Next Article in Journal
Comparison of Machine Learning and Sentiment Analysis in Detection of Suspicious Online Reviewers on Different Type of Data
Next Article in Special Issue
Motion Capture Sensor-Based Emotion Recognition Using a Bi-Modular Sequential Neural Network
Previous Article in Journal
Stress Watch: The Use of Heart Rate and Heart Rate Variability to Detect Stress: A Pilot Study Using Smart Watch Wearables
Previous Article in Special Issue
Dynamic Adjustment of Weighted GCC-PHAT for Position Estimation in an Ultrasonic Local Positioning System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Two-Hop Energy Consumption Balanced Routing Algorithm for Solar Insecticidal Lamp Internet of Things

1
College of Engineering, Nanjing Agricultural University, Nanjing 210031, China
2
College of Artificial Intelligence, Nanjing Agricultural University, Nanjing 210031, China
3
College of Engineering, University of Lincoln, Lincoln LN6 7TS, UK
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(1), 154; https://doi.org/10.3390/s22010154
Submission received: 23 November 2021 / Revised: 21 December 2021 / Accepted: 23 December 2021 / Published: 27 December 2021
(This article belongs to the Special Issue Section “Sensor Networks”: 10th Anniversary)

Abstract

:
Due to the sparsity deployment of nodes, the full connection requirement, and the unpredictable electromagnetic interference on communication caused by high voltage pulse current of Solar Insecticidal Lamps Internet of Things (SIL-IoTs), a Two-Hop Energy Consumption Balanced routing algorithm (THECB) is proposed in this research work. THECB selects next-hop nodes according to 1-hop and 2-hop neighbors’ information. In addition, the greedy forwarding mechanism is expressed in the form of probability; that is, each neighbor node is given a weight between 0 and 1 according to the distance. THECB reduces the data forwarding traffic of nodes whose discharge numbers are relatively higher than those of other nodes so that the unpredictable electromagnetic interference on communication can be weakened. We compare the energy consumption, energy consumption balance, and data forwarding traffic over various discharge numbers, network densities, and transmission radius. The results indicate that THECB achieves better performance than Two-Phase Geographic Greedy Forwarding plus (TPGFPlus), which ignores the requirement of the node-disjoint path.

1. Introduction

Recently, to achieve accurate information perception, agricultural Internet of Things (IoT) devices have been widely used in various smart agriculture scenarios [1]. For instance, Solar Insecticidal Lamps Internet of Things (SIL-IoTs) is an innovative agricultural IoTs that extends IoTs technology towards the Solar Insecticidal Lamp (SIL), which kills pests through generating high voltage discharges (2150 V to 6000 V) and contributes to (1) pest outbreak area location, (2) pesticide dosage reduction, and (3) environmental conditions monitoring [2]. The main hardware components of SIL are shown in Figure 1.
At present, various SIL-IoTs products mainly adopt mobile cellular network (GSM) for data transmission, which leads to huge data traffic costs [3]. Besides, the large-scale deployment of SIL-IoTs nodes requires high communication quality and signal coverage of the network. However, it is uncertain that the remote area where SIL-IoTs is deployed is covered by a 4G or 5G network. Hence, an alternative approach for transmitting data must be adopted for SIL-IoTs. Notably, the internode distance is smaller than the communication range of ZigBee; thus, it is feasible for the SIL-IoTs to communicate with each other via applying ZigBee technology [2]. Therefore, the routing problem (an algorithm that defines how exactly to route a packet from the source node to the sink) of the SIL-IoTs can be transformed into the routing problem of traditional Wireless Sensor Networks (WSNs). Geographic routing is widely used in WSNs, where packets are forwarded locally and greedily to 1-hop neighbor closest to the sink [4]. Each sensor node forwards data only through its neighbors’ information in the distributed routing approach.
The same as WSNs nodes, SIL-IoTs nodes are powered by a battery with limited capacity. Even though the SIL-IoTs node is equipped with the solar panel, due to (1) the dependence on long-term exposure to the sunlight to collect energy, the solar panel would supplement the battery with very little energy in continuous cloudy days or rainy areas, and (2) keeping the lure lamp on to attract pests and releasing high voltage pulse currents to kill pests both cost much energy, which makes the battery consumed faster in SIL-IoTs than that in traditional WSNs, it is still needed to design a novel routing algorithm for SIL-IoTs.Besides, it is worth noting that high voltage discharges of the SIL have a great impact on data transmission [5,6]. Moreover, different discharge numbers of different SIL-IoTs nodes lead to inconsistent residual energy of nodes.
To the best of our knowledge, no study takes communication energy management and the unpredictable electromagnetic interference on the communication of SIL-IoTs into consideration, which has the following features:
  • The large-scale and sparse network.
  • Full connection requirement and fixed locations of nodes.
  • Unpredictable electromagnetic interference on communication caused by high voltage discharges.
Therefore, we present a novel Two-Hop Energy Consumption Balanced (THECB) routing algorithm to improve the energy consumption balance and reduce unpredictable electromagnetic interference on the communication of the SIL-IoTs. The main contributions of this article are shown in follows:
  • Because high voltage discharges of the SIL impact communication, a Two-Hop Energy Consumption Balanced (THECB) routing algorithm is proposed to reduce data forwarding traffic of the nodes whose discharge numbers are relatively higher than those of other nodes. Therefore the unpredictable electromagnetic interference in communication can be weakened.
  • Considering the energy consumption of the discharges in the SIL, reducing the data forwarding traffic of the nodes whose discharge numbers are relatively higher than those of other nodes can also improve the energy consumption balance since the energy consumed by communication of these nodes is reduced. Besides, although not using these nodes for data transmission may cause longer routing paths, the results indicate that THECB can still reduce the energy consumption and improve the energy consumption balance of communication among different nodes.
  • The greedy forwarding mechanism is expressed in the form of probability; that is, each neighbor node is given a weight between 0 and 1 according to the distance, and the weight represents the probability that the node is selected as the next-hop node. In this paper, the nearby region around the current forwarder is divided into four parts according to the distance, and different weights are set to the nodes in different parts.
The rest of this article is organized as follows. Section 2 reviews related work. The network model and energy model are introduced in Section 3. Section 4 describes the design of THECB. Section 5 presents the analysis of THECB. The simulation performance results are introduced and discussed in Section 6. Finally, Section 7 concludes this article.

2. Related Work

2.1. Data Transmission of SIL-IoTs

As shown in Table 1, only a few studies have investigated the data transmission of the SIL-IoTs. The study of Lam et al. [7], which contributed to establishing a real-time pests monitoring system, is the only research considering data transmission between nodes in the mesh network. Besides, Qiu et al. [8] sent the data to the node with the radar sensor in one hop through a star topology-based wireless network. However, neither studies consider the communication energy management and characteristics of SIL-IoTs.

2.2. Two-Hop Neighbors Information Based Routing Algorithms

In the past decade, various geographic routing approaches in WSNs have been presented. Most of them focus on geographic forwarding based on 1-hop neighbors’ information. However, it has been proved that the routing algorithm based on 2-hop neighbors’ information increases the success rate of guaranteed delivery and leads to high-quality paths compared with 1-hop case [4].

2.2.1. Related Works of Other Teams

Table 2 shows some classical routing algorithms of other teams utilizing the 2-hop neighbors’ information. TIE-GeR [9] and TN-CMAD [10] make routing decisions based on the distance from neighbors to the sink. The number of the neighbors of the current forwarder and its 1-hop neighbors is taken into account by T-GPSR [11] and EEPDBR [12] to select the next-hop nodes. Interestingly, in the algorithm proposed by Hu et al. [13], the forwarding node selection policy is according to the link quality determined by a new measure of minimum summation angle, for this algorithm is applied to a scenario where image sensor nodes need to transmit images to the mobile robot sinks. All the above algorithms are studied for the mobile Ad hoc networks, except TIE-GeR that does not specify the model, and T-GPSR that has the mobile sink but the fixed image sensor nodes. As to the network density, only Hu et al. emphasizes that the algorithm is designed for a sparse network. Besides, only TIE-GeR and EEPDBR consider the energy consumption, and none of the above algorithms discussed the interference in communication. All the above algorithms are designed for WSNs and belong to geographic routing.

