Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Applied Soft Computing 29 (2015) 12–25 Contents lists available at ScienceDirect Applied Soft Computing journal homepage: www.elsevier.com/locate/asoc Heuristic routing with bandwidth and energy constraints in sensor networks S. Kavi Priya a,∗ , T. Revathi b , K. Muneeswaran c , K. Vijayalakshmi d a Mepco Schlenk Engineering College (Autonomous), Sivakasi, India Department of IT, Mepco Schlenk Engineering College (Autonomous), Sivakasi, India Department of CSE, Mepco Schlenk Engineering College (Autonomous), Sivakasi, India d Department of CSE, Ramco Institute of Technology, Rajapalayam, India b c a r t i c l e i n f o Article history: Received 20 August 2011 Received in revised form 15 October 2014 Accepted 15 December 2014 Available online 29 December 2014 Keywords: Sensor networks routing Bandwidth constraint Energy constraint Nearest neighbor tree Distributed algorithm Maximum lifetime a b s t r a c t Most of the routing algorithms devised for sensor networks considered either energy constraints or bandwidth constraints to maximize the network lifetime. In the real scenario, both energy and bandwidth are the scarcest resource for sensor networks. The energy constraints affect only sensor routing, whereas the link bandwidth affects both routing topology and data rate on each link. Therefore, a heuristic technique that combines both energy and bandwidth constraints for better routing in the wireless sensor networks is proposed. The link bandwidth is allocated based on the remaining energy making the routing solution feasible under bandwidth constraints. This scheme uses an energy efficient algorithm called nearest neighbor tree (NNT) for routing. The data gathered from the neighboring nodes are also aggregated based on averaging technique in order to reduce the number of data transmissions. Experimental results show that this technique yields good solutions to increase the sensor network lifetime. The proposed work is also tested for wildfire application. © 2014 Elsevier B.V. All rights reserved. 1. Introduction Wireless sensor network consists of large number of tiny sensor nodes connected via wireless communication channels. These are suitable for lots of applications such as military surveillance, temperature monitoring, wildfire detection, disaster warning, etc. In particular, sensors are deployed to monitor the regions where the human cannot intervene. For instance, sensors deployed for wildfire detection in the forest region continuously monitors the environment to detect the changes in temperature. When the temperature value crosses the threshold value say 40 ◦ C (event detection), sensor routes the data to sink node (typically a base station or a sensor/actuator node or a gateway to larger network with high computing power and energy where information is required) in the remote location through the multi-hop routing algorithms. Therefore, the sink collects the data from all the sensor nodes to derive useful information about the event (for example the geographical map of the wildfire can be plotted) detected. Fig. 1 shows the model of wireless sensor networks used in the proposed work. According to the characteristics of sensor network, the sensor nodes perform sensing, preprocessing, aggregation and transmission of data on its neighboring nodes within the transmission range. Hence, the total data rate increases suddenly in the sensor networks when it detects the event. The sensor data cannot be further forwarded to the neighboring node, if the sensor node runs out of energy or due to network congestion. The sensor network ∗ Corresponding author at: Mepco Schlenk Engineering College (Autonomous), Sivakasi, Tamil Nadu, India. Tel.: +91 9842295563; fax: +91 04562235111. E-mail addresses: urskavi@mepcoeng.ac.in (S. Kavi Priya), trevathi@mepcoeng.ac.in (T. Revathi), kmuni@mepcoeng.ac.in (K. Muneeswaran), vijayasrini9701@gmail.com (K. Vijayalakshmi). http://dx.doi.org/10.1016/j.asoc.2014.12.019 1568-4946/© 2014 Elsevier B.V. All rights reserved. starts to congest when the total link bandwidth between the sensor nodes is smaller than the data rate of the network. Hence the wireless sensor networks are considered as resource scarce, which is manifested in terms of energy, link bandwidth, computing power, etc. In most of the previous works related to sensor networks, the authors tried to increase either energy efficiency through different routing techniques [1–10] or optimize wireless link bandwidth as in [11,12]. The classical routing algorithms like minimum spanning tree [13,14], requires calculation of routing path at every node and results in high computing power to find the optimal path. The use of the distributed algorithm to find the best optimal nearest neighbors for packet forwarding will increase the network’s lifetime. The network lifetime is considered as the time until which the first node in the sensor network drains out of energy. When every sensor node is allowed to forward data only to the nearest next neighboring node with optimal performance factor (energy or bandwidth efficiency) along with data aggregation (that converges number of data received from various sources into few messages), the sensor network’s lifetime will be maximized as discussed in [15–17]. In [18], the authors have devised a routing technique with both energy and link constraints which will have performance degradation since it is executed in a centralized fashion. In some of the recent works [22–24], energy efficiency is attained by increasing the network coverage (resulted in increased hardware cost), standby cluster head (suffered due to central point of failure if cluster node is dead) and efficient location discovery respectively. The researchers also concluded that the distributed routing algorithm may increase the sensor network’s lifetime. The works proposed in [2,5,9,15,17], suggests that using data aggregation in sensor network can utilize bandwidth efficiently. The survey of the papers [25–27] reveals that the performance of the sensor network may also depend on the type of application for which it is used. Therefore, this work proposes a model to tackle bandwidth constraints using link rate allocation and energy constraints using distributed NNT algorithm along with data aggregation considering the issues in the wireless sensor network wildfire application. S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 Fig. 1. Model of wireless sensor networks. The rest of the paper is outlined as follows: Section 2 describes some of the research woks in the related area and their significance. Section 3 narrates the various constraints and modules used in the proposed work. Section 4 addresses the overall design of the proposed scheme and the various algorithms used in this work. Section 5 shows the simulation results and performance of the modeled system. Section 6 gives the application details of the proposed work in a model sensor network. Section 7 concludes the paper. 