You are on page 1of 7

2018 IEEE 32nd International Conference on Advanced Information Networking and Applications

Energy consumption for opportunistic routing


algorithms in WSN

Hajer Ben Fradj , Rajoua Anane , and Ridha Bouallegue Member, IEEE,

Innovation of communication and cooperative mobiles, InnoV’COM Lab, University of Carthage,Tunisia

Laboratory of Acoustics at University of Maine, LAUM UMR CNRS n 6613, France
benfradj.hajer@gmail.com, Rajoua.anane@univ-lemans.fr, ridha.bouallegue@ieee.org

Abstract—Opportunistic routing (OR) is a new paradigm in


routing protocol for wireless sensor network (WSN). The OR
has aroused wide concern because it can improve the energy
consumption and reliability in wireless sensor networks (WSNs),
especially if the most sensor nodes are equipped with a limited no-
rechargeable battery power. In this context, performing optimal
routing strategy is a crucial task at the network layer of WSN.
In this paper, we focus on minimizing energy consumption
and enhance the network lifetime. Indeed, we proposed a new
opportunistic routing algorithm called ECS-OR (Energy Candi- Fig. 1: Wireless sensor network architecture
date Set-opportunistic Routing) that permit to balance energy
consumption and extend the lifespan of wireless sensor network.
Extensive simulations show that our proposed routing strategy
ECS-OR can significantly improve the network performance on
an opportunistic routing algorithm called ECS-OR, whose
energy saving and wireless connectivity in comparison with other
existing WSN routing schemes. objective is to deal with the problem of energy consumption
in order to maximize the lifetime of the network.
Keywords—WSN, Energy Efficiency, Opportunistic Routing, The remainder of this paper is organized as follows: The
Performance analysis, EEOR, ROR, ECS-OR, ExOR. next section introduces briefly the notion of network lifetime
and the main problems of WSN. Section III describes the
I. I NTRODUCTION energy recovery in opportunistic routing protocol. Section IV
he wireless sensor network is attracting more and more offers details of our opportunistic routing algorithm ECS-OR.
T researchers in the field of Telecommunications. This
type of network is low cost, easy to deploy, very flexible and
Finally, simulation results are discussed In Section V, followed
by the conclusion in Section VI.
multifunctional due to advances in micro-electromechanical
technology and the progresses in circuit design [1]. The WSN
can be defined as a collection of battery powered wireless II. T HE LIFETIME OF A SENSORS NETWORK
sensor nodes, which can sense events in the environment and Because of their small size, sensors generally have limited,
share the data gathered from sensing node to a central node. non-replaceable energy resources. This is the reason why
Their position in the network is not necessarily predetermined energy is often the most valuable criterion of a network of
because they can be randomly dispersed in a geographical sensors because it directly affects the lifetime of the sensors,
area (with an algorithm and a self-organization protocol) or and therefore of the whole network. The research work in the
their positions can be specified and organized in a targeted WSNs is thus oriented towards this important problem. The
area [2]. Figure 1 shows that a sensor array is connected by lifetime of a sensor network is generally defined by the time
a point to a host system. This connection point is called sink. the network is capable of maintaining enough connectivity,
All the data collected by each node is routed to the well or covering the catchment area, or keeping its node loss rate
collection point via a multi-hop architecture or only a jump below a certain level. There may be other definitions of the
according to the network topology. Sensor nodes use wireless network lifetime associated with other network parameters.
technologies to access the entire network, and there are The lifetime of a sensor network is thus linked to the duration
several categories of these wireless technologies. A wireless of life of the nodes. And the lifetime of a node depends mainly
network, not limited to wireless sensor networks, is a network on the lifetime of its battery. The latter depends on the energies
based on electromagnetic wave communication (radio, ultra consumed by the various modules that make up the node, the
sound, etc.). Thus, the terminals can move in a more or less battery technology and how to use it. Several definitions of the
extended geographical perimeter, while remaining connected. lifetime of a network of wireless sensors have been proposed
Several wireless communication technologies have been in the literature. Among the possible definitions:
developed. One technology differs from others in terms of the
emission frequency used, the transmission rate and the range • The duration until the first node exhausts all its energy
of transmissions [3]. [4].
In this article, our contribution focuses on the realization of

