DOI QR코드

DOI QR Code

A Novel Duty Cycle Based Cross Layer Model for Energy Efficient Routing in IWSN Based IoT Application

  • Singh, Ghanshyam (Electronics and Communication Department, National Institute of Technology) ;
  • Joshi, Pallavi (Electronics and Communication Department, National Institute of Technology) ;
  • Raghuvanshi, Ajay Singh (Electronics and Communication Department, National Institute of Technology)
  • Received : 2021.06.21
  • Accepted : 2022.06.09
  • Published : 2022.06.30

Abstract

Wireless Sensor Network (WSN) is considered as an integral part of the Internet of Things (IoT) for collecting real-time data from the site having many applications in industry 4.0 and smart cities. The task of nodes is to sense the environment and send the relevant information over the internet. Though this task seems very straightforward but it is vulnerable to certain issues like energy consumption, delay, throughput, etc. To efficiently address these issues, this work develops a cross-layer model for the optimization between MAC and the Network layer of the OSI model for WSN. A high value of duty cycle for nodes is selected to control the delay and further enhances data transmission reliability. A node measurement prediction system based on the Kalman filter has been introduced, which uses the constraint based on covariance value to decide the scheduling scheme of the nodes. The concept of duty cycle for node scheduling is employed with a greedy data forwarding scheme. The proposed Duty Cycle-based Greedy Routing (DCGR) scheme aims to minimize the hop count, thereby mitigating the energy consumption rate. The proposed algorithm is tested using a real-world wastewater treatment dataset. The proposed method marks an 87.5% increase in the energy efficiency and reduction in the network latency by 61% when validated with other similar pre-existing schemes.

Keywords

1. Introduction

The Internet of things (IoT) technology enables a way to connect remote objects or people, or other cyber-physical things with ease. Industrial wireless sensor network (IWSN) is also one of the vital applications of IoT, which can be visualized as an integral part of Industry 4.0, which includes cloud computing, cyber-physical systems and IoT [1]. In this context, the wireless sensor network as a part of IWSN is a ubiquitous yet powerful technology used to sense, collect, aggregate and fuse the data to a central controller. Many IWSN applications like e-healthcare, environment and habitat monitoring, smart transportation, etc., are defined by the structure, standards and models used in wireless technologies. One of the primary challenges in designing a WSN is the implementation of cross-layer (CL) optimization. Fig. 1 gives the cross-layer framework used in this paper. It shows various layers in the protocol stack, the models and standards used and how they are interconnected to form cross-layer modules. Various layers have their own importance; like the physical layer focuses on data frames and their structures, the MAC layer gives information about accessing the medium [2]. The MAC layer also provides some standards for efficient MAC protocol working.

Fig. 1. Cross-layer framework used in proposed work

The network layer emphasizes the paths for forwarding and transmission of data. It uses various routing protocols for this task. The transport layer uses different protocols for controlling the traffic and ensures reliable delivery in the transmission of packets. It also manages the resources well. Finally, the application layer provides the user with the interface to access and operate the data. Every layer is connected to its consecutive layer and vice versa, making a transmission and reception system structure. The transmission system is such that the flow of the data is from the application layer, then the transport layer and so on, and finally to the physical layer. In contrast, the flow is just opposite in the receiving node, i.e., from physical towards application. The cross-layer model manages all these operations. The balance and optimization in the cross-layer can be enhanced by adopting various efficient methods at each layer. This paper deals with the optimization in the two layers: MAC and Network layer.

In [3], the authors present cooperation between the Network and MAC layers to precisely enable the wake-up scheduling in the nodes in multimedia WSN. The data forwarding adopts multi-path routing for extensive size networks. The method focuses on enhancing the system throughput and speed of data transmission. Cross-layer architectures for cognitive radio networks have been discussed in [4]. It gives layer-centric and centralized solutions for cross-layer design problems. It aims to hike the quality-of-service parameters in the network. A survey on various cross-layer architectures in WSN has been discussed in [5]. The paper gives an extensive parameter-oriented review from various research papers on cross-layer designs (CLD). It provides a classification of the CLDs based on the different quality of service metrics like security, energy optimization, etc. The duty-cycled MAC scheduling is of two types: Synchronous and Asynchronous. Synchronous scheduling schemes such as T-MAC, S-MAC require synchronized scheduling of the nodes with their neighbor for timely awake and sleep actions. This way, the communication between the nodes is synchronized. But such type of scheduling is not appropriate for dynamic, energy constraint networks as these may face some issues like complexity in computation and communication overhead. The popular MAC scheduling schemes are based on asynchronous protocols where no time synchronization among the nodes is required; instead, the receiver checks for the transmission by waking up periodically. The protocols such as X-MAC [6] and PB-MAC [7] fall in the asynchronous scheduling scheme. Shi et al. [8] presents an asynchronous duty cycle-based approach in a cross-layer WSN model to enhance QoS.

The asynchronous protocols are prevalent and they can handle heterogeneous and resource constraint networks. Since this paper deals with duty cycle-controlled scheduling, asynchronous scheduling serves as a motivation for our work. The varying duty cycles can be determined by asynchronous scheduling protocol as it helps maintain the sleep and awake times, thereby enhancing the system’s reliability and throughput.

The original contributions of this paper are that we demonstrate the efficient clustering of a 500-node wireless network using k-means clustering and particle swarm optimization. This combination gives a more accurate cluster head selection and makes the clustering very efficient by reducing the unnecessary transmission delay caused due to the absence of clustering. The network’s energy is limited and thus a Kalman filter-based data prediction scheme is adopted during the sensing of the data by the nodes. This helps in the efficient collection of data at the aggregators as well as at the base station node. We propose a cross-layer data transmission scheme using duty-cycled scheduling at the MAC layer and optimizes the network layer parameters. The variation in the duty cycle regulates the sleep and awake durations of the nodes. Thus, the scheduling of the nodes which contribute their information to the destination is done with ease.

