You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

21 July 2017

Lifetime Maximization via Hole Alleviation in IoT Enabling Heterogeneous Wireless Sensor Networks

,
,
,
,
and
1
University of Engineering & Technology, Peshawar 25000, Pakistan
2
Capital University of Science and Technology, Islamabad 44000, Pakistan
3
COMSATS Institute of Information Technology, Islamabad 44000, Pakistan
4
Biomedical Technology, Department College of Applied Medical Sciences, King Saud University, Riyadh 11633, Saudi Arabia
This article belongs to the Special Issue Sensor Networks for Collaborative and Secure Internet of Things

Abstract

In Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs), there are two major factors which degrade the performance of the network. One is the void hole which occurs in a particular region due to unavailability of forwarder nodes. The other is the presence of energy hole which occurs due to imbalanced data traffic load on intermediate nodes. Therefore, an optimum transmission strategy is required to maximize the network lifespan via hole alleviation. In this regard, we propose a heterogeneous network solution that is capable to balance energy dissipation among network nodes. In addition, the divide and conquer approach is exploited to evenly distribute number of transmissions over various network areas. An efficient forwarder node selection is performed to alleviate coverage and energy holes. Linear optimization is performed to validate the effectiveness of our proposed work in term of energy minimization. Furthermore, simulations are conducted to show that our claims are well grounded. Results show the superiority of our work as compared to the baseline scheme in terms of energy consumption and network lifetime.

1. Introduction

The emergence of Internet has increased enormously the connectivity of human beings at unprecedented scale. However, the rapid growth of short range networks including; Wireless Sensor Networks (WSNs) Bluetooth, Radio Frequency Identification (RFID), Wireless Fidelity (WiFi), ZigBee, etc.; the interconnection between numerous devices is inevitable []. Now, it is obvious that devices will be interconnected and sense, share, gather information via sequence of communication in multi-hop manner without the involvement of humans. The devices could be distinct in terms of capabilities such as processing, intelligence, e.g., sensors, smart phones, etc. The interconnection of devices along with humans has led to the advent of new paradigm known as Internet of Things (IoT). IoT embeds intelligence in our environment by transforming gathered data into intelligent information. WSN has been considered as an essential component of IoT. However, this crucial part has few constraints such as energy of the sensing device that must be utilized efficiently for effective operations in the network []. These sensing devices have the abilities to sense, monitor, process signals and allow wireless communication []. Due to the unique features of sensors nodes; various applications are now possible in accessible, non-accessible and remote areas. Applications include military surveillance, temperature sensors, traffic monitoring and environments, etc. []. WSNs composed of small size sensor nodes which are randomly or deterministically deployed in the desired sensing area. The purpose of the deployment of sensing devices is to gather information of interest and transmit it to the base station. However, one of the major factors need to be considered that is battery of the sensor node. The lifetime of the network totally depends upon the distribution of the data traffic load on the network nodes [].
In this regard, an energy efficient routing strategy is desired in order to optimize the use of node battery which will directly enhance the network operation time. Without an optimal routing mechanism, uneven energy dissipation of network nodes degrades the network performance. The imbalanced transmissions lead to quick energy depletion of intermediate nodes resulting in pre-mature end of network. This immature end of network lifetime is because of energy dissipation of intermediate nodes []. However, uneven energy consumption of intermediate nodes is not the only reason for hole occurrence. The reasons for holes occurrence includes but not only are: non uniform or random nodes deployment, sensor nodes lack physical capabilities and turn into sleep mode in order to save energy, mobility of nodes which breaks the linkage between nodes and excess amount of neighbor requests.
WSNs can be classified into homogenous and heterogeneous networks. In former, all sensor nodes have same capabilities such as same energy, processing and sensing range. While in later, network nodes capabilities varies in terms of energy, processing, etc. []. Whether network is homogeneous or heterogeneous, before designing a routing protocol following factors must be taken into consideration for achieving optimal results.
  • Routing protocol must has a design that is able to find the least energy consuming path.
  • Controlling the traffic is major contribution in any routing mechanism. Due to high traffic, nodes consume excess amount of energy.
In order to cater aforementioned challenges, research community devoted its efforts to maximize the network lifetime. In this regard, routing strategies are classified into flat network routing, location based routing and hierarchical based routing. In flat network routing sensor nodes work together in order to perform homogeneous routing tasks []. In location based routing, path is computed through the location information of the sensor nodes []. In hierarchical based routing, the network is divided into groups such that to minimize the energy and improves the scalability. Hierarchical based routing can be cluster or ring routing. Ring routing is the most scalable routing technique in WSNs []. Ring routing uses greedy geographic mechanism for scalable and time efficient routing []. Following are the advantages of ring routing but not the only:
  • Ring routing heavily relies on minimal broadcasting to ensure fast data delivery.
  • Applicable for event driven applications.
  • Does not require information about the motion of the sink.
Many routing mechanisms have been proposed in WSNs for maximizing the network performance by minimizing the energy consumption of the sensor nodes. To alleviate hole for maximizing lifetime of the network, Jan et al. [] introduce Balance Energy Consuming and Hole Alleviating (BECHA) and Energy Aware Balance Energy Consuming and Hole Alleviating (EA-BECHA) algorithms to balance load distribution among nodes as well as efficient energy allocation to the nodes in order to alleviate hole. An analytical model is proposed by Ren et al. [] for maximizing the network lifetime via energy hole alleviation. The proposed work divides the network into small regions. With the death of nodes in the region close to the sink, nodes lie above the death region act as data forwarder for transmission of data to the sink. Both proposed algorithms able to alleviate energy hole around the sink however unable to tackle void hole. Moreover, high traffic load on nodes in the lower region increases the energy consumption of the nodes. Thus there is a need of routing mechanism that is able to control the traffic load among the nodes as well as to recover the nodes from void region.
In this paper, we proposed a routing technique [] for WSNs that consists of Heterogenous nodes. An optimal data path is computed in order to utilize efficiently scarce resource like energy for prolongation of network lifespan. Also the division of network is performed to deploy heterogeneous nodes to recover from void hole. The details of our routing strategy are given in Section 4.
Contributions: The contributions of our work in this paper are: (1) the use of the divide and conquer algorithm for obtaining optimal number of sectors in the network; (2) For network lifetime prolongation, minimal energy dissipation route is obtained; (3) In order to ensure that scarce resource (energy) is utilized effectively, data load is estimated to avoid overburden of data at intermediate nodes; (4) An optimal bandwidth is allocated for throughput maximization which is validated via linear programming using graphical analysis. The following enlisted steps are followed in our proposed work.
  • Network division into optimal number of sectors
  • Minimum energy path computation
  • Traffic load estimation
  • Energy minimization through feasible region
  • In order to avoid congestion at super node, optimal allocation of bandwidth
  • Simulations to prove the legitimacy of our work.
The rest of the paper is organized as follows: in Section 2, we discuss some of the previous techniques related to WSNs. Proposed strategy is discussed in Section 3. In Section 4, simulations are performed. Finally, conclusion and future work are written in Section 5.

