You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

10 October 2022

Investigation of Energy Cost of Data Compression Algorithms in WSN for IoT Applications

,
and
Department of Mechanical and Electrical Engineering, School of Food and Advanced Technology, Massey University, Palmerston North 4442, New Zealand
*
Author to whom correspondence should be addressed.
This article belongs to the Topic Wireless Sensor Networks

Abstract

The exponential growth in remote sensing, coupled with advancements in integrated circuits (IC) design and fabrication technology for communication, has prompted the progress of Wireless Sensor Networks (WSN). WSN comprises of sensor nodes and hubs fit for detecting, processing, and communicating remotely. Sensor nodes have limited resources such as memory, energy and computation capabilities restricting their ability to process large volume of data that is generated. Compressing the data before transmission will help alleviate the problem. Many data compression methods have been proposed but mainly for image processing and a vast majority of them are not pertinent on sensor nodes because of memory impediment, energy utilization and handling speed. To overcome this issue, authors in this research have chosen Run Length Encoding (RLE) and Adaptive Huffman Encoding (AHE) data compression techniques as they can be executed on sensor nodes. Both RLE and AHE are capable of balancing compression ratio and energy utilization. In this paper, a hybrid method comprising RLE and AHE, named as H-RLEAHE, is proposed and further investigated for sensor nodes. In order to verify the efficacy of the data compression algorithms, simulations were run, and the results compared with the compression techniques employing RLE, AHE, H-RLEAHE, and without the use of any compression approach for five distinct scenarios. The results demonstrate the RLE’s efficiency, as it surpasses alternative data compression methods in terms of energy efficiency, network speed, packet delivery rate, and residual energy throughout all iterations.

1. Introduction and Motivation

The 21st century has been characterised by dramatic shifts in the ways that technology, commerce, and social patterns are organised. The fourth industrial revolution, often known as Industry 4.0, is the result of the trend toward automation and the subsequent reduction in human involvement in production across most sectors []. Wireless sensor networks (WSN) and the Internet of Things will play crucial roles in the Fourth Industrial Revolution (IR 4.0 or 4IR). Since IoT devices can move, share, and exchange data without human interaction [], it enables high flexibility and ease of implementation in a variety of applications. Wireless sensor networks have a limited lifespan due to the significant impact power consumption has on their performance []. Energy-efficient media access control and routing protocols [] are only a couple of the ideas put up to address this problem. Long-term environmental monitoring is a primary goal of a large number of wireless sensor network (WSN) applications. As a result, saving battery power for sensor nodes is an important consideration. Sensor nodes have two main ways to save energy. The use of node redundancy can be a solution to this problem, as it allows a subset of sensor nodes to stay active while the others are put to sleep to save energy. All of the monitored areas must be covered by the subset of active sensor nodes, and the network must remain connected. Furthermore, these sensors must ensure that the network performs as effectively as it does when all the sensors are engaged. We may extend the network’s lifespan by switching between distinct subsets of sensor nodes that are active at the same time. However, such sleep-active techniques may not be implemented if node redundancy is not available (for example, due to network deployment [,] or sensor breakdown []). Sensor nodes utilise a lot of energy when transmitting data, therefore a possible approach is to decrease the amount of data that is delivered. When sensor nodes are required to send their sensing data to sinks on a regular basis for an extended period, a solution such as this could be extremely helpful []. Data from sensing devices must be compressed to save traffic on the network. The data compression system is one of the methods recommended for reducing the amount of data sent through wireless networks. Reduced inter-node communication in wireless sensor networks is a result of using this strategy. Figure 1 illustrates the three kinds of data compression schemes: lossy, lossless, and recoverability of data []. Energy, memory, and CPU resources of sensor nodes are extremely restricted; hence, we must choose an efficient and straightforward data compression approach. In order to overcome these concerns, we adapt a lossless data compression approach for use in a wireless sensor network.
Figure 1. Classification of Data Compression Techniques [].
The term “lossless compression” refers to a compression method in which, following the execution of the decompression operation, it is possible to recover data that are identical to those obtained before the execution of the compression operation []. Sensors in commercial nodes benefit more from lossy compression methods than lossless ones because of the higher compression ratio and lower computational cost that they provide []. An accurate and efficient data processing system was developed in [] to extend the life of clustered WSNs using data prediction, compression, and recovery. The primary objective of this effort is to reduce the cost burden of communication while ensuring the precision of data processing and prediction. The authors of [] provide a novel architecture that includes a unique combination of data prediction, compression, and recovery in their work. Huffman coding is one of the representative examples for traditional and lifetime maximization cases. When data is compressed using a method known as lossy compression, it is possible that some of the data’s more specific and typically less important properties will be lost as a result of the process. JPEG2000, for example, falls into this family of image and video compression techniques. Finally, from a compressed file in which some data are lost, the recovery tools such as error concealment tools are employed to retrieve the lost data. As shown in Figure 2, there are five broad kinds of WSN data compression algorithms that we will explore in this work.
Figure 2. Categorization of Data Compression Techniques in WSN [].
An overview of these methods may be found here []. (1) To compress the data, text data compression strategies are applied to the sensor data in string-based compression approaches. (2) To handle sensing data, image-based compression approaches first hierarchically arrange WSNs before adapting the concept from image compression techniques. (3) The Slepian-Wolf theorem is extended by distributed source coding techniques to encode and decode numerous correlated data streams independently at sensor nodes. (4) A minimal number of randomised and nonadaptive linear projection samples is used by compressed sensing techniques for data compression. (5) Some sensor nodes are responsible for merging data from other sensor nodes in the network as part of data aggregation procedures.
In [], the authors analyses some of the difficulties that might arise when running a parallel compression method on a CPU/GPU hybrid platform at the secondary sink node of a large-scale wireless sensor network (L-SWSN). It uses the matrix matching principle to dynamically split the compressed data into several dictionary strings and pre-read strings along the vertical and horizontal axes of the GPU’s various blocks, allowing for the simultaneous construction of many matrices.
The simulated approach reported in [] yields reduced Root Mean Square Error (RMSE) values and larger R2 values (higher coefficient of determination) for varying compression ratios. This research presents an innovative method for enhancing network performance by utilizing Distributed Source Coding and Efficient Energy Consumption while still enabling the delivery of fundamental routing services with reduced traffic delay, end-to-end latency, and total energy consumption. Experiments on their suggested approach show that it performs well, consumes little energy, and can handle a large amount of data []. For taking advantage of this spatial relationship, Ref. [] introduces a joint sparsity-based compressive sensing approach. Their method uses Bayesian inference to create a probabilistic model of the signals, and then they apply a belief propagation algorithm as a decoding technique to restore the original sparse signal. As a result, this research suggests a method for maximizing the usefulness of available sensors by consolidating and compressing data while maintaining its original quality. The primary goal, then, is to minimize this redundant data by eliminating some of the data packets and maintaining just the most crucial ones for the reconstruction. A packet of sensor data was lost during data aggregation, resulting in slower transmission and fewer packet collisions across the cellular connection. The redundancy of storing aggregated data is reduced by data compression, reducing both storage space and transmission bandwidth for use by wireless sensor nodes. As a result of these findings, the lifespan of the network has been greatly extended. The raw data is also considered to be of high quality [].
The main motivation behind this research is to investigate power consumed during data compression and transmission. Hence, data compression techniques such as RLE and AHE and a hybrid of these techniques are investigated and implemented in different WSN scenarios to achieve higher compression ratio with less power consumption. RLE relies on correlation at the data sources to achieve compression, but AHE may guarantee a greater compression ratio even when the data sources are unknown. The primary issue with RLE is that compression outcomes are affected by the data source. As both the sender and the receiver start out in the communication process in the dark regarding the source sequence statistics, adaptive Huffman coding results in a longer compression time. The H-RLEAHE starts with the compression using RLE technique based on the statistics of the data sources and compresses the data based on that. Further, the compressed data is given as input to the AHE algorithm. The compressed data is communicated to the BS, where it is decompressed using the decompression algorithm.
The outline of the papers is as follows: Section 2 presents the related work for selecting the techniques. Section 3 discusses the basic data compression techniques. Section 4 details the hybrid model for data compression. Section 5 establishes the performance measures and analysis of different data compression algorithms namely RLE, AHE, H-RLEAHE and H-AHERLE. Section 6 discusses the network setup. Section 7 compares the results of different data compression models with RLE, AHE, Hybrid-RLEAHE (H-RLEAHE) and un-compressed data. This paper concludes the entire work with possible avenues of future research.

