Reliable Route Selection for Wireless Sensor Networks with Connection Failure Uncertainties
Abstract
:1. Introduction
- The reliable route selection problem for WSNs with connection failure uncertainties is formulated by querying top-k RSTs from an uncertain graph, named R-TopK Query. RST reliability is defined based on the possible world model.
- Two tree-filtering algorithms for R-TopK Query processing are proposed: the k minimum spanning trees filtering algorithm and the depth-first search based tree-filtering algorithm, respectively. They are based on the traditional MST algorithms for deterministic graphs with new filtering and pruning techniques.
- An innovative edge-filtering R-TopK Query algorithm is proposed in which edge combinations that act as upper bounds for RST reliabilities are utilized to prune the search space. In order to improve pruning capabilities, several optimization strategies are introduced as well.
- Extensive experiments are conducted based on various datasets to show the effectiveness and efficiency of the proposed algorithms.
2. Related Works
2.1. WSN Route Selection
2.2. Possible World Model
2.3. Minimum Spanning Trees
3. Preliminaries and Problem Definition
4. The Tree-Filtering Algorithms
4.1. The KMST Tree-Filtering Algorithm
- Rule 1: If , call function GENK to generate the next spanning tree in weight ascending order and add it to Q.
- Rule 2: If , call function GENK to generate the next spanning tree in weight ascending order. If the tree weight is not higher than , then calculate its RST probability and try to insert it into Q.
- Rule 3: The procedure stops when the weight of the newly generated spanning tree is higher than .
Algorithm 1: The KMST tree-filtering algorithm, TF_KMST |
Input: An uncertain graph G, an integer k, a weight threshold . |
Output: top-k RSTs. |
1: 2: whiledo 3: 4: 5: if then 6: 7: else if then 8: ; 9: end if 10: end while 11: return |
4.2. The DFS Based Tree-Filtering Algorithm
- Rule 1: If , depth-first search starting from via stops.
- Rule 2: If and the size of Q is K, depth-first search starting from via stops.
Algorithm 2: The DFS based tree-filtering algorithm, TF_DFS |
Input: An uncertain graph G, an integer k, a weight threshold . |
Output: top-k RSTs. |
1: 2: while do 3: 4: if then 5: 6: else if ==k and T is not a spanning tree and then 7: 8: else if and T is a spanning tree then 9: 10: else if and ==k then 11: ; 12: end if 13: end while 14: return |
5. The Edge-Filtering Algorithms
5.1. Edge Combinations and Edge Filtering
- ;
- For , if , then ; otherwise, ;
- is empty when .
- Step 1. Initialization: to are set to ‘1s’, and to are set to ‘0s’;
- Step 2. Repeatedly scan X from left to right. Find the first ‘10’ sequence at position i and exchange the two bits to ‘01’. Move all ‘1s’ in sub-vector to the leftmost end of X;
- Step 3. Enumeration stops when no ‘10’ exists.
5.2. Edge Filtering on the Fly
- Vector Rearrangement Rule: For and , if , then ;
- Edge Combination Grouping Rule: Suppose is a combination of group , denoted as . If there is only one sub-vector of ‘1s’ in X to the left of the first ‘10’ sequence but not at the leftmost positions, then is the last combination of . generated based on , and it is the first combination of next group, .
- Rule 1: If
- Rule 2: If , can be safely filtered;
- Rule 3: If cannot form a tree, can be safely filtered;
- Rule 4: If , can be safely filtered.
Algorithm 3: The Edge Filtering Algorithm On The Fly, EF_OTF |
Input: An uncertain graph G, an integer k, a weight threshold . |
Output: top-k RSTs. |
1: 2: while do 3: 4: if then 5: if and then 6: 7: if then 8: 9: else if then 10: ; 11: end if 12: end if 13: 14: else 15: 16: end if 17: end while 18: return |
5.3. Multilayer Grouping Based Edge Filtering
- Definition: For a bit vector X, is the number of bit ‘c’ in sub vector , and is the index of the ‘c’ in X;
- Initialization: and ;
- Main procedure: Scan X from right to left repeatedly. Whenever a ‘1’ is encountered at position p, set and . Generate as one piece of combination code, where . If is equal to 1 or 0, the scanning process terminates; otherwise, the scanning continues;
- Output: The final code of is the concatenation of all generated encoding pieces.
- 1.
- If and , Next_G is ;
- 2.
- If , and , Next_G is .;
- 3.
- If , , and for all , Next_G is . If , then Next_G receives nothing;
- 4.
- If , Next_G is . If and for all , Next_G is . If , then Next_G is nil.
- Multilayer Grouping based Pruning Rule:If , can be safely filtered.
5.4. Optimization Strategies for Edge Filtering
5.4.1. Optimized Priority Queue Initialization
5.4.2. Bridge-Based Combination Space Reduction
- Bridge Rule: For all edges in , their corresponding bits in X are set to ‘1s’ during the combination enumerating procedure.
- Latent Bridge Rule: Given a latent bridge , in all edge combinations with bits of Se reset to ‘0s’, the bit of e is set to ‘1’.
5.4.3. Cycle Indexing
- A CCIndex_bv is a four-level tree with three indexing levels of combination mask codes and one data level of edge combinations.
- The root of CCIndex_bv contains the mask codes from the rightmost ‘1’ of all cycles. Similarly, the nodes of the second and third levels contain the mask codes of second and third rightmost ‘1s’.
- The fourth level is the data level that stores all the cycle vectors.
- 1.
- For each indexing node, test all the mask codes against C. If the result of operation ‘&’ is a vector containing bit ‘1’, then the corresponding subtree needs to be tested.
- 2.
- If no subtree needs to be tested, then C is a tree, and the tree testing terminates.
- 3.
- For each data node, if needed, test all the cycle vectors against C. If one result is equal to the cycle, then C is not a tree, and the tree testing terminates.
6. Performance Evaluation
6.1. Setups and Data Sets
6.2. Performance Evaluation and Analysis
7. Conclusions and Future Works
Author Contributions
Funding
Conflicts of Interest
References
- Masudi, J.K.O.; Ramotsoela, T.D.; Hanckem, G.P. A wireless communication system for environmental monitoring in smart cities. In Proceedings of the AFRICON’17, Cape Town, South Africa, 18–20 September 2017; pp. 1541–1546. [Google Scholar]
- Hodge, V.J.; O’Keefe, S.; Weeks, M.; Moulds, A. Wireless sensor networks for condition monitoring in the railway industry: A survey. IEEE Trans. Intell. Transp. Syst. 2015, 16, 1088–1106. [Google Scholar] [CrossRef]
- Aponte-Luisetal, J. An efficient wireless sensor network for industrial monitoring and control. Sensors 2018, 18, 182. [Google Scholar] [CrossRef] [Green Version]
- Kandris, D.; Nakas, C.; Vomvas, D.; Koulouras, G. Applications of wireless sensor networks: An up-to-date survey. Appl. Syst. Innov. 2020, 3, 14. [Google Scholar] [CrossRef] [Green Version]
- Zhu, C.; Zheng, C.; Shu, L.; Han, G. A survey on coverage and connectivity issues in wireless sensor networks. J. Netw. Comput. Appl. 2012, 35, 619–632. [Google Scholar] [CrossRef]
- Seferagic, A.; Famaey, J.; de Poorter, E.; Hoebeke, J. Survey on wireless technology trade-offs for the industrial Internet of things. Sensors 2020, 20, 488. [Google Scholar] [CrossRef] [Green Version]
- Kulkarni, P.H.; Malathi, P.P. FuzzyACO: Fuzzy-based optimization approach for energy-aware cluster head selection in WSN. J. Internet Technol. 2019, 20, 1787–1800. [Google Scholar]
- Kulkarni, P.H.; Jesudason, P.M. Multipath data transmission in WSN using exponential cat swarm and fuzzy optimisation. IET Commun. 2019, 13, 1685–1695. [Google Scholar] [CrossRef]
- Movva, P.; Rao, P.T. Novel two-fold data aggregation and MAC scheduling to support energy efficient routing in wireless sensor network. IEEE Access 2019, 2019, 1260–1274. [Google Scholar] [CrossRef]
- Khabiri, M.; Ghaffari, A. Energy-aware clustering-based routing in wireless sensor networks using cuckoo optimization algorithm. Wirel. Pers. Commun. 2018, 98, 2473–2495. [Google Scholar] [CrossRef]
- Ghaffari, A. Congestion control mechanisms in wireless sensor networks: A survey. J. Netw. Comput. Appl. 2015, 52, 101–115. [Google Scholar] [CrossRef]
- Seyfollahi, A.; Ghaffari, A. Reliable data dissemination for the Internet of Things using Harris hawks optimization. Peer-to-Peer Netw. Appl. 2020, 13, 1886–1902. [Google Scholar] [CrossRef]
- Seyfollahi, A.; Ghaffari, A. A lightweight load balancing and route minimizing solution for routing protocol for low-power and lossy networks. Comput. Netw. 2020, 179, 107368. [Google Scholar] [CrossRef]
- Mottaghinia, Z.; Ghaffari, A. Fuzzy logic based distance and energy-aware routing protocol in delay-tolerant mobile sensor networks. Wirel. Pers. Commun. 2018, 100, 957–976. [Google Scholar] [CrossRef]
- Jazebi, S.J.; Ghaffari, A. RISA: Routing scheme for Internet of Things using shuffled frog leaping optimization algorithm. J. Ambient Intell. Humaniz. Comput. 2020, 11, 4273–4283. [Google Scholar] [CrossRef]
- Chauhan, V.; Soni, S. Mobile sink-based energy efficient cluster head selection strategy for wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 2020, 11, 4453–4466. [Google Scholar] [CrossRef]
- Jaiswal, K.; Anand, V. EOMR: An energy-efficient optimal multi-path routing protocol to Improve QoS in wireless sensor network for IoT applications. Wirel. Pers. Commun. 2020, 111, 2493–2515. [Google Scholar] [CrossRef]
- Smaragdakis, G.; Matta, I.; Bestavros, A. Sep: A stable election protocol for clustered heterogeneous wireless sensor networks. In Proceedings of the Second International Workshop on Sensor and Actor Network Protocols and Applications (SANPA 2004), Boston, MA, USA, 22 August 2004; pp. 1–11. [Google Scholar]
- Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the HICSS 2000, Maui, HI, USA, 4–7 January 2000. [Google Scholar]
- Santosh, P.; Deshpande, D.S. Energy efficient clustering protocol to enhance performance of heterogeneous wireless sensor network. J. Comput. Netw. Commun. 2018, 2018, 2078627:1–2078627:12. [Google Scholar]
- Rani, S.; Talwar, R.; Malhotra, J.; Ahmed, S.H.; Sarkar, M.; Song, H. A novel scheme for an energy efficient Internet of Things based on wireless sensor networks. Sensors 2015, 15, 28603–28626. [Google Scholar] [CrossRef] [Green Version]
- Rani, S.; Ahmed, S.H.; Rastogi, R. Dynamic clustering approach based on wireless sensor networks genetic algorithm for IoT applications. Wirel. Netw. 2020, 26, 2307–2316. [Google Scholar] [CrossRef]
- Rani, S.; Malhotra, J.; Talwar, R. Energy efficient chain based cooperative routing protocol for WSN. Appl. Soft Comput. 2015, 35, 386–397. [Google Scholar] [CrossRef]
- Srikar, M.; Benedito, J.B., Jr. Improving route selections in ZigBee wireless sensor networks. Sensors 2020, 20, 164. [Google Scholar]
- Kim, M.; Chung, S. Efficient route management method for mobile nodes in 6TiSCH network. Sensors 2021, 21, 3074. [Google Scholar] [CrossRef] [PubMed]
- Fuhr, N.; Rölleke, T. A probabilistic relational algebra for the integration of information retrieval and database systems. ACM Trans. Inf. Syst. 1997, 15, 32–66. [Google Scholar] [CrossRef]
- Harold, N.G. Two algorithms for generating weighted spanning trees in order. SIAM J. Comput. 1977, 6, 139–150. [Google Scholar]
- Katoh, N.; Ibaraki, T.; Mine, H. An algorithm for finding k minimum spanning trees. SIAM J. Comput. 1981, 10, 247–255. [Google Scholar] [CrossRef]
- Zhang, A.; Zou, Z.; Li, J.; Gao, H. Minimum spanning tree on uncertain graphs. In Proceedings of the Web Information Systems Engineering —WISE 2016, Shanghai, China, 8–10 November 2016; pp. 259–274. [Google Scholar]
- Nayagi, D.S.; Sivasankari, G.G.; Ravi, V.; Venugopal, K.R.; Sennan, S. REERS: Reliable and energy-efficient route selection algorithm for heterogeneous Internet of Things applications. Int. J. Commun. Syst. 2021, 34, e4900. [Google Scholar] [CrossRef]
- Dalvi, N.; Suciu, D. Efficient query evaluation on probabilistic databases. VLDB J. 2007, 16, 523–544. [Google Scholar] [CrossRef]
- Volk, P.B.; Rosenthal, F.; Hahmann, M.; Habich, D.; Lehner, W. Clustering uncertain data with possible world. In Proceedings of the ICDE’09, Shanghai, China, 29 March– 2 April 2009; pp. 1625–1632. [Google Scholar]
- Yuan, Y.; Wang, G.; Wang, H.; Chen, L. Efficient subgraph search over large uncertain graphs. Proc. VLDB Endow. 2011, 4, 876–886. [Google Scholar] [CrossRef]
- Zou, Z.; Li, J.; Gao, H.; Zhang, S. Mining frequent subgraph patterns from uncertain graph data. IEEE Trans. Knowl. Data Eng. 2010, 22, 1203–1218. [Google Scholar]
- Yuan, Y.; Chen, L.; Wang, G. Efficiently answering probability threshold-based shortest path queries over uncertain graphs. In Proceedings of the DASFAA 2010: The 15th International Conference on Database Systems for Advanced Applications, Tsukuba, Japan, 1–4 April 2010; pp. 155–170. [Google Scholar]
- Liu, L.; Jin, R.; Aggarwal, C.; Shen, Y. Reliable clustering on uncertain graphs. In Proceedings of the 2012 IEEE 12th International Conference on Data Mining, Brussels, Belgium, 10–13 December 2012; pp. 459–468. [Google Scholar]
- Nesetril, J.; Milková, E.; Nesetrilová, H. Otakar Boruvka on minimum spanning tree problem Translation of both the 1926 papers, comments, history. Discret. Math. 2001, 233, 3–36. [Google Scholar] [CrossRef] [Green Version]
- Prim, R.C. Shortest connection networks and some generalizations. Bell Labs Tech. J. 1957, 36, 1389–1401. [Google Scholar] [CrossRef]
- Minty, G.J. A simply algorithm for listing all the trees of a graph. IEEE Trans. Circuit Theory 1965, CT-12, 120. [Google Scholar] [CrossRef]
- Gabow, H.N. Finding all spanning trees of directed and undirected graphs. SIAM J. Comput. 1978, 7, 280–287. [Google Scholar] [CrossRef]
- Peng, J.; Li, S. Spanning tree problem of uncertain network. In Proceedings of the ICCDA 2011: International Conference on Computer Design and Applications, Xi’an, China, 27 May 2011. [Google Scholar]
- Dey, A.; Broumi, S.; Son, L.H.; Bakali, A.; Talea, M.; Smarandache, F. A new algorithm for finding minimum spanning trees with undirected neutrosophic graphs. Granul. Comput. 2009, 4, 63–69. [Google Scholar] [CrossRef] [Green Version]
- Gitik, R.; Bartal, O.; Joskowicz, L. Euclidean minimum spanning trees with independent and dependent geometric uncertainties. Comput. Geom. 2021, 96, 101744. [Google Scholar] [CrossRef]
- Bertsimas, D.J. The probabilistic minimum spanning tree problem. Networks 1990, 20, 245–275. [Google Scholar] [CrossRef]
- Gao, J.; Lu, M. Fuzzy quadratic minimum spanning tree problem. Appl. Math. Comput. 2005, 164, 773–788. [Google Scholar] [CrossRef]
- Janiak, A.; Kasperski, A. The minimum spanning tree problem with fuzzy costs. Fuzzy Optim. Decis. Mak. 2008, 7, 105–118. [Google Scholar] [CrossRef]
- Almeida, T.A.; Yamakami, A.; Takahashi, M.T. An evolutionary approach to solve minimum spanning tree problem with fuzzy parameters. In Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2005), Vienna, Austria, 28–30 November 2005; pp. 203–208. [Google Scholar]
- Asthana, S.; King, O.D.; Gibbons, F.D.; Roth, F.P. Predicting protein complex membership using probabilistic network reliability. Genome Res. 2004, 14, 1170–1175. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Jiang, R.; Tu, Z.; Chen, T.; Sun, F. Network motif identification in stochastic networks. Proc. Natl. Acad. Sci. USA 2006, 103, 9404–9409. [Google Scholar] [CrossRef] [Green Version]
- Ghosh, J.; Ngo, H.Q.; Yoon, S.; Qiao, C. On a routing problem within probabilistic graphs and its application to intermittently connected networks. In Proceedings of the 26th IEEE International Conference on Computer Communications INFOCOM 2007, Anchorage, AK, USA, 6–12 May 2007; pp. 1725–1727. [Google Scholar]
- Horowitz, E.; Sahni, S.; Mehta, D. Fundamentals of data structures in C++; Silicon Press: Summit, NJ, USA, 2007. [Google Scholar]
- Soliman, M.A.; Ilyas, I.F.; Chang, K. Top-k query processing in uncertain catabases. In Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering Workshop, Istanbul, Turkey, 17–20 April 2007; pp. 896–905. [Google Scholar]
- Hua, M.; Pei, J.; Zhang, W.; Lin, X. Efficiently answering probabilistic threshold Top-k queries on uncertain data. In Proceedings of the 24th IEEE International Conference on Data Engineering, Cancun, Mexico, 7–12 April 2008; pp. 1403–1405. [Google Scholar]
- Cheng, J.; Ke, J.; Ng, W. GraphGen: A Graph Synthetic Generator. Available online: http://www.cse.ust.hk/graphgen/ (accessed on 20 August 2019).
Group | X | C | P (C) | Description | ||
---|---|---|---|---|---|---|
111100 | 0 | Update Q | ||||
111010 | Update Q | |||||
110110 | Not tree | Next C | ||||
101110 | Not tree | Next C | ||||
011110 | Update Q | |||||
111001 | Not tree | Next Group | ||||
110101 | − | − | Pruned | |||
101101 | − | − | Pruned | |||
011101 | − | − | Pruned | |||
110011 | − | − | Next Group | |||
101011 | − | − | Pruned | |||
011011 | − | − | Pruned | |||
100111 | − | Stop | ||||
010111 | − | − | Pruned | |||
001111 | − | − | Pruned |
Group | X | 1st | 2nd | 3rd | 4th | P (C) | Description | ||
---|---|---|---|---|---|---|---|---|---|
111100 | 0 | 0.252 | 0.1512 | Update Q | |||||
111010 | 0.1252 | 0.2016 | 0.1008 | Update Q | |||||
110110 | 0.1008 | 0.144 | Not tree | Next C | |||||
101110 | 0.1008 | 0.126 | Not tree | Next C | |||||
011110 | 0.1008 | 0.112 | 0.112 | Update Q | |||||
111001 | 0.112 | 0.1008 | Not tree | Next_G | |||||
110101 | - | 0.072 | - | Pruned | |||||
101101 | - | 0.063 | - | Pruned | |||||
011101 | - | 0.056 | - | Pruned | |||||
110011 | - | 0.0576 | - | Pruned | |||||
101011 | - | 0,00504 | - | Pruned | |||||
011011 | - | 0.0448 | - | Pruned | |||||
100111 | - | 0.036 | - | Pruned | |||||
010111 | - | 0.0032 | - | Pruned | |||||
001111 | - | 0.0028 | - | Pruned |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lyu, J.; Ren, Y.; Abbas, Z.; Zhang, B. Reliable Route Selection for Wireless Sensor Networks with Connection Failure Uncertainties. Sensors 2021, 21, 7254. https://doi.org/10.3390/s21217254
Lyu J, Ren Y, Abbas Z, Zhang B. Reliable Route Selection for Wireless Sensor Networks with Connection Failure Uncertainties. Sensors. 2021; 21(21):7254. https://doi.org/10.3390/s21217254
Chicago/Turabian StyleLyu, Jianhua, Yiran Ren, Zeeshan Abbas, and Baili Zhang. 2021. "Reliable Route Selection for Wireless Sensor Networks with Connection Failure Uncertainties" Sensors 21, no. 21: 7254. https://doi.org/10.3390/s21217254
APA StyleLyu, J., Ren, Y., Abbas, Z., & Zhang, B. (2021). Reliable Route Selection for Wireless Sensor Networks with Connection Failure Uncertainties. Sensors, 21(21), 7254. https://doi.org/10.3390/s21217254