3. LiMHA

Energy is one of the scarce resources in WSNs; therefore, it needs to be utilized efficiently for effective network operations. The uneven distribution of data load on intermediate nodes is among the leading factors which ends the battery of a node immaturely. In this regard, we propose a routing approach Lifetime Maximization via Hole Alleviation (LiMHA) in which heterogeneity of network is exploited to avoid the quick depletion of nodes energy. The details of the proposed work are as follows:

3.1. Network Model

In order to show relationship between various components of the network; we have made numerous assumptions such as; for monitoring, sensing and gathering information from the desired network field, N number of heterogeneous nodes are randomly deployed having fixed energy and irreplaceable battery []. There are two kinds of nodes: normal nodes ( N N ) and super nodes ( S N ) ; N N are supposed as low energy nodes while S N are powered with high energy battery. Hence, the total number nodes are deployed in the network; i = 1 N N N + S N . Nodes remains static and have various transmission ranges that could be r R . The network field is assumed having radius R with thickness ξ ; which is further divided in to C n of concentric coronas denoted as set like { C 1 , C 2 , .... , C n } . In order to exploit the features of divide and conquer, C n are decomposed in to number of small sectors S where each S has node density ρ including a S N . Sink is placed at the center of the network field and data is passed on to sink in a converge-cast manner. The quality of links purely depends upon the degree of closeness to the sink, more the node close is, higher will be the link quality. The network model is illustrated in Figure 1.
Figure 1. Proposed Network Model.

3.2. Network Configuration

For communication, a reliable and well stable infrastructure is always desired in a network. By keeping in mind the fact that sensor nodes are freshly planted, an infrastructure is required to share and communicate information in the network. The configuration phase starts at the beginning of each round, where every node acquire information about its sector S that S N is in its vicinity to transmit data or it has to deliver data via a neighbor node known as N N . After gaining the information, N N  establishes a data link with the respective node according to the information. This process repeats until all nodes acquire the desired information.

3.3. Energy Model

To portray the dissipation of energy of the network nodes; a widely accepted radio model for WSNs is adopted in our proposed work []. A node consumes energy while transmitting k number of bits over distance d is depicted as shown in Equation (7).
E t x ( k , d ) = k E e l e c + k ϵ f s d 2 , if d d o k E e l e c + k ϵ a m p d 4 , otherwise
where E t x is the required transmission energy for effectively delivering data at the destination, E e l e c illustrates the battery utilization in circuitry operations like analog or digital coding, modulation and spreading of a signal in free space (in communication range) ϵ f s over d 2 and multi-path environment where the probability of fading, scattering and attenuation is high as compared to ϵ f s over d 4 .
E r c v = k E e l e c
where E r c v depicts the energy dissipated while receiving k bits.

