and X. Cao, “Ubiquitous WSN for Healthcare: Recent advances and future prospects,” IEEE Internet of Things Journal, vol. 1, no. 4, pp. 311–318, 2014.
K. F. Hasan, C. Wang, Y. Feng, and Y.-C. Tian, “Time synchronization in vehicular ad-hoc networks: A survey on theory and practice,” Vehicular communications, vol. 14, pp. 39–51, 2018.
S. Yu, J. Lee, K. Lee, K. Park, and Y. Park, “Secure authentication protocol for wireless sensor networks in vehicular communications,” Sensors, vol. 18, no. 10, p. 3191, 2018.
Sangare F, Xiao Y, Niyato D, Han Z (2017) Mobile charging in wireless-powered sensor networks: optimal scheduling and experimental implementation. IEEE Trans Veh Technol 66(8):7400–7410
He L, Gu Y, Pan J, Zhu T (2013) On-demand charging in wireless sensor networks: theories and applications. In: Proceedings—IEEE 10th international conference on mobile ad-hoc and sensor systems, pp 28–36
Tu W, Xu X, Ye T, Cheng Z (2017) A study on wireless charging for prolonging the lifetime of wireless sensor networks. Sensors (Switzerland) 17(7):1560
Wang X, Zheng R, Jing T, Xing K (2012) Wireless algorithms, systems, and applications, vol 7405. Springer, Berlin
Khelladi L, Djenouri D, Rossi M, Badache N (2017) Efficient on-demand multi-node charging techniques for wireless sensor networks. Comput Commun 101:44–56
Aoudia FA, Gautier M, Berder O (2018) RLMan: an energy manager based on reinforcement learning for energy harvesting wireless sensor networks. IEEE Trans Green Commun Netw 2:408–417
M. Elhoseny, A. Tharwat, X. Yuan, and A. E. Hassanien, “Optimizing k-coverage of mobile WSNs,” Expert Systems with Applications, vol. 92, pp. 142–153, 2018.
L. Chelouah, F. Semchedine, and L. Bouallouche-Medjkoune, “Localization protocols for mobile wireless sensor networks: A survey,” Computers & Electrical Engineering, vol. 71, pp. 733–751, 2018.
V. Ramasamy, “Mobile wireless sensor networks: An overview,” Wireless Sensor Networks—Insights and Innovations, 2017.
R. N. Tripathi, K. Gaurav, and Y. N. Singh, “On partial coverage and connectivity relationship in deterministic WSN topologies,” arXiv preprint arXiv:1909.00760, 2019.
A. Tripathi, H. P. Gupta, T. Dutta, R. Mishra, K. K. Shukla, and S. Jit, “Coverage and connectivity in WSNs: A survey, research issues and challenges,” IEEE Access, vol. 6, pp. 26 971–26 992, 2018.
Y. Gu, Y. Ji, J. Li, and B. Zhao, “Eswc: Efficient scheduling for the mobile sink in wireless sensor networks with delay constraint,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 7, pp. 1310–1320, 2012.
N. Sharmin, A. Karmaker, W. L. Lambert, M. S. Alam, and M. Shawkat, “Minimizing the energy hole problem in wireless sensor networks: a wedge merging approach,” Sensors, vol. 20, no. 1, p. 277, 2020.
X. Zhao, X. Xiong, Z. Sun, X. Zhang, and Z. Sun, “An immune clone selection based power control strategy for alleviating energy hole problems in wireless sensor networks,” Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 6, pp. 2505–2518, 2020.
T. M. Behera and S. K. Mohapatra, “A novel scheme for mitigation of energy hole problem in wireless sensor network for military application,” International Journal of Communication Systems, p. e4886, 2021.
A. Kamble and B. Patil, “Systematic analysis and review of path optimization techniques in WSN with mobile sink,” Computer Science Review, vol. 41, p. 100412, 2021.
G. Gutam, P. K. Donta, C. S. R. Annavarapu, and Y.-C. Hu, “Optimal rendezvous points selection and mobile sink trajectory construction for data collection in WSNs,” Journal of Ambient Intelligence and Humanized Computing, pp. 1–12, 2021.
P. Gupta, S. Tripathi, and S. Singh, “Energy efficient rendezvous points based routing technique using multiple mobile sink in heterogeneous wireless sensor networks,” Wireless Networks, vol. 27, no. 6, pp. 3733–3746, 2021.
Anthony Thompson, Anthony Walker, Luis Pérez , Luis Gonzalez, Andrés González. Machine Learning-based Recommender Systems for Educational Resources. Kuwait Journal of Machine Learning, 2(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/181
Muhammad Khan, Machine Learning for Predictive Maintenance in Manufacturing: A Case Study , Machine Learning Applications Conference Proceedings, Vol 1 2021.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.