2.2.2. Related Works of Our Team

The duty-cycle scheme schedules sleeping and awake conditions for nodes to ensure long battery life. For instance, Han et al. proposed 2-hop neighbor information and a duty-cycle-based algorithm called TPGFplus [14]. After that, he also designed a cross-layer optimized routing scheme based on TPGFplus, which optimizes the physical layer, duty-cycle layer, and the routing layer to save energy [4]. Not surprisingly, the duty-cycle scheme leads to longer battery life but requires that other nodes can still form links when partial nodes sleep. However, due to the sparsity deployment of nodes in SIL-IoTs, making partial nodes sleep may result in some nodes having no neighbors to choose as the next-hop nodes for data forwarding, which does not meet the requirements of full connection in SIL-IoTs. Therefore, the duty-cycle scheme is not suitable for SIL-IoTs. Unlike the above studies, the nodes in THECB do not consider the duty-cycle scheme and would always be awake.
TPGFPlus is designed according to TPGF [15], and they both are our team’s previous works. Table 3 shows the characteristics of TPGF, TPGFPlus and THECB. TPGF makes routing decisions only based on the distance (from the current forwarder to the sink and from 1-hop neighbors to the sink). THECB and one of the forwarding mechanisms in TPGFPlus that we mainly consider both adopt the following factors: (1) distance from 2-hop neighbors to the sink, and (2) the residual energy to make the routing decision. Nevertheless, the calculation methods of these two factors are different between THECB and TPGFPlus, and THECB considers more factors in the routing decision to save more energy consumption of communication and reduce the unpredictable electromagnetic interference on communication. In addition, the routing-loop situation and path-circle situation [15] (also explained in Section 4.3.2 and Section 4.3.3 in this paper) can appear in these three algorithms. Nevertheless, to solve these two situations, TPGF and TPGFPlus utilize the Step Back and Mark method and the Label Based Optimization method, respectively, different from the two methods proposed in THECB.
In SIL-IoTs, data transmission is affected by high voltage discharges. Thus it is critical for SIL-IoTs nodes to reduce the data forwarding traffic of the nodes whose discharge numbers are relatively higher than those of other nodes. This important feature is ignored in previous works of both other teams and our team. In addition, these algorithms do not take into account the characteristic of the different energy consumption of various discharge numbers among different nodes in SIL-IoTs, thus neglecting to improve the energy consumption balance of SIL-IoTs.

3. System Model

3.1. Network Model

Based on the deployment strategies of SIL-IoTs proposed in [16], the location of every node is fixed, and the internode distance varies from 30 m to 150 m. One sink node with sufficient energy in this network is deployed at the boundary area of the covered region. Each SIL-IoTs node knows its location through an internal GPS module and stores the sink node’s location in advance. The number of every SIL-IoTs node’s 1-hop neighbors is more than or equal to one. All SIL-IoTs nodes are assumed to transmit their data to the sink node. Therefore, in this paper, nodes are sparsely deployed but fully connected in SIL-IoTs. There are many parameters used in this paper and Table 4 shows the meaning of important parameters.

3.2. Energy Model

3.2.1. Transmission Energy Consumption Model

Like WSNs, every node in SIL-IoTs is responsible for transmitting its data collected through the equipped sensor modules to the sink. This communication process would cost a lot of energy. We adopt the following model [12] to calculate the energy consumption used for a node sending one bit of data to its neighbor:
e s e n d = E c i r + ε f s · d 2 , d < d 0 E c i r + ε a m p · d 4 , d d 0
where E c i r is assumed as the energy consumed by the transmitting circuit when transmitting a bit, and ε f s is defined as the energy consumption of the transmitting amplifier to send one bit of data in free space, and ε a m p is similar to ε f s in the multipath fading channel. d represents the distance between the sender and receiver, and d 0 is a reference distance: when d < d 0 , the channel model is a free space model. Otherwise, it is a multipath fading model.
The energy consumed by a node receiving one bit of data can be calculated as follow:
e r e c e i v e = E c i r

3.2.2. Energy Consumption Model of Keeping the Lure Lamp on

The SIL attracts migratory pests via using a lure lamp. The rated power of the lure lamp is 12 W, which is represented by P L . Consequently, the energy consumption of the lure lamp is defined as:
E L = P L · t
where t denotes the working time of the lure lamp.

3.2.3. Energy Consumption Model of Releasing High Voltage Pulse Currents

The SIL kills pests by releasing high voltage pulse currents. To the best of our knowledge, no previous research investigates the energy consumption of releasing high voltage discharges while pests contact with the metal mesh. In our previous work [17], to explore the quantitative index of discharge intensity, a discharge simulation module was adopted to simulate the discharge of the SIL when pests contact the metal mesh. Based on the equipment of our previous work [17], we designed the following experiment to obtain the approximate energy consumption of one discharge.
The experiment is carried out indoors to reduce the impact of environmental factors on the results. All devices are shown in Figure 2:
(1)
The voltage and current sensor module are used to acquire data (10 times per second) for calculating energy consumption. It consists of a sensor (INA219) for acquiring circuit and voltage value, and a Raspberry Pi for storing data. This module is powered by Xiaomi battery (20,000 mAh);
(2)
Compared with the actual discharge times, which are difficult to count when the SIL is killing pests, the discharge simulation module helps record the discharge times more accurately. The discharge simulation module includes eight electromagnetic relays (DC-5V), and one microprocessor (STC89C52RC). This module is designed to control and simulate different discharge frequencies using a program set up in the microprocessor. Its power supply is Xiaomi battery (20,000 mAh);
(3)
The SIL is powered by a battery (20 AH) and not equipped with an unnecessary solar panel for our experiment;
(4)
The lure lamp attracts pests, and the high voltage metal mesh can kill pests by releasing high voltage pulse currents.
When the SIL only turns on the lure lamp, the state is denoted as S A T E 1 , and the state when the SIL turns on both the lure lamp and the discharge simulation module is represented as S A T E 2 .
Voltage, current, and working time are collected under S A T E 1 and S A T E 2 . When the voltage changes from U 1 to U 2 , the energy consumption of the SIL in S A T E 1 and S A T E 2 are presented as E S A T E 1 , and E S A T E 2 . Besides, the working time in S A T E 1 and S A T E 2 are T 1 , and T 2 . The above parameters are characterized as follows:
E S A T E 1 = T 1 P L · t d t E S A T E 2 = T 2 U I t d t E L = T 2 P L t d t
where U and I are the value of the voltage and current, the current of the SIL changes when SIL generates discharges. The time of releasing one high voltage discharge is especially short, and the voltage and current sensor modules do not have a high enough sampling frequency to acquire enough data over some time. Thus using integral to calculate E S A T E 2 is not appropriate, for it can produce a great number of errors. To solve this problem, we assume that for the same battery, when the voltage changes from U 1 to U 2 , the total energy consumption of the SIL in S A T E 1 can be approximately equal to that in S A T E 2 , that is, E S A T E 1 = E S A T E 2 . Therefore, the energy consumed by one discharge of the SIL can be calculated through the following formula:
E D = E S A T E 2 E L = E S A T E 1 E L
Unlike our previous work, we found a fixed deviation between the actual discharge frequency and the set discharge frequency. To obtain the discharge times accurately, additional information is required. In the experiment, we found that when the discharge simulation module controls the SIL to generate a discharge, it makes an obvious sound. The sound data of the discharge simulation module can be utilized to acquire actual discharge frequency. Figure 3 describes the sound data of the discharge simulation module over some time after normalizing the amplitude. Therefore, a significant increase inordinate data of Figure 3 represents a discharge generation of the SIL. Hence, we obtain the approximate discharge frequency (0.1084357 seconds per discharge) through collecting and analyzing the sound data of the discharge simulation module when working.
In this way, the number of discharges is T 2 /0.1084357 for S A T E 2 , and the average energy consumption of each discharge is about: E D = 0.7 J.

4. Proposed Algorithm

This section presents in detail the proposed THECB algorithm for SIL-IoTs. First, the architecture of THECB is briefly introduced, and then how to select the next-hop node, solve the routing-loop situation and the path-circle situation are introduced. Finally, the data packet is transmitted based on the established routing table.

4.1. THECB Framework

The algorithm is divided into 3 phases and its flow chart is shown in Figure 4:
  • Neighbour nodes’ information acquisition: All the nodes obtain their 1-hop and 2-hop neighbors’ IDs, locations, residual energy value, and the number of discharges through twice broadcasts.
  • Geographic forwarding: The current forwarder considers the distance, residual energy, and the number of discharges to choose its next 1-hop and 2-hop nodes. Then, the current forwarder sends a burst packet to the next 1-hop and 2-hop nodes. These nodes add their IDs to this packet successively. During the exploring of a path, every node will solve the routing-loop situation and path-circle situation if these problems occur. Finally, each node obtains a routing table for maintaining the next 1-hop and 2-hop nodes.
  • Data dissemination: When the burst packet arrives at the sink, the sink sends an acknowledgment to the source node along the constructed path. After receiving the acknowledgment, the nodes transmit data packets according to the routing tables. For any node, if the difference of related parameters (i.e., the value of residual energy and number of discharges) exceeds the threshold, the 1-hop, 2-hop neighbors and themselves would rebuild their routing tables.
Our scheme has three kinds of packets when building the routing table:
  • Beacon packet: It is used to exchange information among neighbors during the twice broadcasts.
  • Burst packet: It helps to explore the path. Its format is illustrated in Figure 5A. The ID of every node on the found path is sorted in this packet.
  • Message packet: When solving the routing-loop situation and path-circle situation, this packet is adopted to inform nodes to choose the appropriate method. As shown in Figure 5B, this packet contains a flag indicating which method to choose.

4.2. Neighbor Nodes’ Information Acquisition

The following three steps are processed to obtain the information of 1-hop and 2-hop neighbor nodes:
Step 1: Every node broadcasts a beacon packet (containing the ID, location, residual energy value, and the number of discharges) to its neighbors at the maximum transmission power.
Step 2: Once the node receives the information, it adds its 1-hop neighbors’ information to the beacon packet.
Step 3: Every node broadcasts this new beacon packet. Finally, every node knows its 1-hop and 2-hop neighbors’ information.

