International Journal of Ad Hoc and Ubiquitous Computing...

28
International Journal of Ad Hoc and Ubiquitous Computing, Vol. x, No. x, xxxx 1 Geographic and Energy-Aware Routing in Wireless Sensor Networks Dengfeng Yang , Xueping Li §* , Rapinder Sawhney , Xiaorui Wang [ Department of Industrial and Information Engineering University of Tennessee Knoxville, TN 37996-0700, USA Tel.: +1-865-974-3511; Fax: +1-865-974-3511 E-mail:([email protected]) § Department of Industrial and Information Engineering University of Tennessee 408 East Stadium Hall, Knoxville, TN 37996-0700, USA Tel.: +1-865-974-7648; Fax: +1-865-974-0588 E-mail:([email protected]) Department of Industrial and Information Engineering University of Tennessee Knoxville, TN 37996-0700, USA Tel.: +1-865-974-7653; Fax: +1-865-974-0588 E-mail:([email protected]) [ Department of Electrical and Computer Engineering University of Tennessee Knoxville, TN 37996-0700, USA Tel.: +1-865-974-0627; Fax: +1-865-974-5483 E-mail:([email protected]) * Corresponding author Abstract: Energy efficiency is crucial for large scale sensor networks due to the intrinsic resource constraints of the wireless sensors and the infeasibility to change depleted batteries that may reside in hostile en- vironments. This paper proposes an energy efficient routing algorithm based on a two-layer wireless sensor network (WSN) architecture to maximize the lifetime. The proposed scheme takes advantage of the geographic deployment knowledge to build routing protocols. Linear programming formulations are developed to maximize the lifetime of WSNs. A hybrid energy-efficient routing scheme (HERS) is proposed to incorporate both max-min residual energy and min-max communication energy consumption information. Simulation results show that the pro- posed routing algorithms can prolong the lifetime of a WSN compared to the existing algorithms. Keywords: Wireless Sensor Network, Geographic Deployment Knowl- edge, Energy-Aware Routing Reference to this paper should be made as follows: Dengfeng Yang, Xueping Li, Rapinder Sawhney, and Xiaorui Wang (xxxx) ‘Geographic Copyright c 200x Inderscience Enterprises Ltd.

Transcript of International Journal of Ad Hoc and Ubiquitous Computing...

Page 1: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

International Journal of Ad Hoc and Ubiquitous Computing, Vol. x, No. x, xxxx 1

Geographic and Energy-Aware Routing inWireless Sensor Networks

Dengfeng Yang†, Xueping Li§∗, RapinderSawhney‡, Xiaorui Wang [

† Department of Industrial and Information EngineeringUniversity of TennesseeKnoxville, TN 37996-0700, USATel.: +1-865-974-3511; Fax: +1-865-974-3511E-mail:([email protected])§Department of Industrial and Information EngineeringUniversity of Tennessee408 East Stadium Hall, Knoxville, TN 37996-0700, USATel.: +1-865-974-7648; Fax: +1-865-974-0588E-mail:([email protected])‡ Department of Industrial and Information EngineeringUniversity of TennesseeKnoxville, TN 37996-0700, USATel.: +1-865-974-7653; Fax: +1-865-974-0588E-mail:([email protected])[ Department of Electrical and Computer EngineeringUniversity of TennesseeKnoxville, TN 37996-0700, USATel.: +1-865-974-0627; Fax: +1-865-974-5483E-mail:([email protected])∗Corresponding author

Abstract: Energy efficiency is crucial for large scale sensor networksdue to the intrinsic resource constraints of the wireless sensors and theinfeasibility to change depleted batteries that may reside in hostile en-vironments. This paper proposes an energy efficient routing algorithmbased on a two-layer wireless sensor network (WSN) architecture tomaximize the lifetime. The proposed scheme takes advantage of thegeographic deployment knowledge to build routing protocols. Linearprogramming formulations are developed to maximize the lifetime ofWSNs. A hybrid energy-efficient routing scheme (HERS) is proposed toincorporate both max-min residual energy and min-max communicationenergy consumption information. Simulation results show that the pro-posed routing algorithms can prolong the lifetime of a WSN comparedto the existing algorithms.

Keywords: Wireless Sensor Network, Geographic Deployment Knowl-edge, Energy-Aware Routing

Reference to this paper should be made as follows: Dengfeng Yang,Xueping Li, Rapinder Sawhney, and Xiaorui Wang (xxxx) ‘Geographic

Copyright c© 200x Inderscience Enterprises Ltd.

Page 2: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

2 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

and Energy-Aware Routing in Wireless Sensor Networks’, InternationalJournal of Ad Hoc and Ubiquitous Computing , Vol. x, No. x, pp.xxx–xxx.

Biographical Notes:Dengfeng Yang is a Ph.D. student in the Department of Industrial

and Information Engineering at the University of Tennessee, Knoxville.His research interests are focused on system modeling and optimization,data storage and query for sensor network, energy efficient routing, andkey management.

Xueping Li is an Assistant Professor of Industrial and InformationEngineering and the Director of the Intelligent Information EngineeringSystems Laboratory (IIESL) at the University of Tennessee - Knoxville.His research areas include information assurance, scheduling, web min-ing, supply chain management, lean manufacturing, and sensor net-works. He is a member of IEEE, IIE and INFORMS.

Rapinder Sawhney is an Associate Professor and Associate Depart-ment Head in the Department of Industrial and Information Engineeringat the University of Tennessee, Knoxville. He was the recipient of LeanFellowship and was responsible for enhancing the competitiveness ofTennessee industry utilizing the Lean Manufacturing concept. His re-search interests are developing Lean methods to implement Lean, whichhave resulted in various publications. His experience includes workingfor over hundreds of organizations in implementing the Lean concept.

Xiaorui Wang is an Assistant Professor in the Department of Electri-cal and Computer Engineering at the University of Tennessee, Knoxville.His research interests are wireless sensor networks, real-time embeddedsystems, distributed systems, power-aware computing, and Quality ofService (QoS) control. He is a member of the IEEE, the IEEE Com-puter Society and the ACM.