The organization of the paper can be summarized as: In section 2, the related work is discussed. It deals with cross-layer related researches, which enhances the efficiency of the WSN and IoT networks. Section 3 gives the proposed model overview and its framework in the diagram form. Section 4 deals with the explanation of various analytical approaches used in the proposed model. The working of the proposed model is presented in section 5. Section 6 discusses the results and visualizes the results in the form of different analytical graphs. Section 7 concludes the whole work with future scope.

2. Related Works

This section covers the research relevant to the clustering technique, duty cycle scheduling approach and cross-layer optimization. The most vital thing is to achieve the optimized network performance indicators using scheduling and cross-layer design in a clustered WSN. Apart from this, one of the major challenges seen in the sensor networks in many industrial applications is the redundancy of the data. The final destination or the processing unit needs only useful data. Since the data collected at each interval may contain repeated or unusual values, the data estimation must be done to filter out the useless data, those causing energy and memory consumption and increased delay in the transmission. This enhances the reliability of the network and makes it more efficient. We produce literature of those works which focus on these paradigms.

The placement of the nodes in a sensor network has its importance. There are some techniques that can be used to enhance the sensing coverage and connectivity of the sensor nodes by placing them in the appropriate location so that the distance between the nodes and the base station can be optimized. One of the techniques is clustering. Some approaches like low energy adaptive (LEACH) clustering hierarchy [9], distributed energy-efficient (DEEC) clustering [10] and many more give an idea to route the data packets using clustering. Smaragdakis et al. [11]. Efficient routing can be achieved by using multi-path protocols. Jemili et al. [12] proposed a fast multi-path routing (FMRP) protocol that avoids correlated transmission paths by constructing the disjoint paths in the wireless sensor network to eliminate the collision during the transmission. In [3], the multi-path routing and the cross-layer management scheme that uses duty-cycle scheduling at MAC are investigated for the multimedia sensor network and compared with the FMRP. The proposed scheme ensures simultaneous data transmission by considering non-correlated and disjoint paths to avoid collisions; this method is named as cross-layer correlation-free (CL-CFMPR) multi-path routing technique.

The scheduling in nodes is another aspect of reducing the energy consumption and enhancing the network lifetime. The scheduling task divides the duration of the nodes into active and inactive periods, such that the node will be in a sleep mode when it is not required in data transmission or other tasks of the network. This saves an appreciable amount of energy and time in the network and enhances reliability and node efficiency. Many research works use sleep-awake scheduling, duty-cycle scheduling, which uses varying duty-cycles to obtain optimized QoS parameters. To improve the network coverage, Coverage guaranteed Distributed Sleep awake Scheduling (CDSWS) is applied in [13], which aims to conserve energy by regulating the sleep and awake durations of the nodes in each cluster. It works on three phases that are initialization, cluster formation and sleep-awake scheduling. Shu et al. [14] proposed another method of enhancing the connectivity of the k-neighborhood nodes (GCKN) using sleep scheduling based on geographic distance in IWSN. This proposed scheme solves the network isolation problem, which is responsible for the fast drain of energy of nodes and sleep scheduling problem in which nodes don’t get the opportunity to sleep even if they are not active. This method enhances the network lifetime by approximately 41% when compared with other similar techniques.

In [15], the authors use the 2-phase geographic greedy forwarding algorithm for multi-path routing along with the cross-layer optimization between physical, MAC and network layers. The physical layer contributes to the energy harvesting in the nodes depending on their energy levels, the MAC layer implements the duty-cycled scheduling of the nodes to save the energy of the network and the greedy forwarding scheme for routing is applied on the duty-cycled scheduled nodes so that the nodes will be awake whenever it is required. This paper uses asynchronous duty cycle-based MAC scheduling, which adopts the estimation theory using Kalman filter similar to the one used in [16] to select the essential node with useful information to reduce unnecessary delay in the network.

The [3], cross-layer optimization proves itself to be one of the dominant features in solving various issues of WSN like degradation of QoS parameter, transmission energy requirement, network latency and many more. In [5], the authors have surveyed various cross-layer optimization frameworks from a QoS parameter perspective. The paper discusses multiple CL design models using different optimization approaches like non-linear constraint (like Karush-Kuhn Tucker condition) [17], linear constraint, etc., in cross-layer designs. Various challenges in WSN can be solved by adopting a cross-layer optimization framework.

In [18], a cross-layer model is designed to optimize the node’s transmission range. It uses a threshold called the expected transmission range (ETRT) threshold. The paper deals with three layers, i.e., physical, data link and network layers in an IoT-enabled WSN protocol stack. In [19], the dynamic routing protocol along with the sleep scheduling protocol of MAC is combined and implemented via a cross-layer interaction platform in a web-based multi-hop WSN to enhance the system’s performance metrics. To get the best cooperation between MAC and routing layers, [3] and [15] adopted a multi-path routing technique that also employs duty cycle mode. The proposed method promises 50% enhancement in the goodput when compared with other similar techniques.

Dao et al. [20] introduced a scheme called Deadline Aware Scheduling and Forwarding (DASF) scheme and Vu et al. [21] proposed a scheduling scheme called Delay constraint Duty-cycled Scheduling (DDS), both aim to reduce end-to-end delay and energy consumption in a duty-cycled WSN. These two methods, i.e., DASF and DDS, use the central limit theorem for determining the delay distributions of each group of nodes. The duty cycle is calculated using these distributions, which helps mitigate the network’s energy utilization. Scheduling for low duty-cycled WSN called Robust Multi-pipeline Scheduling (RMS) is proposed in [22]. The multi-pipeline scheduling technique is implemented to overcome unreliable communication links and guarantee the timely delivery of the packets in low-duty-cycled sensor networks. A CL design called Reducing Delay and Maximizing Lifetime (RDML) scheme is proposed in [23], which uses a large duty cycle for residual energy nods to improve the reliability of transmission and to mitigate the probability of retransmission in an IWSN. The method gives a 43% enhancement in network lifetime.