4.3. Geographic Forwarding

4.3.1. Select The Next 1-hop and 2-hop Node

As shown in Figure 6A, for the current forwarder u, node a n 1 , a n , b 1 and b 2 are represented as its last 2-hop, last 1-hop, next 2-hop and next 1-hop nodes, respectively. D a n 1 u , D s i n k u , D a n 1 b 2 and D s i n k b 2 denote the distance from node a n 1 to u, the sink to u, a n 1 to b 2 and the sink to b 2 , respectively. The nearby region around node u is divided into four parts, and weight β i is set for ith region (i = 1, 2, 3, 4). The division rule is shown as following:
D s i n k b 2 < D s i n k u & D a n 1 b 2 > D a n 1 u , i = 1 D s i n k b 2 < D s i n k u & D a n 1 b 2 < D a n 1 u , i = 2 D s i n k b 2 > D s i n k u & D a n 1 b 2 > D a n 1 u , i = 3 D s i n k b 2 > D s i n k u & D a n 1 b 2 < D a n 1 u , i = 4
The shorter distance from the chosen next-hop node to the sink is set as the prime target, and the long-distance from the chosen next-hop node to node a n 1 is set as the secondary target. Intuitively, nodes in region1 are the best choice of next hop nodes because they are farther to node a n 1 but nearer to the sink than node u. Nodes in region2 transmit data closer to upstream forwarders, and thus they are the second choice. Nodes of region3 or region4 would transmit data packets farther away from the sink node than node u, so these nodes are the worse choices than those of region1 or region2.
Through the above analysis, the weight factors of these four regions could be set as: β 1 < β 2 < β 3 < β 4 , which indicates that a smaller weight represents a better choice of next-hop nodes.
In summary, the greedy forwarding mechanism is expressed in the form of probability, that is, each neighbor node is given a weight between 0 and 1 according to the distance, and the weight represents the probability that the node is selected as the next-hop node. The traditional greedy forwarding mechanism (the current forwarder chooses the neighbor node that is closer to the sink than itself) can also be converted into the following probability forms according to the above idea: The weight of the neighbor node that is closer to the sink than the current forwarder is set as 1, which means that neighbor node is the better choice. The following formula can express the above traditional greedy forwarding mechanism:
D s i n k b 1 < D s i n k u , i = 1 D s i n k b 1 > D s i n k u , i = 2
Therefore, as depicted in Figure 6B, the nearby region around the current forwarder u is divided into two parts. The neighbor node in region 1 is closer to the sink than the current forwarder, while the neighbor node in region 2 is farther to the sink than the current forwarder. Thus, the weight factor of region 1 and region 2 could be set as 1 and 0, respectively.
According to the number of discharges, nodes are graded into three discharge levels ( D L ): D L 1 (the discharge number is relatively the smallest), D L 2 (the discharge number is relatively medium), and D L 3 (the discharge number is relatively the highest). The weights of them are: μ 1 , μ 2 , μ 3 , where μ 1 < μ 2 < μ 3 and μ 1 + μ 2 + μ 3 = 1 . Assume that ϕ = μ b 1 + μ b 2 , where μ b 1 and μ b 2 represent the weight factor μ of node b 1 and b 2 , respectively. It is critical to reduce the data forwarding traffic of nodes whose discharge numbers are relatively higher than those of other nodes because high voltage discharges have interference on communication [5,6]. Clearly, smaller ϕ indicates less interference on communication.
Finally, P is defined as the parameter to select the next 1-hop and 2-hop nodes:
P = ϕ × β × ( α D s i n k b 2 + ( 1 α ) E )
where α is a weight factor between 0 and 1 that determines the relative significance placed on D t h e s i n k b 2 and E. E denotes the energy consumption factor, which is calculated as:
E = e u E r e s _ u + e b 1 E r e s _ b 1 + e b 2 E r e s _ b 2
where e u , e b 1 and e b 2 represent the energy consumption of communication by u, b 1 and b 2 , respectively. E r e s _ u , E r e s _ b 1 and E r e s _ b 2 denote the residual energy of u, b 1 and b 2 , which is defined as:
E r e s = E i n i E l a m p E e l e
where E i n i denotes the initial energy. E l a m p and E e l e represent the energy consumption of the lure lamp and discharges, respectively. As shown in the example of Figure 7, the energy consumption of node2 is less than that of node1, but accounts for about 80% of the whole energy of node2. However, node1 consumes about only 50% of its total energy. Obviously, node1 is the better choice. Therefore, we adopt the ratio of communication energy consumption ( e u , e b 1 and e b 2 ) to residual energy ( E r e s _ u , E r e s _ b 1 and E r e s _ b 2 ) to evaluate the energy consumption of nodes.
In summary, the current forwarder u calculates P of all optional paths and selects the path with the smallest P, since the smallest ϕ , β , D s i n k b 2 and E indicate the best choice of the alternative paths. Especially, due to the different magnitude of D t h e s i n k b 2 and E, it is necessary to normalize them respectively.
Finally, the current forwarder u sends a burst packet to the next 1-hop and 2-hop nodes. These nodes add their IDs to this packet successively.

4.3.2. Solve Routing-Loop Situation

Definition 1
(Routing-Loop Situation).Let A = a 1 a m 1 a m a m + 1 a n u denote all the nodes on the found path from node a 1 to u, e.g., Figure 8A. If the next 1-hop or 2-hop node selected by the current forwarder u belongs to A, the data packet will be circularly transmitted among the previous forwarders A L o o p = a m a m + 1 a n u b 1 a m ( b 2 ) , and this kind of situation is defined as arouting-loop situation, as depicted in Figure 8A.
Definition 2
(Block Circle and Block Line).In Definition 1, if a m has only three 1-hop neighbors ( a m 1 , a m + 1 , b 1 ), this situation is defined as a block circle . As shown in Figure 8A, if the node a m at the end of the path a 1 a m 2 a m 1 a m has only one neighbor ( a m 1 ) and the other nodes have only two neighbors, we define this situation as a block line. These cases also make the data transmitted among the previous forwarders because the next hop nodes can only be chosen from the previous forwarders. Therefore, the block circle and block line are the special cases of the routing-loop situation.
The routing-loop situation may also appear in our algorithm. The routing-loop situation may also appear in our algorithm. The following approach is proposed to solve this situation.
Step 1: If the current forwarder u finds that the ID of its next 2-hop node has been stored in the burst packet which has the IDs of all nodes on the found path (mentioned in Section 4.1), there occurs a routing-loop situation according to Definition 1. Then, u is denoted as the selected node a s .
Step 2: That selected node a s selects the new selected node a s which is nearest to the sink among itself and its 1-hop and 2-hop neighbors in A (e.g., in Figure 8A, u calculates the distances from a n 1 , a n , u, b 1 , and b 2 to the sink, respectively, and selects the node a n 1 with the smallest distance).
Step 3: If a s finds that a s is itself, that is, there are no neighbors on the found path A nearer to the sink than itself, Step 4 will be executed. Otherwise, node a s sends node a s a message packet with the flag set as 1. Denote node a s as node a s , and then execute Step 2. The above Step 2 and Step 3 are repeated until a s is the nearest node to the sink among the nodes on the loop. (e.g., In Figure 8A, node a n 2 has the smallest distance to the sink than other nodes in A and it is denoted as the final a s ).
Step 4: Node a s (e.g., a n 2 ) selects its new next 2-hop node from the nodes A .
Step 5: If a s does not find a new path to break the loop, it selects the new selected node a s (e.g., a n 1 ) which is nearest to the sink among its 1-hop and 2-hop neighbors in A. Then, a s sends a message packet with the flag set as 2 to node a s . Finally, denote node a s as node a s , and then execute Step 4. Therefore, Step 4 and Step 5 are executed repeatedly until a new path is built to break the loop (e.g., in Figure 8B, if we assume that a n 2 could not find that new path for some reason, node a n 1 selects the new next 2-hop node to build that path).
In summary, starting from node a s (e.g., a n 2 ), the nodes on the found path A find their new next 2-hop nodes in a specified order until a new path is built to break the loop.
Step 6: If a new path without routing-loop situation is built, delete the IDs of the nodes which are not used for data transmission from the burst packet (e.g., b 1 , u, a n in Figure 8B).
Figure 7. The energy consumption of node2 is less than that of node1. However, node1 consumes only 50% of its total energy while node2 consumes about 80% of the whole energy.
Figure 7. The energy consumption of node2 is less than that of node1. However, node1 consumes only 50% of its total energy while node2 consumes about 80% of the whole energy.
Sensors 22 00154 g007
Figure 8. (A) The current forwarder u finds that if it chooses node b 2 as the next 2-hop node (as shown by the purple dotted line), there will be a routing loop a m a m + 1 a n u b 1 a m ( b 2 ) . Then, u selects the node a n 1 with the smallest distance to the sink from its neighbors a n 1 , a n , u, b 1 , and b 2 . After that, as shown by the blue dotted line, u sends a message packet to a n 1 to inform a n 1 to select the node nearest to the sink from the neighbors. In this way, we can acquire the node a n 2 which is nearest to the sink on the found path. (B) If a n 2 could not find any new next 2-hop node to break the loop, a n 2 will send the message packet with the flag set as 2 to a n 1 (as shown by the blue dotted line). a n 1 is nearest to the sink among the neighbors of a n 2 . Then, a n 1 selects the new next 2-hop node. The green dotted line denotes the new path explored by a n 1 .
Figure 8. (A) The current forwarder u finds that if it chooses node b 2 as the next 2-hop node (as shown by the purple dotted line), there will be a routing loop a m a m + 1 a n u b 1 a m ( b 2 ) . Then, u selects the node a n 1 with the smallest distance to the sink from its neighbors a n 1 , a n , u, b 1 , and b 2 . After that, as shown by the blue dotted line, u sends a message packet to a n 1 to inform a n 1 to select the node nearest to the sink from the neighbors. In this way, we can acquire the node a n 2 which is nearest to the sink on the found path. (B) If a n 2 could not find any new next 2-hop node to break the loop, a n 2 will send the message packet with the flag set as 2 to a n 1 (as shown by the blue dotted line). a n 1 is nearest to the sink among the neighbors of a n 2 . Then, a n 1 selects the new next 2-hop node. The green dotted line denotes the new path explored by a n 1 .
Sensors 22 00154 g008
Figure 9 shows two routing-loop situations occurring in THECB during the simulation. The ID is labeled near the node. To solve this problem, the node (ID 23, ID 79) nearest the sink among all nodes on the found path explores the new path.
The Step Back and Mark method proposed by [15] is designed to solve the block line (in [15], the block line has only one node and is named as the block node). In this method, if the current forwarder has no 1-hop neighbors except its previous forwarders, which means the next-hop node can only be chosen from the previous forwarders, it will step back to its last 1-hop node which will try to find a new available next-hop node. This step will be executed repeatedly until the new available next-hop node is found. Therefore, based on this mechanism, the Step Back and Mark (SBM) method can be extended to solve the routing-loop situation which is more general than the block line. The new mechanism is the following: If the next-hop node is chosen from the previous forwarders, the next-hop node will step back to its last 1-hop node which will try to find a new available next-hop node. This step will be executed repeatedly until the new available next-hop node is found. This method can be summarized as: In the order from the node that finds this situation to the source node, nodes on the built path attempt to find a newly available path (e.g., in Figure 8B, nodes explore the new path in the following order: b 1 u a n a n 1 ).
In our method, the nodes explore the new path according to the sort of distances from these nodes to the sink. As shown in Figure 8B, let L b 1 s i n k and L a n 1 s i n k denote the new path found by b 1 using the SBM method, and found by a n 1 based on our method, respectively. It is seen that L b 1 s i n k is longer than L a n 1 s i n k because a n 1 is closer to the sink than b 1 . In particular, the difference between the two paths would be larger in more sparse networks. Although sending message packets in our method when solving the routing-loop situation costs some energy, due to (1) this process is only executed during building the routing table and may not consume energy frequently, and (2) the new path to break the loop established by our method may be shorter than that of the SBM method, especially in the sparse network such as SIL-IoTs, which indicates our method may save more energy consumption of communication and improve the transmission speed than the Step Back and Mark method in multiple data transmission after the routing table is established, it is still highly significant to design and adapt our method.

4.3.3. Solve Path-Circle Situation

Definition 3
(Path-Circle Situation).Let A denote all the nodes on the found path from node a 1 to u. For a node u A , if more than one node of A is node u’s neighbors, as shown in Figure 10, we consider that there is a path-circle situation.
Although THECB is based on 1-hop and 2-hop neighbors’ information, path-circle situation may still occur. Solving this situation means optimizing the found path with the least number of nodes, so the following optimization method is proposed:
Because the ID of every node on the found path is stored in the burst packet (mentioned in Section 4.1), the current forwarder u knows all the upstream nodes’ IDs. Therefore, if u finds its 1-hop neighbor node a belongs to A (except last 1-hop and 2-hop nodes of u), which means there is a path-circle situation in the found path, node u sends a message packet with the flag set as 3 to node a. Then, node a updates the routing table and transmits data to u directly. Obviously, path-circle situation is solved during exploring the path in our method, while in the Label Based Optimization method used in TPGF [15] and TPGFPlus [4,14] the solution of that situation depends on sending back an acknowledge from the sink to the source node after the whole path is built.
Figure 11 depicts some path-circle situations occurring in THECB and the results after executing the optimization method during the simulation.

4.4. Data Dissemination

When the burst packet arrives at the sink, the sink sends an acknowledgment to the source node along the built path. After receiving the acknowledgment, each node can transmit the data packet according to the routing table.
Suppose the node finds that the change of its residual energy or number of discharges exceeds the threshold, or its residual energy is lower than the energy threshold that ensures communication. In that case, it will broadcast the beacon packet. Then the neighbors receiving this packet add their 1-hop neighbors’ information to the beacon packet and broadcast the new beacon packet again. All the nodes receiving the beacon packet resend the burst packet to establish a new routing table. The neighbors whose residual energy is lower than the threshold will not be used to relay data packet.

5. Analysis

Theorem 1.
For a sink node, no matter where it locates in the network, all the other nodes can find a path to transmit their data using the THECB method.
Proof. 
Based on the idea of [15], THECB can convert the WSNs to a Distance, Energy, and Discharge level Search Tree (DEDST), e.g., Figure 12. The first layer of the tree is the sink node, namely, the root node of the tree. The second layer is the last 1-hop node of the sink node, and the third layer is the last 2-hop node of the sink node. In this way, each node can be classified into DEDST. Hence, the last n-hop nodes of the sink can be classified into the nth layer of DEDST. □

6. Performance Evaluation

In this section, we evaluate the performance of THECB via simulation experiments. We present our simulation environments and performance metrics and evaluate the performance results. Moreover, the comparison between THECB and TPGFPlus, which ignores the requirement of the node-disjoint path, is invested.

6.1. Simulation Setup

We evaluate the performance of THECB through the sensor network simulator NetTopo [18]. Table 5 shows the value of important parameters. The number of nodes randomly distributed in a 2D area of 800 m × 800 m increases from 100 to 250, determining the network density increase. The internode distance is more than 30 m.
Each SIL-IoTs node contains a variety of sensor modules to obtain data; thus, each node is set to generate a packet with the size of 50kb and transmit it to the sink every 5 min. We evaluate the performance of nodes after working for half an hour. The sink is deployed at the fixed location of (200 m, 200 m), which receives data from all nodes.
The energy consumption of sending and receiving data for each node is based on the first radio model, which is mentioned in Section 3.2.1. The maximum transmission radius T r of each node is changed from 90 m to 120 m (each time increased by 10 m).
This paper mainly studies the performance of THECB when the SIL turns on the lure lamp and kills pests by generating discharges at night. Therefore, we set the initial energy E i n i as the energy of the battery charged by the solar panel in the daytime. The working time of the lure lamp at night is a fixed value set before, and the number of discharges can be estimated according to historical data.
According to the experimental data, the number of discharges in D L 1 , D L 2 , and D L 3 (mentioned in the Section 4.3) are assumed to change from 300 to 1500, 1500 to 2250, and 2250 to 3000. Through many simulations, we find that if the difference among μ 1 , μ 2 , and μ 3 is set relatively large (e.g., the value of μ 1 is quite small, or the value of μ 3 is quite big), that is, few nodes in D L 3 or D L 2 are selected as the next hop nodes, the paths will become quite long and the routing-loop situation can easily occur, as depicted in Figure 13. Therefore, the weights of D L 1 , D L 2 , and D L 3 can be set as: μ 1 = 0.2, μ 2 = 0.3, and μ 3 = 0.5, respectively. However, it is also found that setting the difference among β 1 , β 2 , β 3 and β 4 to be large (e.g., β 1 and β 2 are set relatively small, or β 3 and β 4 are set relatively big) can increase the probability of selecting the nodes close to the sink as the next hop nodes, thereby reducing the appearance of the routing-loop situation. Based on the above simulation results, β 1 , β 2 , β 3 and β 4 is set as 0.05, 0.15, 0.3 and 0.5, respectively.
Twenty different network deployments are generated by using 20 different seeds. For a certain proportion of node numbers in D L 1 , D L 2 , and D L 3 , the discharge numbers of different nodes in each network deployment are randomly set 10 times. Thus, the average performance results are obtained from 200 different cases. The following three simulation scenarios are designed to illustrate the performance of THECB.
  • Proportion of different discharge levels scenario: The ratio of node number in DL1, DL2 and DL3 is denoted as N D L 1 , N D L 2 , and N D L 3 , which satisfy: N D L 1 + N D L 2 + N D L 3 = 1 . This paper changes the proportion of node numbers in different discharge levels to simulate various numbers of discharges for the SIL nodes deployed in the farmland.
  • Network density scenario: The network density, presented by ρ , is the mean number of neighbors per node and can be defined as ρ = k · π · T R 2 800 × 800 1 , where k denotes the total number of nodes in the 800 m × 800 m area [19]. ρ is positively related to the number of nodes under a certain T R . In this paper, we change the network density ρ by changing the nodes’ total number.
  • Transmission radius scenario: The increase of data transmission distance leads to more energy consumption of nodes for sending data. Therefore, it is significant to invest the impact of increasing the T R to the performance of THECB when other conditions remain unchanged.
TPGFPlus [4] is a geographic routing algorithm that is also based on 1-hop and 2-hop neighbors’ information. As shown in Table 3, THECB and one of the forwarding mechanisms in TPGFPlus select next-hop nodes according to the following two factors: (1) distance from 2-hop neighbors to the sink, and (2) the value of residual energy to make the routing decision. However, the calculation methods of these two factors are different between THECB and TPGFPlus. THECB also considers the discharge number when making the routing decision to reduce the unpredictable electromagnetic interference in communication. In addition, the routing-loop situation and path-circle situation [15] (also explained in Section 4.3.2 and Section 4.3.3 in this paper) can appear in these two algorithms. However, THECB and TPGFPlus solve the two situations based on two different methods.
Because of the similarities and differences between THECB and TPGFPlus described in Table 3 and Section 2, we compare THECB with TPGFPlus to have in-depth performance analysis. Specially, we only consider the energy-aware forwarding mechanism of the three forwarding mechanisms in TPGFPlus. Besides, the requirement of the node-disjoint path in wireless multimedia sensor networks is ignored because we only investigate the routing decision method not the application scenario of TPGFPlus. In the following, TPGFPlus that ignores the node-disjoint path requirement is named TPGFPlus Ignores Node-Disjoint (TPGFPlus-IND).

6.2. Performance Metrics

We analyze the following performance metrics to evaluate our scheme.

6.2.1. Total Energy Consumption Ratio

Total energy consumption ratio [20] is defined as E r a t = j = 1 n e j \ E r e s j ( j = 1 , 2 , , n ) , where e j and E r e s j represent the energy consumed by communication and the residual energy of node j, respectively. The number of the whole nodes is denoted as n. This metric is used to evaluate the energy consumption of communication.

6.2.2. Variance of Energy Consumption Ratio

In statistics, variance is widely used to evaluate the discrete degree of data [21]. The variance of energy consumption ratio is used to evaluate the difference of energy consumption among different nodes, namely, the energy consumption balance among different nodes involved in communication. This metric can be expressed as: E v a r = j = 1 n e j \ E r e s j E r e t \ n 2 \ n ( j = 1 , 2 , , n ) .

6.2.3. Data Forwarding Traffic

As mentioned in Section 4.3, high voltage discharges have interference in communication; thus, the data forwarding traffic of the nodes whose discharge numbers are relatively higher than those of other nodes should be reduced. Based on this principle, this metric indicates communication interference in the SIL-IoTs scenario. For the nodes in D L 1 , D L 2 and D L 3 , we define the data forwarding traffic as T D L 1 , T D L 2 and T D L 3 , respectively.

6.3. Performance of THECB with Varied Proportion of Different Discharge Levels

In this subsection, we investigate the performance of the two algorithms in the following 15 cases. In each case, the values of N D L 1 , N D L 2 and N D L 3 (mentioned in Section 6.1) are shown in Table 6. We fix the transmission radius as 100 m and the number of nodes as 160. In addition, we change α of Equation (8) from 0.5 to 1.0 (each time increased by 0.02) to choose an appropriate value of α for the following simulations.
Figure 14 depicts E r a t , E v a r and T D L 3 when the value of α changes from 0.5 to 1.0. In each figure, a yellow bar marks the lower value of metrics. According to the results, we set the value of α to 0.8 in the following simulations.
Figure 15A shows E r a t of THECB and TPGFPlus-IND in the above 15 cases. It is easy to see that E r a t of TPGFPlus-IND is approximately 0.01 to 0.02 higher than that of THECB in the above cases, which means that for the various discharge numbers of the SIL-IoTs nodes in the farmland, our algorithm always performs better in saving energy consumption of communication. In addition, the results illustrate that the growth of E r a t is related to the values of N D L 1 , N D L 2 , and N D L 3 . This phenomenon can be explained as follows: More discharge numbers lead to more energy consumption, making the denominator value of the energy consumption ratio smaller. Thus, the more nodes with high discharge numbers (the sum of N D L 2 and N D L 3 ) make the total energy consumption ratio greater. For example, in case1 to case5, N D L 3 remains unchanged, and E r a t rises with the increase of N D L 2 . In case 6, although N D L 3 increases, E r a t suddenly diminishes since N D L 2 decreases more.
The trends of E v a r for both algorithms in Figure 15B are similar to E r a t in Figure 15A. Besides, THECB achieves smaller E v a r than TPGFPlus-IND, which indicates that THECB has a better energy consumption balance of communication. Notably, the energy consumption balance of communication among nodes will become worse for both algorithms if the discharge numbers of most nodes become higher (the number of nodes in DL2 and DL3 becomes higher).
For the nodes of different discharge levels, T D L 1 , T D L 2 and T D L 3 under all cases are shown in Figure 15C. The results indicate that the data forwarding traffic of all nodes ( T D L 1 + T D L 2 + T D L 3 ) has no significant change in 15 cases. T D L 3 is always significantly smaller in THECB than that in TPGFPlus-IND. It benefits from additional parameter μ in THECB according to different discharge levels of nodes, making the node whose discharge number is relatively higher than those of other nodes difficult to be selected as the next-hop node. Compared to TPGFPlus-IND, T D L 2 is almost similar to that of THECB; however, T D L 1 is higher in THECB. Consequently, THECB prefers to utilize the nodes whose discharge numbers are relatively lower than those of other nodes to forward data, which means THECB has less unpredictable electromagnetic interference on communication than TPGFPlus-IND in the SIL-IoTs scenario.

6.4. Performance of THECB with Varied Network Densities

We fix the transmission radius as 100 m, and vary the number of nodes from 100 to 250 (each time increased by 30). Therefore, the network density is 3.91, 5.38, 6.85, 8.32, 9.79, and 10.28, respectively. The proportion of nodes in different discharge levels is set as: N D L 1 : N D L 1 : N D L 1 = 4:3:3.
We use average E r a t , which is defined as E r a t = 1 n j = 1 n e j \ E r e s j ( j = 1 , 2 , , n ) , to evaluate the performance in saving energy consumption of communication. n is the number of nodes. As demonstrated in Figure 16A, average E r a t becomes smaller as the network density increases, which indicates both algorithms perform better in saving energy consumption of communication with a higher network density. In particular, the average E r a t of THECB shows a faster downward trend and can be reduced by 2.55%, 6.67%, 8.48%, 12.83%, 13.64%, and 15.42% compared with TPGFPlus-IND under different densities. The above results confirm that our algorithm, which utilizes energy consumption ratio instead of energy consumption, can significantly improve the performance in saving energy consumption of communication.
Figure 16B shows that there is little difference between the initial values of E v a r in THECB and TPGFPlus-IND. However, when the density reaches 10.28, the E v a r in THECB and TPGFPlus-IND have up to 1.25 × 10 5 and 1.6 × 10 5 , respectively. It is seen that compared to TPGFPlus-IND, THECB achieves the smaller value and amplification of E v a r . Therefore, THEE has a better energy consumption balance of communication and will have a higher advantage than TPGFPlus-IND if the density rises.
Figure 16C shows that the sum of T D L 1 , T D L 2 , and T D L 3 increases under a higher network density. Moreover, the values of T D L 1 , T D L 2 , and T D L 3 in Figure 16C are similar to those in Figure 15C. Therefore, compared to TPGFPlus-IND, THECB performs better in reducing the unpredictable electromagnetic interference on communication under varied network densities.

6.5. Performance of THECB with Varied Transmission Radius

The number of nodes is set as 160, and the proportion of nodes in different discharge levels is: N D L 1 : N D L 1 : N D L 1 = 4:3:3. The performance of the algorithm is evaluated under different transmission radius (set as 90 m, 100 m, 110 m, and 120 m, respectively).
Figure 17A shows that E r a t can be reduced by 6.15%, 8.38%, 10.38%, and 11.64% compared with TPGFPlus-IND under different transmission radius, which indicates that THECB performs better in saving energy consumption of communication.
E v a r in THECB and TPGFPlus-IND with the varied transmission radius are described in Figure 17B. It is noticed that compared to TPGFPlus-IND, our algorithm has up to 15.38%, 23.08%, 21.49%, and 29.73% lower variance, respectively. Thus, THECB performs better in the energy consumption balance of communication.
It is clear to see that in Figure 17C, as the radius increases, the sum of T D L 1 , T D L 2 and T D L 3 becomes smaller. The main reason is that a longer radius leads to more neighbors, which are further to the current forwarder but nearer to the sink, to be chosen as the next-hop nodes. Furthermore, it would shorten the length of the paths to transmit data and reduce the data forwarding traffic simultaneously. In addition, same as Figure 15C and Figure 16C, THECB uses fewer nodes whose discharge numbers are relatively higher than those of other nodes to forward data and has less unpredictable electromagnetic interference on communication compared with TPGFPlus-IND.

6.6. Execution Demonstration of THECB and TPGFPlus-IND

Figure 18 shows the execution result of THECB and TPGFPlus-IND. In Figure 18A and Figure 18B, the discharge numbers of different nodes are set randomly. In Figure 18C and Figure 18D, all nodes in a certain area are set to be in D L 3 (the discharge number is relatively the highest). Nodes within a certain range around these nodes in D L 3 are set to be in D L 2 (the discharge number is relatively medium), and other nodes are set to be in D L 1 (the discharge number is relatively the smallest). Compared to nodes of TPGFPlus-IND, those of THECB prefer to select the nodes in D L 2 and D L 1 to relay data; that is, nodes in D L 3 have less data forwarding traffic.
Significantly, some nodes in D L 3 are also selected to relay data in THECB. The main reasons are: (1) all the neighbors of the current forwarder are in D L 3 , so the next-hop node has to be selected from these neighbors, and (2) the current forwarder selects the next hop node based on not only the discharge number but also the distance from 2-hop neighbors to the sink and the ratio of communication energy consumption to residual energy. If the discharge number is high for the nodes on a path to be selected, but the distance or the ratio is small, the current forwarder may still choose a node in D L 3 to be the next-hop node. Moreover, it is inappropriate to prohibit other nodes in D L 2 and D L 1 from selecting the nodes in D L 3 to relay data to minimize the data forwarding traffic of the nodes in D L 3 , since bypassing some nodes to transfer data can make some paths extraordinarily long, which can increase the energy consumption of communication in the whole network.

7. Conclusions

In this paper, we propose THECB, a novel geographic routing algorithm based on 2-hop neighbors’ information, to improve the energy consumption balance and reduce the unpredictable electromagnetic interference on communication caused by the high voltage pulse current of communication paths SIL-IoTs. THECB contains three phases: neighbors’ information acquisition, geographic forwarding, and data dissemination. The greedy forwarding mechanism is expressed in the form of probability; that is, each neighbor node is given a weight between 0 and 1 according to the distance, and the weight represents the probability that the node is selected as the next-hop node. In the geographic forwarding method proposed, the nearby region around the current forwarder is divided into four parts according to the distance, and different weights are set to the nodes in different parts. Besides, different weights are set to the nodes in different discharge levels, thereby educating the data forwarding traffic of nodes whose discharge numbers are relatively higher than those of other nodes. The unpredictable electromagnetic interference in communication can be weakened. When exploring the path, the routing-loop situation and the path-circle situation will be solved if they occur. In addition, we calculate the energy consumed by one discharge of the SIL, which has not been investigated in the other works. Simulation results indicate that THECB achieves lower energy consumption, better energy consumption balance of communication, and less unpredictable electromagnetic interference of communication than TPGFPlus-IND (TPGFPlus ignores the requirement of the node-disjoint path) over a variety of discharge numbers, network densities, and transmission radius. Our scheme is designed for SIL-IoTs and the other IoT scenarios that have other energy consumption besides communication energy consumption and need to reduce the data forwarding traffic of some nodes.

Author Contributions

Conceptualization, X.G. and L.S.; methodology, X.G.; software, X.G. and B.D.; validation, X.G., X.Y.; formal analysis, X.G.; investigation, X.G., X.Y. and H.Y.; resources, K.L.; data curation, X.G.; writing—original draft preparation, X.G.; writing—review and editing, L.S., X.Y. and E.N.; visualization, X.G.; supervision, X.G. and L.S.; project administration, X.G. and L.S.; funding acquisition, L.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant 62072248, and Jiangsu Agricultural Science and Technology Innovation Fund under Grant CX(21)3060.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
TPGFPlusTwo-Phase Geographic Greedy Forwarding plus
TPGFPlus-INDTPGFPlus Ignores Node-Disjoint
IoTsInternet of Things
SILSolar Insecticidal Lamp
SIL-IoTsSolar Insecticidal Lamps Internet of Things
GSMGlobal System for Mobile Communications
WSNsWireless Sensor Networks
PDRPacket Delivery Ratio
SBMStep Back and Mark
DEDSTDistance, Energy, and Discharge level Search Tree