Page 3: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 3

1 Introduction

Wireless sensors are autonomous sensing devices with wireless communicationcapability within a short distance. A sensor node typically consists of a power unit,a sensing unit, a processing unit, a storage unit, and a wireless transmitter/receiver(Akyildiz et al., 2002). A wireless sensor network (WSN) contains a large numberof sensor nodes deployed in some controlled and safe environments (such as home,office, warehouse, et al.) or some uncontrolled and hostile environments (such asbattlefields, toxic regions, et al.). It has wide applications that include combatfield surveillance, real-time traffic and pollution monitoring, wildlife monitoring,and so on. However, several limitations must first be addressed such as energyconstraints, computation capabilities and security issues for a wide practical use ofsensor networks. Among these limitations, energy constraint is of great importance.The large number of sensors in the network and their random distribution in theapplication field and the possible hostile environment make it extremely difficult,if not impossible, to replenish the drained battery of each sensor. Therefore, howto make efficient use of the batteries and extend the lifetime of sensor networks hasbecome one of the most important research issues of WSNs (Akkaya and Younis,2005).

Current energy-aware protocols are mainly categorized into 1) minimum energyrouting protocols (Singh et al., 1998; Haque et al., 2005); 2) max-min routing pro-tocols (Li et al., 2001; Toh, 2001; Zhang and Mouftah, 2006); and 3) minimum costrouting protocols (Chang and Tassiulas, 1999, 2000; Zhang and Mouftah, 2006;Kalpakis et al., 2002). The minimum energy routing protocols minimize total con-sumed energy to reach the destination thus minimizing the unit energy consumptionper packet. However, these protocols may not maximize the network lifetime sincethe residual energy is not taken into account. Consequently, some nodes on theminimum energy routes will easily fail due to the heavy forwarding load. Themax-min routing protocols, such as conditional max-min battery capacity rout-ing (CMMBCR) (Toh, 2001), max-min zPmin (Li et al., 2001) and MREP (Zhangand Mouftah, 2006), avoid this problem by choosing a route that maximizes theminimal residual energy of some nodes in this route. But these protocols add theoverhead of control packets for the on-demand version and it is difficult to decidethe optimal threshold value that determines the operation modes. Besides theabove three categories of energy-aware protocols, there are many other efforts toextend the lifetime of WSNs. Linear programming (LP) formulations are proposedfor the network lifetime maximization (Chang and Tassiulas, 1999, 2000; Zussmanand Segall, 2003; Hou et al., 2005; Kalpakis et al., 2002). Storage node placementproblem is considered to save energy for data collection and data query (Shenget al., 2006). Several upper bounds of the lifetime of a sensor network are derived(Bhardwaj and Chandrakasan, 2002; Sadagopan and Krishnamachari, 2004; Sankarand Liu, 2003).

Most of the above energy-aware protocols are based on the flat network orhierarchical network and neglect the information that how the sensor nodes aredeployed and distributed. The geographic location information is easy to obtaindue to the very nature of a WSN and can be used to build routing algorithms toconstruct a scalable energy-saving communication infrastructure. An advantage ofgeographic routing is its stateless and localized nature since the packet forwarding

Page 4: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

4 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

depends only on the location information of the candidate nodes in the vicinityand the destination node. Hence, the geographic routing is scalable because itdoes not require additional control overhead. In this paper, we present a two-layersensor network model by incorporating the geographic deployment knowledge ofthe network based on which we propose a Hybrid Energy-Efficient Routing Scheme(HERS) to extend the network lifetime by considering the max-min residual energyrouting and the min-max cost routing. To the best of our knowledge, this is thefirst work to develop the hybrid energy-efficient routing protocol while minimizingthe communication energy consumption using the nodes deployment knowledge.

The rest of the paper is organized as follows. Section 2 describes the proposedtwo-layer network architecture and the deployment method. Section 3 providesthe LP formulations of max-min residual energy and min-max cost optimizationproblems. A hybrid energy-efficient routing algorithm is developed. Section 4shows the simulation results and comparisons with other similar protocols in termsof network lifetime. Finally, section 5 concludes the paper.

2 Network Architecture and Deployment Method

2.1 Scheme Architecture

It is critical to construct and maintain an efficient network topology. The sensornodes in a multihop WSN can collaborate with each other to determine their trans-mission power and define the network topology through forming proper neighborrelations. This topology differs from the ”traditional” network in which the nodestransmit with their maximal transmission power without considering the powerefficiency.

We define a two-layer architecture of a WSN as shown in Fig. 1, which is dif-ferent from traditional flat networks such as Fig. 2. In a flat network, the topologyimplicitly depends on the geographic locations of the sensors and each node trans-mits with its maximal transmission power. Although simple for small networks,this network architecture suffers from scalability. For example, adding a new nodeneeds to inform the whole network to set up the keys for communication, whichinvolves large communication energy consumption and is infeasible for the WSNbecause of its intrinsic resource limitation. On the other hand, a WSN acts similarto scale free networks (Barabasi and Albert, 1999), in which there is a high proba-bility that a node links to a node that has already a large number of connections.This means that for a group of sensor nodes, there could be one or two nodes thatact as communicating switches. Hence, in this paper, we introduce the concept ofcluster heads and use as the switches and propose a two-layer WSN architectureFig 1. The base station and cluster heads constitute a logical top layer while othersensor nodes constitute a logical lower layer. This two-layer group-based archi-tecture assumption is reasonable and practical for the large-scale network. Eachgroup contains several cluster heads to communicate with the base station. If twogroups are not neighbors, the sensors will communicate via cluster heads and thebase station. More details of this two-layer architecture can be found at (Li et al.,2007).

Page 5: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 5

¿ Insert Figure 1 and Figure 2 about here. À

2.2 Deployment Knowledge

There are many methods to deploy sensor networks (Zhou et al., 2005; Du et al.,2004). For example, an airplane can scatter sensor nodes over the battlefield. Basedon the above two-layer architecture and the geographic locations of the sensor nodes,we can partition a large scale sensor network into groups. The following assumptionsare made: 1) Nodes are deployed randomly and the groups are allocated accordingto the geographic location; and 2) Once the sensor nodes are deployed, they arestatic. A deployment point refers to the location where a sensor node is deployed.The probability density function (pdf) of the geographic location of the nodes suchas their Euclidean locations can then be estimated.