Xu et al. [24] proposed a Cross-layer Optimized Opportunistic Routing (COOR) scheme to improve reliability of communication link and minimize the delay. In this scheme, two optimization techniques used to choose preferred node. One method chooses the node having higher communication reliability and second one prefer the node having longer communication range. Through these methods number of hops is reduced and reliability increased. A cross-layer mechanism is proposed in [25] for energy efficient cluster routing. In which the node selection is provided by fuzzy based CH selection method. To reduce congestion occurrence, network is combined through non-similar clusters. To achieve energy efficient transmission ABC optimization algorithm is utilized. A cross-layer based QoS aware routing protocol is proposed in [26] by utilizing multi objective ant colony optimization. The cross-layer approach is used for relay node selection by enabling interation between MAC and routing layers. Lahane et al. [27] proposed a cross-layer routing approach based on hybrid clustering. In this approach the optimal selection of cluster head is achieved by moth flame integrated dragonfly algorithm taking consideration of parameters as energy consumption, throughput, delay etc.

The above methods are up-and-coming in the cross-layer domain of WSN and IoT networks. Some method focuses on varying the duty cycle to control the end-to-end delay, while some consider efficient routing methods to enhance the performance of the sensor network. Our paper focuses on the duty-cycled scheduling and delay bound aspects like optimized clustering to cover maximum performance metrics to prove the model’s efficacy in real-time applications. These techniques give novelty to the proposed model and make it distinct from other methods. Also, a cross-layer optimization framework is implemented to optimize the functioning between different layers of the network.

3. Proposed model

The experimentation is done on a water treatment dataset in which all the water pollutants and other water treating factors are monitored in a water treatment plant. It is designed for the industry-based application, i.e., water treatment plant. As shown in Fig. 2, the sensor nodes are deployed in a water treatment plant area. Each unit senses the parameters of that particular unit and aggregates the information, which is finally going to a fusion center or base station. A real-time data set for a water treatment plant is used in this paper. The sensor nodes are deployed in a real-time water treatment plant and the clusters are made. Each cluster has its own cluster head. All the cluster members send their data which is the estimated value of the measured data. In this paper, a Kalman filter-based estimation approach is adopted to predict the data to avoid the redundancy in data transmission and boost up the system’s speed.

Fig. 2. Framework of the proposed model

The nodes are differentiated as affected and normal nodes based on the threshold defined on their estimated values. The scheduling scheme based on the duty cycle is adopted for the nodes to differentiate them. The normal nodes for which correct prediction is computed are considered to have 75% duty-cycle based sleep-wake scheduling, i.e., alternate sleep and awake scheduling in an epoch. Initially, all nodes are programmed with a 75% duty cycle at MAC. After considering the constraints for predicted data values, the duty cycle of selected nodes is changed. The data is transmitted from the affected nodes to the cluster heads and from the cluster heads to the base station. The base station is connected with the cloud and many IoT devices access the data from the cloud for further processing. This type of scenario is used in the application where any event has to be detected in a water treatment plant. If the estimation for data of any node within a cluster is not correct, then that node is identified and the unit associated with that node or the region is acutely monitored to avoid any accidents.

Following assumptions are considered in this paper:

1. The transmission range and the communication range of each node are fixed.

2. The communication range of the cluster heads must be such that all the nodes in that cluster must be in their transmission radius.

3. The initial energy of all the nodes as well as the cluster heads is kept constant.

4. The duty cycle scheduling governs the time taken for a data packet to be transmitted and received.

5. The nodes are assumed to take a maximum of 2-hop routing paths to reach the destination node.

4. Analytical approaches used in the proposed model

4.1 Node deployment using clustering

It employs a random node deployment strategy. The physical layer of the WSN architecture takes care of the energy handling issues. For this purpose, the IEEE 802.15.4 standard is used to ensure low communication cost as well as minimum energy requirement for nodes for low data rates.

K-means clustering with PSO optimization

The k-means algorithm is a clustering algorithm firstly proposed by Stuart Lloyd in 1957. This algorithm groups the data points following a similar pattern or similarity measure like distance and divides them into clusters based on these measures. In this paper, the Euclidean distance between each node belonging to a cluster is made minimum. It also aims to find the best centroid points for each cluster called cluster heads.

PSO is a swarm intelligence algorithm that works on the theory of bird flocking. The initial step is to create a population of birds over a search space. The population consists of particles (birds). Each particle has a fixed velocity and position and the position is updated every time. The velocity is updated using particle momentum, the best position reached and the number of particles. This updating leads the particles to reach the next position.

PSO-KM is the optimization approach adopted to make the clusters in a global optimal region. The K-means clustering is applied to the search spaces to form clusters and cluster heads. The slow convergence of the PSO algorithm has been compensated by the fast convergence rate of the K-means algorithm. The PSO initially starts the optimization of clustering by considering the locations of the cluster heads and then the position and velocity of these cluster centroids are optimized to have an easy transmission of data from clusters to the base station. The steps followed by the hybrid PSO-KM algorithm are as under:

Step 1: Implementing K-means clustering algorithm till one of the following conditions is achieved when-

a) Iteration number surpasses the predefined max value.

b) The cluster centroids cannot be changed.

c) Cluster membership does not change.

Step 2:The points are updated using equations:

       (1)

       (2)

Where \(Y_{j}^{(i)}=\left(Y_{j 1}^{(i)}, Y_{j 2}^{(i)}, \ldots, Y_{j m}^{(i)}\right)\)is the position vector of jth particle at ith iteration in m-dimensional search space. Similarly, Vj1(i) = (Vj1(i)Vj2(i),...Vjm(i)) is the velocity vector of jth particle at ith iteration in m-dimensional search space. B = (Bj1,Bj2,...,Bjm) is the personal bet position of particle ‘j’ and G = (g1,g2,...,gm)is the global best for all the particles in the search space. ‘∝’ is the inertia weight which controls the impact of the previous velocity of a particle on the current velocity. 𝑐1, 𝑐are the acceleration coefficients and 𝑟1, 𝑟2are the random variables uniformly distributed in the range [0, 1].

Step 3: After updating the particle position and velocity, each particle is considered as a clustering problem solution. In terms of clustering, each datapoint represents the cluster head. So, the ith data point can be initialized as:

       (3)

Where  is the kth cluster head in the solution given by the jth datapoint.

