Professional Documents
Culture Documents
Research Article
A Hybrid Node Scheduling Approach Based on Energy
Efficient Chain Routing for WSN
Copyright © 2014 Yimei Kang et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Energy efficiency is usually a significant goal in wireless sensor networks (WSNs). In this work, an energy efficient chain (EEC) data
routing approach is first presented. The coverage and connectivity of WSNs are discussed based on EEC. A hybrid node scheduling
approach is then proposed. It includes sleep scheduling for cyclically monitoring regions of interest in time-driven modes and
wakeup scheduling for tracking emergency events in event-driven modes. A failure rate is introduced to the sleep scheduling to
improve the reliability of the system. A wakeup sensor threshold and a sleep time threshold are introduced in the wakeup scheduling
to reduce the consumption of energy to the possible extent. The results of the simulation show that the proposed algorithm can
extend the effective lifetime of the network to twice that of PEAS. In addition, the proposed methods are computing efficient because
they are very simple to implement.
Rp Nodei
R
L4
L3 R
L2
BS
L1
L4
L2
L1
R
p
R
2R
p
R
BS
B
Cut point
R
Cut point A
2R
Figure 8: Cut point in an undirected-graph.
Figure 9: The extreme case of the location of nodes.
the grid. Obviously, the greater the 𝑅 is, the larger the probing if the distance 𝑑 between them is shorter than 𝑅𝑡 . Since 𝑑
area inside the grid will be. But, in that case, there will be satisfies the following equation:
larger coverage holes. Hence, the range of 𝑅 should satisfy the
following conditions: 𝑑2 = 𝑅2 + 4𝑅2 , (8)
√2 𝑅 should satisfy
𝑅 ≤ 𝑅 ≤ √2𝑅𝑝 . (6)
2 𝑝
√5
If complete coverage is not necessary, then 𝑅 = √2𝑅𝑝 is 𝑅≤ 𝑅. (9)
5 𝑡
an acceptable choice. However, when 𝑅 = √2𝑅𝑝 and the
coverage of nodes in other grids is ignored, there will be some Generally, the transmitting radius is very much farther than
coverage holes in a grid if the node does not locate at the the probing radius; that is, 𝑅𝑡 ≫ 𝑅𝑝 . Assume 𝑅𝑡 > √10/2𝑅𝑝 .
center of the grid. However, the nodes in other grids might Combined with the conditions in (6), the range of 𝑅 should
cover most of the area of this coverage hole because the nodes be
are randomly distributed and there are always coverage areas
√2 √5
outside a node’s own grid. 𝑅∈[ 𝑅𝑝 , 𝑅 ], 𝑅𝑡 ≤ √10𝑅𝑝
2 5 𝑡
(10)
4.2. Connectivity of the Network. The entire wireless sensor √2
network can be regarded as an undirected-graph. If a node 𝑅 ∈ [ 𝑅𝑝 , √2𝑅𝑝 ] , 𝑅𝑡 ≥ √10𝑅𝑝 .
2
called the cut point of the undirected-graph is turned off, the
network connectivity will be broken, as shown in Figure 8. To
Meanwhile, (8) should be satisfied.
keep the connectivity, all cut points must keep on working.
We can find all cut points in the network using the algorithm
proposed in [23].
First, the following definitions are given. 4.3. Schedulable Node Set. We only focus on those nodes
that can be turned off without negative effects on network
Definition 2. If node 𝑗 in tier 𝐿 𝑘 is directly connected to node coverage and routing connectivity. A schedulable node set is
𝑖 in tier 𝐿 𝑘−1 , node 𝑗 is called the neighbor node of node 𝑖 and defined as follows.
node 𝑖 is called the neighbor node of node 𝑗 as well.
Definition 4. A node is a schedulable node in 𝐴 𝑗 , 0 < 𝑗 ≤
Definition 3. If node 𝑗 has no neighbor node in the network, 𝑀, where 𝑀 is the total number of the grids in the whole
it is an isolated node. network, if the node in grid 𝐴 𝑗 meets all of the following
Due to Definition 3, if the distance between a node and conditions.
its nearest neighbor node is further than 𝑅𝑡 , the node is an
(1) The node is not a cut point.
isolated node. To keep the network connectivity, the node
scheduling approach should avoid creating such an isolated (2) The node is not an isolated node.
node. (3) The node is not a unique node in 𝐴 𝑗 .
