Documente Academic
Documente Profesional
Documente Cultură
Regular paper
Energy Efficient Cross Layer based Adaptive Threshold Routing Protocol for
WSN
PII: S1434-8411(16)30621-5
DOI: http://dx.doi.org/10.1016/j.aeue.2016.12.001
Reference: AEUE 51741
Please cite this article as: R. Singh, A. Kumar Verma, Energy Efficient Cross Layer based Adaptive Threshold
Routing Protocol for WSN, International Journal of Electronics and Communications (2016), doi: http://dx.doi.org/
10.1016/j.aeue.2016.12.001
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers
we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and
review of the resulting proof before it is published in its final form. Please note that during the production process
errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
Energy Efficient Cross Layer based Adaptive Threshold Routing Protocol for
WSN
Ramnik Singh1, Anil Kumar Verma2
1
Research Scholar,ECED, Thapar University, Patiala
2
Group Lead – Mobile Computing and Communication (MC2) Group
Associate Professor, CSED, Thapar University Patiala
Abstract- Wireless Sensor Networks (WSNs) perform an important part in modern day
communication as it can sense the various physical and environmental parameters by employing
low cost sensor devices. The growth of the networks due to scientific advancements have
altogether made it possible to create an energy efficient cross layer network that can improve its
lifespan. In this paper, a routing protocol is proposed for the networks which are heterogeneous
and are based on the adaptive threshold sensitive distributed energy efficient cross layer routing
protocol. The concept of weighted probability is used to assign the CH (Cluster Head) of the
network cluster. The proposed algorithm is simulated, tested and compared with previously
established routing protocols and has shown enhanced results and prolonged network lifespan.
In the proposed protocol, a combination of the proactive and reactive network is considered for
effective data transmission.
Keywords- WSNs, Clustering, Routing Protocols, Network Lifespan, Network Stability.
1. Introduction
Wireless Sensor Network (WSN) is evidently one of the most rapidly evolving networks which
have led to the advancements in the field of communications. The reason behind this can be
bestowed upon the development of sophisticated, reduced and cheaper sensor devices that
exhibits the ability to sense different types of environmental and physical parameters, processing
it, and transmitting the data wirelessly. A WSN comprises of spatially distributed independent
sensors that can be used to observe environmental or physical conditions, such as, pressure,
vibration, acoustic parameters and temperature parameters to synchronically authorize their data
through the prime location, i.e. the base station (BS) across the network. Generally, WSNs
consists of huge number of nodes which are having a power resource with limited energy. Since
the energy needed to impart sensed data packets to the BS is large, so a routing protocol which is
energy efficient is required. The routing protocols are required to build the paths for
communication between the sensor nodes and the BS. Thus, to securely and efficiently transmit
the data from nodes to BS becomes the utmost critical job of these sensor networks. Lately,
various routing protocols have been proposed that use the resources efficiently, conclusively
improving the network lifespan.
The cross layer technique [14, 15] is used to achieve optimal QoS (Quality of Services)
parameters. It combines various layers of the communication protocol to exchange information
in a non-hierarchical manner. This technique is thus suited for better communication of the
1
information with reduced optimal energy consumptions [17]. The cross layer concept is depicted
in Figure1.
Applications
Presentation
Session
Network
Data Link Capacitive Assignment-MAC
2
of various parameters such as bandwidth utilization, delay, and throughput. The multipath based
reliable routing makes use of multiple paths to overcome route failures, whereas QoS-based
routing strive for a balance between the data quality and the energy expenditure.
The routing protocols generally employ a clustering technique, in which sensor networks are
divided into small convenient units. The funding idea to employ clustering method is to advance
the scalability of the network, but it also attains energy efficient routing protocol for transmission
of the information. The additional features include the conversation of transmission bandwidth
between the clusters, localization of an energy efficient route system between the clusters, and
prevention of redundant data transfer among the nodes.
The clustering method LEACH has been proposed by Heinzelman et al. in [3] which shared the
energy load amongst the sensor nodes equally. The LEACH approach is based on the random
rotation of the cluster coordinate theory and utilizes the localized coordinates to enable
ruggedness and scalability in the dynamic networks. It also includes data aggregation which is
used to reduce the content of information passed to the base station. It has also added the
advantage of increasing the network lifespans. Another clustering method, known as HEED is
presented in [4], makes use of residual energy as the probability to select the CH.
The work has been further extended, as multihop-LEACH and energy-LEACH[5]. Energy-
LEACH, known as E-LEACH, is devoted to the reduction of overall consumption of the
network’s energy by enhancing the criteria of the choice for the CH. Multihop-LEACH, known
as M-LEACH protocol acts on the mode of communication by initiating single to multihop
communication across sink and CH. In 2013, Javaid et al. [6] introduced EDDEEC, a routing
system based upon clustering for Wireless Sensor Networks which are hetrogeneous. The
funding idea lies in the effect and dynamic change on the Cluster head election probability. The
algorithm shows enhancement in stability period, network lifespan and enhanced bypassing of
effective signals to BS in heterogeneous conditions as compared to Energy-Efficient
Heterogeneous Clustering (EEHC) scheme, Distributive Energy-Efficient Clustering (DEEC),
Developed Distributive Energy-Efficient Clustering (DDEEC), and Enhanced Developed
Distributive Energy-Efficient Clustering (EDDEEC). All of the above mentioned approaches
enhance the energy efficiency and the lifespan of the network by distributing network energy
consumption uniformly. To code and control multiple video streams simultaneously in multihop
wireless networks, a novel cross layer framework is proposed in [7]. In this, a scheme is
proposed known as cross layer distributed flow control, an optimal transmission rate from source
to destination for wireless communications is achieved. Another analytical coding approach
known as - rate-distortion optimized joint source-channel is employed to chose the coding
strategy of the channel optimally given that the optimal transmission rate is acquired from the
prevailing channel condition and the proposed flow control scheme.
An optimum routing for cross layer is also proposed for wireless mesh networks based on the
principle of adaptive spatial TDMA[8]. The authors in [9] surveys various cross-layer designs,
especially for MANETs.
3
Flat Protocols
Network
Structure
Hierarchical
Protocols
Query based
Protocols
Mobile Agent
based Protocols
Topology Based
Location based
Protocols
QoS based
Protocols
Reliable Routing
Multipath based
Protocols
4
One of the primary problems faced for definitive multicast transmissions across wireless
networks is the dynamic nature of the wireless link. Vien et al. [13] proposed a network coding
to improve the overall network throughput. A new cross-layer optimization framework to design
the network topology is introduced which optimizes the multicast rate of the wireless networks,
the energy supply, the data flow of the wireless links, and node lifespan available bandwidth.
ElAttar et al. [14] optimize these goals while considering the effects of various network design
parameters like node spatial density, data rate, and traffic load by investigating the minimum
transmitted power. The authors of [15] provides a distinctive categorization of cross-layer QoS
approaches in Wireless Sensor Networks which permits to survey numerous studies with
maximum clarity. Indumathi et al. [16] proposed a new Adaptive Cross-Layer Scheduler design,
which outperforms the previous techniques by lessening a prescribed cost function which
contains the delays states and the current channel of the packet in the queue according to both
user throughput and packet delay. In [17], a novel cross-layer mobility aware MAC protocol for
cluster-based cognitive radio sensor network is proposed, the primary focus being formation and
maintenance of clusters.
In this paper, a novel method is introduced that employ a cross layer technique through the
various layers (refer figure1). This method proves to be very effective for the construction of
WSNs for optimized energy consumptions. For adaptive threshold sensitive distributed cross
layer energy-efficient routing, the Cluster head is selected with respect to the weighted
probability, which is based upon factor i.e. the mean energy of the whole network divided by
residual energy of every single node. The results shows the improved stability and prolonged
network lifespan when compared to DEEC, EEHC, and EDDEEC.
2. Proposed Work
The proposed routing protocol employs two models, namely the Network model, and the Radio
energy model. The Network Model concentrates on cluster formation and CH selection, whereas,
the Radio Energy model focuses on calculating the energy expended during transmission,
reception, and accumulation of data. The network is modeled as a square field of uniformly
distributed random nodes. It is considered that every single one of the sensor nodes become static
once the deployment gets over, i.e. every sensor node become steady and accumulate data from
the field which is based upon some sensed features and make it bypass to the base station. It is
named as ATEER in order to justify the Energy Efficiency based on Adaptive Threshold
concept.
It is presumed that WSN comprises of heterogeneous nodes which have the separate levels of
normal node, having (1 + ), (1 + ), and initial energies respectively. It is also taken
nodal energy, thus classifying sensor nodes into super-advanced node, advanced node, and
into consideration that the sensor nodes are not rechargeable and have limited battery life. Thus,
they have the tendency to merge all the redundant data which in turn, saves the energy.
The communication between the cluster member and its corresponding CHs is carried out
through single-hop communication. It is also assumed that the relative distance is approximated
based upon the input signal strength and the network doesn’t have access to GPS navigation.
5
Start
Initialization of
Parameters
Node Eres(i)
No Node is not alive.
Residual
Energy > 0 Dead = Dead + 1
Yes
Evaluate Probability
P(i) for each node
Evaluate Probability
P(i) for each node
Aggregation of data by CH
and send To Base Station
No If CV > HT
Base Station
Sleep CV – SV >=
ST
Parameters Symbol Values
Network Area 100×100
Total number of nodes present in a system 100
Fraction of super nodes amidst advanced nodes 0.6
Energy factor of Super node 3
Fraction of advanced sensor nodes amidst normal nodes 0.4
Threshold distance 70 m
Energy factor of Advanced node 2
Energy dispersed per bit 50 nJ/bit
_
Data packet aggregation energy 5 nJ/bit/message
Transmitter amplify if ≥
Predetermined percentage of CH 0.05
Transmitter amplify if ≤
0.0013 pJ/bit/m4
10 pJ/bit/m2
Message size or Data packet 512 bytes
The distribution of the nodes all over the test area of network is uniform, and location of the
nodes are explained arbitrarily. Sensor nodes that are placed is assumed to be 100 in number and
having the field area of 100×100 m2 in which they are deployed.
The Cluster Heads are elected on the basis of characteristic i.e. Node weighted probability. The
probabilities are determined with the factor i.e. the mean energy of the whole network divided by
the residual energy of each sensor node. The rotating epoch for every single one of the sensor
node is unique when the initial and final residual energy is calculated. The CH per round during
each epoch is selected from the sensor nodes which have highest residual energy. In this
algorithm, every single one of the node generates a random number which should be present in
the range of 0-1.
The threshold function (
) is defined for the cluster head selection. When the number
generated is much less than the threshold function, then that node will become the CH, otherwise
it will not. The new CH is chosen during every round based upon this threshold function that
results in the distribution of load of energy consumption across the sensor nodes and CHs.
7
% &'
# , 23 5
67
(
) = 1 − )* ∗ , -1. =
$ &' &' /0
#
(1)
" 0 , ,9ℎ;*<2;
In eq. (1) _ is the optimal number of Cluster Heads , * represents the current round count,
7 represents sensor nodes group that had not been chosen as CHs in the last 1.
_
rounds
with respect to the given threshold function.
Thus, it is appropriate to consider a certain value _ as a reference. In real scenarios, the
It is considered that all the sensor nodes in a homogeneous WSNs possess similar initial energy.
nature of the Wireless Sensor Networks is heterogeneous, i.e. they have more than one type of
initial energy value. Hence, it is obvious to replace _ with > according to the type of node,
sensor node implies the reference value of each node should be specific in accordance to its
namely super sensor node, advanced node and normal node is given by:
_ >
% ) 0 23 5
> 2 B,*C B,;
#(1 +
. ( + . ))
@A
#
&' (1 + ) > =
> = ) 0 23 5
> 2 DBE; B,;
$(1 +
. ( + . ))
@A
(2)
# &' (1 + ) >
# ) 0 23 5
> 2 FG;* B,;
" (1 +
( + . ))
@A
In eq. (2) @A is the mean energy of the whole sensor network and > represents the sensor
lifespan and the total energy of the network. Thus, at * roundthe average energy
@A of a
node's residual energy. Originally, every sensor node requires prerequisite knowledge of the
For every sensor node in association with initial energy or the residual energy, the new threshold
device is putting value of > from eq. (2) in eq. (1), the expression becomes:
for CH selection, related with residual energy or initial energy of every single one of the sensor
8
Algorithm: A routing protocol based on the adaptive threshold sensitive distributed energy
efficient routing protocol
begin
for2 = 1 to 2
O
Initiate the parameters
ifH (2 ) > 0
Deploy sensor nodes in Test Area
ifMQ > N
Become a Cluster Member
MQ − 5Q ≥ 5
Become a Cluster Head MN>K
and send a Message
else sleep
end
end
elseH (2 ) < 0
end
9
% >
# , 23 5
6 7
(
> ) = 1 − > )* ∗ , S1. T0 =
$ >
#
(5)
" 0 , ,9ℎ;*<2;
The new threshold values are calculated by eq. (5), once the CH is elected. The CH node
broadcasts a message which contains various parameters. Thus, every single one of the normal
node picks to join the nearby Cluster Head which is based upon the value of input signal strength
of the message presented by Cluster Head node during the cluster formation phase. After that,
every CH node is notified by the sensor node that they might be a member of cluster and then it
sends a concise joining message return to CH node. Thus, every single one of the CH nodes have
to hold their receiver entity on. Conclusively, every one of the CH generates a TDMA schedule
that inform every node of the cluster member that when they can impart data which is based on
the total number of nodes in a particular cluster. Every single one of the CH then chooses a
CDMA code and then distribute this code to all the members of cluster. The funding idea for
utilizing CDMA code is to minimize inter-cluster interference.
Once clusters has been created and TDMA schedule gets fixed, the member nodes which are
active imparts sensed data for the first time, as the data transmission phase begins, in which if the
parameters received from physical attribute suite come to its Hard Threshold (HT) value then the
sensed value is deposited in the variable of sensor or an internal register. Next time, the sensor
will only impart when the physical parameter that are sensed is greater than Hard Threshold
(HT) and current value minus PSV is greater than Soft Threshold (ST) value. During this phase,
the active cluster members send the data to Cluster Head (CH). The CH will aggregate that
received data and imparts the aggregated packets to the Base Station.
3. Results and Discussions
The evaluation and examination of the performance for hierarchical protocols, the basic used
matrices are total data packets received at Base Station, network residual energy, and the number
of nodes alive.
The proposed model is tested in a fixed area for a particular number of sensor nodes. The
proposed hybrid protocol (ATEER) is simulated with EDDEEC, DEEC, and EEHC protocols
based on performance metrics.
It is evident from figure 3, that the network lifespan and stability period for proposed scheme,
ATEER, has enhanced network lifespan in comparison to the old techniques. As the lifespan
increases , energy efficiency of the proposed algorithm is also improved. The network lifespan of
the protocols EEHC, DEEC, ATEER and EDDEEC are 5995, 2890, 7123, and 5403 rounds
respectively.
10
(a) (b)
Fig. 4. Performance evaluation of network lifespan of protocols in terms of (a) Nodes which are
The proposed algorithm is analyzed for data packet transmission to the Base Station in different
protocols. The following comparison curve is obtained.
11
It is demonstrated that the proposed approach, ATEER, lessens the amount of transmissions by
allowing sensor nodes to only impart once the physical value, that is sensed is in the given range.
ST reduces amount of the imparted data packets by limiting needless transmissions that become
apparent when there is minor variation in the sensed values. The total data packets received by
Base Station in the case of , EEHC, DEEC, ATEER and EDDEEC are 189894, 165556,256774
and 249355 respectively.
The proposed algorithm is tested and simulated by taking different cases of ATEER based on
parameters which are defined as in table 2. The proposed scheme is simulated and compared for
all the four cases with a large number of dead and alive nodes. The respective comparison curves
obtained are shown in figure 5.
Table 2: The effect of threshold and count time on proposed protocol ATEER.
(b)
(a)
Fig. 6. The performance of ATEER taking four different cases changing ST and RT for (a) alive
nodes, and (b) dead nodes.
12
4. Conclusions
The basic advancement of proposed hybrid technique ATEER is because of the consideration of
all the three levels of node heterogeneity. The CHs have been selected in accordance to the ratio
calculated from the average energy of entire network and residual energy of the sensor node. The
technique shows better results for heterogeneous networks even when compared to homogeneous
networks.
The employment of both reactive and proactive network concepts, has turned fruitful in
improving the stability period and network lifespan. The unnecessary transmission of data has
been reduced by application of both HT and ST, and the application of count time provided an
exact estimate of the network at the periodical interval to the user.
The simulation results provide the conclusion that the proposed scheme outperforms DEEC,
EDDEEC, and EEHC by 47.84%, 38.30%, and 66.67% respectively, demonstrating the
improved energy efficient WSN and a long network lifespan. The employment of the proposed
technique along with reactive and proactive network concepts, and considering the heterogeneity
of network while selecting the cluster head, has increased the network lifespan and has improved
the load balancing throughput of the network.
The threshold function can be optimized for selection of CHs or a method can be introduced
to make the WSN more energy efficient increasing its lifespan. A modified TDMA or integration
of CDMA, and TDMA schedule can be employed to prevent the interference of signals from
nodes to CHs, while transmitting data from sensor nodes to the BS.
REFERENCES
[1] Pantazis, N. A., Nikolidakis, S.A., and Vergados, D. D. (2013), “Energy-Efficient
Routing Protocols in Wireless Sensor Networks: A Survey”, IEEE Communications
Survey & Tutorials, vol. 15, 2, pp. 551-591.
[2] Mitra, R., and Nandy, D. (2012), “A Survey on Clustering Techniques for Wireless
Sensor Networks”, International Journal of Research in Computer Science, vol. 2, 4,
pp.51-57.
[3] Heinzelman, W. R., Chandrakasan, A. P., and Balakrishnan, H. (2000), “Energy-
Efficient Communication Protocol for Wireless Microsensor Networks,” in Proceedings
of the 33rd Annual Hawaii International conference on System Sciences, Maui, HI,
USA, pp. 3005-3015.
[4] Younis, O., and Fahmy, S. (2004), “HEED: A Hybrid Energy-Efficient Distributed
Clustering Approach for Ad Hoc Sensor Network”, IEEE Transactions on Mobile
Computing, vol. 4, 3, pp. 366-376.
[5] Xiangning, F., and Yulin, S., (2007), “Improvement on LEACH Protocol of Wireless
Sensor Networks”, in Proceedings of International Conference on Sensor Technologies
and Applications, SensorComm, Valencia, Spain, pp. 260-264.
[6] Javaid, N., Qureshi, T. N., Khan, A. H., Iqbal, A., Akhtar, E., and Ishfaq, M. (2013),
“EDDEEC: Enhanced developed distributed energy-efficient clustering for
heterogeneous Wireless Sensor Networks”, Procedia Computer Science, vol. 19, pp.
914-919.
13
[7] Zhou L., Zheng B., Geller B, Wei A., Cui J. (2009), “Joint QoS control for video
streaming over wireless multihop networks: a cross-layer approach”, AEU-
International Journal of Electronics and Communications, vol. 63, no. 8, pp. 638-647.
[8] Elhakeem A. K. (2011), “Cross layer design using adaptive spatial TDMA and optimum
routing for wireless mesh networks”, AEU-International Journal of Electronics and
Communications, vol. 65, no. 1, pp.44-52.
[9] Pease S. G., Guan L., Phillips I., Grigg A. (2011), “Cross-layer signaling and
middleware: A survey for inelastic soft real-time applications in MANETs”, Journal of
Network and Computer Applications, vol. 34, no. 6, pp. 1928-1941.
[10] Shokouhifar M., Jalali A. (2015),“A new evolutionary based application specific routing
protocol for clustered wireless sensor networks”, AEU-International Journal of
Electronics and Communications, vol. 69, no. 1, pp. 432-441.
[11] Tutschku K., Tran-Gia P., Andersen F. U. (2008), “Trends in network and service
operation for the emerging future Internet”, AEU-International Journal of Electronics
and Communications, vol. 62, no. 9, pp. 705-714.
[12] Zhang Y, He W. (2010),“Cross-layer design in multiuser diversity system” in
Proceedings of International Conference Signal Processing Systems (ICSPS), vol. 3, pp.
V3-631.
[13] Vien Q. T., Tu W., Nguyen H. X., Trestian R. (2014), “Cross-layer optimisation for
topology design of wireless multicast networks via network coding” in Proceedings of
39th Annual IEEE Conference on Local Computer Networks, pp. 466-469.
[14] ELAttar H., Abdelaty H., ElRamly S. H., Aboul-Dahab M. A. (2011), “PHY-MAC
Cross Layer Issues for QoS Provisioning in Wireless Ad-Hoc Networks”, in Proceedings
of Information Technology: New Generations (ITNG), Eighth International Conference,
pp. 100-105.
[15] Al-Anbagi I., Erol-Kantarci M., Mouftah H. T. (2014), “A Survey on Cross-Layer
Quality-of-Service Approaches in WSNs for Delay and Reliability-Aware Applications”,
IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 525-552.
[16] Indumathi G., Murugesan K. (2007), “Throughput Maximization in Wireless Systems
Using an Adaptive Cross Layer Scheduling”, in Proceedings of International Conference
on Computational Intelligence and Multimedia Applications, vol. 4, pp. 388-392.
[17] Zareei M., Islam A. M., Mansoor N., Baharun S., Mohamed E. M., Sampei S. (2015),
“Cross-layer mobility-aware MAC protocol for cognitive radio sensor network” in
Proceedings of International Conference on Informatics, Electronics & Vision (ICIEV),
pp. 1-6.
14
Energy Efficient Cross Layer based Adaptive Threshold Routing Protocol for
WSN
Ramnik Singh1, Anil Kumar Verma2
1
Research Scholar,ECED, Thapar University, Patiala
2
Group Lead – Mobile Computing and Communication (MC2) Group
Associate Professor, CSED, Thapar University Patiala
Ramnik Singh is currently working as an Assistant Professor in the department of Computing Science and Engineering at DAV Institute of
Engineering and Technology, Jalandhar, India. He is currently pursuing his PhD. degree from Thapar University Patiala. His work areas of interest
are Wireless Sensor Networks and MANETs.
8.ramnik@gmail.com
Anil Kumar Verma is currently working as Associate Professor in the department of Computer Science and Engineering at Thapar University,
Patiala in Punjab (INDIA). He received his B.S. M.S. and PhD. in 1991, 2001 and 2008 respectively, majoring in Computer Science and
Engineering. He has worked as Lecturer at M.M.M. Engineering College (now, MMM University of Technology), Gorakhpur from 1991 to 1996.
From 1996 he is associated with the same University. He has been a visiting faculty to many institutions. He has published over 150 papers in
refereed journals and conferences (India and Abroad). He is member of various program committees for different International/National
Conferences and is on the review board of various International journals. His area of interest is Adhoc networks, Wireless sensor networks and
security .
akverma@thapar.edu
15