3.4. Traffic Load Estimation

Data traffic management is a key factor in optimizing the network lifetime. To manage the data traffic, the network is divided in to small regions known as sectors S. Due to the division of network field, now it is easy to estimate the data load at each S by computing the node ρ . As it is well known that downstream nodes bear high data load while upstream nodes just forward data of their own S. Now, it can be easily estimated that how much data packets are generated from the current S. Let assume S n be a sector close the sink having distance d from the sink. The total traffic generated by sector S n is the sum of traffic generated by previous sector S n + 1 . The mathematical formulation given as follows []:
T F j S n = N S n + N S n 1 + N S n 2 + ..... + N S 1
If, the average traffic load on S n is desired to compute that Equation (9) can be written as:
A T F S n = T F j S n N S n
A T F is the average traffic load on a sector close to the sink, thus, we can use A T F for finding the traffic load on each sector [].
A T F j S n = ( T 1 + 1 ) + T 1 ( 1 + T 1 ) r 2 x , if x ξ 1 2 ( T 2 + 2 ) ξ 2 θ ρ + 1 2 T 2 r ξ θ ρ ( T 2 + 1 ) , otherwise
where T 1 = ( R d ) r and T 2 = ( R ξ ) r []. The traffic load working mechanism is discussed in Algorithm 1. In which it is shown that before the initialization of each round as discussed in Section 3.2 every node acquires its distance from the neighbor node in order to adjust its transmission range. By using Equation (11) load is estimated and then accordingly S N is selected with in the vicinity of the adjusted transmission range for establishing link with good quality as shown in Figure 2. At each hop, it is calculated that every node measures its data load, if the data is very high that N N will forwards data to S N directly else via neighbor nodes. A point here must be noted that nodes within the communication range of sink will transmit the generated data packet directly without the help of any intermediate  node.
Figure 2. Traffic Load Estimation and Data Transmission.
Algorithm 1: Calculating Traffic Load and Energy Consumption at each round
Input: Network range R, transmission range r between sensor, N N normal node, S N super node, node density ρ etc.
Output: for a node i∈ { N N } determine the traffic load t l i r o , energy consumption e i r o at round  r o
1: Initialize Parameters
2: for round r o
3: for each node i∈ { N N } and at each round r o calculate distance d ( i , j ) where node i is node of sector S and node j is node of sector S n also n is number of sectors
4: if d ( i , j ) r
5: send data of node i to node j. Calculate the traffic load from Equation (11) and energy consumption for data transmitting and receiving from Equations (7) and (8), respectively.
6: else
7: Find SN in each sector
8: if d ( N N , S N ) r
9: send data of N N to S N
10: calculate the traffic load and energy consumption for data receiving for S N and data transmitting for N N
11: else
12: S N receive the data by itself
13: calculate the traffic load and energy consumption for data receiving for S N
14: while sink receive data d o
15: Calculate the overall energy consumption, lifetime of nodes at round r o

3.5. Description of Algorithm 1

For better understanding, Algorithm 1 has been elaborated briefly step wise in this section. Input shows that control parameters need to be defined before the initialization of an algorithm. Transmission range and network radius along with N N and S N deployment. After the initialization of network parameters in step 1, which is deployment of nodes, sink and network configuration then step 2 is initiated known as loop of rounds. At step 3, each node computes its distance from every other node in order to find out minimal route to forward its data packets towards the destination. Also N N calculate distance from N N and S N too. In case, distance between N N and S N is in multi-path environment then N N looks for another N N to multi-hop its packets towards the S N . The reason behind avoiding long distance route is that chances of fading and attenuation of data signal are very high, hence the probability of packet loss is maximum. In order to minimize the aforementioned factors, shorter path is selected to relay the data packet towards the destination. The distance is checked via step 4 that ensures that data packets are transmitted over the path have receiver with in the communication range. After the computation of distance and finding forwarder node in transmission range, one of the most crucial factors of our proposed work is data traffic estimation at each hop to avoid overburden of data on the intermediate super nodes. The traffic load is estimated via using Equation (9) and average load is computed with the help of Equation (10). Also energy dissipation is considered along with the data traffic in order to pick optimal routing path that has less load and minimal energy consumption. Using Equations (7) and (8) both receiving and transmitting energies are computed before delivering data to next S N . At step 7, if the traffic is very high then S N is selected in near vicinity of N N for compensating high energy consumption with its heterogeneity nature. Then data traffic is transmitted to the S N until it reaches the sink. Step 15, at the completion of each round, overall energy consumption is computed in order to measure the network lifetime. All steps are repeated till the time no node in the network remains alive or is unable to deliver data at the destination due to the unavailability of intermediate nodes.