In addition, to guarantee that there is at least one working
node in each tier, 𝑅 should satisfy the following equation: All schedulable nodes in 𝐴 𝑗 construct the schedulable
node set 𝑆𝑗 of grid 𝐴 𝑗 , 0 < 𝑗 ≤ 𝑀.
𝑑0
= 𝑘, (7)
√5𝑅 In this paper, only the nodes in a schedulable node set can
be put to sleep. The schedulable nodes in each grid are sched-
where 𝑘 is a positive integer. uled independently. Since there are more and more dead
In the extreme case, the working nodes locate at the two nodes with depleted energy in the network, the connectivity
furthest opposite vertexes A and B of adjacent grids, as shown will change. Therefore, the scale of the schedulable node set is
in Figure 9. When node A is the nearest neighbor node of being continuously reduced. In the following sections, “node”
node B, these two nodes can communicate to each other only always refers to a schedulable node.
6 Advances in Mechanical Engineering
5.1.1. The Initialization Mechanism. All nodes are initially in 5.1.2. Sleep Scheduling. In a time-driven mode, there should
the sleeping state. After a preset time 𝑡0 , all nodes enter the be only one node in a working state in each grid at any time.
initializing state and all nodes can receive messages from In order to extend the lifetime of a network, the nodes in a
other nodes. In the initializing state, nodes in the grid 𝐴 𝑗 grid should work in turn. The simplest scheduling is for the
begin to send a probing message to each other, 0 < 𝑗 ≤ 𝑀. working node to wake the next node up in the node queue,
𝑡start (𝑖) is the time that the 𝑖th node in grid 𝐴 𝑗 begins to send one after one. But this may lead to some areas that have not
the probing message. To avoid colliding, 𝑡start (𝑖) gets a random been monitored for a long time because some coverage holes
value in [0, 𝑇init ], with 𝑇init being the allowable initializing exist. In the proposed algorithm, each node will transit in
time. state in accordance with a scheduling cycle to avoid having
During the initializing time, each node explores whether some areas that cannot be monitored for a very long time. In
there is a working node in 𝐴 𝑗 by sending a probing message. If addition, a node may unexpectedly fail because its failure rate
a node did not receive a message about a working node claim is not zero.
in the grid, the node will enter the working state and set itself A node should not be switched to the sleeping state when
as the first working node in the node queue. The node queue it is collecting data. To ensure that this is the case, the time
is shown in Figure 10. The node will work in turn according spent by the node in the working state should be longer
to the ring queue starting from node 1. than the time spent in collecting data. Assuming that the
The exploring procedure is described as in Algorithm 1. data acquisition cycle is 𝑇collect , which is usually determined
The node with the minimum 𝑡start (𝑖) in 𝐴 𝑗 generally elects by demand, the time spent in collecting data is 𝑡collect , the
to be the first working node. Because it is the first one to send a idle time during each 𝑇collect is 𝑡idle , the scheduling cycle
message, it did not receive any messages, including a working is 𝑇schedule (𝑗) in grid 𝐴 𝑗 , and the communication time is
node claim, when 𝑡 = min{𝑡start (𝑖)}, as shown in Figure 11. negligible. In a scheduling cycle of 𝐴 𝑗 , 𝑡work (𝑗) is the working
If there is one working node, the other nodes communicate time, 𝑡sleep (𝑗) is the sleeping time, and there is
with the working node to build the node queue and then go
back to the sleeping state. The working node builds the node 𝑇collect = 𝑡collect + 𝑡idle ,
queue according to the sequence of nodes applying to join the (11)
node queue. The information on the node queue is stored in 𝑇schedule (𝑗) = 𝑡work (𝑗) + 𝑡sleep (𝑗) .