3. Data Compression Techniques

The following section elaborates the basics of the constituent algorithms, i.e., RLE and AHE.

3.1. RLE (Run Length Encoding)

Run Length Encoding (RLE) is a frequently used compression method. This algorithm’s basic premise is laid forth in []. In the case that a data item d appears in the input stream n times in a row, we replace each occurrence n with a single pair of data items ( n , d ) . The RLE method [] is shown graphically in Figure 3. However, the findings of RLE are dependent on the data source because it is based on the same sequential input stream.
Figure 3. The flowchart of the Hybrid Model.

3.2. Adaptive Huffman Encoding

Huffman coding involves an analysis of the source sequence’s probability. In the case that this information is not easily accessible, the Huffman encoding process transforms into a two-step procedure: in the first step, the statistics are gathered, and in the second step, the source is encoded. Adaptive algorithms based on statistics of previously encountered symbols were created independently to transform this technique into a one-pass approach []. To encode the (k + 1)th symbol, we might theoretically recompute the code each time a symbol is delivered by utilizing the Huffman coding process. However, because of the high amount of work required, this strategy would be impractical.
Adaptive Huffman coding employs a technique where neither the transmitter nor the receiver knows the source sequence’s statistics prior to transmission. Nodes in both transmitter and receiver have a weight of 0 and correspond to all symbols that have not yet transmitted (NYT). To keep track of the symbols that have been broadcast, the tree will be updated by adding new nodes to the tree as transmission occurs. Before the transmission begins, the transmitter and receiver agree on a set code for each symbol. In Adaptive Huffman coding, this process becomes a one-pass procedure. NYT are represented by a single node with a weight of zero in both the transmitter and receiver’s trees. Symbols are added to the tree as they are broadcast, and the tree is rearranged using an update mechanism while the transmission continues. Each end of the signal has the same root node as the other. Both the transmitter and the receiver utilize the same method for updates. As a result, the encoding and decoding operations are kept synchronized [].
(a)
Encoding Procedure: Initially, there is just one node in the tree at both the encoder and the decoder, which is the NYT node. As a result, the very first symbol that emerges has a predetermined code-word. When encoding a symbol for the second time, we transmit the code for the NYT node, followed by the fixed code for the symbol that was already agreed upon, unless we are dealing with the very first symbol again. By following the Huffman tree from its root to the NYT node, we may retrieve its corresponding code. This notifies the receiver that the Huffman tree does not yet include a node corresponding to the symbol whose code is about to be received. If a symbol has to be encoded and there is an external node in the tree that corresponds to it, a path from the root node to the external node can be used to produce the symbol’s code.
(b)
Update Procedure: To perform the update method, the nodes must be arranged in a predetermined order. Using node numbers, this order is maintained.

4. Hybrid Model for Run Length Encoding with Adaptive Huffman Encoding

It is evident that the traditional Huffman algorithm necessitates probability distribution in order to generate the Huffman code which may not always be available. In addition, it may not be suitable in scenarios when the probabilities of the input symbols are dynamic. To address the limitations of Huffman coding, researchers have proposed Adaptive Huffman coding technique that uses a novel approach referred to as sibling property to form Huffman tree. As per adaptive Huffman code, the tree initially contains 0-node and maintains a counter for each symbol. As the tree is dynamically created, the generated codes are more effective than Huffman code. As the adaptive Huffman tree is dynamically created, it requires only 1 pass through the input data. Further, as discussed previously, RLE is one of the simplest compression methods that works most effectively for data that contains repeated symbols. However, the most concerning limitation of RLE is that the size of output can be twice to that of input in the worst case. Hence, to address this limitation, we propose a method that combines RLE with AHE as demonstrated in Figure 3.

4.1. Hybrid Run Length Encoding with Adaptive Huffman Encoding (H-RLEAHE) Algorithm

The hybrid algorithm works in two phases. First phase involves the encoding through RLE, where the data item d occurs n consecutive times in the input stream and is replaced with the single pair ( n , d ) . The H-RLEAHE is shown graphically in Figure 3. However, the findings of RLE are dependent on the data source because it is based on the same sequential input stream. RLE provides the ST file. In the second phase of the tree, both the transmitter and the receiver employ a single node to represent all unsent symbols NYT with a weight of zero. New nodes will be added to the tree when transmission happens in order to maintain track of the symbols that have been transmitted. To begin transmission, the sender and receiver must first settle on a code for each symbol. NYT node codes are transmitted first, followed by the symbol’s standard code. The symbol is then removed from the NYT list and given its own node. The tree structure of both the transmitter and receiver is same. Both the transmitter and the receiver utilise the same technique for software updates. Encoding and decoding are therefore always carried out at the same time. Nodes must be arranged in a specific order for the update operation to work. Nodes are sequentially numbered to maintain this hierarchy. The root of the tree is given the highest node number, and the NYT node is given the smallest number. Starting with the NYT node and working our way down the tree, the numbers are allocated in ascending order from lower to higher levels. A block is a collection of nodes with the same weight makes up a block.