3.6. Energy Minimization

To portray reduction in the energy consumption once the data traffic load is estimated and distributed accordingly. We have carried out an optimization approach through which a feasible solution is computed. If the energy consumption satisfies the constraints then it is justified that data traffic is balanced. To prove it mathematically, linear programming is adopted. Linear programming is a mathematical approach which is broadly taken in to consideration while optimizing desired objective(s). The optimization process could be maximizing or minimizing depending upon the nature of objective function such as energy; it always needs to be minimized. An objective function must operate within the given linear constraints. We define the following objective function for the achieving optimal result in term of energy consumption.
m i n i m i z e r = 1 r m a x E t a x ( r ) r r m a x
Energy dissipation mainly includes the reception and transmission energies which are collectively known as energy tax ( E t a x ) . The energy tax increases as the number of hops or number nodes involve in data packet delivering increases. If we want to save the node battery power, one of the factors must need to be analyzed. Here, we have minimized the number of nodes by exploiting divided and conquer mechanism. Due to the division of the network field; nodes are restricted only to the specific sector. Now, Equations (7) and (8) are combined to find out the total energy dissipated in one round. Equation (13) is formulated to portray the overall amount of energy dissipated in delivering data packets successfully at the destination.
E t a x ( r ) = E t x + n = 0 N ( E t x + E r c v ) × ( n × P k t s i n k ) n N
E t x is separately added because nodes in sink’s range will forward data directly. On the other hand, second expression with summation is included to show both energies from upstream nodes toward the downstream nodes in the network field. n is zero because it is possible that due to death of nodes, few sectors could be empty. Now, to restrict our objective function, following constraints are defined.
Constraints:
C o n 1 : E t x , E r c v ε o n N
C o n 2 : E F E F m i n n N
C o n 5 : T R n T R n m a x n N
The purpose of Equation (14) is to ensure that energy required for transmission and reception should be less than the initial energy ε o of the node. Similarly, C o n 2 shows the constraint regarding the selection of forwarder data, that a node having less energy consumption as compared to near by nodes will be picked as a forwarder in order to optimize the network lifetime. For receiving good quality signal, it should be transmitted within the communication range which is exactly forced by Equation (16).
Graphical Analysis: The graphical analysis is presented because of its nature to provide clear visualization about precise indications of all possibilities within the bounded region. For two dimension scenarios, graphical approach is best fit to demonstrate optimal available options. The graphical analysis of our energy minimization is depicted in Figure 3.
Figure 3. Feasible Region: Energy.
Let assume ε f s = 20 nJ, ε a m p = 20 nJ, E e l e c = 50 nJ, d = 60 m, r = 120 m, ρ = 10, ξ = 10, x = 5 m, θ = 45 , R = 500 m, N = 150. Following values are extracted via using aforementioned equations.
0.037 E t x 0.186
0.00001285 E r c v 0.04
0.037 E t x + E r c v 0.226
The enclosed region is calculated by keeping in mind the constraints given in Equations (14)–(16). Equations (17)–(19) are drawn to find out feasible region. An optimal solution is validated by each vertex of the feasible region. The solution can be validated from the points on the boundary of the feasible region. The points are:
  • P 1 (0.037, 0.00001285) = 0.037 mJ
  • P 2 (0.037, 0.04) = 0.077 mJ
  • P 3 (0.186, 0.00001285) = 0.186 mJ
  • P 4 (0.186, 0.04) = 0.226 mJ
Hence, it is validated that the traffic load is well distributed due to the deployment of heterogeneous nodes. The energy consumption within the bounded region will be optimal and contributes in enhancing the network lifetime.

3.7. Throughput Maximization

In this section, we maximize the network performance through efficient bandwidth allocation to super nodes. During the process, normal nodes send data to their respective super nodes in their transmission range. For the selection of S N as a data forwarder maximum bandwidth is required such that to forward data maximum amount of data. For the selection of S N , it is necessary that S N has high bandwidth in order to make sure that congestion is avoided and data is delivered to the sink successfully. Based on this, an objective function under linear constraints has been defined as follows:
m a x i m i z e r = 1 r m a x T h ( r ) r r m a x
where, T h ( r ) is computed like given in Equation (21)
T h ( r ) = r = 1 r m a x P k t ( r ) r r m a x
Constraints:
C o n 1 : E n ε o n N
C o n 2 : E F E F m i n n N
C o n 3 : T R n T R n m a x n N
C o n 5 : M a x s n = 1 s n m a x B S N s n S N
Objective function in Equation (20) is used to maximize the throughput of the network. Constraint C o n 1 and C o n 2 illustrate that the energy consumption of nodes must be minimum. Moreover from Equation (23) it is clear that energy of forwarder node is less than the node with minimum energy in a specific region. Equation (24) states that transmission range of sensor nodes is within the maximum transmission range of sensor nodes. Equation (25) depicts the allocation of maximum bandwidth to S N and remaining is divided equally between N N .
Let B denotes the total bandwidth allocated to the network i.e.,:
B = B N N + B S N
where B N N is the B allocated to N N and B S N is the B allocated to S N . The network area is divided into N coronas’ and further divided into S sectors. So the allocation of bandwidth in S can maximize the network performance. Let B n be the B allocated to a node in C i then:
B N N = B n × N n n
Let assume in a network N n n ranges from { 2 , 3 , ..... N n n N } in N coronas network. For efficient routing, we must have at least two nodes in a sector and maximum of N n n N nodes. Exceeding this value results in decreasing number of nodes in other sectors.
Also we have
B n = A T F t
where ATF denotes average traffic load on sensor nodes which can be calculated from Equation (11).
B S N = B B N N
Graphical Analysis: Let assume total N n n = 110 and N = 10, B = 500 kHz to 1 MHz, R = 500 m, r = 60 m, ξ = 3 m, x = 5 m, t = 10 ms. For N n n = 2, ATF = 466.12 bits, B N N = 93.2 kHz and B S N = 406.8 kHz. For N n n = 11, B N N = 512 kHz and B S N = 488 kHz. Now Equations (26), (28) and (29) can be represented as:
93.2 B N N 512
406.8 B S N 488
500 B N N + B S N 1000
The bounded region from the aforementioned equations is drawn in Figure 4 which is the feasible region of this bounded region.
Figure 4. Feasible Region: Bandwidth.
  • P 1 (93.2, 406.8) = 500 kHz
  • P 2 (93.2, 488) = 581.2 kHz
  • P 3 (512, 406.8) = 918.8 kHz
  • P 4 (512, 488) = 1 MHz
These points validate a valid solution for lifetime maximization. Hence selecting any value from the bounded region for B allocation always results in increasing the lifetime of forwarder nodes.