References

  1. Liu, Y.; Ma, X.; Shu, L.; Hancke, G.P.; Abu-Mahfouz, A.M. From Industry 4.0 to Agriculture 4.0: Current Status, Enabling Technologies, and Research Challenges. IEEE Trans. Ind. Inform. 2021, 17, 4322–4334. [Google Scholar] [CrossRef]
  2. Yang, X.; Shu, L.; Chen, J.; Ferrag, M.A.; Wu, J.; Nurellari, E.; Huang, K. A Survey on Smart Agriculture: Development Modes, Technologies, and Security and Privacy Challenges. IEEE/CAA J. Autom. Sin. 2021, 8, 273–302. [Google Scholar] [CrossRef]
  3. Li, K.; Shu, L.; Huang, K.; Sun, Y.; Yang, F.; Zhang, Y.; Huo, Z.; Wang, Y.; Wang, X.; Lu, Q.; et al. Research and prospect of solar insecticidal lamps Internet of Things. Smart Agric. 2019, 1, 13–28. [Google Scholar] [CrossRef]
  4. Han, G.; Dong, Y.; Guo, H.; Shu, L.; Wu, D. Cross-layer optimized routing in wireless sensor networks with duty cycle and energy harvesting. Wirel. Commun. Mob. Comput. 2015, 15, 1957–1981. [Google Scholar] [CrossRef]
  5. Huang, K.; Li, K.; Shu, L.; Yang, X.; Gordon, T.; Wang, X. High Voltage Discharge Exhibits Severe Effect on ZigBee-Based Device in Solar Insecticidal Lamps Internet of Things. IEEE Wirel. Commun. 2020, 27, 140–145. [Google Scholar] [CrossRef]
  6. Huang, K.; Li, K.; Shu, L.; Yang, X. Demo Abstract: High Voltage Discharge Exhibits Severe Effect on ZigBee-based Device in Solar Insecticidal Lamps Internet of Things. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 1266–1267. [Google Scholar] [CrossRef]
  7. Lam, B.H.; Phan, T.T.; Vuong, L.H.; Huynh, H.X.; Pottier, B. Designing a brown planthoppers surveillance network based on wireless sensor network approach. arXiv 2013, arXiv:abs/1312.3692. [Google Scholar]
  8. Qiu, Z.; Qiu, P.; Zhu, Q.; Wang, R. Insect Trapping Method Based on Progressive Star Network. Int. J. Online Biomed. Eng. 2015, 11, 56–60. [Google Scholar] [CrossRef] [Green Version]
  9. Singh, I.B.; Ho, Q.D.; Le-Ngoc, T. TIEGeR: An Energy-Efficient Multi-Parameter Geographic Routing Algorithm. In Proceedings of the 2012 IEEE Vehicular Technology Conference (VTC Fall), Quebec City, QC, Canada, 3–6 September 2012; pp. 1–5. [Google Scholar] [CrossRef] [Green Version]
  10. Phoummavong, P.; Utsu, K.; Chow, C.O.; Ishii, H. Location-aided route discovery mechanism based on two-hop neighbor information for ad hoc network. J. Supercomput. 2016, 72, 1201–1214. [Google Scholar] [CrossRef]
  11. Pham, C.; Diop, E.H.S.M.; Thiare, O. Selecting source image sensor nodes based on 2-hop information to improve image transmissions to mobile robot sinks in search & rescue operations. arXiv 2013, arXiv:abs/1312.4177. [Google Scholar]
  12. Zhang, M.; Cai, W. Energy-Efficient Depth Based Probabilistic Routing Within 2-Hop Neighborhood for Underwater Sensor Networks. IEEE Sens. Lett. 2020, 4, 1–4. [Google Scholar] [CrossRef]
  13. Hu, C.L.; Sosorburam, C. Enhanced Geographic Routing with Two-Hop Neighborhood Information in Sparse MANETs. Wirel. Pers. Commun. 2019, 107, 417–436. [Google Scholar] [CrossRef]
  14. Han, G.; Dong, Y.; Shu, L.; Guo, H.; Niu, J. Geographic Multipath Routing in Duty-Cycled Wireless Sensor Networks with Energy Harvesting. In Proceedings of the 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Beijing, China, 20–23 August 2013; pp. 31–39. [Google Scholar] [CrossRef]
  15. Shu, L.; Zhang, Y.; Yang, L.T.; Wang, Y.; Hauswirth, M.; Xiong, N. TPGF: Geographic routing in wireless multimedia sensor networks. Telecommun. Syst. 2010, 44, 79–95. [Google Scholar] [CrossRef]
  16. Yang, F.; Shu, L.; Huang, K.; Li, K.; Han, G.; Liu, Y. A Partition-Based Node Deployment Strategy in Solar Insecticidal Lamps Internet of Things. IEEE Internet Things J. 2020, 7, 11223–11237. [Google Scholar] [CrossRef]
  17. Yang, X.; Shu, L.; Huang, K.; Li, K.; Yao, H. Poster Abstract: Insecticidal Performance Simulation of Solar Insecticidal Lamps Internet of Things Using the Number of Falling Edge Trigger. In Proceedings of the IEEE INFOCOM 2021—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Vancouver, BC, Canada, 10–13 May 2021; pp. 1–2. [Google Scholar] [CrossRef]
  18. Shu, L.; Hauswirth, M.; Chao, H.C.; Chen, M.; Zhang, Y. NetTopo: A framework of simulation and visualization for wireless sensor networks. Ad Hoc Netw. 2011, 9, 799–820. [Google Scholar] [CrossRef]
  19. Huang, H.; Yin, H.; Min, G.; Zhang, J.; Wu, Y.; Zhang, X. Energy-Aware Dual-Path Geographic Routing to Bypass Routing Holes in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2018, 17, 1339–1352. [Google Scholar] [CrossRef] [Green Version]
  20. Zhao, X.Q.; Cui, Y.P.; Gao, C.Y.; Guo, Z.; Gao, Q. Energy-Efficient Coverage Enhancement Strategy for 3-D Wireless Sensor Networks Based on a Vampire Bat Optimizer. IEEE Internet Things J. 2020, 7, 325–338. [Google Scholar] [CrossRef]
  21. Huang, S.C.; Lo, Y.L.; Lu, C.N. Non-Technical Loss Detection Using State Estimation and Analysis of Variance. IEEE Trans. Power Syst. 2013, 28, 2959–2966. [Google Scholar] [CrossRef]
Figure 1. The SIL attracts migratory pests via a lure lamp in the evening and kills them by releasing high voltage pulse currents generated by the high voltage metal mesh. The dead pests are sorted in the insert bucket. The battery supplies the energy for the SIL. After being equipped with the wireless communication module, the SIL node can send its data to other nodes.
Figure 1. The SIL attracts migratory pests via a lure lamp in the evening and kills them by releasing high voltage pulse currents generated by the high voltage metal mesh. The dead pests are sorted in the insert bucket. The battery supplies the energy for the SIL. After being equipped with the wireless communication module, the SIL node can send its data to other nodes.
Sensors 22 00154 g001
Figure 2. The experiment devices which are used to calculate energy consumption.
Figure 2. The experiment devices which are used to calculate energy consumption.
Sensors 22 00154 g002
Figure 3. When the discharge simulation module controls the SIL to generate a discharge, it makes an obvious sound. A significant increase inordinate data means a discharge generation of the SIL.
Figure 3. When the discharge simulation module controls the SIL to generate a discharge, it makes an obvious sound. A significant increase inordinate data means a discharge generation of the SIL.
Sensors 22 00154 g003
Figure 4. The flow chart of THECB.
Figure 4. The flow chart of THECB.
Sensors 22 00154 g004
Figure 5. (A) The format of the burst packet. (B) The format of the message packet and the method indicated by each flag value.
Figure 5. (A) The format of the burst packet. (B) The format of the message packet and the method indicated by each flag value.
Sensors 22 00154 g005
Figure 6. The greedy forwarding mechanism is expressed in the form of probability. (A) The greedy forwarding mechanism of THECB: According to the distance, the nearby region around the current forwarder u is divided into four parts: region1, region2, region3, and region4. The specific division rule is expressed in Equation (6). b 2 is the node that may be selected as the next 2-hop node by u. The distance from b 2 to the sink ( D s i n k b 2 ) is shorter than the distance from u to the sink ( D s i n k u ); The distance from b 2 to a n 1 ( D a n 1 b 2 ) is longer than the distance from u to a n 1 ( D a n 1 u ), which means b 2 is in region1, and is nearer to the sink and farther to the upstream forwarders than u. (B) The traditional greedy forwarding mechanism: The nearby region around the current forwarder u is divided into two parts. The neighbour node in region1 is closer to the sink than the current forwarder, while the neighbour node in region 2 is farther to the sink than the current forwarder.
Figure 6. The greedy forwarding mechanism is expressed in the form of probability. (A) The greedy forwarding mechanism of THECB: According to the distance, the nearby region around the current forwarder u is divided into four parts: region1, region2, region3, and region4. The specific division rule is expressed in Equation (6). b 2 is the node that may be selected as the next 2-hop node by u. The distance from b 2 to the sink ( D s i n k b 2 ) is shorter than the distance from u to the sink ( D s i n k u ); The distance from b 2 to a n 1 ( D a n 1 b 2 ) is longer than the distance from u to a n 1 ( D a n 1 u ), which means b 2 is in region1, and is nearer to the sink and farther to the upstream forwarders than u. (B) The traditional greedy forwarding mechanism: The nearby region around the current forwarder u is divided into two parts. The neighbour node in region1 is closer to the sink than the current forwarder, while the neighbour node in region 2 is farther to the sink than the current forwarder.
Sensors 22 00154 g006
Figure 9. Two routing-loop situations occur in THECB during the simulation. (A) the routing loop: 79→68→72→68; 23→59→71→74→54→59. (B) the new path without loop: 79→65→21→51; 23→34→13→7→63→51.
Figure 9. Two routing-loop situations occur in THECB during the simulation. (A) the routing loop: 79→68→72→68; 23→59→71→74→54→59. (B) the new path without loop: 79→65→21→51; 23→34→13→7→63→51.
Sensors 22 00154 g009
Figure 10. The current forwarder u finds that the ID of its 1-hop neighbor node a n 2 is in the burst packet, which means a path-circle situation occurs in the found path. Then, node u informs node a n 2 to transmit data to u directly through sending a message packet with the flag set as 3. Finally, node a n 2 updates the routing table.
Figure 10. The current forwarder u finds that the ID of its 1-hop neighbor node a n 2 is in the burst packet, which means a path-circle situation occurs in the found path. Then, node u informs node a n 2 to transmit data to u directly through sending a message packet with the flag set as 3. Finally, node a n 2 updates the routing table.
Sensors 22 00154 g010
Figure 11. During the simulation of THECB, some path-circle situations appear. After executing the optimization method, paths have the least number of nodes.
Figure 11. During the simulation of THECB, some path-circle situations appear. After executing the optimization method, paths have the least number of nodes.
Sensors 22 00154 g011
Figure 12. DEDST: THECB can convert the WSNs to a Distance, Energy, and Discharge level Search Tree (DEDST). The first layer of the tree is the sink node. The last n-hop nodes of the sink are classified into the nth layer.
Figure 12. DEDST: THECB can convert the WSNs to a Distance, Energy, and Discharge level Search Tree (DEDST). The first layer of the tree is the sink node. The last n-hop nodes of the sink are classified into the nth layer.
Sensors 22 00154 g012
Figure 13. If the value of μ 1 is quite small and the value of μ 3 is quite big, the current forwarder prefers to select the node in discharge level D L 1 as the next hop node. When almost all the neighbors except the last hop nodes of the current forwarder are in discharge levels D L 2 and D L 3 , the current forwarder will choose its next hop node from the previous forwarders, which causes the appearance of the routing-loop situation.