4.2. Hybrid Algorithm

The proposed hybrid algorithm works in two phases: Initially the data is compressed using RLE algorithm, then in the second phase, AHE algorithm is applied on the compressed data received from RLE. The parameters used in the proposed H-RLEAHE algorithm are given in Table 1. Further, the compression technique using the proposed algorithm and decompression is discussed thereafter.
Table 1. Parameters that were used in the data compression algorithm.
The Algorithm 1 for the H-RLEAHE model is given below:
Algorithm 1: H-RLEAHE Compression Algorithm
Sensors 22 07685 i001
In the H-RLEAHE algorithm, in step 1, data packet is initialized in bits. From step 2 to step 5, RLE algorithm is initialized. During step 6, the for-loop is setup and examines to see whether there are any characters that are identical to those in the next index. The count increments to 1 if the characters are identical. If not, the count and character are concatenated. Step 10 checks for unique code and matches and stores it in the location. In step 11, Adaptive Huffman encoding is applied. The Algorithm 2 for decompression is given below.
Algorithm 2: Decompression algorithm for H-RLEAHE
Sensors 22 07685 i002

5. Performance Measures and Analysis

Analyses of data compression techniques are carried out using the following metrics.
A.
Compression Ratio (CR): The compression algorithms factor is the ratio of the size of the uncompressed data in bits (buc) to the size of the compressed data in bits (bc) [].
CR =   b u c b c
B.
Compression Time (CT): The time it takes to compress the original data [].
C.
Consumption of CPU resources or power used during data compression: An investigation on data compression’s impact on energy use.
D.
Transmission cost: The amount of energy consumed to transmit compressed data.

Analysis of RLE, AHE, H-RLEAHE and H-AHERLE Algorithm

In this section we have used real world data [] to analyze the compression ratio of different algorithms with varying data size. Suppose the length of original data is L and the length of compressed data is K. We have formulated the energy consumption of different algorithms and used the TIMSP430 [] microcontroller which has a 16-bit CPU designed for systems with minimal resources. VCC = 3.3 V, FCLK = 3.3 MHz, and IMSP430 = 1.85 mA is the current consumption of the TIMSP430 while in active mode. As a result, Equation (2) provides the power consumption per clock cycle of the MSP430 microcontroller. Equation (3) shows how much energy is used to send and receive one bit of data [,].
E C L K   = V c c   ×   I M S P 430 / F C L K = 1.85 nJ
S b i t   = V c c × I T X   /   D r = 230 nJ
where V c c = 3.3 V, I T X = 17.4 mA and D r = 250 kbps
Table 2 shows how basic CPU activity cycles may be utilised to indicate the energy required to transport data while using compression.
Table 2. CPU cycles for the TIMSP430 microocntroller [].
Finally, we use the design components to figure out the computational complexity (in number of clock cycles) of different data compression algorithms for compressing the input data using the ECalgo (L1, K).
Where ECalgo is the energy consumption of algorithms (RLE, AHE, H-RLEAHE an H-AHERLE), L1 is the actual input data size and K is the compressed data.
We have used actual data input of 1500 bits and the data compressed for difference algorithms is mentioned below. Further, we have evaluated the CPU and transmission cost.
(a)
CPU cost for RLE is formulated as in Equation (4)
E C R L E = ( ( ( 2 × 184 ) + ( 1 × 37 ) ) × L 1 ) × 1.85 × 10 9
where L1 is the compressed data of RLE and compressed bits is 70 bits, CPU cost is 0.00018731 J and transmission cost is S b i t × 70   bits is 1.61 × 10−5 J. RLE algorithim uses two addition operators and one comparison operator.
(b)
CPU cost for AHE is formulated as in Equation (5)
E C A H E = ( ( ( 9 × 184 ) + ( 4 × 177 ) + ( 1 × 395 ) + ( 1 × 405 ) + ( 14 × 37 ) ) × L 1 ) × 1.85 × 10 9
where L1 is the compressed data of AHE and compressed data is 330 bits, CPU cost is 0.0017029 J and transmission cost is S b i t × 30 bits is 7.59 × 10−5 J. In Equation (5) there are 9 addition operators 4 subtratctions, 1 multiplication, 1 division and 14 comaprison operators.
(c)
CPU cost for H-RLEAHE is formulated as in Equation (6)
E C H R L E A H E = ( ( ( 2 × 184 ) + ( 1 × 37 ) ) × L 1 +   ( ( 9 × 184 ) + ( 4 × 177 ) + ( 1 × 395 ) + ( 1 × 405 ) + ( 14 × 37 ) ) × K H 1 ) × 1.85 × 10 9
where L1 is the compressed data of RLE, the K H 1 is the compressed data of H-RLEAHE and data compressed is 82, CPU cost is 0.00025543 J and transmission cost is S b i t   × 82 bits is 1.886 × 10−5 J. From equation 6 we can observe that there are two addition operators, one compariosn, 23 addition operators, 4 subtractions, 1 division and multiplication and 1 compariosn operators.
(d)
CPU cost for H-AHERLE is formulated as in Equation (7)
E C H A H E R L E = ( ( ( 9 × 184 ) + ( 4 × 177 ) + ( 1 × 395 ) + ( 1 × 405 ) + ( 14 × 37 ) ) × L 1 + ( ( 2 × 184 ) + ( 1 × 37 ) ) × K H 2 ) × 1.85 × 10 9
where L1 is the compressed data of AHE, K H 2 is the compressed data of H-AHERLE and data compressed is 1360, CPU cost is 0.0019502 J and transmission cost is S b i t   ×   1360 bits is 0.0003128 J. Operators used in Equation (7) is 23 additions, 4 subtractions, 1 multiplication and division, and 1 comparison. It can be clearly seen that the transmission cost and CPU cost for RLE is better than the other data compression algorithms.
Hence based on the above equations we have analysed the compression ratio of different algorithms with varying data size from 0 to 1500 bits as shown in Figure 4. It can be clearly seen that the compression ratio of RLE is better than Hybrid-RLEAHE, AHE and Hybrid-AHERLE. For instance, the compression ratio for 1500 bits for RLE is 21.42, H-AHERLE is 18.29, AHE is 4.54 and H-AHERLE is 1.1. Hence from the analysis and compression ratio results we have considered only RLE, AHE and H-RLEAHE in our further studies.
Figure 4. Compression ratio with data varying size in bits.

6. Network Setup and Scenario Analysis

Different network setup parameters that have been used for investigating data compression algorithm as shown in Table 3. and the assumptions are as follows:
Table 3. Network parameter setup.
Assumptions
  • Consider all sensor nodes to be stationary.
  • The study assumes that the data gathered from source IoT nodes is destined for a single BS.
  • SNs that have similar processing and communication capabilities are considered homogeneous. It also takes into account the fact that all SNs have the same initial energy.
  • The x and y coordinates of SNs released randomly are always in the topological region.
  • Applying Euclidean distance, the separation between two near-neighboring SNs is calculated.

6.1. Results and Discussion

As indicated in Table 4. the research is further examined in multiple scenarios with varied network area, number of grids/clusters, and total number of nodes. The number of grids varies between 8 and 100, while the total number of nodes spans from 100 to 1250 dependent on the network area. Table 4 provides further information on each of these potential outcomes. The hybrid routing protocol, it is parameter settings and network structure form the basis for different scenarios as reported in [].
Table 4. Different simulation network configurations [].
The entire setup is in an area with the base station located at various locations as shown in Table 3. The conventional data compression algorithm RLE and AHE is compared with H-RLEAHE and without compression with the parametric settings given in Table 3 and the grid formation is shown in Table 4. Total packets sent to base station (BS), nodes alive, residual energy in network, packet delivery ratio (PDR), and throughput are used to evaluate performance. In the next sections, we will see how various grid and network settings affect performance.

6.2. Case Study 1-1: 2 × 4, 100 Nodes, BS at Center

Figure 5 shows the results of Case Study 1-1: 2 × 4 grids, 100 Nodes, where the base station is placed at the center. Figure 5a depicts the network architecture, which consists of 16 grids with the numbered cluster heads connected by a black line. Figure 5b compares the findings of many different performance metrics and shows that a network with 100 nodes may survive for 118 (AHE), 484 (without compression), 740 (H-RLEAHE), and 982 (RLE) cycles. Compared to RLE, the network lifetime reduces by 87.98%, 50.71% and 24.64%, respectively, for AHE, WC and H-RLEAHE. The increase in the number of rounds for which the network remains alive can be safely attributed to the lesser data to be communicated to the BS as the compression techniques reduce the data significantly. The visualization of average energy in the nodes can be seen from Figure 5c, validating the higher energy in the nodes in the RLE method vis-à-vis other strategies. Further, packet delivery ratio also demonstrates an improvement as shown in Figure 5d. Similarly, Figure 5e demonstrates an improvement in throughput by sending packets up to 982 rounds. The average packets sent to BS/round is also increased significantly as shown in Figure 5f.
Figure 5. (a) Network Structure, (b) Alive Node in Case Study 1-1, (c) Energy in Case Study 1-1, (d) PDR in Case Study 1-1, (e) Throughput in Case Study 1-1, (f) Packets sent to BS in Case Study 1-1.

6.3. Case Study 1-2: 2 × 4, 100 Nodes, BS at Top Edge

This scenario demonstrated in Figure 6 considers placement of BS at top edge. Here, the alive nodes show that with 100 nodes, the network remains alive up to 111 (AHE), 480 (without compression), 733 (H-RLEAHE) and 968 (RLE) rounds, respectively. Compared to RLE, the network lifetime reduces by 88.53%, 50.41% and 24.27%, respectively for AHE, WC and H-RLEAHE. In addition, the throughput reduces for AHE by 88.25%, without compression by 51.28% and for H-RLEAHE it reduces by 25.64% compared to RLE.
Figure 6. Results of Case Study 1-2: 2 × 4, 100 Nodes, BS at top edge. (a) Alive Nodes in Case Study 1-2, (b) Energy in Case Study 1-2. (c) PDR in Case Study 1-2, (d) Throughput in Case Study 1-2, (e) Packets sent to BS in Case Study 1-2.

6.4. Case Study 1-3: 2 × 4, 100 Nodes, BS at Left Edge

The scenario demonstrated in Figure 7 considers placement of BS at left edge. Here, the alive nodes for AHE, without compression and H-RLEAHE techniques reduces by 88.56%, 49.84% and 24.51% rounds, respectively, compared to RLE. In addition, the throughput for AHE, without compression and H-RLEAHE technique is reduced by 88.36%, 50.67% and 25.10%, respectively, compared to RLE.
Figure 7. Results of Case Study 1-3: 2 × 4, 100 Nodes, BS at left edge. (a) Alive Nodes in Case Study 1-3, (b) Energy in Case Study 1-3, (c) PDR in Case Study 1-3, (d) Throughput in Case Study 1-3, (e) Packets sent to BS in Case Study 1-3.

6.5. Case Study 1-4: 2 × 4 Grids, 100 Nodes, BS at Corner

The scenario demonstrated in Figure 8 places BS at a corner. Here, the network lifetime for AHE, without compression and H-RLEAHE techniques reduces by 88.02%, 48.63% and 21.81%, respectively, compared to RLE. In addition, the throughput for AHE, without compression and H-RLEAHE technique is 88.01%, 50.82% and 24.89%, respectively, compared to RLE.
Figure 8. Results of Case Study 1-4: 2 × 4, 100 Nodes, BS at corner. (a) Alive Nodes in Case Study 1-4, (b) Energy in Case Study 1-4, (c) PDR in Case Study 1-4, (d) Throughput in Case Study 1-4, (e) Packets sent to BS in Case Study 1-4.

6.6. Case Study 2: 4 × 4 Grids, 100 Nodes, BS at Center

Figure 9 shows the results of Case Study 2: 4 × 4 grids, 100 nodes, where the network structure is divided into 16 grids with the different cluster heads deployed at random locations and connected to the BS at the center. The results of alive nodes in Figure 9a shows that with 100 nodes, the network remains alive up to 111 (AHE), 475 (without compression), 719 (H-RLEAHE) and 964 (RLE) rounds, respectively. Compared to RLE, the network lifetime reduces by 88.48%, 50.62% and 25.41%, respectively, for AHE, WC and H-RLEAHE. Further, RLE demonstrates an overall increase in the average energy of the network as shown in Figure 9b. The results in Figure 9c illustrates that packet delivery ratio is higher in RLE as compared to other techniques. Similarly, the total throughput in the network is improved in the RLE as can be visualized in Figure 9d. Finally, packets sent to the BS is also increased for a greater number of rounds in RLE as compared to AHE, no compression and H-RLEAHE, respectively, as shown in Figure 9e.
Figure 9. Results of Case Study 2: 4 × 4, 100 Nodes, BS at Center. (a) Alive Nodes for Case Study 2, (b) Energy for Case Study 2, (c) PDR for Case Study 2, (d) Throughput for Case Study 2, (e) Packets send to BS for Case Study 2.
Comparing Case study 1: 2 × 4 grids, 100 nodes to this, it is clear that while the total number of nodes in both cases is the same, there is a significant distinction in the grid layout. The network performs better in terms of the examined parameters when it is constructed with a 4 × 4 grid. For example, data compression extends network life by 980 rounds as compared to no data compression. Additionally, the network’s topology has shown some improvement in other metrics.

