Power Conservation Techniques in Wireless Sensor Networks

Power Conservation Techniques in Wireless Sensor Networks

Baha Alsaify, Haiying Shen
ISBN13: 9781615207015|ISBN10: 1615207015|EISBN13: 9781615207022
DOI: 10.4018/978-1-61520-701-5.ch006
Cite Chapter Cite Chapter

MLA

Alsaify, Baha, and Haiying Shen. "Power Conservation Techniques in Wireless Sensor Networks." Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice, edited by Hai Jin and Wenbin Jiang, IGI Global, 2010, pp. 108-127. https://doi.org/10.4018/978-1-61520-701-5.ch006

APA

Alsaify, B. & Shen, H. (2010). Power Conservation Techniques in Wireless Sensor Networks. In H. Jin & W. Jiang (Eds.), Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice (pp. 108-127). IGI Global. https://doi.org/10.4018/978-1-61520-701-5.ch006

Chicago

Alsaify, Baha, and Haiying Shen. "Power Conservation Techniques in Wireless Sensor Networks." In Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice, edited by Hai Jin and Wenbin Jiang, 108-127. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-61520-701-5.ch006

Export Reference

Mendeley
Favorite

Abstract

This chapter discusses power conservation problems in Wireless Sensor Networks (WSNs). The problem arises from the fact that WSNs have limited energy since sensors are powered with small batteries (due to the sensor size constraints). Currently, some energy-efficiency methods focus on reducing energy consumption by designing sensor hardware. Other methods enable sensors to communicate with each other in an efficient manner by developing new communication protocols. Some communication protocols need to have extra information such as sensor locations for determining the best possible relays to deliver data to a Base Station. In this chapter we will first provide a survey on current power conservation methods. We will then discuss the efficiency and effectiveness of these methods, and propose possible solutions. Finally, we conclude the chapter with concluding remarks and open issues.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.