Open Access Open Access  Restricted Access Subscription or Fee Access

Survey of Robust Storage Mechanisms in Wireless Sensor Networks

Manas Kumar Yogi, Vijayakranthi Chinthala

Abstract


This paper presents a methodological survey of storage mechanisms in WSN. We survey various data replication mechanisms for efficient data storage to eliminate the various challenges in WSN like energy constraint, storage space constraint, We observe that local storage, external storage have limited benefits when compared to data centric mechanisms  like GHT mechanisms. Additionally we look at the data replication mechanisms to enhance fault tolerance while storage of data. The hierarchical management techniques reduce the network traffic by storing data in multilayer architectures. This paper presents the technical specifics of such architectures and how query execution happens in such systems.

Keywords


Data-Centric, EASE, GEM, Sensor, TSAR, WSN.

Full Text:

PDF

References


S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. Yu. “Data-centric storage in sensornets with GHT, a geographic hash table. Mobile Networks Applications”, 8(4):427–442, 2003.

W. S. Zhang, G. H. Cao, and T. L. Porta , “Data dissemination with ring-based index for wireless sensor Networks”, In: IEEE International Conference on Network Protocols (ICNP), 2003, pp. 305–314.

K. Xing, X. Z. Cheng, and J. Li, “Location-centric storage for sensor networks”, In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.

K. Seada and A. Helmy, “Rendezvous regions: a scalable architecture for service location and datacentric storage in large-scale wireless networks”, In: IEEE/ACM IPDPS International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN), April 2004.

T. N. Le, W. Yu, X. Bai, and D. Xuan, “A dynamic geographic hash table for data-centric storage in sensor networks”, In:Wireless Communications and Networking Conference (WCNC), 2006, pp. 2168–2174.

T. N. Le, D. Xuan, and W. Yu, “adaptive zone-based storage architecture for wireless sensor Networks”, In: IEEE Global Telecommunications Conference (GLOBECOM), 2005, pp. 2782–2786.

J. Newsome and D. Song. “Gem: graph embedding for routing and data-centric storage in sensor networks without geographic information”, ACM SenSys, 2003, pp. 76–88.

J. L. Xu, X. Tang, and W. C. Lee, “EASE: an energy-efficient in-network storage scheme for object tracking in sensor networks”, In: IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks(SECON), 2005, pp. 396–405.

P. Desnoyers, D. Ganesan, and P. Shenoy. Tsar: a two tier sensor storage architecture using interval skip graphs. ACM SenSys, 2005, pp. 39–50.

X. Li, Y. J. Kim, R. Govindan, and W. Hong. Multi-dimensional range queries in sensor networks.In: Proceeding of the 1st International Conference on Embedded Networked Sensor Systems. 2003,pp. 509–517.

Q. Fang, J. Gao, L. Guibas, V. de Silva, and L. Zhang. GLIDER: gradient landmark-based distributed routing for sensor networks. In: Proceeding of the 24th Conference of the IEEE Communication Society (INFOCOM), March 2005.

D. J. Abadi, S. Madden, and W. Lindner. Robust, efficient filtering and event detection in sensor networks. In Proceedings of the 31th International Conference on Very Large Data Bases (VLDB), pages 769–780, 2005.

M. Cardei and J. Wu. Energy-efficient coverage problems in wireless adhoc sensor networks. Computer Communications, 29(4):413–420, February 2006.

A. Coman, M. A. Nascimento, and J. Sander. Exploiting redundancy in sensor networks for energy efficient processing of spatiotemporal region queries. In Proceedings of the 14th ACM International Conference on Information and Knowledge Management (CIKM), pages 187–194. ACM Press, 2005.

X. Li, Y. Kim, R. Govindan, and W. Hong. Multi-dimensional range queries in sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys ’03), pages 63–75. ACM Press, 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.