3.8. Data Transmission

Once the traffic load is estimated in each sector and feasible solution for energy consumption is computed and rest of the pre-requisites are fulfilled then data transmission is carried out towards the respective destination. In converge-cast routing algorithm, nodes deployed in the upper layer always pass on data to the downstream node. Nodes in outermost sector transmit data to the S N in their communication range. Then S N finds out the S N from C n 1 []. Due to the increment of load from top to bottom, heterogeneous network is considered. Let assume N N j sends data from sector S n to sector S n 1 in order to transmit data to the sink as shown in Figure 2. Distance between them is d ( i , j ) . If the distance is within the free space then data transmission proceeds else an alternative route is computed to deliver data at the destination or S N . Lets assume k bit data to be transmitted by the nodes in sector S n to the nodes in sector S n 1 . Energy consumes in sending k data to the next hop can be calculated from Equation (7).
The data transmitted by node i in sector S n to node j in sector S n 1 is equal to k × A T F i M s and the data receive by node in sector S n 1 is A T F i S n 1 ; N N in a sector N n interacts with normal node in sector S n 1 . If N N i in a sector is unable to find normal node j in sector S n 1 , void hole occurs. In that case normal node has to find a suitable forwarder node. S N in a sector receives the data from N N s in case when void hole occurs. The situation arises when normal node does not lie in transmission range of S N . Then N N sends the data to super node through its neighbor node which is close to S N . If somehow neighbor node in respective sector is not available, super node collects the data by itself from normal node. After the data successful reception by S N in a sector S n , it transmits the data to S N in sector S n 1 . As the time progresses, after the death of super node in sector S n , super node present in adjacent sector S acts as data forwarder for remaining nodes. It has enough energy for sending data to the sink directly and this process continues until all the data is successfully delivered to the sink.

4. Performance Evaluation

In this section, we evaluate the performance of our propose strategy through simulations in a simulator. LiMHA is compared with existing schemes ODTS, LAEHA, N-SEP, and P-SEP through simulations because all techniques have corona based models. Simulation parameters are listed in Table 2.
Table 2. Control Parameters.

4.1. Performance Metrics

In this section, we use performance metrics for estimating the performance of the routing techniques.

4.2. Metrics Definition

Network Lifetime (s):
Network lifetime ( t ) is defined as the lifetime achieved by corona with maximal PNAEC in t-th iteration. i.e.,
( t ) = ε o m a x { E i ( t ) , i = 1 , 2 , ... N c }
where ε o is the initial energy of each node and E i ( t ) is the PNAEC of corona C i in the t-th iteration.
Energy Tax (J):
Energy tax is defined as the average energy consumption of a node during successful transmission of packets to the sink. Energy tax can be computed as follows:
E n e r g y t a x = E t o t a l N × P a c k e t s S i n k
where E t o t a l denotes the total energy consumption of the network. N denotes total number of nodes in the network and P a c k e t s S i n k denotes the number of packets receive by the sink.
End to End delay (s):
E2E is defined as the average time elapsed from the start when packet leaves source node until the packet successfully received by the sink.

4.3. Network Lifetime Comparison

Figure 5 compares the network lifetime under different radii. It is clear from figure that network lifetime decreases with the increase in network radius. This is due to increase in distance between nodes which increases the energy consumption. Moreover probability of void hole increases with increase in network radius which leads to short lifespan. LiMHA has 15% higher network lifetime as compared to ODTS on average and 45% improved lifetime as compared to LAEHA. In LiMHA network is divided into sectors and presence of each super node in a sector decreases the void hole probability. Super node has the capability to receive the data from normal nodes as well as to send the collected data from normal node to downstream super node. In the start when network radius ranges from 100–200 m, the performance of ODTS is observed better in terms of maximizing network lifetime except with the case of 100 m radius. ODTS uses ant colony optimization for achieving better lifespan in sparse network. It chooses a path that is more energy efficient as a result data is transmitted through the shorter path. For large area network the performance of ODTS in terms of lifetime degrades as compared to LiMHA. LiMHA uses super nodes for data transmission. If normal nodes unable to locate neighboring nodes in their transmission range they transmit the data to their respective super node in their sector without any hesitation. Thus probability of transmission of data increases which increases the overall network lifetime. With the increase in network area traffic load increases. In LiMHA, super nodes have enough energy to bear the burden of high traffic load, however in ODTS high traffic load on nodes decreases the network lifetime. Same is the case for LAEHA where high data load on nodes near the sink decreases the lifetime of sensor nodes due to high energy required for sending data to the sink. Thus network lifetime tends to decrease rapidly.
Figure 5. Network Lifetime at Various Radii.
For better visualization, we have compared our protocol with cluster based heterogeneous schemes N-SEP and P-SEP. The network lifetime is the metric to validate the legitimacy and effectiveness or our proposed work with respect to the baseline strategies for energy efficiency. We have increased the transmission radius for all schemes for fair comparison, where it is evident that with the increase in radii, the network nodes have to transmit data over long distances, that is well known with the increase in distance directly proportional to energy tax. Authors in both N-SEP and P-SEP have used small communication distances, however, when we increased the communication distance for all schemes as shown in Figure 5. The network lifetime gradually starts declining due to uneven battery dissipation over long transmission ranges. Hence, it is well grounded that our proposed is suitable for both small and large communication ranges. While, other schemes perform well enough, but not as much needed.