Figure 13. If the value of μ 1 is quite small and the value of μ 3 is quite big, the current forwarder prefers to select the node in discharge level D L 1 as the next hop node. When almost all the neighbors except the last hop nodes of the current forwarder are in discharge levels D L 2 and D L 3 , the current forwarder will choose its next hop node from the previous forwarders, which causes the appearance of the routing-loop situation.
Sensors 22 00154 g013
Figure 14. Under 15 cases, the results of E r a t , E v a r and T D L 3 are shown in this figure when α changes from 0.5 to 1.0. The yellow bar marks the lower value of metrics.
Figure 14. Under 15 cases, the results of E r a t , E v a r and T D L 3 are shown in this figure when α changes from 0.5 to 1.0. The yellow bar marks the lower value of metrics.
Sensors 22 00154 g014
Figure 15. The performance of these algorithms with a varied proportion of different discharges levels. (A) Total energy consumption ratio. (B) Variance of energy consumption ratio. (C) The times of participating in data forwarding.
Figure 15. The performance of these algorithms with a varied proportion of different discharges levels. (A) Total energy consumption ratio. (B) Variance of energy consumption ratio. (C) The times of participating in data forwarding.
Sensors 22 00154 g015
Figure 16. The performance of these algorithms with varied network densities. (A) Average energy consumption ratio. (B) Variance of energy consumption ratio. (C) The times of participating in data forwarding.
Figure 16. The performance of these algorithms with varied network densities. (A) Average energy consumption ratio. (B) Variance of energy consumption ratio. (C) The times of participating in data forwarding.
Sensors 22 00154 g016
Figure 17. The performance of these algorithms with varied transmission radius. (A) Total energy consumption ratio. (B) Variance of energy consumption ratio. (C) The times of participating in data forwarding.
Figure 17. The performance of these algorithms with varied transmission radius. (A) Total energy consumption ratio. (B) Variance of energy consumption ratio. (C) The times of participating in data forwarding.
Sensors 22 00154 g017
Figure 18. Compared to nodes of TPGFPlus-IND, those of THECB prefer to select the nodes in D L 2 and D L 1 to relay data, that is, nodes in D L 3 have less data forwarding traffic, e.g., node a and b. (A) Node a and b of THECB are not selected as next hop nodes. (B) Node a and b of TPGFPlus-IND are selected as next hop nodes. (C) Node a and b of THECB are not selected as next hop nodes. (D) Node a and b of TPGFPlus-IND are selected as next hop nodes.
Figure 18. Compared to nodes of TPGFPlus-IND, those of THECB prefer to select the nodes in D L 2 and D L 1 to relay data, that is, nodes in D L 3 have less data forwarding traffic, e.g., node a and b. (A) Node a and b of THECB are not selected as next hop nodes. (B) Node a and b of TPGFPlus-IND are selected as next hop nodes. (C) Node a and b of THECB are not selected as next hop nodes. (D) Node a and b of TPGFPlus-IND are selected as next hop nodes.
Sensors 22 00154 g018
Table 1. Data Transmission Status in 2 Related Research Works of SIL-IoTs.
Table 1. Data Transmission Status in 2 Related Research Works of SIL-IoTs.
Year and AuthorData Transmission ModelData Transmission between NodesNetwork ModelOptimized Energy Management
2013, H. Lam et al. [7]Identify the species of pests through sensing the weight of pests in the SIL-IoTs nodes and transmit the pests data by time-division control, which contributes to establishing a real-time pests monitoring systemMesh network×
2015, Qiu et al. [8]The microcontroller in the node calculates the on-off time, and the data are transmitted to the node with the radar sensor by the wireless communication modulePartlyStar network×
Table 2. Two-Hop Neighbors Information Based Algorithms.
Table 2. Two-Hop Neighbors Information Based Algorithms.
Year20122013201620192020
AuthorSingh et al. [9]Congduc et al. [11]Phonepadith et al. [10]Hu et al. [13]Zhang and Cai [12]
The main routing algorithmTIE-GeR makes forwarding node selections via calculating the distance of the sink, link quality and residual energy of nodesT-GPSR selects the most appropriate set of forwarding nodes for image transmission. based on the capture rate of image sensor nodes and the number of the current forwarder’s 1-hop and 2-hop potential forwardersTN-CMAD calculates the average distance from 2-hop neighbors of the current forwarder to the sink and chooses 1-hop neighbor node that has the minimum value of this average distance as the next-hop node.The forwarding node selection policy is according to the link quality determined by a new measure of minimum summation angleEEPDBR evaluates node’s depth, residual energy, and forwarding number within its 2-hop neighbors to make routing decisions
Designed for WSNs✓(Underwater Wireless Sensor Networks)
Belonging to geographic routing✓(Depth Based Routing)
Data typeNot specifyImage dataNot specifyNot specifyNot specify
Energy consumptionConsiderNot considerNot considerNot considerConsider
Interference of the communcationNot considerNot considerNot considerNot considerNot consider
Optimization objectivesAchieve effective energy balancing throughout the network, while preventing routing voids by proactively avoiding “local maxim” nodesSignificantly reduce congestion and increase image quality at the robot sink when simultaneous images are sent from image sensor nodesReduce overhead packets and end-to-end delay and improve reachabilityReduce transmission overhead and end-to-end delay against communication voids in infrastructure-less environmentsOptimize the transmission of sensory data with the help of depth information to improve packet delivery ratio (PDR) and energy efficiency
Network modelNot specifyMobile sinks and fixed sensor, not specify the network densityMobile Ad hoc networks, not specify the network densitySparse mobile Ad hoc networksMobile Ad hoc networks, not specify the network density
Performance metrics of simulationPacket delivery ratio and network lifetimePacket loss rate, quality of received images at the robot sink and image transmission delay to the robot sinkOverhead (measured in packets), the packet delivery ratio, the average number of hops and the end-to-end delayDelivery ratio and overhead ratioDelivery time, packet delivery ratio and energy efficiency
Table 3. The comparison of TPGF, TPGFPlus and THECB.
Table 3. The comparison of TPGF, TPGFPlus and THECB.
AlgorithmTwo-Phase Geographic Greedy Forwarding (TPGF) [15]Two-Phase Geographic Greedy Forwarding Plus (TPGFPlus) [14]Two-Hop Energy Consumption Balanced Routing (THECB)
Forwarding mechanismsA forwarding node always chooses the next-hop node that is closest to the sink among all its neighbors, the next-hop node can be farther to the sink than itselfTPGFPlus chooses the next-hop node among its 1-hop and 2-hop neighbors according to three policies. If the chosen node is among 2-hop neighbors, an intermediate 1-hop direct neighbor needs to be selectedThe nearby region around the current forwarder is divided into four parts according to the direction of transmitted packets. The nodes are graded into three levels according to the discharge number. The result of weighted summation of the distance from the 2-hop neighbors to the sink and the residual energy of that neighbor is also considered
The method of solving the routing-loop situationSteps Back and Mark method: In the order from the node that finds this situation to the source node, nodes on the built path attempt to find a newly available pathThe nodes explore the new path according to the sort of the distances from these nodes to the sink
The method of solving the path-circle situationLabel Based Optimization method: Each node is assigned a label. An acknowledgment is sent back to the source node after the path is found. Any node only relays the acknowledgment to its 1-hop neighbor based on the labelDuring exploring the routing path, a node u finding this situation sends a message packet to its 1-hop neighbor to inform it to update the routing table and transmit data packets to node u directly
Table 4. The important parameters.
Table 4. The important parameters.
SymbolMeaningSymbolMeaning
P L The rated power of the lure lamp ϕ The sum of μ b 1 and μ b 1
E L The energy consumption of the lure lampEThe energy consumption factor
SATE1The state when the SIL only turns on the lure lamp α The weight factor that determines the relative significance placed on D s i n k b 2 and E
SATE2The sate when the SIL turns on both the lamp and the discharges simulation module e a The energy consumed by communication of node a
E S A T E 1 and E S A T E 2 The energy consumption in SATE1 and SATE2 when the voltage changes from U 1 to U 2 E r e s The residual energy
T 1 and T 2 The working time in SATE1 and SATE2 when the voltage changes from U 1 to U 2 AAll the nodes of the found path
E D The energy consumption of one discharge A L o o p The nodes of the routing loop
uThe current forwarder ρ The mean number of neighbors per node
D b a The distance from node a to node b T R The transmission radius
β 1 , β 2 , β 3 and β 4 The the weight factor of the four regions (mentioned in Section 4.3) E r a t Total energy consumption ratio
D L 1 , D L 2 and D L 3 The discharge number is relatively the smallest, medium and the highest E v a r Variance of energy consumption ratio
μ 1 , μ 2 and μ 3 The weight of the node in D L 1 , D L 2 and D L 3 N D L 1 , N D L 2 and N D L 3 The ratio of the number of nodes in D L 1 , D L 2 and D L 3
μ b 1 and μ b 1 The weight factor μ of node b 1 and b 2 T D L 1 , T D L 2 and T D L 3 The data forwarding traffic of the nodes in D L 1 , D L 2 and D L 3
Table 5. The value of important parameters.
Table 5. The value of important parameters.
ParameterValueParameterValue
Network area800 m  × 800 m μ 1 , μ 2 and μ 3 0.2, 0.3 and 0.5
the numeber of nodes100 to 250 β 1 , β 2 , β 3 and β 4 0.05, 0.15, 0.3 and 0.5
T R 90 m to 120 m ε f s 10 pJ∖bit∖m 2
the discharge number of nodes in D L 1 300 to 1500 E c i r 50 nJ∖ bit
the discharge number of nodes in D L 2 1500 to 2250 ε a m p 0.0013 pJ∖bit∖m 4
the discharge number of nodes in D L 3 2250 to 3000 d 0 87.7 m
Table 6. The proportion of different discharges levels in the 15 cases.
Table 6. The proportion of different discharges levels in the 15 cases.
Case123456789101112131415
N D L 3 111113333555779
N D L 2 135791357135131
N D L 1 864206420420200
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Guo, X.; Shu, L.; Yang, X.; Nurellari, E.; Li, K.; Du, B.; Yao, H. Two-Hop Energy Consumption Balanced Routing Algorithm for Solar Insecticidal Lamp Internet of Things. Sensors 2022, 22, 154. https://doi.org/10.3390/s22010154

AMA Style

Guo X, Shu L, Yang X, Nurellari E, Li K, Du B, Yao H. Two-Hop Energy Consumption Balanced Routing Algorithm for Solar Insecticidal Lamp Internet of Things. Sensors. 2022; 22(1):154. https://doi.org/10.3390/s22010154

Chicago/Turabian Style

Guo, Xuanchen, Lei Shu, Xing Yang, Edmond Nurellari, Kailiang Li, Bangsong Du, and Heyang Yao. 2022. "Two-Hop Energy Consumption Balanced Routing Algorithm for Solar Insecticidal Lamp Internet of Things" Sensors 22, no. 1: 154. https://doi.org/10.3390/s22010154

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop