Cross-Layer Design for Energy-Efficient Reliable Multi-Path Transmission in Event-Driven Wireless Sensor Networks

In event-driven wireless sensor networks (WSNs), a reliable, efficient, and scalable routing solution is required for the reliable delivery of sensory data to the base station (BS). However, existing routing algorithms rarely address the issue of energy efficiency under multi-path conflicts for multi-event-driven scenarios. In order to maximize energy efficiency while maintaining a manageable conflict probability, this paper investigates a cross-layer design of routing and power control for multi-event-driven WSNs. We first develop a mathematical characterization of the conflict probability in multi-path routing, and we then formulate the energy efficiency maximization problem as a non-convex combinatorial fractional optimization problem subject to a maximum conflict probability constraint. By utilizing non-linear fractional programming and dual decomposition, an iterative search algorithm was used to obtain near-optimal power allocation and routing solutions. Extensive results demonstrate that our proposed algorithm achieved a gain of 9.09% to 35.05% in energy efficiency compared to other routing algorithms, thus indicating that our proposed algorithm can avoid unnecessary control overhead from multi-path conflicts with a lower conflict probability and can ensure maximum energy efficiency through routing and power control design.


Introduction
WSNs typically consist of a series of distributed sensor nodes that generate data in response to event triggering and forward it to the BS via multi-hop transmission. Reliable and energy-efficient transmission are two of the most critical issues in the design of routing algorithms for wireless networks, especially for dense networks with stringent energy constraints.
For the former, the random selection of intermediate nodes reduces the stability of the route due to the uncertainty of node behavior, thereby jeopardizing the reliability of data transmission and thus reducing the performance of the network in terms of the packet delivery rate (PDR) [1]. When there is an intermediate node interruption in the route, it may cause multi-hop communication to fail. The nodes must rely on route discovery cycles or timeouts to reestablish routes [2]. This not only leads to a proliferation of network-wide routing requests that consume significant network resources, but also increases packet transmission delays. Therefore, in order to establish stable routing and maintain continuous traffic flow, it is necessary to evaluate the ability and reliability of nodes in relaying transmissions to make informed routing decisions. In recent years, many reliable routing algorithms have been proposed for wireless networks [3][4][5][6]. These algorithms improve the reliability of end-to-end transmission by considering the channel state information and the collaboration power information of the nodes to minimize the outage probability.
However, these algorithms have poor scalability due to not considering interference conflicts between multiple paths. As the number of trigger events increases, interference conflicts between routes increase, which may affect the overall performance of the network and prevent the network from achieving the desired performance improvement. Specifically, when the network uses a carrier sense multiple access (CSMA)-based MAC protocol to eliminate contention and retransmission caused by conflicts, the increased probability of inter-path conflict increases the chance of interaction between nodes, which not only brings more interaction overhead, but also reduces transmission concurrency and thus compromises transmission efficiency. Therefore, the conflict probability between multiple paths is also a major factor to be considered in the extension to multi-event-driven routing algorithms.
In addition, due to the explosive demand for data services and energy-intensive wireless devices, energy efficiency is another critical issue in the design of routing algorithms and is of great importance for energy-constrained WSNs. Many energy-efficiency-oriented studies incorporate power control techniques to reduce network energy consumption [7][8][9]. In addition, there are several studies that achieved power reduction in routing designs via multi-hop short-range data communication [10][11][12]. However, paths with a large number of relays imply low throughput. The limited energy resources of the sensor nodes force a trade-off between throughput and energy consumption when determining the route to the BS [13]. Energy efficiency, defined in bits/joules, has been increasingly accepted as an attractive metric for assessing the performance of communication systems [14,15]. Therefore, studying the energy efficiency of data transmission is particularly important for the design of future wireless communication systems.
Overall, the study of how to improve transmission reliability within an acceptable conflict probability and how to improve the energy efficiency of the network are important performance requirements in many application scenarios. Especially in multi-event-driven WSNs, the presence of multi-path conflicts not only introduces more interaction overhead, but also reduces transmission concurrency, thus significantly affecting the performance of energy efficiency. To address this problem in multi-event-driven scenarios, this paper proposes a cross-layer optimization problem for joint routing and power control that maximizes energy efficiency within an acceptable conflict probability. The main contributions of the paper are summarized as follows: • A formal definition and formulation of the collision probability under multi-path transmission in multi-event-driven WSNs is presented, and then an energy efficiency maximization problem is formulated as a non-convex combinatorial fractional optimization problem under the constraints of maximum conflict probability, minimum success probability, and maximum transmission power. • A dual-based iterative search algorithm with acceptable complexity is proposed to solve the optimization problem efficiently. To make it tractable, we employ the Dinkelbach transformation to convert the problem in fractional form into a problem in subtractive form, and then use the Lagrangian dual method in an iterative manner to obtain an approximate optimal power allocation and routing solution. • Numerous results show that our proposed algorithm achieved a gain of 9.09% to 35.05% in energy efficiency and reduced network energy consumption by 17.09% to 39.12% compared to other routing algorithms. The advantage is attributed to the power control design that avoids excessive energy consumption on the one hand, and a controlled conflict probability that reduces unnecessary control overhead caused by multi-path conflicts and improves transmission concurrency on the other hand.
A system overview of our cross-layer design is provided in Figure 1 to give the reader a complete impression of the algorithm.