2. Related research works Chang and Tassiulas [1] reduced the sensor network traffic by routing the sensed data only based on the sensor node’s remaining energy. The authors conclude that this type of routing saves ad hoc network lifetime unlike the other algorithms which try to minimize the absolute consumed power. Schurgers and Srivastava [2] derived a practical routing guideline called gradient based routing based on the energy histogram for uniform resource utilization in the network. They also suggested that robust aggregation of packet streams will reduce the sensor node energy consumption by a factor of two or three. The algorithms proposed in [1,2] did not consider the number of messages transmitted between the neighbors that may result in increased communication cost. Bhardwaj et al. [3] proposed a model for bounding the lifetime of the sensor node to formulate energy constraints. The authors assumed that there was sufficient bandwidth and only one node could act as a source in the sensor network. But in some sensor applications like wild fire monitoring, poisonous gas leakage management system, etc. there is only limited bandwidth and many nodes can simultaneously send data at a particular time. Younis et al. [4] modeled a gateway-based routing technique that finds the optimal path in the network. In this scheme, a central network manager between the sensor clusters is responsible for routing. Chamam and Pierre [14] implemented a centralized tabu search heuristic to tackle the exponentially increasing computation time which is addressing the optimal planning of sensor states for cluster based sensor networks. Senthilkumar et al. [23] discussed honeybee technique for re-election of cluster heads to increase the energy efficiency of sensor networks. In this scheme, when a cluster head goes down, immediately the standby node becomes the cluster head. Thus the sensor network works continuously without any delay in order to choose the next cluster. These techniques are less suitable for sensor networks for two reasons: (i) It needs more computing power (ii) When the central manager node dries out of battery power; the entire network is out of control. Krishnamachari et al. [5] used Greedy Incremental Tree (GIT) heuristic scheme for data aggregation. In this scheme, the aggregation tree was built sequentially that will consume more time when compared to distributed schemes. Cui et al. [6] emphasized that the energy efficiency in a multi-hop routing environment must be supported across all layers of the protocol stack. They devised a cross-layer design based on variable-length TDMA schemes where the slot length is optimally assigned according to the routing 13 requirement of each sensor node. But this technique may not be suitable for large scale sensor networks. Ambühl [7] proposed an approximation algorithm that constructed minimum spanning tree based on the Euclidean distance to reduce the battery power consumption. Ok et al. [8] introduced a new metric for energy cost considering sensor node’s remaining energies as well as energy efficiency. This metric gave rise to the distributed energy balanced routing (DEBR) algorithm that increased the life span of sensor network. Misra and Dias Thomasinous [9] suggested a simple, least-time, energy-efficient routing protocol with one-level data aggregation that ensured increased lifetime, reliability and congestion avoidance in sensor networks. Qiu et al. [10] formulated enhanced tree routing (ETR) strategy based on sensor node address assignment schemes. In addition to the parent–child links, ETR also used links to other one-hop neighbors that will lead to a shorter path. It is shown that such a decision can be made with minimum storage and less computing cost. The works in [7–10] considered only the energy efficiency leaving behind the bandwidth efficiency for data forwarding in the sensor network. Hence, the number of network communications is increased whereas the sensor network’s lifetime is reduced. Madan and Lall [11] proposed a linear programming and subgradient distributed algorithm for routing and maximized the sensor network’s lifetime. Chang and Tassiulas [12] formulated a shortest path routing algorithm using sensor link costs. The link costs reflect both the communication energy consumption rates and the residual energy levels between the sensor nodes. This work helps to derive energy constraints that can maximize the sensor node lifetime. But the overhead in executing the algorithm is slightly high and is well suited only for small scale sensor networks. Li et al. [13] proposed a new localized routing algorithm called Incident MST (minimum spanning tree) for broadcasting in wireless adhoc networks. The author concluded that if the total link power was deterministic, then the algorithm might result in high energy efficiency. Cheng et al. [18] discussed the sufficient bandwidth and energy constraints for the sensor nodes to maximize the sensor network’s lifetime. The authors proved that ignoring bandwidth constraints on energy efficient algorithms may lead to infeasible routing solutions. They also aggregated received data in order to minimize the number of wireless transmissions between the sensor nodes. These works confirmed that the link bandwidth is also needed for efficient routing in sensor networks. Luo et al. [15] focused on optimizing both data transmission and aggregation costs by dynamically adjusting the route structure when the sensor nodes joined or leaved the network. This algorithm was slightly deviated from real network energy consumption for complex applications. Gallager et al. [16] designed a distributed algorithm that constructed the minimum-weight spanning tree. The sensor network was implemented as a connected undirected graph with distinct edge weights. The nearest neighbor tree algorithm was proposed based on the above scheme. Khan et al. [17] presented NNT algorithms ex the complete graph model where the maximum transmission range of the nodes were large enough so that any pair of nodes could communicate directly with each other. The authors proposed two NNT algorithms: Random-NNT and Coordinate-NNT based on types of ranking the sensor nodes for single hop wireless network. They also modeled UDGNNT (undirected graph NNT) for multi-hop wireless networks and proved that (1) the tree produced by such a distributed algorithm will be of low cost; (2) the NNT paradigm can be used to design a simple dynamic algorithm and (3) the time, message and work complexities of the NNT algorithms are close to the optimal energy constraint for routing. Konstantinidis and Yang [22] show that better energy efficiency can be achieved in a short period when solved in parallel as a multi objective evolutionary problem based on decomposition. The 14 S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 optimization problem has to be devised more problem specific depending on the given application. Molina and Alba [24] proposed a meta-heuristic technique for solving location discovery problem in the sensor network. The authors used a two-stage search procedure that combines minimization of an error norm function with maximization of a maximum likelihood function. This model could be well used to identify the location of the source sensor by which the event location could be detected (for example the location of fire could be detected in wildfire application). Huang et al. [25] discussed Limb prosthesis application using body area sensor networks. The authors exhibited the effectiveness and practicability of the proposed prosthesis training system that used RFID and tags to recognize movement disorders. Huang et al. [26] analyzed underwater sensor network application and suggested routing using forwarding tree trimming mechanism for power efficient communication. The literature study of these papers helped to know about the changes in the behavioral characteristics of the sensor network with respect to the applications for which it is deployed. The above-mentioned sensor routing algorithms that maximized the network lifetime, either assumed sufficient wireless link bandwidth or used centralized routing technique. The key objective of this paper is to provide better network lifetime by combining energy-aware routing heuristics considering bandwidth availability together with data aggregation. First, distributed NNT algorithm is used to find the next neighbor to route the sensor data that makes the network energy efficient [17]. Second, a random bandwidth (based on reserved energy) is allocated for each link between the sensor nodes in order to acquire bandwidth efficiency [18]. The proposed scheme is tested for performance improvement in wireless sensor networks using NS2 simulator. The simulated sensor network implements the data-gathering application called wildfire monitoring system. Each sensor node in the simulation receives temperature data from the neighbor nodes, performs aggregation and sends the resultant data to the next node selected by NNT algorithm. The research simulation shows that the network lifetime is improved on applying such combined heuristics. 3. The proposed algorithm 3.1. Problem definition Wireless sensor network has numerous sensors that are densely deployed randomly in a remote geographic location without human intervention. These sensors are energy-scarce and bandwidth-scarce resources which are used cooperatively to monitor physical or environmental conditions. These sensors are connected to sink node via wireless links. The optimal path between the source node (sensor that generates data) and the sink node is computed using the distributed algorithm [17] that satisfies only energy constraints. This reduces the cost of constructing the minimum spanning tree, decreases the time and work complexity, and reduces the number of message transfers in the proposed work. The proposed model guarantees bandwidth efficiency of the sensor network through application of constraints formulated in [18] at every sensor node to push sufficient amount of data to the network based on available bandwidth. The data received within a time span is aggregated to avoid repetitive data forwarding (that in turn reduces the number of message transfers within the sensor network). If the deviation between the current sensor data and the received data is less, sensor node averages the values and send as a single value. If the value deviates more, then the node forwards the received data without aggregation. Hence, the proposed model reduces the number of message in the network. The modeled wireless sensor network consists of n number of nodes with wireless link bandwidth as B (bits per second). Each sensor node i has initial battery energy Ei (Joules). Each node i generates sensor data at a rate of Ri bits per second (Ri > 0 if node i is a source, Ri = 0 if it is a pure relay node, and Ri < 0 if it is a sink). The nodes consume energy on transmitting, receiving and sensing data, and their energy consumption rates are represented as Pt , Pr and Ps Joules per Bit respectively. Pr and Ps are assumed to be constants, but Pt is handled differently in the two models: in the uniform model, each node transmits at the same power level Pt ; in the non-uniform model, each node can transmit at different power levels. Any node i in the sensor network uses same power to transmit the data throughout its lifetime. But the transmitting power of the sensor node i will be different from the transmitting power of the sensor node j in the network is experimented in the non-uniform model. In simple words, Pti is not equal to Ptj . The energy-bandwidth constrained routing problem is stated as follows: suppose each node i’s rate Ri is known and the transmission rate from node i to node j is unknown, then the sources are preselected using NNT algorithm to find the optimal path. Let T be the total network lifetime. The rate allocation problem is to compute the data rate from node i to node j denoted as Rij on each link (i, j), given each node i’s Ei , Ri and link capacity B, so that the total network lifetime T is maximized and the rate allocation can be accommodated by wireless link capacity and energy reserve. The proposed work is applied in four different scenarios: single disk uniform transmission power model, single disk nonuniform transmission power model, double disk model and data aggregation model. 