Next Article in Journal
Three-to-One Internal Resonance in MEMS Arch Resonators
Next Article in Special Issue
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things
Previous Article in Journal
Fabrication and Applications of Solid-State Nanopores
Previous Article in Special Issue
A Triple-Filter NLOS Localization Algorithm Based on Fuzzy C-means for Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Practical Neighbor Discovery Framework for Wireless Sensor Networks

1
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
2
College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
3
Department of Computer Science, The University of Hong Kong, Hong Kong, China
4
School of Information Technology, Carleton University, Ottawa, ON K1S5B6, Canada
5
Institute of Cyberspace Research, Zhejiang University, Hangzhou 310027, China
*
Authors to whom correspondence should be addressed.
Sensors 2019, 19(8), 1887; https://doi.org/10.3390/s19081887
Submission received: 3 April 2019 / Revised: 17 April 2019 / Accepted: 17 April 2019 / Published: 20 April 2019
(This article belongs to the Special Issue Intelligent Systems in Sensor Networks and Internet of Things)

Abstract

:
Neighbor discovery is a crucial operation frequently executed throughout the life cycle of a Wireless Sensor Network (WSN). Various protocols have been proposed to minimize the discovery latency or to prolong the lifetime of sensors. However, none of them have addressed that all the critical concerns stemming from real WSNs, including communication collisions, latency constraints and energy consumption limitations. In this paper, we propose Spear, the first practical neighbor discovery framework to meet all these requirements. Spear offers two new methods to reduce communication collisions, thus boosting the discovery rate of existing neighbor discovery protocols. Spear also takes into consideration latency constraints and facilitates timely adjustments in order to reduce the discovery latency. Spear offers two practical energy management methods that evidently prolong the lifetime of sensor nodes. Most importantly, Spear automatically improves the discovery results of existing discovery protocols, on which no modification is required. Beyond reporting details of different Spear modules, we also present experiment evaluations on several notable neighbor discovery protocols. Results show that Spear greatly improves the discovery rate from 33.0 % to 99.2 % , and prolongs the sensor nodes lifetime up to 6.47 times.

1. Introduction

With the ascent of Internet-of-Things (IoT) [1,2,3,4,5,6,7], wireless sensor networks (WSNs) are increasingly being adopted for tracking and monitoring applications in various areas such as health-caring, smart buildings, agricultural management and assisted living [8,9,10]. For example, WSN has been deployed for agriculture information monitoring [11], and sensors can be attached to inventory items in a large warehouse for object identification [12].
As a crucial process in constructing a wireless network, neighbor discovery, where sensor nodes try to find the existence of neighboring nodes within their communication range, has drawn much attention in the last decade or so [12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27]. Sensor nodes are powered by batteries. To minimize the overall energy consumption, most existing work focuses on designing discovery schedules that maintain a low duty cycle. However, despite decades of efforts, designing practical neighbor discovery protocols for real-life WSNs remains a big challenge, especially when considering all three critical factors as pointed out by previous works:
  • Collisions happen when multiple nodes transmit on the same communication channel simultaneously.
  • Bounded latency is required for time-sensitive applications. For example, object detection applications require discovering the neighbors for transmitting emergent information with very low latency.
  • Prolonged lifetime of sensor nodes. In order to reduce the energy consumption and prolong the lifetime of sensor nodes, affective energy management methods that can dynamically adjust nodes’ duty cycles during the discovery process are crucial.
Neglecting all these practical concerns, sensor nodes will likely fail to discover all neighbors before running out of energy.
Unfortunately, no existing work has considered all of the above-mentioned concerns in one setting. Typically, only one factor is considered at a time. Among all solutions, two major types of protocols exist: probability-based and deterministic ones. Probability-based protocols turn on the radio with different probabilities to reduce communication collisions [20,25,27,28,29], but the discovery latency often varies significantly. Compared to probability-based protocols, deterministic protocols are much more popular in practice. This approach is also the main focus of this paper because with a deterministic discovery schedule the discovery latency is mostly stable [12,13,15,16,18,21,22,26,30,31]. However, existing deterministic protocols mainly target at only two neighbors, where collision often does not occur. As shown in Figure 1, when these (bare) deterministic protocols (Hedis [15], Hello [22], Searchlight [13], and U-Connect [18]) are adopted in a network of 1000 nodes, the discovery rates are only 33.0–65.9% because of collisions.
In this paper, we propose Spear (Spear is a general, powerful ancient weapon), a practical neighbor discovery framework that deals with all the critical factors mentioned above. The advantages of Spear are:
(a)
Spear creates two new methods, Pure Probability Reducing (PPR) and Decreased Probability Reducing (DPR), to reduce communication collisions among multiple nodes. Running in Spear, a deterministic protocol targeting at two neighbors can be automatically extended to support multiple nodes, while still keeping a stable discovery latency;
(b)
Spear introduces two methods to manage energy and one unified method to handle latency constraints; it prolongs the node’s lifetime and enhances the availability for various applications;
(c)
Spear enables the quantitative analysis of various neighbor discovery protocols, and generates the optimal neighbor discovery schedule automatically.
We implemented Spear and evaluated several notable neighbor discovery protocols on 1000 nodes. As shown in Figure 1, when running PPR or DPR in Spear, the discovery rates for these protocols greatly increase from 33.0 % to 99.2 % . By incorporating the energy management methods, nodes’ lifetime can be extended up to 6.47 times than that of running bare protocols.
The main contributions of Spear are automatic reduction of communication collisions, improvement of discovery rate, and prolonging lifetime for neighbor discovery, which together make the construction of WSNs much more effective and easier. Furthermore, Spear can be broadly applied to tackle various problems in WSNs.
The rest of the paper is organized as follows. We introduce relevant neighbor discovery protocols in Section 2, and the preliminaries in Section 3. We describe Spear in detail in Section 4. Methods that manage node energy and handle the latency requirements are presented in Section 5, and the methods to reduce communication collisions for an arbitrary neighbor discovery protocol are introduced in Section 6. We implemented Spear and evaluated several notable neighbor discovery protocols; the results are presented and discussed in Section 7. Finally, we conclude the paper in Section 8.