Related Work
Reliable and energy-efficient transmission have been two of the most critical issues in the design of routing algorithms for wireless networks, especially for dense networks with strict energy constraints. In the following, we discuss related work and motivations from these two perspectives.
In recent years, many reliable routing algorithms have been proposed for wireless networks. The author in [16] proposed a cross-layer routing algorithm using fuzzy logic and topological control to reduce the control cost and improve routing reliability. The algorithm classified nodes into different classes based on their relay node degrees and adjusted their transmission power based on their classes. The source nodes determined their relay priority based on the utility of the candidate relay nodes, i.e., the relay node with the highest utility was responsible for forwarding the packet to the next hop. In [17], C. Xu et al. developed a packet reception probability model based on SINR, packet queue length, and link availability to describe the reliability of the links. Based on this, the routing decision problem was formulated as a constrained multi-objective optimization problem that attempted to find a link with the highest packet reception probability as a relay link. The author in [3] investigated how to construct minimum power routing with end-to-end reliability constraints. In [4], W. Yang et al. proposed an interruption-optimal relay selection algorithm based on a fuzzy comprehensive evaluation. By considering the channel state information and the collaboration power information of nodes, the optimal relay was selected using fuzzy-integrated judgment, thus minimizing the outage probability, i.e., maximizing the reliability of end-to-end transmission. F. Mansourkiaie et al. in [5] investigated a routing algorithm that used cooperative routing in WSNs to minimize the collision probability. The optimal route from each source to the aggregation node was established by providing the optimal set of relays in each route, the optimal set of hops, and the optimal power allocation for the transmission link. A hybrid K-means and logisticregression-based algorithm was proposed in [18] for efficient and timely routing with minimal data loss.
In addition, for energy-constrained WSNs, the energy issue is also an essential research point in the design of routing algorithms. In [19], an energy-efficient optimal relay selection (EEORS) algorithm was proposed for underwater wireless networks, the core of which was to select relay nodes by combining the location and depth of the sensor nodes. The author in [12] achieved power consumption reduction via multi-hop short-range data communication. Numerical results in [10] verified that the multi-hop short-distance strategy can save up to 52% in power consumption. However, paths with a large number of relays imply low throughput. In [20], T. Kaur et al. proposed a QoS-aware cross-layer routing algorithm based on a multi-objective ant colony optimization. The algorithm considered the energy consumption and throughput as two optimization objectives to select the optimal routing path for event data transmission by using multi-pheromone information and multi-heuristic information consisting of two objective functions. In addition, many studies have typically employed power control techniques to reduce network energy consumption. In [21], a distributed energy-efficient and reliable routing algorithm with adaptive transmission power control was proposed by combining routing algorithm at the network layer and power control policy at the physical layer. A distributed routing algorithm based on optimal power allocation was proposed in [9] that achieved the minimum total transmit power from the source to the destination nodes. The author in [22] investigated an energy-efficient collaborative transmission problem and transformed it into a non-convex constrained optimization problem. Based on fractional programming and dual decomposition, a distributed iterative algorithm for power splitting, power allocation, and relay selection was developed to solve the optimization problem.
In general, most existing routing algorithms focus on data transmission on a single route, with little consideration given to multi-path transmission in multi-event-driven networks. Compared to previous routing algorithms, the design of cross-layer optimization for multi-path transmission is more challenging. On the one hand, there is the joint optimization of routing and power control to find the optimal transmission path and the optimal power allocation for the route. The decision processes are coupled with each other, which often leads to non-linear optimization and thus makes it difficult to provide the best solution. On the other hand, the conflict probabilities between multiple paths are difficult to evaluate systematically, and the high computational complexity and long computation times limit the applicability of the algorithms in practice due to the inherent difficulty of the problem. In this paper, we formally provide a mathematical characterization of the conflict probability in multi-path routing and propose an iterative dual-based search algorithm with acceptable complexity to efficiently solve the problem of maximizing energy efficiency with controlled conflict probability.