3.2. Single disk uniform transmission power model All sensor nodes in the network in this model have symmetric links (same transmission power). The transmission power Pti of a node i is same as the transmission power Ptj of the neighboring node say j (i.e. Pti = Ptj ). The effective transmission range is same as the interference range in the single disk model. Only the strong signals are decoded in this scheme. Let Ni , denote the neighboring nodes of i excluding i itself. The packets are routed to sink node through its neighboring nodes that are calculated using distributed NNT algorithm [17]. The proposed model uses TDMA scheme in which number of time slots assigned to the link between a node i and node j is proportional to the data rate from node i to node j at the MAC layer. Hence, for any node i to be a receiver, the TDMA schedule must guarantee (1) when node i is receiving, it cannot be sending, and (2) when node i is receiving from node j, none of its neighbors except j should be sending. The proof for this sufficient condition is given in [18]. If fi denotes the indicator for receiver, then fi = 1 if node i is a receiver or fi = 0 if node j is not a receiver as given below fi =  1, if 0, if  R j∈Ni ji >0 R j∈Ni ji ≤0   (1) The network lifetime T is maximized by minimizing 1/T. To minimize 1/T, the rates are allocated to each node based on the following three constraints. 3.2.1. Flow constraint For any two nodes say i, j in wireless sensor networks, the flow constraint f i,j) is less than or equal to link capacity c(i,j) (i.e. f(i,j) ≤ c(i,j)). Rij satisfies the flow conservation at each node as follows  j∈Ni Rij − Rji = Ri ∀i (2) 15 S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 3.2.2. Energy constraint The energy constraint denotes the amount of energy spent at each node and is modeled as Ps Ri +  j∈Ni Pr Rji + Pt Rij = Ei /Ti , (3) ∀i 3.2.3. Bandwidth constraint Since all the nodes transmit sensor data on the same frequency channel, the bandwidth constraint for the network is formulated so that all links in the same collision domain will have bandwidth less than B. If node i acts as a sender, then the sum of all outgoing links should be bound by B, else if node i acts as a receiver, then node i’s sending, receiving, and interfering nodes total bandwidth must be utmost B, else the node i’s bandwidth constraint is automatically satisfied. These constraints are represented using the given equation  j∈Ni Rij + fi ·  j∈Ni  k∈Nj Rjk ≤ B, ∀i (4) The constraints for the variables Rij and fi is given as fi = {0, 1}, Fig. 2. Overall design of the proposed work. (5) ∀i The flow constraint is remains the same as in Eq. (2) described in Section 3.2. Let Ni+ , denotes the neighboring nodes of i that receives from i; and Ni− denotes the neighboring nodes that sends data to node i. Hence, the bandwidth constraint for the node to forward data is redefined as follows aggregation is the process of combining one or more data by taking mean, standard deviation, etc. thereby it is used to reduce the number of data transmissions. Simple averaging of data that is received from all the neighboring nodes in a given time span is performed and the averaged value is sent to the next node. For example, if a sensor node receives three different temperature readings like 30 ◦ C, 20 ◦ C, 40 ◦ C from the neighbor nodes, instead of forwarding all these data, the mean value 30 ◦ C is sent to the next neighboring node in the network. If sensor detects its own readings deviates more than 40 ◦ C compared to the received data from the neighboring nodes, then the sensor simply act as a relay node (Ri = 0). Aggregation reduces the number of message transmissions in the sensor network thereby contributes to increase in the sensor network’s lifetime. To accommodate the neighboring nodes with different data rates, the low-rate flows are combined with high-rate flows to improve the bandwidth efficiency of the sensor network. To aggregate data from different sources at a closer time frame say 5 ms, the flow conservation constraint can be designed as   0 ≤ Rij ≤ B, (6) ∀i , ∀j 3.3. Single disk non-uniform transmission power model The sensor nodes are assumed to have asymmetric links, but still use fixed transmission power. Any node i in the network can use Pti to transmit the data to its neighboring node whereas another node j in the same network can use different power Ptj (such that Pti = / Ptj ) to transmit the data packets to its neighboring nodes. Hence, the energy constraint is modified as follows Ps Ri +  Rij + fi j∈N + i j∈Ni (Pr Rji + Pti Rij ) ≤ Ei /Ti ,  Rjk ≤ B, ∀i ∀i (7) (8) j∈N − k∈N + i j In the case of single disk model which is described in Sections 3.2 and 3.3, the effective transmission range is the same as the interference range. But in reality, the interference range is usually larger than the effective transmission range. Though the nodes located out of radio’s transmission range is not strong to receive the data, sometimes can cause interference at others. So, in the double disk model with uniform transmission power, the bandwidth constraint is fixed considering the neighboring nodes that are in the interference range of node i. Let Ni denote the nodes in the transmission range and NiF be the nodes in the interference range. It is observed that, Ni ⊆ NiF since the interference range is always larger than the transmission range. Hence, the bandwidth constraint is changed to j∈Ni Rij + fi  Rjk ≤ B, ∀i (10) j∈Ni 4. Design 3.4. Double disk model  Rij = max{Ri Rji }, j∈Ni ∀i (9) j∈NiF k∈Nj 3.5. Data aggregation model Section 3.2–3.4 provide energy and bandwidth constraints for the basic routing in sensor network without aggregation. Data The proposed work comprises of four modules: (i) Finding the shortest route from source node to sink node using distributed NNT algorithm; (ii) Dynamic link rate allocation for sending data; (iii) Maximum life time routing (Heuristics I) and (iv) Optimizing the life path of sensor node using bandwidth constraints (Heuristics II) as shown in Fig. 2. Heuristics I and II are repeated for sensor nodes with uniform transmission power, without uniform power transmission, with data aggregation and without data aggregation. 