X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/ThesisAli.git/blobdiff_plain/647071a417ef52e995581f796c0c32cf6915cd51..a1fa2318e35310d49bb85ff841177695576f925a:/Thesis.toc?ds=sidebyside diff --git a/Thesis.toc b/Thesis.toc old mode 100644 new mode 100755 index 68e168e..08f62f1 --- a/Thesis.toc +++ b/Thesis.toc @@ -1,120 +1,106 @@ \select@language {english} -\contentsline {chapter}{Table of Contents}{viii}{chapter*.1} -\contentsline {chapter}{List of Figures}{x}{chapter*.2} -\contentsline {chapter}{List of Tables}{xi}{chapter*.3} -\contentsline {chapter}{List of Algorithms}{xiii}{chapter*.4} -\contentsline {chapter}{Introduction }{xv}{chapter*.5} -\contentsline {section}{\numberline {0.1}General Introduction}{xv}{section.0.1} -\contentsline {section}{\numberline {0.2}Motivation of the Dissertation}{xvi}{section.0.2} -\contentsline {section}{\numberline {0.3}The Objective of this Dissertation}{xvi}{section.0.3} -\contentsline {section}{\numberline {0.4}The main Contributions of this Dissertation}{xvii}{section.0.4} -\contentsline {section}{\numberline {0.5}Dissertation Outline}{xviii}{section.0.5} -\contentsline {part}{I\hspace {1em}Scientific Background}{xix}{part.1} -\contentsline {chapter}{\numberline {1}Wireless Sensor Networks}{1}{chapter.1} -\contentsline {section}{\numberline {1.1}Introduction}{1}{section.1.1} -\contentsline {section}{\numberline {1.2}Wireless Sensor Network Architecture}{2}{section.1.2} -\contentsline {section}{\numberline {1.3}Types of Wireless Sensor Networks}{4}{section.1.3} -\contentsline {section}{\numberline {1.4}Wireless Sensor Network Applications}{6}{section.1.4} -\contentsline {section}{\numberline {1.5}The Main Challenges in Wireless Sensor Networks}{9}{section.1.5} -\contentsline {section}{\numberline {1.6}Energy-Efficient Mechanisms in Wireless Sensor Networks}{11}{section.1.6} -\contentsline {subsection}{\numberline {1.6.1}Energy-Efficient Routing:}{11}{subsection.1.6.1} -\contentsline {subsubsection}{\numberline {1.6.1.1}Routing Metric based on Residual Energy:}{12}{subsubsection.1.6.1.1} -\contentsline {subsubsection}{\numberline {1.6.1.2}Multipath Routing:}{12}{subsubsection.1.6.1.2} -\contentsline {subsection}{\numberline {1.6.2}Cluster Architectures:}{12}{subsection.1.6.2} -\contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes:}{13}{subsection.1.6.3} -\contentsline {subsubsection}{\numberline {1.6.3.1}Wake up Scheduling Schemes:}{13}{subsubsection.1.6.3.1} -\contentsline {subsubsection}{\numberline {1.6.3.2}Topology Control Schemes:}{15}{subsubsection.1.6.3.2} -\contentsline {subsection}{\numberline {1.6.4}Data-Driven Schemes:}{16}{subsection.1.6.4} -\contentsline {subsubsection}{\numberline {1.6.4.1}Data Reduction Schemes}{16}{subsubsection.1.6.4.1} -\contentsline {subsubsection}{\numberline {1.6.4.2}Energy Efficient Data Acquisition Schemes}{16}{subsubsection.1.6.4.2} -\contentsline {subsection}{\numberline {1.6.5}Battery Repletion:}{17}{subsection.1.6.5} -\contentsline {subsubsection}{\numberline {1.6.5.1}Energy Harvesting:}{17}{subsubsection.1.6.5.1} -\contentsline {subsubsection}{\numberline {1.6.5.2}Wireless Charging:}{17}{subsubsection.1.6.5.2} -\contentsline {subsection}{\numberline {1.6.6}Radio Optimization:}{17}{subsection.1.6.6} -\contentsline {subsection}{\numberline {1.6.7}Relay nodes and Sink Mobility:}{17}{subsection.1.6.7} -\contentsline {subsubsection}{\numberline {1.6.7.1}Relay node placement:}{18}{subsubsection.1.6.7.1} -\contentsline {subsubsection}{\numberline {1.6.7.2}Sink Mobility:}{18}{subsubsection.1.6.7.2} -\contentsline {section}{\numberline {1.7}Network Lifetime in Wireless Sensor Networks}{18}{section.1.7} -\contentsline {section}{\numberline {1.8}Coverage in Wireless Sensor Networks }{19}{section.1.8} -\contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems:}{20}{section.1.9} -\contentsline {section}{\numberline {1.10}Energy Consumption Modeling:}{21}{section.1.10} -\contentsline {section}{\numberline {1.11}Conclusion}{23}{section.1.11} -\contentsline {chapter}{\numberline {2}Related Literatures}{25}{chapter.2} -\contentsline {section}{\numberline {2.1}Introduction}{25}{section.2.1} -\contentsline {section}{\numberline {2.2}Coverage Algorithms}{26}{section.2.2} -\contentsline {subsection}{\numberline {2.2.1}Centralized Algorithms}{27}{subsection.2.2.1} -\contentsline {subsection}{\numberline {2.2.2}Distributed Algorithms}{29}{subsection.2.2.2} -\contentsline {section}{\numberline {2.3}Conclusion}{32}{section.2.3} -\contentsline {part}{II\hspace {1em}Contributions}{35}{part.2} -\contentsline {chapter}{\numberline {3}Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{37}{chapter.3} -\contentsline {section}{\numberline {3.1}Summary}{37}{section.3.1} -\contentsline {section}{\numberline {3.2}DESCRIPTION OF THE DILCO PROTOCOL}{37}{section.3.2} -\contentsline {subsection}{\numberline {3.2.1}Assumptions and Network Model}{37}{subsection.3.2.1} -\contentsline {subsection}{\numberline {3.2.2}Primary Point Coverage Model}{38}{subsection.3.2.2} -\contentsline {subsection}{\numberline {3.2.3}Main Idea}{39}{subsection.3.2.3} -\contentsline {subsubsection}{\numberline {3.2.3.1}Information Exchange Phase}{40}{subsubsection.3.2.3.1} -\contentsline {subsubsection}{\numberline {3.2.3.2}Leader Election Phase}{41}{subsubsection.3.2.3.2} -\contentsline {subsubsection}{\numberline {3.2.3.3}Decision phase}{41}{subsubsection.3.2.3.3} -\contentsline {subsubsection}{\numberline {3.2.3.4}Sensing phase}{41}{subsubsection.3.2.3.4} -\contentsline {section}{\numberline {3.3}COVERAGE PROBLEM FORMULATION}{41}{section.3.3} -\contentsline {section}{\numberline {3.4}Simulation Results and Analysis}{43}{section.3.4} -\contentsline {subsection}{\numberline {3.4.1}Simulation Framework}{43}{subsection.3.4.1} -\contentsline {subsection}{\numberline {3.4.2}Energy Consumption Model}{44}{subsection.3.4.2} -\contentsline {subsection}{\numberline {3.4.3}Performance Metrics}{44}{subsection.3.4.3} -\contentsline {subsection}{\numberline {3.4.4}Performance Analysis for Different Subregions}{46}{subsection.3.4.4} -\contentsline {subsubsection}{\numberline {3.4.4.1}Coverage Ratio}{46}{subsubsection.3.4.4.1} -\contentsline {subsubsection}{\numberline {3.4.4.2}Active Sensors Ratio}{47}{subsubsection.3.4.4.2} -\contentsline {subsubsection}{\numberline {3.4.4.3}The percentage of stopped simulation runs}{47}{subsubsection.3.4.4.3} -\contentsline {subsubsection}{\numberline {3.4.4.4}The Energy Consumption}{48}{subsubsection.3.4.4.4} -\contentsline {subsubsection}{\numberline {3.4.4.5}Execution Time}{49}{subsubsection.3.4.4.5} -\contentsline {subsubsection}{\numberline {3.4.4.6}The Network Lifetime}{49}{subsubsection.3.4.4.6} -\contentsline {subsection}{\numberline {3.4.5}Performance Analysis for Primary Point Models}{51}{subsection.3.4.5} -\contentsline {subsubsection}{\numberline {3.4.5.1}Coverage Ratio}{51}{subsubsection.3.4.5.1} -\contentsline {subsubsection}{\numberline {3.4.5.2}Active Sensors Ratio}{51}{subsubsection.3.4.5.2} -\contentsline {subsubsection}{\numberline {3.4.5.3}The percentage of stopped simulation runs}{53}{subsubsection.3.4.5.3} -\contentsline {subsubsection}{\numberline {3.4.5.4}The Energy Consumption}{53}{subsubsection.3.4.5.4} -\contentsline {subsubsection}{\numberline {3.4.5.5}Execution Time}{54}{subsubsection.3.4.5.5} -\contentsline {subsubsection}{\numberline {3.4.5.6}The Network Lifetime}{55}{subsubsection.3.4.5.6} -\contentsline {subsection}{\numberline {3.4.6}Performance Comparison with other Approaches}{56}{subsection.3.4.6} -\contentsline {subsubsection}{\numberline {3.4.6.1}Coverage Ratio}{56}{subsubsection.3.4.6.1} -\contentsline {subsubsection}{\numberline {3.4.6.2}Active Sensors Ratio}{57}{subsubsection.3.4.6.2} -\contentsline {subsubsection}{\numberline {3.4.6.3}The percentage of stopped simulation runs}{58}{subsubsection.3.4.6.3} -\contentsline {subsubsection}{\numberline {3.4.6.4}The Energy Consumption}{58}{subsubsection.3.4.6.4} -\contentsline {subsubsection}{\numberline {3.4.6.5}The Network Lifetime}{59}{subsubsection.3.4.6.5} -\contentsline {section}{\numberline {3.5}Conclusion}{61}{section.3.5} -\contentsline {chapter}{\numberline {4}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{63}{chapter.4} -\contentsline {section}{\numberline {4.1}Summary}{63}{section.4.1} -\contentsline {section}{\numberline {4.2}MuDiLCO protocol description}{63}{section.4.2} -\contentsline {subsection}{\numberline {4.2.1}Background Idea}{63}{subsection.4.2.1} -\contentsline {subsection}{\numberline {4.2.2}Information Exchange Phase}{64}{subsection.4.2.2} -\contentsline {subsection}{\numberline {4.2.3}Leader Election phase}{64}{subsection.4.2.3} -\contentsline {subsection}{\numberline {4.2.4}Decision phase}{65}{subsection.4.2.4} -\contentsline {subsection}{\numberline {4.2.5}Sensing phase}{66}{subsection.4.2.5} -\contentsline {section}{\numberline {4.3}Experimental Study and Analysis}{66}{section.4.3} -\contentsline {subsection}{\numberline {4.3.1}Simulation Setup}{66}{subsection.4.3.1} -\contentsline {subsection}{\numberline {4.3.2}Metrics}{67}{subsection.4.3.2} -\contentsline {subsection}{\numberline {4.3.3}Results analysis and Comparison }{69}{subsection.4.3.3} -\contentsline {subsection}{\numberline {4.3.4}Coverage ratio}{69}{subsection.4.3.4} -\contentsline {subsection}{\numberline {4.3.5}Active sensors ratio}{69}{subsection.4.3.5} -\contentsline {subsection}{\numberline {4.3.6}Stopped simulation runs}{70}{subsection.4.3.6} -\contentsline {subsection}{\numberline {4.3.7}Energy consumption}{71}{subsection.4.3.7} -\contentsline {subsection}{\numberline {4.3.8}Execution time}{71}{subsection.4.3.8} -\contentsline {subsection}{\numberline {4.3.9}Network lifetime}{72}{subsection.4.3.9} -\contentsline {section}{\numberline {4.4}Conclusion}{72}{section.4.4} -\contentsline {chapter}{\numberline {5}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{75}{chapter.5} -\contentsline {section}{\numberline {5.1}summary}{75}{section.5.1} -\contentsline {section}{\numberline {5.2}THE PeCO PROTOCOL DESCRIPTION}{75}{section.5.2} -\contentsline {subsection}{\numberline {5.2.1}Assumptions and Models}{75}{subsection.5.2.1} -\contentsline {subsection}{\numberline {5.2.2}The Main Idea}{78}{subsection.5.2.2} -\contentsline {subsection}{\numberline {5.2.3}PeCO Protocol Algorithm}{79}{subsection.5.2.3} -\contentsline {section}{\numberline {5.3}LIFETIME COVERAGE PROBLEM FORMULATION}{80}{section.5.3} -\contentsline {section}{\numberline {5.4}Performance Evaluation and Analysis}{82}{section.5.4} -\contentsline {subsection}{\numberline {5.4.1}Simulation Settings}{82}{subsection.5.4.1} -\contentsline {subsection}{\numberline {5.4.2}Simulation Results}{82}{subsection.5.4.2} -\contentsline {subsubsection}{\numberline {5.4.2.1}Coverage Ratio}{83}{subsubsection.5.4.2.1} -\contentsline {subsubsection}{\numberline {5.4.2.2}Active Sensors Ratio}{84}{subsubsection.5.4.2.2} -\contentsline {subsubsection}{\numberline {5.4.2.3}The Energy Consumption}{84}{subsubsection.5.4.2.3} -\contentsline {subsubsection}{\numberline {5.4.2.4}The Network Lifetime}{84}{subsubsection.5.4.2.4} -\contentsline {section}{\numberline {5.5}Conclusion}{85}{section.5.5} -\contentsline {part}{III\hspace {1em}Conclusions and Perspectives}{89}{part.3} -\contentsline {part}{Bibliographie}{100}{chapter*.6} +\contentsline {chapter}{Table of Contents}{4}{chapter*.1} +\contentsline {chapter}{List of Figures}{6}{chapter*.2} +\contentsline {chapter}{List of Tables}{7}{chapter*.3} +\contentsline {chapter}{List of Algorithms}{9}{chapter*.4} +\contentsline {chapter}{Introduction }{11}{chapter*.5} +\contentsline {section}{\numberline {0.1}General Introduction}{11}{section.0.1} +\contentsline {section}{\numberline {0.2}Motivation of the Dissertation}{12}{section.0.2} +\contentsline {section}{\numberline {0.3}The Objective of this Dissertation}{12}{section.0.3} +\contentsline {section}{\numberline {0.4}The main Contributions of this Dissertation}{13}{section.0.4} +\contentsline {section}{\numberline {0.5}Dissertation Outline}{14}{section.0.5} +\contentsline {part}{I\hspace {1em}Scientific Background}{15}{part.1} +\contentsline {chapter}{\numberline {1}Wireless Sensor Networks}{17}{chapter.1} +\contentsline {section}{\numberline {1.1}Introduction}{17}{section.1.1} +\contentsline {section}{\numberline {1.2}Wireless Sensor Network Architecture}{18}{section.1.2} +\contentsline {section}{\numberline {1.3}Types of Wireless Sensor Networks}{20}{section.1.3} +\contentsline {section}{\numberline {1.4}Wireless Sensor Network Applications}{22}{section.1.4} +\contentsline {section}{\numberline {1.5}The Main Challenges in Wireless Sensor Networks}{25}{section.1.5} +\contentsline {section}{\numberline {1.6}Energy-Efficient Mechanisms in Wireless Sensor Networks}{27}{section.1.6} +\contentsline {subsection}{\numberline {1.6.1}Energy-Efficient Routing:}{27}{subsection.1.6.1} +\contentsline {subsubsection}{\numberline {1.6.1.1}Routing Metric based on Residual Energy:}{27}{subsubsection.1.6.1.1} +\contentsline {subsubsection}{\numberline {1.6.1.2}Multipath Routing:}{28}{subsubsection.1.6.1.2} +\contentsline {subsection}{\numberline {1.6.2}Cluster Architectures:}{28}{subsection.1.6.2} +\contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes:}{28}{subsection.1.6.3} +\contentsline {subsubsection}{\numberline {1.6.3.1}Wake up Scheduling Schemes:}{29}{subsubsection.1.6.3.1} +\contentsline {subsubsection}{\numberline {1.6.3.2}Topology Control Schemes:}{31}{subsubsection.1.6.3.2} +\contentsline {subsection}{\numberline {1.6.4}Data-Driven Schemes:}{32}{subsection.1.6.4} +\contentsline {subsubsection}{\numberline {1.6.4.1}Data Reduction Schemes}{32}{subsubsection.1.6.4.1} +\contentsline {subsubsection}{\numberline {1.6.4.2}Energy Efficient Data Acquisition Schemes}{32}{subsubsection.1.6.4.2} +\contentsline {subsection}{\numberline {1.6.5}Battery Repletion:}{33}{subsection.1.6.5} +\contentsline {subsubsection}{\numberline {1.6.5.1}Energy Harvesting:}{33}{subsubsection.1.6.5.1} +\contentsline {subsubsection}{\numberline {1.6.5.2}Wireless Charging:}{33}{subsubsection.1.6.5.2} +\contentsline {subsection}{\numberline {1.6.6}Radio Optimization:}{33}{subsection.1.6.6} +\contentsline {subsection}{\numberline {1.6.7}Relay nodes and Sink Mobility:}{33}{subsection.1.6.7} +\contentsline {subsubsection}{\numberline {1.6.7.1}Relay node placement:}{33}{subsubsection.1.6.7.1} +\contentsline {subsubsection}{\numberline {1.6.7.2}Sink Mobility:}{34}{subsubsection.1.6.7.2} +\contentsline {section}{\numberline {1.7}Network Lifetime in Wireless Sensor Networks}{34}{section.1.7} +\contentsline {section}{\numberline {1.8}Coverage in Wireless Sensor Networks }{35}{section.1.8} +\contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems:}{36}{section.1.9} +\contentsline {section}{\numberline {1.10}Energy Consumption Modeling:}{37}{section.1.10} +\contentsline {section}{\numberline {1.11}Conclusion}{39}{section.1.11} +\contentsline {chapter}{\numberline {2}Related Works on Coverage Problems}{41}{chapter.2} +\contentsline {section}{\numberline {2.1}Introduction}{41}{section.2.1} +\contentsline {section}{\numberline {2.2}Centralized Algorithms}{43}{section.2.2} +\contentsline {section}{\numberline {2.3}Distributed Algorithms}{45}{section.2.3} +\contentsline {subsection}{\numberline {2.3.1}GAF}{46}{subsection.2.3.1} +\contentsline {subsection}{\numberline {2.3.2}DESK}{48}{subsection.2.3.2} +\contentsline {section}{\numberline {2.4}Conclusion}{49}{section.2.4} +\contentsline {chapter}{\numberline {3}Evaluation Tools and Optimization Solvers}{53}{chapter.3} +\contentsline {section}{\numberline {3.1}Introduction}{53}{section.3.1} +\contentsline {section}{\numberline {3.2}Evaluation Tools}{53}{section.3.2} +\contentsline {subsection}{\numberline {3.2.1}Testbed Tools}{54}{subsection.3.2.1} +\contentsline {subsection}{\numberline {3.2.2}Simulation Tools}{55}{subsection.3.2.2} +\contentsline {section}{\numberline {3.3}Optimization Solvers}{60}{section.3.3} +\contentsline {section}{\numberline {3.4}Conclusion}{63}{section.3.4} +\contentsline {part}{II\hspace {1em}Contributions}{65}{part.2} +\contentsline {chapter}{\numberline {4}Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{67}{chapter.4} +\contentsline {section}{\numberline {4.1}Introduction}{67}{section.4.1} +\contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{68}{section.4.2} +\contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{68}{subsection.4.2.1} +\contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{69}{subsection.4.2.2} +\contentsline {subsection}{\numberline {4.2.3}Main Idea}{70}{subsection.4.2.3} +\contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{71}{subsubsection.4.2.3.1} +\contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{71}{subsubsection.4.2.3.2} +\contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{71}{subsubsection.4.2.3.3} +\contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{71}{subsubsection.4.2.3.4} +\contentsline {section}{\numberline {4.3}Primary Points based Coverage Problem Formulation}{72}{section.4.3} +\contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{74}{section.4.4} +\contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{74}{subsection.4.4.1} +\contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{74}{subsection.4.4.2} +\contentsline {subsection}{\numberline {4.4.3}Energy Consumption Model}{74}{subsection.4.4.3} +\contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{75}{subsection.4.4.4} +\contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Subregions}{76}{subsection.4.4.5} +\contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Primary Point Models}{82}{subsection.4.4.6} +\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{87}{subsection.4.4.7} +\contentsline {section}{\numberline {4.5}Conclusion}{93}{section.4.5} +\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{95}{chapter.5} +\contentsline {section}{\numberline {5.1}Introduction}{95}{section.5.1} +\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{96}{section.5.2} +\contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{96}{subsection.5.2.1} +\contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{97}{section.5.3} +\contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{99}{section.5.4} +\contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{99}{subsection.5.4.1} +\contentsline {subsection}{\numberline {5.4.2}Metrics}{100}{subsection.5.4.2} +\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{101}{subsection.5.4.3} +\contentsline {section}{\numberline {5.5}Conclusion}{106}{section.5.5} +\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{109}{chapter.6} +\contentsline {section}{\numberline {6.1}Introduction}{109}{section.6.1} +\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{110}{section.6.2} +\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{110}{subsection.6.2.1} +\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{113}{subsection.6.2.2} +\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{113}{subsection.6.2.3} +\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{114}{section.6.3} +\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{116}{section.6.4} +\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{116}{subsection.6.4.1} +\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{117}{subsection.6.4.2} +\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{118}{subsubsection.6.4.2.1} +\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{118}{subsubsection.6.4.2.2} +\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{119}{subsubsection.6.4.2.3} +\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{119}{subsubsection.6.4.2.4} +\contentsline {section}{\numberline {6.5}Conclusion}{122}{section.6.5} +\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{123}{part.3} +\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{125}{chapter.7} +\contentsline {section}{\numberline {7.1}Conclusion}{125}{section.7.1} +\contentsline {section}{\numberline {7.2}Perspectives}{126}{section.7.2} +\contentsline {part}{Bibliographie}{141}{chapter*.6}