Documente Academic
Documente Profesional
Documente Cultură
`
.
I
f
f
l
l
l
f
f
I
X
Fig. 2: The spati circular correlation model
TABLE I: Notations
Symbol
5
i
5
j
.
dC
i
,
j
)
(
P
i
'
P
i
)
L
ij
Description
Sensing region of node n
i
of r-radius disk centered at itself
Sensing region of node n
j
of r-radius disk centered at itself
Area of the Sensing region
Euclidean between nodes n
i
and n
j
located at S
i
and S
j
Intersection points of two r-radius disks of nodes
A corman chord length which is length of the line segment
joining two intersection points P
i
and P
i
aea
Area of region surrounded by arc denoted by P
i
P
i
for S
j
and chord denoted by P
i
P
i
LlC
)
AJ
,
2
From Eq. (2) , we get
2 LlC
) d( i,j)
Ke(d(i,j))
.
(3)
(4)
Let 2r be a control parameter, Eq. (4) can be simplifed
as
)
_
2 LlC -
e
- 2d(i,j)
V
Ke(d(i j)) -
- d
c'
)
)
'J
(5)
We see that when d(i,j) 2r, the correlation model gives
zero value. It means that there is no correlation between sensor
nodes. So, we introduce a control parameter equal to 2r, as
a variable to control the correlation among nodes. Thus, the
correlation model can be rewritten in general form as follow.
K (d )
-
_
) e (i,j)
7 --V
(i,j)
for U d(i,j) .
U for d(i,j) `
ze
e.es e.es+
Y e.ez+
e eeezs
e s
e.
.eess'
..
e es
e e.-
- e e
e s
e es
e.es
e.eess
e.ee++
e.ees+
e.es+
e e
e.ezs
e
e.+ e.s
f
e.ess
L.eess
<
e.ess
e
X me|ers)
Fig. 5: Random distribution of 30 nodes with e m.
Algorithm Correlation-based Iterative Node Selection (C
INS)
S = NodeSelectCorr(
{NI, N21 ",
}, {Ke
(.)}
N*N, M)
begin
S=
{0},N
{
NI
'
N2, ...
}, Ke{Ni'
Nj}
Ke(
i
,
j).
Find the (Ni, N
j
) = 0I1IJ
]]__ {Ke
(Ni, N
j)};
/*Find the least correlated pair of nodes. */
Add the corresponding Ni and N
j
into S.
if M ` 2 then
for k 1 to M - 2 do
for Nz N, Nz S do
end for
Ke(Nz, S)
{Ke(Nz, Nj)}
.
Nm 0I1IJ {Ke
(Nm,S)}
;
]
,
_],;`
Add Nm into S.
end for
end if
return S
{
NI
' N2, ... , NM}
end
Fig. 3) . Given the same location of nodes, if we change the
sensing range, more connected lines will appear. It indicates
more correlated nodes (see Fig. 4) . In Fig. 5, we see the
calculated correlated data value in the middle of the lines
connected between two nodes. It is clearly seen from plots that
according to sensing range and position of nodes, the nodes
gets divided into groups like clusters. Based on this analysis,
we can determine how many nodes are in weak correlation or
strong correlation according to sensing range and location of
sensor nodes.
IV. ApPLICATION OF CORRELATION MODEL
The proposed model can be used to exploit the spatial
correlation for the development of specifc MAC and routing
TABLE II: Simulation Parameters
Initial power 100 J NS-2 energy model EnergyModel
Tx power 0.660 W Carrier Sensing range 550 m
Rx power 0.0395 W Communication range 250 m
Idle power 0.035 W Size of RTS/CTSI ACK lO B
Bandwidth 20 Kbps Size of SCH/PION 14 B
DlFS lOms Size of Data 100 B
SIFS 5ms Contention Window 64 ms
Retry Limit 5 ruty Cycle 5%
protocols in event-driven WSNs. According to the results
obtained fom previous section, we found that some nodes are
weakly correlated and some are strong correlated for given
sensing radius ! and location of nodes. To apply these results
in design of MAC protocol, we introduce a Correlation-based
Iterative Node Selection (C-INS) algorithm (Algorithm-I) to
determine the least correlated nodes in order to exploit the
spatial correlation. In next section, we introduce a traffc
model to use the results of algorithm-I in existing MAC
protocols. This is one of the example showing how to apply
our correlation model to exploit the spatial correlation under
event-driven workload.