In practice, sensor nodes are usually deployed in groups to realize a specifiedfunction, e.g., in (Werner-Allen et al., 2005). Sensor nodes are deployed in differentgroups and each group is considered as a unit to sense temperature, acoustic pres-sure and seismic velocity. In the paper, we adopt such a group-based deploymentapproach, assuming that the target deployment region is a two-dimensional ma×narectangular area. The target region is divided into m × n equal-sized subregionsRij(i = 1, · · ·m, and j = 1, · · ·n) with each subregion a × a square meters. Eachgroup, Gij(i = 1, · · ·m; j = 1, · · ·n), is deployed to the subregion Rij . Let N be thetotal number of sensors. The N sensors are uniformly partitioned into N/g groupsGij with the number of sensors in each group equal to g, and each group Gij is ran-domly deployed into the subregions Rij . The proposed deployment scheme relaxesthe assumptions in (Du et al., 2004) so that subregions are predefined and eachsensor group is deployed into a specified subregion. Every sensor node k in groupGij can be denoted as [(i, j), k ∈ N ]. The deployment knowledge can be obtainedas follows:

1. Divide the target region into subregions Rij ;

2. N sensor nodes are partitioned into groups Gij with g sensors in each group;

3. The node k in group Gij has an identifier [(i, j), k ∈ Gij ], and the distributionof the sensors in each group follows a pdf f(x, y|k ∈ Gij). A natural choicefor the pdf is a two-dimensional Gaussian distribution which can be easilyextended to other distributions such as the Poisson distribution (Sheng et al.,2006) or the uniform distribution according to the application or the actuallydistribution of the sensors. In Section 4 we will investigate the influence ofpdf on the maximal lifetime of the system;

4. Randomly distribute the groups Gij into the subregions Rij .

Since we model the sensor deployment distribution as a two-dimensional Gaussiandistribution, the pdf for the sensor node k in the position µ = (x, y) is deployed inthe group Gij whose deployment coordination is (xi, yj). We have the probabilitydensity function:

f(x, y|k ∈ Gij) =1

2πσ2e−[(x−xi)

2+(y−yi)2]/2σ2

(1)

Page 6: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

6 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

where σ2 is the variance parameter of the Gaussian distribution.

¿ Insert Figure 3 about here. À

An example is shown in Fig. 3, where the target deployment region is dividedinto 4 × 4 sub-regions Rij(1 ≤ i ≤ 4, 1 ≤ j ≤ 4). The N sensors are partitionedinto 16 subgroups Gij(1 ≤ i ≤ 4, 1 ≤ j ≤ 4), with each group containing g nodesand 3 cluster heads. These groups are randomly distributed into the sub-regions.In this deployment method, each group of sensors has eight randomly determinedadjacent groups, i.e., sensors in group G32 have neighbors either in group G22 or ingroups G31, G22, G14, G11, G41, G13, G42, G34, and the sub-region Rij is a squarewith the edge a × a. For simplicity, we assume each group has 8 neighbors andignore the groups locating at the edge and the corner of the targeted area, wherethey actually have 5 and 3 neighbor groups, respectively.

When the pdf f(x, y|k ∈ Gij) of sensor nodes in the sub region Rij is as inEq. 1, the probability that the sensor deployment point will be out of the range ofthe preferred targeted sub-region is less than 0.03% if we empirically choose σ toensure 6σ = a, where σ is the standard deviation of the Gaussian distribution. Forexample, in the Fig. 4, σ is equal to 25m/6.

3 Maximization of the Lifetime of Network

A sensor network can be modeled as a directed graph G(N, L), where N is theset of all nodes plus the base station, and L is the set of all directed links (i, j),i, j ∈ N . Link (i, j) exists if and only if j ∈ Si, where Si is the set of all nodesthat can be directly reached by node i with a certain transmit power level in itsdynamic range. SUBRt(g, e) represents the directed subgraph of the tth groupSUBRt, where g is the group size, or the number of sensor nodes in the groupSUBRt, e is the set of all the directed links (p, q), and 0 ≤ t ≤ N/g, p, q ∈ N .The directed graph CB(M, CL) is the set of all cluster heads and the base station,where M is the set of all the cluster heads and the base station, CL is the set of allthe directed links (x, y), x, y ∈ M . Let CH be the set of cluster heads. Each nodei has an initial battery energy Ei. The transmission energy consumed at node ito transmit a data unit to its neighboring node j is denoted by et

ij and the energyconsumed by the receiver j is denoted by er

ij .There will be multiple commodities C in this network G(N, L), where a com-

modity is defined as a group containing the source and destination nodes. Forexample, SUBRt(g, e) can be seen as a commodity, and the source nodes are thesensing nodes which will send the sensed information to the destination nodes.The destination nodes are the cluster heads, which receive the sensed information,process or relay it. Another example is CB(M, L), where source nodes are thecluster heads and the destination node is the base station.

We assume that each sensor node generates one data packet per time unit,which is termed as one round, and transmits the packet to the base station viaintermediate nodes. For simplicity, every packet has a fixed size of z bits. Ateach round, each function unit, or group, will sense the necessary information andsend it to the cluster heads for data aggregation; then, the cluster heads will send

Page 7: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 7

the extracted information to the base station. The base station is assumed to beresource rich.

We define the system lifetime as the duration of time where all the functionunits perform properly. We assume that all the groups have to coordinate witheach other to perform their designed functions. Hence, the lifetime of a WSN isequal to the time of the death of the first group after time zero. In our model,when all the 3 cluster heads use up the energy, the group will lose its function, andconsequently, the system will die. The objective is to find the most energy efficientalgorithm that can maximize the lifetime of the network.