Advances in Mechanical Engineering 7
begin
input 𝑡 from the timer of each node
if 𝑡 = 𝑡0 then
for all 𝑖 = 1 to 𝑁𝑗
node(𝑖) enters the initializing state
end for
else if 𝑡 = 𝑡start (𝑖) then
if node(𝑖) received a claim message from the working node in
the grid 𝐴 𝑗 then
node(𝑖) sends a message to the working node to apply to
join the node queue
node(𝑖) enters the sleeping state
else
node(𝑖) claims itself as the working node
end if
end if
end
To guarantee that the WSN works well, there must be tcollect tidle
Data acquisition
𝑡work (𝑗) ≥ 𝑡collect . (12) cycle
Tcollect
begin
//𝑁𝑗 is the number of alive nodes in 𝐴 𝑗 , 𝑚 is an integer, and 𝑚 ≥ 1
set 𝑘 = 𝑚 ⋅ 𝑁𝑗
set 𝑡work (𝑗) = 𝑚 ⋅ 𝑇collect
set 𝑡sleep (𝑗) = (𝑘 − 1) ⋅ 𝑚 ⋅ 𝑡work (𝑗)
input 𝑡 from the timer of each node
for working node(𝑖)
if 𝑡 = 𝑡work (𝑗) then
node(𝑖) sends a working message to the next node in the node
queue of 𝐴 𝑗
node(𝑖) enters the sleeping state
end if
end for
for sleeping node(𝑖)
if 𝑡 = 𝑡sleep (𝑗) then
if node(𝑖) received a working message from the working node
then
node(𝑖) enters the working state
end if
end if
end for
end
Parameter Value
6
Object region 80 × 80 m2
Node number 500, 1000, 1500, 2000, 2500
Initial energy 54∼60 Jules
4
𝐸elec 5 nJ/bit
𝜀fs 10 pJ/bit/m2
2
𝜀mp 0.0013 pJ/bit/m4
𝑑0 87 m
0
0 5 10 15 20
Time (s)
Figure 14: Nodes in the assisting state go back to the sleeping state A source and a sink are placed in opposite corners of the
after period 𝛿 (=5 s) in grid 𝐴 𝑗 . field. The source generates a data report every 10 seconds and
the data report is delivered to the sink. In the simulation,
we compared our method with PEAS. The GRAB forwarding
protocol [7] is used in the simulation for PEAS. The sim-
Initializing ulation of our scheduling algorithms is based on the EEC
proposed in this paper. We test the effective lifetime of the
network, which is the duration during which the data can
no d
s
n
de
t = de is
rki i) a
T sta wo
o
t=
ng
t0
(i) king
t=
an
r
d
es
W
or
t=
et
g
ki
tin
ng
an
sis
en rk
et
As
t o (j
es
rg
cc )
ta
ur
o
s
Begin
input an event interrupt request
set 𝑡 = 𝑡event //𝑡event is the time at which the event happens
for working node(𝑖)
if 𝑡 = 𝑡work (𝑗) then
node(𝑖) sends a working message to the next node in the
node queue of 𝐴 𝑗
node(𝑖) enters the assisting state
else
node(𝑖) sends an assisting message to all other nodes in 𝐴 𝑗
end if
end for
for sleeping node(𝑖)
if 𝑡 = 𝑡sleep (𝑗) then
if node(𝑖) received a working message from the working
node then
node(𝑖) enters the working state
end if
else if node(𝑖) received an assisting message from the
working node then
node(𝑖) enters the assisting state
end if
end for
end
can work for the longest time when we apply our method
40
when 𝑅 ≈ √2𝑅𝑝 , compared to PEAS and to our method with
a smaller 𝑅.
20
Figure 18 shows the effective lifetime under various fail-
ure rates from 25 to 250 per 5000 seconds when the network
0 scale is 2500. When we take the failure rate into account,
2 3 4 5 6 ×104
Time (s) our method guarantees the longest effective lifetime when
𝑅 ≈ √2𝑅𝑝 compared to PEAS and our method with a smaller
R = 3.82 R = 2.23 𝑅. As the failure rate increases, the lifetime tends to decrease.
R = 2.97 PEAS
The effective lifetime of PEAS decreases about 25% when
Figure 16: A comparison of network coverage for different strate- the failure rate is 250. The network effective lifetime is
gies. approximately stable when the proposed method is applied
with any 𝑅, even in the case of the biggest failure rate.