4.1. Module 1: shortest path routing (SPR) The shortest route from the source node (that originates packet based on temperature value) to the sink node is calculated depending upon the constraints at each sensor node formulated using [18] in this module. The packets are forwarded to the next nearest neighbor using the distributed NNT algorithm as in [17]. The sensor nodes in the network are deployed randomly using a topology generator GenSen [19] and are implemented as a graph G. Any sensor node i possess a distinct identifier (denoted as id(i)) from the totally ordered set. Usually, in a sensor network, sink collects information from all nodes. So we designate sink to be the root of 16 S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 Table 1 Algorithm for Basic NNT Scheme. Algorithm: Basic NNT Scheme Input: All nodes with distinct ids from a totally ordered set. Output: A spanning tree. ===================================================== //Every node i executes the following steps independently Step 1: choose a unique rank rank(i) Step 2: Connect to the nearest node j if and only if rank(i) < rank(j) to add the edge (i,j) to the spanning tree. Step 3: Stop when the edge to sink node is added in the spanning tree. Table 2 Algorithm for Rank selection. Algorithm: Ranking Scheme Input: All nodes with distinct ids from a totally ordered set. Output: Rank of any node i (rank(i)). ===================================================== =============== //The sink node s initiates the algorithm Step 1: Sink chooses a large random number as rank (s) Step 2: Broadcast rank(s) and id(s) to the sink neighboring nodes //When a node i receives the first message from//one of its neighboring node j (may be sink s) 2.1: If (first message) then Calculate rank(i) D [rank(j) − 1, rank(j)] end //When a node i receives the second message from its another neighboring node k (may be sink s) 2.2: If (second message) then store rank(k), id(k) end Step 3: Repeat Step 3 until rank and id of all neighboring nodes is known. the spanning tree with highest rank in the network. Each sensor node has an omnidirectional antenna. The network is modeled as a UDG (unit disk graph), where any sensor node i can communicate directly to the neighboring node j if and only if there is an edge (link) between them. For a given transmission radius TR , there is an edge d(i,j) between two sensor nodes i and j if and only if d(i,j) ≤ TR (i.e. both nodes must lie inside TR ). Each node in the network chooses a unique rank (random number) and connects only to the higher rank node to rule out cycles, and constructs the spanning tree. The edge is established from a node i to the node j if and only if rank(i) > rank(j). Hence, the NNT algorithm constructs the spanning tree with low complexity. Table 1 shows the basic working of NNT algorithm to construct the spanning tree in a single hop network (all nodes lie within TR ). In reality, TR is not sufficient to cover all sensor nodes in the network. Hence, UDG-NNT is applied to support such multi-hop outing scheme. The rank of each node i is chosen as shown in Table 2 that guarantees every node is connected only to the closest node with higher rank in the network. The selection of node i’s rank in the interval [rank(j) − 1, rank(j)] (where j is the neighboring node of i) guarantees each node has atleast one neighboring node with higher rank in the network (i.e. rank(j) > rank(i)). Once the rank is calculated, each node i (except sink node s) selects the nearest node among the neighboring nodes and adds an edge to it in the spanning tree. To route the sensor data to sink node, each node uses three type of messages: request, available and connect to perform the algorithm. Each node begins transaction with broadcasting the request message (with its rank and id value) until it finds a neighboring node with higher rank. If the node that receives the request message has higher rank compared to the sender, then it responds the sender with available message (combination of rank and id value). The sender of request message finds the nearest higher ranked node from the rank information collected due to available messages received. Finally, the sender adds an edge to the spanning tree using the connect message (i.e. message (connect, i, j) is sent to j if j is the nearest higher ranked neighboring node of i). The details are given in Table 3. Table 3 Algorithm for Distributed UDG-NNT. Algorithm: Distributed NNT Input: All sensor nodes with distinct ids from a totally ordered set. Output: A spanning tree. ===================================================== //The algorithm is executed by each sensor node i independently and simultaneously. //Messages are written in the format (message name, sender, [recipient, [other information]) repeat Step 1: Set transmission radius TR Step 2: Broadcast (request, id(i), rank(i)) until (receipt of available message) //receive() is a function to receive data at each node Step 3: While (receive, i, rank(i)) for j = 1 to n //where ‘n’ number of nodes in the sensor network and j = / i, do 3.1: If rank(j) > rank(i) then send (available, i, j) to i end end Step 4: While (available, i, j)) for j = 1 to n//where ‘n’ number of nodes in the sensor network and j = / i, do 3.1: Select min(TR (j)) send (connect, i, j) to j that satisfies min(TR (j)) end end until (j == s)//where s is a sink node 4.2. Module 2: maximum lifetime routing (MaxLife) The lifetime of each sensor node in this module is calculated as in [11]. In [11], the authors proposed a distributed algorithm that maximizes the sensor network’s lifetime without considering