4.4. Energy Tax Comparison

Figure 6 shows energy tax increases with the increase in node density. With number of nodes increases, distance between nodes decreases thus less energy is required for sending data to the sink. In sparse area network ODTS performs better as compared to others. ODTS chooses the most energy efficient and balanced path for sending data to the sink. Hence less energy is consumed. An average 26.5% less energy is utilized in ODTS is noted as compared to LiMHA. LAEHA has 41.3% higher energy tax as compared to ODTS in sparse area network. Due to less number of nodes in the network distance between nodes increases thus nodes have to send their data with high energy consumption which increases the overall energy consumption of nodes thus increases the energy tax as well. This distance decreases when there are enough number of forwarder nodes in the network due to which energy consumption for data transmitting and receiving is reduced. In case of dense network, overall energy consumption of the network is increased in ODTS due increase in neighbor requests with the increase in node density. Moreover in ODTS with the increase in number of nodes packet collision on ants effects the performance of network thus increases the energy consumption of the network. ODTS uses energy balanced distance for transmission of data hence overall energy consumption slightly decreases. On average LAEHA has less energy tax among the others i.e., averages 60.8% less energy tax as compared to LiMHA and 89.8% less energy tax when compares with LiMHA. LAEHA is energy efficient routing technique because it only considers forwarding of data with minimum distance to the sink.
Figure 6. Energy Tax with Different Node ρ .
For network having large number of nodes, LiMHA performance in terms of energy decreases as compared to LAEHA due to the fact that super node is selected as a data forwarder from a specific distance in order to overcome void hole. From the results of energy tax, it is understood that ODTS is more energy efficient in sparse network as compared to LiMHA but less energy efficient than both LiMHA and LAEHA in dense area network because of its ability of energy balancing which neither drop energy nor maximizes much.
Similarly, N-SEP has less energy tax as compared to ODTS and P-SEP when node density is low due to no redundant packets transmissions at the cluster head. However, as it can be seen that with the increase in node number, energy tax is decreased, however, in league with LiMHA, energy tax is high when nodes density is high. High energy dissipation is due to the overburden of traffic over the selected cluster head, while in LiMHA at each hop traffic load is estimated then data is transmitted. Due to ignorance of uneven traffic load, cluster heads deplete energy very quickly and lead to void hole. Clustering mechanism exploited in P-SEP is to maximize the network lifespan. Its energy consumption is higher than LiMHA , LAEHA, and N-SEP due to the random selection of cluster head at each round and the nomination of member nodes based on the minimum distance from the cluster head. Due to the optimal number of nodes association, few nodes having larger distance than the defined threshold unable to find cluster head. Resulting in wastage of energy leading to degrade the network performance. The energy dissipation also increased in P-SEP as node density increases in the network. The reason behind high energy tax is that due to the inefficient selection of cluster heads. There is the cyclic selection of cluster heads which becomes inappropriate when node ρ increases resulting in high data traffic at the cluster head and also no mechanism for cluster head congestion avoidance. Due to these factors, P-SEP is less energy efficient than LiMHA.

4.5. End to End delay Comparison

Figure 7 leads to E2E delay comparison among LiMHA, ODTS, LAEHA, N-SEP and P-SEP. Contrary to energy tax, E2E delay decreases with increase in number of nodes. With number of nodes increases traffic load on lowest region increases thus sending high traffic load consumes lot of time which increases the E2E delay. Moreover packets collision between nodes increases the overall waiting time. ODTS has lower delay as compared to LiMHA. The main reason behind this with less number of nodes the distance between nodes and ants in a region increases thus ants have to wait for the packet to reach to it which increases the overall sending time but still better than LiMHA. Also due to less number of nodes probability of node failure tends to increase rapidly thus nodes have to choose other routing path for packet transmission. In term of achieving better results with minimum E2E delay in sparse area network LAEHA performance is better due to the following reason: LAEHA does not perform number of calculations for finding the forwarder nodes. However in LiMHA normal nodes in a sector have to decide whether to send the data to normal nodes in lower region or to forward the received data to super nodes in respective region. Moreover number of neighbor requests in LAEHA are less as compared to LiMHA and ODTS that add extra E2E delay into the routing technique with high number of neighbor requests. When network size grows up, the performance of ODTS is remarkable as compared to LiMHA in terms of achieving minimum E2E delay level because data is forwarded to best routing path which is most energy efficient path and this level increases on average as compared to LAEHA which has high level of minimum delay among others on an average. In LiMHA, the network area is divided into sectors and in each sector normal node has to choose its data forwarder such that the packet successfully reaches to its destination. Similarly, the E2E delay of P-SEP from all baseline schemes including N-SEP is minimum due to the factor of its greedy approach of selecting cluster head at an optimal distance from sink and member nodes with in the threshold value of communication range. That is the main factor its performance degrades as communication radii increases, however, its E2E delay remains smaller than rest of the counterpart schemes. N-SEP performs well with respect to baseline schemes excluding P-SEP as shown in Figure 7.
Figure 7. End 2 End delay.

