Scholarly article on topic 'An Energy Efficient Data Gathering in Dense Mobile Wireless Sensor Networks'

An Energy Efficient Data Gathering in Dense Mobile Wireless Sensor Networks Academic research paper on "Computer and information sciences"

CC BY
0
0
Share paper
Academic journal
ISRN Sensor Networks
OECD Field of science
Keywords
{""}

Academic research paper on topic "An Energy Efficient Data Gathering in Dense Mobile Wireless Sensor Networks"

Hindawi Publishing Corporation

ISRN Sensor Networks

Volume 2014, Article ID 518268, 10 pages

http://dx.doi.org/10.1155/2014/518268

Research Article

An Energy Efficient Data Gathering in Dense Mobile Wireless Sensor Networks

R. Velmani1 and B. Kaarthick2

1 CSE Department, Anna University, Regional Centre, Coimbatore, Tamilnadu 641047, India

2 ECE Department, Coimbatore Institute of Engineering and Technology, Coimbatore, Tamilnadu 641109, India

Correspondence should be addressed to R. Velmani; velmanir@gmail.com Received 6 February 2014; Accepted 20 March 2014; Published 16 April 2014 Academic Editors: G. Mazzini, A. Song, and Y. Yu

Copyright © 2014 R. Velmani and B. Kaarthick. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Amidst of the growing impact of wireless sensor networks (WSNs) on real world applications, numerous schemes have been proposed for collecting data on multipath routing, tree, clustering, and cluster tree. Effectiveness of WSNs only depends on the data collection schemes. Existing methods cannot provide a guaranteed reliable network about mobility, traffic, and end-to-end connection, respectively. To mitigate such kind of problems, a simple and effective scheme is proposed, which is named as cluster independent data collection tree (CIDT). After the cluster head election and cluster formation, CIDT constructs a data collection tree (DCT) based on the cluster head location. In DCT, data collection node (DCN) does not participate in sensing, which is simply collecting the data packet from the cluster head and delivering it into sink. CIDT minimizes the energy exploitation, end-to-end delay and traffic of cluster head due to transfer of data with DCT. CIDT provides less complexity involved in creating a tree structure, which maintains the energy consumption of cluster head that helps to reduce the frequent cluster formation and maintain a cluster for considerable amount of time. The simulation results show that CIDT provides better QoS in terms of energy consumption, throughput, end-to-end delay, and network lifetime for mobility-based WSNs.

1. Introduction

WSNs have recently come into prominence because they hold potential to revolutionize many segments of our economical life, environmental monitoring, health care applications, infrastructure protection, context-aware computing, and battlefield awareness [1]. The strength of WSNs lies in their flexibility, energy consumption, mobility, and scalability. The number of sensors capability and their organized fashion made wireless sensor communication first option to utilize them in remote or hazardous environments. The ultimate goal of such WSNs is often to deliver the sensing data from sensor nodes to sink node and then conduct further analysis at the sinknode [2]. To perform such tasks effectively, several network routing protocols have been proposed mainly for data collection.

Topology management plays a vital role in minimizing various constraints such as limited energy, computational resource crisis, latency, and quality of communication. Now,

the transmission distance between the sensor nodes is responsible for energy consumption. Power loss is always directly proportional to the distance Phss = dp , where d is the distance between sensor nodes, p is the environmental fading factor, p = 2 for free space fading, and p = 4 for multipath fading [3]. The topology inherently defines the types of routing path as broadcast or unicast and it determines the size, type of packets, and other overheads. Choosing a right topology helps to reduce the communication overhead and energy conservation. An efficient topology ensures that neighbors are at a minimal distance and reduces the probability of a packet being lost between sensor nodes. An efficient topology management may diminish the long range communication within a network, communication failure and improves the network lifetime.

In addition, topologies in WSNs define the dimension of the sensor node group and managing the addition of new members as well as dealing with members who left the group. By considering such aspects, the topology may provide

Cluster heads

Sensor nodes (a)

Sensor nodes (b)

Figure 1: (a) Flat topology, (b) cluster based topology.

an efficient data collection with low energy utilization and form superior WSN. The existing WSNs topologies are flat, tree, cluster, cluster tree, and chain. Based on the nature of network, different kinds of topologies are followed to gain the maximum data collection efficiency. This paper deals with an existing data collection topology and the proposed logical topology called DCT. It overcomes the existing limitations such as network lifetime and minimizes the energy consumption with effective data collection [4].

2. Related Work

Network topology determines the overall efficiency of the WSNs. Based on the data gathering and dissemination applications, various types of logical topologies are defined into (i) flat topology, (ii) cluster based topology, (iii) chain based topology, (iv) tree based topology, (v) cluster tree topology.