6.7. Case Study 3-1: 4 × 4, 200 Nodes, BS at Center

Results from Case Study 3-1: 4 × 4 grids, 200 nodes with the BS at the center of the network are shown in Figure 10. For RLE compression technique the network is alive for 968 rounds compared to 118 rounds, 478 rounds and 722 rounds for AHE, no compression and H-RLEAHE, respectively. This shows alive nodes in Figure 10a for AHE, without compression (WC) and H-RLEAHE reduces by 87.80%, 50.61% and 25.41%, respectively, compared to RLE. Further, the average energy in the network is improved as the compression technique reduces the data leading to lesser transmission of data and thereby more energy in the network Figure 10b. Figure 10c,d also demonstrate similar trends with respect to PDR and throughput. Figure 10e further demonstrates the efficacy of RLE in terms of average packets sent to the BS compared to AHE, no compression and H-RLEAHE techniques, respectively.
Figure 10. Results of Case Study 3-1: 4 × 4, 200 Nodes, BS at Centre. (a) Alive Nodes for Case Study 3-1, (b) Energy for Case Study 3-1, (c) PDR for Case Study 3-1, (d) Throughput for Case Study 3-1, (e) Packets sent to BS for Case Study 3-1.
To draw the comparison of performance metrics with respect to the case study 2, where the number of grids is same, i.e., 16 but the number of nodes is higher, i.e., 200 nodes, the network remains alive for 968 rounds. Moreover, from Figure 8c–e, minimal improvement in other parameters is witnessed.

6.8. Case Study 3-2: 4 × 4, 200 Nodes, BS at Top Edge

The scenario demonstrated in Figure 11 places BS at top edge. Here, the network stays alive for 111 (AHE), 474 (without compression), 722 (H-RLEAHE), and 971 (RLE) rounds. The network lifetime reduces by 88.56%, 51.18% and 25.64% for AHE, WC and H-RLEAHE, respectively, compared to RLE. In addition, the throughput for AHE, without compression and H-RLEAHE technique reduces by 87.95%, 51.69% and 25.95%, respectively, compared to RLE.
Figure 11. Results of Case Study 3-2: 4 × 4, 200 Nodes, BS at top edge. (a) Alive Nodes for Case Study 3-2, (b) Energy for Case Study 3-2, (c) PDR for Case Study 3-2, (d) Throughput for Case Study 3-2, (e) Packets sent to BS for Case Study 3-2.

6.9. Case Study 3-3: 4 × 4, 200 Nodes, BS at Left Edge

The scenario demonstrated in Figure 12 places BS at the left edge. Here, the network lifetime for AHE, without compression and H-RLEAHE techniques reduces by 87.89%, 50.05% and 25.12%, respectively, when compared to RLE. In addition, the throughput for AHE, without compression and H-RLEAHE model is reduced by 88.33%, 51.97% and 25.10%, respectively, compared to RLE.
Figure 12. Results of Case Study 3-3: 4 × 4, 200 Nodes, BS at left edge. (a) Alive Nodes for Case Study 3-3, (b) Energy for Case Study 3-3, (c) PDR for Case Study 3-3, (d) Throughput for Case Study 3-3, (e) Packets sent to BS for Case Study 3-3.

6.10. Case Study 3-4: 4 × 4, 200 Nodes, BS at Corner

The scenario demonstrated in Figure 13 places BS at a corner. Here, the network lifetime for AHE, without compression and H-RLEAHE techniques reduces by 87.80%, 51.01% and 25.80%, respectively, compared to RLE. In addition, the throughput for AHE, without compression and H- RLEAHE techniques reduces by 87.86%, 52.48% and 25.20%, respectively, compared to RLE.
Figure 13. Results of Case Study 3-4: 4 × 4, 200 Nodes, BS at corner. (a) Alive Nodes for Case Study 3-4, (b) Energy for Case Study 3-4, (c) PDR for Case Study 3-4, (d) Throughput for Case Study 3-4, (e) Packets sent to BS for Case Study 3-4.

6.11. Case Study 4: 10 × 10, 650 Nodes, BS at Center

Figure 14 illustrates the findings of Case Study 4, which was conducted with a grid size of 10 × 10 and 650 nodes. The network topology consisted of 100 grids, and the BS was situated in the center. The results of performance metrics show that the network remains alive for 111 (AHE), 478 (without compression), 722 (H-RLEAHE) and 967 (RLE) rounds, respectively, as shown in Figure 14a. Compared to RLE, the network lifetime reduces by 88.52%, 50.56% and 25.33%, respectively, for AHE, without compression and H-RLEAHE. The average energy in the network is depicted in Figure 14b for the RLE, H-RLEAHE, no compression and AHE technique, respectively. In Figure 14c, the simulation for PDR is demonstrated which shows trivial improvement as compared to previous case studies. Further, in Figure 14d,e RLE demonstrated the increase in residual energy and throughput of the network compared to AHE, no compression and H-RLEAHE.
Figure 14. Results of Case Study 4: 10 × 10, 650 nodes. (a) Alive Nodes for Case Study, (b) Energy for Case Study 4, (c) PDR for Case Study 4, (d) Throughput for Case Study 4, (e) Packets sent to BS for Case Study 4.
In case study 4 the performance of the system is still very similar to the performance of the network in the earlier case studies.

6.12. Case Study 5: 10 × 10, 1250 Nodes, BS at Center

The findings of Case Study 5 with 10 × 10 grids and 1250 nodes are shown in Figure 15. The network topology consists of 100 grids, and the BS is located at the center. Here the network remains alive for 111 (AHE), 484 (without compression), 726 (H-RLEAHE) and 972 (RLE) rounds, respectively. Compared to RLE, the network lifetime reduces by 88.58%, 50.20% and 25.30%, respectively, for AHE, WC and H-RLEAHE.
Figure 15. Results of Case Study 5: 10 × 10, 1250 nodes. (a) Alive Nodes for Case Study 5, (b) Energy for Case Study 5, (c) PDR for Case Study 5, (d) Throughput for Case Study 5, (e) Packets sent to BS for Case Study 5.