2. Related Works

The neighbor discovery problem in WSNs has been widely studied and the goal is to reduce the duty cycle or to reduce the latency of discovering the neighboring nodes. Generally speaking, there are two categories of neighbor discovery algorithms.
One category is probability algorithms, which utilize randomness to discover the neighbors in a short expected time. Birthday protocol [20] is one of the earliest algorithms that works on the birthday paradox, i.e., the probability that two people have the same birthday exceeds 1 2 among 23 people. In the birthday protocol, each node transmits with probability p [ 0 , 1 ] and listens on the channel with probability 1 p in each time slot independently; this protocol ensures that the nodes can discover the neighbors with high probability, but it cannot deduce a bounded discovery time. Aloha-like protocol [28] assumes each node is awake in each slot with probability p w and an awake node transmits with probability p t and listens with probability p l ; one can derive the expected time to discover all neighbors with this protocol, but cannot guarantee successful discovery for the worst case situation. Following that, more smarter probabilistic algorithms were proposed [25,27,29], but they cannot guarantee an upper bound on the discovery latency among the nodes.
The other category is deterministic algorithms, which adopt some mathematic tools to ensure discovery between every two neighbors. The first tool is called quorum system: for any two intersected quorums, two neighboring nodes could choose any quorum in the system to design the discovery schedule and the discovery latency can be bounded in a short time. Many algorithms are related to the quorum system [15,17,18,19,30], but only a few of them support asymmetric duty cycles of the nodes, such as Hedis [15]. Another important tool is co-primality where two co-prime numbers are chosen by the neighbors to design the discovery schedule, and they can discover each other within a bounded latency by the Chinese Remainder Theorem [32]. Some representative algorithms are Disco [16], U-Connect [18], and Todis [15].
In short, probabilistic algorithms cannot guarantee two neighboring nodes discover each other in a finite time, but they assure that the discovery can be successful with a high probability in an expected discovery time. In contrast, deterministic algorithms can ensure the discovery process between the nodes, and they can limit the maximum discovery latency to within a bounded time.
Many neighbor discovery protocols assume that time is divided into slots of equal length and the nodes have aligned slots. Some works also study a general scenario that the slots are aligned between the users. They use probe, beacon or anchor to design the discovery protocols, and the representative algorithms are Searchlight [13], Hello [22] and Nihao [21]. There are also some other neighbor discovery protocols that are based on different techniques, such as combinatorial design [33], BlindDate [26], and Panda [12], the details of which we omit here. Among these algorithms, some of them only support symmetric duty cycle (the nodes select the same duty cycle), such as Quorum and Balanced Nihao [21], while others support asymmetric duty cycles (nodes select different duty cycles), such as Disco, U-Connect, Searchlight [13], Hello [22], Hedis and Todis [15].
To the best of our knowledge, most deterministic neighbor discovery algorithms are designed for two neighbors, with symmetric or asymmetric duty cycles. A few of them consider the energy management of each node and they ignore the communication collisions when they are extended for multiple nodes. Therefore, we propose a practical framework incorporating these issues and enable the existing deterministic protocols to be applicable for networks with multiple nodes.

3. Preliminaries

3.1. Sensor Node Model

Each sensor node u i has a distinguishable identifier I i . Suppose node u i is powered by the battery it carries, we can denote the maximum power as P m a x and the remaining energy at time t as P i ( t ) . The node dies at time t if P i ( t ) = 0 (rechargeable battery is a possibility but not considered here).
Driven by different applications, each node can carry out many operations, such as sensing nearby information, transmitting data, etc. Among these operations, communications through the wireless channel dominate the energy consumption [12]. Therefore, we assume only two states { O N , O F F } in this paper; O F F means the node turns its radio off to save energy, while O N means the node turns the radio on for communication. We focus on the communications during neighbor discovery process. Before each node tries to communicate with others, it has to identify the neighboring nodes first. Therefore, we suppose the nodes can communicate only when the discovery is successful.
Suppose time is divided into slots of equal length t 0 which is sufficient for the nodes to establish a communication link on the channel. Denote the consumed energy in each time slot as p n if the node’s radio is turned on, and p f if the radio is turned off. Notice that a node may send a beacon message for discovering neighbors, listen on channels, exchange information, etc. Different operations may consume different energy when the radio is O N ; we assume p n is the average energy in a time slot for simplicity. In practical systems, switching the radio states also consumes energy, such as p n f (switching the radio from on to off) and p f n (switching the radio from off to on). As shown in Figure 2, a node has two states { O N , O F F } and it switches states in each time slot. When a node switches from O F F to O N as F N , the consumed energy is p f n ; when it switches from O N to O F F as N F , the consumed energy is p n f ; when it keeps state O N as N N , the (average) consumed energy in the slot is p n ; when it keeps state O F F as F F , the consumed energy is p f . In this paper, we adopt the common assumption p f = p n f = p f n = 0 , and prolonging the lifetime of the node is equivalent to reducing its percentage of time slots when the radio is on. The notations are also given in Table 1.

3.2. Communication Model

Considering a WSN that consists of N nodes, { u 1 , u 2 , , u N } . Suppose only one wireless channel is available for communication. When the nodes turn on their radios simultaneously, they can transmit information through the wireless channel. Denote the communication range of each node as d c , and two nodes are called neighbors if their distance is no larger than d c (denote the distance of nodes u i , u j as d ( u i , u j ) ).
In real networks, whether one node can communicate with a neighboring node successfully is dependent on many factors, such as environment noises, the sending power energy, the path-loss exponent during transmission, beaconing, and handshaking. The signal-to-interference-plus-noise ratio (SINR) model is a realistic model that captures the collision among multiple transmissions [34]. It is also shown that the SINR model can be converted to the communication graph model that two nodes are neighbors if their distance is within the communication range. Therefore, we simplify the process and assume that two neighboring nodes can communicate if their distance is within d c and they both have turned on the radio.
In the practical networks, multiple nodes may turn on the radio simultaneously and they could cause communication collisions on the channel. For example, node u 1 has two neighbors u 2 , u 3 and they all turn on the radio simultaneously. Suppose both u 2 , u 3 send a message to u 1 ; then, u 1 cannot decode the composited message correctly. Therefore, we say communication collision happens and node u 1 cannot find its neighbors.