bandwidth constraints. The authors formulated equations that optimized the energy efficiency of the network lifetime without taking into account the bandwidth considerations for a sensor node. In this module, Eqs. (4)–(6) are not utilized to provide sufficient conditions on link bandwidth while forwarding sensor data. Ignoring the bandwidth constraints results in infeasible routing solutions since link bandwidth affects the routing topology and data rate on a link. 4.3. Module 3: heuristic-I: scalable rate allocation on shortest paths Heuristic-I works on the shortest paths (in-terms of number of hops) from source to sink node and determines rate on each link using the available bandwidth. The shortest path is calculated based on the distributed algorithm; hence the sensor nodes consume minimal energy as depicted in [17]. The steps in Heuristic-I are described below (1) Calculate the shortest path from the source to sink node using distributed NNT algorithm. (2) Assume source rate is one unit, check bandwidth constraint for each node, and find the most bandwidth contentious node i. Then compute the scale factor ‘a’ as B/LHS, where LHS denotes the required bandwidth of node i’s collision domain. Set f = min{a/2,Ri }; (3) Push out f amount of flow from each source to the sink, then update the remaining input flow Ri′ = Ri − f for each source i. (4) Repeat Steps 5–7 either Ri′ or the network is fully saturated. (5) Find the shortest paths for nodes with Ri′ > 0 based on the current available nodes and links. Nodes that are saturated on bandwidth constraint Eq. (4) and their neighbors are not eligible for relaying. In case of a tie, give higher priority to nodes S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 17 Fig. 3. AVG ratio with uniform transmission power model. with more remaining energy; if there is still a tie, give higher priority to nodes with smaller degree. (6) Decide the scale factor ‘a’ in a similar manner as in Step 2. Let ‘m’ be the amount of flow to the next sensor node calculated as min {a, Ri′ }. If m does not decrease the lifetime, then set f = min {a, Ri′ }; otherwise, set f = min{a/2,Ri }; (7) Push out ‘f’ amount of flow from each source with Ri′ > 0, then update the remaining input flow Ri′ = Ri − f. 4.4. Module 4: heuristic-II: optimizing lifetime with bandwidth constraint This module is used to predict the feasible and infeasible routing solutions from the source to sink node. Heuristic-II works as a linear programming mathematical model based on Eqs. (1) and (4) to produce the best optimal solution. Heuristic-II can be narrated as follows (1) Set fi = 1 for sink and fi = 0 for all other  nodes to make the problem linear and solve; update fi = 1 if Rji > 0; if Eq. (4) is satisfied then return link rates Rij ; otherwise, go to Step (2). (2) Compute the shortest paths from sources to the sink using NNT. Rji > 0 and fi = 0, (3) Set fi = 1 for receiving nodes; solve the LP; if update fi = 1. (4) Repeat Step (3) until there is no update for fi or the linear program becomes infeasible. (5) If the linear problem converges, output Rij for all links (i,j) between nodes i and j. Fig. 4. MAX ratio with non-uniform transmission power model. 18 S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 Fig. 5. Normalized lifetime with uniform transmission power model.  Rji = 0 and fi = 1, set fi = 0 and Rji = 0 for (6) If it is infeasible: if all j belongs to Ni , solve the linear program again: if it is still infeasible, report infeasible. 5. Simulation and results The simulation is focused to show the relative performance of the shortest path routing using distributed NNT (labeled as SPR), MaxLife routing with energy constraints (MaxLife), Heuristics-I and Heuristics-II. The sensor network is simulated in NS-2 (Network Simulator 2) [21] with 50 nodes. In the simulated sensor network, the sensor nodes are deployed randomly using a standard topology generator which is written in C++ for wireless sensor network called GenSeN [19]. GenSeN is used to perform the deployment of the entire sensor network. The simulated wireless sensor network consists of 50 nodes deployed using random deployment strategy in a 100 × 100 square region in order to predict the performance of the simulation in collision domain. The simulation is carried out for duration of 1000 s and repeated for 15 different deployments. The physical layer selected for wireless communications is IEEE 802.15.4 with TDMA (time division multiple access) scheme at the MAC layer. In this simulation system, the performance of the sensor network is measured in terms of the network congestion and normalized lifetime parameters. The results show that combined heuristics with distributed NNT routing algorithm increases the sensor network lifetime and decreases the computing power Fig. 6. AVG ratio with non-uniform transmission power model. S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 19 Fig. 7. MAX ratio with non-uniform transmission power model. needed since it is executed in a distributed fashion with bandwidth and energy constraints. 5.1. Uniform transmission power model This simulation finds out how the bandwidth constraint can change the routing decision and eventually affect the lifetime of the sensor network. The transmission range is set to 30 m. In the uniform transmission power setup, each link has equal weight say 1. Four source nodes are randomly selected from the network, and increasing source rates are applied on them. Source rate is set to be a percentage of link bandwidth. The proposed schemes Heuristic-I and Heuristic-II are compared with MaxLife and the shortest path routing using NNT. The MaxLife and the NNT algorithm is chosen for comparison because it computes the maximum lifetime without considering bandwidth constraint. When there is enough bandwidth, MaxLife gives the optimal solution. SPR uses the shortest paths from sources to the sink by applying NNT algorithm, with link weight representing the transmission power of the node. The vertical lines in figures indicate after this point, increased data rate cannot be put through. Fig. 3 shows the average ratio (AVG ratio) of the required bandwidth in each collision domain to the offered bandwidth for this model. It is found that when each source node’s data rate Ri is increased above 12% of the given link bandwidth, MaxLife starts to congest since some of the sensor nodes in the collision domain require more bandwidth than the available one. The Fig. 8. Normalized lifetime with non-uniform transmission power. 20 S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 Fig. 9. AVG ratio with double disk model. SPR starts to congest when the source rate Ri is increased above 15%. Heuristic-I can work without congestion until the load is increased to 18%, and Heuristic-II can support as much as 17%. From the result it is observed that lower the average ratio of required bandwidth; the proposed scheme shows higher bandwidth efficiency. Fig. 4 shows the maximum ratio (MAX ratio) between the required and offered bandwidths. After highest maximum ratio is reached, the model stops working. The maximum throughput of the network is derived at the stop point. The results show that when there is enough bandwidth, MaxLife and Heuristic-II achieve the same optimal solution since they did not consider the bandwidth constraint. However, when bandwidth violation occurs, Heuristic-II can still push through 5% more data than MaxLife, and 2% more data than SPR. Heuristic-I can push through 6% more data than MaxLife and 3% more data than SPR, since they combine energy constraints and used NNT algorithm to find the shortest path. Heuristic-II achieves the best performance on lifetime and second best on throughput; Heuristic-I achieves the best performance on throughput, which is consistent with the observation from Fig. 5 compared to other two algorithms. Networks with more nodes can achieve longer lifetime than networks with 50 nodes because the workload is shared among more nodes. 5.2. Non-uniform transmission power model Transmission range is randomly selected within the range of 25–35 m in this simulation. The performance of the non-uniform Fig. 10. MAX ratio with double disk model. S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 21 Fig. 11. Normalized lifetime in double disk model. transmission power model is shown in Figs. 6 and 7. With asymmetrical edges, the performance is consistent with the Uniform Transmission Power model. But the network lifetime is reduced because the disparity in energy consumption is severe. Thus, Heuristic-II can give better result than the other models as shown in Fig. 8. 5.3. Double disk model The transmission range in this simulation is chosen as 30 m; interference range as 1.7× transmission range and the other data are the same as in Section 5.1. Figs. 9 and 10 show the throughput performance of all the four compared algorithms Fig. 12. Normalized lifetime with data aggregation. 22 S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 Fig. 13. NNT with wild fire application. in this model. From the figures, it is observed that when the interference range is larger, there is less chance for channel reuse; therefore the network throughput is less. Fig. 11 shows that the network lifetime is increased due to the lower data rate. 5.4. Data aggregation model This simulation computes the network lifetime improvement achieved through the data aggregation method. The solution is compared with the minimum spanning tree generated using NNT Fig. 14. Distance between source and sink. S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 23 Fig. 15. Packets forwarding. algorithm. Assume each node consumes 10% of energy while sending one unit of data. From the observation of Fig. 12, it is observed that there is a dramatic improvement on the network lifetime with data aggregation. Fig. 12 shows that Heuristics-I can push data until source rate is 17% of the link bandwidth. The SPR has stopped working due to congestion when the source rates crosses 14% of the link bandwidth. This indicated a throughput gain of 3% for Heuristics I over SPR. It is observed that the proposed heuristics with data Fig. 16. Result of packets forwarding. 24 S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 Fig. 17. Result of proposed heuristic I. aggregation under energy and bandwidth constraints improved the network performance and reduced the congestion rate of the sensor network. 6. Application Wireless sensor networks are widely used in environmental applications like wild forest fire detection. Although wild forest fires occur relatively rarely, they must be detected early in order to prevent severe damages. To minimize needless communication between the sensor nodes for this usage, data aggregation technique is used in this paper. The algorithm is experimentally evaluated for continuous wildfire application as described in [20]. In this application, the sensor nodes comprise tiny temperature measuring devices like thermometer that monitors current temperature continuously. When the input to the sensor crosses a threshold value (normally 100 ◦ C), the sensor node has to send the temperature value to the sink node. For sending the sensor Fig. 18. Result of proposed heuristic II. S. Kavi Priya et al. / Applied Soft Computing 29 (2015) 12–25 Table 4 Energy efficiency of proposed models. Routing Shortest path routing using NNT MaxLife time routing Heuristics I Heuristics II Energy efficiency 16% 13% 19% 18% data, each node utilizes SPR or MaxLife or Heuristic-I or Heuristic-II models. The application details are shown in Fig. 13. The distance between the node and the sink node has to be calculated as in Fig. 14. Figs. 15 and 16 show the result of packet forwarding after applying NNT. Figs. 17 and 18 depict that the proposed model Heuristic-I and Heuristic-II take less energy to route data to the sink node, thereby improving the network performance in terms of lifetime. The energy efficiency of the proposed heuristics compared to other models is given in Table 4. 7. Conclusion In this paper, the network performance is analyzed by applying distributed algorithm for routing with bandwidth constraints to find the next neighbor node. The performance of the existing algorithms is evaluated and compared with the proposed work via simulation. The simulation results show that the sensor network’s lifetime increases by 17% and decreases network congestion due combined heuristics. The routing problem is also solved using linear programming model. Hence, the bandwidth efficiency and the energy efficiency are improved. The proposed technique works well for high traffic rates and also for large homogeneous networks. In future, it is decided to design an algorithm that is energy efficient and bandwidth efficient by applying the fuzzy based sleep scheduling technique (similar to the algorithm described in [28]) in order to improve the sensor network lifetime. Moreover it is also decided to apply complex data aggregation that avoids congestion communication overhead. And also some of the evolutionary algorithms (like fuzzy based optimization as in [29]) are considered to perform routing in the sensor network. Among the questions for future work, the most interesting is to model energy and bandwidth constraints as fuzzy objective function to select the optimal path in the network. References [1] J. Chang, L. Tassiulas, Energy conserving routing in wireless adhoc networks, in: Proc. IEEE INFOCOM 2000, vol. 1, 2000, pp. 22–31. [2] C. Schurgers, M.B. Srivastava, Energy efficient routing in wireless sensor networks, in: Proc. MILCOM 2001, vol. 1, 2001, pp. 357–361. [3] M. Bhardwaj, T. Garnett, A. Chandrakasan, Upper bounds on the lifetime of sensor networks, in: Proc. IEEE ICC’01, vol. 3, 2001, pp. 785–790. [4] M. Younis, M. Youssef, K. Arisha, Energy-aware routing in cluster based sensor networks, in: Proc. IEEE MASCOTS, 2002, pp. 129–136. [5] B. Krishnamachari, D. Estrin, S. Wicker, Modelling Data-centric Routing in Wireless Sensor Networks, Computer Engineering Technical Report CENG 02-14. [6] S. Cui, R. Madan, A. Goldsmith, S. Lall, Joint routing, MAC, and link layer optimization in sensor networks with energy constraints, in: Proc. IEEE ICC’05, vol. 2, May, 2005, pp. 725–729. 25 [7] Christoph Ambühl, An Optimal Bound for the MST Algorithm to Compute Energy Efficient Broadcast Trees in Wireless Networks. Technical Report No. IDSIA-22-04, November 2004. [8] Chang-Soo Ok, Seokcheon Lee, Prasenjit Mitra, Soundar Kumara, Distributed energy balanced routing for wireless sensor networks, Comput. Ind. Eng. 57 (August (1)) (2009) 125–135. [9] Sudip Misra, P. Dias Thomasinous, A simple, least-time, and energy-efficient routing protocol with one-level data aggregation for wireless sensor networks, J. Syst. Softw. 83 (May (5)) (2010) 852–860. [10] Wanzhi Qiu, Efstratios Skafidas, Peng Hao, Enhanced tree routing for wireless sensor networks, Ad Hoc Netw. 7 (May (3)) (2009) 638–650. [11] R. Madan, S. Lall, Distributed algorithms for maximum lifetime routing in wireless sensor networks, in: Proc. IEEE Global Telecommunications Conference (GLOBECOM), 2004, pp. 748–753. [12] Jae-Hwan Chang, Leandros Tassiulas, Maximum lifetime routing in wireless sensor networks, IEEE/ACM Trans. Netw. 12 (August (4)) (2004) 609–619. [13] Xiang-Yang Li, Yu Wang, Peng-Jun Wan, Wen-Zhan Song, Ophir Frieder, Localized Low-Weight Graph and Its Applications in Wireless Ad Hoc Networks, IEEE INFOCOM, 2004. [14] Ali Chamam, Samuel Pierre, On the planning of wireless sensor networks: energy-efficient clustering under the joint routing and coverage constraint, IEEE Trans. Mobile Comput. 8 (August (8)) (2009) 1077–1086. [15] Hong Luo, Yonghe Liu, Sajal K. Das, Distributed algorithm for en route aggregation decision in wireless sensor networks, IEEE Trans. Mobile Comput. 8 (January (1)) (2009) 1–13. [16] R. Gallager, P. Humblet, P. Spira, A distributed algorithm for minimum-weight spanning trees, ACM Trans. Progr. Lang. Syst. 5 (January (1)) (1983) 66–77. [17] Maleq Khan, V.S. Gopal Pandurangan, Anil Kumar, Distributed algorithms for constructing approximate minimum spanning trees in wireless sensor networks, IEEE Trans. Parallel Distrib. Comput. 20 (January (1)) (2009) 124–139. [18] Maggie Cheng, Xuan Gong, Lin Cai, Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks, IEEE Trans. Wirel. Commun. 8 (July (7)) (2009) 3770–3779. [19] Tiago Camilo, Jorge Sá Silva, André Rodrigues, Fernando Boavida, GENSEN: a topology generator for real wireless sensor networks deployment, in: Proceedings of the 5th IFIP WG 10.2 International Conference on Software Technologies for Embedded and Ubiquitous Systems, 2007, pp. 436–445. [20] David M. Doolin, Nicholas Sita, Wireless sensors for wildfire monitoring, in: Smart Structures and Materials 2005: Sensors and Smart Structures Technologies for Civil, Mechanical, and Aerospace Systems, vol. 5765, March, 2005, pp. 477–484. [21] Network Simulator-2, Retrieved from: http://isi.edu/nsnam/ns/ [22] Andreas Konstantinidis, Kun Yang, Multi-objective energy-efficient dense deployment in wireless sensor networks using a hybrid problem-specific MOEA/D, Appl. Soft Comput. 11 (September (6)) (2011) 4117–4134. [23] J. Senthilkumar, M. Chandrasekaran, Y. Suresh, S. Arumugam, V. Mohanraj, Advertisement timeout driven bee’s mating approach to maintain fair energy level in sensor networks, Appl. Soft Comput. 11 (5) (July 2011) 4029–4035. [24] Guillermo Molina, Enrique Alba, Location discovery in wireless sensor networks using metaheuristics, Appl. Soft Comput. 11 (January (1)) (2011) 1223–1240. [25] Chenn-Jung Huang, Yu-Wu Wang, Tz-Hau Huang, Chin-Fa Lin, Ching-Yu Li, Heng-Ming Chen, Po Chiang Chen, Jia-Jian Liao, Applications of machine learning techniques to a sensor-network-based prosthesis training system, Appl. Soft Comput. 11 (April (3)) (2011) 3229–3237. [26] Chenn-Jung Huang, Yu-Wu Wang, Hsiu-Hui Liao, Chin-Fa Lin, Kai-Wen Hu, TunYu Chang, A power-efficient routing protocol for underwater wireless sensor networks, Appl. Soft Comput. 11 (March (2)) (2011) 2348–2355. [27] Zhi-gang Su, Pei-hong Wang, Jiong Shen, Xiang-jun Yu, Zhen-zhong Lv, Lu Lu, Multi-model strategy based evidential soft sensor model for predicting evaluation of variables with uncertainty, Appl. Soft Comput. 11 (March (2)) (2011) 2595–2610. [28] J.C. Cuevas-Martinez, J. Canada-Bago, J.A. Fernandez-Prieto, M.A. GadeoMartos, Knowledge-based duty cycle estimation in wireless sensor networks: application for sound pressure monitoring, Appl. Soft Comput. 13 (February (2)) (2013) 967–980. [29] Abdel Kareem Jaradat Mohammad, Reza Langari, A hybrid intelligent system for fault detection and sensor fusion, Appl. Soft Comput. 9 (January (1)) (2009) 415–422.