A Wireless Sensor Network Route Algorithm for Mine Environment

Article Preview

Abstract:

The routing protocol which can meet the requirement of underground wireless sensor network plays a decisive role in improving the monitoring quality and the survival time of network. Because of the different energy supplement method of anchor nodes and unknown nodes, these two types of nodes are different energy levels, which determines that the task of the data forwarding should be completed by the blind node as far as possible. By combining the position information and cluster routing technology, a position-based cluster routing (PBCR) protocol is proposed. In the protocol the tunnel is divided into a number of regions and the nodes within the region form a cluster. The protocol chooses the blind node nearest to the base station in the region as cluster head and builds up the chain between the cluster heads as the network data transmission backbone which can help achieve the high-speed data transmission. Simulation results show that the PBCR protocol can ensure a balanced use of node energy and prolong the life cycle of the network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

482-487

Citation:

Online since:

November 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] W.R. Heinzelman, A. chandrakasan and H. Balakrishnan: Proceeding of the 33rd Hawaii International Conference on system Sciences (Hawaii, USA, Jan 4-7, 2000) Vol. 1, p.1.

DOI: 10.1109/hicss.2000.926982

Google Scholar

[2] G.Z. Chen, Z.C. Zhu, G. B Zhou, C.F. Shen and Y.J. Sun: Journal of China University of Ming & Technology, Vol. 18(2008), p.0561.

Google Scholar

[3] W. Yang and B. W: Journal of China Coal Society, Vol. 33(2008), p.94.

Google Scholar

[4] M.M. Tong, L.X. Yang, X.W. Liu and X.L. Dai: Chinese Journal of Sensors and Actuators, Vol. 21(2008), p.1892.

Google Scholar

[5] Z.J. Chen, S.J. Jiang and X.J. Chen: Application Research of Computers, Vol. 25(2008), p.3747.

Google Scholar

[6] S. Xiao, X. Y Wei and Y. Wang: Mining Science and Technology, Vol. 20(2010), p.0148.

Google Scholar

[7] J.P. Tian, H.C. Shi, Y.F. Zhou and Y.W. Guo: World Congress on Computer Science and Information Engineering (Los Angeles, CA, March 31 -April 2, 2009) Vol. 1, p.32.

Google Scholar

[8] J. Dong, Q.P. Wang, Z. Yan and K. Wang: International Conference on Networks Security, Wireless Communications and Trusted Computing (Wuhan, China, April 25-26, 2009) Vol. 1, p.568.

Google Scholar

[9] G. Xu, Y. Hu, Y Zhang and Y.L. Liu: Journal of Tianjin University of Science & Technology, Vol. 24(2009), p.58.

Google Scholar

[10] W. R. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan: IEEE Trans. Wireless Communications, Vol. 1(2002), p.660.

Google Scholar

[11] O Younis and S Fahmy: IEEE Trans. on Mobile Computing, Vol. 3(2004), p.366.

Google Scholar

[12] G.B. Zhou, Z.C. Zhu, G.Z. Cheng and L.J. Zhou: Journal of China Coal Society, Vol. 35 (2010), p.333.

Google Scholar