System Model
In this section, we first introduce the system description of the network architecture, transmission rate, and power consumption, and we then formalize the definition and expression of the collision probability in multi-path transmission.

System Description
We consider a tightly integrated event-driven wireless sensor network consisting of a BS and N deployed sensor nodes: N 1 , N 2 , . . . , N n . The sensor nodes are triggered by different events to collect event information (e.g., temperature, pollution level, fire level, etc.) and send it to the BS via multi-hop transmission [23]. Assume that there are K routing paths, K 1 , K 2 , . . . , K k , each of which contains multiple relay nodes. Figure 2 shows the transmission architecture of the network.

Figure 2.
A topological structure of multi-hop transmission in a multi-event-driven network. The white circles represent the sensor nodes in an idle state; the black circles represent the event-driven nodes, which are responsible for generating event messages and forwarding them to the relay node; the gray circles represent relay nodes, which are responsible for forwarding event information to the base station.
Similar to [24], we use a parameter g i,j to capture the loss of the signal power as the signal propagates from source node N i to destination node N j through the wireless channel. Therefore, the power received by N j from N i is p i g i,j , where p i denote the transmit power of N i . Then, the transmission rate at N j for N i is expressed as follows [25]: where B represents the channel bandwidth, and σ 2 is the power level of the ambient noise. Assume that each node is able to continuously adjust its transmission power from minimum to maximum. The consumed power for N i includes a practical allocated power and a fixed circuit power P 0 [26], which is given by the following: where ξ i represents a power amplifier coefficient of N i . For convenience, the parameters used in this paper are listed in Table 1.
. . , N n represent the randomly distributed sensor nodes in a event-driven WSN.
. . , K k represent the routing paths from the k-th event triggered node to the BS, respectively.
Channel gains, used to capture the loss of signal power as the signal propagates from the source node N i to the destination node N j . p i The transmission power of node N i during data transmission. p max The maximum transmission power allowed for nodes during data transmission. B The channel bandwidth. σ 2 The power level of the ambient noise.

L i
The length of the data package to be transmitted by N i .
The power amplifier coefficient of N i . I s th Carrier listening threshold, beyond which the channel is considered busy. I f th Interference threshold, below which the interfering node does not affect the signal reception of the destination node. ρ k i Binary scheduling variable: Conflict probability threshold that is the maximum allowed conflict probability of the routing path. θ β Success probability threshold that is the minimum probability of successful transmission expected by the routing path.
Lagrange multipliers corresponding to the maximum conflict probability constraint.
Lagrange multipliers corresponding to the minimum success probability constraint. τ r (t) Positive diminishing step size, where t is an iteration index ε Convergence coefficient, which is a small value that controls the convergence of the algorithm.

Iter max
Maximum number of iterations, which is used to control the stopping of the iterative algorithm.

