Fundamental Protocols for Wireless Sensor Networks

合集下载

无线传感器网络中的路由协议

无线传感器网络中的路由协议

无线传感器网络中的路由协议随着科技的不断发展,无线传感器网络(Wireless Sensor Network,WSN)已经逐渐成为了一种被广泛研究和应用的技术。

无线传感器网络拥有广泛的应用领域,如军事、环境监测、智能家居、健康管理等。

在这些应用中,无线传感器网络的安全、可靠性和生命稳定性是至关重要的。

为了保证上述三个要素,需要一个高效、稳定且可扩展的路由协议来管理无线传感器网络中的数据传输和路由决策。

无线传感器网络与传统的局域网和广域网不同,它不具有结构上的中心,而是由大量分散的节点构成,这些节点协同工作来达到目标。

由于节点之间的距离很近,数据包在此类网络中往往是通过多跳传输。

一个好的路由协议应当考虑网络中所有节点的负载以及能源消耗,尽可能地减少数据包的延迟和数据包的丢失。

这是无线传感器网络中的路由协议需要考虑的主要问题。

在无线传感器网络中,有三种主要的路由协议:平面机制、分层机制和混合机制。

1. 平面机制平面机制是指所有节点都属于同一层次,没有层次结构。

节点之间通过广播协议(如Flooding protocol)相互传递数据。

节点只需知道自己的邻居节点,数据包的传输是由遍布整个网络的节点负责的。

这种方法简单且易于实现,但会导致网络不稳定,易出现死循环和数据洪泛问题。

因此,在实际应用中很少使用。

2. 分层机制分层机制是指将节点按照其功能和自己所处的位置划分为不同的层次。

分层机制将一个大的无线传感器网络划分为多个小的子网络,每个子网络都有一个负责节点。

子网络之间通过中继节点进行通信,可以减少数据的传播距离和提高传输速率。

分层机制通常由三层组成:传感器层、联络层和命令层。

传感器层负责数据的采集与传输,联络层负责中继和路由,命令层负责网络控制和管理。

分层机制的优点是可以有效降低网络负载和节点的能源消耗,提高网络的生存率和稳定性。

常见的分层机制路由协议有链路状态广告协议(LSP protocol)、电子飞秋协议(EFQ protocol)等。

EZMac协议原理与应用

EZMac协议原理与应用

EZMac协议原理与应用刘希若罗志祥(华中科技大学光电子科学与工程学院武汉430074)摘要无线传感网络集成传感器技术、计算技术和通信技术,相互交叉渗透,具有极为广阔的发展前景。

介绍一种可用于组建无线传感网络的新的MAC层协议-EZMac协议,给出一个EZMac协议组网的例子。

关键词无线传感网络EZMac协议IA4420引言无线传感器网络是一种特殊的无线自组网,它由许多个无线传感器网络节点构成,融合现代通信、微电子机械和微电子等领域的最新技术。

无线传感网能够实时检测、感知和采集网络分布区域内的各种监测对象的信息,提供海量的详细数据,并对这些信息进行处理,发布给观察者。

无线传感器网络在军事侦察、生物栖息环境监测、环境信息检测、农业生产、医疗健康监护、建筑与家居、工业生产控制以及商业等领域有着广泛的应用前景。

无线传感网有广阔的应用前景,是近年来极受关注的技术。

由于无线传感网是一种比较新的网络系统,所以它的体系结构目前没有一个统一的标准,而且当传感网络针对不同的应用环境时,其结构、协议、定位等也是有所区别的。

本文将介绍一种可用于组建无线传感网络的新MAC层的协议-EZMac协议。

2EZMac协议2.1EZMac协议Integration公司的EZMac是基于C语言的MAC层协议,可使用Integration的ISM无线收发器产品和第三方MCU来建立低功耗的网格网络。

每次发送数据必须以0xAA为前导码,否则外部接收装置无法接收数据。

前导码至少要有3个字节。

D0到Dn是净荷,不超过16个字节。

0x2DD4是同步模式的标志码。

CID(用户ID)位用EZMac为无线收发器的应用设计提供节点间的物理层简单接口,管理信号的传输和从发送端到输出端的相关数据包的传送。

EZMac的数据包较小,并支持使用收发器芯片内部波特率发生器的数据传送。

EZMac的状态机动作由一组存放于不同的寄存器中参数决定。

MAC引擎支持四种基本模式:休眠、空闲、传输和接收。

无线传感器网络的基本原理与应用介绍

无线传感器网络的基本原理与应用介绍

无线传感器网络的基本原理与应用介绍无线传感器网络(Wireless Sensor Network,WSN)是一种由大量分布式无线传感器节点组成的网络系统,用于收集、处理和传输环境中的信息。

它是物联网的关键组成部分,具有广泛的应用前景。

本文将介绍无线传感器网络的基本原理和一些典型的应用场景。

一、无线传感器网络的基本原理无线传感器网络由大量的无线传感器节点组成,每个节点都具有感知、通信和计算能力。

这些节点可以感知环境中的各种参数,如温度、湿度、光照强度等,并将这些信息通过无线通信传输给其他节点或基站。

无线传感器网络的基本原理包括以下几个方面:1. 节点通信:无线传感器节点之间通过无线信号进行通信,可以采用无线电波、红外线等不同的通信方式。

节点之间可以进行直接通信,也可以通过中继节点进行中转。

2. 路由协议:无线传感器网络中的节点通常是分布在广阔的区域内,节点之间的通信需要经过多跳传输。

为了有效地传输数据,需要设计合适的路由协议,使数据能够通过最优的路径传输到目的节点。

3. 能量管理:无线传感器节点通常由电池供电,能源是限制无线传感器网络寿命的重要因素。

因此,节点需要采取一系列的能量管理策略,如休眠、功率控制等,以延长网络的寿命。

二、无线传感器网络的应用场景无线传感器网络具有广泛的应用场景,下面介绍几个典型的应用场景。

1. 环境监测:无线传感器网络可以用于环境监测,如空气质量监测、水质监测等。

通过部署大量的传感器节点,可以实时监测环境中的各种参数,并及时采取相应的措施。

2. 物流管理:无线传感器网络可以用于物流管理,如货物追踪、温湿度监测等。

通过在货物上部署传感器节点,可以实时监测货物的位置和状态,提高物流的效率和安全性。

3. 农业监测:无线传感器网络可以用于农业监测,如土壤湿度监测、气象监测等。

通过在农田中部署传感器节点,可以实时监测农作物的生长环境,为农民提供科学的种植指导。

4. 健康监护:无线传感器网络可以用于健康监护,如老人健康监测、病人生命体征监测等。

无线传感器网络技术与应用

无线传感器网络技术与应用

无线传感器网络技术与应用无线传感器网络(Wireless Sensor Network, WSN)是近年来兴起的一种新型网络技术,它通过大规模分布在监测区域内的传感器节点,实时采集、处理并传输监测数据。

随着物联网技术的不断发展,无线传感器网络在各个领域的应用也越来越广泛。

本文将围绕无线传感器网络技术的基本原理和典型应用进行论述。

一、无线传感器网络技术的基本原理无线传感器网络由庞大数量的分布在监测区域内的传感器节点组成。

每个传感器节点都具备自主采集环境信息、处理数据并通过无线通信进行传输的能力。

传感器节点之间可以通过无线连接建立起通信网络,将采集到的数据实时传输给基站或其他节点。

无线传感器网络的技术原理主要包括传感器节点的自组织、数据采集与传输以及能源管理。

首先,传感器节点可以通过自组织和自适应的方式建立网络连接,实现动态部署和组网,灵活适应网络拓扑结构的变化。

其次,传感器节点通过感知环境并进行数据采集,将采集到的数据进行处理,并选择合适的传输方式将数据传输给其他节点或基站。

最后,考虑到传感器节点的能源有限,能源管理是无线传感器网络技术的重要方面,包括节点休眠、能量收集与节能优化等。

二、无线传感器网络的典型应用领域1. 环境监测无线传感器网络在环境监测领域的应用得到了广泛关注。

通过部署大量的传感器节点,可以实时监测空气质量、水质、温度、湿度等环境参数,以便及时发现和应对环境污染、灾害等情况。

2. 智能交通利用无线传感器网络技术可以实现智能交通系统的建设与优化。

传感器节点可以实时感知车流量、交通拥堵情况,并将这些信息传输给中心控制系统,该系统可以根据实时数据进行调度,优化交通流量,提高道路利用率,减少交通事故等。

3. 农业监测无线传感器网络可以应用于农业领域,实现对土地、作物、水资源等的实时监测和精确管理。

通过传感器节点采集农田土壤、作物生长环境以及气象等数据,农民和相关管理人员可以及时了解农业生产状况,进行科学决策,提高农业生产效益。

ZIGBEE无线传感器网络简介

ZIGBEE无线传感器网络简介

无线传感器网络简介2007年01月06日星期六下午04:29[来源:仪器仪表与传感器网]科技发展的脚步越来越快,人类已经置身于信息时代。

而作为信息获取最重要和最基本的技术——传感器技术,也得到了极大的发展。

传感器信息获取技术已经从过去的单一化渐渐向集成化、微型化和网络化方向发展,并将会带来一场信息革命。

发展历程早在上世纪70年代,就出现了将传统传感器采用点对点传输、连接传感控制器而构成传感器网络雏形,我们把它归之为第一代传感器网络。

随着相关学科的的不断发展和进步,传感器网络同时还具有了获取多种信息信号的综合处理能力,并通过与传感控制器的相联,组成了有信息综合和处理能力的传感器网络,这是第二代传感器网络。

而从上世纪末开始,现场总线技术开始应用于传感器网络,人们用其组建智能化传感器网络,大量多功能传感器被运用,并使用无线技术连接,无线传感器网络逐渐形成。

无线传感器网络是新一代的传感器网络,具有非常广泛的应用前景,其发展和应用,将会给人类的生活和生产的各个领域带来深远影响。

发达国家如美国,非常重视无线传感器网络的发展,IEEE正在努力推进无线传感器网络的应用和发展,波士顿大学(Boston Unversity)还于最近创办了传感器网络协会(Sensor Network Consortium),期望能促进传感器联网技术开发。

除了波士顿大学,该协会还包括BP、霍尼韦尔(Honeywell)、Inetco Systems、Invensys、 L-3 Communications、Millennial Net、Radianse、Sensicast Systems及Textron Systems。

美国的《技术评论》杂志在论述未来新兴十大技术时,更是将无线传感器网络列为第一项未来新兴技术,《商业周刊》预测的未来四大新技术中,无线传感器网络也列入其中。

可以预计,无线传感器网络的广泛是一种必然趋势,它的出现将会给人类社会带来极大的变革。

基于模糊能量有效的无线传感器网络簇头选择路由协议(IJCNIS-V7-N4-7)

基于模糊能量有效的无线传感器网络簇头选择路由协议(IJCNIS-V7-N4-7)

I. J. Computer Network and Information Security, 2015, 4, 54-61Published Online March 2015 in MECS (/)DOI: 10.5815/ijcnis.2015.04.07Fuzzy Based Energy Efficient Multiple Cluster Head Selection Routing Protocol for WirelessSensor NetworksSohel Rana, Ali Newaz Bahar, Nazrul Islam, Johirul IslamDepartment of Information and Communication TechnologyMawlana Bhashani Science and Technology University, Tangail-1902, Bangladesh Email: sohel.rana10045@, bahar_mitdu@, nazrul.islam@mbstu.ac.bd, johir-ul.islam.6814@Abstract—The Wireless Sensor Network (WSN) is made up with small batteries powered sensor devices with lim-ited energy resources within it. These sensor nodes are used to monitor physical or environmental conditions and to pass their data through the wireless network to the main location. One of the crucial issues in wireless sen-sor network is to create a more energy efficient system. Clustering is one kind of mechanism in Wireless Sensor Networks to prolong the network lifetime and to reduce network energy consumption. In this paper, we propose a new routing protocol called Fuzzy Based Energy Effi-cient Multiple Cluster Head Selection Routing Protocol (FEMCHRP) for Wireless Sensor Network. The routing process involves the Clustering of nodes and the selec-tion of Cluster Head (CH) nodes of these clusters which sends all the information to the Cluster Head Leader (CHL). After that, the cluster head leaders send aggregat-ed data to the Base Station (BS). The selection of cluster heads and cluster head leaders is performed by using fuzzy logic and the data transmission process is per-formed by shortest energy path which is selected apply-ing Dijkstra Algorithm. The simulation results of this research are compared with other protocols BCDCP, CELRP and ECHERP to evaluate the performance of the proposed routing protocol. The evaluation concludes that the proposed routing protocol is better in prolonging network lifetime and balancing energy consumption. Index Terms—Fuzzy logic, Wireless Sensor Network, Cluster Head Leader, Shortest Energy Path, Dijkstra Al-gorithm.I.I NTRODUCTIONA wireless sensor network is one kind of energy con-strained network. Wireless sensor networks are formed by a number of sensor nodes, which are powered by bat-teries. The replacement or recharging process of these batteries is very difficult. Sensor nodes are used to moni-tor environmental or physical conditions, such as temper-ature, sound, and motion, etc. Recent technological de-velopment in the Micro Electronic Mechanical system (MEMS) and wireless communication technologies have enabled the invention of tiny, low power, low cost, and multi-functional smart sensor nodes in a wireless sensor network. The transmission of a finite amount of infor-mation can be only supported by finite energy.In twenty-first century, WSN have been widely con-sidered as one of the most important technology. The most important factor in WSN is energy efficiency for prolonging network lifetime and also for balancing ener-gy consumption. Routing is also an important factor that affects wireless sensor networks [1, 7]. One of the most restrictive factors on the lifetime of wireless sensor net-works is the limited energy resources of the sensor nodes. Sensor nodes can be organized hierarchically by group-ing them into clusters in order to achieve energy efficien-cy.Previously, a several numbers of literatures have been done to improve energy efficiency of Wireless Sensor Networks. One of them is Low Energy Adaptive Cluster-ing Hierarchy (LEACH) [3, 4]. It is a hierarchical proto-col. Moreover, it uses single-hop routing that means eve-ry sensor node transmits information directly to the clus-ter head. Therefore, it is not recommended for large area networks. After that, some protocols BCDCP [7], PEG-ASIS [8], CELRP [10] and GPSR [11] are proposed to improve the energy efficiency of LEACH protocol using multi hop routing schema. Base-Station Control, Dynam-ic Clustering Protocol (BCDCP) [7] is a centralized rout-ing protocol, which uses Minimal Spanning Tree (MST) [2] to connect to CH which randomly chooses a leader to send data to sink. BCDCP route data energy efficiency in small-scale network. A Cluster Based Energy Efficient Location Routing Protocol (CELRP) [10] is a location based routing protocol. It applies the Greedy algorithm to chain the cluster heads. In Power-Efficient Gathering in Sensor Information Systems (PEGASIS) [8], each node can transfer data to only its nearby neighbor. It uses a greedy algorithm to form a chain of nodes. These proto-cols [7, 8, 10] use only one cluster head leader to transmit data to the base station. These protocols are not appropri-ate for large area networks. GPSR [11] is a position based routing protocol, which performed by using a geo-graphic positioning system (GPS). Then a literature [14] is introduced the trust concept in GPSR and name T-GPSR. Recently, an improvement of T-GPSR is performed in [15]. Some other position based protocols are Location Aided Routing Protocol (LAR) [12] and GRID [13]. A wide description of geography based routing pro-tocol is found in [16, 17].After that, some protocols ECHERP [5], TEEN [6] and SHORT [9] are also proposed to improve energy effi-ciency of wireless sensor networks. Equalized Cluster Head Election Routing Protocol (ECHERP) [5] models the network field as a linear system. However, in this protocol, only a first level Cluster Heads can directly transmit data to the BS, so first level nodes will die first. Threshold Sensitive Energy Efficient (TEEN) is a proto-col which designed for sudden changes in the sensed en-vironment [6]. In TEEN, the sensor network architecture is designed hierarchically. It does not operate properly when the numbers of layers increases.Energy consumption and network lifetime are the pa-rameters to measure the energy efficiency of a wireless sensor network. In a network, which uses only one CHL to transmit aggregated data to the base station, the sensor nodes start to die in a very short round and also the nodes which are close to the base station die first. It causes to decrease network lifetime and imbalance energy con-sumption, which affects the energy efficiency of the whole network. It would be interesting to evaluate, how we can minimize the total energy consumption and pro-long network lifetime of wireless sensor networks.This research mainly focuses on multiple CHs and CHLs which are used in the large area network to trans-mit data to the base station and also in the data transmis-sion process of the network. These CHs and CHLs are selected by using fuzzy logic. This study attempts to min-imize the total energy consumption and prolong network lifetime of this large area network.This paper is structured as follows: Section II presents the methodology of proposed energy efficient routing protocol. Section III describes details about the network model of this protocol. Section IV illustrates details about the simulation of this study to analyses energy consump-tion and network lifetime. Section V shows simulation results and evaluates performance on network life time and energy consumption. Finally, Section VI represents a set of conclusions and the future works.II.R ESEARCH M ETHODMany literatures have been proposed based on single-hop routing [3], multi-hop routing [5-10] and fuzzy logic [19-22] and also position based routing [10-13]. However, these solutions depend on one elected CHL to directly transmit aggregated data to the BS. This dependency on only one CHL sharply decreases total resume energy of whole network.This literature mainly follows [5, 7, 10] and introduces an energy efficient data transmission process based on multiple CHs and CHLs for WSN.We study different simulation tools used in previous studies [16-22]. There are many simulation tools to simu-late the proposed protocol. However, one of these simula-tion tools is selected based on the accuracy and minimum runtime complexity of these tools. Primarily, the simula-tion setup is performed by mapping the network field. After that, we select CHs and CHLs in the network field using Fuzzy Inference Engine and apply the Dijkstra al-gorithm to chain cluster members and CHs.After finishing the simulation setup, we observe many simulation data. We use same simulation parameters which are previously taken by other protocols [5, 7, 10] to compare the simulation results and to evaluate the per-formance of this protocol. Moreover, we plot different graphs to show the comparison of the simulation results of this study and the other protocols [5, 7, 10]. From plot-ted graphs it shows that the proposed protocol is better than BCDCP, CELRP and ECHERP in prolonging the network lifetime and balancing energy consumption. A careful observation of these plots provides a quantitative measure of the energy efficiency of the new routing pro-tocol.III.N ETWORK M ODEL OF P ROPOSED R OUTING P ROTOCOL The network model of this study is shown in Figure 1. This routing protocol provides balance in the energy con-sumption and prolongs the network lifetime.Fig 1. Scenario of proposed network modelThe new routing protocol organizes clusters so that all the nodes can be included in these clusters. It chooses CHs for each cluster using Fuzzy logic, which is based on highest energy resume and minimum distance from the BS. In this protocol, the Dijkstra algorithm is applied to find a shortest energy path of each node. After that, it chains the cluster members and CHs according to short-est energy paths. Finally, cluster members; send data packets to the CHs. In this protocol, multiple CHLs are chosen by the BS using fuzzy logic based on highest en-ergy resume and minimum distance from BS of each CH. Each CHL can transmit data directly or by other CHLs to the BS, depending on shortest energy path.We simulate this network to analyze network lifetime, average residualenergy and energy dissipation of this study. The simulation results show that, this protocol is better in prolonging network lifetime and balancing ener-gy consumption compared to the BCDCP, CELRP and ECHERP.IV. S IMULATIONThis section discusses the simulation of this study. The simulation takes place by using MATLAB. We use the Fuzzy Inference Engine to select CHs and CHLs. We also apply the Dijkstra algorithm to chain the cluster members according to their shortest energy path. A. Network Field MappingAs shown in Figure 2, we design a network field with 100 nodes, which are randomly scattered in this sensing field with dimension (100m × 80m) and BS located at position (130,100).Fig 2. A snapshot of random deployment of sensor nodes in the networkfieldTo compare the performance of the study with other protocols, we ignore the effect caused by signal collision and interference in the wireless channel. Table 1 summa-rizes the parameters used in our simulation.Table 1. Simulation ParametersB. Clustering and Cluster Head SelectionIn this protocol, Clustering has been done with the fuzzy clustering method and Cluster Heads have been selected by fuzzy logic based on both the energy resume and the distance from the Base-Station of a sensor node.We use equations which are given in [10] to determine energy spent for transmission of a 1-bit packet from the transmitter to the receiver at a distance (d) is defined as:( )(1)E Tx is the energy dissipated in the transmitter of source node. The electronic energyEelec is the per bit energy dissipation for running the transceiver circuitry. The threshold distance d 0 can be obtained from:√(2)And E Rx is the energy expanded to receive messages:( ) (3)The distance (d) of node from one node to another node is calculated by following equation:√( ) ( ) (4)Energy cluster is the sum of energy in Cluster Heads:( ) ( ) (5)Where, k i indicates the number of member nodes in the cluster heads. E Tx (l, d) indicates energy transmission. E Rx (l) indicates energy receiver and E DA indicates energy of data aggregation.B1. Fuzzy Membership Functions Implementation Membership functions [19, 20] of the fuzzy system pa-rameters to determine the cluster heads are shown in Fig-ures 3 (a), (b) and (c).(a)(b)(c)Fig 3. (a) Fuzzy Input Membership function (Distance) (b) Fuzzy Input Membership function (Energy) (c) Fuzzy output Membership function(Possibility)B2. Fuzzy Rules GenerationTo find the possibility of a node to be a CH, it needs to assign Fuzzy Rules for all possible inputs. Table 2 shows these Fuzzy Rules.Table 2.Fuzzy Rules to Select Cluster HeadsThe Table 2 shows that a sensor node that has a greater distance from the base station and less residual energy has the lowest possibility to be a CH. On the other hand, a sensor node that has a lower distance from the basestation and high residual energy has the highest possibil-ity to be a CH.(a)(b)Fig 4. (a) Implementation of Fuzzy Rules (b) The Fuzzy Rules ViewerAs shown in Figure 4, we implement fuzzy rules and find the possibility of each node to be a CH. We select a node as a CH which has the maximum possibility among all cluster members. Then we also select CHLs among all CHs using the same process. C. Data Transmission ProcessThe cluster members are chained by finding a shortest energy path of each member. These shortest energy paths are selected by applying the Dijkstra algorithm to trans-mit data from each cluster member to CH and then all CHs to the CHLs in the network field. Finally, CHLs send data to the BS according to their shortest energy paths.V. R ESULT AND A NALYSISWe technically simulate this protocol by Fuzzy Infer-ence Engine as shown in Figures 3 and 4. After that, we observe several results of this simulation. The simulation results of this study are shown for a few rounds,Fig 5. Network field scenario of first roundFigure 5 shows the scenario of the network field for first round where different clusters are defined by differ-ent color and also shows the CH of each cluster. Moreo-ver, it shows the CHLs of the network in the first round to transmit data to the BS.(a)(b)Fig 6. (a) Network field scenario after round 200. (b) Network fieldscenario after round 300.The network field scenario after round 200 and 300 are shown in Figure 6 (a) and (b) respectively. Figure 6 (a) shows CHs of different clusters and CHLs of the network in round 200. It also shows CH nodes and CHL nodes are changed based on their highest resume energy and mini-mum distance from the base station using fuzzy logic and fuzzy rules. Figure 6 (b) also shows CHs of different clusters and CHLs of the network in round 300. The changes of CH nodes and CHL nodes also take place in this round.A. Performance Evaluation of FEMCHRP ProtocolThe results of this study are compared with BCDCP, CELRP and ECHERP protocol in the same heterogene-ous setting to evaluate the performance of the study. We use three matrices to analyze and compare the results: Network lifetime, Energy dissipation and Energy resume. We define the network lifetime as the number of rounds made by a node to the first node exhausts all of its energy in the network. One round defines the operation begin-ning of the cluster formation up until the final BS re-ceives all data from the CHLs.A1. Average Energy Dissipation for Several RoundsIn WSN, the average energy dissipation is an im-portant measurement to compare the protocols. In this subsection, a graph is shown in Figure 7 is performed to calculate the average energy dissipation over several rounds. We observe that, the protocol significantly re-duces energy consumption. Since it uses an alternative method to select the CH based on the location and the residual energy of nodes. Moreover, the uses of multi hop for transmission data in each cluster also resulted in a more efficient energy usage and less consumption of en-ergy for both intra and inter cluster data transmission in our protocol.The line graph of Figure 7 shows that the reduction in the average energy dissipation can be obtained by about 48% higher than BCDCP, 41% than ECHERP and 36% than CELRP which means that the FEMCHRP consumes about 48% less than BCDCP, 41% than ECHCRP and 36% less than CELRP. The graph curve also shows that the dissipation that varies between rounds of FEMCHRP is higher than BCDCP, CELRP and ECHERP.Fig 7. A comparison of FEMCHRP’s Average Energy Dissipation withBCDCP, CELRP and ECHERPAccording to the discussion, the protocol shows a bet-ter performance than BCDCP, CELRP and ECHERP in terms of energy consumption.A2. Number of Nodes Alive over Several RoundsAnother important issue in WSN is the number of nodes alive over several rounds. In this subsection, the Figure 8 presents the number of lifetimes of nodes which means the numbers of round until the first node dies for our protocol. Figure 8 also shows that it is higher than BCDCP, CELRP and ECHERP.We also note that the lifetime starts decreasing at round 150 in BCDCP, at round 200 for ECHERP and at round 320 for CELRP while in the case of FEMCHRP the decrease only starts after more than 410 rounds. We calculated that in BCDCP the node died, 39% faster, in ECHERP the node died, 27% faster and in CELRP the node died 17% faster than FEMCHRP. That means an average number of live sensor nodes in FEMCHRP is 39% higher than BCDCP, 27% higher than ECHERP and 17% higher than CELRP.Fig 8. A compar ison of FEMCHRP’s system lifetime with BCDCP,CELRP and ECHERPTherefore, it has been shown that FEMCHRP is better in prolonging network lifetime compared to the BCDCP, CELRP and ECHERP. It should also be noted that the graph of FEMCHRP is smoother than the BCDCP, CELRP and ECHERP.A2. Average Residual Energy in Several RoundsWe measure the average residual energy of our net-work and compared these results to BCDCP, CELRP and ECHERP. We observe that the residual energy of the network is higher than other protocols.Figure 9 represents that the reduction in average ener-gy residual can be obtained by 42% higher than BCDCP, 22% than ECHERP and 10% than CELRP which means that the FEMCHRP consumes about 42% less energy than BCDCP, 22% less than ECHERP and 10% less than CELRP. Figure 9 also shows that the dissipation that varies between rounds of the protocol is higher than BCDCP, CELRP and ECHERP. Therefore, it has better performance than BCDCP, CELRP and ECHERP in terms of energy efficiency as well as able to prolong the network lifetime of sensor nodes.Fig 9. A comparis on of FEMCHRP’s Average Residual Energy withBCDCP, CELRP and ECHERPAfter observing and analyzing different simulation re-sults, we get a set of decisions which can make this pro-tocol better than BCDCP, CELRP and ECHERP. These decisions lead to the conclusion.IV.C ONCLUSIONIn this paper, we present a set of observations with re-gard average energy dissipation, network lifetime and average residual energy of the proposed network. The recapitulations of this study are discussed below. First, this network consumes less energy to transmit total ag-gregated data to the Base Station than other protocols. Its average energy dissipation is much lower than BCDCP, CELRP and ECHERP. Second, the network lifetime starts decreasing after more than 410 rounds, which is much higher than other protocols and means that this protocol is better than other protocols in terms of network lifetime. Finally, the average residual energy of the study is high which also means that it transmits more data than other protocols. It also concludes that, this proposed pro-tocol is an energy efficient protocol, which prolongs the network lifetime effectively.The future work can be addressed as to consider the delay of the system. In addition, we also plan to design a heterogeneous network where it can have several Base-Stations that communicate together and use this protocol which selects multiple Cluster Heads using fuzzy logic and uses these Cluster Heads to transmit data to the Base Stations.R EFERENCES[1]Zou, Y., & Chakrabarty, K. (2005). A distributed cover-age-and connectivity-centric technique for selecting ac-tive nodes in wireless sensor networks. Computers, IEEE Transactions on, 54(8), 978-991.[2]Shen, H. (1999). Finding the k most vital edges with re-spect to minimum spanning tree. Acta Informatica, 36(5),405-424.[3] Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H.(2000, January). Energy-efficient communication protocol for wireless microsensor networks. In System Sciences, 2000. Proceedings of the 33rd Annual Hawaii Interna-tional Conference on (pp. 10-pp). IEEE.[4] Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan,H. (2002). An application-specific protocol architecture for wireless microsensor networks. Wireless Communica-tions, IEEE Transactions on , 1(4), 660-670.[5] Nikolidakis, S. A., Kandris, D., Vergados, D. D., &Douligeris, C. (2013). Energy efficient routing in wireless sensor networks through balanced clustering. Algorithms, 6(1), 29-42.[6] Manjeshwar, A., & Agrawal, D. P. (2001, April). TEEN:a routing protocol for enhanced efficiency in wireless sen-sor networks. In Parallel and Distributed Processing Symposium, International (Vol. 3, pp. 30189a-30189a). IEEE Computer Society.[7] Sabbineni, H., & Chakrabarty, K. (2005). Location-aidedflooding: an energy-efficient data dissemination protocol for wireless-sensor networks. Computers, IEEE Transac-tions on , 54(1), 36-46.[8] zLindsey, S., & Raghavendra, C. S. (2002). PEGASIS:Power-efficient gathering in sensor information systems. In Aerospace conference proceedings, 2002. IEEE (Vol. 3, pp. 3-1125). IEEE.[9] Yang, Y., Wu, H. H., & Chen, H. H. (2007). SHORT:shortest hop routing tree for wireless sensor networks. In-ternational Journal of Sensor Networks , 2(5), 368-374. [10] Nurhayati, S. H. C., & Lee, K. O. (2011). A Cluster BasedEnergy Efficient Location Routing Protocol in Wireless Sensor Networks. Proceedings International Journal of Computers and Communications , 5(2).[11] Karp, B., & Kung, H. T. (2000, August). GPSR: Greedyperimeter stateless routing for wireless networks. In Pro-ceedings of the 6th annual international conference on Mobile computing and networking (pp. 243-254). ACM. [12] Ko, Y. B., & Vaidya, N. H. (2000). Location ‐AidedRouting (LAR) in mobile ad hoc networks. Wireless Net-works , 6(4), 307-321.[13] Liao, W. H., Sheu, J. P., & Tseng, Y. C. (2001). GRID: Afully location-aware routing protocol for mobile ad hoc networks. Telecommunication Systems , 18(1-3), 37-60. [14] Pirzada, A. A., & McDonald, C. (2007, November).Trusted greedy perimeter stateless routing. In Networks, 2007. ICON 2007. 15th IEEE International Conference on (pp. 206-211). IEEE.[15] Vamsi, P. R., & Kant, K. (2014). An Improved TrustedGreedy Perimeter Stateless Routing for Wireless Sensor Networks. International Journal of Computer Network and Information Security (IJCNIS), 5(11), 13-19.[16] Ming-jer, Tsai, hong-yen, yang, bing-Hong, liu and Wen-Qian, huang. (2008). Virtual Coordinate A Geography-based Heterogeneous Hierarchy Routing Protocol in Wireless Sensor Networks. INFOCOM on (pp. 351-355). [17] Chen, X., Qu, W., Ma, H., & Li, K. (2008, September). AGeography –Based Heterogeneous Hierarchy Routing Pro-tocol for Wireless Sensor Networks. In High Performance Computing and Communications, 2008. HPCC'08. 10th IEEE International Conference on (pp. 767-774). IEEE. [18] Su, X., Choi, D., Moh, S., & Chung, I. (2010, February).An energy-efficient clustering for normal distributed sen-sor networks. In Proceedings of the 9th WSEAS Interna-tional Conference on VLSI and Signal Processing (IC-NVS’10), Cambridge, UK (pp. 81-84).[19] Minhas, M. R., Gopalakrishnan, S., & Leung, V. C. (2008,November). Fuzzy algorithms for maximum lifetime rout-ing in wireless sensor networks. In Global Telecommuni-cations Conference, 2008. IEEE GLOBECOM 2008. IEEE (pp. 1-6). IEEE.[20] Gupta, I., Riordan, D., & Sampalli, S. (2005, May). Clus-ter-head election using fuzzy logic for wireless sensor networks. In Communication Networks and Services Re-search Conference, 2005. Proceedings of the 3rd Annual (pp. 255-260). IEEE.[21] Tashtoush, Y. M., & Okour, M. A. (2008, December).Fuzzy self-clustering for wireless sensor networks. In Embedded and Ubiquitous Computing, 2008. EUC'08. IEEE/IFIP International Conference on (Vol. 1, pp. 223-229). IEEE.[22] Banerjee, P. S., Paulchoudhury, J., & Chaudhuri, S. B.(2013). Fuzzy Membership Function in a Trust Based AODV for MANET. International Journal of Computer Network and Information Security (IJCNIS), 5(12), 27-34.Authors’ ProfilesSohel Rana was born in Comilla, Bang-ladesh, on 25th October 1992. He has completed his Bachelor of Engineering in Information and Communication Tech-nology (ICT) from Mawlana Bhashani Science and Technology University, Tangail-1902, Bangladesh in 2014. His area of research interests are Image Pro-cessing, Wireless Sensor Network andNeural Network etc.Ali Newaz Bahar received B.Sc. (Engg.) degree from Mawlana Bhashani Science and Technology University (MBSTU) in Information and Communication Tech-nology (ICT) in 2010 and Masters from Institute of Information Technology (IIT) (University of Dhaka, Bangladesh) in 2012. His area of interest is congestion control for Mobile Ad hoc Network,Wireless Sensor Networks, Cognitive Radio Network, Quan-tum-dot Cellular Automata (QCA), Artificial Intelligence and Cloud Computing.Nazrul Islam received a Bachelor de-gree in Information and Communication Technology (ICT) from Mawlana Bhashani Science and Technology Uni-versity, Tangail, Bangladesh. He is hold-ing M.Sc degree in Electrical Engineer-ing with emphasis on Telecommunica-tion Systems from Blekinge Institute of Technology, Karlskrona, Sweden. How-ever, currently he is working as a Lecturer in the Department of Information and Communication Technology at Mawlana Bhashani Science and Technology University, Tangail, Bangla-desh. His current research interests in the fields related to Communication Networks and its applications, mainly model-ing and analysis with respect to Quality of Service (QoS) and Quality of Experience (QoE).Johirul Islam was born in Noakhali, Bangladesh, on 1st January, 1992. He accomplished B.Sc. (Engg.) degree in Information and Communication Tech-nology (ICT) from Mawlana Bhashani Science and Technology University, Tangail-1902, Bangladesh in 2014. He has a great wireless sensor networks, Communication Networks and networkprotocol etc.Howto cite this paper: Sohel Rana, Ali Newaz Bahar, Nazrul Islam, Johirul Islam,"Fuzzy Based Energy Efficient Multiple Cluster Head Selection Routing Protocol for Wireless Sensor Networks", IJCNIS, vol.7, no.4, pp.54-61, 2015.DOI: 10.5815/ijcnis.2015.04.07。

无线传感器网络(WSN)综述

历史以及发展现状(续)
之所以国内外都投入巨资研究机构纷纷开展无线传感器网络的研究,很大程度归功于其广阔的应用前景和对社会生活的巨大影响。
WSN的体系结构
传感器网络结构
数据采集、处理、通信能力
WSN的体系结构(续)
ቤተ መጻሕፍቲ ባይዱ传感器节点结构
MAC主要负责控制与连接物理层的物理介质
传感器网络由物理层、数据链路层、网络层、传输层、应用层、能量管理平面、移动性管理平面和任务管理平面八个部分组成。
清除发送阶段
WSN的协议(续)
路由协议 和传统的路由协议相比,无线传感器的路由协议有以下特点: 能量优先 基于局部拓扑信息 以数据为中心 应用相关
WSN的协议(续)
基于查询的路由协议。
路由协议分类
能量感知路由协议。
地理位置的路由协议。
可靠的路由协议。
关键技术
网络拓扑控制
01
网络协议
02
网络安全
无线传感器网络(WSN)综述
单击添加副标题
2010/5/6
主要内容:
CONTENTS
WSN概述
历史以及发展现状
WSN的体系结构
01
WSN的特征
WSN的应用
WSN的协议
02
03
04
05
06
WSN概述
无线传感器网络(wireless sensor network, WSN)系统是当前在国际上备受关注的、涉及多学科高度交叉、知识高度集成的前沿热点研究领域。它综合了传感器技术、嵌入式计算技术、现代网络及无线通信技术、分布式信息处理技术等。
WSN的应用(续)
WSN的应用(续)
智能家居
家电和家具中嵌入传感器节点,通过无线网络与Internet连在一起。为人提供人性化的家居环境。 例:Avaak 提供一个只有1立方英寸大小的自治产品。这个微型的无线视频平台包含有一节电池、无线电、摄像相机、(彩色成像器加镜头)、控制器、天线和温度传感器。(如图 )

无线传感器网络技术与应用

无线传感器网络技术与应用无线传感器网络(Wireless Sensor Network,简称WSN)是一种由许多具有自主能力的传感器节点组成的网络系统,这些节点能够感知环境中的物理量,进行数据处理和通信传输。

它具有广泛的应用领域,包括环境监测、无线通信、智能交通等。

本文将对无线传感器网络技术及其应用进行探讨。

一、无线传感器网络的基本原理无线传感器网络由大量的传感器节点组成,这些节点分布在被监测的区域内,通过无线通信相互连接。

每个节点都具备感知、数据处理和通信功能。

节点通过感知环境中的物理量,如温度、湿度、压力等,将数据进行处理并传输给其他节点。

为了降低能耗,节点通常采用分层的工作体系结构,包括传感层、网络层和应用层。

二、无线传感器网络的特点1. 自组织性:无线传感器网络中的节点可以自行组织成网络,无需人工干预。

当有新的节点加入网络或旧节点离开网络时,网络能够自动调整。

2. 自适应性:无线传感器节点可以根据环境的变化,动态地调整自身的工作模式。

节点可以自主决策是否进行数据处理和传输,从而降低能耗。

3. 分布式处理:无线传感器节点在感知和数据处理过程中分布在整个监测范围内,并通过无线通信相互交换信息。

节点之间的通信通常采用多跳传输的方式。

三、无线传感器网络的应用领域1. 环境监测:无线传感器网络广泛应用于环境监测领域。

通过节点感知环境中的温度、湿度、气体等物理量,可以实时监测环境的变化。

例如,在农业领域,可以利用无线传感器网络监测土壤温湿度,并根据监测结果进行灌溉控制。

2. 智能交通:无线传感器网络在智能交通领域的应用越来越广泛。

通过节点感知交通流量、车辆速度等信息,可以实时监测路况,为交通管理部门提供决策支持。

此外,无线传感器网络还可以用于车辆定位、电子收费等方面。

3. 物联网:无线传感器网络是物联网的基础技术之一。

物联网通过将各种物理设备和传感器连接起来,实现设备之间的信息交互和互联互通。

无线传感器网络作为物联网的关键组成部分,可以为物联网提供大量的感知数据。

传感器相关英语文献

DiMo:Distributed Node Monitoring in WirelessSensor NetworksAndreas Meier†,Mehul Motani∗,Hu Siquan∗,and Simon Künzli‡†Computer Engineering and Networks Lab,ETH Zurich,Switzerland∗Electrical&Computer Engineering,National University of Singapore,Singapore‡Siemens Building T echnologies,Zug,SwitzerlandABSTRACTSafety-critical wireless sensor networks,such as a distributed fire-or burglar-alarm system,require that all sensor nodes are up and functional.If an event is triggered on a node, this information must be forwarded immediately to the sink, without setting up a route on demand or having tofind an alternate route in case of a node or link failure.Therefore, failures of nodes must be known at all times and in case of a detected failure,an immediate notification must be sent to the network operator.There is usually a bounded time limit,e.g.,five minutes,for the system to report network or node failure.This paper presents DiMo,a distributed and scalable solution for monitoring the nodes and the topology, along with a redundant topology for increased robustness. Compared to existing solutions,which traditionally assume a continuous data-flow from all nodes in the network,DiMo observes the nodes and the topology locally.DiMo only reports to the sink if a node is potentially failed,which greatly reduces the message overhead and energy consump-tion.DiMo timely reports failed nodes and minimizes the false-positive rate and energy consumption compared with other prominent solutions for node monitoring.Categories and Subject DescriptorsC.2.2[Network Protocols]:Wireless Sensor NetworkGeneral TermsAlgorithms,Design,Reliability,PerformanceKeywordsLow power,Node monitoring,Topology monitoring,WSN 1.INTRODUCTIONDriven by recent advances in low power platforms and protocols,wireless sensor networks are being deployed to-day to monitor the environment from wildlife habitats[1] Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on thefirst page.To copy otherwise,to republish,to post on servers or to redistribute to lists,requires prior specific permission and/or a fee.MSWiM’08,October27–31,2008,Vancouver,BC,Canada.Copyright2008ACM978-1-60558-235-1/08/10...$5.00.to mission-criticalfire-alarm systems[5].There are,how-ever,still some obstacles in the way for mass application of wireless sensor networks.One of the key challenges is the management of the wireless sensor network itself.With-out a practical management system,WSN maintenance will be very difficult for network administrators.Furthermore, without a solid management plan,WSNs are not likely to be accepted by industrial users.One of the key points in the management of a WSN is the health status monitoring of the network itself.Node failures should be captured by the system and reported to adminis-trators within a given delay constraint.Due to the resource constraints of WSN nodes,traditional network management protocols such as SNMP adopted by TCP/IP networks are not suitable for sensor networks.In this paper,we con-sider a light-weight network management approach tailored specifically for WSNs and their unique constraints. Currently,WSN deployments can be categorized by their application scenario:data-gathering applications and event-detection applications.For data-gathering systems,health status monitoring is quite straight forward.Monitoring in-formation can be forwarded to the sink by specific health status packets or embedded in the regular data packets.Ad-ministrators can usually diagnose the network with a helper program.NUCLEUS[6]is one of the network management systems for data-gathering application of WSN.Since event-detection deployments do not have regular traffic to send to the sink,the solutions for data-gathering deployments are not suitable.In this case,health status monitoring can be quite challenging and has not been discussed explicitly in the literature.In an event-detection WSN,there is no periodic data trans-fer,i.e.,nodes maintain radio silence until there is an event to report.While this is energy efficient,it does mean that there is no possibility for the sink to decide whether the net-work is still up and running(and waiting for an event to be detected)or if some nodes in the network have failed and are therefore silent.Furthermore,for certain military ap-plications or safety-critical systems,the specifications may include a hard time constraint for accomplishing the node health status monitoring task.In an event-detection WSN,the system maintains a net-work topology that allows for forwarding of data to a sink in the case of an event.Even though there is no regular data transfer in the network,the network should always be ready to forward a message to the sink immediately when-ever necessary.It is this urgency of data forwarding that makes it undesirable to set up a routing table and neighborlist after the event has been detected.The lack of regular data transfer in the network also leads to difficulty in de-tecting bad quality links,making it challenging to establish and maintain a stable robust network topology.While we have mentioned event-detection WSNs in gen-eral,we accentuate that the distributed node monitoring problem we are considering is inspired by a real-world ap-plication:a distributed indoor wireless alarm system which includes a sensor for detection of a specific alarm such as fire(as studied in[5]).To illustrate the reporting require-ments of such a system,we point out that regulatory speci-fications require afire to be reported to the control station within10seconds and a node failure to be reported within 5minutes[9].This highlights the importance of the node-monitoring problem.In this paper,we present a solution for distributed node monitoring called DiMo,which consists of two functions: (i)Network topology maintenance,introduced in Section2, and(ii)Node health status monitoring,introduced in Sec-tion3.We compare DiMo to existing state-of-the-art node monitoring solutions and evaluate DiMo via simulations in Section4.1.1Design GoalsDiMo is developed based on the following design goals:•In safety critical event monitoring systems,the statusof the nodes needs to be monitored continuously,allow-ing the detection and reporting of a failed node withina certain failure detection time T D,e.g.,T D=5min.•If a node is reported failed,a costly on-site inspectionis required.This makes it of paramount interest todecrease the false-positive rate,i.e.,wrongly assuminga node to have failed.•In the case of an event,the latency in forwarding theinformation to the sink is crucial,leaving no time toset up a route on demand.We require the system tomaintain a topology at all times.In order to be robustagainst possible link failures,the topology needs toprovide redundancy.•To increase efficiency and minimize energy consump-tion,the two tasks of topology maintenance(in par-ticular monitoring of the links)and node monitoringshould be combined.•Maximizing lifetime of the network does not necessar-ily translate to minimizing the average energy con-sumption in the network,but rather minimizing theenergy consumption of the node with the maximal loadin the network.In particular,the monitoring shouldnot significantly increase the load towards the sink.•We assume that the event detection WSN has no reg-ular data traffic,with possibly no messages for days,weeks or even months.Hence we do not attempt to op-timize routing or load balancing for regular data.Wealso note that approaches like estimating links’perfor-mance based on the ongoing dataflow are not possibleand do not take them into account.•Wireless communications in sensor networks(especially indoor deployments)is known for its erratic behav-ior[2,8],likely due to multi-path fading.We assumesuch an environment with unreliable and unpredictablecommunication links,and argue that message lossesmust be taken into account.1.2Related WorkNithya et al.discuss Sympathy in[3],a tool for detect-ing and debugging failures in pre-and post-deployment sen-sor networks,especially designed for data gathering appli-cations.The nodes send periodic heartbeats to the sink that combines this information with passively gathered data to detect failures.For the failure detection,the sink re-quires receiving at least one heartbeat from the node every so called sweep interval,i.e.,its lacking indicates a node fail-ure.Direct-Heartbeat performs poorly in practice without adaptation to wireless packet losses.To meet a desired false positive rate,the rate of heartbeats has to be increased also increasing the communication cost.NUCLEUS[6]follows a very similar approach to Sympathy,providing a manage-ment system to monitor the heath status of data-gathering applications.Rost et al.propose with Memento a failure detection sys-tem that also requires nodes to periodically send heartbeats to the so called observer node.Those heartbeats are not directly forwarded to the sink node,but are aggregated in form of a bitmask(i.e.,bitwise OR operation).The ob-server node is sweeping its bitmask every sweep interval and will forward the bitmask with the node missing during the next sweep interval if the node fails sending a heartbeat in between.Hence the information of the missing node is disseminated every sweep interval by one hop,eventually arriving at the sink.Memento is not making use of ac-knowledgements and proactively sends multiple heartbeats every sweep interval,whereas this number is estimated based on the link’s estimated worst-case performance and the tar-geted false positive rate.Hence Memento and Sympathy do both send several messages every sweep interval,most of them being redundant.In[5],Strasser et al.propose a ring based(hop count)gos-siping scheme that provides a latency bound for detecting failed nodes.The approach is based on a bitmask aggre-gation,beingfilled ring by ring based on a tight schedule requiring a global clock.Due to the tight schedule,retrans-missions are limited and contention/collisions likely,increas-ing the number of false positives.The approach is similar to Memento[4],i.e.,it does not scale,but provides latency bounds and uses the benefits of acknowledgements on the link layer.2.TOPOLOGY MAINTENANCEForwarding a detected event without any delay requires maintaining a redundant topology that is robust against link failures.The characteristics of such a redundant topology are discussed subsequently.The topology is based on so called relay nodes,a neighbor that can provide one or more routes towards the sink with a smaller cost metric than the node itself has.Loops are inherently ruled out if packets are always forwarded to relay nodes.For instance,in a simple tree topology,the parent is the relay node and the cost metric is the hop count.In order to provide redundancy,every node is connected with at least two relay nodes,and is called redundantly con-nected.Two neighboring nodes can be redundantly con-nected by being each others relay,although having the same cost metric,only if they are both connected to the sink. This exception allows the nodes neighboring the sink to be redundantly connected and avoids having a link to the sinkas a single point of failure.In a(redundantly)connected network,all deployed nodes are(redundantly)connected.A node’s level L represents the minimal hop count to the sink according to the level of its relay nodes;i.e.,the relay with the least hop count plus one.The level is infinity if the node is not connected.The maximal hop count H to the sink represents the longest path to the sink,i.e.,if at every hop the relay node with the highest maximal hop count is chosen.If the node is redundantly connected,the node’s H is the maximum hop count in the set of its relays plus one, if not,the maximal hop count is infinity.If and only if all nodes in the network have afinite maximal hop count,the network is redundantly connected.The topology management function aims to maintain a redundantly connected network whenever possible.This might not be possible for sparsely connected networks,where some nodes might only have one neighbor and therefore can-not be redundantly connected by definition.Sometimes it would be possible tofind alternative paths with a higher cost metric,which in turn would largely increase the overhead for topology maintenance(e.g.,for avoiding loops).For the cost metric,the tuple(L,H)is used.A node A has the smaller cost metric than node B ifL A<L B∨(L A=L B∧H A<H B).(1) During the operation of the network,DiMo continuously monitors the links(as described in Section3),which allows the detection of degrading links and allows triggering topol-ogy adaptation.Due to DiMo’s redundant structure,the node is still connected to the network,during this neighbor search,and hence in the case of an event,can forward the message without delay.3.MONITORING ALGORITHMThis section describes the main contribution of this paper, a distributed algorithm for topology,link and node monitor-ing.From the underlying MAC protocol,it is required that an acknowledged message transfer is supported.3.1AlgorithmA monitoring algorithm is required to detect failed nodes within a given failure detection time T D(e.g.,T D=5min).A node failure can occur for example due to hardware fail-ures,software errors or because a node runs out of energy. Furthermore,an operational node that gets disconnected from the network is also considered as failed.The monitoring is done by so called observer nodes that monitor whether the target node has checked in by sending a heartbeat within a certain monitoring time.If not,the ob-server sends a node missing message to the sink.The target node is monitored by one observer at any time.If there are multiple observer nodes available,they alternate amongst themselves.For instance,if there are three observers,each one observes the target node every third monitoring time. The observer node should not only check for the liveliness of the nodes,but also for the links that are being used for sending data packets to the sink in case of a detected event. These two tasks are combined by selecting the relay nodes as observers,greatly reducing the network load and maximiz-ing the network lifetime.In order to ensure that all nodes are up and running,every node is observed at all times. The specified failure detection time T D is an upper bound for the monitoring interval T M,i.e.,the interval within which the node has to send a heartbeat.Since failure detec-tion time is measured at the sink,the detection of a missing node at the relay needs to be forwarded,resulting in an ad-ditional maximal delay T L.Furthermore,the heartbeat can be delayed as well,either by message collisions or link fail-ures.Hence the node should send the heartbeat before the relay’s monitoring timer expires and leave room for retries and clock drift within the time window T R.So the monitor-ing interval has to be set toT M≤T D−T L−T R(2) and the node has to ensure that it is being monitored every T M by one of its observers.The schedule of reporting to an observer is only defined for the next monitoring time for each observer.Whenever the node checks in,the next monitoring time is announced with the same message.So for every heartbeat sent,the old monitoring timer at the observer can be cancelled and a new timer can be set according the new time.Whenever,a node is newly observed or not being observed by a particular observer,this is indicated to the sink.Hence the sink is always aware of which nodes are being observed in the network,and therefore always knows which nodes are up and running.This registration scheme at the sink is an optional feature of DiMo and depends on the user’s requirements.3.2Packet LossWireless communication always has to account for possi-ble message losses.Sudden changes in the link quality are always possible and even total link failures in the order of a few seconds are not uncommon[2].So the time T R for send-ing retries should be sufficiently long to cover such blanks. Though unlikely,it is possible that even after a duration of T R,the heartbeat could not have been successfully for-warded to the observer and thus was not acknowledged,in spite of multiple retries.The node has to assume that it will be reported miss-ing at the sink,despite the fact it is still up and running. Should the node be redundantly connected,a recovery mes-sage is sent to the sink via another relay announcing be-ing still alive.The sink receiving a recovery message and a node-missing message concerning the same node can neglect these messages as they cancel each other out.This recov-ery scheme is optional,but minimizes the false positives by orders of magnitudes as shown in Section4.3.3Topology ChangesIn the case of a new relay being announced from the topol-ogy management,a heartbeat is sent to the new relay,mark-ing it as an observer node.On the other hand,if a depre-cated relay is announced,this relay might still be acting as an observer,and the node has to check in as scheduled.How-ever,no new monitor time is announced with the heartbeat, which will release the deprecated relay of being an observer.3.4Queuing PolicyA monitoring buffer exclusively used for monitoring mes-sages is introduced,having the messages queued according to a priority level,in particular node-missing messagesfirst. Since the MAC protocol and routing engine usually have a queuing buffer also,it must be ensured that only one single monitoring message is being handled by the lower layers atthe time.Only if an ACK is received,the monitoring mes-sage can be removed from the queue(if a NACK is received, the message remains).DiMo only prioritizes between the different types of monitoring messages and does not require prioritized access to data traffic.4.EV ALUATIONIn literature,there are very few existing solutions for mon-itoring the health of the wireless sensor network deployment itself.DiMo is thefirst sensor network monitoring solution specifically designed for event detection applications.How-ever,the two prominent solutions of Sympathy[3]and Me-mento[4]for monitoring general WSNs can also be tailored for event gathering applications.We compare the three ap-proaches by looking at the rate at which they generate false positives,i.e.,wrongly inferring that a live node has failed. False positives tell us something about the monitoring pro-tocol since they normally result from packet losses during monitoring.It is crucial to prevent false positives since for every node that is reported missing,a costly on-site inspec-tion is required.DiMo uses the relay nodes for observation.Hence a pos-sible event message and the regular heartbeats both use the same path,except that the latter is a one hop message only. The false positive probability thus determines the reliability of forwarding an event.We point out that there are other performance metrics which might be of interest for evaluation.In addition to false positives,we have looked at latency,message overhead, and energy consumption.We present the evaluation of false positives below.4.1Analysis of False PositivesIn the following analysis,we assume r heartbeats in one sweep for Memento,whereas DiMo and Sympathy allow sending up to r−1retransmissions in the case of unac-knowledged messages.To compare the performance of the false positive rate,we assume the same sweep interval for three protocols which means that Memento’s and Sympa-thy’s sweep interval is equal to DiMo’s monitoring interval. In the analysis we assume all three protocols having the same packet-loss probability p l for each hop.For Sympathy,a false positive for a node occurs when the heartbeat from the node does not arrive at the sink in a sweep interval,assuming r−1retries on every hop.So a node will generate false positive with a possibility(1−(1−p r l)d)n,where d is the hop count to the sink and n the numbers of heartbeats per sweep.In Memento,the bitmask representing all nodes assumes them failed by default after the bitmap is reset at the beginning of each sweep interval. If a node doesn’t report to its parent successfully,i.e.,if all the r heartbeats are lost in a sweep interval,a false positive will occur with a probability of p l r.In DiMo the node is reported missing if it fails to check in at the observer having a probability of p l r.In this case,a recovery message is triggered.Consider the case that the recovery message is not kept in the monitoring queue like the node-missing messages, but dropped after r attempts,the false positive rate results in p l r(1−(1−p l r)d).Table1illustrates the false positive rates for the three protocols ranging the packet reception rate(PRR)between 80%and95%.For this example the observed node is in afive-hop distance(d=5)from the sink and a commonPRR80%85%90%95% Sympathy(n=1) 3.93e-2 1.68e-2 4.99e-3 6.25e-4 Sympathy(n=2) 1.55e-3 2.81e-4 2.50e-5 3.91e-7 Memento8.00e-3 3.38e-3 1.00e-3 1.25e-4 DiMo 3.15e-4 5.66e-5 4.99e-67.81e-8Table1:False positive rates for a node with hop count5and3transmissions under different packet success rates.number of r=3attempts for forwarding a message is as-sumed.Sympathy clearly suffers from a high packet loss, but its performance can be increased greatly sending two heartbeats every sweep interval(n=2).This however dou-bles the message load in the network,which is especially substantial as the messages are not aggregated,resulting in a largely increased load and energy consumption for nodes next to the paring DiMo with Memento,we ob-serve the paramount impact of the redundant relay on the false positive rate.DiMo offers a mechanism here that is not supported in Sympathy or Memento as it allows sending up to r−1retries for the observer and redundant relay.Due to this redundancy,the message can also be forwarded in the case of a total blackout of one link,a feature both Memento and Sympathy are lacking.4.2SimulationFor evaluation purposes we have implemented DiMo in Castalia1.3,a state of the art WSN simulator based on the OMNet++platform.Castalia allows evaluating DiMo with a realistic wireless channel(based on the empiricalfindings of Zuniga et al.[8])and radio model but also captures effects like the nodes’clock drift.Packet collisions are calculated based on the signal to interference ratio(SIR)and the radio model features transition times between the radio’s states (e.g.,sending after a carrier sense will be delayed).Speck-MAC[7],a packet based version of B-MAC,with acknowl-edgements and a low-power listening interval of100ms is used on the link layer.The characteristics of the Chipcon CC2420are used to model the radio.The simulations are performed for a network containing80 nodes,arranged in a grid with a small Gaussian distributed displacement,representing an event detection system where nodes are usually not randomly deployed but rather evenly spread over the observed area.500different topologies were analyzed.The topology management results in a redun-dantly connected network with up to5levels L and a max-imum hop count H of6to8.A false positive is triggered if the node fails to check in, which is primarily due to packet errors and losses on the wireless channel.In order to understand false positives,we set the available link’s packet reception rate(PRR)to0.8, allowing us to see the effects of the retransmission scheme. Furthermore,thisfixed PRR also allows a comparison with the results of the previous section’s analysis and is shown in Figure1(a).The plot shows on the one hand side the monitoring based on a tree structure that is comparable to the performance of Memento,i.e.,without DiMo’s possibil-ity of sending a recovery message using an alternate relay. On the other hand side,the plot shows the false positive rate of DiMo.The plot clearly shows the advantage of DiMo’s redundancy,yet allowing sending twice as many heartbeats than the tree approach.This might not seem necessarily fair atfirst;however,in a real deployment it is always possible(a)Varying number of retries;PRR =0.8.(b)Varying link quality.Figure 1:False positives:DiMo achieves the targeted false positive rate of 1e-7,also representing the reliability for successfully forwarding an event.that a link fails completely,allowing DiMo to still forward the heartbeat.The simulation and the analysis show a slight offset in the performance,which is explained by a simulation artifact of the SpeckMAC implementation that occurs when the receiver’s wake-up time coincides with the start time of a packet.This rare case allows receiving not only one but two packets out of the stream,which artificially increases the link quality by about three percent.The nodes are observed every T M =4min,resulting in being monitored 1.3e5times a year.A false positive rate of 1e-6would result in having a particular node being wrongly reported failed every 7.7years.Therefore,for a 77-node net-work,a false positive rate of 1e-7would result in one false alarm a year,being the targeted false-positive threshold for the monitoring system.DiMo achieves this rate by setting the numbers of retries for both the heartbeat and the recov-ery message to four.Hence the guard time T R for sending the retries need to be set sufficiently long to accommodate up to ten messages and back-offtimes.The impact of the link quality on DiMo’s performance is shown in Figure 1(b).The tree topology shows a similar performance than DiMo,if the same number of messages is sent.However,it does not show the benefit in the case of a sudden link failure,allowing DiMo to recover immedi-ately.Additionally,the surprising fact that false positives are not going to zero for perfect link quality is explained by collisions.This is also the reason why DiMo’s curve for two retries flattens for higher link qualities.Hence,leaving room for retries is as important as choosing good quality links.5.CONCLUSIONIn this paper,we presented DiMo,a distributed algorithm for node and topology monitoring,especially designed for use with event-triggered wireless sensor networks.As a de-tailed comparative study with two other well-known moni-toring algorithm shows,DiMo is the only one to reach the design target of having a maximum error reporting delay of 5minutes while keeping the false positive rate and the energy consumption competitive.The proposed algorithm can easily be implemented and also be enhanced with a topology management mechanism to provide a robust mechanism for WSNs.This enables its use in the area of safety-critical wireless sensor networks.AcknowledgmentThe work presented in this paper was supported by CTI grant number 8222.1and the National Competence Center in Research on Mobile Information and Communication Sys-tems (NCCR-MICS),a center supported by the Swiss Na-tional Science Foundation under grant number 5005-67322.This work was also supported in part by phase II of the Embedded and Hybrid System program (EHS-II)funded by the Agency for Science,Technology and Research (A*STAR)under grant 052-118-0054(NUS WBS:R-263-000-376-305).The authors thank Matthias Woehrle for revising a draft version of this paper.6.REFERENCES[1] A.Mainwaring et al.Wireless sensor networks for habitatmonitoring.In 1st ACM Int’l Workshop on Wireless Sensor Networks and Application (WSNA 2002),2002.[2] A.Meier,T.Rein,et al.Coping with unreliable channels:Efficient link estimation for low-power wireless sensor networks.In Proc.5th Int’l worked Sensing Systems (INSS 2008),2008.[3]N.Ramanathan,K.Chang,et al.Sympathy for the sensornetwork debugger.In Proc.3rd ACM Conf.Embedded Networked Sensor Systems (SenSys 2005),2005.[4]S.Rost and H.Balakrishnan.Memento:A health monitoringsystem for wireless sensor networks.In Proc.3rd IEEE Communications Society Conf.Sensor,Mesh and Ad Hoc Communications and Networks (IEEE SECON 2006),2006.[5]M.Strasser,A.Meier,et al.Dwarf:Delay-aware robustforwarding for energy-constrained wireless sensor networks.In Proceedings of the 3rd IEEE Int’l Conference onDistributed Computing in Sensor Systems (DCOSS 2007),2007.[6]G.Tolle and D.Culler.Design of an application-cooperativemanagement system for wireless sensor networks.In Proc.2nd European Workshop on Sensor Networks (EWSN 2005),2005.[7]K.-J.Wong et al.Speckmac:low-power decentralised MACprotocols for low data rate transmissions in specknets.In Proc.2nd Int’l workshop on Multi-hop ad hoc networks:from theory to reality (REALMAN ’06),2006.[8]M.Zuniga and B.Krishnamachari.Analyzing thetransitional region in low power wireless links.In IEEE SECON 2004,2004.[9]Fire detection and fire alarm systems –Part 25:Componentsusing radio links.European Norm (EN)54-25:2008-06,2008.。

无线网络技术_第8章 无线传感器网络

❖ 有效范围小:有效覆盖范围10~75米,具体依据实 际发射功率大小和各种不同的应用模式而定
❖ 工作频段灵活:使用频段为2.4GHz、868MHz(欧 洲)和915MHz(美国),均为免执照(免费)的 频段
8.4 无线传感器网络的应用
❖ 最初源于军事上的需求 ❖ 后逐渐被被用于农业,医学等领域
安全/监控
闲侦听,以便接收可能传输给自己的数据。过度的 空闲侦听或者没必要的空闲侦听同样会造成节点能 量的浪费。 (4)在控制节点之间的信道分配时,如果控制消息过多, 也会消耗较多的网络能量。
MAC协议分类标准
❖ 采用分布式控制还是集中控制 ❖ 使用单一共享信道还是多个信道 ❖ 采用固定分配信道方式还是随机访问信道方式
❖ 网络层(Network Layer)
网络层协议主要负责路由发现和维护
路由协议可以划分为平面路由协议和分级路由协 议
WSN 路由协议设计要遵从如下原则
❖ 能量利用率优先考虑 ❖ 数据为中心 ❖ 不影响传感器节点探测精度条件下的数据聚合 ❖ 理想的节点定位和目标追踪
❖ 传输层(Transport Layer)
❖链路层(Data Link Layer)
链路层协议用于建立可靠的点到点或点到多点通信链路, 主要由介质访问控制(Medium Access Control ,简称MAC) 组成,MAC协议的基本作用是避免点到点通讯时冲突的发 生。
传感器网络的MAC协议必须满足两项基本要求:首先是组 建网络底层基础设施,实现多跳并具备自组织特性的节点 无线通讯;其次是在节点通讯过程中实现平等高效的资源 共享
❖ 确定事件发生的位置或获取消息的节点位置是传感 器网络最基本的功能之一,对无线传感器网络应用 的有效性起着关键的作用。
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Fundamental Protocols for Wireless Sensor Networks∗Raghuvel S.Bhuvaneswaran,Jacir L.Bordim,Jiangtao Cui,and Koji NakanoDepartment of Electrical and Computer EngineeringNagoya Institute of Technology,Showa-ku,Nagoya466-8555,Japan(bhuvan,jace,cjto,nakano)@maple.elcom.nitech.ac.jpAbstractThe main contribution of this work is to present energy-efficient protocols that compute the sum of n numbers overany commutative and associative binary operator stored inn wireless sensor nodes arranged in a two-dimensional gridof size√n.Wefirst present a protocol that computesthe sum in O(r2+(n3)time slots with no sensor nodebeing awake for more than O(1)time slots,where r is thetransmission range of the sensor nodes.We then show afault-tolerant protocol that computes the sum in the samenumber of time slots with no sensor node being awake formore than O(log r)time slots.1.IntroductionA Wireless Sensor Network(WSN for short)is a dis-tributed system consisting of a base station and a number ofwireless sensors nodes endowed with radio transceivers.The data being sensed by the sensor nodes in the network iseventually transmitted to a base station,where the informa-tion can be accessed.Figure1depicts a network of sensornodes and a base station.Remote object monitoring andtracking is important in several different contexts,such astraffic management,production-line,detection of the pres-ence or absence of certain objects,and so on.WSNs greatlyextend the ability of monitoring and controlling the physicalenvironment from remote locations.If the sensors are em-powered with the ability of sharing their observations andcoordinating among themselves to gather and process in-formation,then meaningful and useful data can be availableat the base ers can retrieve information from thebase station to control the environment from afar.There-fore,we envision a future in which collections of sensornodes will be employed to form ad-hoc sensor networks.recognition.Similarly,when two or more sensor nodes are broadcasting a packet at the same time slot,the base station can not receive these packets.The sensor nodes in the WSN are assumed to run on batteries and saving power is exceedingly important as recharging them may not be possible while in operation. On the other hand,the base station is not energy-constrained and hence power saving is not crucial for it.It is well known that a sensor node expends power while its transceiver is ac-tive,that is,while transmitting or receiving a packet.It is perhaps surprising atfirst that a sensor node expends power even if it receives a packet that is not destined for it.Accord-ingly,we assess the efficiency of a protocol by the following two metrics:•The overall number of time slots required by the pro-tocol to terminate.•For each individual sensor node,the total number of time slots it has to be awake to transmit/receive pack-ets.The goal of optimizing these parameters are,of course, conflicting.It is relatively straightforward to minimize overall completion time at the expense of energy consump-tion.Similarly,one can minimize energy consumption at the expense of completion time.The challenge is to strike a sensible balance between the two by designing protocols that take a small number of time slots to terminate while keeping as energy-efficient as possible.As mentioned earlier,one of the salient features of WSN is information gathering.In other words,the major task is to collect the information that is scattered among the sensor nodes.In this work,we developed a protocol to perform any commutative and associative binary operation over the values stored in the sensor nodes.The binary operation in-volves addition,multiplication,logical AND/OR,and so on. Our protocol performs the operations in coordination with base station by efficiently avoiding possible collisions.This paper is organized as follows:Section2formally defines the problem and model.Section3provides some preliminary results used in the subsequent section.In Sec-tion4,we present an algorithm to solve the binary operation in multi-hop WSNs and Section5concludes this work.2Model and Problem DefinitionThe base station is equipped with powerful batteries and has a large antenna which covers a wide area,so that the it can monitor all the sensor nodes under consideration.The base station and the sensor nodes can directly communi-cate.The computation among the sensors is performed in coordination with the base station.A sensor node(sensor, for short)in a single-hop WSN can tune to a channel to send/receive a packet.At the end of a time slot,the status of the channel is:NULL:no packet has been driven into the channel in the current time slot;SINGLE:exactly one packet has been driven into the channel in the current time slot;COLLISION:two or more packets have been driven into the channel in the current time slot.Suppose that a sensor is positioned in a two dimensional plane.When a sensor transmits a packet with power r,the signal will be strong enough for other sensors to hear it within the Euclidean distance r from the sensor that orig-inates the packet.In other words,to cover a range of r,the sensor that originates the signal must transmit with enough power to cover that range.Every sensor in the intensity zone,that is,the region within the distance r from a sensor that originates the packet,is guaranteed to receive it.It is well known that signals are subject tofluctuations and start fading after trav-eling some distance[9].Hence,those sensors outside the transmission range r of a source node,say r+δfor some δ>0,may or may not receive the packet.We formalize this situation as follows:the fading zone of a sensor is defined as the region outside the intensity zone and inside f(r),where f is an increasing function.Clearly,those sensors in the fading zone,may or may not receive the packet.The status of the channel within the intensity zone is always SINGLE, and in the fading zone,it is either SINGLE or NULL.The sensors in the silent zone,that is,beyond the Euclidean dis-tance f(r)from the sensor that originated the broadcast are guaranteed not to receive the packet,and the status of the channel is always NULL.The status of the channel during a broadcast is illustrated in Figure2.For simplicity,we assume that f(r)=2r and design the protocol under this assumption.Our protocol also works for a general function f as long as f(r)=c·r+o(r)for anyfixed c≥1by adjusting some parameters used in the protocol.Suppose that two sensors S1and S2broadcast on the channel in the same time slot as illustrated in Figure3. When the transmissions of S1and S2overlap,a collision occurs and any sensor that lies between them cannot cor-rectly receive the packets.The sensors in the intensity zone of S1and in the fading zone of S2may or may not receive the packet from S1due to the interference caused by the sig-nal originated from S2.In this case,the status of the channel is either SINGLE or COLLISION.Similarly,sensors in the intensity zones of both S1and S2cannot receive packets and the status of the channel is always COLLISION.Sen-sors in the fading zone of S1and S2may or may not receive a packet from S1as well as S2.The status of the chan-nel,in this case,is NULL,SINGLE,or COLLISION.TheSilent ZoneSilent Zone Fading Zone Intensity ZoneSINGLE NULL ZoneChannel StatusNULL or SINGLEFigure 2.Transmission zones of a sensor node.COLLISIONChannel Status SINGLE NULL S C N NN NFigure 3.Status of the channel when the transmissions of two sensor nodes overlap.reader can easily generalize the above facts to three or more sensors.In this work,we assume that the sensor nodes in the WSN are organized as a two dimensional square plane of size √n with coordinates (x,y ),(1≤x,y ≤√n ),denote a cell consisting of all points (x,y),(x ≤x<x +1;y ≤y <y +1).Suppose that each cell C (x,y )has a sensor denoted S x,y .Throughout this work we assume that each sensor node S i,j ,(1≤i,j ≤√5as illustrated in Fig-ure 4.Hence,to ensure the communication between adja-cent sensors,a packet must be transmitted with power of at least √5≈2.24.Similarly,sensors in diagonal adjacent cells have distance of at most 2√2≈2.83to ensure com-munication with its neighbors.If the sensors on a WSN of size √n can broadcast with sufficient power tocover an area of√2r 2rn ),hasa value x i,j ,which could represent temperature,humidity,gravity,seismic information,etc.Let ⊗be any commuta-tive and associative binary operation such as addition,mul-tiplication,or finding the maximum.The sum problem is to perform the ⊗operation over all x i,j ,that is,X =x 1,1⊗x 1,2⊗,...,⊗x √n .Figure4.A sensor node has to transmit with enoughpower to ensure communication with sensors withinadjacent cells.In the next section,we present some protocols to solve the sum problem in single-hop WSNs.These results will be later used in developing a protocol for multi-hop WSNs.3Protocols to Collect Information Among the Sensor NodesSuppose that a WSN has m sensor nodes where all of them lie in the transmission range of each other and each one has a unique ID in[1,m].Let S i denote a sensor node with ID i(1≤i≤m),which has a value x i stored in it.The sum problem can be solved in m−1time slots as follows:For each time slot i(1≤i≤m−1)a sensor node S i broadcasts x i on the channel and sensor node S i+1mon-itors the channel.After receiving the value x i,the sensor node S i+1computes x i+1=x i⊗x i+1.Clearly,this proto-col takes m−1time slots.This protocol is energy-efficient,since each sensor node is awake for at most2time slots. Thus,we have the following lemma,Lemma1The sum can be computed on a WSN with m sen-sor nodes,where each sensor node has a unique ID in the range[1,m],in m−1time slots and each sensor node is awake for at most2time slots without involving the base station.Obviously,the above protocol is not fault tolerant.If any of the sensor nodes in the WSN fails,this protocol is unable to yield the correct result.To overcome this problem, we have devised a fault tolerant protocol.We assumed that faults will not occur during the execution of the protocol and at least one sensor node remains active in the WSN.For each time slot i(1≤i≤m),sensor node S i broad-casts x i on the channel,and every sensor node S k,(k>i) monitors the channel to receive the value.After receiving x i,each sensor node S k computes x k=x i⊗x k.When a sensor node S j(j<i)hears the broadcast of S i,it knowsthat S i exists and leaves the protocol.Consequently,this protocol terminates in m time slots.The worst case occurs when a single sensor node remains active in the WSN.In such case,this sensor node will be awake for exactly m time slots,that is,the entire duration of the protocol.We summarize ourfindings in the following lemma.Lemma2Even in the presence of faulty sensor nodes,the sum can be computed on a WSN with m sensor nodes,where each sensor node has a unique ID in the range[1,m],in m time slots and no sensor node is awake for more than m time slots without involving the base station.Although this protocol works in the presence of faulty sensor nodes,it is not energy-efficient.We now introduce a fault tolerant and energy-efficient protocol to compute the sum in a single-hop WSN.When the protocol terminates the following two conditions are satisfied:(Cnd-1)The last active sensor node,denoted as S k,such that no sensor node S i with i>k exists,has been identified and holds thefinal result.(Cnd-2)The protocol takes2m−2time slots and no sensor node is awake for more than2log m time slots.If m=1,then S1knows x1and the above conditions are verified.Now,assume that m≥2.The m sensor nodes are partitioned into two groups P1={S i|1≤i≤m2+1≤i≤m}.Recursively compute the sum in P1and P2.By the induction hypothesis,the above condi-tions Cnd-1and Cnd-2are satisfied and,therefore,each of the two subproblems can be solved in m−2time slots,with no sensor node being awake for more than2log m−2time slots.Let S j and S k be the last active sensor nodes in groups P1and in P2,respectively.In the next time slot,sensor node S j transmits x j,that is {x i|1≤i≤j and S i exists},on the channel.The last active sensor node S k in P2monitors the channel and updates the result.In one additional time slot the sensor node S k reveals its identity.The reader can easily confirm that the protocol satisfies the aforementioned conditions Cnd-1and Cnd-2.Thus,we have the following result,Lemma3Even in the presence of faulty sensor nodes,the sum can be computed on a WSN with m sensor nodes,where each sensor node has a unique ID in the range[1,m],in 2m−2time slots with no sensor node being awake for more than2log m time slots without involving the base station.4Protocol for Multi-hop WSNsIn this section,a protocol to solve the sum problem is presented for multi-hop WSNs.A naive protocol can com-pute the sum in a WSN with n sensor nodes in O(n)time slots as follows:each sensor node S i,j,(1≤i,j≤√r2)1Protocol BinOp;Step1:The√n cells are divided into n(9r4×9r4×r4×rThe partitioning scheme of Step1is illustrated in Fig-ure5.The grid has been partitioned in a way that the sensor nodes in a sub-block are within the transmission range of each other.Note that the maximum distance between any two sensor nodes of two neighboring sub-blocks is less than4)2+(r59r9r4×rn√49rn ×√49r49r4r4r9r9rr )time slots and9rrr4Figure7.The computation is performed in parallel for every row on eachgroup.Figure8.The sensor nodes transmit the sum of its group to the base station.no sensor node needs to be awake for more than3time slots.Those sensor nodes that hold the sum of their group,broad-cast to the base station in turn.Since there are nk2)time slots to compute the sum and thesensor nodes participating in this step are awake for exactly1time slot.Hence,our protocol takes O r2+k k2 time slots tocompute sum of n numbers on a WSN.The time complexityof our protocol can be minimized by properly selecting theparameter k.With k=(nr)1r2)1r2)1r2)1Combining the Lemma3and Lemma4we obtain the following corollary.Corollary2On a WSN where the sensor nodes are or-ganized as a grid,the sum of n numbers can be com-puted by a fault-tolerant and energy-efficient protocol in O(r2+(n3)time slots when r 1,and no sensor needs to awake for more than O(log r)time slots.Furthermore,if each sensor node is able to adjust its transmission range before the execution of the protocol, then with r2=(n3that is r=n14).5ConclusionWSNs can greatly augment the ability to control and supervise the environment from distant locations.In this work,we have focused on the problem of solving commuta-tive and associative binary operation over the values stored in n sensor nodes in a WSN.We proposed energy-efficient protocols that compute the sum of n numbers over any commutative and associative binary operator stored in n wireless sensor nodes arranged in a two-dimensional grid of size√n.We presented a protocol that computes the sum in O(r2+(n3)time slotswith no sensor node being awake for more than O(1)time slots,where r is the transmission range of the sensor nodes. Next,we introduced a fault-tolerant protocol that computes the sum in the same number of time slots with no sensor node being awake for more than O(log r)time slots.We have designed our protocol in such a way that collisions are properly avoided.References[1]N.Abramson,Multiple Access Communications:Foundations for Emerging Technologies,IEEE Press, New York,1993.[2]N.Abramson,Multiple access in wireless digital net-works,Proceedings of the IEEE,82,(1994),1360–1370.[3]R.Bar-Yehuda,O.Goldreich,and A.Itai,Efficient em-ulation of single-hop radio network with collision de-tection on multi-hop radio network with no collision detection,Distributed Computing,5,(1991),67–71.[4]R.Bar-Yehada,O.Goldreich,and A.Itai,Onthe time complexity of broadcast in radio net-works:An exponential gap between determinism and randomization,Journal of Computer and Systems Science,45,(1992),104-126.[5]D.Bertzekas and R.Gallager,Data Networks,SecondEdition,Prentice-Hall,1992.[6]R.Binder,N.Abramson,F.Kuo,A.Okinaka,andD.Wax,ALOHA packet broadcasting–a retrospect,AFIPS Conf Proceedings,May1975,203–216. [7]U.Black,Mobile and Wireless Networks,PrenticeHall,Upper Saddle River,NJ,1996.[8]Chlamtac.I.and Kutten.S,On Broadcasting in Ra-dio Networks-Problem Analysis and Protocol De-sign,IEEE translations on Communications,Decem-ber,(1985),Vol COM-33,No.12.[9]M.P.M.Hall and L.W.Barclay Radio-wave Propa-gation,IEE Electro Magnetic Wave Series30,Peter Peregrinus Ltd.,1989.[10]M.Hofri,A Feedback-less Distributed Broadcast Al-gorithm for Multihop Radio Networks with Time-varying Structure,2nd ACM intr.MCPR Workshop, Rome(May1987).[11]E.D.Kaplan,Understanding GPS:principles and ap-plications,Artech House,Greenwich,1998.[12]R.M.Metcalfe and D.R.Boggs,Ethernet:distributedpacket switching for local computer networks,Com-munications of the ACM,19,(1976),395–404. [13]R.Motwani and P.Raghavan,Randomized Algo-rithms,Cambridge University Press,1995.[14]K.Nakano,Optimal initializing algorithms for areconfigurable mesh,Journal of Parallel and Dis-tributed Computing,vol.24,pp.218-223,Jan.1995. [15]D.E.Willard,Log-logarithmic selection resolutionsprotocols in a multiple access channels,SIAM Journal on Computing.V ol.15,468-477,(1986).。

相关文档
最新文档