×104 80
Assisting nodes
5
Working nodes
4.5 70 Target path
4
Network effective lifetime (s)
60
2
30
1.5
20
1
0.5 10
0
500 1000 1500 2000 2500 0
0 10 20 30 40 50 60 70 80
Network scale (number of nodes)
Monitoring region side (m)
R = 3.82 R = 2.23
Figure 19: Nodes woken up along the target trace.
R = 2.97 PEAS
Figure 17: Network effective lifetime versus network scale for dif-
ferent strategies. 30
29
×104 28
6.5
Monitoring region side (m)
6 27
5.5 2
Network effective lifetime (s)
26
5 3 1
25
4.5 Grid A 136
4 24 4 5
3.5 23
3
22 Assisting nodes
2.5
Working nodes
2 21 Target path
1.5
20
1 30 32 34 36 38 40
0 50 100 150 200 250 Monitoring region side (m)
Node failure rate (per 5000 s)
Figure 20: Distribution of assisting nodes in the monitoring area.
R = 3.82 R = 2.23
R = 2.97 PEAS
Figure 18: Effective lifetime versus failure rate. can efficiently and reliably prolong the effective lifetime of
WSN and the wakeup scheduling can trace events with
precision. Moreover, the method has very good time per-
To clearly observe the node states, the distribution of formance for real applications because it is very simple.
assisting nodes in the monitoring area is shown in Figure 20. Hence, the proposed algorithm can be applied to complex real
The working node in grid 𝐴 136 woke up all sleeping nodes applications that demand not only the periodic collection of
in this region. The nodes will not perceive the target until it information but also the tracking of unusual events.
moves far away from them.
Conflict of Interests
7. Conclusion
The authors declare that there is no conflict of interests
An energy efficient data routing approach based on tier divi- regarding the publication of this paper.
sion was first proposed. Based on EEC, a hybrid node
scheduling approach based on partition was proposed. The References
scheduling can reduce energy consumption while reaching
the goals of both time-driven and event-driven applications. [1] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC
The results of the simulation show that the sleep scheduling protocol for wireless sensor networks,” in Proceedings of the 21st
12 Advances in Mechanical Engineering
Annual Joint Conference of the IEEE Computer and Communica- [15] H. Lee, A. Keshavarzian, and H. Aghajan, “Multi-cluster multi-
tions Societie (IEEE INFOCOM ’02), vol. 3, pp. 1567–1576, June parent wake-up scheduling in delay-sensitive wireless sensor
2002. networks,” in Proceedings of the IEEE Global Telecommunica-
[2] C.-Y. Wen and Y.-C. Chen, “Dynamic hierarchical sleep sche- tions Conference (GLOBECOM ’08), pp. 1–6, December 2008.
duling for wireless ad-hoc sensor networks,” Sensors, vol. 9, no. [16] J. Niu and Z. Deng, “Distributed self-learning scheduling
5, pp. 3908–3941, 2009. approach for wireless sensor network,” Ad Hoc Networks, vol.
[3] A. Keshavarzian, H. Lee, L. Venkatraman, K. Chitalapudi, 11, no. 4, pp. 1276–1286, 2013.
D. Lal, and B. Srinivasan, “Wakeup scheduling in wireless [17] A. Rossi, M. Sevaux, A. Singh, and M. J. Geiger, “On the cover
sensor networks,” in Proceedings of the 7th ACM International scheduling problem in wireless sensor networks,” in Network
Symposium on Mobile Ad Hoc Networking and Computing Optimization, vol. 6701 of Lecture Notes in Computer Science,
(MOBIHOC ’06), pp. 322–333, May 2006. pp. 657–668, 2011.
[4] S. Balamurugan, S. Saraswathi, and A. Mullaivendhan, “Delay [18] L. Gu and J. A. Stankovic, “Radio-triggered wake-up capability
sensitive optimal anycast technique to maximize lifetime in for sensor networks,” in Proceedings of the 10th IEEE Real-Time
asynchronous WSN’s,” Procedia Engineering, vol. 38, pp. 3351– and Embedded Technology and Applications Symposium (RTAS
3361, 2012. ’04), pp. 27–36, May 2004.