3.3. Neighbor Discovery

Neighbor discovery is the foundation of constructing WSNs. When the sensor nodes are deployed in the monitoring area, each node can only know its local information; the nodes have to find their neighboring nodes, and then the network can be established.
Suppose node u i starts at time t i s and it tries to discover its neighbors by turning on the radio. In order to save energy, the node runs some pre-defined algorithms to generate a discovery schedule S i = { s i ( t ) | t t i s } , where:
s i ( t ) = 0 , i f u i t u r n s t h e r a d i o O F F , 1 , i f u i t u r n s t h e r a d i o O N .
The neighbor discovery problem between two neighboring nodes is defined as:
Problem 1.
For two neighboring nodes u i and u j , design the discovery schedules S i , S j respectively such that there exists T satisfying:
s i ( T ) = s j ( T ) = 1 .
Two nodes may start at different times, which is referred to as the asynchronous case in the literature, and the discovery latency is defined as:
Definition 1.
The discovery latency between two neighboring nodes u i and u j is the time cost to turn on the radio simultaneously after they both have started:
L ( i , j ) = T max { t i s , t j s } .
Considering the network with multiple nodes, the neighbor discovery problem for node u i is defined as:
Problem 2.
For each node u i , denote the set of neighboring nodes as N i = { u j | d ( u i , u j ) d c } . Design the discovery schedule for each node, such that there exists T i , j satisfying:
s i ( T i , j ) = s j ( T i , j ) = 1 , s k ( T i , j ) = 0 , u k N i , u k u j .
Similarly, the discovery latency for node u i is defined as:
Definition 2.
The discovery latency for node u i is the time cost to find all neighbors:
L ( i , N i ) = max u k N i T i , k t i s .
Most neighbor discovery algorithms generate their discovery schedules with regard to the duty cycle which is defined as:
Definition 3.
The duty cycle of node u i between time T 1 , T 2 ( T 1 < T 2 ) is the percentage of time slots when u i turns on the radio:
θ i ( T 1 , T 2 ) = | { s i ( t ) = 1 | T 1 t T 2 } | T 2 T 1 .
The existing deterministic algorithms try to minimize the discovery latency between two neighbors for pre-defined duty cycles. Both symmetric and asymmetric duty cycles should be considered.

4. Spear: Neighbor Discovery Framework

4.1. Framework Overview

As shown in Figure 3, Spear consists of four modules: energy module is in charge of the node’s energy management; application module collects various latency constraints from the applications; algorithmic module generates a neighbor discovery schedule by invoking the discovery protocols; and communication module is responsible for the communication with neighbors.
Spear accepts bounded latency constraints and remaining energy as the inputs, and the neighbor discovery algorithms (such as Hedis, Hello, Searchlight, and U-Connect in the figure) are plugged into the framework to generate the discovery schedule. Spear outputs the discovered neighbors and the corresponding discovery latency, which both are needed for constructing the network and achieving other functions.

4.2. Energy Module

The energy module receives the remaining energy and the latency constraints from the application module as inputs. The output is the duty cycle which the node is to adopt. Two main functions are incorporated into the energy module: computing the node’s lifetime and adjusting the duty cycle.
For any node u i which starts at time t i s , suppose the generated schedule is S i = { s i ( t ) | t t i s } and it runs out of energy at time t i e . We have the following equation:
t i s t i e s i ( t ) · p n = P m a x .
Then, the lifetime of node u i (denoted as L f i ) is L f i = t i e t i s .
Notice that we assume a sensor node has only two states { O N , O F F } in Section 3.1. The generated schedule S i = { s i ( t ) } contains a sensor state of each time slot t; specifically, s i ( t ) = 0 if the state of the node is O F F while s i ( t ) = 1 is the state of the node is O N . We define two identification functions as f n 2 f ( t ) = 1 if and only if s i ( t 1 ) = 1 , s i ( t ) = 0 , f f 2 n ( t ) = 1 if and only if s i ( t 1 ) = 0 , s i ( t ) = 1 . The first one implies that the node switches its state from O N to O F F , while the other one implies that the node switches its state from O F F to O N . Combining these, a complete energy formulation should be
t i s t i e s i ( t ) · p n + ( 1 s i ( t ) ) · p f + f n 2 f ( t ) · p n f + f f 2 n ( t ) · p f n = P m a x .
Since we assume the consumed energy of state O F F and switching states are zero, i.e., p f = p n f = p f n = 0 , we derive the simplified formulation as Equation (3).
If node u i turns the radio on all the time, Equation (3) can be rewritten as:
( t i e t i s ) · p n = P m a x
and the lifetime is L f i = P m a x p n , which is the minimum value.
To extend the lifetime, node u i turns on the radio for a fraction of the time. If node u i selects the duty cycle as a fixed value θ ^ ( 0 , 1 ) , we can rewrite Equation (3) as:
( t i e t i s ) · θ ^ · p n + ( t i e t i s ) · >( 1 θ ^ >) · p f P m a x .
We use ‘≈’ since the schedule may not be a complete cycle, but it makes very little difference, and we can just regard it as ‘=’. As we assume p f = 0 , the lifetime of node u i is computed as:
L f i = P m a x p n · θ ^ .
Suppose that node u i adjusts the duty cycle timely. Denote the time that u i changes the duty cycle as: T 0 < T 1 < < T m , where T 0 = t i s and T m < t i e . For simplicity, denote T m + 1 = t i e and Equation (3) is rewritten as:
k = 0 m ( T k T k + 1 s i ( t ) · p n ) = P m a x k = 0 m ( T k + 1 T k ) · θ i ( T k , T k + 1 ) · p n = P m a x .
Since θ i ( T k , T k + 1 ) and T i , i [ 0 , m ] are known beforehand, t i e = T m + 1 is computed as:
t i e = P m a x p n k = 0 m 1 ( T k + 1 T k ) · θ i ( T k , T k + 1 ) θ i ( T m , T m + 1 ) + T m .
Then, the lifetime can be computed. In Section 5, we analyze the impact of the node’s lifetime by different strategies that adjust the duty cycles.

4.3. Application Module

WSNs are used in many applications and there could be many different requirements for the nodes. For example, when a node detects an emergency, such as a very low temperature, a moving enemy, etc., it needs to inform the whole network quickly. We regard these requirements as latency constraints. That is, the node has to discover the neighbors within a bounded latency. Therefore, in order to send out the information quickly, the node has to increase the duty cycle and turn on the radio more frequently. The application module passes the latency constraints to the energy module and the algorithmic module. Two main functions are implemented in the module (for node u i ):
(1)
To collect latency constraints at time t, such that the discovery latency should be bounded within L ^ i ( t ) ;
(2)
to compute an appropriate duty cycle according to the latency constraint.

4.4. Algorithmic Module

Once the duty cycle is adjusted by the energy module or the application module, the node has to invoke the algorithmic module to compute the discovery schedule for the coming time slots. The interface involves duty cycle and latency constraints as inputs, and outputs the discovery schedule. Notice that Spear is designed for the practical networks and the nodes could adjust the duty cycle locally. Therefore, the implemented algorithms should be applicable for asymmetric duty cycles. We summarize the state-of-the-art algorithms by considering the relationship between duty cycles and discovery latency in Table 2.

4.5. Communication Module

The node carries out the operations according to the generated schedule by the algorithmic module. The target of the communication module is to discover the neighbors when collisions exist among multiple nodes. We summarize the two main functions that are implemented:
(1)
Discover the neighbors and record the neighbors’ information, such as the identifier, the start time, and the duty cycle;
(2)
compute the corresponding discovery latency of the neighbors.
When we deploy existing algorithms for multiple nodes, communication collisions often occur and many nodes cannot discover their neighbors. In Section 6, we devise two new methods to reduce the collisions, and the algorithms modified by the methods can achieve good performances.

