Title :
A sensor deployment optimization model of the wireless sensor networks under retransmission
Author :
Xiaoxi Liu ; Ruiying Li ; Ning Huang
Author_Institution :
Sch. of Reliability & Syst. Eng., Beihang Univ., Beijing, China
Abstract :
Wireless sensor networks (WSN) are widely applied in the supervisory control of the agriculture, biology, transportation, military and many other fields. An excellent node deployment strategy can largely reduce the energy consumption and optimize the lifetime of WSN. In this paper, a new node deployment model based on regular hexagon grids is proposed for a homogeneous flat WSN. Both the data transmission and energy consumption of each sensor in a data gathering cycle are analyzed based on energy consumption models, a routing algorithm, a retransmission model and a sleep/wakeup mechanism. Two optimization models for uniform and non-uniform sensor deployment schemes are proposed to minimize the energy consumption under the constraints of connectivity and coverage requirements. The results of our case studies show that when retransmission is considered, there are much less nodes and initial energy needed in the deployment of the WSN.
Keywords :
SCADA systems; data communication; energy consumption; sensor placement; telecommunication network routing; telecommunication power management; wireless sensor networks; WSN; agriculture; biology; data gathering cycle; data transmission; energy consumption; hexagon grids; military; retransmission model; routing algorithm; sensor deployment optimization model; sleep mechanism; supervisory control; transportation; wakeup mechanism; wireless sensor networks under retransmission; Base stations; Data communication; Energy consumption; Modeling; Optimization; Sensors; Wireless sensor networks; Deployment; Energy; Optimization model; Retransmission; Wireless sensor networks;
Conference_Titel :
Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2014 IEEE 4th Annual International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-1-4799-3668-7
DOI :
10.1109/CYBER.2014.6917499