Conflict Probability Model for Multi-Path Transmission
A CSMA-based MAC protocol is applied to eliminate contention and retransmission caused by conflicts. When a relay node accesses the channel, it may restrict the transmission of the relay nodes in other routing paths within the listening range. The probability of a relay node interfering with the relay nodes in other paths is defined as the multipath conflict probability. Next, we provide the formal mathematical expression for the conflict probability.
As shown in Figure 3 . . , L f M and L i as the length of the data package to be transmitted by N f 1 , N f 2 , . . . , N f M and N i , respectively. The nodes within the transmitter's listening range are not allowed to transmit while employing the carrier listen multiple access and conflict avoidance (CSMA-CA) technique for channel access. When N i and N f m , ∀m ∈ [1, M] broadcast data simultaneously, but N i is unaware of N f m , there is a conflict collision at the destination node of N f m . Assuming that the arrival process of the data packet conforms to the Poisson distribution process, the probability density of the Poisson distribution is expressed as follows: where λ refers to the total number of data packets expected to be received within a specific duration T, and x represents the total number of data packets actually received in T. Then, the transmission duration from N f m to its relay node N f n is calculated as follows: where R f m denotes the transmission rate of N f m . During this period, the probability that N f m receives one data packet from N i can be calculated as follows: Thus, the probability that N i and N f m have data transmission simultaneously is given by the following: Denote p m sens (i) = p I s i,m < I s th as the perceived probability that N i cannot detect that N f m is sending data at the same time, and I s th is the carrier listening threshold, above which the channel is considered busy. p m in f (i) = p I f i,m < I f th represents the probability that the signal strength sent from N i to the destination node of N f m is greater than the interference threshold I f th . Assuming that the received signal is Rayleigh-distributed and that the signal-to-noise ratio is exponentially distributed [27], we have the following: Thus, the probability of N i causing a conflict to N f m is expressed as follows: Then, the probability of N i causing conflicts with N f (i) = N f 1 , N f 2 , . . . , N f M within its listening range can be obtained by the following:

Problem Formulation of Energy Efficiency Maximization
In this section, we study an energy efficiency maximization problem under reliability constraints, and we provide a mathematical model for joint routing and power allocation.
Let N denote the set of sensor nodes and K denote the routing paths. We define a binary scheduling variable ρ k i for node N i in routing path k.
Since a node can only transmit data for a single event, i.e., it can only be assigned to one path, we have ∑ k∈K ρ k i ≤ 1, ∀i ∈ N. Denote p i , ∀i ∈ N as the allocated power for N i , and denote g i,j , ∀i, j ∈ N as the channel gain for N i to its next-hop relay node N j . Then, according to Equations (1) and (2), the achievable transmission rate of N i can be expressed as follows: and the consumed power for N i is can be defined as follows: Definition 1. (Energy efficiency): The system energy efficiency is defined as the total transmission rate R tol (ρ, p) over the total transmission power P tol (ρ, p), which is expressed as follows: Denote N f (i) as the interfering nodes in the sensing area of N i . As discussed in Section 3.2, the probability of N i causing conflicts with N f (i) within its listening range is expressed as follows: Similarly, P sucs (i) = P I i,j > I s th represents the probability of N i successfully transmitting to N j , which is specifically expressed as follows: In order to construct a reliable and energy-efficient transmission path, we designed a cross-layer optimization model to find the optimal routing policy ρ and power allocation policy p with the objective of maximizing energy efficiency under reliability constraints. The optimization problem can be formulated as follows: Constraint C1 defines the binary scheduling variable, and Constraint C2 reveals that each node can only undertake the forwarding task of at most one event. Constraint C3 indicates that the probability of the multi-path conflict is not greater than the conflict probability threshold θ α . Constraint C4 is for ensuring the success transmission probability of the routing path, where θ β is the target end-to-end success probability. The transmission power of each node is indicated by Constraint C5.

Dual-Based Iterative Search Algorithm for Energy Efficiency Maximization Problem
In this section, we propose an iterative search algorithm that uses non-linear fractional programming and Lagrange dual theory to obtain the approximate optimal solution of the energy efficiency maximization problem.