4.6. Measurements

In this paper, we utilize three metrics to evaluate the algorithms. Considering each node u i ,
(1)
Lifetime L f i reveals how long the node can survive;
(2)
Discovery latency L ( i , N i ) is the number of time slots ( t 0 ) to discover all neighbors;
(3)
Discovery rate is the percentage of discovered neighbors in N i for a bounded latency.
Lifetime and discovery latency are commonly adopted in the existing works. Due to communication collisions, some nodes may not be able to find all neighbors, and so we introduce discovery rate for evaluation.

5. Methods of Adjusting Duty Cycle

Neighbor discovery is affected by nodes’ duty cycles. Existing works have designed efficient discovery schedules for fixed duty cycles, but few of them study how to adjust the duty cycle during a node’s lifetime. In this section, we present several methods to adjust the duty cycle according to the remaining energy and the latency constraints.

5.1. Energy Management Methods

As shown in Equation (4), node u i ’s lifetime is L f i = P m a x p n · θ if it sticks to duty cycle θ all the time. To extend the lifetime, it could reduce the duty cycle when the remaining energy is depleting. We propose two methods to adjust the duty cycle.
Piece-wise Reducing (PWR) Method: Generate m different energy levels as P m a x = P ^ 1 > P ^ 2 > P ^ m > 0 and m corresponding duty cycle levels as θ ^ 1 > θ ^ 2 > > θ ^ m in advance. When the remaining energy drops down to P ^ j , the node adjusts the duty cycle to θ ^ j . For simplicity, denote P ^ m + 1 = 0 and node u i selects duty cycle at time t as:
θ i ( t ) = θ ^ j , i f P i ( t ) ( P ^ j + 1 , P ^ j ] .
The lifetime of node u i is computed as:
L f i = j = 1 m P ^ j P ^ j + 1 p n · θ ^ j .
The PWR method can extend the node’s lifetime as compared to Equation (4), but it has to generate different levels of energy and duty cycles beforehand. We propose another method which is much easier to implement.
Periodical Reducing (PDR) Method: Node u i selects an initial duty cycle θ ^ 0 when it starts (with energy P m a x ). The node adjusts the duty cycle every T ^ time slots according to the remaining energy, where T ^ is a fixed constant. Supposing that the remaining energy at time t is P i ( t ) , the duty cycle is reduced as:
P i ( t ) θ i ( t ) = P m a x θ ^ 0 .
When the remaining energy is very low ( P i ( t ) P m i n where P m i n is a small constant), the node has to fix the duty cycle as θ ^ m i n = P m i n P m a x · θ ^ 0 . In order to compute the lifetime, it is necessary to compute the number of times that the node adjusts the duty cycle. Suppose after m periods of length T ^ , the remaining energy is no larger than P m i n , and the following equations are derived:
P ^ 0 = P m a x , θ ^ 0 = θ ^ 0 , P ^ 1 = P ^ 0 T ^ · θ ^ 0 · p n , θ ^ 1 = P ^ 1 P ^ 0 · θ ^ 0 , P ^ i = P ^ i 1 T ^ · θ ^ i 1 p ^ n , θ ^ i = P ^ i P ^ 0 · θ ^ 0 , P ^ m = P ^ m 1 T ^ · θ ^ m 1 · p n , θ ^ m = P m i n P ^ 0 · θ ^ 0 .
Combine these to give:
P ^ m = P ^ 0 [ 1 m 1 T ^ θ ^ 0 p n P ^ 0 + m 2 ( T ^ θ ^ 0 p n P ^ 0 ) 2 + + ( 1 ) m m m ( T ^ θ ^ 0 p n P ^ 0 ) m ] . = P ^ 0 ( 1 T ^ θ ^ 0 p n P ^ 0 ) m .
When P ^ m P m i n , the number of periods is m log ( P m i n / P m a x ) log ( 1 T ^ θ ^ 0 p n / P m a x ) and the lifetime of node u i is:
L f i = m · T + P ^ m P m a x P m i n θ ^ 0 p n .
Both PWR and PDR methods could prolong the node’s lifetime and we evaluate them in Section 7.

5.2. Latency Constraints

When the applications have latency constraints, such as fast streaming or real time detection applications, the node has to increase the duty cycle in order to discover the neighbors in bounded time. However, discovery latency between two neighbors is determined by the chosen algorithm and the duty cycles of both nodes.
As listed in Table 2, different algorithms lead to different discovery latencies. Take Disco [16] as an example. Given latency constraint L ^ i ( t ) at time t for node u i , it can check the recorded information of the discovered neighbors. Suppose one neighbor u j ’s duty cycle is θ ^ j , node u i has to increase its duty cycle as: θ ^ i 4 θ ^ j L ^ i ( t ) . In order to discover all neighbors, node u i has to check the smallest duty cycle (denote it as θ ^ m ) and it has to increase the duty cycle as θ ^ i 4 θ ^ m L ^ i ( t ) . After satisfying the application requirements, node u i can then adjust the duty cycle by the remaining energy as described above. In order to reduce communication collisions, the duty cycle has to be larger.
Combining remaining energy and latency constraints, the duty cycle should be adjusted by both factors; that is, to design a function of adjusting the duty cycle as:
θ i ( t ) = f ( P i ( t ) , L ^ i ( t ) ) .
When there is no latency constraint, L ^ i ( t ) = + , PWR and PDR are two representative examples. In Spear, researchers could implement the interface for evaluating more functions which can timely adjust the duty cycle.

6. Methods of Reducing Collisions

In real communication scenarios, two neighboring nodes can communicate successfully only when they are not interfered by other nodes. If existing deterministic algorithms are extended to handle multiple nodes directly, communication collisions happen and most nodes cannot find the neighbors. In this section, we analyze the discovery probability and propose two methods to reduce the collisions.

6.1. Discovery Probability under Collision

Considering two neighboring nodes u i , u j , denote the sets of each node’s neighbors as N i , N j respectively ( u i N j , u j N i ). Suppose that nodes u i , u j turn on their radio at time t, and denote the sets of neighbors that also turn on the radio as N i ˜ N i , N j ˜ N j . Since u j N i ˜ , u i N j ˜ , u i and u j can discover each other only when:
| N i ˜ | = 1 , | N j ˜ | = 1 .
Denote the average duty cycle for node u k as θ k . We consider the scenario where node u k turns on the radio with probability θ k independently in each time slot (expected situation). Then, on the basis of the event that nodes u i , u j turn on the radio at time t, the probability for successful discovery is derived as:
P r ( | N i ˜ | = 1 , | N j ˜ | = 1 ) min { P r ( | N i ˜ | = 1 ) , P r ( | N j ˜ | = 1 ) } = min { u k N i , k j ( 1 θ k ) , u k N j , k i ( 1 θ k ) } .
If θ k = 1 % and max { | N i | , | N j | } 69 (or θ k = 10 % and max { | N i | , | N j | } 7 ), the probability of successful discovery is less than 1 / 2 . Therefore, the existing algorithms cannot be applied to multiple nodes directly. We adopt the idea of the probabilistic protocols to reduce the communication collisions; two efficient methods are proposed.