6.13. Case Study 6: Study of Data Compression with Elliptic Curve Cryptography (ECC) for 2 × 4, 100 Nodes, BS at the Center

As mentioned earlier, the author also investigated network lifetime while including Elliptic Curve Cryptography (ECC) that can be considered as an alternative for public-key cryptography.
The detailed description of ECC is given by authors in [,]. Adding ECC for 2 × 4 and 100 nodes, with BS in the centre, will allow us to fully analyse the data compression technique. This case study illustrates how the compression method performs when the base station is situated on the edge of a 2 × 4 configuration with 100 nodes. The RLE shows a significant increase in different performance indicators in this scenario. Figure 16a shows that the network remains alive for 111 (AHE), 477 (without compression), 719 (H-RLEAHE) and 967 (RLE) rounds, respectively. Compared to RLE, the network lifetime reduces by 88.52%, 50.67% and 25.64%, respectively, for AHE, WC and H-RLEAHE. As shown in Figure 16b–e, RLE achieves an improvement in all the other performance metrics.
Figure 16. Results of BS at Centre, 2 × 4 100 nodes with ECC. (a) Alive Nodes for Case Study 6, (b) Energy for Case Study 6, (c) PDR for Case Study 6, (d) Throughput for Case Study 6, (e) Packets sent to BS for Case Study 6.

7. Comparative Analysis with Respect to Alive Nodes

A comparative analysis of alive nodes for the various scenarios is illustrated in Figure 17.
Figure 17. Comparative analysis of various scenarios.
From the graphical representation, it is evident that RLE data compression technique outperforms the other models (Without compression, AHE and H-RLEAHE) for all the scenarios. This strengthens the effectiveness and efficiency of RLE data compression model thus advocating its widespread deployment.

8. Conclusions and Future Work

In this paper we have reported the investigative analysis of energy cost of data compression algorithms in WSN for IoT applications. The study includes evaluation of the effectiveness of the established compression techniques, Run Length Encoding (RLE) and Adaptive Huffman Encoding (AHE) for saving energy and thus prolonging lifetime of WSNs. While evaluating energy costs, other metrics such as Packet Delivery Rate (PDR) and throughput have also been considered for the various compression techniques.
While RLE and AHE compression techniques have different strengths and advantages, they also have some drawbacks. This has motivated the authors to embark on proposing and evaluating a hybrid model combining RLE and AHE, named H-RLEAHE. After the compressed data is obtained from RLE, adaptive Huffman encoding is applied to further compress it. The application of RLE ensures that the correlation of data is considered which AHE does not. It is evident from analysis that AHE consumes more energy for compression.
Simulation was carried out for different scenarios wherein the total number of sensor nodes, number of grids and the position of the base station was varied. Compressing the data before transmitting, using any technique, increases the network lifetime when compared to uncompressed data. This is in spite of the extra energy cost of the compression algorithm itself, establishing the efficacy of compression.
Our findings about RLE and AHE conforms with the findings of other researchers who have compared RLE with AHE []. RLE requires much smaller memory than AHE. To derive the benefits of each method, in our research we have extended previous research by evaluating the efficacy of combining RLE with AHE. We conclude that for H-RLEAHE the performance metrics are vastly improved over AHE; however, RLE shows the best performance for all the metrics that have been measured. In those scenarios where the sensor data does not have repeatability, AHE performs better that RLE. Hence in applications where data repeatability is less, but the sensor node has sufficient memory, the proposed hybrid model will be most effective.
The modern era of IoT has brought new obstacles for WSNs. Critical information is shared between a wide variety of networked devices, each of which may use a different set of resources that are, in general, limited. The need to meet stringent constraints, such as real-time reaction, high compression ratio, and data transmission efficiency, has motivated designers to create hybrid algorithms that make the most of the devices’ limited resources []. This research aims to offer a hybrid data compression approach by fusing Run-Length Encoding and Adaptive Huffman Coding, two well-known loss-less compression methods. If you are trying to cut down on the quantity of data you have to send across a network for medical purposes, this integrated solution is a great option [].
In addition to efficiency of data transmission, the protection and security of these IoT based sensor applications from malicious adversary are also important. The study is completed by incorporating data encryption and evaluating its implications on energy costs and network lifetime. This is important for practical WSNs where the sensed data needs to be secured before compression and transmission. In terms of security, ECC is studied, and simulation results show that it does not add any significant overheads which can cause the network lifetime to increase. However, if more complex encryption algorithms, such as Elliptic Curve Digital Signature (ECDSA) and Elliptic Curve Diffie-Hellman (ECDH) [] are used, the effect is likely to be significant. This would form part of future investigative research.
In the future, efforts may broaden towards data aggregation to further enhance the network’s efficiency. Data aggregation involves combining data packets using various bio-inspired routing strategies [,]. To do this, the minimum, maximum, and/or mean of sets of data obtained from sensor nodes are manipulated before being sent on to the sink. It is important to use routing algorithms and data compression techniques for effective data aggregation [].

Author Contributions

Conceptualization, M.M.; Supervision, G.S.G.; Validation, X.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable in this article.

Conflicts of Interest

The authors declare no conflict of interest. The statements made herein are solely the responsibility of authors.

