A Novel Algorithm for Reducing Energy Consumption in WSN and RFID Integrated Networks
Downloads
Wireless sensor networks (WSN) and radio frequency identification (RFID) are base technologies employed in decentralized dynamic environments. In the hybrid network that is induced by integrating RFID and WSN, RFID data can be used by applying WSN protocols for multi-hop communications. RFID data, however, includes a significant amount of duplicate information, which lengthens response time and consumes more energy, wasting a variety of resources. The hierarchical RFID-sensor topology, network RFID-sensor topology, reader-sensor nodes topology, and mixed topology are the four most commonly used RFID-WSN integration architectures. In this article, a novel plan for a WSN–RFID integrated network was proposed. The entire network is divided into clusters, and the Huffman algorithm is used to reduce energy consumption in sending information to the base station. Further, we propose two algorithms to overcome the redundancy of the data on the hybrid network. Our simulation findings demonstrate that the studied method decreases redundant data, energy consumption, and processing duration in comparison with existing methods.
Yarinezhad, R., 2019.” Reducing delay and prolonging the lifetime of the wireless sensor network using efficient routing protocol based on mobile sink and virtual infrastructure.” Ad Hoc Netw. 84, 42–55.
Yetgin, H., Cheung, K.T.K., El-Hajjar, M., Hanzo, L.H., 2017. “A survey of network life- time maximization techniques in wireless sensor networks. “ IEEE Commun. Surv. Tutor. 19 (2), 828–854.
Jain, S., 2019. MLBC:” multi-objective Load Balancing Clustering technique in Wireless Sensor Networks. “ Appl. Soft Comput. 74, 66–89.
Das, R., and Harrop, 2014-2024 , RFID forecasts, players and opportunities
Fei Yuan et al, 2014, “Data density correlation degree clustering method for data aggregation in WSN”, IEEE sensors journal, vol 14,April 2014
Ashwini w. Nagpukar. Siddhant k. Jaiawal, 2015, 'An Overliew of WSN and RFID Network Integration", IEEE S Spnsored Second Internal Conferee On Electronics and Communication Systems(leecs 2015).
Ganjar Alfian et al, 2017,”Integration of RFID, wireless sensor network, and data mining in an e-pedigree food traceability system”, journal of food engineering 212(2017) 65-75
Z. Zhao, 2014. “A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem,” Journal of Medical Systems, vol. 38, no. 5, pp. 1–7,
C. Jin, C. Xu, X. Zhang, and J. Zhao, 2015, “A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography,” Journal of Medical Systems, vol. 39, no. 3, pp. 1–8,.
John Wiley & Sons, 2016, RFID and Network Automation in the food industry, published.
Z. Zhang and Q. Qi, 2014. “An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryp- tography,” Journal of Medical Systems, vol. 38, no. 5, pp. 1–7,
Barjesh Kochar and Rajender Chhillar, 2012, “An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques”, The International Arab Journal of Information Technology, Vol. 9, No. 3, May 2012.
Kapoor,G., and Piramuthu, s.(2012) , Single RFID tag ownership transfer protocols. IEEE Transactions on Systems,Man , and Cybernetics-c 42(2), 167-173.
Myo Min Aung, Yoon Seek Chang and Jang-Un Won, 2012,'"Enterging RFID /USN Application and Challenge”,In International Journal of RFID Security and Cryplography (LIRFIDSC),Mar-Dec 2012
Ali Kashif Bashir, Se-Jung Lim , 2011,” Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks”
Sarma, S.E. 2009,Towards the five- cent tag. Technical report MIT.AUTOID- WH-006, MIT Auto-ID Center: New NY , USA 2001. Available online: http://www.autoidcenter. Org/research/MIT-AUTOID-WH-006-pdf(accessed on ganuary)
Choi, W.; Park, M.S. January 2007, In-network Phased Filtering Mechanism for a Large-Scale RFID Inventory Application. In Proceedings of the 4th International Conference on IT & Applications (ICITA), Harbin, China, January 2007; pp. 401-405.
Dong-Sub Kim, Ali Kashif, UIC 2008,” Energy Efficient In-Network Phase RFID Data filtering scheme”
Sundaresan,, S Doss, R., Piramuthu, S.:, and Zhou, W. L. 2014, A robust grouping proof protocol tot RID EP C I di tags. IEEE transactions on information ‘ Forensics and security 9(6), 2014
Li wang Li Da Xu, 2014, Data cleaning for RFID and WSN Integration .IEEE Transactions Vol.10,No 1. Februry 2014.
Zhang, 2009, RFID and Networks AU7777_c018
Sundaresan, St, Doss, R., Piramuthu,S., and Zhou, W. L , (2015) ,Sccurc ownersgip- passivc RFID environment with individnal-owncer privacy. Computer, (2015)
X. Wang, Y. Ji, and B. Zhao, 2014. “An approximate duplicate- elimination in RFID data streams based on d-left time bloom filter,” in Web Technologies and Applications, vol. 8709 of Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp.413–424, Springer, Basel, Switzerland, 2014.
Mahia Samani, 2011, “ A new routing algorithm to reduce consumed energy in wireless sensor”, Third International Conference on Computational Intelligence, Communication Systems and Networks.