Dinkelbach Transformation
First, using non-linear fractional programming, the objective function in fractional form is converted into an equivalent objective function in subtractive form [22,25]. Theorem 1. Denote a maximum weighted energy efficiency as follows: The maximum energy efficiency q * is achieved by the optimal routing and power allocation policies (ρ, p).
Theorem 1 reveals that the fractional programming problem (17) can be transformed into an equivalent subtractive-form optimization problem (19). Dinkelbach provides an iterative algorithm for solving this optimization problem [25]. Specifically, in each iteration, for a given parameter q, the transformed maximization problem (19) is solved by dual decomposition and obtains the alternative optimal routing and power allocation policies (ρ, p). Then, update the q and use it to solve the maximization problem (19) in the next iteration until it reaches the maximal iterations or until the condition R tol (ρ, p) − qP tol (ρ, p) < ε is satisfied. The transformed problem for q can be expressed as follows: Since the dual variable ρ k i ∈ {0, 1}, the problem remains a mixed combinatorial optimization problem, which is typically non-convex and NP-hard. The literature [22] has proven the zero duality gap between the problem (20) and its dual problem, which implies that the optimal solution of the dual problem is also the solution of the original problem. Therefore, we next use the Langerian dual method to solve the problem (20).

Dual Problem Formulation
According to the Taylor formula, we have lim x→0 (exp(−x)) = 1 − x and lim x→0 (1 − exp(−x)) = x. By using a first-order Taylor polynomial approximation on Equation (15), Equation (15) can be simplified to the following: Then, Constraint C3 can be written as follows: Similarly, P sucs (i) can be expressed as 1 − σ 2 (2 I s th − 1)/p i g i,j , and we have the following: Then, we provide the Lagrangian function of problem (20) via the following: where . . , λ N }, and µ = {µ 1 , µ 2 , . . . , µ N } are the Lagrange multipliers corresponding to the maximum conflict probability of Constraint C3 and the minimum success probability of Constraint C4, respectively. According to Equation (24), the dual function h(ρ, p, λ, µ) can be formulated as follows: Note that the solution to Equation (20) can be derived from the dual problem (25). Next, we apply an iterative approach to solve the dual problem. By employing the KKT conditions, we first optimize the Lagrangian over the primal variables (ρ, p) given the dyadic variables (λ, µ). Then, using the primal variables (ρ, p), we update the dyadic variables (λ, µ) using the subgradient method. Figure 4 shows the iterative process, the details of which will be illustrated in the following section.

Power Allocation and Routing Assignment
Given λ and µ, the optimal p i can be obtained through KKT conditions. By taking the derivative of L(ρ, p, λ, µ) with respect to p i to zero and solving the following equations, we have the following: Then, the optimal power allocation of N i is obtained as follows: where min(x, b)). With the fixed variables p i , µ i , λ i , the Lagrangian function L(ρ, p, λ, µ) is linear with respect to ρ k i and falls in the interval {0, 1}. Hence, the maximum value of L(ρ, p, λ, µ) can be divided into two situations: (1) if ∂L(ρ, p, λ, µ)/∂ρ > 0, then the maximum value can be obtained via ρ k i = 1; and (2) if ∂L(ρ, p, λ, µ)/∂ρ < 0, then the maximum value can be obtained via ρ k i = 0. That is, which can be regarded as the marginal benefit of assigning N i to path k. Therefore, we allocate the N i with the largest M k i as a relay node to path k. ρ k i satisfies the following as a result:

Dual Problem Optimization
Given λ and µ, Equations (27) and (29) provide the optimal routing and power allocation policies ρ * , p * . By substituting ρ * , p * into Equation (25), we can obtain the function of the dual problem as the following: Since the dyadic problem is, by definition, always a convex optimization problem, the commonly used gradient descent and ellipsoidal methods can be used to update the dyadic variables and converge towards a globally convergent optimal solution. In this paper, we used the gradient descent method to obtain the optimal values of λ and µ.
Specifically, the Lagrange multipliers update with the following equations: where t is an iteration index, and τ r (t) is positive diminishing step size, which satisfies the following: At each iteration, the Lagrange multiplier λ, µ is adjusted by Equations (31) and (32). The variables ρ, p of Equations (27) and (29) are then adjusted by using the updated Lagrange multipliers. The process is repeated until convergence is achieved or until the maximum number of iterations is reached. Algorithm 1 outlines the pseudo-code of the entire process.

Simulation Results
In this section, the effectiveness of our proposed algorithm has been evaluated through extensive simulations in Matlab.