6.2. Pure Probability Reducing (PPR) Method

The PPR Method works as follows. For any deterministic neighbor discovery algorithm f, denote the generated discovery schedule for node u i as S i = { s i ( t ) | t t i s } . For any time t that s i ( t ) = 1 , node u i turns on the radio with probability p 1 (a constant value in ( 0 , 1 ) ); that is, to generate a modified sequence S ˜ i = { s ˜ i ( t ) | t t i s } as:
I f s i ( t ) = 0 , s ˜ i ( t ) = 0 , I f s i ( t ) = 1 , s ˜ i ( t ) = 1 w i t h p r o b a b i l i t y p 1 .
If two neighbors u i , u j turn on the radio at time t, the expected probabilities of | N ˜ i | = 1 and | N ˜ j | = 1 are:
P r ( | N i ˜ | = 1 ) = u k N i , k j ( 1 p 1 · θ k ) , P r ( | N j ˜ | = 1 ) = u k N j , k i ( 1 p 1 · θ k ) .
If p 1 = 0.5 , θ k = 1 % , the probability of successful discovery is less than 1 / 2 when max { | N i | , | N j | } 139 . By choosing different values of p 1 , the performance could be different. We evaluate the sensitivity of p 1 in Section 7.

6.3. Decreased Probability Reducing (DPR) Method

The P P R method can increase the discovery probability, but it is independent of the schedule itself. We present the D P R method, which tries to coordinate any discovery schedule with the method. For the generated discovery schedule S i by any algorithm f, node u i should turn on the radio at time t 1 when s i ( t 1 ) = 1 . Denote the next time slot that u i turns on the radio by schedule S i as t 2 , i.e., s i ( t 2 ) = 1 , t 2 > t 1 . Modify the schedule of time slots [ t 1 , t 2 ) as:
  • Change s i ( t ) = 0 for t [ t 1 , t 2 ) ;
  • increase t * from t 1 to t 2 1 , if s i ( t ) = 0 for all t [ t 1 , t * ) , set s i ( t * ) = 1 with probability p 2 · t 2 t * t 2 t 1 + 1 where p 2 is a constant value in ( 0 , 1 ) .
Node u i turns on the radio in the initial slot with probability p 2 · ( 1 1 t 2 t 1 + 1 ) , and it could reduce the probability of collisions. If u i does not turn on the radio at time t 1 , it decreases the probability and attempts to turn on the radio in the next slot, t 1 + 1 . This process does not finish until u i turns on the radio in any slot within [ t 1 , t 2 ) , or it keeps the radio off for all of them.
Overall, both PPR and DPR are designed to support deterministic neighbor discovery protocols. Unlike probabilistic-based protocols, the neighbor discovery schedules computed by both PPR and DPR are based on the schedules generated by deterministic protocols. Therefore, a deterministic protocol running with PPR or DPR can achieve a stable discovery latency (confirmed in Section 7.1).

7. Evaluations

We have implemented Spear in C++, which includes the interfaces between different modules, important functions for computing in each module, and measurements to evaluate the performances. We implemented four state-of-the-art algorithms including Hedis [15], Hello [22], Searchlight [13] and U-Connect [18] (we also implemented Quorum [24], but the result is only presented in Figure 9 since it is inapplicable when the users’ duty cycle are different), and run these algorithms in a cluster with nine servers, each equipped with an Intel Xeon 2.6 GHz CPU (central processing unit) with 24 hyper-threading cores, 64 GB memory and 1T SSD (solid-state disk). The basic settings in the simulations are: d c = 50 m, P m a x = 100,000 , p n = 1 and t 0 = 20 ms. We choose three scenarios for comparison:
(1)
Discovery in a star network. The central node u c has | N c | neighbors in the star network. A neighboring node selects the duty cycle randomly within [ 0.1 , 0.5 ] , while u c ’s duty cycle ( θ c ) is set to different figures.
(2)
Discovery among N = 1000 nodes. The area is set as a rectangle of size 1000 × 1000 m 2 , and the node’s coordinates are generated randomly. Each node selects the duty cycle randomly within [ 0.1 , 0.5 ] .
(3)
Discovery between two neighbors. Spear enables the evaluation for existing protocols and generates the best schedule for fixed duty cycles.
We evaluated average discovery latency, lifetime, or percentage of discovery under different settings, and we describe the detailed parameters for each figure. The start time of any node is generated randomly within [ 0 , 1000 ] and the results are based on 1000 separate runs. The detailed parameters are described in Table 3.

7.1. Increasing Discovery Rate

In the network with multiple nodes, communication collisions could affect the discovery results. We evaluate the performance of the proposed collision reducing methods (PPR and DPR in Section 6), and compare them with the bare (not running in Spear) algorithms.
Number of neighbors. In a star network, the central node u c has | N c | neighbors and it selects duty cycle θ c = 0.3 . We select Hedis as the example and set p 1 = p 2 = 0.5 for PPR and DPR. Figure 4 shows the discovery rate (y-axis) of u c within 100,000 time slots when | N c | (x-axis) increases from 1 to 100. From the figure, (bare) Hedis cannot discover all neighbors when | N c | 7 , and it cannot find even one neighbor when | N c | 18 . Modified by PPR and DPR, all neighbors can be discovered when | N c | 43 and | N c | 33 , respectively. We also evaluate the performance of PPR and DPR at p 1 = 0.4 and p 2 = 0.2 , and they outperform the methods when p 1 = p 2 = 0.5 .
Sensitivity of p 1 . In a star network, the central node u c has | N c | = 20 neighbors (we set | N c | = 20 since the bare algorithms fail to find any neighbor) and we evaluate PPR’s performance under different values of p 1 . As shown in Figure 5a, θ c is set to 0.3 and the average discovery latency (y-axis) of different algorithms is changed by different values of p 1 (x-axis). When p 1 [ 0.3 , 0.4 ] , the performance is better. In Figure 5b, we select U-Connect as the example and set θ c as 0.1 , 0.2 , 0.3 , 0.4 , 0.5 , respectively. The average discovery latency is changed by different values of p 1 (x-axis), and the performance is also better when p 1 approaches [ 0.3 , 0.4 ] . Overall, our discovery latency is stable when p 1 0.6 .
Sensitivity of p 2 . In a star network, the central node u c has | N c | = 20 neighbors and the DPR’s performance is evaluated under different values of p 2 . As shown in Figure 6a, θ c is set to 0.3 and the average discovery latency (y-axis) of different algorithms are changed by different values of p 2 (x-axis). When p 2 is close to 0.2 , the performance is better. In Figure 6b, we select U-Connect for different θ c ( 0.1 , 0.2 , 0.3 , 0.4 , 0.5 , respectively). The average discovery latency (y-axis) is changed by different values of p 2 (x-axis), and the performance is better when p 2 0.2 . Overall, our discovery latency is stable when p 2 0.7 .
1000 nodes. In a randomly generated network with N = 1000 nodes, we evaluate the performances of different algorithms. As shown in Figure 1, modified by PPR ( p 1 = 0.4 ) and DPR ( p 2 = 0.2 ), the discovery rates (y-axis) are much larger than those of the bare algorithms. Especially for Hello, the discovery rate is only 33.0 % , while PPR and DPR could greatly increase the rate to 99.2 % , 95.5 % , respectively.

