A path energy control technique for energy efficiency on wireless sensor networks

F. Tubiello, L. Poehls, T. Webber, C. Marcon, F. Vargas

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Wireless Sensor Networks (WSNs) are being deployed in a wide range of application areas requiring high energetic efficiency to increase the application lifetime. Trading off power optimization and reliability has become one of the most significant concerns when dealing with modern systems based on WSNs to guarantee all nodes receive the transmitted data. This work presents a Path Energy Control Technique (PECT), which sets the transmission power of each node based on the path energy consumption. This setting blends three metrics: (i) Quality of the Path (QPth), (ii) Received Signal Strength Indicator (RSSI), and (iii) Data Packet Rate (DPR). Experimental results prove the efficacy of PECT in reducing the energy consumption up to 42% when compared to experiments with fixed transmission power, preserving the reliability of the data transmission.

Original languageEnglish
Title of host publication9th IEEE Latin American Symposium on Circuits and Systems, LASCAS 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-4
Number of pages4
ISBN (Electronic)9781538623114
ISBN (Print)9781538623121
DOIs
Publication statusPublished - 2 Jul 2018
Event9th IEEE Latin American Symposium on Circuits and Systems, LASCAS 2018 - Puerto Vallarta, Mexico
Duration: 25 Feb 201828 Feb 2018

Publication series

NameIEEE Latin American Symposium on Circuits and Systems, LASCAS - Proceedings
ISSN (Print)2330-9954
ISSN (Electronic)2473-4667

Conference

Conference9th IEEE Latin American Symposium on Circuits and Systems, LASCAS 2018
Country/TerritoryMexico
CityPuerto Vallarta
Period25/02/1828/02/18

Keywords

  • Energy efficiency
  • Transmission power
  • WSN

Fingerprint

Dive into the research topics of 'A path energy control technique for energy efficiency on wireless sensor networks'. Together they form a unique fingerprint.

Cite this