Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Similar documents
MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks

Energy Optimal Routing Protocol for a Wireless Data Network

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Figure 1. The Example of ZigBee AODV Algorithm

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Gossiping using the Energy Map in Wireless Sensor Networks

Survey on Network Lifetime Enhancement Method

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

DAG based In-Network Aggregation for Sensor Network Monitoring

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Mobile Network Analysis - Hole Healing

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

Protocol Design for Neighbor Discovery in AD-HOC Network

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Optimized Load Balancing Mechanism Using Carry Forward Distance

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Base Station Design and Architecture for Wireless Sensor Networks

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Relocating Sensor Nodes to Maximize Cumulative Connected Coverage in Wireless Sensor Networks

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Some Security Trends over Wireless Sensor Networks

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Halmstad University Post-Print

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

Securing MANET Using Diffie Hellman Digital Signature Scheme

Access Control And Intrusion Detection For Security In Wireless Sensor Network

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

Energy Efficiency of Load Balancing in MANET Routing Protocols

The Monitoring of Ad Hoc Networks Based on Routing

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks

Distributed Consistency Method and Two-Phase Locking in Cloud Storage over Multiple Data Centers

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART


Node Degree based Clustering for WSN

INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Master s Thesis. Load Balancing Techniques for Lifetime Prolonging in Smart Metering System

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Internet of Things (IoT): A vision, architectural elements, and future directions

Design of Remote data acquisition system based on Internet of Things

A Fast Path Recovery Mechanism for MPLS Networks

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Keywords: EAACK, ACK, S-ACK, MRA, DIGITAL SIGNATURE, IDS

Wireless Sensor Networks Database: Data Management and Implementation

Wireless Sensor Network: Challenges, Issues and Research

Recent advances in microelectromechanical

Using Received Signal Strength Variation for Surveillance In Residential Areas

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Customer Specific Wireless Network Solutions Based on Standard IEEE

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

WIRELESS networks that are widely deployed for commercial

Isolines: Energy-efficient Mapping in Sensor Networks

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Analysis of Typical Secure Routing Protocols in WSN

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Transcription:

BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 1 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0005 Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm R. Balamurali 1, K. Kathiravan 2 1 IFHE (The ICFAI Foundation for Higher Education) University, Hyderabad, India 2 Easwari Engineering College, Ramapuram, Chennai, India Emails: mohmur@gmail.com kathirraji@gmail.com Abstract: One of the key issues in Wireless Sensor Networks (WSN) is the hot-spot problem i.e. the nodes closer to the sink tend to drain their energy at a faster rate when compared to other nodes as they have to perform more communication and hence the sensor network may get isolated. In this paper we are using an integrated MAC and routing protocol which divides the network into tiers. We also propose a quantification algorithm, which decides the number of nodes in each tier to mitigate the hot-spot problem. Keywords: WSN, hotspot problem, tier, quantification algorithm, sink. 1. Introduction The advances of micro-sensing Micro-ElectroMechanical Systems (MEMS) and wireless communication technologies have promoted the development of wireless sensor networks. A WSN consists of many sensor nodes densely deployed in a field: individually able to collect environmental information and together able to support multihop ad hoc routing. WSNs provide an inexpensive and convenient way to monitor the physical environments. With their environment-sensing capability WSNs can enrich human life with their application in health care, building monitoring, and home security. Due to the advancement in MEMS and availability of low-cost sensor nodes lot of research is being conducted in Wireless Sensor Networks. The major issue, which most researches focus on, is energy consumption in WSN. One related issue is hot-spot problem. 2. Problem definition WSN uses a multi-hop communication pattern i.e. the sensor nodes will not send the sensed parameter directly to the sink: rather they are passed on to the sink in a hop by hop fashion. So the nodes closer to the sink have to communicate their own sensed 73

data and should also relay data from the other nodes. Hence they deplete their energy quicker than the other nodes. As a result the network may get isolated. In this paper we integrate MAC and Routing and form a tier-based architecture as proposed in [1]. Since it is generally assumed that sensor nodes would become inexpensive a simple solution to this problem is to add supplementary nodes in the hot-spot area [2]. We are also proposing a quantification algorithm, which decides the effective number of nodes in each tier to maximize the network life time and to reduce or to mitigate the hot-spot effect. 3. Related work Several differing solutions are proposed to mitigate hot-spot effect as specified in [2-7]. A clustering approach, similar to LEACH, with varying cluster head is proposed in [3] to mitigate hot-spot affect. A multi-hop and hierarchical multi-hop routing approach is used in [4] to mitigate the hot-spot effect. An analysis of intelligent power control i.e. nodes far away from sink should transmit over a longer distance and data aggregation using an aggregator node to mitigate hot-spot effect is discussed in [5]. DEAR [6] algorithm optimizes each individual distance so that all sensor nodes consume their energy at a similar rate. Mobile sensors are used in [7] for surveillance. Besides mobile sensors nodes may self-configure as-well for mitigation of hot-spot effect. The rest of the paper is divided into four parts: Section 4 Tier-formation; Section 5 Quantification algorithm; Section 6 Simulation results; Section 7 Conclusion. 4. Tier-formation To create tiers, we are following the approach proposed in [1]. We divide the nodes around the sink as tiers. The nodes closer to the sink (e.g., within a range of 250 m) form tier1. The next level of nodes (e.g., which have a range of distance between 250 and 500 m) form Tier 2. It follows the same calculation of the range of distance for the rest of the tiers. Tier formation consists of two phases: Setup phase and Action phase. 74 Fig. 1. Tier-formation

