DOI QR코드

DOI QR Code

Efficient Energy and Position Aware Routing Protocol for Wireless Sensor Networks

  • Shivalingagowda, Chaya (Department of Electronics and Communication Kalsekar Engineering College) ;
  • Jayasree, P.V.Y (Department of Electronics and Communication GITAM university) ;
  • Sah, Dinesh.K. (Computer Science and Engineering Department Indian institute of technology (Indian school of mines) Dhanbad)
  • Received : 2019.08.14
  • Accepted : 2020.03.16
  • Published : 2020.05.31

Abstract

Reliable and secure data transmission in the application environment assisted by the wireless sensor network is one of the major challenges. Problem like blind forwarding and data inaccessibility affect the efficiency of overall infrastructure performance. This paper proposes routing protocol for forwarding and error recovery during packet loss. The same is achieved by energy and hops distance-based formulation of the routing mechanism. The reachability of the intermediate node to the source node is the major factor that helps in improving the lifetime of the network. On the other hand, intelligent hop selection increases the reliability over continuous data transmission. The number of hop count is factor of hop weight and available energy of the node. The comparison over the previous state of the art using QualNet-7.4 network simulator shows the effectiveness of proposed work in terms of overall energy conservation of network and reliable data delivery. The simulation results also show the elimination of blind forwarding and data inaccessibility.

Keywords

1. Introduction

Wireless sensor networks (WSNs) is increasingly getting popular for the application environment due to its robust and low energy consumption attributes. A scenario like a battlefield, agriculture farm, underwater surveillance, etc., is some of the application environment that is benefited from WSNs monitoring mechanism [1, 2, 3]. Like other networking structure, such as mobile ad-hoc networks (MANET), vehicular network, body area network, etc., requires a set of networking protocol to establish the infrastructure. This paper focuses on the network layer aspect of WSNs. The routing protocols at the network layer of WSNs are classified as flat, hierarchical, location-based [4]. In flat-based routing protocol, all nodes co-ordinate at the same time for the transfer of data [5]. Some of the most widely discussed examples in literature are, sensor protocol for information via negotiation (SPIN) [6], Direct Diffusion (DD) [7], Rumor Routing (RR) [8] and Gradient-based Routing (GBR) [9]. These protocols, when used in a large network, cause energy consumption due to data generated by each node deployed in the target area. Hierarchical routing overcomes the drawback of flat routing by long-range data transmission by replacing the concept of the source to the destination from individual node to cluster-based node [10]. Cluster head collects the data from the node in its cluster and indirectly communicate the gathered data from an individual node to the destination node. Widely discussed approaches in this category are, low energy adaptive clustering hierarchy (LEACH) [11], Minimum energy communication network (MECH) [12] and power-efficient gathering in sensor information system (PEGASIS) [13]. In another approach, the routing decision is made based on the geographical location of the node, identified with the global positioning system (GPS) [14]. This approach helps in identifying the closest intermediate nodes in a route from source to destination, enabling the decision of duty cycling scheduling of other nodes [15]. Some of a good example is sequential assignment routing (SAR) [16], ad-hoc positioning system, and geographic adaptive fidelity. This proposal focuses on the drawback of Flat based routing and modifies the SPIN protocol approach to overcome the problem of Blind forwarding and Data in-accessibility. The key idea is energy and distance-based selection of intermediate node for data forwarding. In each step, the protocol identifies the closest node with the maximum remaining energy for forwarding the data. The proposed approach also balances the energy consumption due to data forwarding, eliminating the problem of data inaccessibility due to the coverage hole. The results are generated and compared in QualNet7.4 network simulator and are compared with SPIN and Direct Diffusion routing protocol. The key research contribution of the proposal is the identification of the shortest route from source to sink and is determined by identifying the remaining energy and hop count of source node from the sink node. The proposal eliminates the problem of blind forwarding and data inaccessibility and also balances the energy consumption of an individual node in the network avoiding the problem of hot-spot. The rest of the paper is organized as follows. Section 2 presents the system model and problem definition. In section 3, related work has given for understanding of the problem. In section 4, problem formulation has been discussed followed by section 5, in which proposed work has given. In the performance section, the approaches with its pros and cons are discussed. Moreover, in the performance analysis section, the assertion of the performances of individual’s parameters of the proposal over the existing approach has discussed with each performance metrics. The given protocols being evaluated through simulation extensive simulation and have been discussed in section 6. Finally, conclusions are drawn in section 7.

2. System model

2.1 Scenario Description

The underlying target environment A is of dimension (Ax X Ay). A mixture P of stationary nodes, are deployed in target area A; randomly deployed sensor node location is identified as 𝑝𝑖 = (𝑝𝑥, 𝑝𝑦).Where coordinates of latitude and longitude position are given by 𝑝𝑥 and 𝑝𝑦, respectively. QualNet 7.4 network simulator is used for creating simulation scenarios [17], for tractability, 𝐴 is subdivide in grid of square cells of size . Thus, 𝐴 is modeled as a lattice H of size 𝐻𝑥 × Hy, where 𝐻𝑥 = \([{a_x \over d}]\)  and  Hy =\([{a_y \over d}]\)  . After modeling the target area into grid of square cell, sensor node 𝑝𝑖 situated at (𝑝𝑥, 𝑝𝑦) is in the cell \(c_i ∈ ([{x_i \over d}], [{y_i \over d}]) ∈ H\) . Sensing model of node in terms of isotropic and communication aspect is presented as circle of radius 𝑟𝑠 and 𝑟𝑐, respectively, where 𝑟𝑠 < 𝑟𝑐.