Simulation Setup
We applied the dataset generation framework in [28] to randomly deploy 50∼150 sensor nodes and 5∼20 event trigger nodes in a 100 × 100 m 2 area. The initial energy and maximum transmission power of the sensor nodes were assumed to be equal and set to 0.1 J and 0.1 W, respectively. The listening area range of each node was similarly fixed at 20 m. In order to characterize different types of event triggers, it was assumed that different trigger nodes generated packets of different sizes from 10 to 100 (bit/ms) in each time interval and forwarded them to a centrally located BS in a multi-hop manner. We assumed the channel bandwidth (B) equaled 200 KHZ, and the power of ambient noise (σ 2 ) equaled −90 dBm. Referring to [5], we assumed that the carrier listening threshold (I s th ) and interference threshold (I f th ) were equal to the power of the ambient noise, I s th = I f th = σ 2 . The conflict probability threshold (θ α ) and the success probability threshold (θ β ) were set to 0.5 and 0.85, respectively. For the iterative search algorithm, the maximum number of iterations (iter max ) was defined to be 20. ε is a small value used to control the convergence of the algorithm, which was set to 0.001. The considered simulation parameters were cited from [5,21,28] and are given in Table 2.

Performance Analysis
To begin with, we studied the convergence of our proposed algorithm, and Figure 5 depicts the evolution of the energy efficiency with the number of iterations under the conflict probability threshold θ α = {0.2, 0.3, 0.4, 0.5, 0.6}. It is apparent that the energy efficiency increased with the number of iterations and converged within 11 iterations in all situations. It is also observed that a larger θ α led to lower network energy efficiency. In MINLP, the conflict probability is a constraint function during routing, which requires that the conflict probability caused by either routing path cannot be greater than a threshold θ α . An increase in θ α implies that more strongly interfering relay nodes are allowed, which result in more collision conflicts when nodes transmit. As a result, the energy efficiency gradually decreases due to the loss of throughput caused by interference avoidance and the loss of energy consumption caused by control messages (e.g., RTS/CTS). Next, we verified the energy efficiency of the proposed algorithm with respect to the number of trigger event nodes K and the number of sensor nodes N. Figure 6 depicts how the energy efficiency varied with N for K = {5, 10, 15, 20}. As we can observe, the energy efficiency increased with the increase in N. This is because, on the one hand, the more nodes that were deployed, the shorter the average distance between two neighboring nodes and, therefore, the lower the transmission power required. On the other hand, in denser networks, nodes have more neighbors and, therefore, more options for data transmission, thus resulting in better energy efficiency performance. However, as N increased further, the increase in energy efficiency became slower and eventually stabilized. This was mainly due to the shortening of the transmission distance, which caused more collision delays and the energy consumption of control messages. Also, it can be observed that the energy efficiency was inversely proportional to K. Similarly, an increase in the number of trigger events undoubtedly caused more collisions. This not only reduced the transmission concurrency, but also caused more control overhead, which led to a degradation of the energy efficiency performance.