4.6. Performance Trade Off

In this section, we discuss the performance of of our propose scheme LiMHA with the selected schemes ODTS and LAEHA. The proposed scheme performs better in terms of optimizing network performance. The higher lifetime achievd by LiMHA is due to division of network into number of sectors and high energy node is present in each which increases the probability of successful transmission of data to to sink. On the other hand there is no such phenomena of super node deployment is discussed. However ODTS has better network lifetime as compared to LAEHA because ODTS uses ant colony optimization for transmission of data to the sink while LAEHA only considers commonly used transmission strategy. Looking at the energy comparison, LiMHA achieve less energy when compared with ODTS in dense area network. ODTS uses the most energy balance distance for transmission of data to the sink. It energy slightly changes with node density. In LiMHA, presence of each super node in a sector minimizes the energy of normal nodes due to selection of forwarder node at minimum distance thus normal nodes have to choose low distance nodes in their transmission range. With the deployment of super node the minimum distance level is increased. The performance of LAEHA in terms of less energy consumption is outstanding because LAEHA only considers the selection of forwarder node on minimum depth. E2E delay level of LiMHA is worst due to number of calculations involved in selecting the forwarder nodes. Normal node in a sector calculates its distance with neighboring normal node and super node. Also it calculates its distance with the down sector normal normal thus delay is increased in this scenario. In terms of achieving minimum delay level LAEHA performance is better compared to ODTS because ODTS considers the time involves in selection of best possible path for data transmission increases the packet sending time thus delays the performance of the network while there is no such phenomena is adopted in LAEHA. N-SEP achieved energy efficiency in sparse deployment and while effective network lifetime in sparse deployment, however, E2E delay is minimized due to the k-mean clustering algorithm. Similarly, P-SEP is attains minimum E2E delay and energy efficiency in sparse deployment due to the selection of cluster heads at optimal distance from sink and members having minimum distance from the respective head node. The performance trade off table is shown in Table 3.
Table 3. Performance Trade Off.

5. Conclusions and Future Work

In this paper, we have proposed a transmission strategy that is able to alleviate hole in order to maximize the network lifetime. The deployment of heterogeneous nodes in each region proved to be successful in term of balanced data transmissions over an intermediate node. In addition, the division of the network field contributed enough in balancing the energy among the network nodes. Due to the election of the optimal forwarder at each hop, even energy dissipation is achieved. The existing technique ODTS is based on ACO which computes two functions for finding the optimal energy efficient route and minimal distance between source and destination. However, the estimation of data load at each hop in proposed algorithm proved to be very effective in selecting route to the destination. Through linear optimization, we have computed a feasible region which shows that energy consumption within that region always helps the network nodes to operate for the maximal time. Moreover, after the death of an intermediate node, transmission range is adjusted in order to transmit data packets directly to the destination. This also increased the network lifetime and allows the node to utilize its energy resources completely. The effectiveness and validity of the proposed work are shown through simulations. The results are portrayed in which it is evident that proposed work outperformed selected existing counterpart scheme in terms of network lifetime and energy consumption.
In future, we will extend our work in different ways. Firstly we will do random deployment of heterogeneous nodes in the network, i.e., they can be placed anywhere in a sector. Secondly, we will find out an optimal number of nodes that are capable of delivering data to intermediate nodes.

Acknowledgments

This work was supported by the Deanship of Scientific Research, King Saud University, under Grant RG-1435-0037.

