Professional Documents
Culture Documents
Hajer Ben Fradj , Rajoua Anane , and Ridha Bouallegue Member, IEEE,
Innovation of communication and cooperative mobiles, InnoV’COM Lab, University of Carthage,Tunisia
Laboratory of Acoustics at University of Maine, LAUM UMR CNRS n 6613, France
benfradj.hajer@gmail.com, Rajoua.anane@univ-lemans.fr, ridha.bouallegue@ieee.org
260
|F wd∗ | i−1
transmit data to a destination, it first constructs the forwarder
list, the list of relays that can participate in the relaying of β = (1 − euv1 )Cv1 + ( euvj ).(1 − euvi )Cvi (6)
the frames. For each relay in this list, a cost is associated i=2 j=1
denoting the average number of transmissions required to go
to the destination through this relay. Proportionally at this Where Cuc is the cost of communication to choose the
cost, the source specifies a timer for each relay designating best path. Therefore we conclude that EEOR is a protocol
when transmission will be possible. The list of relays and their based on Fwd list which is a list includes minimum cost
timers are placed in the headers of each frame sent by the nodes calculated by equation (3). In order to minimize energy
source. In this way, each relay waits its turn before starting its consumption and choose the best path to the destination.
retransmissions leaving priority to the best relays [13]. This What monks in this type of protocol is that at the level of
type of protocol does not make it possible to take the energy choice of the nodes and of calculation of costs, sometimes
of the nodes. one chooses nodes of low energy which allows a reputation
On the other hand, this protocol suffers from the problem to the network. This patter is corrected by advancing EEOR
of replication of packets: several potential relayers relay protocol to define a new routing protocol Opportunistic ROR
the packet, this induces an unnecessary energy consumption. ’Range-based Opportunistic Routing’.
EEOR ’Energy Efficient Opportunistic Routing’ is an oppor- ROR is the progress of EEOR protocol, it presents several
tunistic routing protocol whose purpose is to minimize the attribute for each links of two nodes. Each link is characterized
energy consumption of nodes within the network, but it does by a simple cost C, an error rate E, a distance by contribution
not take into account the residual energy balance and the end- to the destination D, and the instantaneous energy of each
to-end packet delay. [14] Is a routing protocol that uses a node. According to these attributes, this makes the choice
list of candidates selected according to a set of criteria.The of the list Fwd which is also characterized by a maximum
source presents the list of candidates selected by sending it in number of nodes fixed at the beginning, with the aim of
a multiple way the information.This type of protocol presents minimizing the transmission number. The main objective of
a new type of calculation and choice of best candidates which the ROR protocol is to minimize energy consumption, which
is as follows: S is the list of S, increasingly sorted, based on makes it possible to increase the lifetime of the sensor network
the expected cost of each source node to send data to the given and the amount of data transmitted and minimize the number
target node. With Fwd (u) designate the list of source nodes of control messages [3]. The fundamental idea of ROR is to
chosen. To find the expected cost of node u, we will first sort minimize the number forword list by selection only the nodes
the list of Fwd * (u) in ascending order using their cost. closest to the destination and which at maximum energy. The
F wd(u) = v1 , V2 , ..., v|F wd(u)| , i < j, Cvi < Cvj . major disadvantage of opportunistic routing protocols is the
Let α denote the probability that a packet sent per node u is selection of several nodes to the forword list, so the solution
not received by a node in the chosen list Fwd*(u). is to work to minimize this number in order to minimize the
|F wd∗(u)| number of possible transmissions. The minimization of the list
nodes influences the total energy consumption and gives a
α= euvi . (1)
minimal lifetime, so, the solution is to present an algorithm
i=1
that minimizes the maximum number of candidates selected.
P is the probability that a packet sent per node is received by
at least one node in Fwd*(u) [14]. Then IV. O UR P ROPOSED P ROTOCOL ECS-OR
P = 1 − α. (2) The main problems in wireless sensor networks are routing
protocol, energy consumed by the node, security, aggregation
of data, unpredictable mobility of nodes, and so on. These
Cu (F wd∗ ) = Cuh (F wd∗ ) + Cuf (F wd∗ ) + Cuc (F wd∗ ) (3) sensors are sometimes deployed in hostile areas. It is therefore
necessary to have an efficient strategy that takes into consid-
eration the energy of the network to increase its lifetime by
With: reducing the loss of energy while being reactive to changes
Cuh represents the energy consumed by the node u to send in the environment. In this context, we propose a new routing
a packet [14]. protocol called ”Energy Candidate Set-opportunistic Routing”
and denoted ECS-OR. The objectives of our ECS-OR protocol
are as follows:
Cuh (F wd∗ ) = W/P (4) • Minimize energy consumption.
• Increase the lifetime of the sensor network.
Where W is the energy consumed and Cuf represents the total
cost under U to forward the packet to the destination using the • Minimize the number of control messages.
candidat set (CS) list [14]. • Minimize the number of transmission sent.
• Presents an effective solusion for a mobile network.
Cuf (F wd∗ ) = β/P (5) The fundamental idea of ECS-OR protocol is to minimize the
number of nodes to the list forword ie to select the best nodes
β is defined by:
261
at energy level, error rate, distance to destination, and the cost
of sending . Our protocol is based on two phases. The first
phase allows the cost calculation in the same way as the ROR
protocol.
Candidate List Selection Algorithm
Input: target node, source node, list of neighborhoods
of node i N(i),
the Expected cost(d, c, e), power w.
Output: the candidat list of each node.
1/add a source node in CS list.
Repeat
2/Calculate the expected cost if
CS(u) = v1
C = w ∗ 1/(d + c − e)
3/if The expected cost of C < cost of nodes
in C then add node.
The second phase consists in the selection of the list of
candidates, this process is detailed in the following algorithm.
Calculating cost algorithm
Input: the candidat list of each node,target node,
source node, the Expected cost(c, e, d), power w.
Output: the expected cost Cu(CS) from node
u to node t. Fig. 2: The fixed network topology of our algorithm
Repeat
1/Calculate the energy cost of each CS list
Cuh (CS ∗ ) = W/P
2/ Calculate the total cost under U to forward Table 2 presents the network parameters used throughout the
the packet to the destination using the F W D list. simulation.
Cuf (CS ∗ ) = β/P The variables Notation
3/ Calculate the communication cost reach an V number of neighboring nodes.
agreement on the choice of best path. U∗ is a node list ordered by cost.
Cuc until no node add a forwarder list. W is the energy consumed to send a
4/Orders the list CS according to energy. packet.
(Ni ) is the neighborhood liste of node i.
V. S IMULATION OF THE ECS-OR ROUTING ALGORITHM e(Ni , Nj ) is the probability that the packet
transmission under the link
In this section, we evaluate the performance of the ECS- (Ni , Nj ) is not efficient.
OR protocol by simulating under different network parameters, c represents the cost to send the
for example, power consumption, lifetime, duplicate packets, source packet to the list FRW.
packets loss rate using the network simulator NS2. We take d is the distance between the source
the topology of Figure 2 as an example representing a mobile and destination.
network with a 100-nodes random topology: N0 is the source Y is the probability that a received
and N100 is the destination. packet correctly.
C N ih is the energy calculated that nodes
First, we give an overview of the NS2 simulator that we used
Ni sending a packet to the destina-
and which was designed mainly for communication networks.
tion.
Then we show the results of our simulations which prove the
performance of this algorithm. The simulation parameters are C N if is the total cost expected by Ni to
summarized in Table 1. forward the packet to the destina-
tion using the list F W D(Ni ).
C N ic is the total cost of all F W D com-
Network Parameters Values munication nodes to reach agree-
Number of Nodes 100 to 700 ment on how the node selected for
Initial Node Energy 2 Joules packet transmission.
Tx Power 0.0762 EI Initial Energy of the Node(1j).
Idle Power 0.05 Ec Critical Energy Level of the
Sleep power 0.000048 Node().
Rx Power 0.0831 Er Residual Energy of the Node().
Routing Protocols ROR,EEOR,ExOR, ECS-OR NC Number of nodes in the list of
Propagation Model Two Ray Ground candidates.
Antenna Model Omni Antenna A network is represented by a graph G = (U, V), with U the
262
set of vertices (the nodes of the network), and V is the set
of links. We underline that our simulations were performed
on the ASUS machine under UBUNTU. More specifically, the
simulated detection nodes are equipped with an application
layer, opportunistic routing, random access to the medium and
a physical layer.
Fig. 5: Lifetime.
VII. C ONCLUSION
In this paper, we focus on minimizing energy consumption
Fig. 4: Energy consumption. and maximizing network lifetime of wireless sensor network.
For this matter, we develop and implement a new routing
opportunistic strategy called ”ECS-OR”. Our new routing al-
Figure 4 renders the total energy consumed according to gorithm permits to reduce significantly the energy consumption
the number of sensor nodes. This graph reveals that our for each sensor node. This technique allows the minimization
routing strategy is more advantageous than its counterparts of number of nodes in the CS list for each source. Through
in an energy point of view. This improvement is due to the extensive simulations, we disclose that the gain achieved with
minimization of number of candidate set for each shipment. ECS-OR protocol is very promising to obtain optimal energy
Passing now to the network lifetime, it has been observed network consumption and increase the lifetime of network.
from figure 5 that the ECS-OR protocol proposes a maximum
lifetime by supplying the ROR. R EFERENCES
[1] Awatef Benfradj Guiloufi, Nejeh Nasri, Abdennaceur Kachouri, Energy-
Efficient Clustering Algorithms for Fixed and Mobile Wireless Sensor
263
Fig. 6: Choice of fixed number of candidates.
Networks, in The International Wireless Communications and Mobile Communications Magazine, November 2015.
Computing Conference, IWCMC’14 Cyprus, 2014. [5] Zifei Zhong, Junling Wang, Srihari Nelakuditi, and Guor-Huar Lu. On
[2] Hajer Ben Fradj, Rajoua Anane, Mehdi Bouallegue, and Ridha Boual- selection of candidates for opportunistic anypath forwarding. SIGMO-
legue, ’Comparative Study of Opportunistic Routing in Wireless Sensor BILE Mob. Comput. Commun. Rev., 10(4):1, 2, 2006.
Networks’, IWCMC’17, June 28, 2017. [6] R. Ahlswede, Ning Cai, S.-Y.R. Li, and R.W. Yeung. Network information
[3] Hajer Ben Fradj, Rajoua Anane, Mehdi Bouallegue, and Ridha Boual- ow. Information Theory, IEEE Transactions on, 46(4):1204, 1216, July
legue, ’A Range based Opportunistic Routing Protocol for Wireless 2000.
Sensor Networks’, IWCMC’17, June 28, 2017. [7] M. Zorzi and R.R. Rao. Geographic random forwarding (geraf) for adhoc
[4] Amir Darehshoorzadeh, Azzedine Boukerche. Underwater Sensor Net- and sensor networks: multihop performance. Mobile Computing, IEEE
works:A New Challenge for Opportunistic Routing Protocols, IEEE Transactions on, 2(4):337, 348, Oct.-Dec. 2003.
264
[8] Szymon Chachulski, Michael Jennings, Sachin Katti, and Dina Katabi. Lifetime Maximization in Interference-limited Wireless Sensor Networks’,
Trading structure for randomness in wireless opportunistic routing. In IEEE Transactions on Wireless Communications, Vol. 5, No. 11, pp.
SIGCOMM ’07: Proceedings of the 2007 conference on Applications, 3142-3152, November 2006.
technologies, architectures, and protocols for computer communications,
pages 169, 180, New York, NY, USA, 2007. ACM. [12] M. Kaliszan and S. Stanczak , ’Maximizing Lifetime in Wireless Sensor
Networks under Opportunistic Routing’ , 44th Asilomar Conference on
[9] K. Kalpakis, S. Tang, ’A Combinatorial Algorithm for the Maximum Signals, Systems and Computers, Nov. 2010.
Lifetime Data Gathering with Aggregation Problem in Sensor Networks’.
In the Proceedings of the 9th IEEE International Symposium on a World [13] S. Biswas and R. Morris. Exor : opportunistic multi-hop routing
of Wireless, Mobile and Multimedia Networks (WOWMOM 2008), pp. for wireless networks. In ACM SIGCOMM Computer Communication
1-8, Newport Beach,CA, USA, June 23-26, 2008. Review, volume 35, pages 133-144. ACM, 2005.
[10] J.H. Chang and L. Tassiulas, ’Maximum lifetime routing in wireless [14] X.F. Mao, S. Tang, X. Xu, X. Y, Li, and H. Ma, Energy Efficient
sensor networks’, IEEE/ACM Trans. Netw., vol. 12, no. 4, pp. 609?619, Opportunistic Routing in Wireless Networks, Proceedings of IEEE Trans-
2004. actions on Parallel and Distributed Systems, vol. 22, no 11, pp. 1934-
[11] R. Madan, S. Cui, S. Lall, and A. Goldsmith, ’Cross-Layer Design for 1942,November 2011.
265