Table 1. Abbreviation used in text

E1KOBZ_2020_v14n5_1929_t0001.png 이미지

Definition 2.1 Two sensor nodes are in neighborhood of each other, if they lies in the communication range of each other, i.e., \(||𝑝_𝑖 − 𝑝_𝑗|| ≤ 𝑟_𝑐\) (Fig. 1)

E1KOBZ_2020_v14n5_1929_f0001.png 이미지

Fig. 1. Sensor nodes in Simulation scenario along with their sensing range 𝒓𝒔 (shown in black line arround) and communication range 𝒓𝒄 (shown in dotted line arround) representation (color should be used for this Fig. 1 in print).

A set of node can only communicate to a node if they are in communication rage of the 𝑟𝑐 target node. Therefore, the possible number of neighboring nodes to a node at a given time kT, is given as \(H_{r_c}(k) = \left\{ j: ||p_i(k) - p_j(k)|| < r_c,j < P \right\}. \)

Definition 2.2 A generic node 𝑝𝑖 with sensing range 𝑟𝑠 at time kT covers a subset 𝐻𝑖(𝑘) ∈ A of cells, and is given in Equn.1:

\(H_{i}(k)=\left\{(w, q):\left(p-\left\lceil\frac{x_{i}(k)}{d}\right]^{2}\right)+\left(p-\left\lceil\frac{y_{i}(k)}{d}\right]^{2}\right) \leqslant\left\lceil\frac{r_{s}}{d}\right\}\right\}\)       (1)

Where 𝑤𝑤 and 𝑞𝑞 are numbers with 1 ⩽ 𝑤 ⩽ 𝐻𝑥 and 1 ⩽ 𝑞 ⩽ 𝐻𝑦 . Note that 𝐻𝑖(𝑘) relies upon k for 𝑀N only.

2.2 Energy Model

The energy consumption by a node is divided in two categories one due to communication due to transceiver circuitry and another due to transducer unit of sensor of the node. Since the path overlapping increases the communication overhead in network, only energy consumption due to transceiver circuitry is considered.

Definition 2.3 Energy consumption by transceiver circuitry in a node is given in Equn.2:

Ecoms(l,d) = Etx(l,d) + Erx(l)       (2)

Where E𝑡x(𝑙, 𝑑) and Erx(l) is the energy consumed by transmitter and receiver unit, respectively, while transmitting 1 bit message and is given by Equn.3 and 4.

Etx(l,d) = ECct(l) Eamp(l,d)       (3)

Erx(l) = ECct(l) = l X ECct       (4)

The distance 𝑑 between receiver node 𝑝𝑗 and transmitter node 𝑝𝑖 is used to identify E𝑡x(𝑙, 𝑑) model at a given instance 𝑡, and is given by Equn.5.

 \(E_{t x}(l, d)=\left\{\begin{array}{ll} l \times E_{C c t}+l \times \varepsilon_{f s} \times d^{2} & d<d_{0} \\ l \times E_{C c t}+l \times \varepsilon_{m p} \times d^{4} & d \geq d_{0} \end{array}\right.\)  (5)

Where 𝜀𝑓s and 𝜀𝑚p represent free space and multi-path fading channel model, respectively. If 𝑑 is greater than given threshold \(d_{0}=\sqrt{\frac{\varepsilon_{f s}}{\varepsilon_{m p}}}\) then multi-path fading channel model is utilize, otherwise, free-space model is used.

2.3 Communication Stack

RIME communication stack in contiki operating system is used to establish multi-hop communication between nodes and the sink [18]. RIME is a custom lightweight networking protocol designed for the low-power wireless network and is a part of the Contiki operating system. All real-time and simulation scenario design in QUALNET-7.4 are using RIME communication stack at data link layer.

3. Related Work

Flooding is the most effortless approach to advance Intrigue packets on the wireless medium. Such a methodology has the prudence of effortlessness and well faces circumstances in which start to finish way set up and support are troublesome and expensive, for example, in powerful ad hoc conditions and with asset obliged devices. Flooding encourages content sharing in the network; actually, a node overhearing a few data of intrigue mentioned by different nodes can get to it without an express solicitation. This diminishes the quantity of transmissions and recoveries the node's energy. However, flooding on a broadcast medium must be manoeuvred carefully and controlled to maintain a strategic distance from the broadcast storm [1]. To neutralize packets repetition and collisions, solutions in the writing, for the most part, depend on distributed packet concealment systems. The essential thought is that a node defers the packet forwarding while at the same time overhearing the channel and, eventually, drops the packet in the event that it hears the packet transmitted by a neighbour[2,3]. Distance-based, slotted random, or simply random concede procedures can be actualized. In [4], a set of timers is utilized to help Data broadcasting in vehicular situations. In particular, a crash shirking timer is utilized by neighbouring autos that at the same time get an Enthusiasm for road turned parking lot information, to reschedule Data broadcasting on various occasions. A comparable methodology is pursued in [5,6], where distinctive concede timers are utilized for Intrigue and Data forwarding in order to limit the crash likelihood and organize Data over Interests. In any case, a visually impaired controlled flooding based on the previously mentioned basic countermeasures doesn't generally ensure that (i) the best nodes are chosen to advance packets, and that (ii) overhearing stays away from packet collisions.