7.2. Prolonging Lifetime

The two methods (PWR and PDR) that can extend a node’s lifetime are also implemented in Spear. We evaluate the performance in a star network where the central node u c has | N c | = 20 neighbors. In PWR, m = 30 levels of remaining energy and corresponding duty cycles are generated in advance. In PDR, θ ^ 0 is set to 0.3 , P m i n = 200 , and the node adjusts the duty cycle every T ^ = 100,000 time slots.
Lifetime. The lifetime of u c is illustrated in Figure 7 for different algorithms, both PWR and PDR prolong the lifetime significantly. For example, the lifetimes of PWD and PDR are 5.15 and 6.47 times longer than bare Hedis, respectively.
Percentage of Remaining Energy. We show the percentage of remaining energy (y-axis) after 2 T ^ and 3 T ^ time slots in Figure 8. After 2 T ^ time slots, PWR and PDR are just a little better than the bare Hedis protocol (see Figure 8a), while the difference becomes much larger after 3 T ^ time slots (see Figure 8b). By incorporating PWR and PDR, Spear can save power and extend the lifetime significantly.

7.3. Improving Discovery for Two Neighbors

Spear enables the evaluation of neighbor discovery protocols supporting symmetric and asymmetric duty cycles, which facilitates the generation of the optimal schedule.
Symmetric duty cycle: suppose two neighbors select the same duty cycle θ that increases from 0.1 to 0.3 , we evaluate the average discovery latency in Figure 9a. As shown in the figure, the discovery latency (y-axis) of all algorithms decreases as θ (x-axis) increases, and they have similar performances. This is because the discovery latency is proportional to 1 θ 2 and the trends of these curves match the analysis. Finally, the optimal schedule can be generated automatically; for example, U-Connect is selected when θ [ 0.1 , 0.13 ] , while Hello is selected when θ [ 0.13 , 0.16 ] .
Asymmetric duty cycle: suppose one node’s duty cycle is fixed as θ 1 = 0.2 and the other node’s duty cycle θ 2 increases from 0.1 to 0.3 . Since Quorum is inapplicable for asymmetric duty cycles, we compare the other four algorithms. As shown in Figure 9b, the average discovery latency (y-axis) decreases as θ 2 (x-axis) increases, and the decreasing trends are much more gentle than in Figure 9a. This is because the discovery latency is proportional to 1 θ 2 when θ 1 is a constant.

7.4. Effectiveness of Spear Components

In Spear, the communication module evidently increases the discovery rate as compared to the bare protocols, as demonstrated by the evaluations in Section 7.1. The energy module significantly extends a node’s lifetime, as described in Section 7.2. Though we did not evaluate the application module separately, the evaluations targeting at discovery latency and discovery rate imply that Spear could adjust the related parameters (such as duty cycle, p 1 of PPR, and p 2 of DPR) to reduce the discovery latency. The algorithmic module computes an optimal schedule automatically as shown in Section 7.3.

8. Conclusions

We present Spear, the first practical framework for general neighbor discovery protocols in WSNs. Extensive evaluations have shown that Spear can greatly increase the discovery rate and extend the lifetime of sensor nodes. Spear has the potential to be applied to tackling a broad range of problems in WSNs.
In the future, we would like to explore the connection between some standard MAC (media access control) protocols for reducing collisions and neighbor discovery protocols, such as the Carrier Sense multiple Access/Collision Avoidance (CSMA/CA) protocol. We would also compare the performance of the proposed methods with the standards and bring these intuitive ideas to design efficient neighbor discovery protocols. Furthermore, we would evaluate the proposed framework with some well known IoT operation systems such as RiOT and Contiki [7], and conduct experiments on a real deployed WSN.

Author Contributions

Z.G. proposed the framework and the methods, and wrote the paper; Y.W. performed the evaluations of various protocols; W.S. improved the system model; Z.T. designed the framework and its modules; K.R. contributed evaluations tools; F.C.M.L. analyzed the latest protocols and polished the paper.