4.1. Setup phase Initially all nodes except the sink node's Tier ID will be set as 1 and the Tier ID of the sink will be 0. The sink will broadcast a Hello Message with its Tier ID (i.e., 0), the nodes receiving this message will set their Tier ID as 1 (i.e., received Hello Message Tier ID +1). Now all these nodes with Tier ID 1 will broadcast the Hello Message. The nodes with Tier ID 1 receiving this hello message will update their Tier ID to 2. This process continues until all nodes are assigned with a positive Tier ID. Thus the tier-formation will be completed at the end of the setup phase. 4.2. Action phase If any node has to send a sensed data, the node will broadcast an RTS message with its Tier ID. The node in the previous tier receiving this RTS message (i.e., the Tier ID of the receiving node should be 2 to send a CTS if the sender s Tier ID is 3) can alone respond with a CTS message. Following this the sender node would send the Data packet to the node from which it first receives the CTS and the receiver node would send an acknowledgment to the sender. Now, the received node will broadcast the RTS and transmit the data packet to the next tier. This process continues until the data successfully reaches the sink. The communication is commonly from node to sink and not from sink to node in WSN. 5. Quantification algorithm Before, discussing the quantification algorithm, consider the following example. Fig. 2. Hotspot problem In Fig. 2 there are three nodes A, B and C in the Tier 1, 2 and 3 respectively. Let us assume that all the three nodes have an initial energy level of 5 J and let us also assume that for every communication the node loses 1 J of energy. At a given instance of time, if all three nodes would like to communicate a sensed parameter to the sink, 75

node C will communicate the sensed data to node B in concurrence with the tierbased multi-hop communication. Now node C s available energy will be 4 J. Node B has to communicate its own data besides the data from C, so its energy will become 3 J and node A has to communicate its own data besides communicating two data from B. So its energy will be 2 J. At the end of Cycle 1, node A s energy will be 2 J, node B s energy will be 3 J and node C s energy will be 4 J. Consider the same action for cycle 2, i.e., at a particular time instance, all three nodes would like to communicate the sensed parameter to the sink. Now, after C s communication, its energy will be 3 J and after B communicating its own sensed data and data from C, its energy will be 1 J and A s available energy is only 2 J, but it has to transmit 3 data, whereas it can communicate only 2 data and after that node A will be drained and as a result a hot-spot occurs and the network gets isolated. We are proposing a very simple quantification algorithm by analyzing the above stated problem. The quantification algorithm is as follows. If there are x nodes in outer tier then there should be 2x nodes in the next inner tier and 3x nodes in the next inner tier and so on and there should be nx nodes in the first tier, where n is the total number of tiers. Applying this quantification algorithm to the problem stated in Fig. 2, we will get a setup as it is shown in Fig. 3. 76 Fig. 3. Quantification algorithm based node allocation Now, consider the situation that one node from each tier would like to communicate at a given instance of time and also let us assume that the initial energy of all nodes is 5 J. Let us also assume that nodes B1 and B2 are in the same sensing range within Tier 2 and A1, A2 and A3 are in the same sensing range within Tier 2. Now during Cycle 1, node C is sending a sensed data to Tier 2 (let us assume to B1) and C s energy will become 4 J. And, meanwhile, if any event occurs at Tier 2 then B2 will communicate that to Tier 1 as B1 is communicating with C and following which B1 will also communicate the data to Tier 1. Now the energy of B1 and B2 will be 4 J. Assuming that the data sent by B1 and B2 is received by A1 and A2 in Tier 1 respectively, then A1 and A2 will communicate this data to the sink. Meanwhile, if there is any event at Tier 1, this will be communicated by the node A3. So, by the end of Cycle 1 all nodes A1, A2, A3, B1, B2 and C have energy level of

