Download - SEEPI - K VinayKumar IIT Guwahati
-
8/3/2019 SEEPI - K VinayKumar IIT Guwahati
1/5
SEEPI: Scalable Energy Efficient Position
Independent Node Scheduling in
Wireless Sensor Networks
S. V. Rao Chirag Makwana K. Vinay KumarDepartment of Computer Science and Engineering
Indian Institute of Technology Guwahati
Guwahati - 781039, India.
{svrao, makwana, k.vinay}@iitg.ernet.in
Abstract- Wireless sensor networks can be used to
monitor environment in remote, unattended, and hostile
environment. Nodes relay on limited power source
without recharging. Therefore, one of the mostimportant requirements of Wireless Sensor Networks
(WSN) is low power consumption. One way of achievingthis is by node scheduling. That is schedule redundant
nodes to sleep mode to conserve energy. This paper
presents Scalable Energy Efficient Position Independent
(SEEPI) node scheduling technique in WSNs. Ourdesign differs from existing approaches in the way that it
does not use position information of the node. Simulation
results on NS-2.28 shows that performance is at par with
the existing methods.
I. INTRODUCTIONRecent developments in micro electro-mechanical
systems and wireless communication have made the
deployment of small, inexpensive, and low-power sensornodes capable of cooperatively monitor physical or
environment conditions. This enables us to deploy large
scale sensor network for real-life applications such as
environmental observation, habitat monitoring, intruder
detection, and so on.
Wireless sensor network nodes rely on limited power
sources and expected to last several months to a year
without recharging as may be deployed in remote,
unattended, and hostile environments. Thus, minimizing the
energy consumption is a primary design concern of wireless
sensor network systems. One way of reducing the power
consumption is by making redundant nodes to sleep. Thus,
an efficient node scheduling scheme can improve the systemlife time by reducing energy consumption in the network.
A node scheduling scheme provides a sleep and wakeup
schedule for nodes without sacrificing network connectivity
and application dependent quality of service (QoS). The
network connectivity guarantees that there exists a path
from any sensor node to the sink/base station. In WSNs,
QoS is application specific and can be measured in different
ways. For example, in surveillance applications like intruder
detection and forest fire detection, probability of detecting
an event should be high. This requires at least one sensor
node to be active in each sub-region of network. In these
applications, percentage of the area of interest covered by
active sensors may be measured as the QoS. Ensuring bothconnectivity and coverage is a new design challenge
introduced by sensor networks which demands the
integration of multi-hop wireless communication andsensing capabilities into a single platform.
In this paper, we proposed a scalable energy efficient
position independent (SEEPI) node scheduling algorithm for
WSNs. The simulation results in NS-2.28, shows that the
SEEPI performance is better than exiting methods. Rest ofthe paper is organized as follows: next section discussesrelated work, third section discusses the proposed SEEPI
protocol, fourth section presents simulation results, and fifth
and final section concludes with pointers to futures work.
II. RELATED WORKMany distinct approaches have been proposed in the
literature for node scheduling. Some of those approaches
have viewed the problem of network connectivity and
sensing coverage independently, while others have provided
solution to both. We briefly discuss these methods in this
section. For complete survey on protocols see [1].
Span [2] is an energy efficient topology maintenanceprotocol for Mobile adhoc networks (MANET). It is a
distributed randomized algorithm that conserves the energy
by turning off the redundant nodes while preserving
connectivity. Each node takes a local decision on whether to
sleep or join the forwarding backbone, as a coordinator,
based on an estimate of how many of its neighbors will
benefit and the amount of energy available with it. Being a
protocol designed for MANET, it guarantees connectivity
but there is no consideration of sensing coverage. Several
other protocols are also proposed for assuring network
connectivity like Ascent [3]. These approaches perform
better when ratio of communication range to sensing range
(Rc/Rs) is less than or equal to 1, but as the ratio increasesthe performance degrades.
Tian et al proposed a node scheduling scheme [4], which
can reduce system overall energy consumption, therefore
increasing system life time, by turning of the redundant
sensor nodes. The coverage based off-duty rule and back-off
based node scheduling scheme guarantees that the original
sensing coverage is still maintained after turning off the
redundant sensor nodes. Each node will take a decision to
turn itself on/off only based on local neighbor information.
If the whole sensing area of a node is fully covered by the
union set of its neighbors (sponsors), then it can be turned
off without affecting system overall sensing range. Any
conflict with the neighbors will be resolved by randomback-off based scheme. To calculate sponsored coverage
authors assumed that either each node knows its location
-
8/3/2019 SEEPI - K VinayKumar IIT Guwahati
2/5
information or is having more than one directional antenna.
Using a location information system or directional antenna
is a very costly approach for wireless sensor networks.
LORD [5] is a localized, reactive and distributed network
coverage protocol. It conserves overall system energy by
minimizing the number of active nodes, localizing the
execution to the dying sensor(s), and minimizing the
frequency of execution by reacting only to the occurrence of
a sensing hole. It consists of two phases, the set-up phaseand the steady phase. When the network is deployed
initially, the setup phase runs, at each node, to determine its
initial state, which is ON or OFF. Once a sensor node
chooses to be ON, it runs still it dies or receives an
intimation to be turned OFF. So fairness is not assured in
this protocol. The steady phase algorithm is invoked before
a sensor si dies to find a set of replacement nodes, si.replace.
This set consisting of a minimum number of sleeping
neighbors, which can cover si. To take such a decision each
node should maintain the list of its sleeping neighbors.
Moreover, it assumed a perfect and reliable communication
layer and location information is available.
CCP [6] is an integrated coverage and connectivity
protocol (CCP), which can configure the network to therequired degree of coverage. Each node takes a local
decision to be active or not based on location information of
it and its neighbors. Location information of neighbors is
maintained in a neighbor table with the help of Hello
messages. Each node runs an eligibility algorithm to decide
to be active or not. The eligibility algorithm checks whether
all intersection points1 inside its sensing circle are covered
by some neighboring sensor or not. If so, it goes to sleep
state otherwise it announces itself as active sensor by
sending a Hellomessage to all its neighbors.In CCP, Rc > 2 Rs is a sufficient condition for coverage toimply connectivity. But for the case Rc < 2 Rs, it uses Span
[2] to provide network connectivity. The eligibility
algorithm assumes each node to know its geographical
location, which is a costlier approach.
The existing protocols, on node scheduling, treat coverage
and connectivity separately. Moreover, all the proposed
solutions are dependant on the position of the nodes.
Therefore, we need a protocol with the following
requirements: first, self configuration is mandatory becauseit is inconvenient or impossible to manually configure
sensors after they have been deployed in hostile or remote
working environments. Second, the design has to be fully
distributed and localized, because a centralized algorithmneeds global synchronization and is not scalable to large
networks. Third, the algorithm should allow as many nodesas possible to be in sleep most of the time. At the same time,
it should preserve the application defined QoS. Fourth, the
protocol should be position independent. We consider these
design issues and proposed scalable energy efficient
position independent (SEEPI) node scheduling algorithm.
III. SEEPINODE SCHEDULINGIn this section we present a scalable energy efficient
position independent (SEEPI) node scheduling in WSNs.
Our protocol makes the following design assumptions:
1 an intersection point of sensing circles of two nodes
Nodes in the network are static and data deliverymodel to the sink is event driven.
Node deployment is nondeterministic and the densityof nodes is high in every region.
All sensor nodes are homogeneous. That is, havingequal communication, computation, and sensing
capability. And node failure is possible only when it
used up all its energy. We denote the communication
range and sensing range of a node by Rc and Rs
respectively.
The SEEPI is mainly divided into three phases. Set of
nodes selected in the first two phases ensures network
connectivity. The third phase nodes helps in maintaining the
coverage.
A. Node Election for Maintaining ConnectivityA set of nodes to ensure network connectivity can be
elected either using the SPAN [2] or LECA [7]. SEEPI uses
LECA, since it selects less number of nodes compare to
SPAN, to conserve power. For the sake of completeness we
briefly discuss the LECA node selection algorithm in the
following paragraphs.Each node periodically broadcasts Hello messages that
contain the nodes status (active or not), its current active
neighbors, and its current neighbors. From these Hello
messages, each node maintains a list of neighbors and active
neighbors, and for each neighbor, a list of its neighbors and
active neighbors. Nodes in the network wake up periodicallyand collect this information by listening for a brief period
before participating in the election algorithm.