References

  1. Majid, M.; Habib, S.; Javed, A.R.; Rizwan, M.; Srivastava, G.; Gadekallu, T.R.; Lin, J.C.-W. Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review. Sensors 2022, 22, 2087. [Google Scholar] [CrossRef]
  2. Lin, J.C.-W.; Wu, J.M.-T.; Fournier-Viger, P.; Djenouri, Y.; Chen, C.-H.; Zhang, Y. A Sanitization Approach to Secure Shared Data in an IoT Environment. IEEE Acess 2019, 7, 25359–25368. [Google Scholar] [CrossRef]
  3. Dâmaso, A.; Freitas, D.; Rosa, N.; Silva, B.; Maciel, P. Evaluating the Power Consumption of Wireless Sensor Network Applications Using Models. Sensors 2013, 13, 3473–3500. [Google Scholar] [CrossRef]
  4. Sefuba, M.; Walingo, T. Energy-efficient medium access control and routing protocol for multihop wireless sensor networks. IET Wirel. Sens. Syst. 2018, 8, 99–108. [Google Scholar] [CrossRef]
  5. Yemeni, Z.; Wang, H.; Ismael, W.M.; Wang, Y.; Chen, Z. Reliable spatial and temporal data redundancy reduction approach for WSN. Comput. Netw. 2020, 185, 107701. [Google Scholar] [CrossRef]
  6. Kumar, S.; Chaurasiya, V.K. A Strategy for Elimination of Data Redundancy in Internet of Things (IoT) Based Wireless Sensor Network (WSN). IEEE Syst. J. 2018, 13, 1650–1657. [Google Scholar] [CrossRef]
  7. Kshirsagar, R.V.; Jirapure, A.B. A fault tolerant approach to extend network life time of wireless sensor network. In Proceedings of the 2015 International Conference on Advances in Computing, Communications and Informatics, Kochi, India, 10–13 August 2015; pp. 993–998. [Google Scholar] [CrossRef]
  8. Rajesh, L.; Reddy, C.B. Efficient wireless sensor network using nodes sleep/active strategy. In Proceedings of the International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 26–27 August 2016; Volume 2, pp. 1–4. [Google Scholar]
  9. Jayasankar, U.; Thirumal, V.; Ponnurangam, D. A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications. J. King Saud Univ. Comput. Inf. Sci. 2021, 33, 119–140. [Google Scholar] [CrossRef]
  10. Le, T.L.; Vo, M.-H. Lossless Data Compression Algorithm to Save Energy in Wireless Sensor Network. In Proceedings of the 4th International Conference on Green Technology and Sustainable Development (GTSD), Ho Chi Minh City, Vietnam, 23–24 November 2018; pp. 597–600. [Google Scholar]
  11. Chen, C.; Zhang, L.; Tiong, R.L.K. A new lossy compression algorithm for wireless sensor networks using Bayesian predictive coding. Wirel. Netw 2020, 26, 5981–5995. [Google Scholar] [CrossRef]
  12. Wu, M.; Tan, L.; Xiong, N. Data prediction, compression, and recovery in clustered wireless sensor networks for environmental monitoring applications. Inf. Sci. 2016, 329, 800–818. [Google Scholar] [CrossRef]
  13. Aanchal, A.; Kumar, S.; Kaiwartya, O.; Abdullah, A.H. Green computing for wireless sensor networks: Optimization and Huffman coding approach. Peer Peer Netw. Appl. 2017, 10, 592–609. [Google Scholar] [CrossRef]
  14. Sheltami, T.; Musaddiq, M.; Shakshuki, E. Data compression techniques in Wireless Sensor Networks. Futur. Gener. Comput. Syst. 2016, 64, 151–162. [Google Scholar] [CrossRef]
  15. Zhou, B.; Jin, H.; Zheng, R. A Parallel High Speed Lossless Data Compression Algorithm in Large-Scale Wireless Sensor Network. Int. J. Distrib. Sens. Netw. 2015, 11, 795353. [Google Scholar] [CrossRef]
  16. Lungisani, B.A.; Lebekwe, C.K.; Zungeru, A.M.; Yahya, A. Image Compression Techniques in Wireless Sensor Networks: A Survey and Comparison. IEEE Access 2022, 10, 82511–82530. [Google Scholar] [CrossRef]
  17. Manikandan, S.; Chinnadurai, M. Effective Energy Adaptive and Consumption in Wireless Sensor Network Using Distributed Source Coding and Sampling Techniques. Wirel. Pers. Commun. 2021, 118, 1393–1404. [Google Scholar] [CrossRef]
  18. Fute, E.T.; Kamdjou, H.M.; El Amraoui, A.; Nzeukou, A. DDCA-WSN: A Distributed Data Compression and Aggregation Approach for Low Resources Wireless Sensors Networks. Int. J. Wirel. Inf. Netw. 2022, 29, 80–92. [Google Scholar] [CrossRef]
  19. Masoum, A.; Meratnia, N.; Havinga, P.J. A Distributed Compressive Sensing Technique for Data Gathering in Wireless Sensor Networks. Procedia Comput. Sci. 2013, 21, 207–216. [Google Scholar] [CrossRef]
  20. Alemdar, A.; Ibnkahla, M. Wireless sensor networks: Applications and challenges. In Proceedings of the 9th International Symposium on Signal Processing and Its Applications, Sharjah, United Arab Emirates, 12–15 February 2007; pp. 1–6. [Google Scholar]
  21. Khriji, S.; Chéour, R.; Goetz, M.; El Houssaini, D.; Kammoun, I.; Kanoun, O. Measuring energy consumption of a wireless sensor node during transmission: Panstamp. In Proceedings of the IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, Poland, 16–18 May 2018; pp. 274–280. [Google Scholar]
  22. Lin, M.-B.; Lee, J.-F.; Jan, G. A Lossless Data Compression and Decompression Algorithm and Its Hardware Architecture. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2003, 14, 499–510. [Google Scholar] [CrossRef]
  23. Abo-Zahhad, M.; Rajoub, B.A. An effective coding technique for the compression of one-dimensional signals using wavelet transforms. Med. Eng. Phys. 2002, 24, 185–199. [Google Scholar] [CrossRef]
  24. Kattan, A. Universal intelligent data compression systems: A review. In Proceedings of the 2nd Computer Science and Electronic Engineering Conference (CEEC), Colchester, UK, 8–9 September 2010; pp. 1–10. [Google Scholar]
  25. Cristiano, M.; Ivanil, A.; Bonatti, S.; Peres, P.L.D. Adaptive Run Length Encoding method for the compression of electrocardiograms. Med. Eng. Phys. 2013, 35, 145–153. [Google Scholar]
  26. David, A.; Maluf, P.; Tran, B.; Tran, D. Effective Data Representation and Compression in Ground Data Systems. In Proceedings of the IEEE Aerospace Conference, Big Sky, MT, USA, 1–8 March 2008; pp. 1–7. [Google Scholar]