Performance Comparison
In this section, we compared the performance of our proposed algorithm with several existing routing algorithms, such as the DPRC algorithm presented in [21], the TOR algorithm presented in [29], and the MACO-QCR algorithm presented in [20]: • DPRC (an energy-efficient routing algorithm with adaptive transmission power control): DPRC uses cross-layer design techniques that integrate network layer routing and physical layer power control strategies to construct minimum power routing with end-to-end reliability constraints; • TOR (a throughput-optimal routing algorithm): TOR analyses the given relationship between the throughput and distance and determines the physical location of the relay to achieve the optimum MAC throughput from the trigger node to the target BS; • MACO-QCR (A QoS-aware cross-layer routing algorithm based on a multi-objective ant colony optimization): MACO-QCR considers energy consumption and throughput as two optimization objectives to select the optimal routing path for event data transmission by using multi-pheromone information and multi-heuristic information consisting of two objective functions.
In general, all of the above comparison algorithms are proposed routing algorithms for multi-hop transmission in WSNs. First, Figure 7 presents a comparison of the energy efficiency that varied with the number of trigger event nodes. It shows that our proposed algorithm exhibited much better performance regarding energy efficiency than the other algorithms and was 20.52% higher in efficiency than the DPRC, 35.05% higher than the TOR, and 9.09% higher than the MACO-QCR. Clearly, the TOR had the lowest energy efficiency, which is due to the absence of a power control mechanism, thus resulting in unnecessary energy consumption. The DPRC and MACO-QCR utilize power control to lower the energy consumption of the network, and the MACO-QCR further trades off energy consumption and throughput in its routing design. Both algorithms are effective in improving the energy efficiency of the network to a certain extent; however, they do not take into account the problem of interference collisions between nodes. As the number of trigger events increases, collisions between relay nodes not only introduce more energy consumption in control messages, but also reduce transmission concurrency, thus resulting in throughput degradation. Conversely, our algorithm maximized energy efficiency under the constraint of minimizing collision probability, which can effectively improve energy efficiency while accommodating interference collisions in multi-path transmission. In Figure 8, we compare the energy consumption for all algorithms in the same network scenario as in Figure 7. It can be observed that our algorithm had the lowest energy consumption, followed by the DPRC, the MACO-QCR, and the TOR. Specifically, the energy consumption of our algorithm was reduced by 17.09%, 24.84%, and 39.12% compared with the DPRC, MACO-QCR, and TOR, respectively. The TOR, as a throughput optimization method, always obtains the highest throughput at the expense of energy consumption, while the energy-efficiency-oriented DPRC and MACO-QCR algorithms have significant consumed control overhead during interference avoidance in multi-event triggered scenarios, as they do not consider interference conflicts for multi-path transmission. In contrast, our algorithm provides a mathematical characterization of the conflict probability under multi-path transmission and combines routing and power control to reduce the conflict probability of multi-path transmission, thus effectively reducing the network energy consumption. Next, we further compared the energy efficiency of all the algorithms at different network densities. From Figure 9, we can observe that the energy efficiency was highest at N = 150, and smallest at N = 50, which is consistent with the results in Figure 6. With the number of sensor nodes from 50 to 150, our algorithm outperformed the MACO-QCR by about 9.68%, the DPRC by about 18.48%, and the TOR by about 29.55% on average. It can be seen that our proposed algorithm achieved better performance than other algorithms in both dense and sparse networks. This further illustrates the advantage of our algorithm in terms of energy efficiency.
Finally, Figure 10 compares the energy losses of all the algorithms for different network densities. Similarly, it can be seen that better transmission performance could be produced in denser networks due to the greater number of data transmission options available to the nodes. As the network density increased, the energy consumption of our algorithm decreased from 4.23 J to 3.31 J, which was less than that of the MACO-QCR, DPRC, and TOR algorithms. In particular, the average energy consumption of our algorithm with N = 50, 100, 150 reduced by about 16.37% compared to the MACO-QCR, by about 23.06% compared to the DPRC, and by about 37.99% compared to the TOR. This comparison proves that our algorithms can effectively reduce the transmission energy consumption of the network and thus extend the lifetime of the network.

Conclusions
In this paper, we addressed the joint routing and power allocation problem from a cross-layer design perspective, thereby effectively maximizing the energy efficiency of the network within an acceptable probability of collision. First, the collision problem for multi-path transmission was defined and formulated formally. Then, the joint optimization problem was formulated as a mixed integer and non-linear programming problem, thereby enabling multi-path transmission to maximize energy efficiency and to satisfy the practical requirements of low conflict probability and high reliability. To solve this NP-hard problem, we provided a near-optimal solution for power allocation and routing using non-linear fractional programming and dual decomposition. Numerous results demonstrated that the routing and power control design enabled our proposed algorithm to achieve 39.12% lower energy consumption than the existing routing algorithms. In addition, our algorithm effectively avoided excessive energy consumption and reduced unnecessary control overhead caused by multi-path conflicts, thus achieving a 9.09% to 35.05% improvement in energy efficiency.
Our algorithm is a centralized algorithm that requires global information to manage multi-path transmission in event-driven WSNs. In the follow-up research, we will consider expanding a distributed routing algorithm to maximize energy efficiency while avoiding multi-path conflicts.
Author Contributions: H.X. developed the basic idea, devised the main methodology, worked on the simulations, and wrote this paper; X.Y. is an expert in the application reserach of wireless sensors networks. All authors have read and agreed to the published version of the manuscript.
Funding: This work was supported by National key research and development program under grant2021YFB3202105-2.