Load-Balanced Topology Rebuilding for Disconnected Wireless Sensor Networks With Delay Constraint

Song Yin, Mohammad S. Obaidat, Xuxun Liu, Huan Zhou, Anfeng Liu

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

In inhospitable environments, connectivity recovery plays a significant role in enabling normal data transmission in wireless sensor networks (WSNs). However, existing approaches lack thorough load-balancing and delay-control functions. In this article, we present a load-balanced connectivity recovery (LBCR) strategy to address these problems. This strategy consists of two relay-segment selection approaches. The first one is the delay-controlled connectivity mechanism, in which mobile relays and static relays are employed to connect isolated segments, and the path length of the two kinds of relays is adjusted based on the requirement of data delivery delay. The second one is the load-balanced connectivity mechanism, in which both the intra-segment and the inter-segment traffic distribution are evaluated to balance the traffic load. For intra-segment load equilibrium, we use the A-Star algorithm to calculate the number of disjoint paths of a relay segment, which helps to evaluate the load sharing ability from a micro perspective. For inter-segment load equilibrium, we compare the traffic load of different paths, which helps to evaluate the load sharing ability from a macroscopic angle. Extensive simulations demonstrate the effectiveness and advantage of our strategy in terms of connectivity cost, data collection delay, and system lifespan.

Original languageEnglish
Pages (from-to)899-909
Number of pages11
JournalIEEE Transactions on Sustainable Computing
Volume7
Issue number4
DOIs
StatePublished - 1 Oct 2022
Externally publishedYes

Keywords

  • A-Star algorithm
  • connectivity restoration
  • delay control
  • load balancing
  • Wireless sensor network

Fingerprint

Dive into the research topics of 'Load-Balanced Topology Rebuilding for Disconnected Wireless Sensor Networks With Delay Constraint'. Together they form a unique fingerprint.

Cite this