Author Contributions

All authors together proposed, discussed and finalized the main idea of this work. Zahid Wadud, Nadeem Javaid, and Muhammad Awais proposed implemented the protocols. Nabil Alrajeh, Mohamad Souheil Alabed and Nadra Guizani calculated and plotted the feasible regions.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bello, O.; Zeadally, S. Intelligent device-to-device communication in the internet of things. IEEE Syst. J. 2016, 10, 1172–1182. [Google Scholar] [CrossRef]
  2. Huang, J.; Duan, Q.; Xing, C.C.; Wang, H. Topology Control for Building a Large-Scale and Energy-Efficient Internet of Things. IEEE Wirel. Commun. 2017, 24, 67–73. [Google Scholar] [CrossRef]
  3. Mann, P.S.; Singh, S. Energy-Efficient Hierarchical Routing for Wireless Sensor Networks: A Swarm Intelligence Approach. Wirel. Pers. Commun. 2017, 92, 785–805. [Google Scholar] [CrossRef]
  4. Prabhu, B.; Balakumar, N.; Antony, A.J. Evolving Constraints in Military Applications Using Wireless Sensor Networks. Int. J. Innov. Res. Comput. Sci. Technol. 2017, 5, 1–6. [Google Scholar] [CrossRef]
  5. Mohemed, R.E.; Saleh, A.I.; Abdelrazzak, M.; Samra, A.S. Energy-efficient routing protocols for solving energy hole problem in wireless sensor networks. Comput. Netw. 2017, 114, 51–66. [Google Scholar] [CrossRef]
  6. Maurya, S.; Gupta, V.; Jain, V.K. LBRR: Load Balanced Ring Routing Protocol for Heterogeneous Sensor Networks with Sink Mobility. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [Google Scholar]
  7. Sabor, N.; Sasaki, S.; Abo-Zahhad, M.; Ahmed, S.M. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions. Wirel. Commun. Mob. Comput. 2017, 2017, 23. [Google Scholar] [CrossRef]
  8. Kumar, A.; Shwe, H.Y.; Wong, K.J.; Chong, P.H. Location-Based Routing Protocols for Wireless Sensor Networks: A Survey. Wirel. Sens. Netw. 2017, 9, 1–25. [Google Scholar] [CrossRef]
  9. Langendoen, K.; Meier, A. Analyzing mac protocols for low data-rate applications. ACM Trans. Sens. Netw. 2010, 7, 1–40. [Google Scholar] [CrossRef]
  10. Tunca, C.; Isik, S.; Donmez, M.Y.; Ersoy, C. Ring routing: An energy-efficient routing protocol for wireless sensor networks with a mobile sink. IEEE Trans. Mob. Comput. 2015, 14, 1947–1960. [Google Scholar] [CrossRef]
  11. Jan, N.; Javaid, N.; Javaid, Q.; Alrajeh, N.A.; Alam, M.; Khan, Z.A.; Niaz, I.A. A balanced energy consuming and hole alleviating algorithm for wireless sensor networks. IEEE Access 2017, 5, 6134–6150. [Google Scholar] [CrossRef]
  12. Ren, J.; Zhang, Y.; Zhang, K.; Liu, A.; Chen, J.; Shen, X.S. Lifetime and energy hole evolution analysis in data-gathering wireless sensor networks. IEEE Trans. Ind. Inform. 2016, 12, 788–800. [Google Scholar] [CrossRef]
  13. Khan, M.A.; Javaid, N.; Wadud, Z.; Gull, S.; Imran, M.; Nasr, K. Towards Energy Balancing in Heterogeneous Wireless Sensor Networks. In Proceedings of the 13th IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017. [Google Scholar]
  14. Sahoo, P.K.; Liao, W.C. HORA: A distributed coverage hole repair algorithm for wireless sensor networks. IEEE Trans. Mob. Comput. 2015, 14, 1397–1410. [Google Scholar] [CrossRef]
  15. Kacimi, R.; Dhaou, R.; Beylot, A. Load balancing techniques for lifetime maximizing in wireless sensor networks. Ad Hoc Netw. 2013, 11, 2172–2186. [Google Scholar] [CrossRef]
  16. Khan, M.A.; Sher, A.; Hameed, A.R.; Jan, N.; Abassi, J.S.; Javaid, N. Network lifetime maximization via energy hole alleviation in wireless sensor networks. In Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications, Asan, Korea, 5–7 November 2016; pp. 279–290. [Google Scholar]
  17. Li, K. Optimal number of annuli for maximizing the lifetime of sensor networks. J. Parallel Distrib. Comput. 2014, 74, 1719–1729. [Google Scholar] [CrossRef]
  18. Rasheed, M.B.; Javaid, N.; Khan, Z.A.; Qasim, U.; Ishfaq, M. E-HORM: An energy-efficient hole removing mechanism in Wireless Sensor Networks. In Proceedings of the 26th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Regina, SK, Canada, 5–8 May 2013; pp. 1–4. [Google Scholar]
  19. Jewel, D.; Brundha, P.; Wise, D.J.W.; Swaminathan, G.A. Improved Hole Detection Healing and Replacing Algorithm for Optimal Coverage in Wireless Sensor Network. Int. J. Sci. Res. Sci. Eng. Tech. 2016, 2, 724–731. [Google Scholar]
  20. Ekal, H.H.; Abdullah, J.; Jamil, A.; Audah, L.; Alias, R. Energy balance mechanism for improving the lifetime in dense centric Wireless Sensor Networks. In Proceedings of the 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 13–15 October 2016; pp. 1–7. [Google Scholar]
  21. Lu, T.; Liu, G.; Chang, S. Energy-efficient data sensing and routing in unreliable energy-harvesting wireless sensor network. Wirel. Netw. 2016, 1–15. [Google Scholar] [CrossRef]
  22. Kulshrestha, J.; Mishra, M.K. An adaptive energy balanced and energy efficient approach for data gathering in wireless sensor networks. Ad Hoc Netw. 2017, 54, 130–146. [Google Scholar] [CrossRef]
  23. Kumar, V.; Kumar, S. Energy balanced position-based routing for lifetime maximization of wireless sensor networks. Ad Hoc Netw. 2016, 52, 117–129. [Google Scholar] [CrossRef]
  24. Lin, C.; Wu, G.; Xia, F.; Li, M.; Yao, L.; Pei, Z. Energy Efficient Ant Colony alogorithm for data aggregation in wireless sensor networks. J. Comput. Syst. Sci. 2012, 78, 1686–1702. [Google Scholar] [CrossRef]
  25. Liu, X. An optimal-distance-based transmission strategy for lifetime maximization of wireless sensor networks. IEEE Sens. J. 2015, 15, 3484–3491. [Google Scholar] [CrossRef]
  26. Ghaffari, A. An energy efficient routing protocol for wireless sensor networks using A-star algorithm. J. Appl. Res. Technol. 2014, 12, 815–822. [Google Scholar] [CrossRef]
  27. Bhattacharjee, S.; Bandyopadhyay, S. Lifetime Maximizing Dynamic Energy Efficient routing protocol for multihop wireless sensor networks. Simul. Model. Pract. Theory 2013, 32, 15–29. [Google Scholar] [CrossRef]
  28. Naranjo, P.G.V.; Shojafar, M.; Abraham, A.; Baccarelli, E. A new stable election-based routing algorithm to preserve aliveness and energy in fog-supported wireless sensor networks. In Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary, 9–12 October 2016; pp. 2413–2418. [Google Scholar]
  29. Naranjo, P.G.V.; Shojafar, M.; Mostafaei, H.; Pooranian, Z.; Baccarelli, E. P-SEP: A prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks. J. Supercomput. 2016, 73, 733–755. [Google Scholar] [CrossRef]
  30. Jin, Y.; Xian, F.; Zhen, G.-C.; Hu, W. Energy-efficient data collection protocol for wireless sensor network based on tree. In Proceedings of the 2010 Asia-Pacific Conference on Wearable Computing Systems (APWCS), Shenzhen, China, 27–28 April 2010; pp. 82–85. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.