This paper presents an experimental investigation into a new peer-to-peer wireless network architecture for real time telehaptic operation in distributed virtual environments (DVEs). The new peer-to-peer architecture is able to support haptic interactions over different wireless network architecture. Experiments have been conducted to show the performance of different wireless architecture, i. e. wireless-B/G/N. Experiments have also been conducted to investigate the performance of this architecture. Findings of the study are presented in this paper and it shows the challenges in conducting haptic collaboration over wireless IP networks. This is especially true when the wireless hops increase. The wireless channel condition varies over time due to such factors as channel characteristics, the PHY scheme selected, time-varying interference, and channel width for the particular wireless architecture. (6 pages)
{"title":"An experimental study of supporting collaborative haptic interaction in distributed virtual environments over wireless networks","authors":"K. Yap, Hasan A. A. Al-Rawi, Tsung-Han Lee","doi":"10.1049/cp.2012.2089","DOIUrl":"https://doi.org/10.1049/cp.2012.2089","url":null,"abstract":"This paper presents an experimental investigation into a new peer-to-peer wireless network architecture for real time telehaptic operation in distributed virtual environments (DVEs). The new peer-to-peer architecture is able to support haptic interactions over different wireless network architecture. Experiments have been conducted to show the performance of different wireless architecture, i. e. wireless-B/G/N. Experiments have also been conducted to investigate the performance of this architecture. Findings of the study are presented in this paper and it shows the challenges in conducting haptic collaboration over wireless IP networks. This is especially true when the wireless hops increase. The wireless channel condition varies over time due to such factors as channel characteristics, the PHY scheme selected, time-varying interference, and channel width for the particular wireless architecture. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121477883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless mesh networks have been shown to be an appropriate technology for rural areas. However, in most African countries, electricity is scarce in rural areas. A candidate solution to the power-constraint problem in these areas is the use of solar/battery-powered nodes. Different protocols at different layers have varying effects on the energy consumption of the nodes. However, it is not clear how these protocols affect the energy consumption of a battery-powered node in a testbed environment. This paper evaluates the influence of TCP and UDP on the lifetime of battery-powered nodes when subjected to different transmission power levels and payload sizes. An indoor testbed evaluation shows that UDP at maximum transmission power with minimum payload performs best with regards to the node lifetime, TCP at maximum payload with maximum transmission power performs best with regards to packet delivery ratio and throughput and TCP at maximum transmission power with minimum payload consumes the least transmission energy. (6 pages)
{"title":"Evaluating the energy-efficiency of transport layer protocols in a battery-powered wireless mesh networks","authors":"O. Oki, P. Mudali, M. Mutanga, M. Adigun","doi":"10.1049/cp.2012.2081","DOIUrl":"https://doi.org/10.1049/cp.2012.2081","url":null,"abstract":"Wireless mesh networks have been shown to be an appropriate technology for rural areas. However, in most African countries, electricity is scarce in rural areas. A candidate solution to the power-constraint problem in these areas is the use of solar/battery-powered nodes. Different protocols at different layers have varying effects on the energy consumption of the nodes. However, it is not clear how these protocols affect the energy consumption of a battery-powered node in a testbed environment. This paper evaluates the influence of TCP and UDP on the lifetime of battery-powered nodes when subjected to different transmission power levels and payload sizes. An indoor testbed evaluation shows that UDP at maximum transmission power with minimum payload performs best with regards to the node lifetime, TCP at maximum payload with maximum transmission power performs best with regards to packet delivery ratio and throughput and TCP at maximum transmission power with minimum payload consumes the least transmission energy. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125285652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Naeimi, Hamidreza Ghafghazi, Y. Zahedi, S. Ariffin, C. Chow
While security is an important feature in wireless sensor networks, but the energy constraints of sensor nodes should also be considered. In this work, the energy expenditure of such authentication protocol has been investigated respect to TelosB energy consumption behavior. Data Aggregation and Authentication protocol (DAA) integrates false data detection with data aggregation and confidentiality. DAA computes several Message Authentication Codes (MACs) and performs data aggregation along the path. Furthermore, integrity verification is carried out from source to destination. To evaluate precisely the energy efficiency of the scheme in the real world, a test bed implementation of DAA protocol is compared in terms of energy consumption with another authentication protocol. It is shown when the network is under attack and the amount of false data is high, DAA greatly outperforms traditional authentication techniques.
在无线传感器网络中,安全性是一个重要的特征,但同时也要考虑传感器节点的能量约束。在这项工作中,研究了这种认证协议在TelosB能耗行为方面的能量消耗。DAA (Data Aggregation and Authentication protocol)是将虚假数据检测与数据聚合、数据保密相结合的协议。DAA计算多个消息认证码(mac),并沿路径进行数据聚合。此外,从源到目的进行完整性验证。为了准确评估该方案在现实世界中的能源效率,将DAA协议的测试平台实现与另一种认证协议的能耗进行了比较。研究表明,在网络受到攻击、虚假数据量较大的情况下,DAA的性能大大优于传统的身份验证技术。
{"title":"Energy evaluation of data aggregation and authentication protocol (DAA) in wireless sensor networks","authors":"S. Naeimi, Hamidreza Ghafghazi, Y. Zahedi, S. Ariffin, C. Chow","doi":"10.1049/cp.2012.2092","DOIUrl":"https://doi.org/10.1049/cp.2012.2092","url":null,"abstract":"While security is an important feature in wireless sensor networks, but the energy constraints of sensor nodes should also be considered. In this work, the energy expenditure of such authentication protocol has been investigated respect to TelosB energy consumption behavior. Data Aggregation and Authentication protocol (DAA) integrates false data detection with data aggregation and confidentiality. DAA computes several Message Authentication Codes (MACs) and performs data aggregation along the path. Furthermore, integrity verification is carried out from source to destination. To evaluate precisely the energy efficiency of the scheme in the real world, a test bed implementation of DAA protocol is compared in terms of energy consumption with another authentication protocol. It is shown when the network is under attack and the amount of false data is high, DAA greatly outperforms traditional authentication techniques.","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131145653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The growths of Internet, Global Positioning System (GPS) and wireless telecommunication technologies have opened new avenues in potential area of mobile computing called Location Based Services (LBS). Recommendation of personalized information / services in location based services has become an attractive trend for success of businesses. A Recommender System attempts to solve the problem of information overload and provides product and service recommendation based on user profile and preferences. The location of the user is an important information item that can be associated to the existing user profile in order to provide efficient recommendations. Also, easy availability of GPS enabled devices brings a large amount of GPS trajectories representing user's mobile logs. These GPS trajectories can be used to mine interesting patterns about users. We have studied the utility and application of information extracted from user's GPS trajectory data in recommender systems. We conceive that recommendation has an intrinsic social component and therefore this work takes a perspective towards the social aspect in location based recommender systems. In this paper, we are presenting the state-of-the-art research trends, challenges and applications in the area of Location-Based Recommender Systems (LBRS). (8 pages)
{"title":"Location based recommender systems: Architecture, trends and research areas","authors":"Sunita Tiwari, Saroj Kaushik, Shivendra Tiwari, Priti Jagwani","doi":"10.1049/cp.2012.2096","DOIUrl":"https://doi.org/10.1049/cp.2012.2096","url":null,"abstract":"The growths of Internet, Global Positioning System (GPS) and wireless telecommunication technologies have opened new avenues in potential area of mobile computing called Location Based Services (LBS). Recommendation of personalized information / services in location based services has become an attractive trend for success of businesses. A Recommender System attempts to solve the problem of information overload and provides product and service recommendation based on user profile and preferences. The location of the user is an important information item that can be associated to the existing user profile in order to provide efficient recommendations. Also, easy availability of GPS enabled devices brings a large amount of GPS trajectories representing user's mobile logs. These GPS trajectories can be used to mine interesting patterns about users. We have studied the utility and application of information extracted from user's GPS trajectory data in recommender systems. We conceive that recommendation has an intrinsic social component and therefore this work takes a perspective towards the social aspect in location based recommender systems. In this paper, we are presenting the state-of-the-art research trends, challenges and applications in the area of Location-Based Recommender Systems (LBRS). (8 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115530282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. M. Ghaleb, D. Chieng, A. Ting, K. Kwong, K. Lim, Heng-Siong Lim
The aim of this paper is to evaluate the throughput performance of IEEE802.11n WLANs using a well-known commercial simulator called OPNET Modeler. We study the effects of IP packet size, Modulation and Coding Scheme (MCS), Channel Bonding, number of MIMO spatial streams, Block Acknowledgement (BA) and Type of Service (ToS)/Access Category (AC) on maximum throughput and Throughput Efficiency (TE). The impact of multiple users' access on TE is also analyzed. From these studies we offer fresh insights on underlying configurations and operating conditions which affect the peak throughput performance and efficiency of IEEE802.11n system. (7 pages)
{"title":"Throughput analysis of IEEE802.11n using OPNET","authors":"A. M. Ghaleb, D. Chieng, A. Ting, K. Kwong, K. Lim, Heng-Siong Lim","doi":"10.1049/cp.2012.2068","DOIUrl":"https://doi.org/10.1049/cp.2012.2068","url":null,"abstract":"The aim of this paper is to evaluate the throughput performance of IEEE802.11n WLANs using a well-known commercial simulator called OPNET Modeler. We study the effects of IP packet size, Modulation and Coding Scheme (MCS), Channel Bonding, number of MIMO spatial streams, Block Acknowledgement (BA) and Type of Service (ToS)/Access Category (AC) on maximum throughput and Throughput Efficiency (TE). The impact of multiple users' access on TE is also analyzed. From these studies we offer fresh insights on underlying configurations and operating conditions which affect the peak throughput performance and efficiency of IEEE802.11n system. (7 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122045250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study investigates the potential use of microwave scatterers (MS) for data transmission relay in order to extend the signal coverage over shadowed remote places where lineof-sight (LOS) transmission is not present. Series of indoor NLOS-CW (non-LOS continuous wave) measurements over the 29-30 GHz band were conducted at the intersection of two hallways in presence of two metallic cylinders of different diameters, a right angle standing metallic corner, and a flat surface metallic reflector. Results indicate that for systems operating at a short range of tens of meters, MS provides an alternative to LOS systems, cables or the use of repeaters. It was also found that some types of MS yield better signal coverage while others deflect the signal destructively. Hence, the received signal strength depends strongly on the MS's shape, size and surface roughness. (5 pages)
{"title":"Experimental characterization of NLOS broadband millimeter wave links","authors":"L. Talbi, M. Ghaddar","doi":"10.1049/cp.2012.2073","DOIUrl":"https://doi.org/10.1049/cp.2012.2073","url":null,"abstract":"This study investigates the potential use of microwave scatterers (MS) for data transmission relay in order to extend the signal coverage over shadowed remote places where lineof-sight (LOS) transmission is not present. Series of indoor NLOS-CW (non-LOS continuous wave) measurements over the 29-30 GHz band were conducted at the intersection of two hallways in presence of two metallic cylinders of different diameters, a right angle standing metallic corner, and a flat surface metallic reflector. Results indicate that for systems operating at a short range of tens of meters, MS provides an alternative to LOS systems, cables or the use of repeaters. It was also found that some types of MS yield better signal coverage while others deflect the signal destructively. Hence, the received signal strength depends strongly on the MS's shape, size and surface roughness. (5 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122618711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of wireless sensor techniques and wireless communication techniques in recent years, Wireless Sensor Networks (WSN) has achieved significant improvements. Sensor nodes deployment can be static or dynamic. The support of the mobility becomes one of the important issues in WSN. The problem caused by frequent topology changes is to find a tradeoff between reliability and energy efficiency. Inspired by wireless networks Radio Resource Management (RRM), we introduce handover management strategies to solve the problem. In this research, we therefore deliver some novel WSN based handover techniques under various conditions. (5 pages)
{"title":"Statistical routing protocol for handover management in Wireless Sensor Networks","authors":"Siyang Shan, Chong Shen, Yong Bai","doi":"10.1049/cp.2012.2108","DOIUrl":"https://doi.org/10.1049/cp.2012.2108","url":null,"abstract":"With the rapid development of wireless sensor techniques and wireless communication techniques in recent years, Wireless Sensor Networks (WSN) has achieved significant improvements. Sensor nodes deployment can be static or dynamic. The support of the mobility becomes one of the important issues in WSN. The problem caused by frequent topology changes is to find a tradeoff between reliability and energy efficiency. Inspired by wireless networks Radio Resource Management (RRM), we introduce handover management strategies to solve the problem. In this research, we therefore deliver some novel WSN based handover techniques under various conditions. (5 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133772372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the outcomes in the last world radio communication conference 2007 (WRC-07) is assigning the 790-862 MHz band to the digital broadcasting (DB), and the new mobile system called International Mobile Telecommunication - Advanced (IMT-A) in co-primary basis in 2015. Until that year, the primary service (i.e., DB) should be protected from the new system (i.e., IMT-A). This paper investigates the spectrum sharing requirements such as separation distance and the frequency separation between DB and IMT-A in the 790-862 MHz band. Our study utilizes the Interfere Spectrum Emission Mask (ISEM) and the victim receiver blocking (VRB) as spectrum sharing models based on the Interference-to-Noise ratio (INR) if -6dB as a spectrum sharing criterion. The results show that high interference impact occurs in rural area deployments, whereas, the coexistence could be achieved in urban areas, requiring less separation distance. (4 pages)
{"title":"Compatibility between the IMT-A service with digital broadcasting in the digital dividend band","authors":"W. A. Hassan, T. A. Rahman","doi":"10.1049/cp.2012.2072","DOIUrl":"https://doi.org/10.1049/cp.2012.2072","url":null,"abstract":"One of the outcomes in the last world radio communication conference 2007 (WRC-07) is assigning the 790-862 MHz band to the digital broadcasting (DB), and the new mobile system called International Mobile Telecommunication - Advanced (IMT-A) in co-primary basis in 2015. Until that year, the primary service (i.e., DB) should be protected from the new system (i.e., IMT-A). This paper investigates the spectrum sharing requirements such as separation distance and the frequency separation between DB and IMT-A in the 790-862 MHz band. Our study utilizes the Interfere Spectrum Emission Mask (ISEM) and the victim receiver blocking (VRB) as spectrum sharing models based on the Interference-to-Noise ratio (INR) if -6dB as a spectrum sharing criterion. The results show that high interference impact occurs in rural area deployments, whereas, the coexistence could be achieved in urban areas, requiring less separation distance. (4 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117338363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maximum likelihood estimators (MLE) for time synchronization parameters of receiver-to-receiver protocols are derived. The MLE are first provided for a single-hop model, then generalized to a multi-hop model. The appropriate Cramer-Rao lower bounds (CRLB) for the estimators are then derived, which serves as a theoretical lower bound to any unbiased estimator. The proposed estimators are compared with their respective CRLB through simulation in multi-hop scenarios of up-to eight hops. The results show fast convergence of the estimation precision to the CRLB and demonstrate a high precision, where the mean square error (MSE) does not exceed 10-6 for the skew, and 10-5 for the offset. (6 pages)
{"title":"Theoretical estimators and lower-bounds for receiver-to-receiver time synchronization in multi-hop wireless networks","authors":"D. Djenouri","doi":"10.1049/cp.2012.2084","DOIUrl":"https://doi.org/10.1049/cp.2012.2084","url":null,"abstract":"Maximum likelihood estimators (MLE) for time synchronization parameters of receiver-to-receiver protocols are derived. The MLE are first provided for a single-hop model, then generalized to a multi-hop model. The appropriate Cramer-Rao lower bounds (CRLB) for the estimators are then derived, which serves as a theoretical lower bound to any unbiased estimator. The proposed estimators are compared with their respective CRLB through simulation in multi-hop scenarios of up-to eight hops. The results show fast convergence of the estimation precision to the CRLB and demonstrate a high precision, where the mean square error (MSE) does not exceed 10-6 for the skew, and 10-5 for the offset. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130419611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, an energy-aware distributed algorithm is proposed to construct an endurant spanning tree for data aggregation on wireless sensor networks. On the constructed aggregation tree, nodes with higher residual energy are arranged close to the trunk to maximize the lifetime of the tree, and maintain the integrity of aggregated data. Data aggregation, in which a node processes the data collected from all its children nodes and then transmits the processed result to its parent node by a single message, is an energy efficient way to collect data from sensor nodes. However, in the tree hierarchy for data aggregation, a node failure close to the root of the tree (the sink node of a sensor network) will cause severe data loss (all data from the downstream of this failure node will be lost.). This motivates our algorithm to arrange those nodes with higher residual energy close to the root of aggregation tree and relieve the responsibility of nodes with less residual energy. Our algorithm for tree construction is distributed; each node makes its own decision by exchanging information with its neighbouring nodes. The experiment results show that the constructed aggregation tree by our algorithm, named Distributed Endurant Spanning Tree (DEST) is the most endurant, i.e., of the longest time to reach a certain level of data loss due to node failures from running out of energy, compared to other representative energy-aware aggregation trees in the literature. This also indicates a less frequent re-construction of data aggregation tree, which further reduces the energy consumption on sensor networks. (6 pages)
{"title":"DEST: Distributed endurant spanning tree for data aggregation on wireless sensor networks","authors":"Jen-Yeu Chen, Da-Wei Juan, Cheng-Sen Huang","doi":"10.1049/cp.2012.2093","DOIUrl":"https://doi.org/10.1049/cp.2012.2093","url":null,"abstract":"In this paper, an energy-aware distributed algorithm is proposed to construct an endurant spanning tree for data aggregation on wireless sensor networks. On the constructed aggregation tree, nodes with higher residual energy are arranged close to the trunk to maximize the lifetime of the tree, and maintain the integrity of aggregated data. Data aggregation, in which a node processes the data collected from all its children nodes and then transmits the processed result to its parent node by a single message, is an energy efficient way to collect data from sensor nodes. However, in the tree hierarchy for data aggregation, a node failure close to the root of the tree (the sink node of a sensor network) will cause severe data loss (all data from the downstream of this failure node will be lost.). This motivates our algorithm to arrange those nodes with higher residual energy close to the root of aggregation tree and relieve the responsibility of nodes with less residual energy. Our algorithm for tree construction is distributed; each node makes its own decision by exchanging information with its neighbouring nodes. The experiment results show that the constructed aggregation tree by our algorithm, named Distributed Endurant Spanning Tree (DEST) is the most endurant, i.e., of the longest time to reach a certain level of data loss due to node failures from running out of energy, compared to other representative energy-aware aggregation trees in the literature. This also indicates a less frequent re-construction of data aggregation tree, which further reduces the energy consumption on sensor networks. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122253118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}