A Brief Survey of Energy Based Constraints for Improvising its Efficiency in Wireless Sensor Networks
Author(s)
Sajitha.M , S.Veni
Published Date
September 12, 2024
DOI
your-doi-here
Volume / Issue
Vol. 16 / Issue 3
Abstract
Wireless sensor networks (WSNs) contains a potentially large number of wireless networked sensors, sufficient for full-time task operations without human interference in a possibly hostile environment. A sensor node is usually a miniature component system comprising four principal. components: a sensing unit for data collection, a local data processing microcontroller with some memory operations, a communication unit to facilitate data transmission/receipt from and to other connected devices. It could be used in various applications, including targeting surveillance, environmental control, device monitoring, health monitoring, or hostile environment exploration. The purpose is to recognise and record any occurrence in the area of interest for data collection that constitutes the critical aspect for WSN applications. Apart from an external human influence after initial implementation, the device scenarios for WSNs frequently require long-term active battery-driven structure nodes. Since the nodes will exhaust a battery within a few days, in the absence of energy-saving techniques. Many researchers have established protocols that are capable of reducing energy usage. In this article, a comprehensive survey was performed for WSN, and numerous issues were addressed in terms of various scenarios and energy efficiency methods. This survey aims to raise understanding of the various energy management systems for the researcher's group. We define energy storage in WSNs according to different energy source mechanisms for the sensor node, such that a complete insight is obtained into the topic. Then we address various methods and the protocol conceptions centred on energy usage. Instead of addressing each protocol individually, this paper focuses on a general description of the effective methods adopted by many protocols, such as Duty cycling, Data-driven methods, or approaches focused on mobility. To precisely define the features of each system, our discussion is split into these three key parts,
View Full Article
Download or view the complete article PDF published by the author.