Two ranked aware phase surveillance in wireless sensor networks

Chuang Jung Chen, Gen Huey Chen, Eric Hsiao Kuang Wu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Event detection and environment surveillance are the important issues in wireless sensor networks. However, using the non-renewable power source leads to the short lifetime of the networks. For this reason the scheduling process is to determine the time sensor node wakes up and goes sleeping to conserve energy, so the delay time and the working interval would become trade-off. In this article, we introduce the two ranked aware phase surveillance to lower the delay time, and we use the sensed data to make the scheduling policy. We consider the event happening in two phase, so we propose two surveillance models to cope with these two phases, although this model is simple to create it can achieve the goal of reducing the delay time of detection and delivery. Finally, we show our performance in the simulation section and then describe the improvement of our approach in the future work section.

Original languageEnglish
Title of host publicationProceedings - 2009 10th International Conference on Mobile Data Management
Subtitle of host publicationSystems, Services and Middleware, MDM 2009
Pages411-416
Number of pages6
DOIs
StatePublished - 2009
Event2009 10th International Conference on Mobile Data Management: Systems, Services and Middleware, MDM 2009 - Taipei, Taiwan
Duration: 18 May 200920 May 2009

Publication series

NameProceedings - IEEE International Conference on Mobile Data Management
ISSN (Print)1551-6245

Conference

Conference2009 10th International Conference on Mobile Data Management: Systems, Services and Middleware, MDM 2009
Country/TerritoryTaiwan
CityTaipei
Period18/05/0920/05/09

Keywords

  • Detection
  • Sensor networks
  • Surveallance
  • Two phase

Fingerprint

Dive into the research topics of 'Two ranked aware phase surveillance in wireless sensor networks'. Together they form a unique fingerprint.

Cite this