  27. Qian, S.-E.; Bergeron, M.; Cunningham, I.; Gagnon, L.; Hollinger, A. Near lossless data compression onboard a hyperspectral satellite. IEEE Trans. Aerosp. Electron. Syst. 2006, 42, 851–866. [Google Scholar] [CrossRef]
  28. Kiely, A.; Klimesh, M. The ICER Progressive Wavelet Image Compressor. IPN Prog. Rep. 2003, 42, 14–46. [Google Scholar]
  29. Logeswaran, R. Fast Two-Stage Lempel-Ziv Lossless Numeric Telemetry Data Compression Using a Neural Network Predictor. J. Univers. Comput. Sci. 2004, 10, 1199–1211. [Google Scholar]
  30. Rong, C.D.; Hong, L.J.; Yong, Z.G. Algorithm design for launch vehicle telemetry data compression. J. Astronaut. 2001, 22, 12–17. [Google Scholar]
  31. Chan, H.L.; Siao, Y.C.; Chen, S.W. Wavelet-based ECG compression by bit-field preserving and running length encoding. Comput. Methods Programs Biomed. 2008, 90, 1–8. [Google Scholar] [CrossRef] [PubMed]
  32. Steinwandt, R.; Villányi, V.I. A one-time signature using run-length encoding. Inf. Process. Lett. 2008, 108, 179–185. [Google Scholar] [CrossRef]
  33. Stabno, M.; Wrembel, R. RLH: Bitmap compression technique based on run-length and Huffman encoding. Inf. Syst. 2009, 34, 400–414. [Google Scholar] [CrossRef]
  34. Korpela, E.; Forsten, J.; Hamalainen, A.; Ruoskanen, J.; Eskelinen, P. A Hardware Signal Processing Platform for Sensor Systems. IEEE Aerosp. Electron. Syst. Mag. 2006, 21, 22–25. [Google Scholar] [CrossRef]
  35. Nunez, J.; Jones, S. Lossless data compression programmable hardware for high-speed data networks. In Proceedings of the IEEE International Conference on Field-Programmable Technology, Hong Kong, China, 16–18 December 2002; pp. 290–293. [Google Scholar] [CrossRef]
  36. Kao, C.-F.; Huang, S.-M.; Huang, I.-J. A Hardware Approach to Real-Time Program Trace Compression for Embedded Processors. IEEE Trans. Circuits Syst. I: Regul. Pap. 2007, 54, 530–543. [Google Scholar] [CrossRef]
  37. Hashempour, H.; Lombardi, F. Application of Arithmetic Coding to Compression of VLSI Test Data. IEEE Trans. Comput. 2005, 54, 1166–1177. [Google Scholar] [CrossRef]
  38. Lam, S.M.I.; Fahmy, S. Energy-efficient provenance transmission in large-scale wireless sensor networks. In Proceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networksm, Lucca, Italy, 20–24 June 2011; pp. 1–6. [Google Scholar]
  39. Wang, Y.C. Data compression techniques in wireless sensor networks. Pervasive Comput. 2012, 61, 75–77. [Google Scholar]
  40. Capo-Chichi, E.P.; Guyennet, H.; Friedt, J. K-RLE: A New Data Compression Algorithm for Wireless Sensor Network. In Proceedings of the 2009 Third International Conference on Sensor Technologies and Applications, Athens, Greece, 18–23 June 2009; pp. 502–507. [Google Scholar] [CrossRef]
  41. Salomon, D. Data Compression: The Complete Reference; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2004. [Google Scholar]
  42. Sayood, K. Introduction to Data Compression, 5th ed.; Morgan Kaufmann: Burlington, MA, USA, 2006; pp. 58–65. [Google Scholar]
  43. Razzaque, M.A.; Bleakley, C.; Dobson, S. Compression in wireless sensor networks: A survey and comparative evaluation. ACM Trans. Sens. Netw. (TOSN) 2013, 10, 1–44. [Google Scholar] [CrossRef]
  44. Labelled Wireless Sensor Network Data Repository (LWSNDR). Available online: https://home.uncg.edu/cmp/downloads/lwsndr.html (accessed on 20 June 2022).
  45. Abu Alsheikh, M.; Lin, S.; Niyato, D.; Tan, H.-P. Rate-Distortion Balanced Data Compression for Wireless Sensor Networks. IEEE Sens. J. 2016, 16, 5072–5083. [Google Scholar] [CrossRef]
  46. Zordan, D.; Martinez, B.; Vilajosana, I.; Rossi, M. To Compress or Not to Compress: Processing vs Transmission Tradeoffs for Energy Constrained Sensor Networking. arXiv 2021, arXiv:1206.2129v1. [Google Scholar]
  47. Mishra, M.; Gupta, G.S.; Gui, X. Network Lifetime Improvement through Energy-Efficient Hybrid Routing Protocol for IoT Applications. Sensors 2021, 21, 7439. [Google Scholar] [CrossRef] [PubMed]
  48. Ali, R. Elliptic curve cryptography a new way for encryption. In Proceedings of the 2008 International Symposium on Biometrics and Security Technologies, Isalambad, Pakistan, 23–24 April 2008; pp. 1–5. [Google Scholar]
  49. Tawalbeh, L.; Mowafi, M.; Aljoby, W. Use of elliptic curve cryptography for multimedia encryption. IET Inf. Secur. 2013, 7, 67–74. [Google Scholar] [CrossRef]
  50. Reinhardt, A.; Christin, D.; Hollick, M.; Steinmetz, R. On the energy efficiency of lossless data compression in wireless sensor networks. In Proceedings of the 34th Conference on Local Computer Networks, Zurich, Switzerland, 20–23 October 2009; pp. 873–880. [Google Scholar] [CrossRef]
  51. Giorgi, G. A Combined Approach for Real-Time Data Compression in Wireless Body Sensor Networks. IEEE Sens. J. 2017, 17, 6129–6135. [Google Scholar] [CrossRef]
  52. Deepu, C.J.; Heng, C.-H.; Lian, Y. A Hybrid Data Compression Scheme for Power Reduction in Wireless Sensors for IoT. IEEE Trans. Biomed. Circuits Syst. 2017, 11, 245–254. [Google Scholar] [CrossRef]
  53. Ghanmy, N.; Fourati, L.C.; Kamoun, L. Elliptic curve cryptography for WSN and SPA attacks method for energy evaluation. J. Netw. 2014, 9, 2943–2950. [Google Scholar] [CrossRef]
  54. Wang, C.-H.; Hu, H.-S.; Zhang, Z.-G.; Guo, Y.-X.; Zhang, J.-F. Distributed energy-efficient clustering routing protocol for wireless sensor networks using affinity propagation and fuzzy logic. Soft Comput. 2022, 26, 7143–7158. [Google Scholar] [CrossRef]
  55. Rodríguez, A.; Del-Valle-Soto, C.; Velázquez, R. Energy-Efficient Clustering Routing Protocol for Wireless Sensor Networks Based on Yellow Saddle Goatfish Algorithm. Mathematics 2020, 8, 1515. [Google Scholar] [CrossRef]
  56. Ketshabetswe, K.L.; Zungeru, A.M.; Mtengi, B.; Lebekwe, C.K.; Prabaharan, S.R.S. Data Compression Algorithms for Wireless Sensor Networks: A Review and Comparison. IEEE Access 2021, 9, 136872–136891. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.