An enhanced cross-layer protocol for energy efficiency in wireless sensor networks

Jaehyun Kim, Jaiyong Lee, Seoggyu Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Abstract

In wireless sensor networks, the simplified and energy efficient protocol should be designed in order to maximize the network lifetime because of its stringent resource constraints, ultra power limitation, and tiny embedded devices. In this paper, we propose an enhanced cross-layer protocol for energy efficiency in wireless sensor networks by integrating medium access control and routing protocol. Our proposed protocol utilizes a synchronous medium access control scheme by using the adaptive duty cycling technique to improve energy efficiency and solve long end-to-end delay problem. We also design a tree-based energy aware routing algorithm to prolong the network lifetime in our protocol. Simulation results show that the proposed protocol outperforms other existing algorithms in terms of energy efficiency and latency.

Original languageEnglish
Title of host publicationProceedings - 2009 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM 2009
Pages657-664
Number of pages8
DOIs
Publication statusPublished - 2009
Event2009 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM 2009 - Athens, Glyfada, Greece
Duration: 2009 Jun 182009 Jun 23

Publication series

NameProceedings - 2009 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM 2009

Other

Other2009 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM 2009
Country/TerritoryGreece
CityAthens, Glyfada
Period09/6/1809/6/23

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'An enhanced cross-layer protocol for energy efficiency in wireless sensor networks'. Together they form a unique fingerprint.

Cite this