1550-445X/18/$31.00 ©2018 IEEE 259


DOI 10.1109/AINA.2018.00048
• The duration until all the sensor nodes exhaust their field, it is essential to deploy small sensors to avoid
energy [5]. annoying patients. Several contributions have been
introduced to optimize the size of sensors such as the
• Duration until 50% of the nodes deplete their batteries
integration of miniature antennas [7].
and stop working [6].
• The duration until the network is partitioned: the first
division of the network into two or more [7]. So, Wireless sensors are independent elements, as the name
implies. Therefore, they must also have a power supply au-
Therefore, the maximization of the lifetime of the network can tonomous. Their lifetime is limited by the lifetime of their
be achieved by the different energy conservation techniques battery. This strong constraint has a major influence on all the
existing. The first technique aims to reduce radio activity to techniques put in place for the deployment of such networks.
avoid overconsumption. This can be implemented by setting up A major effect of this energy limitation is the maximum
a scheduling of the communication time by a wake-up / awake limitation of very expensive radio transmissions. It is therefore
mechanism by a TDMA (Time Division Multiple Access), etc. essential to carry out as much as possible the treatment of the
The second technique is oriented towards the use of routing information locally at the node. The challenge is to extend the
protocols in order to route the amount of data exchanged in life of the system and its robustness, in case of fall of some
the WSNs. In addition, the use of mobility can be considered nodes only. The problems are thus far removed from those
to reduce system consumption [8]. Several factors influence of classical networks, such as the maximization of through-
the design of sensor networks such as fault tolerance, network put.This energy and consumed by the various functionalities
topology, radio link, energy consumption, mobility or material of networks which are therefore in decreasing order of energy
constraints [3]. Let’s try to know better these factors: consumption [8].
Radio (Communication),Protocols (MAC, routing), CPU (cal-
• Fault Tolerance: In special cases, the sensor node can culation, aggregation), end Acquisition. This work aims to
fail, which can be caused by a lack of energy, by in- guarantee distributed energy consumption in the network based
terference with the viewing environment or when new on routing protocols.
sensor nodes are added to the network. In particular,
the network must continue to operate normally and
III. E NERGY R ECOVERY IN O PPORTUNISTIC ROUTING
without interruption [1].
P ROTOCOLS
• Topology and connectivity: The topology of WSN can
Through the research work related to the sensor networks,
be changed in progress for some reasons:for example,
various problems have been raised. The maximization of the
the mobility of the nodes, the failure of the probes
lifetime of a sensor network has gained particular attention.
or the expiration of the energy of the sensors. Under
We mention that our work is closely based on the following
these conditions, the topology must imperatively be
works: [9] formulated the problem of lifetime maximization
adapted to these factors in order to maintain network
under the assumption of aggregation of data. The positions
operation [3].
of the sensors and that of the base station are known in
• Radio link: The support for the WSN must be effi- advance. A polynomial algorithm has been proposed to solve
cient in transmission, robust against interference and the problem under consideration. The latter is linear. [10]
less expensive. The wireless media used for sensor Treated the routing problem through the shortest path by
networks is ”Zig Bee”. This standard is simple to use, considering sensors with capacities to adapt their transmission
minimizes power consumption and provides through- powers. The work of maximizing the most important lifetime
put of up to 250 Kbps [6]. These features make its is that presented in [11]. The authors proposed a framework
use for WSNs convenient and profitable. that takes into account the constraints of the network layer,
MAC and physical. The framework adapts well to orthogonal
• Energy Consumption: Energy consumption is consid-
or non-orthogonal transmissions and has been evaluated for
ered a fundamental element in the context of avail-
different topologies. Performance in terms of service life is
ability in the WSN. This parameter poses a problem
remarkable. [12] formulated the problem of lifetime maximiza-
of conservation especially if the application must
tion in the case of opportunistic routing and random linear
work for a long time. In fact, for sensor networks,
coding. The idea is to receive the information according to a
it is impossible to recharge or replace batteries after
certain probability in order to balance the energy consump-
depletion [8].
tion between the sensor nodes. The proposed model is not
• Mobility of the nodes: The mobility of the nodes convex and only takes into account the constraints of the
in the RCSF represents the origin of the topological network layer (energy constraints, conservation of the flow and
variations. This parameter actually depends on the the calculated capacity in the case of opportunistic routing).
transmission power from one node to another, and Extremely Opportunistic Routing (ExOR) is a protocol for
subsequently the energy consumed during the commu- opportunistic routing created in 2004 at MIT by Biswas and. al.
nication and the lifetime of the network. It is essential EXOR depends on the Mac layer and thus ensures routing and
to define this criterion during the election phase of the scheduling of transmissions to avoid collision problems.
dominant languages where lower mobility is generally ExOR assumes that all network ETX (the ETX ’expected
preferred. number of transmissions’ used to deliver a message is inversely
proportional to the error rate.) pairs are known to each node.
• Hardware constraints: The size of the sensor is the On the basis of this information, when a source wishes to
most important hardware constraint. In the medical

260
|F wd∗ | i−1
transmit data to a destination, it first constructs the forwarder  
list, the list of relays that can participate in the relaying of β = (1 − euv1 )Cv1 + ( euvj ).(1 − euvi )Cvi (6)
the frames. For each relay in this list, a cost is associated i=2 j=1
denoting the average number of transmissions required to go
to the destination through this relay. Proportionally at this Where Cuc is the cost of communication to choose the
cost, the source specifies a timer for each relay designating best path. Therefore we conclude that EEOR is a protocol
when transmission will be possible. The list of relays and their based on Fwd list which is a list includes minimum cost
timers are placed in the headers of each frame sent by the nodes calculated by equation (3). In order to minimize energy
source. In this way, each relay waits its turn before starting its consumption and choose the best path to the destination.
retransmissions leaving priority to the best relays [13]. This What monks in this type of protocol is that at the level of
type of protocol does not make it possible to take the energy choice of the nodes and of calculation of costs, sometimes
of the nodes. one chooses nodes of low energy which allows a reputation
On the other hand, this protocol suffers from the problem to the network. This patter is corrected by advancing EEOR
of replication of packets: several potential relayers relay protocol to define a new routing protocol Opportunistic ROR
the packet, this induces an unnecessary energy consumption. ’Range-based Opportunistic Routing’.
EEOR ’Energy Efficient Opportunistic Routing’ is an oppor- ROR is the progress of EEOR protocol, it presents several
tunistic routing protocol whose purpose is to minimize the attribute for each links of two nodes. Each link is characterized
energy consumption of nodes within the network, but it does by a simple cost C, an error rate E, a distance by contribution
not take into account the residual energy balance and the end- to the destination D, and the instantaneous energy of each
to-end packet delay. [14] Is a routing protocol that uses a node. According to these attributes, this makes the choice
list of candidates selected according to a set of criteria.The of the list Fwd which is also characterized by a maximum
source presents the list of candidates selected by sending it in number of nodes fixed at the beginning, with the aim of
a multiple way the information.This type of protocol presents minimizing the transmission number. The main objective of
a new type of calculation and choice of best candidates which the ROR protocol is to minimize energy consumption, which
is as follows: S is the list of S, increasingly sorted, based on makes it possible to increase the lifetime of the sensor network
the expected cost of each source node to send data to the given and the amount of data transmitted and minimize the number
target node. With Fwd (u) designate the list of source nodes of control messages [3]. The fundamental idea of ROR is to
chosen. To find the expected cost of node u, we will first sort minimize the number forword list by selection only the nodes
the list of Fwd * (u) in ascending order using their cost. closest to the destination and which at maximum energy. The
F wd(u) = v1 , V2 , ..., v|F wd(u)| , i < j, Cvi < Cvj . major disadvantage of opportunistic routing protocols is the
Let α denote the probability that a packet sent per node u is selection of several nodes to the forword list, so the solution
not received by a node in the chosen list Fwd*(u). is to work to minimize this number in order to minimize the
|F wd∗(u)| number of possible transmissions. The minimization of the list
 nodes influences the total energy consumption and gives a
α= euvi . (1)
minimal lifetime, so, the solution is to present an algorithm
i=1
that minimizes the maximum number of candidates selected.
P is the probability that a packet sent per node is received by
at least one node in Fwd*(u) [14]. Then IV. O UR P ROPOSED P ROTOCOL ECS-OR
P = 1 − α. (2) The main problems in wireless sensor networks are routing
protocol, energy consumed by the node, security, aggregation
of data, unpredictable mobility of nodes, and so on. These
Cu (F wd∗ ) = Cuh (F wd∗ ) + Cuf (F wd∗ ) + Cuc (F wd∗ ) (3) sensors are sometimes deployed in hostile areas. It is therefore
necessary to have an efficient strategy that takes into consid-
eration the energy of the network to increase its lifetime by
With: reducing the loss of energy while being reactive to changes
Cuh represents the energy consumed by the node u to send in the environment. In this context, we propose a new routing
a packet [14]. protocol called ”Energy Candidate Set-opportunistic Routing”
and denoted ECS-OR. The objectives of our ECS-OR protocol
are as follows:
Cuh (F wd∗ ) = W/P (4) • Minimize energy consumption.
• Increase the lifetime of the sensor network.
Where W is the energy consumed and Cuf represents the total
cost under U to forward the packet to the destination using the • Minimize the number of control messages.
candidat set (CS) list [14]. • Minimize the number of transmission sent.
• Presents an effective solusion for a mobile network.
Cuf (F wd∗ ) = β/P (5) The fundamental idea of ECS-OR protocol is to minimize the
number of nodes to the list forword ie to select the best nodes
β is defined by:

261
at energy level, error rate, distance to destination, and the cost
of sending . Our protocol is based on two phases. The first
phase allows the cost calculation in the same way as the ROR
protocol.
Candidate List Selection Algorithm
Input: target node, source node, list of neighborhoods
of node i N(i),
the Expected cost(d, c, e), power w.
Output: the candidat list of each node.
1/add a source node in CS list.
Repeat
2/Calculate the expected cost if
CS(u) = v1
C = w ∗ 1/(d + c − e) 
3/if The expected cost of C < cost of nodes
in C then add node.
The second phase consists in the selection of the list of
candidates, this process is detailed in the following algorithm.
Calculating cost algorithm
Input: the candidat list of each node,target node,
source node, the Expected cost(c, e, d), power w.
Output: the expected cost Cu(CS) from node
u to node t. Fig. 2: The fixed network topology of our algorithm
Repeat
1/Calculate the energy cost of each CS list
Cuh (CS ∗ ) = W/P
2/ Calculate the total cost under U to forward Table 2 presents the network parameters used throughout the
the packet to the destination using the F W D list. simulation.
Cuf (CS ∗ ) = β/P The variables Notation
3/ Calculate the communication cost reach an V number of neighboring nodes.
agreement on the choice of best path. U∗ is a node list ordered by cost.
Cuc until no node add a forwarder list. W is the energy consumed to send a
4/Orders the list CS according to energy. packet.
(Ni ) is the neighborhood liste of node i.
V. S IMULATION OF THE ECS-OR ROUTING ALGORITHM e(Ni , Nj ) is the probability that the packet
transmission under the link
In this section, we evaluate the performance of the ECS- (Ni , Nj ) is not efficient.
OR protocol by simulating under different network parameters, c represents the cost to send the
for example, power consumption, lifetime, duplicate packets, source packet to the list FRW.
packets loss rate using the network simulator NS2. We take d is the distance between the source
the topology of Figure 2 as an example representing a mobile and destination.
network with a 100-nodes random topology: N0 is the source Y is the probability that a received
and N100 is the destination. packet correctly.
C N ih is the energy calculated that nodes
First, we give an overview of the NS2 simulator that we used
Ni sending a packet to the destina-
and which was designed mainly for communication networks.
tion.
Then we show the results of our simulations which prove the
performance of this algorithm. The simulation parameters are C N if is the total cost expected by Ni to
summarized in Table 1. forward the packet to the destina-
tion using the list F W D(Ni ).
C N ic is the total cost of all F W D com-
Network Parameters Values munication nodes to reach agree-
Number of Nodes 100 to 700 ment on how the node selected for
Initial Node Energy 2 Joules packet transmission.
Tx Power 0.0762 EI Initial Energy of the Node(1j).
Idle Power 0.05 Ec Critical Energy Level of the
Sleep power 0.000048 Node().
Rx Power 0.0831 Er Residual Energy of the Node().
Routing Protocols ROR,EEOR,ExOR, ECS-OR NC Number of nodes in the list of
Propagation Model Two Ray Ground candidates.
Antenna Model Omni Antenna A network is represented by a graph G = (U, V), with U the

262
set of vertices (the nodes of the network), and V is the set
of links. We underline that our simulations were performed
on the ASUS machine under UBUNTU. More specifically, the
simulated detection nodes are equipped with an application
layer, opportunistic routing, random access to the medium and
a physical layer.

Fig. 5: Lifetime.

VI. C HOICE OF FIXED NUMBER OF CANDIDATES

After choosing and calculating the list of candidates, there


Fig. 3: Duplicated packets. are often several possible paths to reach a destination, and
therefore the use of several relays to advance the frame to the
destination gives a consumption of more energy. The solution
Figure 3 shows the total duplicate packets during the trans- is to have selected a fixed number of relay nodes in case
mission process. It is clear that the ECS-OR protocol offers the energy consumption is minimal. But the problem is how
better performance than EEOR and ROR in the term of the many number of candidates to choose to send the packets
number of packets applied. It can also be deduced from these without loss, with a minimum of energy consumption and
curves that the ECS-OR protocol is more efficient at 15% than minimum costs?. Therefore, to answer this question, several
the ROR protocol, in terms of the number of lost packets, and simulation tests were presented with a variation of the number
more than 60% effective than the EEOR protocol. of candidates chosen in order to have an ideal number of sub-
sets of candida. We chose a network of 100 nodes and with
a random topology. Choosing the final list of the candidate
set according to which has better energy, this choice is set
each time to minimize, the number of multiple transfers
per shipment, the energy consumption, and the rate of loss
of packets. Figure 6 illustrates the result of three cases of
simulations. In case ”a”, we take the number of candidates
equal to 2. In case ”b” we set the number of candidates at 4
and finally in case ”C” at 6.
Figure 7 illustrates the result of two simulation cases. In case
”a”, we take the impact of a number of candidates on energy
consumption. In case ”b” we present the impact of the number
of candidates to the lost packet.

VII. C ONCLUSION
In this paper, we focus on minimizing energy consumption
Fig. 4: Energy consumption. and maximizing network lifetime of wireless sensor network.
For this matter, we develop and implement a new routing
opportunistic strategy called ”ECS-OR”. Our new routing al-
Figure 4 renders the total energy consumed according to gorithm permits to reduce significantly the energy consumption
the number of sensor nodes. This graph reveals that our for each sensor node. This technique allows the minimization
routing strategy is more advantageous than its counterparts of number of nodes in the CS list for each source. Through
in an energy point of view. This improvement is due to the extensive simulations, we disclose that the gain achieved with
minimization of number of candidate set for each shipment. ECS-OR protocol is very promising to obtain optimal energy
Passing now to the network lifetime, it has been observed network consumption and increase the lifetime of network.
from figure 5 that the ECS-OR protocol proposes a maximum
lifetime by supplying the ROR. R EFERENCES
[1] Awatef Benfradj Guiloufi, Nejeh Nasri, Abdennaceur Kachouri, Energy-
Efficient Clustering Algorithms for Fixed and Mobile Wireless Sensor

263
Fig. 6: Choice of fixed number of candidates.

Fig. 7: Number of candidates impact on the energy consumed.

Networks, in The International Wireless Communications and Mobile Communications Magazine, November 2015.
Computing Conference, IWCMC’14 Cyprus, 2014. [5] Zifei Zhong, Junling Wang, Srihari Nelakuditi, and Guor-Huar Lu. On
[2] Hajer Ben Fradj, Rajoua Anane, Mehdi Bouallegue, and Ridha Boual- selection of candidates for opportunistic anypath forwarding. SIGMO-
legue, ’Comparative Study of Opportunistic Routing in Wireless Sensor BILE Mob. Comput. Commun. Rev., 10(4):1, 2, 2006.
Networks’, IWCMC’17, June 28, 2017. [6] R. Ahlswede, Ning Cai, S.-Y.R. Li, and R.W. Yeung. Network information
[3] Hajer Ben Fradj, Rajoua Anane, Mehdi Bouallegue, and Ridha Boual- ow. Information Theory, IEEE Transactions on, 46(4):1204, 1216, July
legue, ’A Range based Opportunistic Routing Protocol for Wireless 2000.
Sensor Networks’, IWCMC’17, June 28, 2017. [7] M. Zorzi and R.R. Rao. Geographic random forwarding (geraf) for adhoc
[4] Amir Darehshoorzadeh, Azzedine Boukerche. Underwater Sensor Net- and sensor networks: multihop performance. Mobile Computing, IEEE
works:A New Challenge for Opportunistic Routing Protocols, IEEE Transactions on, 2(4):337, 348, Oct.-Dec. 2003.

264
[8] Szymon Chachulski, Michael Jennings, Sachin Katti, and Dina Katabi. Lifetime Maximization in Interference-limited Wireless Sensor Networks’,
Trading structure for randomness in wireless opportunistic routing. In IEEE Transactions on Wireless Communications, Vol. 5, No. 11, pp.
SIGCOMM ’07: Proceedings of the 2007 conference on Applications, 3142-3152, November 2006.
technologies, architectures, and protocols for computer communications,
pages 169, 180, New York, NY, USA, 2007. ACM. [12] M. Kaliszan and S. Stanczak , ’Maximizing Lifetime in Wireless Sensor
Networks under Opportunistic Routing’ , 44th Asilomar Conference on
[9] K. Kalpakis, S. Tang, ’A Combinatorial Algorithm for the Maximum Signals, Systems and Computers, Nov. 2010.
Lifetime Data Gathering with Aggregation Problem in Sensor Networks’.
In the Proceedings of the 9th IEEE International Symposium on a World [13] S. Biswas and R. Morris. Exor : opportunistic multi-hop routing
of Wireless, Mobile and Multimedia Networks (WOWMOM 2008), pp. for wireless networks. In ACM SIGCOMM Computer Communication
1-8, Newport Beach,CA, USA, June 23-26, 2008. Review, volume 35, pages 133-144. ACM, 2005.
[10] J.H. Chang and L. Tassiulas, ’Maximum lifetime routing in wireless [14] X.F. Mao, S. Tang, X. Xu, X. Y, Li, and H. Ma, Energy Efficient
sensor networks’, IEEE/ACM Trans. Netw., vol. 12, no. 4, pp. 609?619, Opportunistic Routing in Wireless Networks, Proceedings of IEEE Trans-
2004. actions on Parallel and Distributed Systems, vol. 22, no 11, pp. 1934-
[11] R. Madan, S. Cui, S. Lall, and A. Goldsmith, ’Cross-Layer Design for 1942,November 2011.

265

You might also like