4 J. And if this continues, at the end of Cycle 5, all nodes energy will be 0. It should be noted here that the events occur rarely in a WSN, what we have considered here is a worst-case scenario to produce a model for maximizing the life time of WSN. Compared to the basic model, proposed in Fig. 2, the model proposed in Fig. 3 increases the lifetime by four fold, which is a substantial improvement. The quantification algorithm can be defined as follows, given the number of nodes N: nx + (n 1)x +... + 2x + 1x = N, where x is the number of nodes in Tier n and nx is the number of nodes in Tier 1. 5.1. Benefit of the quantification algorithm The quantification algorithm tries to provide an approximate count on the number of nodes to be placed in each tier to reduce the impact of Hotspot. Instead of sensor nodes, if dedicated repeaters are used, then they should also be battery powered and further repeaters can t sense or compute. Hence, it is advantageous to use sensor nodes as repeaters rather than using dedicated repeaters. As [2] suggests, a simple and efficient solution to mitigate the Hotspot problem is by adding additional nodes around the sink. Further, it is estimated that the cost of sensor nodes are getting cheaper and cheaper, hence adding more nodes to mitigate the hotspot effect and to increase the network lifetime is considered as the simple and efficient solution as of the current state-of-art. 6. Simulation and experimental results We have made a Simulation with three scenarios, each having three tiers. In Scenario 1 (Fig. 4) there are 4 nodes in each tier, in Scenario 2 (Fig. 5) there are 8 nodes in Tier 1 and 4 nodes in other two tiers and in Scenario 3 (Fig. 6) there are 12 nodes in Tier 1, 8 nodes in the Tier 2 and 4 nodes in the last or Tier 3. These three scenarios have been simulated with SMAC and Integrated MAC and routing algorithm. From simulation results it has been found that Tier based quantification gives better network life time for Integrated MAC and Routing algorithm than SMAC. Fig. 4. Scenario 1 Fig. 5. Scenario 2 77

From Fig. 7, we can observe a substantial improvement of overall lifetime of the network for Integrated MAC and Routing protocol. Fig. 6. Scenario 3 Fig. 7. Performance analysis of SMAC and Integrated MAC and Routing (IMAC) Fig. 8. Performance analysis of SMAC and Integrated MAC and Routing (IMAC) 7. Conclusion and future scope We have addressed the hot-spot problem in WSN and proposed a simple and efficient algorithm to mitigate the hot-spot effect and to improve the overall network life-time. The paper can be further improved by working in the lines of deciding the number of sensors nodes in each tier given a coverage area and for simplicity we have not considered the sleep/wake-up pattern, by considering the sleep wake-up pattern, the effective number of nodes in each tier may still increase but as the sensor nodes are getting cheaper and cheaper it may not be an hindrance. The solution proposed is a trade-off between number of sensor nodes in each tier and the overall life-time of the WSN. R e f e r e n c e s 1. K u l k a r n i, S., A. I y e r, C. R o s e n b e r g. An Address-Light, Integrated MAC and Routing Protocol for Wireless Sensor Networks. IEEE/ACM Transactions on Networking, Vol. 14, August 2006, No 4, pp. 793-806. 78

2. R i v a s, H., T. V o i g t, A. D u n k e l s. A Simple and Efficient Method to Mitigate the Hot Spot Problem in Wireless Sensor Networks. IEEE GLOBECOM Wireless Ad Hoc and Sensor Networks. 3. Y e, M., E. C han, G u i h a i. On Mitigating Hot Spots for Clustering Mechanisms in Wireless Sensor Networks. National Laboratory of Novel Software Technology, Nanjing University, China and Department of Computer Science, City University of Hong Kong, China, 1-4244-0507-6/06/$20.00 2006 IEEE, pp. 558-561. 4. A b d u l l a, A. E. A. A., H. N i s h i y a m a, N. K a t o. Extending the Lifetime of Wireless Sensor Networks: A Hybrid Routing Algorithm. Computer Communications Journal, Vol. 35, May 2012, No 9, pp. 1056-1063. 5. P e r i l l o, M., Z. C h e n g, W. H e i n z e l m a n. An Analysis of Strategies for Mitigating the Sensor Network Hot Spot Problem. In: Proc. of Second International Conference on Mobile and Ubiquitous Systems, 2005, pp. 474-478. 6. W a n g, J., I. J e a n d e D i e u, A. D e L e o n D i e g o J o s e, S. Lee, Y.-K. Lee. Prolonging the Lifetime of Wireless Sensor Networks via Hotspot Analysis. In: Proc. of 10th IEEE/IPSJ International Symposium on Applications and Internet (SAINT), 2010, pp. 383-386. 7. T s e n g, Y u-c h e e, You-C h i u n W a n g, Kai-Y a n g C h e n g, Yao-Y u H s i e h. imouse: An Integrated Mobile Surveillance and Wireless Sensor System. National Chiao Tung University, Published by the IEEE Computer Society, Vol. 40, 2007, No 6, pp. 60-66. 79