. Random Correlated Event trfc Model (RCET)
Let event area be a round region of radius Rc with center
at (x, y) location in two-dimensional plane. The nodes within
circular area of radius Rc are allowed to be active for generat
ing the traffc (i.e. UDP packets in NS-2) . All the UDP packets
are routed to the sink via intermediate nodes. Sink is placed
at one of the corner of gird network. We adjust the Rc for
changing the number of reporting nodes (i.e. denoted by N) .
We integrate the feature of our correlation model into NS-2
using RCET model. In our experiments, RCET model picks
a random (x, y) location for each event and C-INS algorithm
determines the least correlated nodes by exploiting the spatial
correlation between all active nodes inside the Rc-radius event
area. These selected nodes then act as representative nodes (i.e.
UDP source) for given event area. In this paper, we denote this
number as least correlated reporting nodes (denoted by l) for
an event. Therefore only out of N nodes are selected using
RCET model for simulating event driven workload in NS-2.
V. SIMULATION RESULTS USING EXISTING MAC
PROTOCOLS
In this section, we present simulation results using our
model to evaluate the impact of reporting nodes by taking
spatial correlation into consideration. The simulation scenario
contains 49 nodes grid network distributed into 2000x2000m
area. A random event will be generated afer a fxed time
interval (i.e. 100 sec.) with different event area using RCET
model and total N nodes will be activated to send the
reports to the sink node. The least correlated reporting nodes
(i.e. l) out of N nodes are selected inside the event area
140
120
100
80
60
40
20
DCC-MAC
[ R-MAC
RI-MAC
[ DW-MAC
12 15
Number of reporting nodes in the event area (N)
Fig. 6: average time required to report an event without using
correlation model.
0 ==--------
DCC-MAC
80
70
20
10
[ R-MAC
RI-MAC
[ DW-MAC
4 5 7 10
Number of least correlated reporting nodes in the event area (M)
Fig. 7: average time required to report an event using corre
lation model.
using proposed correlation model. Except for the networking
parameters shown in Table-I, we have used default settings
as used for evaluations of CC-MAC, RMAC, RI-MAC, and
DW-MAC by the respective authors. We have simulated CC
MAC [9], RMAC [6], RI-MAC [8], and DW-MAC [5] to
show the efciency of our correlation model in terms of
energy and latency for event-driven workload over NS-2.
These protocols are contention based or contention based
combined with schedule for WSNs. We frst simulate using
RCET model which determines the total reporting nodes (i.e.
N) inside event area according to a trigger event. We then
apply our correlation model into RCET model to determine
the least correlated reporting nodes (i.e. l) using Algorithm
I with e 1U meters.
Figs. 6 and 7 show the end-to-end event latency correspond
ing to number of reporting nodes ( achieved by varying the
event radius). Basically it is the average time required to report
an event. In other words, event latency is the time required
to send all UDP packets generated by the nodes which are
located inside an event area. On an average 637.45 packets
are generated for an event. It is shown that CC-MAC achieves
0.5
0.45
0.4
a. 5
a.
0.25
0.2
0.15
0.1
0.05
D CC-MAC
[ R-MAC
RI-MAC
[ DW-MAC
7 12 15
Number of reporting nodes in the event area (N)
Fig. 8: average amount of energy consumed by the network
to transmit an event without using correlation model.
0. 5 @
0.
0.25
T
. 0.1
.2 0.15
f
_ 0.1
f
0.05
DCC-MAC
g R-MAC
RI-MAC
[ DW-MAC
10
Number of least correlated reporting nodes in the event area (M)
Fig. 9: Average amount of energy consumed by the network
to transmit an event using correlation model.
low latency compared to other protocols in both cases because
it is minor modifcation of IEEE 802.11 without duty-cycle
mode and forwarding of packets is routed based on priority
handled by E-MAC. In the case of least correlated reporting
nodes (see Fig. 7) , event latency has been reduced to 20 -
40 ' for all the protocols because of reducing the number
of reporting nodes to N based on location. It decreases the
trafc and hence correlated contention is minimized. Figs. 8
and 9 show the average amount of energy consumed per unit
time for an event by varying number of reporting nodes (i.e.,
varying the event radius) . We see the impact of reporting nodes
on energy consumption due to increased traffc load. With our
correlation model, energy consumption is obviously reduced
as less number of nodes (N) are selected for same scenario
taking spatial correlation into consideration. Hence, we see
that energy consumption and event latency both are reduced
by exploiting the spatial correlation.