[5] A. Cerpa and D. Estrin, “ASCENT: adaptive self-configuring [19] M. J. Miller and N. H. Vaidya, “Power save mechanisms for
sensor networks topologies,” IEEE Transactions on Mobile multi-hop wireless networks,” in Proceedings of the 1st Interna-
Computing, vol. 3, no. 3, pp. 272–285, 2004. tional Conference on Broadband Networks (BroadNets ’04), pp.
[6] Y. Xu, J. Heidemann, and D. Estrin, “Geography-informed 518–526, October 2004.
energy conservation for ad hoc routing,” in Proceedings of the [20] C. Schurgers, V. Tsiatsis, S. Ganeriwal, and M. Srivastava,
7th Annual International Conference on Mobile Computing and “Topology management for sensor networks: exploiting latency
Networking, pp. 70–84, July 2001. and density,” in Proceedings of the 3rd ACM International Sym-
posium on Mobile Ad Hoc Networking & Computing (MOBIHOC
[7] F. Ye, G. Zhong, S. Lu, and L. Zhang, “A robust data delivery pro-
’02), pp. 135–145, June 2002.
tocol for large scale sensor networks,” in Information Processing
in Sensor Networks, vol. 2634 of Lecture Notes in Computer [21] L. Oberg and Y. Xu, “A complete energy dissipation model for
Science, pp. 658–673, 2003. wireless sensor networks,” in Proceedings of the International
Conference on Sensor Technologies and Applications (SENSOR-
[8] Y. Zhao, J. Wu, F. Li, and S. Lu, “VBS: maximum lifetime sleep
COMM ’07), pp. 531–540, October 2007.
scheduling for wireless sensor networks using virtual back-
bones,” in Proceedings of the Annual Joint Conference of the IEEE [22] T. K. Sarkar, Z. Ji, K. Kim, A. Medouri, and M. Salazar-Pal-
Computer and Communications Societie (IEEE INFOCOM ’10), ma, “A survey of various propagation models for mobile
pp. 1–5, March 2010. communication,” IEEE Antennas and Propagation Magazine,
vol. 45, no. 3, pp. 51–82, 2003.
[9] A. Mutazono, M. Sugano, and M. Murata, “Energy efficient
sleep scheduling in wireless sensor networks inspired by satellite [23] J. E. Hopcroft and R. E. Tarjan, “Efficient algorithms for graph
behavior of frogs,” in Proceedings of the 8th IEEE International manipulation,” Communications of the ACM, vol. 16, no. 6, pp.
Conference on Pervasive Computing and Communications Work- 372–378, 1973.
shops (PERCOM Workshops ’10), pp. 450–455, April 2010.
[10] S.-Y. Wang, K.-P. Shih, Y.-D. Chen, and H.-H. Ku, “Preserving
target area coverage in wireless sensor networks by using
computational geometry,” in Proceedings of the IEEE Wireless
Communications and Networking Conference 2010 (WCNC ’10),
pp. 1–6, April 2010.
[11] P. Lohan and R. Chauhan, “Geography-informed sleep sched-
uled and chaining based energy efficient data routing in WSN,”
in Proceedings of the IEEE Students’ Conference on Electrical,
Electronics and Computer Science (SCEECS ’12), pp. 1–4, March
2012.
[12] G. Anastasi, M. Conti, M. di Francesco, and A. Passarella, “An
adaptive and low-latency power management protocol for
wireless sensor networks,” in Proceedings of the ACM Interna-
tional Workshop on Mobility Management and Wireless Access
(MobiWAC ’06), pp. 67–74, October 2006.
[13] G. Anastasi, M. Castronuovo, M. Conti, and M. di Francesco,
“Experimental evaluation of an adaptive staggered sleep proto-
col for wireless sensor networks,” in Proceedings of the 9th IEEE
International Symposium on Wireless, Mobile and Multimedia
Networks (WoWMoM ’08), pp. 1–6, Newport Beach, Calif, USA,
June 2008.
[14] O. Khader, A. Willig, and A. Wolisz, “Distributed wakeup
scheduling scheme for supporting periodic traffic in WSNs,” in
Proceedings of the European Wireless Conference (EW ’09), pp.
287–292, May 2009.