The most widely explored category of routing strategy is flat-based routing is Flat based routing, each node co-ordinate based on the same set of instruction to perform the communication and sensing task, i.e., the role of each node is similar from communication and sense point of view and hence termed as Data-centric approach [19]. In data-centric methods sink sends an inquiry to an individual node in a given region and in response node reply via multi-hop communication. The response can be the sensed data or network information. SPIN is the most commonly referred data-centric approach [20]. SPIN protocol over flooding based strategy overcomes the problem of data burst via a negotiation-based approach [21]. A node before transmitting data negotiates with the neighbor nodes and then forwards data to an interested node only. The following section discusses SPIN, Direct diffusion, and rumor routing protocol. Sensor protocol information via negotiation (SPIN): the key concept of SPIN is metadata exchange between the nodes in one-hop communication before the transfer of actual data. Meta-data is shared with the help of a small advertisement packet, which consumes less of network resources. Each node maintains the list of meta-data of data generated by sensing or data forwarded previously during multi-hop communication. After receiving the ADV packet holding a meta-data neighbor node first compare the list of meta-data with the information present in the ADV packet. If similar data is their neighbor node does not reply, else, it will reply with a request packet REQ. SPIN Metadata strategy overcomes the problem of data flooding in-network by data redundancy with the help of negotiation operation, which saves much of network energy and time. SPIN works on three message exchange principal, ADV, REQ, and DATA. First, the node transmits broadcast ADV packet encapsulating meta-data to the one-hop neighbor node. In response, an interested neighbor node sends the REQ packet and then the node sends the original data. SPIN is not suitable for the application environment which requires data security or reliability, i.e., tactical networks or health monitoring.

Directed Diffusion (DD) is another protocol that is created after the SPIN. Directed Diffusion goes for diffusing data through sensor nodes by using a naming plan for the data[22]. DD uses attribute-value sets for the data and furthermore inquiries the sensors on the interesting premise by utilizing those sets. To make a query, an intrigue is characterized by utilizing a rundown of attribute-value pair, for example, objects name, topographical territory, term, interim, and so forth. This intrigue is further broadcast by a sink through its neighbors. Each hub that gets this intrigue can do storing for later use. The nodes additionally had the adaptability to do in-network data collection. The interests in the stores are then used to contrast the data got and the values in the interests. The intrigue passage additionally contains different angle fields. This inclination might be an answer connect to a neighbor from which the intrigue was gotten. Henceforth, by using interest and slopes, paths are set up among sink and sources. A few paths can be set up with the goal that one of them is chosen by support. DD is much energy proficient than others since it is on interest and there is no requirement for keeping up worldwide network topology. Be that as it may, it can’t be connected to all sensor network applications since it depends on a query-driven data conveyance show.

Rumor Routing (RR) is a trade-off between flooding inquiries and flooding event warnings [23]. The primary arrangement of this protocol is to make paths that prompt each event, dissimilar to event flooding which makes a network-wide gradient field. Along these lines, on the off chance that an inquiry is produced it very well may be then sent on a random walk till it finds the desired path, instead of flooding it all through the network. When the required path is found it tends to be additionally steered specifically to the event. Then again, if the path can’t be discovered, the application may attempt re-presenting the inquiry or flooding it. The RR might be a decent technique for conveying questions to the event in huge networks.

4. Problem formulation

The SPIN protocol is suited for medium size WSNs like, agricultural monitoring, battel field monitoring.

The SPIN protocol is a versatile communication and data-centric routing protocol. To keep away from the rise of the explosion of data and some overlap in flooding, the node interacts with one another through utilizing meta-data before transmitting the actual information. Therefore, it prevails with regards to staying away from the blind utilization of resources and avoid "implosion" and "overlap" issue in the flooding protocol. However, it can not overcome the problem of Blind forwarding and data inaccessibility. Blinforwarding is the problem that occurs due to the transmission or flow of data in the direction away from the sink node. On the other hand, data inaccessibility occurs when a node has data to send but all it's neighbor node is dead due to total energy consumption. Full insight of blind forwarding and data inaccessibility is given in the following section.

4.1 Blind forwarding and Data inaccessibility

All those nodes who do not have a meta-data record for a packet received via ADV message, in their list participate in data forwarding via the REQ packet irrespective of their reachability to sink node [24]. Nodes having data to transmit broadcast ADV messages to all neighbor nodes. For example in Fig. 2.a node A will broadcast ADV message carrying metadata information of data destined to sink node to all its one-hop neighbor. Nodes B, C, and D will receive the ADV packet and respond via REQ message: given none of them have similar meta-data information in their list. Hear data forwarding to node D is of no use because either the data will never reach the sink or take a long route in terms of hop to reache the sink and this phenomenon is termed as blind forwarding. A broder view of problem in a network of 240 sensor node is shown in Fig. 2.a and 2.b. In Fig. 2.b red represent the node forwarded the actual data, green represent the node received the ADV message and black and orange represent the sink and the source node. From the Fig. 3 , it can be concluded that data dissemination to nodes left of the source node is of no use since those packets will never reach the destination and are miss utilization of network resource. In another real-time scenario of home-automation has shown in Fig. 3, where the node is deployed on the ground floor, first floor, second floor, third floor and roof. In the existing approach, the data is forwarded to all the neighbour nodes. For example, if a node at the third floor wanted to send data to the sink node at the ground floor, it will flood the data in all direction including the node on the fourth floor. However, the data forwarded to the fourth floor and further to the sensor at the roof will never make it to the sink at the ground floor. In the proposed approach the data is disseminated only to the node closer to sink node and hence in Fig. 3 the source node at the third floor will only forward data to the sensor at the third floor or to the second floor depending on the communication range of the source node. Data inaccessibility is the event when the source node is unable to forward data to destination node [25]. The dominating cause is the depletion of node energy and is the reason for the rejection of the ADV packet. In a scenario where all the nodes in the path to destination reject the ADV message causes the inaccessibility of data. For example, if all the data communication to the sink node follows the same source to destination path, then the energy depletion rate of the node in the path also increases leading to multiple node termination along the path. The later event is due to the uneven load balancing of a transmitted packet in the network and is also termed as the hotspot. However, there can be other reasons specific to an underlying scenario which causes the termination of the node, for example, in forest surveillance application scenario node can be deactivated due to malfunction because of heavy rainfall or high-speed wind.

E1KOBZ_2020_v14n5_1929_f0002.png 이미지

Fig. 2.a. Blind forwarding overview

E1KOBZ_2020_v14n5_1929_f0003.png 이미지

Fig. 2.b. Data dissemination instances in SPIN-BC at different instance of time in a network of 204 sensor nodes.

E1KOBZ_2020_v14n5_1929_f0004.png 이미지

Fig. 3. Problem formulation for home automation scenario: (a) existing approaches and (b) Proposed model

5. Proposed Work

5.1 Initial assumption

We have made some assumptions such as the initial energy of all the nodes at initialization is the same. All network node generates data packet randomly and is destined to sink node. Since the multi-hop network topology is followed a node can accept packet only when the buffer of the receiving packet is empty. A buffer size of 1.25 MB capable of holding 10 packets at a time are initialized at the time time of network setup Two nodes can communicate via full-duplex mode. Full duplex mode, communication between two nodes in a mesh topology is achieved by full-duplex communication; given the energy, decimation is not affected by the communication protocol. The radio propagation model of the node is modeled based on the CC2538 low power system on chip micro-controller. Signal interference between node
𝑛𝑖 and 𝑛𝑗 because of other nodes is given as: In an undirected graph G(V,E), with V vertices and E edges and given cost function w: V X V -> R+ , the  receiver/sender interference at vertex 𝑣𝑝 is the |𝑣𝑖|, where 𝐼 = 1,2,3, … . 𝑛|𝑛 < |𝑣|, in the transmission range of 𝑣𝑖. In the initial stage of the deployment, all nodes are reachable to the sink node. Nodes consume the same amount of energy for sensing and communication operation and should be above the threshold defined during network setup.

5.2 Working Mechanism

The proposal follows four stages to construct a source-to-destination route, and are as follows: (1) Node to sink distance calculation (𝐻OP_ID), (2) Meta-data advertisement phase, (3) Data request phase and (4) Actual data transmission phase as shown in Fig. 4. The nose to sink distance in terms of a number of a hop count to reach the sink 𝐻OP_ID is calculated for all nodes in the network. It is assumed that nodes in the network are static and don’t change their position throughout their lifetime . In advertisement phase source node 𝑛𝑛𝑖𝑖 broadcasts the meta-data of original data to be transmitted. All the neighbor 𝑛𝑗 of 𝑛𝑖 after receiving the ADV packet evaluate the energy level based on the fact that they are capable of receiving and then forwarding the received data. If the current energy value of an individual neighbor node ENG  is above the predefined threshold and its 𝐻OP_ID(𝑛𝑗) is less than𝐻OP_ID(𝑛𝑖) it will move to request phase of the proposal. In request phase node neighbor node 𝑛𝑗 transmit a request message REQ along with ENG  and 𝐻OP_ID(𝑛𝑗) to source node. In data transmission phase source node 𝑛𝑖 sorts the REQ message based on their ENG   and the node with high energy value is selected for data transmission. Node-to-sink distance calculation: the process is executed after the initial deployment of the WSNs and since the node is static the parameter remains the same throughout the lifetime. In the case of WSN deployed for an environment where there is a possibility of node movement due to an intruder or environmental condition node can change their positions. In a given circumstance, the Node-to-sink distance calculation can be scheduled after a given interval of time or at the occurrence of an event. The sink broadcast the initialization packet (𝐼NS_PACKET) with attribute Node_ID and HOP_ID, and is received by all hone hop neighbor. The Node_ID is the MAC address of the individual node and HOP_ID is a counter initialized to a larger value. In proposed work initially the HOP_ID is set to 10 since the maximum hop count observed after building the spanning tree of given deployment is 8.

E1KOBZ_2020_v14n5_1929_f0005.png 이미지

Fig. 4. Flow chart for proposed mechanism.

The node 𝑛𝑗 after receiving the (INS_PACKET) from 𝑛𝑖 it compare the HOP_ID(𝑛𝑖) to its HOP_ID(nj) and if HOP_ID(ni) < = HOP_ID(nj), it save the Node_ID(ni) and increment the counter HOP_ID(nj) and forward the (INS_PACKET) to its one hop neighbor nodes. The re-broadcasted (INS_PACKET) replaces the  HOP_ID value of its own HOP_ID(nj) value. The whole process is mathematically modeled by Equn.6 and 7.

\(\text { HOP_ID }_{n_{j}}(t+1)=\left\{\begin{array}{ll} \text { HOP_ID }_{n_{j}}^{\min } & \text { if INS_packet }==\text { true } \\ \text { HOP_ID }_{n_{j}}(t) & \text { otherwise } \end{array}\right.\)       (6)

\(H O P_{-} I D_{n_{j}}^{\min }=\min \left\{H O P_{-} I D_{n_{i}}, H O P_{-} I D_{n_{j}} \mid j \in 1, m\right\}\)       (7)

Here, min{HOP_IDnj, HOP_IDnj} is the smallest count for hop distance from sink and 𝑚 is the total number of initialization packet received by an individual node. The process of hop distance calculation continues until each node in WSNs receives the initialization packet at least once.

Advertising Phase: when a node 𝑛𝑖 has data to transmit, collected either by itself or received by the neighbor node, it broadcast an ADV message to all its one-hop neighbor node, it broadcast an ADV message to all its one-hop neighbor. The main goal is to select the fittest neighbor 𝑛𝑗 among the given set of neighbors. The ADV message consists of metadata of data to be transmitted.

Request Phase: A node 𝑛𝑗 after receiving an ADV packet evaluates its energy based on the total energy required to process all three phases of the data communication process. The required energy level is presented as a predefined threshold value thresh(ni), and if the ENG is above this threshold it compares the HOP_ID(nj) over source node to its own HOP_ID(nj). If the HOP_ID(nj) > HOP_ID(𝑛𝑖) it moves forward to compare the metadata in ADV packet to list of meta-data in its record. If the match is found in the algorithm.1, a FLAG is set to 1, else FLAG is set to 0.

In next step node send a REQ(𝑛𝑗) packet encapsulation node current energy ENG , hop distance from sink HOP_ID(nj) and FLAG value. The whole process is mathematically modeled by Equn.8, 9 and 10.

\(A D V_{\text {reply }}^{n_{j}}(\text { energy })=\left\{\begin{array}{ll} 1 & \text { if Energy }_{\text {current }}^{n_{j}} \geq \text { Threshold } \\ 0 & \text { otherwise } \end{array}\right.\)       (8)

\(A D V_{\text {reply }}^{n_{j}}\left(\text { Hop }_{\text {distance }}\right)=\left\{\begin{array}{ll} 1 & \text { if } \text { Hop }_{\text {distance }}^{n_{j}}<H o p_{\text {distance }}^{n_{i}} \\ 0 & \text { otherwise } \end{array}\right.\)       (9)

\(A D V_{r e p l y}^{n_{j}}(F L A G)=\left\{\begin{array}{ll} 1 & \text { if } \operatorname{Hop}_{n_{j}}(\operatorname{met} a-\text { data })=n_{i}(\operatorname{meta}-\text { data }) \\ 0 & \text { otherwise } \end{array}\right.\)       (10)

Data Transmission Phase: In this phase the source node 𝑛𝑖 separate the REQ(𝑛𝑗)|𝑗∈ 𝑚, on the basis of their FLAG values. Separate list LIST0 and LIST1 are formed for REQ packet having FLAG value 0 and 1, respectively. The main goal of this strategy is to bypass those neighbor nodes which already have the data received by the current node and minimizes the miss utilization of WSNs resources. The 𝑛𝑖 short the element of LIST0 and LIST1 in decreasing order of their energy value. The source node select the top node 𝑛𝑗 or in other word the node with maximum energy from LIST0. If in case LIST0 is empty the top node from LIST1 is selected. The selected node is then paired to send the actual data. The whole process can be summarized as follow:

1. Node 𝑛𝑖 have data to transmit.

2. 𝑛𝑖 transmit ADV packet encapsulating meta-data to one hop neighbor nodes.

3. 𝑛𝑗 receives the ADV packet.

4. If \(ENG_{cur}^{nj }\)> threshold go to next step, else drop the ADV packet.

5. If HOP_ID(𝑛𝑖) < HOP_ID(nj) go to next step, else drop the ADV packet.

6. If meta - data(ADV) = meta - data(nj), set FLAG = 1 otherwise, FLAG = 0

7. Transmit REQ(FLAG, HOP_ID(nj), \(ENG_{cur}^{nj }\))

8. nrecieves the REQ(FLAG, HOP_ID(nj), \(PDR = {Packet Delivered \over Packet Sent}\))

9. Create LISTand LISTfor REQ(FLAG0) and REQ(FLAG1)

10. Short  LIST0 == Null, select the top element, otherwise, select LIST1 top element.

12. Transmit actual data to selected element.

Complexity Analysis: The time complexity of proposed work is equivalent to other approaches considered in the result section of the proposal. However, the complexity in terms of energy utilization in computation is reduced to one fourth. The reasoning for the reduction of computation to fourth of the existing is as since, the packets are directed in only one quadrant of the target area. In the worst-case scenario, the sender node at the top left most, considering that the sink is located in the right bottom corner of the target area. In this scenario, the metadata will be flooded to all the node. In a best-case scenario, the node is in the middle or in the quadrant in which the sink is located.

6. Performance analysis

Performance evaluated by scenario modeling in the QualNet-7.4 network simulator . The performance is evaluated over: (1) Total energy consumption of network, (2) Number of alive nodes after a given number of iteration and (3) Throughput of the network. The system model for all the simulation scenarios are presented in section 2. In all the presented scenario the network is composed of 300 × 300 𝑚2 and 150 × 150 𝑚2. Two different scenarios are considered to vary the density or count for number of sensor node with in the communication range of a node. High neighbor node density provides higher degree of path selection approach which causes more data dissemination and energy consumption in network. The simulation results are performed over total energy consumption, number of alive node, average end to end delay, average and packet delivery ratio. The same is performed in WSN of 150 and 300 node infrastructures and is permutated over region of 300X300 𝑚2 and 500X500𝑚2. Further, throughput evaluation is performed over low, medium and high traffic rate in WSNs of 500 sensor nodes.

6.1 Result discussion

In Fig. 5, data dissemination instances proposed protocol at different instance of time in a network of 204 sensor nodes. Moreover, the comparision in Fig. 6 and 7 shows the energy consumption by SPIN-BC, SPIN-RL, M-SPIN and Proposed approach. It can be concluded that the overall energy consumed by proposed protocol is low. The difference in energy consumption in Fig. 6 is comparatively more than Fig. 7, it is because the density of node distribution in per unit area is resulting in more neighbor node per node. Increased rate of neighbor node adds more path option for data dissemination resulting in excess energy consumption. The number of alive node is good measure of network lifetime. Fig. 8 and 9 presents the number of alive node after 103 request completion at sink node in target area of dimension 150 X 150 m2 and 300 X 300 m2 . Energy consumption by an individual node is presented by equation and is modeled in QualNet-7.4 network simulator. In Fig. 8, the frequency of dying node is higher in comparison to Fig. 9 since the rate of data disseminated in network of target are (150 X 150 m2) ) is much more than in target area (300 X 300 m2) where the nodes are distributed sparsely in the region. The PDR evaluation is based on formula given by Equn.11, respectively.

E1KOBZ_2020_v14n5_1929_f0006.png 이미지

Fig. 5. Data dissemination instances proposed protocol at different instance of time in a network of 204 sensor nodes.

E1KOBZ_2020_v14n5_1929_f0007.png 이미지

Fig. 6. Area of dimension 150*150m2.

E1KOBZ_2020_v14n5_1929_f0010.png 이미지

Fig. 7. Area of dimension 300*300m2.

Total energy consumption by 150 sensor node

E1KOBZ_2020_v14n5_1929_f0008.png 이미지

Fig. 8. Target area of dimension 150*150m2.

E1KOBZ_2020_v14n5_1929_f0011.png 이미지

Fig. 9. Target area of dimension 300*300m2.

Number of alive node out of 150 sensors

\(PDR = {PacketDelivered \over PacketSent}\)       (11)

It is assumed that all links between source to destination are homogeneous, and based on this fact EEPD is calculated as in Equn.12:

EEPD = K(Dproc + Dqueue + Dtrans + Dprop)       (12)

Where 𝐾 is the number of intermediate nodes, Dproc is processing delay at a node, Dqueue is queuing delay and Dprop is propagation delay.

The average end-to-end packet delay (EEPD) is analyzed in all four cases and the results are shown by Fig. 10. the comparison for Packet delivery Ratio is presented by Fig. 11. The analysis is performed over the target area of dimension 300 × 300 𝑚2. In Fig. 9 and Fig. 10, we can see that our proposal outperform the existing approaches. One of the major advantages of having the protocol specific to uniform topology is that the data forwarding nodes over multihop communication can be more accumulated. The selection strategy of forwarding node is more deterministic in our approach over other existing protocols. As we can observe from Fig. 2.a and Fig. 5, our proposal has opted more nodes towards sink for data forwarding over the existing approaches. The same advantage can be observed in Fig. 11 also as energy consumption is less, over the time number of node alive is also greater than the existing approaches.

Network throughput in two scenarios is analyzed to measure data reliability. Throughput is the measure over source to sink connection and is given by Equn.13 and 14.

E1KOBZ_2020_v14n5_1929_f0009.png 이미지

Fig. 10. Taget area of dimension 150*150m2 .

E1KOBZ_2020_v14n5_1929_f0012.png 이미지

Fig. 11. Target area of dimension 300*300m2 .

\(Throughput = {SReceived \over Ntransmit}\)       (13)

Where 𝑁transmit is the total number of packet transmitted by nodes in network and 𝑆receive is the number of packet actually received by sink node. Throughput over different source to destination connection is presented in Fig. 12 and it can be observed that the proposed protocol overcomes other approaches. Throughput is calculated over the rate of successful packet transmission over the medium and is measured as the number of packets received in a time slot.

E1KOBZ_2020_v14n5_1929_f0013.png 이미지

Fig. 12. Average throughput respect to packet generation rate for 150 sensor in target area of dimension 300*300m2 .

\(Throughput = {sucessfull\ packet\ transmission \over total\ packet\ transmission}\)       (14)

The simulation consists of 100, 250 and 500 sensor nodes uniformaly deployed in a circular target area of radius 150 meters. Base station is fixed at the center of circular region. The results are generated for a simulation run of 2 hours and are compared for three different traffic rate as low, medium and high. The traffic rate is varied based on number of packet transmission by individual node. Fig. 13,14 and 15 shows the result for average throughput for low, medium and high traffic rate respectively. In our approach, the meta-data of nodes helps to select the nodes for data forwarding which have high energy storage. In Fig. 13, 14 and 15 the average throughput in three different scenarios is compared over the proposed algorithm, M-SPIN, SPIN-BC and SPIN-RL. The results are compared over low, medium and high traffic scenarios. From Fig. 13-15, it can be concluded that the packet loss ratio in all the three scenarios in the proposed approach is less than other proposals. In Fig. 15 the packet loss ratio is high compared to low and medium traffic scenario but the proposed approach tend to show better results than M-SPIN, SPIN-BC and SPIN-RL. It does not only enhance the throughput but also reduces the packet drop from individuals nodes. Once, on an average the forwarding nodes alive and that too in the direction of the sink, it enhances the throughput as well as PDR which can be observed in Fig. 15, 17 and 18. The packet drop ratio is the measure of the reliability of the network and is affected by the routing decisions made by the underlying network protocol. In Equn.15, the packet drop ratio value has calculated to analyze the network performance in term of packet drop.

\(Packet\ drop\ ratio = {total\ number\ packet\ drop \over total\ packet\ transmission}\)       (15)

E1KOBZ_2020_v14n5_1929_f0014.png 이미지

Fig. 13. Average throughput in low traffic scenario.

E1KOBZ_2020_v14n5_1929_f0015.png 이미지

Fig. 14. Average throughput in medium traffic scenario.

E1KOBZ_2020_v14n5_1929_f0016.png 이미지

Fig. 15. Average throughput in high traffic scenario.

E1KOBZ_2020_v14n5_1929_f0018.png 이미지

Fig. 17. Average End-to-end delay in medium traffic scenario.

E1KOBZ_2020_v14n5_1929_f0019.png 이미지

Fig. 18. Average End-to-end delay in high traffic scenario.

The following simulations are conducted to show the effectiveness of proposed protocol over protocol in high traffic scenarios. The effect is emphasized by performing subsequent simulation over low and medium traffic rates. The simulation consists of 100, 250 and 500 sensor nodes uniformaly deployed in a circular target area of radius=150 meters. The base station is fixed at the center of the circular region. The results are generated for a simulation run of 2 hours and are compared for three different traffic rates low, medium and high. Fig. 16, 17 and 18 shows the result for packet loss ratio for low, medium and high traffic rate respectively.

E1KOBZ_2020_v14n5_1929_f0017.png 이미지

Fig. 16. Average End-to-end delay in low traffic scenario.

6.2 Statistical validation: Analysis of variance (ANOVA)

We have evaluated the proposed protocol based on two important metrics (throughput and packet delivery ratio) which are critical to WSNs. To validate the statistical significance of the proposed method we are using one of the popular test suggested in [29] named as analysis of variance (ANOVA) test. We are performing ANOVA test on two parameters which is throughput and PDR value and the resulting graph shown in Fig. 20 and 21. Further, the result of the hypothesis test has compared with the existing proposal to prove the statistical significance of the simulation result. The ANOVA test, we consider the mean of two given sample or scheme and compare whether it is the same or not. In general, an ANOVA test can provide the insight that whether the null hypothesis (Hnull) which states that mean of two or more method for the chosen set of samples are same and therefore should be rejected as mentioned in Equn.16. The parameters used in ANOVA test provide the outcomes in the form of F-statistic. The Hnull will be rejected only when the given two conditions are satisfied.

(i) The p-value should be less than the significance level.

(ii) The value of F-statistic must be higher than the F-critical value.

Besides, the alternative of hypothesis Halt can define as Equn.17 to counter the null hypothesis Hnull .

\(H_{null} : μProposed = μMSPIN = μSPIN-RL =  μSPIN-BC \)       (16)

\(H_{null} : μProposed \ne μMSPIN \ne μSPIN-RL \ne  μSPIN-BC \)        (17)

To proceed with the ANOVA test, the number of a sample taken for validation is 5 for all schemes and the simulation scenario mentioned in section.6. Moreover, other critical metrics such as significance level value α=0.05 and confidence interval (CI) = 95%. The Table 2.(a) and 2.(b) have shown the input given to perform the ANOVA test for throughput and PDR and the output value of the test. Moreover, with confidence interval = 95%, we have shown the output of the ANOVA test in Table 2.(a) and 2.(b). After the analysis of the test result and deception shown in Table 2, we can conclude the significance. It can be observed that the difference in the mean value of throughput has accepted are statistically significant, therefore we can reject the null hypothesis Hnull and accept the alternative hypothesis Halt. Moreover, in our test for PDR, The f-ratio value is 0.83583. The p-value is 0.493734. Therefore, the ANOVA test result is not significant at p < 0.05 and p < 0.10. It also gives us the future roadmap to make the protocol efficient in term of PDR also. The detail description of ANOVA test, p-value, F-statistic and F-critical value are provided in [29], and we encourage reader interested in these statistical validation techniques.

Table 2(a). Summary of input

E1KOBZ_2020_v14n5_1929_t0002.png 이미지

Table 2(b). Summary of input

E1KOBZ_2020_v14n5_1929_t0003.png 이미지

7. Conclusion

The proposed routing protocol is suitable for event-based application environments where quick response is of importance. In the initial stage of the proposal distance of each deployed node from the sink is calculated and is stored by a node for further references. The hop distance calculation process is a decentralized method that drops the duplicate packed if the hop distance of the transmitting node is greater than the receiving node. In the data transmission phase, a neighbor node decides to forward the data from the source node based on its available energy. If the energy is above the predefined threshold REQ message is sent along with current energy level and hop distance information. Source node after receiving the REQ packet from neighbor sorts the node based on energy level and hop distance and then the node with maximum energy level and min hop count is selected for data forwarding. Comparisons with other states of the art technique like SPIN-BC, SPIN-RL, and M-SPIN reveals the effectiveness of the proposal in terms of network lifetime and data throughput. Moreover, the given proposal has analysed the parametres such as network lifetime, packet delay, throughput etc. for the application scenario where the topology is uniform in nature. There was a study on the random topology of wireless sensor nodes and its effect on accuracy as well as energy consumption [26]. The application where nodes are mobile in nature also crete the random topologu over time. Moreover, for random topology clustered point processes based on a different mathematical model such as Gauss-Poisson process (GPP) [27], Neyman-Scott process [28] also available which need a more extensive study for our future work.

Future work will be focused toward the enhancing the PDR of the proposal and optimum threshold identification using evolutionary algorithm. Another future direction would be the path identification in the quadrant where the source node is located, helping in proper load distribution of incoming traffic toward the sink node. The effecctivness of the proposal in a realistic secnario like vehicular ad-hoc or mobile ad-hoc network will also be a challenge and can be attemted in futture studies.

References

  1. Yue, Y.-G., He, P., "A comprehensive survey on the reliability of mobile wireless sensor networks: Taxonomy, challenges, and future directions," Information Fusion, 44, 188-204, 2018. https://doi.org/10.1016/j.inffus.2018.03.005
  2. Rashid, B., Rehmani, M.H., "Applications of wireless sensor networks for urban areas: A survey," Journal of network and computer applications, 60, 192-219, 2016. https://doi.org/10.1016/j.jnca.2015.09.008
  3. Yetgin, H., Cheung, K.T.K., El-Hajjar, M., Hanzo, L.H., "A survey of network lifetime maximization techniques in wireless sensor networks," IEEE Communications Surveys & Tutorials, 19(2), 828-854, 2017. https://doi.org/10.1109/COMST.2017.2650979
  4. Yang, X., Deng, D., Liu, M., "An overview of routing protocols on wireless sensor network," in Proc. of 2015 4th International Conference on Computer Science and Network Technology (ICCSNT), vol. 1, pp. 1000-1003, 2015.
  5. Echoukairi, H., Bourgba, K., Ouzzif, M., "A survey on at routing protocols in wireless sensor networks," in Proc. of International Symposium on Ubiquitous Networking, pp. 311-324, 2015.
  6. Mansouri, D., Mokdad, L., Ben-othman, J., Ioualalen, M., "Dynamic and adaptive detection method for ooding in wireless sensor networks," International Journal of Communication Systems, 30(12), 3265-3276, 2017.
  7. Sharma, G., Bala, S., Verma, A.K., "Comparison of flooding and directed diffusion for wireless sensor network," in Proc. of 2009 Annual IEEE India Conference, pp. 1-4, 2009.
  8. Pantazis, Nikolaos A., Stefanos A. Nikolidakis, and Dimitrios D. Vergados. "Energy-efficient routing protocols in wireless sensor networks: A survey," IEEE Communications surveys & tutorials, 15(2), 551-591, 2013. https://doi.org/10.1109/SURV.2012.062612.00084
  9. Liu, T., Li, Q., Liang, P., "An energy-balancing clustering approach for gradient-based routing in wireless sensor networks," Computer Communications, 35(17), 2150-2161, 2012. https://doi.org/10.1016/j.comcom.2012.06.013
  10. Liu, X., "A survey on clustering routing protocols in wireless sensor networks," sensors, 12(8), 11113 - 11153, 2012. https://doi.org/10.3390/s120811113
  11. Singh, K., "Wsn leach based protocols: A structural analysis," in Proc. of 2015 International Conference and Workshopon Computing and Communication (IEMCON), pp. 1-7, 2015.
  12. Ferng, H.-W., Tendean, R., Kurniawan, A., "Energy-efficient routing protocol for wireless sensor networks with static clustering and dynamic structure," Wireless Personal Communications, 65(2), 347-367, 2012. https://doi.org/10.1007/s11277-011-0260-4
  13. Mahakud, R., Rath, S., Samantaray, M., Sinha, B., Priya, P., Nayak, A., Kumari, A., "Energy management in wireless sensor network using pegasis," Procedia Computer Science, 92, 207-212, 2016. https://doi.org/10.1016/j.procs.2016.07.347
  14. Nighot, M., Ghatol, A., "Gps based distributed communication protocol for static sensor network (gdcp)," Procedia Computer Science, 78, 530-536, 2016. https://doi.org/10.1016/j.procs.2016.02.098
  15. Oller, J., Demirkol, I., Casademont, J., Paradells, J., Gamm, G.U., Reindl, L., "Has time come to switch from duty-cycled mac protocols to wake-up radio for wireless sensor networks?," IEEE/ACM Transactions on Networking, 24(2), 674-687, 2015. https://doi.org/10.1109/TNET.2014.2387314
  16. Sohrabi, K., Gao, J., Ailawadhi, V., Pottie, G.J., "Protocols for self-organization of a wireless sensor network," IEEE personal communications, 7(5), 16-27, 2000. https://doi.org/10.1109/98.878532
  17. Arora, N., "Performance analysis of aodv, dsr and zrp in manets using qualnet simulator," Journal of Engineering Science and Technology Review, 6(1), 21-24, 2013. https://doi.org/10.25103/jestr.061.05
  18. Dunkels, A., Osterlind, F., He, Z., "An adaptive communication architecture for wireless sensor networks," in Proc. of the 5th International Conference on Embedded Networked Sensor Systems, pp. 335-349, 2007.
  19. Arya, R., Sharma, S., "Optimization approach for energy minimization and bandwidth estimation of wsn for data centric protocols," International Journal of System Assurance Engineering and Management, 9(1), 2-11, 2018.
  20. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E., "Spins: Security protocols for sensor networks," Wireless networks, 8(5), 521-534, 2002. https://doi.org/10.1023/A:1016598314198
  21. Maroti, M., Kusy, B., Simon, G., Ledeczi, A., "The flooding time synchronization protocol," in Proc. of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 39-49, 2004.
  22. Peng, S., Low, C., "Energy neutral directed diffusion for energy harvesting wireless sensor networks," Computer Communications, 63, 40-52, 2015. https://doi.org/10.1016/j.comcom.2015.02.017
  23. Liu, H.-H., Su, J.-J., Chou, C.-F., "On energy-efficient straight-line routing protocol for wireless sensor networks," IEEE systems journal, 11(4), 2374-2382, 2015. https://doi.org/10.1109/JSYST.2015.2448714
  24. Hayes, T., Ali, F.H., "Proactive highly ambulatory sensor routing (phaser) protocol for mobile wireless sensor networks," Pervasive and Mobile Computing, 21, 47-61, 2015. https://doi.org/10.1016/j.pmcj.2015.04.005
  25. Yadav, S.S., Chitra, A., Deepika, C.L., "Reviewing the process of data fusion in wireless sensor network: a brief survey," International Journal of Wireless and Mobile Computing, 8(2), 130-140, 2015. https://doi.org/10.1504/IJWMC.2015.068617
  26. Zabini, F., Calisti, A., Dardari, D., & Conti, A., "Random sampling via sensor networks: Estimation accuracy vs. energy consumption," in Proc. of 2016 24th European Signal Processing Conference (EUSIPCO). Presented at the 2016 24th European Signal Processing Conference (EUSIPCO), 2016.
  27. Guo, A., Zhong, Y., Zhang, W., & Haenggi, M., "The Gauss-Poisson Process for Wireless Networks and the Benefits of Cooperation," IEEE Transactions on Communications, 64(5), 1916-1929, 2016. https://doi.org/10.1109/TCOMM.2016.2550525
  28. R. K. Ganti and M. Haenggi, "Interference and outage in clustered wireless ad hoc networks," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4067-4086, Sep. 2009. https://doi.org/10.1109/tit.2009.2025543
  29. Shapiro, Samuel Sanford, and Martin B. Wilk, "An analysis of variance test for normality (complete samples)," Biometrika, 52(3/4), 591-611, 1965. https://doi.org/10.1093/biomet/52.3-4.591

Cited by

  1. A Novel Self-Forming Virtual Sub-Nets Based Cross-Layer MAC Protocol for Multihop Tactical Network vol.11, pp.6, 2020, https://doi.org/10.3390/app11062470