Funding

This work is supported in part by the National Key R&D Program of China 2018YEB1004003, China grants U1636215.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Atzori, L.; Lera, A.; Morabito, G. The Internet of Things: A Survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
  2. Tan, Q.; Gao, Y.; Shi, J.; Wang, X.; Fang, B.; Tian, Z. Towards a Comprehensive Insight into the Eclipse Attacks of Tor Hidden Services. IEEE Internet Things J. 2018. [Google Scholar] [CrossRef]
  3. Tian, Z.; Cui, Y.; An, L.; Su, S.; Yin, X.; Yin, L.; Cui, X. A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus. IEEE Access 2018, 6, 35355–35364. [Google Scholar] [CrossRef]
  4. Tian, Z.; Shi, W.; Wang, Y.; Zhu, C.; Du, X.; Su, S.; Sun, Y.; Guizani, N. Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment. IEEE Trans. Ind. Inform. 2019. [Google Scholar] [CrossRef]
  5. Tian, Z.; Li, M.; Qiu, M.; Sun, Y.; Su, S. Block-DES: A Secure Digital Evidence System using Blockchain. Inf. Sci. 2019, 491, 151–165. [Google Scholar] [CrossRef]
  6. Zikria, Y.B.; Yu, H.; Afzal, M.K.; Rehmani, M.H.; Hahm, O. Internet of Things (IoT): Operating System, Applications and Protocols Design, and Validation Techniques. Futuer Gener. Comput. Syst. 2018, 88, 699–706. [Google Scholar] [CrossRef]
  7. Zikria, Y.B.; Afzal, M.K.; Ishmanov, F.; Kim, S.W.; Yu, H. A Survey on Routing Protocols Supported by the Contiki Internet of Things Operating System. Futuer Gener. Comput. Syst. 2018, 82, 200–219. [Google Scholar] [CrossRef]
  8. Gu, Z.; Hua, Q.-S.; Wang, Y.; Lau, F.C.M. Reducing Information Gathering Latency through Mobile Aerial Sensor Network. In Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14–19 April 2013. [Google Scholar]
  9. Miao, G.; Zander, J.; Sung, K.W.; Slimane, B. Fundamentals of Mobile Data Networks; Combridge University Press: Combridge, UK, 2016. [Google Scholar]
  10. Xu, X.; Luo, J.; Zhang, Q. Delay Tolerance Event Collections in Sensor Networks with Mobile Sink. In Proceedings of the 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010. [Google Scholar]
  11. Wang, Y.; Wang, Y.; Qi, X.; Xu, L.; Chen, J.; Wang, G. L3SN: A Level-Based, Large-Scale, Longevous Sensor Network System for Agriculture Information Monitoring. Wirel. Sens. Netw. 2010, 2, 655–660. [Google Scholar] [CrossRef]
  12. Margolies, R.; Grebla, G.; Chen, T.; Rubenstein, D.; Zussman, G. Panda: Neighbor Discovery on a Power Harvesting Budget. IEEE J. Sel. Areas Commun. 2016, 34, 3606–3619. [Google Scholar] [CrossRef]
  13. Bakht, M.; Trower, M.; Kravets, R.H. Searchlight: Won’t you be my neighbor? In Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Istanbul, Turkey, 22–26 August 2012. [Google Scholar]
  14. Bian, K.; Park, J.-M.; Chen, R. A Quorum-Based Framework for Establishing Control Channels in Dynamic Spectrum Access Networks. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, Beijing, China, 20–25 September 2009. [Google Scholar]
  15. Chen, L.; Fan, R.; Bian, K.; Chen, L.; Gerla, M.; Wang, T.; Li, X. On Heterogeneous Neighbor Discovery in Wireless Sensor Networks. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015. [Google Scholar]
  16. Dutta, P.; Culler, D. Practical Asynchronous Neighbor Discovery and Rendezvous for Mobile Sensing Applications. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, Raleigh, NC, USA, 5–7 November 2008; pp. 71–84. [Google Scholar]
  17. Jiang, J.-R.; Tseng, Y.-C.; Hsu, C.-S.; Lai, T.-H. Quorum-based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Networks. Mob. Netw. Appl. 2005, 10, 169–181. [Google Scholar] [CrossRef]
  18. Kandhalu, A.; Lakshmanan, K.; Rajkumar, R.R. U-Connect: A Lower Latency Energy-Efficient Asynchronous Neighbor Discovery Protocol. In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, Stockholm, Sweden, 12–16 April 2010. [Google Scholar]
  19. Lai, S.; Ravindran, B.; Cho, H. Heterogeneous Quorum-based Wake-up Scheduling in Wireless Sensor Networks. IEEE Trans. Comput. 2010, 59, 1562–1575. [Google Scholar] [CrossRef]
  20. McGlynn, M.J.; Borbash, S.A. Birthday Protocols for Low Energy Deployment and Flexible Neighbor Discovery in Ad Hoc Wireless Networks. In Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Long Beach, CA, USA, 4–5 October 2001. [Google Scholar]
  21. Qiu, Y.; Li, S.; Xu, X.; Li, Z. Talk More Listen Less: Energy-Efficient Neighbor Discovery in Wireless Sensor Networks. In Proceedings of the IEEE INFOCOM 2016–The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016. [Google Scholar]
  22. Sun, W.; Yang, Z.; Zhang, X.; Liu, Y. Hello: A Generic Flexible Protocol for Neighbor Discovery. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014. [Google Scholar]
  23. Tian, Z.; Su, S.; Shi, W.; Du, X.; Guizani, M.; Yu, X. A Data-driven Model for Future Internet Route Decision Modeling. Future Gener. Comput. Syst. 2019, 95, 212–220. [Google Scholar] [CrossRef]
  24. Tseng, Y.-C.; Hsu, C.-S.; Hsieh, T.-Y. Power-Saving Protocols for IEEE 802.11-based Multi-Hop Ad Hoc Networks. Comput. Netw. 2003, 43, 317–337. [Google Scholar] [CrossRef]
  25. Vasudevan, S.; Towsley, D.; Goeckel, D.; Khalili, R. Neighbor Discovery in Wireless Networks and the Coupon Collector’s Problem. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, Beijing, China, 20–25 September 2009. [Google Scholar]
  26. Wang, K.; Mao, X.; Liu, Y. BlindDate: A Neighbor Discovery Protocol. TPDS 2015, 26, 949–959. [Google Scholar] [CrossRef]
  27. Zeng, W.; Vasudevan, S.; Chen, X.; Wang, B.; Russel, A.; Wei, W. Neighbor Discovery in Wireless Networks with Multipacket Reception. In Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Paris, France, 17–19 May 2011. [Google Scholar]
  28. Sun, G.; Wu, F.; Chen, G. Neighbor Discovery in Low Duty Cycle Wireless Sensor Networks with Mutipacket Reception. In Proceedings of the IEEE International Conference on Parallel and Distributed Systems, Singapore, 17–19 December 2012. [Google Scholar]
  29. Zanella, A.; Bazzi, A.; Pasolini, G.; Masini, B.M. On the Impact of Routing Strategies on the Interference of Ad hoc Wireless Networks. IEEE Trans. Commun. 2013, 61, 4322–4333. [Google Scholar] [CrossRef]
  30. Chen, P.; Chen, Y.; Gao, S.; Niu, Q.; Gu, J. Efficient group-based discovery for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2017. [Google Scholar] [CrossRef]
  31. Montero, S.; Gozalvez, J.; Sepulcre, M. Neighbor Discovery for Industrial Wireless Sensor Networks with Mobile Nodes. Comput. Commun. 2017, 111, 41–55. [Google Scholar] [CrossRef]
  32. Nathanson, M.B. Elementary Methods in Number Theory; Springer: Berlin/Heidelberg, Germany, 2000; Volume 195. [Google Scholar]
  33. Zheng, R.; Hou, J.C.; Sha, L. Asynchronous Wakeup for Ad Hoc Networks. In Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing, Annapolis, MD, USA, 1–3 June 2003. [Google Scholar]
  34. Halldorsson, M.M.; Wang, Y.; Yu, D. Leveraging Multiple Channels in Ad Hoc Networks. In Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, San Sebastián, Spain, 21–23 July 2015. [Google Scholar]
  35. Chen, L.; Yan, B.; Zhang, J. Neighbor Discovery Algorithm in Mobile Low Duty Cycle WSNs. J. Softw. 2014, 25, 1352–1368. [Google Scholar]
Figure 1. Spear greatly improves discovery rates for four notable protocols. Discovery rate for each protocol is defined as the number of discovered neighbors divided by all actual neighbors. Bare protocols mean they do not run in Spear.
Figure 1. Spear greatly improves discovery rates for four notable protocols. Discovery rate for each protocol is defined as the number of discovered neighbors divided by all actual neighbors. Bare protocols mean they do not run in Spear.
Sensors 19 01887 g001
Figure 2. The finite state machine (FSM) of a sensor node’s states.
Figure 2. The finite state machine (FSM) of a sensor node’s states.
Sensors 19 01887 g002
Figure 3. Overview of Spear.
Figure 3. Overview of Spear.
Sensors 19 01887 g003
Figure 4. Spear increases discovery rate by incorporating PPR and DPR.
Figure 4. Spear increases discovery rate by incorporating PPR and DPR.
Sensors 19 01887 g004
Figure 5. Sensitivity of p 1 in the PPR method. (a) θ c = 0.3; (b) U-Connect-PPR.
Figure 5. Sensitivity of p 1 in the PPR method. (a) θ c = 0.3; (b) U-Connect-PPR.
Sensors 19 01887 g005
Figure 6. Sensitivity of p 2 in the DPR method. (a) θ c = 0.3; (b) U-Connect-DPR.
Figure 6. Sensitivity of p 2 in the DPR method. (a) θ c = 0.3; (b) U-Connect-DPR.
Sensors 19 01887 g006
Figure 7. Spear prolongs the lifetime with PWR and PDR.
Figure 7. Spear prolongs the lifetime with PWR and PDR.
Sensors 19 01887 g007
Figure 8. Spear saves more energy by incorporating PWR and PDR compared to bare algorithms. (a) After 2 T ^ ; (b) After 3 T ^ .
Figure 8. Spear saves more energy by incorporating PWR and PDR compared to bare algorithms. (a) After 2 T ^ ; (b) After 3 T ^ .
Sensors 19 01887 g008
Figure 9. Spear enables the evaluation of the neighbor discovery algorithms for symmetric and asymmetric duty cycles and generates the optimal schedule automatically. (a) Symmetric duty cycle; (b) asymmetric duty cycle.
Figure 9. Spear enables the evaluation of the neighbor discovery algorithms for symmetric and asymmetric duty cycles and generates the optimal schedule automatically. (a) Symmetric duty cycle; (b) asymmetric duty cycle.
Sensors 19 01887 g009
Table 1. Notations for Neighbor Discovery.
Table 1. Notations for Neighbor Discovery.
NotationDescription
u i Sensor node u i
I i Identifier of node u i
P m a x The maximum energy of each sensor
P i ( t ) The remaining energy of u i at time t
t 0 The length of each time slot
p n The consumed energy to turn on the radio in each slot
d c Communication range of each sensor
t i s Start time of node u i
S i Neighbor discovery schedule of node u i
s i ( t ) The schedule of node u i at time t
L ( i , j ) Discovery latency between u i , u j
N i The set of neighbors of node u i
L ( i , N i ) The latency for u i to discover all neighbors
θ i ( T 1 , T 2 ) Node u i ’s duty cycle between time [ T 1 , T 2 ]
t i e The time node u i runs out of energy
L f i Lifetime of node u i
Table 2. Algorithms comparison for two neighbors.
Table 2. Algorithms comparison for two neighbors.
AlgorithmsDC 1DC 2LatencyAsymmetric?
Quorum [24] θ θ 4 θ 2 No
LL-Optimal [33] θ θ 1 θ 2 No
Disco [16] θ 1 θ 2 4 θ 1 θ 2 Yes
U-Connect [18] θ 1 θ 2 9 4 θ 1 θ 2 Yes
Searchlight [13] θ 1 θ 2 2 θ 1 θ 2 Yes
C-Torus [35] θ 1 θ 2 9 4 θ 1 θ 2 Yes
BlindDate [26] θ 1 θ 2 9 5 θ 1 θ 2 Yes
Hedis [15] θ 1 θ 2 4 θ 1 θ 2 Yes
Todis [15] θ 1 θ 2 9 θ 1 θ 2 Yes
Hello [22] θ 1 θ 2 ( c 1 + 1 ) ( c 2 + 1 ) c 1 c 2 θ 1 θ 2 Yes
Remarks: (1) ‘DC’ is short for duty cycle; we use θ for symmetric duty cycle and θ 1 , θ 2 for asymmetric duty cycle; (2) Hello is a little different from other algorithms, where there are two parameters to choose; (3) some results of discovery latency are modified (or simplified) on the basis of symmetric analyses.
Table 3. Parameters of the evaluations.
Table 3. Parameters of the evaluations.
FiguresParameters
All figures d c = 50 m P m a x = 100,000 p n = 1 t 0 = 20 ms
Figure 4 | N c | [ 1 , 100 ] θ c = 0.3 p 1 = 0.5 p 2 = 0.5
Figure 5 | N c | = 20 θ c = 0.3 p 1 [ 0.1 , 0.9 ]
Figure 6 | N c | = 20 θ c = 0.3 p 2 [ 0.1 , 0.9 ]
Figure 7 | N c | = 20 θ ^ 0 = 0.3 T ^ = 100,000
Figure 8 | N c | = 20 θ ^ 0 = 0.3 T ^ = 100,000
Figure 9 N = 2 θ 1 [ 0.1 , 0.3 ] θ 2 [ 0.1 , 0.3 ]

Share and Cite

MDPI and ACS Style

Gu, Z.; Wang, Y.; Shi, W.; Tian, Z.; Ren, K.; Lau, F.C.M. A Practical Neighbor Discovery Framework for Wireless Sensor Networks. Sensors 2019, 19, 1887. https://doi.org/10.3390/s19081887

AMA Style

Gu Z, Wang Y, Shi W, Tian Z, Ren K, Lau FCM. A Practical Neighbor Discovery Framework for Wireless Sensor Networks. Sensors. 2019; 19(8):1887. https://doi.org/10.3390/s19081887

Chicago/Turabian Style

Gu, Zhaoquan, Yuexuan Wang, Wei Shi, Zhihong Tian, Kui Ren, and Francis C.M. Lau. 2019. "A Practical Neighbor Discovery Framework for Wireless Sensor Networks" Sensors 19, no. 8: 1887. https://doi.org/10.3390/s19081887

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop