ABSTRACT
In this study, we have proposed a novel Cluster-based Energy-efficient Data Collecting and Aggregation Protocol (CEDCAP) which based on clustering routing mechanism; CEDCAP have employed the node degree control mechanism in each cluster after forming the all clusters. There are certain number of dormant nodes and dormant areas will be produced in the network, during data transmission phase, there dormant nodes do not sense and send any data. Within the same dormant area, these nodes take turns to be woken up between different rounds and send data to the own cluster head. The influence factors and time complexity of CEDCAP are analyzed. The NS-2 simulation results show that compared with LEACH (Low-Energy Adaptive Cluster Hierarchy), CEDCAP improves the energy consumption load balancing of the network and prolongs the network lifetime.
PDF Abstract XML References Citation
How to cite this article
URL: https://scialert.net/abstract/?doi=rjit.2011.93.103
INTRODUCTION
With the advances of low-cost, low-power, multifunctional processor, memory and radio technologies, it becomes possible to develop inexpensive multifunctional wireless micro-sensors. Apparently these sensors are not so powerful and reliable compared to their expensive macro-sensor counter-parts, however, by using hundreds or thousands of them it is possible to establish a high quality, fault-tolerant wireless sensor network. These networks can be used to collect sensitive information from a large area of interest, especially where the physical environment is so harsh that the conventional macro-sensor counterparts cannot be deployed to resolve any problem. Wireless Sensor Networks (WSNs) have been used for numerous applications including military surveillance, facility monitoring and environmental monitoring. Typically, WSNs have a large number of sensor nodes with the ability to communicate among themselves and also to an external sink or a base station (Akyildiz et al., 2002). The sensors could be scattered randomly in harsh environments such as a battlefield or deterministically placed at specified locations. The sensors coordinate among themselves to form a communication network such as a single multi-hop network or a hierarchical organization with several clusters and cluster heads. The sensors periodically sense the data, process it and transmit it to the base station (Wang et al., 2011). The frequency of data reporting and the number of sensors which report data usually depends on the specific application. Data collecting is defined as the systematic collection of sensed data from some sensors to be eventually transmitted to the base station for processing. Since sensor nodes are energy constrained in wireless sensor network, it is inefficient for all the sensors to transmit the data directly to the base station. Data generated from neighboring sensors is often redundant and highly correlated. In addition, the amount of data generated in large sensor networks is usually enormous for the base station to process and the large amount of energy consumed to send the data. Hence, we need methods for combining data into high-quality information at the sensors or intermediate nodes which can reduce the number of packets transmitted to the base station resulting in conservation of energy and band width (Liu et al., 2010; Guo et al., 2010; Shi et al., 2010; Sabari and Duraisuwamy, 2010). This can be accomplished by data aggregation. Data aggregation is defined as the process of aggregating the data from multiple sensors to eliminate redundant transmission and provide fused information to the base station. Data aggregation usually involves the fusion of data from multiple sensors at intermediate nodes and transmission of the aggregated data to the base station.
LEACH (Heinzelman et al., 2000) (Low Energy Adaptive Clustering Hierarchy) is the classic hierarchical routing protocols in WSNs, The operation of LEACH is divided into rounds. Each round begins with a set-up phase when the clusters are organized, followed by a steady-state phase when data are transferred from the nodes to the cluster head and on to the BS. And then, the operation goes into the steady-state phase, the steady-state operation is broken into frames, where nodes send their data to the cluster head at most once per frame during their allocated transmission slot. The LEACH protocol is distributed and sensor nodes organize themselves into clusters for data fusion. A designated node (cluster head) in each cluster transmits the fused data from several sensors in its cluster to the sink. This reduces the amount of information that is transmitted to the sink. The data fusion is performed periodically at the cluster heads. LEACH is suited for applications which involve constant monitoring and periodic data reporting. Currently, there are a lot of articles been proposed for hierarchical routing algorithm. Compared with the Leach, in Lindsey and Raghavendra (2002), called PEGASIS which collects data by forming a chain, It reduces the number of nodes communicating directly with the base station to one which is responsible for transmitting the final data to the base station per round and limits the number of transmissions and receives among all nodes. Nodes take turns to transmit the fused data to the BS to balance the energy consumption in the network and preserves robustness of the sensor web as nodes die at random locations. Tan and Korpeoglu (2003) proposed two routing schema based on tree: PEDAP and PEDAP-PA, PEADP outperforms previous approaches by constructing minimum energy consuming routing for each round of communication. Another one takes it further and tries to balance the load among the nodes; the two algorithms perform well when the base station is inside the field. Energy efficient routing protocol for wireless sensor networks has been an important issue, up to now, many scholars have proposed several power efficient protocols (Singh et al., 1998; Stojmenovic and Lin, 2001; Chan and Perrig, 2004; Jiageng et al., 2005; Handy et al., 2002; Intanagonwiwat et al., 2003; Younis and Fahmy, 2004) for wireless sensor networks, There are also different protocols proposed by Xue et al. (2005), Chang and Tassiulas (2004), Tan and Korpeoglu (2003) and Chan and Perrig (Estrin) to maximize the lifetime of the system under different circumstances, Bhardwaj et al. (2001) gave the upper bounds on the lifetime of sensor networks. In the study of Tan et al. (2009), HCEP measures the load distribution among nodes by using clustering as a key communication control technique.
In this study, we have proposed a novel Cluster-based Energy-efficient Data Collecting and Aggregation Protocol (CEDCAP) for WSNs. It is based on clustering routing mechanism; the main contribution of this protocol is that employed a novel mechanism called node degree control after formation of the clusters. During the data transmission phase, the dormant nodes are into sleep mode and they do not send data so that can balance the energy consumption of all nodes and achieve the purpose of prolonging network lifetime.
SYSTEM MODEL AND PROBLEM ANALYSIS
The network model: There are various models for sensor networks. In this study, mainly consider the wireless sensor network consisting of a set of sensors and a Base Station (BS) in which sensors are randomly dispersed in the interested area. Sensor nodes are homogeneous and energy constrained. The BS and locations of sensors are fixed. The BS knows the locations of all sensors apriori which can be obtained by triangulation method or by using GPS-equipped sensors. A sensor can transmit data to any other sensor and can communicate directly with the BS. The sensors periodically monitor their vicinity and generate monitoring data. The Cluster Head (CH) are gathered from sensors which can be in the same the cluster at each round, where a round is defined as the process of gathering all the data from sensor nodes to the base station, regardless of how much time it takes. Then the CH performs data aggregation to reduce the number of messages, protocol assumes that combining n packets of size k results in one packet of size k instead of size nk. Finally, the CH can send the messages to the BS for further processing. The aim is efficient transmission of all the data to the base station so that the lifetime of the network is maximized in terms of rounds.
The radio model: In this study, assume a simple model for the radio hardware energy dissipation where the transmitter dissipates energy to run the radio electronics and the power amplifier and the receiver dissipates energy to run the radio electronics (Heinzelman et al., 2002). For this study, we will use both the free space (d2 power loss) and the multipath fading (d4 power loss) channel models, that depending on the distance between the transmitter and receiver. In this experiments, power control can be used to invert this loss by appropriately setting the power amplifier, the free space (fs) model will be used when the distance is less than a threshold do;otherwise, the multipath (mp) model will be used. Therefore, when transmitting a l-bit data packet a distance d, the radio expends:
![]() |
And want to receive this data packet, the radio expends:
![]() |
In the specified radio model, Eelec indicates the electronics energy which depends on factors such as the digital coding, modulation, filtering and spreading of the signal. εfs.d2 or εmp.d4 indicate the amplifier energy which depends on the distance to the receiver and the acceptable bit-error rate. For the experiments described in this study, these energy parameters are the same as those used in LEACH, as follow: Eelec = 50 nj/bit, εfs = 10 pj/bit/m2, εmp = 0.0013 pj/bit/m4, the energy for data aggregation is set as EDA = 5 pj/bit/signal and the initial energy is 2J for every sensor node. And assume that the radio channel is symmetric, in other words, the cost of transmitting a message from A to B is the same as the cost of transmitting a message from B to A.
PROTOCOL DESCRIPTION
In this section, we introduce the node degree control mechanisms for CEDCAP at first and then analyze the principle of algorithm CEDCAP.
Node degree control Mechanisms related definitions
Dormant radius r: Suppose node ni has a dormant radius r, during the network operation time Ti, within coverage area of node ni which radius is r, the rest of the nodes in time Ti are in a dormant state, they are neither gathering any data nor sending any data.
Dormant area S: It is a circular area which is based on node ni as the center of the circle and the size of its radius is r.
Dormant node nd: Which node in dormant area.
In Fig. 1, the dormant radius of node ni is r, the dormant area S is the shaded area of the circle. Those dotted line nodes which in the dormant area are the dormant nodes. All nodes in the networks have their own dormant radius and own dormant area. The assumption by the protocol shows that all nodes (except the base station) are the same. And we also assume that each node has the same radius at the beginning of the network. The setting of the dormant radius depends on the characteristics of application of the wireless sensor network. When the radius becomes smaller, there is not any dormant node. This moment r =rmin, we call it the minimum dormant radius. When the radius becomes larger, all of the nodes in the current cluster become dormant nodes, at this time r =rmax and we call it the maximum dormant radius.
![]() | |
Fig. 1: | Distribute of a cluster, r is the dormant radius of ni, at Ti, there nodes of dormant area S from ni will be into sleep |
Degree control mechanisms in cluster: After the initialization phase of the network, the base station calculates the node degree controls of every cluster. Here, the node degree control is only discussed in one cluster and the operation principles of other cluster are the same.
Let the current cluster is Cluster0, the cluster head is CH0, C0 = {CH0, n1, n2, nm} stands for the set of m+1 nodes in the current cluster. And let Di = {di|0≤di≤m'}denote the set of dormant nodes of the node ni, in which m' is the number of dormant nodes in the dormant area of the node ni. The base station uniformly makes the set of dormant nodes of every node at the initialization phase in the network. Let Dclustero is the set of dormant node of cluster Cluster0. The set of normal nodes in the cluster is NCluster0. The algorithm process of the node degree control is as follows:
Step 1: | Get cluster head node CH0 from set C0 and get the set of dormant nodes of CH0, name DCH |
Step 2: | :Check whether all nodes in the set DCH are traversed completely, if yes, go to Step 4, if not, go to Step 3. Until all nodes in the set are traversed completely |
Step 3: | Get a node n'j from set DCH0, if n'jεC0, put n'j into set DCluster0 and ![]() |
Step 4: | Check whether the traversal for all nodes of the set C0 is completed. If yes, go to Step 6; if not, go to Step 5. Until all nodes in the set Co are traversed completely |
Step 5: | Get the node ni from the set C0, if ni is in set DCluster0, the operation goes to Step 2; if not, put the node ni into set DCluster0, at the same time, make ![]() ![]() |
Step 6: | The operation calculates the size of set NCluster0 and set DCluster0 and then, makes a TDMA schedule for the nodes in the cluster based on the rules of the node degree control and broadcasts the TDMA schedule to the cluster. Other nodes will go to the steady-state phase after received the message |
The rules of the node degree control are as follow: all of the nodes in set NCluster0 will send data to its cluster head node CHo at time Ti but the nodes in set DCluster0 will take turns to sent data to the cluster head CHo. For example: in the dormant area of Fig. 1, ni and another three dormant nodes will take turns to be woken up by the TDMA schedule, then, gather and send data to the cluster head CHo.
Algorithm description: According to the characteristics of the clustering routing, CEDCAP protocol is divided into four phases: cluster head selection phase, cluster formation phase, node degree control phase and data transmission phase.
Cluster head selection phase: At the phase, each node sends the message which includes its geographical location information and the current residual energy to the base station, the base station calculates the average energy Eaverage of all nodes based on all messages. If the current residual energy of one node is less than the Eaverage, it cannot be the alternate cluster head for current round, next, using the remaining nodes as possible cluster heads, the base station computes clusters using the simulated annealing algorithm to find the optimal clusters. This algorithm attempts to minimize the amount for energy for the non-cluster head nodes to transmit their data to the cluster head, by minimizing the total sum of squared distances between all the cluster member nodes and closest cluster head.
Cluster formation phase: Once the cluster heads CHi (0≤i≤k) are found, the base station broadcasts the message that contains the cluster heads set for each node to the whole network. If a nodes cluster head ID matches its own node ID, the node is a cluster head.
Node degree control phase: After the cluster formation phase, the base station computes a TDMA based on the node degree control between all of nodes in each cluster and sends to the network. Then the node determines its TDMA slot for data transmission and goes to sleep until it is time to gather and send data. The TDMA also provides: in one round, only one node which be included in a dormant area can send data to its cluster head. The others go to sleep and they will be woken up in turn to gather and send data to the cluster head in the next cycles.
Data transmission phase: Once the clusters are created and the TDMA schedule is fixed by node degree control, data transmission can start. The radio of each non-cluster-head node which must be dormant area can be turned off until the nodes allocated transmission time, thus minimizing energy dissipation in these nodes. The cluster head must keep its receiver on to receive all data from the sending nodes in its cluster. When all the data has been received, the cluster head performs data aggregation functions to compress the data into only one single packet. This packet is sent to the base station by the cluster head.
After a certain time, the operation will perform the four phases again so that can achieve the energy dissipation balance between all nodes in the network.
PROTOCOL EVALUATION
Significance of dormant area: Estrin (2002) described the energy consumption of node subsystems and shown in Fig. 2, it can be seen that the most of the energy consumption is generated by the communication module of the node.
And according to the analysis by the communication model of network, transmission distance plays a significant impact on the energy consumption of nodes. Thus, as long as the node in working state, the energy consumption is relatively large. In order to prolong the lifetime of the node, without compromising the network monitoring application, we should try to let the node keep sleep state. To make the energy load balance in the lifetime, we also need to ensure that each node at the same energy dissipation level in the network, so that prolong the lifetime of the entire network. All nodes are randomly deployed, node density is not to be known prior, so that some regions may lead to a larger density of nodes but some are small.
![]() | |
Fig. 2: | Sensor node energy consumption distribution |
![]() | |
Fig. 3: | The impact of size of r to data collection from monitor area |
By setting a certain amount of dormant area can guarantee that both to achieve the integrity of data collection and to make part of the node can be in sleep mode under a certain scope of monitoring, so that can greatly save the network energy.
Impact of dormant radius r for data collection: Assuming the network k clusters Clusteri (0≤i≤k) are evenly distributed and the monitor area is divided equally between them as shown in Fig. 3:
• | When r≤rmax, there are not any dormant nodes in the dormant area S, as shown in left part of Fig. 3. Setting of dormant area for network will have no affect under this scenario; CEDCAP will be the same as the LEACH |
• | When r≤rmax, the dormant area S of cluster head will cover the other cluster, as shown in right of Fig. 3. At this time, there will be a small number of nodes in the network gathering data and sending data to the base station. The accuracy of data monitoring will be biased. Especially for the event-driven monitoring application, since the dormant node may be in the region where the events happened. Then, if the node is dominating, it will miss the best time to listen the event; this will reduce the suitability of the protocol |
• | When rmin<r<rmax, the network dormant area will be located in the cluster, so that can ensure that part of the nodes effectively go to sleep. In this case, the number of monitoring nodes will not be too small, thus, the data which be aggregated by cluster head will be objective and accurate |
Impact of dormant radius r for average energy consumption per round:
• | When r≤rmax, the average energy consumption per round in CEDCAP will be maximum and will be the same as LEACH |
• | When r≤rmax, the average energy consumption per round in CEDCAP will be minimum, at this point, there are only a small number of nodes in the network keeping work, therefore, the minimum energy will be consumed in the entire network |
• | When rmin<r<rmax, , the network energy consumption will be more evenly, CEDCAP will play a significant role in data gathering. When running to a certain round, the number of dormant nodes is n', the size of every data packet is l, the energy consumption of cluster head is: |
![]() |
And the energy savings by non-cluster-head nodes is:
![]() |
Time complexity of cedcap: Let m+1 denotes the number of nodes in cluster Clusteri and the set is expressed as . Assume the m'j denotes dormant nodes of the node j.
Let time complexity is denoted by the number of traversing the nodes:
![]() |
By the analysis of Heinzelman et al. (2000) LEACH, Let where, N denotes the total number of the nodes in network.
So the time complexity of the whole process is as follow:
![]() |
The minimum of time complexity is O (N.m') which less than O (N2).
PERFORMANCE EVALUATION
Simulation environment: In order to evaluate the performance of our protocol, we simulated two different routing protocols (LEACH and our protocol CEDCAP) by NS-2 simulator. We did this project in 2011 between January and February and completed this project under the guidance of Professor Wang in control theory laboratory.
This simulation environment is the same as LEACH, in order to see the level of energy savings that our protocols can achieve.100 sensor nodes are randomly distributed over the region of 100x100 m as shown in Fig. 4. The base station is located far away from the region, at point (50,175).
![]() | |
Fig. 4: | 100 nodes random sensor network |
Table 1: | Main parameters setting in simulation |
![]() | |
![]() | |
Fig. 5: | The number of nodes alive over the simulation time |
In these simulations, each node has only 2 J of energy at the beginning of experiments and an unlimited amount of data to send to the base station. When the nodes use up their limited energy power during the course of the experiment, they can close their models and never transmit or receive data. And the main parameters setting in simulation are shown in Table 1.
Network lifetime: In wireless sensor networks, the network lifetime mainly concerns the time of the first died node and time of the last died node in whole network runtime. In this simulation, we are also concerned about these two parameters. The simulation results are shown in Fig. 5.
Figure 5 shows the total number of nodes that remain alive over the simulation time. While nodes remain alive from a long time in CEDCAP, this is because a much smaller number of cluster member nodes have to be woken up to work with the cluster head and much more nodes can be off to save the energy. As can clearly be seen from Fig. 5, the time of the first died node and the last died node in CEDCAP is much longer than LEACH. CEDCAPs lifetime is approximately 30% longer than LEACH.
Network energy balance: The network energy balance mainly considers the total energy consumption of each round. Figure 6 shows the simulation results for network energy balance.
In Fig. 6, we can see the total energy dissipated using LEACH and CEDCAP over the simulation time in the same network. This figure shows the more energy savings achieved using CEDCAP for most of the parameter space. The variation trend of CEDCAP is smoother than LEACH. In addition to reducing energy consumption, CEDCAP minimum the number of the cluster member nodes which need not to keep working. Compared with LEACH, it makes the network more uniform energy consumption.
![]() | |
Fig. 6: | Simulation results of energy consumption |
CONCLUSION
In this study, a novel cluster-based energy-efficient data collecting and aggregation protocol, called CEDCAP, has been presented which based on clustering; CEDCAP divides a round into four phases: Cluster head selection phase, Cluster formation phase, Node degree control phase, Data transmission phase. At node degree control phase, we employ the node degree control mechanism to minimum the waking node to gather and send data to its cluster head. It is different from LEACH; in CEDCAP, there are only a few part of cluster member nodes to work together with the cluster head in each cluster, dormant nodes keep off-duty until they are woken up in next transmission slot. Thus, CEDCAP can significantly reduce the total energy consumption between all cluster member nodes and make the energy consumption of all nodes more evenly. By the NS-2 simulations, the results show that CEDCAP achieves better performances than LEACH. CEDCAP can more balance the energy consumption of all nodes and prolong the lifetime of the networks.
ACKNOWLEDGMENTS
This work is supported by two grants from the National Natural Science Foundation of China (No. 60773190, No. 60802002).
REFERENCES
- Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002. Wireless sensor networks: A survey. Comput. Networks, 38: 393-422.
CrossRefDirect Link - Bhardwaj, M., T. Garnett and A.P. Chandrakasan, 2001. Upper bounds on the lifetime of sensor networks. IEEE Int. Conf. Commun., 3: 785-790.
CrossRefDirect Link - Chan, H. and A. Perrig, 2004. ACE: An emergent algorithm for highly uniform cluster formation. Proceedings of the 1st European Workshop on Wireless Sensor Networks, Jan. 19-21, IEEE Computer Society, Berlin, Germany, pp: 154-171.
Direct Link - Guo, L., B. Wang, Z. Liu and W. Wang, 2010. An energy equilibrium routing algorithm based on cluster-head prediction for wireless sensor networks. Inform. Technol. J., 9: 1403-1408.
CrossRefDirect Link - Heinzelman, W.B., A.P. Chandrakasan and H. Balakrishnan, 2002. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Commun., 1: 660-670.
CrossRefDirect Link - Heinzelman, W.R., A. Chandrakasan and H. Balakrishnan, 2000. Energy-efficient communication protocol for wireless micro sensor networks. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, January 4-7, 2000, Maui, HI., USA., pp: 3005-3014.
CrossRef - Handy, M.J., M. Haase and D. Timmermann, 2002. Low energy adaptive clustering hierarchy with deterministic cluster-head selection. Proceedings of the 4th International Workshop on Mobile and Wireless Communications Network, September 9-11, 2002, Stockholm, Sweden, pp: 368-372.
CrossRef - Stojmenovic, I. and X. Lin, 2001. Power-aware localized routing in wireless networks. IEEE Trans. Parallel Distributed Syst., 12: 1122-1133.
CrossRef - Intanagonwiwat, C., R. Govindan and D. Estrin, J. Heidemann and F. Silva, 2003. Directed diffusion for wireless sensor networking. IEEE/ACM Trans. Network, 11: 2-16.
CrossRef - Chang, J. and L. Tassiulas, 2004. Maximum lifetime routing in wireless sensor networks. IEEE/ACM Trans. Network., 12: 609-619.
CrossRefDirect Link - Lindsey, S. and C.S. Raghavendra, 2002. PEGASIS: Power-efficient gathering in sensor information systems. Proceedings of the IEEE Aerospace Conference, March 9-16, 2002, Los Angeles, CA., USA., pp: 1125-1130.
CrossRefDirect Link - Liu, Z., B. Wang and L. Guo, 2010. A survey on connected dominating set construction algorithm for wireless sensor networks. Inform. Technol. J., 9: 1081-1092.
CrossRefDirect Link - Jiageng, L., D. Cordes and Z. Jingyuan, 2005. Power-aware routing protocols in ad hoc wireless networks. IEEE Wireless Commun., 12: 69-81.
CrossRefDirect Link - Sabari, A. and K. Duraiswamy, 2010. Swarm based reliable and power efficient multicast routing in mobile Ad Hoc network. Inform. Technol. J., 9: 1383-1389.
CrossRefDirect Link - Singh, S., M. Woo and C. Raghavendra, 1998. Power-aware routing in mobile ad hoc networks. Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile computing and Networking, October 25-30, 1998, Dallas, TX., USA., pp: 181-190.
Direct Link - Shi, Z., Z. Pu and Z.Q. Yu, 2010. A routing protocol based on energy aware in ad hoc networks. Inform. Technol. J., 9: 797-803.
CrossRefDirect Link - Tan, H.O. and I. Korpeoglu, 2003. Power efficient data gathering and aggregation in wireless sensor networks. ACM SIGMOD Rec., 32: 66-71.
CrossRefDirect Link - Tan, L., F. Ge, J. Li and J. Kato, 2009. HCEP: A hybrid cluster-based energy-efficient protocol for wireless sensor networks. Int. J. Sensor Networks, 5: 67-78.
CrossRefDirect Link - Xue, Y., Y. Cui and K. Nahrstedt, 2005. Maximizing lifetime for data aggregation in wireless sensor networks. Mobile Networks Appli., 10: 853-864.
CrossRef - Younis, O. and S. Fahmy, 2004. HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans. Mobile Comput., 3: 366-379.
CrossRefDirect Link - Wang, W., B. Wang, Z. Liu, L. Guo and W. Xiong, 2011. A cluster-based and tree-based power efficient data collection and aggregation protocol for wireless sensor networks. Inform. Technol. J., 10: 557-564.
CrossRefDirect Link