S. Anandamurugan

Learn More
Target tracking sensor networks monitor and track the movement of a target object. Power management in these sensor networks is crucial to prolong the network lifetime. We propose a new protocol PMM (Power Management Method for tracking sensor networks) that provides a dynamic sleep schedule for the radios such that maximum power is saved without affecting(More)
An ad hoc routing protocol is a pattern, or standard, that controls to route packets between mobile devices in a mobile ad hoc network. A new node announces its presence and listens for announcements broadcast by its neighbours. To communicate one node to another one, each node can act as both host as well as router at the same time and perform all the(More)
Wireless sensor network generate hotspots because of heavy traffic load at certain locations. Nodes in hotspots lose energy resources quickly and disrupt network services. The Cluster head (CH) gets more burdens in gathering and relaying information. Relay load on CH gets increased as distance to sink decrease. CH role is articulated across all nodes to(More)
Fast growth of wireless services in recent years is an indication that considerable value is placed on wireless networks. Wireless devices have most utility when they can be used anywhere at any time. One of the greatest challenges is limited energy supplies. Therefore, energy management is one of the most challenging problems in wireless networks. In(More)
—A model to identify the lifetime of target tracking wireless sensor network is proposed. The model is a static cluster-based architecture and aims to provide two factors. First, it is to increase the lifetime of target tracking wireless sensor network. Secondly, it is to enable good localization result with low energy consumption for each sensor in the(More)
—In this paper, Wireless sensor networks place sensors into an area to get data and send them back to a base station. Data fusion, in which collected data are fused before they are sent to the base station, is usually implemented over the network. Since a sensor is typically placed in locations that are accessible to malicious attackers, information(More)
  • 1