VI. CONCLUSION AND FUTURE WORK
A novel correlation model, in this paper, is introduced to
determine the accurate information about correlation charac
teristics between sensor nodes based on location. Based on
correlation model, C-INS algorithm is proposed to exploit the
spatial correlation. The results of correlation model are applied
to existing MAC protocols using NS-2. Using simulation
results, we have demonstrated that a signifcant amount of
energy saving is possible by exploiting the spatial correla
tion. Further, end-to-end delay in event reporting can also
be reduced signifcantly. The analytical results of proposed
correlation model show that degree of correlation between
nodes depends on sensing range and location of nodes. Based
on correlation relationship among nodes, the nodes form
correlated clusters of different sizes, depending on control
parameter e and node density.
In future, we will extend our work by comparing proposed
correlation model with existing correlation models, given by
Vuran et al. [9] and Guoqiang et al. [11]. We also need
to design a protocol to implement the C-INS algorithm in
distributed fashion with least overhead.
VII. ACKNOWLEDGEMENT
We thank to Mr. Yanjun Sun for providing us NS-2 source
code for RI-MAC, DW-MAC and Mr. Shu Du for helping us
with RMAC source code.
REFERENCES
[I] Jian Q, Gong ZH, Zhu PD, Gui CM, "Overview of MAC protocols in
wireless sensor networks," Joural of Software, vol. 19, no. 2, pp.389-
403,2008.
[2] W. Ye, J. Heidemann, and D. Estrin, "An energy-effcient MAC protocol
for wireless sensor networks," in Prceedings of the Twenty-First Annual
Joint Conference of the IEEE Computer and Communications Societies
(INFOCOM), vol. 3, pp. 1567-1576,2002.
[3] G. Lu, B. Krishnamachai, and e. Raghavendra, "An adaptive energy
etcient and low-latency MAC for data gathering in sensor networks," In
Int. Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor
Networks (WMAN), Santa Fe, NM, April 2004.
[4] ] T. van Dar, K. Langendoen, "An Adaptive Energy Etcient MAC
Protocol for Wireless Sensor Networks," In Prc. of ACM SynSys '03,
Los Angeles, California, USA, Nov. 2003.
[5] Yanjun Sun, Shu Du, Orer Gurewitz, David B. Johnson, "DW-MAC: a
low latency, energy effcient demand-wakeup MAC protocol for wireless
sensor networks," in Prc. of the 9th ACM interational symposium on
Mobile ad hoc networking and computing (MobiHoc'08), may 2008.
[6] Shu Du, Amit Kumar Saha, and David B. Johnson. "RMAC: A Routing
Enhanced Duty-Cycle MAC Protocol for Wireless Sensor Networks,"
In Prceedings of the 26th Annual IEEE Conference on Computer
Communications (INFOCOM 2007), pp. 1478-1486, May 2007.
[7] J. Polastre, J. Hill, and D. Culler, "Versatile low power media access for
wireless sensor networks," In Prc. of the 2nd interational conference
on Embedded networked sensor systems, pp. 95-107, 2004.
[8] Y Sun, O. Gurewitz, and D. Johnson, "RI-MAC: a receiver-initiated
asynchronous duty cycle MAC protocol for dynamic traffc loads in
wireless sensor networks," in Prc. ACM Sensys 2008, pp. 1-14,2008.
[9] M. e. Vuran and I. F. Akyildiz, "Spatial Correlation based Collaborative
Medium Access Control in Wireless Sensor Networks ", In IEEEIACM
Trns. On Networking, vol. 14, no. 2, pp. 316-329, 2006.
[10] Vuran, M.e., Akan, O.B., and Akyildiz, I.F.: 'Spatio-temporal corre
lation: theory and applications for wireless sensor networks', Comput.
Netw. 1. (Elsevier), vol. 45, 2004, pp. 245-259
[II] G. ZHENG, S. TANG, "Spatial Correlation-Based MAC Protocol for
Event-Driven Wireless Sensor Networks," In Joural of Networks, vol. 6,
no. I, Jan. 2011.
[12] A. Ghosh, S. K. Das, "Coverage and connectivity issues in wireless
sensor networks: A survey," Pervasive and Mobile Computing Vol. 4,
No. 3, pp. 303-334, 2008.
[13] J.O. Berger, V de Oliviera, B. Sanso, "Objective bayesian analysis of
spatially correlated data," J. Am. Statist. Assoc.96 (2001), pp. 1361-1374,
2001.
[14] The Network Simulator2 NS2. [Online]. Available:
http://www.isi. edunsnams (2009).