• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Wenhua, Wang Tian, Wu Qun, Wang Guojun, Jia Weijia. Survey of Delay-Constrained Data Collection with Mobile Elements in WSNs[J]. Journal of Computer Research and Development, 2017, 54(3): 474-492. DOI: 10.7544/issn1000-1239.2017.20150953
Citation: Wang Wenhua, Wang Tian, Wu Qun, Wang Guojun, Jia Weijia. Survey of Delay-Constrained Data Collection with Mobile Elements in WSNs[J]. Journal of Computer Research and Development, 2017, 54(3): 474-492. DOI: 10.7544/issn1000-1239.2017.20150953

Survey of Delay-Constrained Data Collection with Mobile Elements in WSNs

More Information
  • Published Date: February 28, 2017
  • Data collection is one of the hot topics in wireless sensor networks. In traditional wireless sensor networks, those sensor nodes near the sink will deplete their energy prematurely for forwarding data sensed by both themselves and other nodes, which becomes the energy bottleneck and shortens the lifetime of whole networks. To save the energy of sensors in the wireless sensor networks, mobility elements are introduced to collect data in a lot of research work since their energy can be replenished because of mobility. However, the velocity of the mobile elements is slow, which may lead to long data collection delay. To address this problem, the problem of how to maximize the network lifetime while guaranteeing the data collection delay being less than a certain value has become a hot topic. In this paper, we investigate this kind of delay-constrained data collection methods with mobile elements in detail. We first sum up the characteristics of the delay-constrained mobile data collection methods via a novel classification. These methods are compared with each other according to a serial of key parameters. Moreover, we analyze the advantages, disadvantages and the application scope of these methods, summarize the main problems to be addressed, and further point out the future outlook on the research and application directions.
  • Related Articles

    [1]Qian Zhongsheng, Huang Heng, Zhu Hui, Liu Jinping. Multi-Perspective Graph Contrastive Learning Recommendation Method with Layer Attention Mechanism[J]. Journal of Computer Research and Development, 2025, 62(1): 160-178. DOI: 10.7544/issn1000-1239.202330804
    [2]Song Chuanming, Min Xin, Xie Weidong, Yin Baocai, Wang Xianghai. Elastic Motion Estimation Algorithm Using Two-Bit-Depth Pixels[J]. Journal of Computer Research and Development, 2019, 56(11): 2469-2484. DOI: 10.7544/issn1000-1239.2019.20180699
    [3]Wu Yihan, Huang Gang, Zhang Ying, Xiong Yingfei. A Model-Based Fault Tolerance Mechanism Development Approach for Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(1): 138-154. DOI: 10.7544/issn1000-1239.2016.20150608
    [4]Zhu Xia, Song Aibo, Dong Fang, Luo Junzhou. A Collaborative Filtering Recommendation Mechanism for Cloud Computing[J]. Journal of Computer Research and Development, 2014, 51(10): 2255-2269. DOI: 10.7544/issn1000-1239.2014.20130056
    [5]Lin Hui, Ma Jianfeng, Xu Li. A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism[J]. Journal of Computer Research and Development, 2014, 51(7): 1486-1496.
    [6]Lü Xiaobo, Guo Yao, and Chen Xiangqun. A Splitting-Based Cloud Storage Mechanism for Digital Images[J]. Journal of Computer Research and Development, 2014, 51(5): 1129-1135.
    [7]Yu Leilei, Chen Dongyan, Liu Yuemei, Huang Xu. Centralized-Calculating-Based 2-Disjoint Multipath Routing Algorithm for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(3): 517-523.
    [8]Gao Jianmin, Lu Huimei, and Cao Yuanda. Multi-Source Interactive Application Layer Multicast Routing Protocol[J]. Journal of Computer Research and Development, 2011, 48(5): 778-785.
    [9]Hu Ning, Zou Peng, and Zhu Peidong. A Cooperative Mechanism for Inter-Domain Routing Management[J]. Journal of Computer Research and Development, 2009, 46(8): 1251-1259.
    [10]Shen Qingni, Qing Sihan, and Li Liping. Design and Implementation of a Multi-Layered Privilege Control Mechanism[J]. Journal of Computer Research and Development, 2006, 43(3): 423-428.

Catalog

    Article views (1295) PDF downloads (576) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return