Phase1 Sensor
Fig. 1. Scenario after Phase 1
1) Phase-1 (Independent Set Construction): The first
phase is a process to select the best set of nodes that
constitute the minimal independent set for the network athand. This selection is done in a distributed manner using
-
8/3/2019 SEEPI - K VinayKumar IIT Guwahati
3/5
the neighbor information collected through Hello packets
during listen period. Each node decides to be a active or not
based on the following heuristics:
Nodes that have higher number of neighbors without aphase-1 sensor are given more preference. Because,
such a nodes can help a larger number of neighbors in
communication.
Nodes that have power greater than certain thresholdor higher amount of percentage of remaining power
are given more preference over others to be elected as
phase-1 sensors. This introduces the required fairness
in the protocol by ensuring proper rotation in the
selection of phase-1 sensors.
These selected phase-1 sensors go back to sleep after they
have used up a fixed percentage of their power to ensure
fairness by allowing other nodes to become phase-1 sensors.
Announcement contention occurs when multiple nodes
discover the lack of a phase-1 sensor at the same time, and
all decide to become a phase-1 sensor. It resolves with a
randomized back-off delay. That is, each node chooses a
random delay value, and delays theHello
message thatannounces the nodes volunteering as a phase-1 sensor for
that amount of time. The delay value depends on the extent
to which the node is satisfies heuristics. At the end of the
delay, the node reevaluates its eligibility based on Hello
messages recently received, and makes its announcement if
and only if the eligibility rule still holds. Fig. 1 shows a
scenario after phase-1.
Phase2 Sensor
Phase1 Sensor
Fig. 2. Scenario after Phase-2
2) Phase-2 (Connecting the Independent Set): In the
second phase, more nodes are selected to connect the phase-
1 sensors and make connected network. The node selectionis based on the following criteria:
Nodes having higher amount of percentage ofremaining energy.
Nodes having more number of phase-1 sensors in the1-hop neighborhood. This rule helps in selecting a
sensor which can connect more phase-1 nodes.
Contention, if any, is also resolved using the back off
mechanism discussed earlier.
Phase2 SensorPhase1 Sensor Phase3 Sensor
Fig. 3. Scenario after Phase-3
B. Election for Maintaining Coverage (Phase-3)First two phases of the election algorithm ensures
connective. The third phase of the algorithm ensures
coverage by electing more sensors. Moreover, it elects a
small number of sensors to avoid any large redundant
coverage.
We have to choose nodes which are going to cover largeuncovered area. An inactive node need not to be selected if
it is very close to an active node, because, such a nodes
coverage area largely overlap with the near by active node.
Another observation is, if an inactive node is far away from
the active node, no need to consider such far away active
nodes for deciding the status of inactive node, becauseintersection of the coverage area of these nodes is very less.
Experimentally, we have fixed two parameters dmin = 0.2Rs
and dmax = 1.4 Rs to classify very close and far away
neighbor respectively. We need to estimate the distance of
each 1-hop neighbor to make use ofdmin and dmax. This can
be done using received signal strength. Distance of each 1-hop neighbor is maintained in the neighbor table and sends
along the Hello messages.
Sensors which are not selected in first two phases are
participating for deciding their status using the following
heuristics.
If there is an active sensor within range dmin then nodedoes not become active. This heuristic is based on the
intuition that if such sensor will become active then itwill not help in covering much area but will increase
redundancy.
-
8/3/2019 SEEPI - K VinayKumar IIT Guwahati
4/5
If there is no active sensor or only one active sensorwith in the range dmax then the node is eligible to
become active in this phase. Such node uses a random
back-off delay for announcing its status as active node.
After this delay period, it will again check its
eligibility and will make an announcement if eligible.
If there is more than one active sensor with in therange dmax then it will check whether there is any pair
of nodes whose distance between them is less than or
equal to dmax. If yes then the node is not eligible. This
is because if such node will become active then it will
not help in covering much area but increase
redundancy.
Nodes, which are not selected in these three phases, are
go to sleep to conserve energy. After spending a fixed
amount of time in the sleep state, each node comes up and
participates in the election process, by checking eligibilitycriteria of three phases discussed above.
C. Node WithdrawalIn order to rotate the node active status among all nodes
fairly, each node will withdraw after some fixed interval oftime or when it has used up some percentage of its energy.
Each node marks itself as a tentatively active and announces
its withdrawal by sending Hello message. A tentatively
active node still forwards packets and sense the
environment. However, the election algorithm described
above treats a tentatively active node as a non-active. A
node stays tentatively active for some fixed amount of time,
and then goes to sleep mode.
IV. SIMULATION ENVIRONMENT AND RESULTSWe simulated our algorithm in the NS-2.28 network
simulator with CMU wireless extension and compared with
CCP. The CCP code for NS-2.1b1 is obtained from [6] andported to NS-2.28. We have used the following simulation
scenario.
Fig.4. Number of active nodes VsRc/Rs
Both the protocols were run on top of the 802.11 MAC
layer in 400 X 400 m2 coverage region with 160 randomly
distributed stationary nodes. Two sources and two sinks are
placed in opposite sides one at each corner. Each of the
sources sends a CBR flow to sink node located on the other
side of the region. Each CBR flow sends 128 byte packets
with 3Kbps rate. We have used AODV routing because it
suits the event driven application environment where each
node upon detecting an event sends data to sink node and
route is established on the fly. Nodes in our simulation use
radio with a 2Mbps bandwidth and a sensing range of 50m.
We used TwoRayGround radio propagation model in all
NS-2 simulations.
Fig. 5. Average energy consumed per node VsRc/Rs
Fig. 6. Coverage VsRc/Rs
To measure the performance of both CCP and SEEPI
under different ratio of communication range/sensing range,
we varied the communication range by setting appropriate
value of transmission power. The results are average of five
different randomly chosen scenarios for 500 seconds.
Fig. 4, 5, 6, and 7 represent number of active nodes,
average energy consumption, coverage percentage, and
delivery ratio respectively of the protocols SEEPI and CCP
with varying ratio ofRc/Rs. The ratio of successful events
reported to sink and total events detected defined as delivery
ratio.
Fig. 4 shows that number of active nodes decreases asRc/Rs increases for both the protocols. This is because as
communication range increases the nodes required to make
-
8/3/2019 SEEPI - K VinayKumar IIT Guwahati
5/5
network connected decreases. Moreover, it show that our
protocol results in less number of active nodes.
As our protocol activates less number of nodes its average
energy consumption per node is less than that of CCP and
that is represented in Fig. 5. The CCP uses node location
information for activating sensors, where as SEEPI does
without it. SEEPI achieves near 100\% coverage for all
cases as shown in Fig. 6.
Fig. 7. Packet Delivery Ratio VsRc/Rs
The simulation results shows that SEEPIs performs is at
par with CPP with less power consumption and with out
using location information.
V. CONCLUSION AND FURTHER REMARKSThis paper explores the problem of energy conservation in
wireless sensor network while maintaining both connectivity
and acceptable level of sensing coverage. Our simulation
results show that the coverage and delivery ratio achieved
by SEEPI are nearer to that of CCP, while average energy
consumption of node is less than that of CCP without using
location information. Our design uses local informationstored in neighbor table, so it is efficiently scalable.
Moreover, our protocol works under node mobility also. It
would be interesting to study how SEEPT works for query
driven applications and target tracking applications.
REFERENCES
[1] Kemal Akkaya and Mohamed Younis, A survey on routing protocolsfor wireless sensor networks, Ad Hoc Networks, vol. 3, no. 3. pp.325349, 2005.
[2] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, Span: Anenergy-efficient coordination algorithm for topology maintenance in
ad hoc wireless networks, Wirel. Netw., Vol. 8, no. 5, pp. 481494,2002.
[3] A. Cerpa and D. Estrin, ASCENT: Adaptive Self-Configuring sensor
Networks Topologies, IEEE Transactions on Mobile Computing, vol.3, no. 3, pp. 272285, 2004.
[4] D. Tian and N. Georganas, "A Coverage-preserving Node SchedulingScheme for Large Wireless Sensor Networks", 2002 [online]
citeseer.ist.psu.edu/tian02coveragepreserving.html.
[5] A. Ghosh and T. Givargis, LORD: A Localized, Reactive and
Distributed Protocol for Node Scheduling in Wireless SensorNetworks, in DATE, pp. 190-195, 2005.
[6] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. D. Gill,Integrated coverage and connectivity configuration in wireless
sensor networks, in SenSys, pp. 2839, 2003.[7] R. Hegde, Power aware mobile ad hoc networks", M.Tech Thesis,
Indian Institute of Technology Guwahati, 2005.