Step 4: Evaluating the objective function for datapoint ‘j’ in the swarm given by (4). Based on the clustering criteria, the fitness for each point is evaluated.

       (4)

Where cis the subset of data belonging to cluster ‘k’, D is the number of data points input to clustering. The aim is to minimize the objective function so as to reduce the dispersion in clusters.

Step 5: If the iterations surpass a predefined level, then execute step 1 otherwise go to step 6.

Step 6: The updated position and velocities of particles using (1) and (2), are checked for the boundary condition, i.e., [𝑌min, 𝑌max] for the position and [𝑉min, 𝑉max] for the velocity. If the particle excels their boundaries, then the new position is fixed to 𝑌minor 𝑌max and the new velocity is fixed to 𝑉min 𝑉max respectively.

Step 7: Reduce the value of once the swarm converges to the optimal solution.

Step 8: If the global best ‘G’ remains the same for the number of iterations, then go to step 1 otherwise, execute step 5.

4.2 Estimation of sensor data

4.2.1 Kalman Filter

In 1958 Rudolf Emil Kalman presented the notion of Kalman filter (KF) used in estimation problems. It is a recursive prediction filter for estimating states of a system. It executes in two stages: prediction stage and correction stage. The prediction based on the Kalman calculations obliterates the randomness from the predicted data. In this phase, the estimation of ‘x’ (a data value) is generated on current time from the previous time. The outcomes of these calculations are covariance and prediction model. Hence, it is two states prediction and update. The recursion value of Kalman filter is due to the repetition of prediction and correction stages i.e., the previous time step becomes initial value for each time step. Let ‘x’ be a data value which has linear gaussian properties and its relation between two states can be represented in matrix form. Additionally, the noise around sensor is gaussian and it has mean. The ‘x’ belongs to a N-dimension space.

The Probability density function of a normal or gaussian distribution is-

       (5)

Where ‘m’ and ‘ ’ are the mean and variance of the distribution in N-dimensional space. Bigger the variance, higher is the uncertainty. If we multiply the mean and variance by a gainΣ matrix F we get,

𝑚new = 𝐹. 𝑚 and  = F2Σ2

Also,

Where  is the gain

If  is a huge number, ‘k’ goes to 1 and new mean becomes

𝑚new=𝑚1

But if the uncertainty is huge then the result of function of 2 data is closer to other one. 

Let say if \(\Sigma_{1}^{2}\) goes to ∞, then k goes to 0. Then

𝑚new=𝑚0

This is the essence of Kalman filter. This ‘k’ tells how much we get closer to the measurements or model. The limits for ‘k’ are 0 and 1.

4.2.2 Sensor data estimation based on Kalman filter

The framework of KF exhibits the update given by the measurements of sensors and their prediction using representation of base state vector in system matrix form. Consider a dynamic system with linear properties represented by following equations:

The state vector is given in (6)

\(x=\left[\begin{array}{l} d \\ v \end{array}\right]\)      (6)

Where d is the distance and v is the velocity are the two parameters which defines the state of the vector ‘x’.

The vector form representation for the ‘x’ vector and its covariance can be expressed as

\(\hat{x}=\left[\begin{array}{l} \text { position } \\ \text { velocity } \end{array}\right] \text { and } \operatorname{cov}=\left[\begin{array}{cc} \Sigma_{p p} & \Sigma_{p v} \\ \Sigma_{v p} & \Sigma_{v v} \end{array}\right]\)

The matrix pkis symmetric that is, its transpose is equal to the original matrix. For a gaussian function given by-

As stated in (6), the state vector or measured value ‘x’ by a sensor is considered here as well. The state and error estimation of sensor values is done by employing Kalman filter. In prediction state, the prediction is done using dynamic model. 𝑥 is the priori value and 𝑥+ is the posteriori value.

\(\dot{x}^{-}(t)=D \cdot x^{-}(t)\)(7)

The solution 𝑥(t) of the differential equation (7) is given by:

\(x^{-}(t)=\varphi_{0}^{t} \cdot x^{-}\left(t_{0}\right)\)(8)

is a state transition matrix which𝑡𝑡 ca− n transfer initial state x(𝑡0) to its corresponding state 𝑥(t) at time (t)

From (7) and (8)

(\(\dot{x}^{-}(t)=D \cdot x^{-}(t)=D \cdot \varphi_{o}^{t} \cdot x^{-}\left(t_{o}\right)\)       (9)

𝜑𝑜 =𝐼 is the initial matrix because 𝑥(t𝑜)=𝐼 𝑥(𝑝𝑜)

The covariance matrix of the predicted state is expressed in (10). It shows how much uncertainty exists between the states.

\(\operatorname{cov}^{-}\left(t_{j}\right)=\varphi_{t_{j-1}}^{t} \cdot \operatorname{cov}\left(t_{j-1}\right)\left(\varphi_{t_{j-1}}^{t_{j}}\right)^{T}+Q\)       (10)

Generalized form of (10) is

\(\operatorname{cov}^{-}\left(t_{j}\right)=\varphi_{t_{j-1}}^{t} \cdot \operatorname{cov}\left(t_{j-1}\right)\left(\varphi_{t_{j-1}}^{t_{j}}\right)^{T}+\int_{t_{j-1}}^{t_{j}} Q(t) d t\)       (11)

Correction stage

The posterior state is represented by

\(x^{+}\left(t_{j}\right)=x^{-}\left(t_{j}\right)+\Delta x\left(t_{j}\right)\)       (12)

Here the predicted vector x-(𝑡𝑗)is improved because of observations at the epoch (𝑡𝑗

Covariance matrix for correction stage is given by (13)

\(\operatorname{cov}^{+}\left(t_{j}\right)=\operatorname{cov}^{-}\left(t_{j}\right)+\Delta \operatorname{cov}\left(t_{j}\right)\)        (13)

∆𝑐𝑝𝑣𝑣 is minimized for Kalman filter and can be calculated using (14)

\(\Delta \operatorname{cov}\left(t_{j}\right)=E\left[\Delta x\left(t_{j}\right) \cdot \Delta x\left(t_{j}\right)^{T}\right]\)        (14)

Where ‘E’ is the mathematical operator which denotes expectation of the two values ∆𝑥(𝑡𝑗)and ∆𝑥(𝑡𝑗)𝑇. The above (14) is compared with the standard equation of Kalman filter for finding the new state estimation error. [28] 

\(\Delta \operatorname{cov}\left(t_{j}\right)=E\left[\Delta x\left(t_{j}\right) \cdot \Delta x\left(t_{j}\right)^{T}\right]\)       (15)

Where is the measurement residual which contributes to the dissimilarity between the predicted and actual measurements and k=gain matrix which is given by:

\(k(t)=\operatorname{cov}^{-} H^{T}\left(H \operatorname{cov}^{-} H^{T}+R\left(t_{j}\right)\right)^{-1}\)       (16)

The estimation of predicted value  and covariance of error are combined with the measurements of sensor with its covar− iance to acquire updated error covariance and estimate matrix. Fig. 4 accompanied by Fig. 10 explain well the relationship between prediction and filtering the data by employing Kalman filter.

Q, H and R are the tuning parameters which gives the information about the system. Finally, the corrected state is given by

\(x^{+}\left(t_{j}\right)=x^{-}\left(t_{j}\right)+k\left(t_{j}\right) \cdot\left(r\left(t_{j}\right)-r^{-}\left(t_{j}\right)\right)\)       (17)

Fig. 4. Generation of corrected output from various sensor measurements and their estimated values using the Kalman filter.

4.3 A fast Network layer routing algorithm based on MAC scheduling

We consider here a clustered WSN, a network with its node clustered, and each group of nodes have their distinct boundaries, as illustrated in Fig. 3. The clustering makes a network such that it becomes vital for several standards and applications such as IEEE 802.15.4, automation control, tracking process, etc. The clustering allows local data collection and aggregation with high energy efficiency and low latency even in the presence of multi-hop routing. The clustered topology is designed such that broadly there exists two-level communication. The first level is when all the member nodes of a particular cluster send their data to their respective cluster head. The second level deals with inter-cluster communication, i.e., transmission happens using the greedy approach from one cluster head to another cluster head. The cluster head receives periodic data from other sensor nodes. In this paper, the nodes sense the data and the Kalman filter estimates the next time-series data to reduce redundancy, thereby successfully aggregating the data. The estimation works in such a way that if |det ( )| is greater than the predetermined threshold (λ) [16], then the nodes are sched′ uled, 𝑇 as shown in Fig. 5. E is the estimated error covariance, M is the measurement 𝑀𝐸′(𝑘)𝑀𝑇 +𝐶 is greater than the predetermined threshold (λ) [16], then the nodes are scheduled, as shown in Fig. 5. E is the estimated error covariance, M is the measurement matrix, and C is the covariance matrix for known measurement noise. In Fig. 5, A1, A2, A3, A4 are each epoch representing the time for off state and on state. Synchronously, the IEEE 802.15.4 works at the physical layer in which the nodes send the preamble and wait for the acknowledgment (ACK) to be received. Thus sending a data frame is followed by a wait duration for ACK, i.e., mackAckWaitDuration [29] in the IEEE 802.15.4 standard. The active time of the affected nodes with the criteria mentioned above exceeds the active transmission time of the normal nodes, and thus the affected nodes are likely to send their data at a higher rate as compared to normal ones. The estimation goes correct with the normal nodes, and thus even if the transmission rate for normal nodes declines, it hardly affects the network’s working. Fig. 6 gives a cross-layer design of how the physical layer is interacting with the MAC, and MAC further impacts the routing layer.

Fig. 3. Voronoi diagram for a clustered WSN scenario.

Fig. 5. Duty cycle dynamics for energy-efficient sleep scheduling scheme Fig. 6. Optimized Cross-layer scheme of proposed work

Fig. 6. Optimized Cross-layer scheme of proposed work

Duty cycle based greedy routing

A greedy routing approach [30] has been adopted here that takes those nodes into account, which are scheduled according to the Kalman filter-based estimation. In this routing, the clustered network is formed in a tree-based structure, and the source node forwards the data to the next neighboring node, provided the neighbor node is close to the sink node. Algorithm.2 gives the pseudo-code for greedy distance-based routing, which focuses on choosing those neighbor nodes with minimum Euclidean distance from the destination. Thus, the greedy routing aims to reduce the number of hops in each transmission. The transmission is done from one cluster head to another cluster head nearest the sink or base station.

Definition 1:

A graph (V, E) in which given distance function is 𝐷:𝑉×𝑉→𝐺+, the greedy routing assumes a decision: For a given sink node ’s’, an affected node '𝑣 with the neighbors 𝑁(𝑣) transmits a packet to its neighbor 𝑦∈𝑁(𝑣)such that where is a data point, and is also a datapoint neighbor to . The affected node vector will be therefore {𝑣1, 𝑣2, … , 𝑣𝑗}. The 2-hop distance subnetwork is formed, and the packets are assigned to each node for transmission. The nodes are iteratively checked using the Kalman filter estimation technique on the sensed data. The affected nodes are scheduled, and the packets are reduced by one (-1) as the nodes are being added to distinguish them from normal nodes. The greedy mode of routing is enabled and forwards the data to the next node (cluster head), which is nearest to the sink node. This forwarding of data continues till the sink node is encountered.