3.1 Energy Model

Our general energy model follows the first order radio model (Heinzelman et al.,2000). The energy expenditure per unit of information transmission from node i toj with the distance dij is given by:

etij = eT + εampd

αij (2)

and

erij = eR (3)

where eT = eR = 50nJ/bit is the energy consumed in the transceiver circuitry atthe transmitter and the receiver respectively. The constant εamp = 100pJ/bit is theenergy consumed coefficient at the output transmitter antenna for transmitting onemeter. The distance exponent α ranges from 2 to 4, with 2 being a short distanceand 4 a long distance. We investigate the influence of α on the system’s lifetime insection 4.1. Notice that we ignore the sensing energy consumption and computa-tion energy consumption, because they are much smaller than the communicationconsumption (1 : 10 ∼ 1 : 300)(Heinzelman et al., 2000).

3.2 General Energy Efficient Modeling

Let q(c)ij be the transmission rate of the commodity c from node i to node j, or a

flow variable indicating the flow that c sends to the base station over the link (i, j)(unit bits/second), and let q

(c)ij be the total bits that commodity c transmits from

node i to node j until time T , i.e., q(c)ij = T ×q

(c)ij . Let CHt be the set of the cluster

heads {u, v, w} in the tth group SUBRt, where 0 ≤ t ≤ N/g and u, v, w denote the3 cluster heads in the tth group. Let ri be the necessary received flow rate for nodei to finish its task (unit bits/second).

Based on the lifetime definition and the system model, the lifetime of the clusterhead k ∈ CHt under the given flow q(c) is given by:

Tk(q) =Ek∑

j∈SRt

etkj

∑c∈C

q(c)kj +

∑j:k∈Sk

erjk

∑c∈C

q(c)jk

(4)

where∑

j∈SRt

etkj

∑c∈C

q(c)kj +

∑j:k∈Sk

erjk

∑c∈C

q(c)jk is the energy consumption rate includ-

ing transmitting and receiving consumptions (unit J/second). Now the lifetime of

Page 8: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

8 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

our model can be defined as the minimal maximal lifetime of the cluster heads insome group, i.e.:

Tsys = min maxk∈CHt

Tk(q), t ∈ 1, . . . , N/g (5)

The objective is to find the flow that maximizes the system lifetime under theflow conservation conditions. Accordingly, the energy efficiency problem can beformulated into the following linear programming problem:

Maximize T (6)

Subject to

q(c)ij ≥ 0, ∀j = 1, 2, . . . , N, ∀c ∈ C (7)

N+1∑

j=1

etij

c∈C

q(c)ij +

N∑

j=1

erij

c∈C

q(c)ij ≤ Ei, ∀i ∈ c (8)

N∑

j=1

q(c)ji + ri × T =

N+1∑

j=1

q(c)ij , ∀i ∈ c, i 6= j, ∀c ∈ C (9)

where N + 1 means that we consider the base station as a packet receiver, but it isnot thought of as a sensor node. Eq.(7) conserves the feature that sensors have theability to send packets to other nodes. Eq. (8) means that any energy consumptionin data sending and receiving should respect the energy constraints. Eq. (9) meansthat every sensor generates the same amount of bits as it takes in. As long as thevariable T in (6) is considered as an independent variable, the above equations canbe seen as a linear programming problem (Chang and Tassiulas, 2000).

3.3 Energy Optimization Method

In this section we first present two traditional energy optimization routing al-gorithms for the energy-efficient communications: one is to maximize the minimalresidual energy routing path (Li et al., 2001; Toh, 2001; Zhang and Mouftah, 2006)and the other is to minimize the maximal energy consuming path (Chang andTassiulas, 1999, 2000; Zhang and Mouftah, 2006). Then we provide our improvedHybrid Energy-efficient Routing Scheme (HERS).

• Max-min Residual Energy Routing Scheme (MMRERS)

To extend the lifetime of the network, MMRERS selects a routing path thatcontains the maximal residual energy among all the possible paths. This maximalresidual energy routing path is determined in quantity by the node whose residualenergy is minimal along the path. That is why the MMRERS is designed to addressthis max-min problem. Alternatively, the purpose of MMRERS is to find the pathand maximize its remaining energy at a low communication overhead.

Initially,within the group SRt, where 0 ≤ t ≤ N/g, the set A contains only thecluster heads u, v, w. Let SRt − A denote the set of sensor nodes in SRt that arenot included in A. We define the residual energy of a pair (i, j) as min(Er[i] −

Page 9: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 9

etij ∗ q

(k)ij , Er[j] − er

ji ∗ q(k)ji ) where i ∈ SRt − A and j ∈ A. Intuitively, on adding

a directed link (i, j) to A, the residual energy at the sensor node i is reduced bythe energy consumed in transmitting a data packet from i to j. Consequently, theresidual energy of node j will be reduced by the energy consumed in receiving adata packet. Among all pairs (i, j) such that i ∈ SRt−A and j ∈ A, the procedurechooses one with the maximum residual energy and includes the link (i, j) in A.The process is repeated until all sensor nodes in SRt are included in A, and forother groups, the process will repeat in the same procedure.

For the top layer, a similar algorithm is adopted. Firstly, the set B containsonly the base station, and set CH denotes the set of cluster heads. We use thesame definition of residual energy, and add the maximal residual energy link (m,n)to the set B until all the cluster heads are included in B.

• Min-max Link Energy Consuming Routing Scheme (MMLERS)

To maximize the lifetime of a network, a direct method is to obtain a pathwhich consumes minimal energy in communication. Consequently, the goal of thedesign is to minimize the energy depleting rate at individual nodes by selectingpaths constituted by links with energy as low as possible.

According to our network architecture, every group contains 3 cluster heads,denoted by u, v, and w. Each cluster head needs to receive, process and transmitthe information coming from every non-cluster head node within the group, whichwould consume the energy denoted by E. Therefore, in order to extend the lifetimeT for each cluster head, our objective is to minimize the maximum energy Emax

consumed by each non-cluster head node within a group. Let SRt, 0 ≤ t ≤ N/g,denote the tth group. The following is the linear programming problem to minimizethe maximal energy consumption:

Minimize Emax (10)

Energy constraints:∑

j∈SRt

etij

c∈C

q(c)ij +

j:i∈Si

erij

c∈C

q(c)ij +

k∈CHt

j 6=i∈SRt

etjk

c∈C

q(c)jk +

k∈CHt

j 6=i∈Si

erkj

c∈C

q(c)kj ≤ Emax, ∀i ∈ SRt, 0 ≤ t ≤ N/g (11)

Flow constraints:∑

j∈SRt

q(c)ji + ri ∗ T =

j∈Si

q(c)ij +

k∈CHt

j 6=i∈Si

q(c)ik , ∀i ∈ SRt (12)

where i is a sensor node within the group SRt, and k is a cluster head in anyother groups except SRt where node i is in. For every group in the network G, thelinear program minimizes the maximum energy consumed by any sensor node ofthis group, subjecting to the energy constraint (11) and the flow constraint (12).Eq. (12) defines the flow conservation condition, where flow in equals to flow out.

For the top layer max-min problem, all the cluster heads construct anothergroup, denoted by CH. It can be easily formulated in a similar linear equationformat like Eqs. (6) - (9).

Page 10: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

10 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

• Hybrid Energy-efficient Routing Scheme (HERS)

The MMRERS scheme suffers from the fact that the max-min residual energylinks may consume more communication energy. Under this condition, the systemwill use up its energy soon and die. The MMLERS LP formulation can be solvedpolynomially by using source-based algorithms, such as Dijkstra’s algorithm orBellman-Ford algorithm (Ahuja et al., 1993). However, its max-min paths usuallycontain nodes whose communication consumption to other nodes is minimal or nearto minimal. Therefore, these nodes have a high probability to be selected by theseoptimal paths and run out of battery energy quickly due to the heavy forwardingload while other nodes contain almost full battery energy. Thus, the MMLERS isenergy inefficient also.

To solve these problems, we present the hybrid energy-efficient routing scheme(HERS), which considers both the max-min residual energy as the link cost and themin-max communication energy consumption. The minimum energy path will berecalculated and redirected to other paths after every residual energy broadcast, andtherefore, makes good use of all the possible nodes to construct optimal paths. Also,because the algorithm runs within the divided groups, the death of a non-clusterhead sensor node won’t affect the lifetime of the rest of the network. Moreover,the complexity of the HERS algorithm is low since it involves in the group size,denoted as g, and it considers the threshold values of residual energies of clusterheads. Multiple cluster heads extend the system’s lifetime also.

To further investigate the impacts of residual energy broadcasting on the net-work lifetime, we adopt dynamic HERS, or D-HERS, which adjusts the broadcastinterval, denoted by m, dynamically, and static HERS, or S-HERS, which uses afix broadcast interval.

We denote Er[i] to be the residual energy at the sensor nodes i. Initially,Er[i] = E for each node i in the network. We introduce a new link metric costijthat combines the unit data transmission energy consumption et

ij and erji, initial

energy Ei and Ej , and the residual energy Er[i] and Er[j] as follows:

costij = etij(Ei/Er[i])β + er

ij(Ej/Er[j])β (13)

A similar metric can be referred to in (Chang and Tassiulas, 2000). The linkcost is denoted by the energy consumption from the sending nodes to the receivingnodes. We use the exponent index β to emphasize that residual energy does haveimpact. We will investigate the influence of the exponent index β on the system’slifetime in section 4.1.

The HERS algorithm, hence D-HERS and S-HERS which differ from each otherby different residual energy broadcast policies, is describe as follows. HERS takesthe deployment knowledge of N sensors and initial energy in each sensor as inputs.Output is the system’s lifetime. Let T be the system’s lifetime counted by the totalrounds.

During the simulation, since each group resides within a relatively small regionand each contains only g nodes, we treat each group as a sensing unit which executesthe same functions. Thus, we take a random selection policy to select a node toact as an information source that sends the information to the destination, or thecluster head along the optimal path. After m rounds, another random selected nodeis selected as the source. Similarly, another cluster head is randomly selected as the

Page 11: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 11

Algorithm 1 HERS1: Partition the N sensor network into t ⇐ dN

g e groups gi, . . . , gt, such that eachgroup has g nodes and 3 cluster heads.

2: for each group, calculate the distances between each sensor node, and send theinformation to the cluster heads.

3: for each cluster head, calculate the distance from other cluster heads in othergroups.

4: let initial broadcast interval m ⇐ 5 and lifetime T ⇐ 0.5: if mod(T, m) == 0 then6: for each group, broadcast the residual energy to every other node.7: for each cluster head, broadcast the residual energy to other cluster heads.8: for each group, calculate the shortest link cost paths from sensor nodes to

cluster heads using Eq. 13.9: for each cluster head, calculate the shortest link cost paths to other cluster

heads using Eq. 13.10: based on the new paths, for each group, send packages from sensors to cluster

heads, update the residual energy.11: for each cluster head, send packages to other cluster heads and finally to the

base station, update the residual energy.12: T ⇐ T + 1.13: else14: based on the old paths, for each group, send packages from sensors to cluster

heads, update the residual energy.15: for each cluster head, send packages to other cluster heads and finally to the

base station, update the residual energy.16: for each group17: if the residual energy of all the 3 cluster heads less than a threshold then18: return T.19: else20: T ⇐ T + 1.21: goto 5.22: end if23: end if

destination. For D-HERS, the broadcast interval m increments every p rounds, ortime slots, where p is fixed value and is decided after the network is deployed. If mreaches the predefined threshold, it will not change any more. The time complexityof the HERS algorithm is O(tg2 log g + t2 log t). Usually, the number of groups tis much less than the number of sensor nodes in one group g, or t ¿ g. The timecomplexity can be simplified as O(tg2 log g).

4 Simulation and Results

In this section, we compare the performance of the HERS algorithm with threeother algorithms: the MLDA (maximum lifetime data gathering) and CMLDA(clustering-based MLDA) which incorporate the MMRERS and MMLERS schemes

Page 12: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

12 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

and are proposed by (Kalpakis et al., 2002), and the LRS Leach (Heinzelman et al.,2000; Lindsey and Raghavendra, 2002) in terms of network lifetime, since theyoutperform other existing energy efficiency schemes (Kalpakis et al., 2002).

We build the simulation environment by choosing a 50m× 50m target area andvary the number of sensors in the network, i.e. the network size, N , excluding thecluster heads, from 40, 60, 80, to 100 respectively. Each group contains 10 non-cluster head sensor nodes and 3 cluster heads. Each sensor (including non-clusterheads or cluster heads) has an initial energy of 1 unit and generates packets of size1000 bits per round, which is consistent with the settings in (Kalpakis et al., 2002).For the lower layer, each group has an optimal path whose information source is anon-cluster-head sensor node, and destination a cluster head. For the other nodesand cluster heads within this group, they all act as information relay units andjust forward the whole packets they receive to the next hop. If the next hop is acluster head which acts as the destination, it will process these packets and extractkey information and then forward them to the base station via other cluster heads.This is the top layer’s communication scheme, see next paragraph. Here we assumethe extraction ratio is 1 : 10, which means in each round, a cluster head receives1000 bits from the source node, and the key information 100 bits are extracted andforwarded to the next hop.

As for the top layer, we use a similar scheme. Since N/g groups in the low layerhas N/g optimal paths, and therefore has N/g information destinations, which areconsidered as information sources in the top layer, denoted by Pt, t ∈ 1, · · · , N/g.The destination is the base station in the top layer. According to the extractionratio, each path will transmit 100 bits to the base station. We process these trans-mission in queue in our simulation, although in fact, these N/g sources may sendinformation to the base station simultaneously. This simplification will not affectthe evaluation of the algorithms since practically the base station will process in-coming information in the queue, otherwise, information congest will occur. TheBellman-Ford algorithm (Ahuja et al., 1993) is used to find the optimal path, andthe Boost Graph Library (Siek et al., 2000-2001) is used in our Matlab simulationcode.

We assume the broadcast message contains 100 bits in this simulation. The basestation is located at location (25m, 150m), as (Kalpakis et al., 2002) set. We canuse optimal position selection techniques to locate the base station such as in (Panet al., 2005), but it is out of our paper’s scope. The energy model for the sensorsis based on the first order radio model described in Eqs. 2 and 3.

We distribute the g sensor nodes and 3 cluster heads into each group accordingto the Gaussian distribution, as shown in Fig. 4, where the total number of sensoris N = 40, and group size is g = 10. Therefore, there are 4 groups and each grouphas a 25m× 25m targeted area. We also simulate the lifetime of the network basedon the uniform distribution of the sensor node in the targeted area when the net-work size N is 40. As shown in the Figs. 5, 6, and 7, the Gaussian distribution hasa slightly better performance in the lifetime than that of the uniform distribution.

¿ Insert Figure 4 about here. À

Page 13: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 13

4.1 Optimal Selection of Parameters

Since each node cannot know each other’s residual energy level, a periodic broad-cast containing the battery energy information should be sent to the neighbors.Obviously a smaller interval will provide more accurate battery information butwill also consume more communication energy and incur information congestion.A longer broadcast interval, on the other hand, will consume less energy but leadsto a non-optimal path selection. Fig. 5 shows the tradeoff between the lifetimeof the network and the residual energy broadcast interval. The broadcast intervalranges from 5 to 15. When m ≥ 20, the lifetime will approach to, but not exceed16, 667, since the optimal lifetime obtained from the LP optimization is 16, 667.However, when the broadcast interval m increases, the computation time increases.We choose the broadcast interval m = 10 for S-HERS in the later discussion.

¿ Insert Figure 5 about here. À

Fig. 6 shows the relation of the exponent index β in the link cost equation 13with the lifetime of the network when the network size is 40. As we can see, theGaussian distribution has a better performance than the Uniform distribution, andthe maximal lifetime is 8529 when β is chosen to be 10.

¿ Insert Figure 6 and 7 about here. À

Fig. 7 shows the impact of the exponent α in the energy equations (2)-(3) tothe lifetime of the network with the network size 40. When α increases from 2 to3, the lifetime decreases dramatically since the energy exponent change will incurchanges exponentially. To compare with (Kalpakis et al., 2002), the same energyexponent α = 2 is chosen.

The relationship between the network lifetime and the number of cluster headsis revealed in Fig. 8. It can be seen that the network lifetime increases with theincrease of number of cluster heads. We also investigate the average number of hopsper path with the cluster heads per group changing from 1 to 5. We find out thatthe average number of hops increases with the increase of the number of clusterheads as well which is reasonable since data packets are more likely to be relayedthrough the cluster heads. The increase of the number of hops may result in thedegradation of the timeliness performance and higher possibility of exposition toadversarial attacks. Details of the quantitative survivability analysis of a WSN canbe found at LGKE (Li et al., 2007). Hence, the selection of the number of clusterheads needs to take into account of both resource consumption and survivability.We choose three cluster heads to conduct the numerical experiment in this paper.

¿ Insert Figure 8 about here. À

Page 14: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

14 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

4.2 Performance of HERS

In this section, we will compare the performance of HERS with CMLDA, aclustering-based 2-level hierarchical protocol proposed by Kalpakis, Dasgupta andNamjoshi (Kalpakis et al., 2002), and LRS, a chain-based 3-level hierarchical proto-col proposed by Lindsey, Raghavendra and Sivalingam (Lindsey et al., 2001) sincethese protocols have the similar hierarchical network structure and outperformsother protocols in terms of system lifetime. More details about the protocols canbe found in (Lindsey et al., 2001), (Lindsey and Raghavendra, 2002) and (Kalpakiset al., 2002).

¿ Insert Table 1 about here. À

Table 1 is based on the fixed broadcast interval m = 10 for S-HERS, β = 5and α = 2, for D-HERS, Broadcast intervals are chosen as m = 10 for N = 40,m = 12 for N = 60, m = 14 for N = 80, m = 16 for N = 100 separately. Some keyobservations can be obtained as follows.

The lifetime of a network obtained using the static broadcast interval (S-HERS)decreases when the network size increases. It is inferior to MLDA and CMLDAwhen network size is 80 or more, since when the network size increases, the num-ber of the groups increases. Therefore, the communication within the top layerconsumes more energy. S-HERS performs 1.10-1.31 times better than MLDA andCMLDA with a smaller network size. The lifetime obtained using S-HERS is sig-nificantly longer than that of LRS for all the network sizes, which is 1.23-1.53 timesbetter than LRS.

D-HERS outperforms MLDA, CMLDA, and LRS at a relatively stable level ofabout 8500. The lifetime of the network using D-HERS is about 1.03-1.29 timeslonger than that of MLDA and CMLDA, and about 1.50 times longer than that ofLRS.

Next we conduct a series of experiments with a relatively larger network size.The sensors are deployed in a 100m × 100m targeted area based on Gaussian dis-tribution. The network size, N , varies from 100, to 500. Each sensor has an initialenergy 1 unit, and the base station is located at (50m, 300m). The network is di-vided into groups, and each group has 10 sensor nodes. All the settings are the sameas (Kalpakis et al., 2002). In this series experiments, we adopt D-HERS schemesince D-HERS has a better performance than S-HERS in large scale networks. Theresults are shown in Table 2. As we can see, D-HERS has a stable lifetime levelabout 7200, which is about 1.1-2.0 times longer than that of CMLDA, and about2.50 times longer than that of LRS.

¿ Insert Table 2 about here. À

5 Conclusion

Sensor networks is becoming ubiquitous, and its energy efficiency issue is crucialfor its wide applications due to its intrinsic resource constraints. In this paper, we

Page 15: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 15

tackle the energy efficiency problem by proposing a geographic and energy-awarerouting protocol. Geographic deployment information of the sensors is modeledbased on a two-layer sensor network. Linear programming formulations for thenetwork lifetime maximization is developed. We propose two heuristic algorithms,S-HERS and D-HERS, to extend the network lifetime by incorporating the max-minresidual energy scheme and the min-max communication energy scheme.

The simulation results show that the D-HERS outperforms the existing algo-rithms consistently. For small scale sensor networks, the S-HERS can achieve net-work lifetime 1.1 − 1.3 times longer than other existing protocols. For all thenetworks tested with different sizes, the D-HERS can obtain about 10%− 100% in-crease in network lifetime comparing to its peers. Also, we find that the Gaussiandeployment model prolongs the lifetime of a WSN by about 20% longer than theuniform deployment model.

As part of our future research, we would like to implement the D-HERS al-gorithm on a real WSN using Berkeley motes. Also, this study, and those in theliterature (Kalpakis et al., 2002; Lindsey et al., 2001), consider up to 500 nodes inthe network. It is of interest to investigate the energy-aware routing algorithms fora large scale network, e.g. one containing more than 10, 000 nodes.

References

Ahuja, R. K., Magnanti, T. L., Orlin, J. B., 1993. Network flows: theory, algo-rithmes, and applications. Prentice Hall, Inc.

Akkaya, K., Younis, M., 2005. A survey on routing protocols for wireless sensornetworks. Ad Hoc Networks 3, 325–349.

Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E., 2002. Wireless sensornetworks: a survey. Computer Network 38, 393–422.

Barabasi, A., Albert, R., October 1999. Emergence of scaling in random networks.Science 286.

Bhardwaj, M., Chandrakasan, A. P., 2002. Bounding the lifetime of sensor networksvia optimal role assignments. IEEE INFOCOM.

Chang, J.-H., Tassiulas, L., September 1999. Routing for maximum system lifetimein wireless ad hoc networks. the 37th Annu. Allerton Conf. Communication,Control, and Computing.

Chang, J.-H., Tassiulas, L., March 2000. Energy conserving routing in wireless adhoc networks. Proc. IEEE INFOCOM, 22–31.

Du, W., Deng, J., Han, Y. S., Varshney, P. K., March 2004. A key managementscheme for wireless sensor networks using deployment knowledge. IEEE INFO-COM.

Haque, I. T., Assi, C., Atwood, J. W., October 2005. Randomized energy awarerouting algorithms in mobile ad hoc networks. MSWim’05, Montreal, Quebec,Canada.

Page 16: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

16 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

Heinzelman, W., Chandrakasan, A., Balakrishnan, H., January 2000. Energy-efficient communication protocol for wireless microsensor networks. The HawaiianInt. Conf. Systems Science.

Hou, Y. T., Shi, Y., Sherali, H. D., Midkiff, S. F., September 2005. On energyprovisioning and relay node placement for wireless sensor network. IEEE Trans.on Wireless Communications 4 (5).

Kalpakis, K., Dasgupta, K., Namjoshi, P., 2002. Efficient algorithms for maximumlifetime data gathering and aggregation in wireless sensor network. ComputerNetwork.

Li, Q., Aslam, J., Rus, D., July 2001. Online power-aware routing in wireless ad-hocnetworks. Proceedings of MOBICOM.

Li, X., Yang, D., Sawhney, R., 2007. Layered group key establishment for wirelesssensor networks. Pervasive and Mobile Computing, in review.

Lindsey, S., C.Raghavendra, Sivalingam, K., April 2001. Data gathering in sensornetworks using energy delay metric. International Workshop on Parallel and Dis-tributed Computing Issues in Wireless Networks and Mobile Computing, (SanFrancisco, CA).

Lindsey, S., Raghavendra, C. S., 2002. Pegasis: Power-efficient gathering in sensorinformation systems. Proc. of IEEE Aerospace Conference.

Pan, J., Cai, L., Hou, Y. H., Shi, Y., Shen, S. X., September 2005. Optimal base-station locations in two-tiered wireless sensor networks. IEEE Trans. on MobileComputing 4 (5), 458–473.

Sadagopan, N., Krishnamachari, B., 2004. Maximizing data extraction in energy-limited sensor networks. IEEE INFOCOM.

Sankar, A., Liu, Z., 2003. Maximum lifetime routing in wireless sensor networks.Proc. IEEE INFOCOM.

Sheng, B., Li, Q., Mao, W., May 2006. Data storage placement in sensor networks.In: ACM International Symposium on Mobile Ad Hoc Networking and Comput-ing (Mobihoc). Florence, Italy, pp. 344–355.

Siek, J., Lee, L.-Q., Lumsdaine, A., 2000-2001. Boost graph library-Http://www.boost.org/libs/graph/doc/index.html.

Singh, S., Woo, M., Raghavendra, C., October 1998. Power-aware routing in mobilead hoc networks. Proc. ACE/IEEE MOBICOM98.

Toh, C. K., June 2001. Maximum battery life routing to support ubiquitous mobilecomputing in wireless ad hoc networks. IEEE Communication Magazine, 138–147.

Werner-Allen, G., Johnson, J., Ruiz, M., Lees, J., Welsh, M., January 2005. Mon-itoring volcanic eruptions with a wireless sensor network. In Proceedings of theSecond European Workshop on Wireless Sensor Networks (EWSN’05).

Page 17: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 17

Zhang, B., Mouftah, H. T., 2006. Energy-aware on-demand routing protocols forwireless ad hoc networks. ACM Wireless Networks 12, 481–494.

Zhou, L., Ni, J., Ravishankai, C. V., September 2005. Efficient key establishment forgroup-based wireless sensor deployments. Proceedings of 2005 ACM Workshopon Wireless Security (WiSe 2005).

Zussman, G., Segall, A., 2003. Energy efficient routing in ad hoc disaster recoverynetworks. Proc. IEEE INFOCOM.

Page 18: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

18 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

List of Tables

1 Simulation results for a 50m× 50m sensor network . . . . . . . . . . 192 Simulation results for a 100m× 100m sensor network . . . . . . . . . 20

Page 19: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 19

Table 1 Simulation results for a 50m× 50m sensor network

N S-HERS D-HERS MLDA CMLDA LRS

40 8529 8529 6610 6512 5592

60 7912 8468 7174 7084 5872

80 7397 8471 7945 7809 6002

100 6804 8545 8290 8121 5526

S-HERS broadcast interval m = 10D-HERS Broadcast interval m = 10 for N = 40, m = 12 for N = 60, m = 14 for N = 80,

m = 16 for N = 100

Page 20: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

20 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

Table 2 Simulation results for a 100m× 100m sensor network

N D-HERS CMLDA LRS

100 7212 3611 2458

200 7106 4512 2854

300 7535 5560 3212

400 7468 6142 3654

500 7194 6577 3596

Page 21: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 21

Base Station

G k

G p

G u

G w

G v

G h G i

G q

C luster Head

Sensing N ode

Figure 1 Architecture of a two-layer sensor network. The base station and clusterheads constitute a logical top layer while other sensor nodes constitute a logical lowerlayer and is divided into groups.

Page 22: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

22 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

Base Station

Sensing N ode

R elay ing N ode

Inactive N ode

Figure 2 Traditional distributed sensor network without layers. The sensing nodessend the information to the base station via the relaying nodes. The relaying nodes justforward the information without processing it.

Page 23: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 23

R 12 R 13 R 14R 11

R 22 R 23 R 24R 21

R 32 R 33 R 34R 31

R 42 R 43 R 44R 41

G22 G14 G44G31

G32 G41 G33G11

G42 G34 G23G13

G24 G21 G12G43

i

j

a

a

Figure 3 Random group-based deployment method. The left figure shows the sub-region structure, and the right figure shows the groups that are randomly arranged to thesub-regions, and the indexes (1 ≤ i, j ≤ 4).

Page 24: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

24 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

Figure 4 Sensor deployment in the Gaussian distribution. Here solid dots representsensor nodes and hollow circles represent cluster heads. In this 50m × 50m target area ,40 sensor nodes are deployed and are divided into 4 groups, each group contains 3 clusterheads and 10 sensor nodes within the 25m× 25m targeted area. Within each sub region,the 10 sensor nodes and 3 cluster heads are distributed in Gaussian distribution with thecentral point of the sub region as mean point. The standard deviation sigma is set toσ = 25m/6. Under this setting, the probability that a sensor node is out of the sub regionis less than 0.03%. The cluster heads are deployed randomly.

Page 25: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 25

Broadcast Rounds

5 6 7 8 9 10 11 12 13 14 15

Life

time

of th

e S

enso

r N

etw

ork

6000

7000

8000

9000

10000

Gaussian DistributionUniform Distribution

Figure 5 Rounds vs. lifetime for the uniform distribution and the Gaussian distrib-ution. Here the network size is N = 40, and is divided into 4 groups, with each groups10 nodes. The distribution of the nodes follows Fig. 4. The uniform distribution meanswithin each group, the nodes are distributed in the targeted area with even probability.

Page 26: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

26 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

Exponent of Link Cost Metrics

1 2 3 4 5 6 7 8 9 10

Life

time

of S

enso

r N

etw

ork

8000

8100

8200

8300

8400

8500

8600

8700

Gaussian DistributionUniform Distribution

Figure 6 Exponent of link cost metrics β vs. network lifetime. Here the network sizeis N = 40, and is divided into 4 groups, with each groups 10 nodes. The distributionsof the nodes will follow Fig. 4. The broadcast interval m is chosen to be 10. The keyobservation is that when β = 5, the lifetime reaches the maximum.

Page 27: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

Geographic and Energy-Aware Routing in Wireless Sensor Networks 27

Exponent of Energy Equation

2.0 2.2 2.4 2.6 2.8 3.0

Life

time

of S

enso

r N

etw

ork

0

1000

2000

3000

4000

5000

6000

7000

8000

9000

Gaussian DistributionUniform Distribution

Figure 7 Exponent of energy equation α vs. network lifetime. Here the network sizeis N = 40, and is divided into 4 groups, with each groups 10 nodes, the distribution of thenodes will follow Fig. 4. The broadcast interval m is chosen to be 10, and the exponentβ is set as 10. When α changes from 2 to 3, the lifetime decreases dramatically.

Page 28: International Journal of Ad Hoc and Ubiquitous Computing ...pdfs.semanticscholar.org/4507/71b13adbe51f43664624a103d46aaba14b02.pdfdue to the intrinsic resource constraints of the wireless

28 Dengfeng Yang, Xueping Li, Rapinder Sawhey, and Xiaorui Wang

Figure 8 Number of cluster heads vs. network lifetime. Here the network size isN = 60, and is divided into 6 groups, with each groups 10 nodes, the distribution of thenodes will follow Fig. 4. The broadcast interval m is chosen to be 12, and the exponentβ is set as 10, α is set as 5. When the number of cluster heads changes from 1 to 5, thelifetime increases slightly.