5. Implementation of proposed model

The methodology of the paper works in three sections. The first one is the formation of an optimized cluster in the network using the PSO-KM algorithm, which aims to reduce the dispersion between the clusters using the fitness function given in (3). The K-Means algorithm is a clustering algorithm used to cluster various data points based on their distance. It divides the data points into a predefined number of clusters based on the Euclidean distance, with each cluster having its own centroid point. The other data points are in the vicinity of that centroid. In this paper, the K-Means approach is used to cluster the nodes with their location. The centroids are obtained and treated as the cluster heads. Further, to optimize this clustering, a population-based metaheuristic approach called particle swarm optimization is implemented on the cluster heads so that the cluster heads can obtain the position in close proximity with the base station and other cluster heads, and thus, inter-cluster communication can be done with low loss of energy and time. Fig. 7 depicts the flow schema of the proposed model. Algorithm.1 shows a pseudo-code for PSO-KM clustering. After an optimized clustering topology is formed, the data sensed by the sensor nodes is estimated for future values. The Kalman filter is used to predict the data, and the sensor nodes that surpass the threshold value are selected as the affected nodes targeted for data transmission. The affected nodes possess the wrong predicted value, which does not match with the future values, and thus those nodes are scheduled. The duty cycle for affected nodes is shown in Fig. 5, and with the active and sleep time, the data transmission is regulated. The transmission is governed by a routing algorithm called the greedy routing algorithm. The algorithm for recursive covariance Kalman filter with duty cycle-based greedy routing is given in Algorithm.2.

Fig. 7. Flow chart of the proposed method

Algorithm.1 PSO-KM clustering

Algorithm.2 RCKF based DCGR

λ is a threshold value which has been taken from recursive covariance estimation idea in [16].

6. Performance evaluation

This section deals with the outcome of performance metrics for the application used in the proposed method; the results are presented using various analytical graphs, and a comparison with other existing approaches is also included. The experiment is carried out on a real-time dataset of the water treatment plant. The wastewater is treated daily and is measured. The state of the treatment plant is daily observed and classified to predict the upcoming faults in it using the probability density function and state variables. The data set consists of 38 features. The nodes are varied from 100 to 500. The description of the dataset is given in Table 1. The wireless sensor network for 500 nodes with an area of deployment 200×200 m2 is taken into consideration. The nodes are randomly distributed and are clustered using the PSO-KM algorithm for more optimal clusters and cluster heads. The sensors for each unit in the treatment process sense the parameters like PH, biological oxygen demand, chemical demand of oxygen, water flow, suspended solids, and so on. These parameters are collected by the cluster heads for every round of iteration. For predicting faults at each treatment process of the plant, the state of the plant is classified. The algorithms for the deployment and clustering and the performance metrics are analyzed using MATLAB 2016a version. The nodes in a cluster are destined to forward their data to the cluster head, and every cluster head either forwards the data to its nearest cluster head or may send it directly to the base station (BS) depending on the distance between the cluster head and BS. The performance in terms of energy consumption, throughput, number of alive nodes, etc., is analyzed at the base station. Fig. 8 shows the clustering of randomly distributed nodes in a given area of interest. Fig. 9 and Fig. 10 show the data of pH values and BOD collected for 500 days. The description of the dataset is as follows:

Table 1. Dataset description

Table 2. Parameter settings for proposed model

Fig. 8. Clustering of 500 nodes (including BS) randomly distributed in the area 200X200m2

Fig. 9. The data values for the pH of the water collected for 500 days.

Fig. 10. The data values for the biological oxygen demand collected for 500 days.

Performance measures

The performance metrics as probability density function, state estimation error, energy consumption, goodput, duty cycle, sleep scheduling, number of alive nodes, throughput and delay are analyzed for the proposed method and are validated with other similar state-of-the-art techniques which inhibits the approaches like clustering, duty cycle scheduling, and cross-layer optimization i.e., LEACH[16], DEEC[10], SEP[11], Greedy routing[15], CL-CFMPR[3], FMRP[12], DASF[20], CDSWS[13], DDS[21], GCKN[14], X-MAC[6], PB-MAC[7], and RMS[22]. The probability density function for the RCKF method is shown in Fig. 11, which includes the PDF for actual measurement, predicted state, and optimal predicted state. The optimal state prediction estimate has the highest PDF value with relatively less variance. Fig. 12 gives the state estimation errors between RCKF used in the proposed method and the Kalman filter for the difference between the measured and actual position and velocity variables of the nodes.

Fig. 11. Probability density function curves for measured, predicted, optimal predicted states of RCKF.

Fig. 12. State estimation errors between threshold-based KF and KF.

Fig. 13 depicts the total energy consumption of the network. The proposed method records a 28% decrease in energy consumption. From the figure, it is clearly observed that the energy consumption for the proposed model varies between 0.28 joule to 0.34 joule. The cross-layer optimization and duty cycle scheduling save more energy as compared to the methods adopting optimal and unequal duty cycle approaches. Fig. 14 shows the goodput comparison of the proposed method with FMRP and CL-CFMPR. The graph shows that there is an enhancement in the system goodput when greedy method for routing is used along with the duty cycle scheduling in MAC.

Fig. 13. Total energy consumption (in joule) for the duty cycle enabled network against

Fig. 14. System goodputthe number of nodes

Fig. 15 and Fig. 16 illustrate the sleep rates before and after the cross-layer optimization. The figures clearly show that when the number of nodes increases, the sleep rate increases, leading to efficient energy management and controls delay. The sleep rate before cross-layer optimization is high for 500 nodes (0.30), and it gradually decreases while reaching 100 nodes (0.19). Similarly, the sleep rates after cross-layer optimization are high for 500 nodes (0.128) and then reduce with the number of nodes, and as the number of rounds increases, they meet at the same value, i.e., 0.02.

Fig. 15. Sleep rate before cross-layer optimization versus number of rounds.

Fig. 16. Sleep rate after the cross-layer optimization against number of rounds.

The number of alive nodes with respect to the number of rounds is depicted in Fig. 17. The alive node number for the proposed method remains constant at approx 800 rounds as compared to other methods like DEEC, Greedy routing, LEACH, and SEP. Almost all other approaches’ alive nodes reach zero after the 1400th round. But for the proposed scheme, it is maintained at 70 nodes with increasing rounds.

Fig. 17. Number of alive nodes against number of rounds.

Fig. 18 shows the total energy consumption of the network. The proposed method improves the energy efficiency by an average of 87.5% when compared to other methods like DASF, CDSWS, DDS, GCKN. The reason behind the improved efficiency is the use of both duty cycle scheduling and greedy routing algorithm, which saves the energy of the wireless network. The energy consumption ranges from 0.2 J to 0.6 J in the proposed method, which is relatively lower compared to other cross-layer optimized models.

Fig. 18. Total energy consumption in the network with the increase in the number of nodes.

Fig. 19 is the throughput analysis of the proposed method and other approaches like DEEC, SEP, LEACH, Greedy algorithm. The throughput of the proposed method records 77.27% enhancement when compared to the method with the lowest throughput. The throughput for the proposed method reaches 11000, while for others, it is lower than 7000. This is because the proposed method uses scheduling efficiently, which enhances the overall system throughput. The average delay for the proposed method mitigates 50%, as shown in Fig. 20. The proposed method ranges between 130 milliseconds to 720 milliseconds of average delay. Hence, it surpasses other existing models in terms of delay since the optimized cluster head positions and the greedy routing make the network work faster.

Fig. 19. The network throughput versus number of rounds.

Fig. 20. Average delay (ms) of the system with increase in the percentage of duty cycle.

Fig. 21 gives an end-to-end delay analysis for CL-CFMPR, FMRP, and the proposed method. It can be observed that the proposed method shows a 61% reduction in the network’s end-to-end delay and proves itself superior to the other two methods. The highest end-to-end delay noted by CL-CFMPR is 0.102 s. Table 3, Table 4, and Table 5 showcase the comparison of existing models with our proposed scheme on the grounds of energy utilization, goodput, delay, etc. Table 6 showcase overall comparision with latest existing schemes.

Fig. 21. End-to end delay with respect to the number of nodes.

Table 3. Comparison of routing protocols with proposed model

Table 4. Comparison of delay aware duty-cycled scheduling methods with the proposed scheme

Table 5. Comparison of scheduling schemes with the proposed schemes

Table 6. Comparison chart of similar existing relevant works and the proposed approach.

7. Conclusion

This paper considers the problem of maintaining various parametric issues at different layers of the WSN protocol stack through a real-life application. The application-based IoT framework in the proposed work has used some protocols and techniques like routing at the network layer, clustering at the node level, estimation at the data level, and scheduling at the data link layer. The coordination between the methods working at different layers is achieved by a cross-layer architecture shown in Fig. 6. This cross-layer data transmission scheme is using duty-cycled scheduling at the MAC layer and optimized the network layer parameters. The results reveal that the proposed method came out to be efficient in terms of throughput, sleep scheduling rates, end-to-end delay, energy consumption, and the number of alive nodes. It marks an 87.5% and 77.27% hike in the energy efficiency and the overall network throughput, respectively. A 61% degradation in the system’s end-to-end delay is noted compared to other state-of-the-art methods. As future work, the task of affected node scheduling can be made more effective by keeping the load balancing issue in view when the number of nodes becomes high. Also, an alternate, less complex method can be proposed for such applications where the accuracy matters most.

References

  1. A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal and Q. Z. Sheng, "IoT Middleware: A Survey on Issues and Enabling Technologies," IEEE Internet of Things Journal, vol. 4, no. 1, pp. 1-20, Feb. 2017. https://doi.org/10.1109/JIOT.2016.2615180
  2. K. Kumar, S. Kumar, O. Kaiwartya, Y. Cao, J. Lloret, and N. Aslam, "Cross-Layer Energy Optimization for IoT Environments: Technical Advances and Opportunities," Energies, vol. 10, no. 12, p. 2073, Dec. 2017. https://doi.org/10.3390/en10122073
  3. I. Jemili, D. Ghrab, A. Belghith, and M. Mosbah, "Cross-layer adaptive multi-path routing for multimedia Wireless Sensor Networks under duty cycle mode," Ad Hoc Networks, vol. 109, p.102292, 2020. https://doi.org/10.1016/j.adhoc.2020.102292
  4. S. Pandit and G. Singh, "Framework for Cross-Layer Optimization in Cognitive Radio Network," Spectrum Sharing in Cognitive Radio Networks, pp. 225-251, 2017.
  5. D. K. Sah and T. Amgoth, "Parametric survey on cross-layer designs for wireless sensor networks," Computer Science Review, vol. 27, pp.112-134, 2018. https://doi.org/10.1016/j.cosrev.2017.12.002
  6. M. Buettner, G. V. Yee, E. Anderson, and R. Han, "X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks," in Proc. of 4th international conference on Embedded networked sensor systems (SenSys' 06), New York, NY, USA, pp. 307-320, 2006.
  7. Z.T. LI, G.M. ZHU, Z.Q. WANG, T.R. PEI, G.F. PAN, "Low duty cycle and low collision asynchronous MAC protocol for wireless sensor network," Journal on Communications, vol. 34(10), pp. 9-16, 2013.
  8. P. Shi, C. Gu, C. Ge and Z. Jing, "QoS Aware Routing Protocol Through Cross-layer Approach in Asynchronous Duty-Cycled WSNs," IEEE Access, vol. 7, pp. 57574-57591, 2019. https://doi.org/10.1109/access.2019.2913679
  9. M. N. Jambli, M. I. Bandan, K. S. Pillay and S. M. Suhaili, "An Analytical Study of LEACH Routing Protocol for Wireless Sensor Network," in Proc. of IEEE Conference on Wireless Sensors (ICWiSe), pp. 44-49, 2018.
  10. M. M. P. Reddy and S. V. Rajan, "DEEC Protocol for WSNs," India Advances in Wireless and Mobile Communications, vol. 10, no. 1, pp. 51-63, 2017.
  11. G. Smaragdakis, I. Matta, A. Bestavros, "SEP: A stable election protocol for clustered heterogeneous wireless sensor networks," in Proc. of Second international workshop on Sensor and Actor Network Protocols and Applications (SANPA 2004), Vol. 3, pp. 1-11, 2004.
  12. I. Jemili, G. Tekaya and A. Belghith, "A Fast Multipath Routing Protocol for wireless sensor networks," in Proc. of IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), pp. 747-754, 2014.
  13. G. Nan, G. Shi, Z.Mao, M. Li, "CDSWS: coverage-guaranteed distributed sleep/wake scheduling for wireless sensor networks," EURASIP Journal on Wireless Communications and Networking, vol. 2012, pp. 1-14, Dec. 2012. https://doi.org/10.1186/1687-1499-2012-1
  14. L. Shu, L. Wang, J. Niu, C. Zhu and M. Mukherjee, "Releasing Network Isolation Problem in Group-Based Industrial Wireless Sensor Networks," IEEE Systems Journal, vol. 11, no. 3, pp. 1340-1350, Sept. 2017. https://doi.org/10.1109/JSYST.2015.2475276
  15. G. Han, Y. Dong, H. Guo, L. Shu, and D. Wu, "Cross-layer optimized routing in wireless sensor networks with duty cycle and energy harvesting," Wireless communications and mobile computing, vol. 15(16), pp.1957-1981, 2015.. https://doi.org/10.1002/wcm.2468
  16. X. Lv, P. Sun, X. Jia and J. Li, "A Threshold-Based Kalman Filter with Recursive Covariance Estimation," in Proc. of International Conference on Network and Information Systems for Computers (ICNISC), pp. 332-336, 2016.
  17. H. Wang, Y. Yang, M. Ma, J. He and X. Wang, "Network lifetime maximization with cross-layer design in wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 7, no. 10, pp. 3759-3768, October 2008. https://doi.org/10.1109/T-WC.2008.070079
  18. P. Sarwesh, N.S. Shet, K. Chandrasekaran, "ETRT-Cross layer model for optimizing transmission range of nodes in low power wireless networks-An Internet of Things Perspective," Physical Communication, vol. 29, pp. 307-318, Aug. 2018. https://doi.org/10.1016/j.phycom.2018.06.005
  19. C. Chandravathi, K. Mahadevan, "Web Based Cross Layer Optimization Technique for Energy Efficient WSN," Wireless Personal Communications, vol. 117, no. 4, pp. 2781-2792, Apr. 2021. https://doi.org/10.1007/s11277-020-07047-1
  20. T.-N. Dao, S. Yoon, and J. Kim, "A Deadline-Aware Scheduling and Forwarding Scheme in Wireless Sensor Networks," Sensors, vol. 16, no. 1, p. 59, Jan. 2016. https://doi.org/10.3390/s16010059
  21. D.-S. Vu, T.-N. Dao, and S. Yoon, "DDS: A Delay-Constrained Duty-Cycle Scheduling Algorithm in Wireless Sensor Networks," Electronics, vol. 7, no. 11, p. 306, Nov. 2018. https://doi.org/10.3390/electronics7110306
  22. Yongle Cao, S. Guo and T. He, "Robust multi-pipeline scheduling in low-duty-cycle wireless sensor networks," in Proc. of IEEE INFOCOM, pp. 361-369, 2012.
  23. J. Tan, A. Liu, M. Zhao, H. Shen and M. Ma, "Cross-layer design for reducing delay and maximizing lifetime in industrial wireless sensor networks," EURASIP Journal on Wireless Communications and Networking, vol. 2018, pp. 1-26, Dec. 2018. https://doi.org/10.1186/s13638-017-1011-3
  24. Xu, Xin, Minjiao Yuan, Xiao Liu, Anfeng Liu, Neal N. Xiong, Zhiping Cai, and Tian Wang, "A cross-layer optimized opportunistic routing scheme for loss-and-delay sensitive WSNs," Sensors, vol. 18, no. 5, p. 1422, 2018. https://doi.org/10.3390/s18051422
  25. Kalaikumar, K., and E. Baburaj, "FABC-MACRD: Fuzzy and artificial Bee colony based implementation of MAC, clustering, routing and data delivery by cross-layer approach in WSN," Wireless Personal Communications, vol. 103, no. 2, pp. 1633-1655, 2018. https://doi.org/10.1007/s11277-018-5872-5
  26. Kaur, Tarunpreet, and Dilip Kumar, "MACO-QCR: multi-objective ACO-based QoS-aware cross-layer routing protocols in WSN," IEEE Sensors Journal, vol. 21, no. 5, pp. 6775-6783, 2021.
  27. Lahane, Shivaji R., and Krupa N. Jariwala, "Secured cross-layer cross-domain routing in dense wireless sensor network: A new hybrid based clustering approach," International Journal of Intelligent Systems, vol. 36, no. 8, pp. 3789-3812, 2021. https://doi.org/10.1002/int.22438
  28. V. Nkemeni, F. Mieyeville, and P. Tsafack, "A distributed computing solution based on distributed kalman filter for leak detection in wsn-based water pipeline monitoring," Sensors (Switzerland), vol. 20, no. 18, pp. 1-38, 2020.
  29. P. Park, S. C. Ergen, C. Fischione, and A. S.Vincentelli, "Duty-cycle optimization for IEEE 802.15.4 wireless sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 10, no. 1, pp. 1-32, Dec. 2013.
  30. Q. Q. Shi, H. Huo, T. Fang, and D. R. Li, "A Modified Greedy Distance Routing Algorithm for Wireless Sensor Networks," in Proc. of China-Japan Joint Microwave Conference IEEE, pp. 197-200, 2008.
  31. Shanmugam, Ramalingam, and Baskaran Kaliaperumal, "An energy-efficient clustering and cross-layer-based opportunistic routing protocol (CORP) for wireless sensor network," International Journal of Communication Systems, vol. 34, no. 7, p. e4752, 2021.
  32. Patil, Urmila, Anju V. Kulkarni, Radhika Menon, and Mithra Venkatesan, "A novel AEB-AODV based AADITHYA cross layer design hibernation algorithm for energy optimization in WSN," Wireless Personal Communications, vol. 117, no. 2, pp. 1419-1439, 2021. https://doi.org/10.1007/s11277-020-07929-4
  33. Mahajan, Hemant B., and Anil Badarla, "Cross-layer protocol for WSN-assisted IoT smart farming applications using nature inspired algorithm," Wireless Personal Communications, vol. 121, no. 4, pp. 3125-3149, 2021. https://doi.org/10.1007/s11277-021-08866-6