2.1. Flat/Unstructured Topology (FT). FT/UT is a very simple method to collect the data for the sink [5]. FT is used in the case of no topology or the absence of any defined topology shown in Figure 1(a) (i.e., flooding and gossiping). Here, each sensor node plays an equal role to form a network. FT construction is a costly operation. It does not bother about the energy constraints which lead to the implosion and overlapping problems [6]. For example, sensor protocols for information via negotiation (SPIN), directed diffusion, energy-aware routing, rumor routing, gradient based routing (GBR), constrained anisotropic diffusion routing (CADR), and cougar and active query forwarding in sensor networks (ACQUIRE) [7-14].

2.2. Chain Topology (CT). The CT constructs a transmission chain to connect the deployed sensor nodes. A node is selected in the chain to act as leader of chain. All the sensor nodes can communicate with each other along the chain. Excessive delay for distant nodes on the chain is the main demerits of this topology (i.e., increasing the length

of the chain causes excessive delay where the leaf nodes collected data to reach the leader). When the sensor nodes have high mobility, it leads to the link break problems and affects the network performance. For example, Greedy algorithm, minimum transmission energy (MTE), power efficient gathering in sensor information systems (PEGASIS), chain oriented sensor network (COSEN), and chain routing with even energy consumption (CREEC) [15-17].

2.3. Cluster Based Topology (CBT). CBT has been widely used in WSNs for data gathering, data dissemination, and target tracking. Clustering is a proficient method for specific applications, which requires scalability to hundreds or thousands of nodes (i.e., widely used in dense WSNs) shown in Figure 1(b). Scalability in this context implies the need for load balancing, proficient resource exploitation, and data aggregation. In clustering, cluster head election is an important task. Here, the cluster head election is done by various methods like distributed (i.e., cluster head can be elected with probabilistic, residual energy, random method, and election phase) and centralized (i.e., cluster head have been assigned with nonprobabilistic methods by sink or base station) election [18,19].

After the cluster head election, all the cluster heads forward the data to the base station with direct hopping (cluster head directly connected with base station) or multihopping (cluster head to cluster head communication) techniques. For mobility-based environments, frequent changes of cluster head and multihop techniques cannot offer a guaranteed data transmission rate. It diminishes the performance of the entire network. For example, low energy adaptive clustering hierarchy (LEACH), hybrid energy efficient distributed clustering (HEED), base-station controlled dynamic clustering protocol (BCDCP), concentric clustering scheme (CCS), energy aware routing protocol (EAR), hierarchical geographic multicast routing (HGMR), cluster head gateway switch routing (CGSR), and mobility-based clustering protocol (MBC) [2026].

2.4. Tree Based Topology (TBT). In TBT, all the deployed sensor nodes construct a logical tree. Generally, TBT works with DFS (depth first search) or BFS (breadth first search) method [2]. Here, the entire data packet passes from leaf node to the parent nodes. Likewise, data flow from all sensor nodes to the sink is carried out. Constructing a logical tree avoids packet flooding. It uses unicast instead of broadcast, as the flooding is not necessary for data communication. Therefore, tree topology consumes less power than flat topology. When compared with a few basic clustering protocol, tree topology proves to be much more effective on energy utilization [27]. Tree formation for the whole network is a time consuming and costly operation. It cannot tolerate with node failures and power consumption is uneven across the network. For avoiding the interference problem, different access methods are chosen. Otherwise, it causes delay in sending the data packet from leaf nodes to root node, for example, minimum spanning tree (MST), tree based data collection scheme (TBDCS), and efficient convergecast tree (ECT) [28-30].

Designated device

Figure 2: Cluster tree topology.

2.5. Cluster Tree Topology (CTT). CTT contains cluster and tree topology formation process shown in Figure 2. The network design starts with a special node called designated device (DD). It acts as a cluster head with greater transmission power and receiver sensitivity. The beacon signal contains NetID, CID and NID nodes are added to the DD. Whenever, the node receives a beacon from a neighbor node, which sends a CONNECT REQUEST to DD. The DD acknowledges to the corresponding node with Connect Response and the cluster tree formed. Here, the creation of such topology with node id is a tedious process. Then, the special nodes (DD) should be initiated to make cluster tree [31], for example, ZigBee, 6LoWPAN. The main objective of cluster tree is increasing the network capacity, minimizing the energy consumption and end-to-end delay. But, the effectiveness of cluster tree is based on the network parameters like scalability, data rate, cluster dimension (number of clusters and cluster members for each cluster), tree intensity (number of layers), RSS (received signal strength) and mobility (node position, velocity, and direction), for example, cluster tree data gathering algorithm (CTDGA) [32].

2.6. Mobility Model. The mobility model is designed to describe the location, velocity, and direction change over a time of mobile sensor nodes. The random waypoint model (RWM) is used in mobility management schemes (e.g., ad hoc networks and sensor networks) [33]. The node travels from a starting coordinate to a random ending coordinate with a randomly generated constant velocity. The velocity is picked from [0, Vmax] interval. When a sensor node reaches the destination point, the node waits for a Tpause time earlier than arriving at the next destination [34].

3. Problem Statement

In flat topology, all the sensor nodes directly communicate with the sink or simply forward the data packets to the neighbor nodes. Whenever, the sensor node wants to communicate with a sink, the existing methods have limitation such as delay, data redundancy, and large amount of energy exploitation. Since, it is using flooding, gossiping, direct communication, and so forth. The cluster based data collection suggests better performance with cluster heads. Conversely, the data dissemination from cluster head to cluster head or

sink (cluster head to sink communication must be either direct hop or multihop communication) involves reliable stable links, which causes more energy consumption. For mobility-based environments, frequent cluster changes of the sensor node lead to link failure which causes diminishing the network lifetime.

CT provides better performance than flat and cluster topology. However, it increases the data collection time than CBT. Since, it must follow the chain route to reach sink, the entire network dies slowly due to the even energy utilization of overall WSN. TBT can save more energy than CBT. It includes several time stamps in order to collect data from leaf to root node. In mobility environment, it leads to link failure, packet drop, and delayed transmissions.

CTT offers enhanced performance than FT, CT, CBT, and TBT. The cluster head (DD) selection, maintaining the cluster with stable links for mobile sensor nodes is a costy operation. The above topologies are not feasible and mended adapt to mobile sensor ambiance. To overcome the existing limitations in the above FT, CT, CBT, TBT, and CTT, we propose a novel logical topology for data collection, namely, cluster independent data collection tree (CIDT).

Figure 3 shows the simple outline of our proposed scheme named into CIDT structure. It is a unique nature of logical scheme, which helps to improve the network lifetime and effective data collection, thereby increasing network lifetime with minimum delay. CIDT is a best hybrid scheme (which utilizes cluster and tree topology) suitable for dense wireless sensor networks than any other logical topology. On mobility-based environments, it provides better performance than other methods.

4. CIDT (Cluster Independent Data Collection Tree)

The CIDT consists of setup phase and steady state phase. In setup phase, cluster formation and tree construction is initiated to identify the optimal path between cluster member and sink. It is denoted in intracluster and DCT communication. DCT construction for single cluster is shown in Figure 4.

Now, the cluster head is responsible for the data collection from cluster members and cluster maintenance operations. At first, all the sensor nodes elect ahead to the cluster head and form a cluster. Thereafter, tree formation is initiated,

which connects the cluster head and sink. Here, the cluster formation and DCT construction is based on the threshold value, connection time, and RSS. After the setup phase completion, data transmission is initiated in steady state phase. Here, all the cluster members send ahead the data packets to sink based on the optimal path.

4.1. CIDT Tree Formation. For a large-scale WSN, numerous number of sensor nodes have been randomly deployed. In this case, the selection of DCN does not affect the data collection of a corresponding cluster. It should have better connection time with thenearest DCNnodeand clusterhead. The DCT formation is based on the location of cluster head, connection time between the cluster head and DCN. After the cluster head election, BS or sink initiates ahead to the DCT formation process. Based on the location of cluster head and connection time, a few numbers of nodes are selected as DCN. Now, the DCN may act as a data collection node and does not participate in sensing. But, it does not belong to any cluster.

All the DCN collects the data from cluster head, which aggregate with the corresponding cluster head and then forward to the next DCN. The DCN selection algorithm is executed by sink in order to select the DCN to form an independent tree structure. Figure 5 presents the flow chart of DCT construction.

Algorithm 1 steps:

(a) Initialize the values.

(b) Choose a random TIN (temporary independent node) from sink.

(c) In case, a very first one-hop distance node from the sink is CH. Then, skip to another one-hop NN (Neighbor Node).

(d) Select a one-hop NN as CNI (Current Node Identity) and assign the integrity as TIN.

(e) Now, the one-hop distance (NH, NN) CNI from the sink is considered into TIN and select a better TIN among them.

(f) Select a one-hop distance NN to the CH as PIN from TIN.

Figure 5: Flow chart of DCT construction.

(g) In that case, step (c) is not able to find TIN. Then, skip to select a SIN from TIN, which is another one-hop distance NN (Neighbor Node) from CH.

(h) Increment the value of NH and NN for next DCN selection.

(i) Change the integrity of SIN (Selected Independent Node) to FSIN (Finalized and Selected Independent Node).

(j) Choose a FSIN from random TIN.

(k) Let the integrity of FSIN considered as DCN, which is used to construct a DCT link between the sink and cluster head.

The above list represents the algorithm for DCT. Initially sink starts with the one-hop neighbor sensor node to add that particular node to act as a DCN in DCT. The parameters include HC = 1 (hop distance is used to select a one-hop neighbor node from sink to act as a current node identity (CNI)), NH (new hop distance is an additive value, which denotes the current distance of node (CNI) from sink and it is used to finalize the DCN selection). Then, the identified nodes have been stored in temporary structure (TIN). In case, the one-hop distance neighbor node (NN) is found to be CH, one node from the cluster head with HC = 1 is identified as TIN. After finding the NH of the network, starting with the nearest node as cluster head, the node selection is finalized. Then selected nodes are utilized to form the DCT.

DCT (CNI, NH, HC, NN)

int i, j, m, N, NH = 1, HC = 1 (a)

for (i ^ 1 to N) (b)

{if (CNI == CH) {

{ NH = NH++ (c)

TIN ^ NH i (d)

i else i

{ if (CNI == NN && CNI = CH++ && TIN = = CNI)

for (j ^ 0 to m) (e)

{ { PIN ^ TIN i i (f)

} } else i

{ SIN ^ TIN (g)

NH ^ NH++

NN ^ NH++ i (h)

} if (PIN == TIN && SIN == TIN && SIN == PIN)

{ { FSIN ^ SIN i (i)

} else i

{ FSIN ^ Random (TIN) i (j)

} DCN = FSIN

DCT ^ DCN } (k)

Algorithm 1: DCT Construction.

DCT is a hierarchical tree structure, which covers the entire WSNs. DCN collects the data from the cluster heads and delivers it to sink or BS. Selecting DCN with better connection time and best communication range reduces energy consumption due to long range node to node data transfer. While the sensor nodes are on high mobility, the selected DCN keeps the communication with the cluster head for a longer time and there is no need to update the tree structure. In order to keep the lifetime of whole network in harmony DCN is also newly selected every time when the new cluster heads are elected. New DCN selection also is carried out by sink, which is based on the mobility of the new cluster head.

4.2. Intracluster Communication. Considering ambiguous large-scale WSNs, sensor nodes have been densely deployed over the region. During the setup phase, the beacon signal is used to identify the sensor nodes location and position. Once the nearby nodes are identified, random algorithm or election algorithm is used to elect the cluster head. After the cluster head selection, the next phase DCT formation is initiated.

In the proposed method, the threshold value U"h has been calculated in (1) by adding the flag value with the multiplication of factors such as the total number of neighbor nodes, residual energy, current speed, and current coverage distance of the sensor node, where Fc is the flag (set Fc =

1 for previous round cluster head and Fc = 0 for sensor node having a chance to act as current round cluster head based on U^,), £»-current is the current sensor node energy, ^»-cm-rent is the current speed of the sensor node, £max is the initial energy, and Vmax is the maximum speed of the sensor node. In order to avoid the election of high mobility

node as cluster head,((Vmax - V„-CUrrent)/(Vmax + ^„-current))

instead of (Vmax/V„-current) may be considered. The expected number of sensor nodes in each cluster is m = N"S/CH. Those nodes having maximum residual energy, maximum number of cluster members, and maximum connection time can be elected as cluster head:

Unab = (FC + [., ™-x

W F — F

b-current w max «-current

^max ^b-current ^max

v — v

X max «-current

max «-current

It is visualized that the 2D network position of the cluster head b and sensor node a at time t is characterized in the following:

^h = x, + Vh * cos dht; Y, = y, + Vh * sin 9ht

Xa = Xa + Va * cos ^ Ya = 7a + Va * sin ^

where (x, y) is the primary node location, v is the speed, d is the moving path angle between (x, y), and t is the connection time. Then, the subscript (a, b) corresponds to sensor node a and cluster head b, respectively. Let the R^ be denoted as

>((Xb -xa)2 + (Yb -Ya)2)

At time t = 0, each sensor node receives an advertisement message from any one of the cluster heads. Hence, the above 2D network equation (??) is considered and simplified into

where Emax is the initial energy, -E^cui-rent is the cluster head current energy, Nh-current is the number of current cluster

members for cluster head b, RSS

minimum

required RSS from a and b, RSSah-current is the current RSS between a and b, Rtah is the distance between a and b at (3) any time instance t, dha is the maximum coverage distance

between b and a, Athah is the estimated connection time for a begins its transmission to b, and t-[ is the current duration of the data frame for b.

>((*b -Xa )2 + U -ya)2 T if t=0. (4)

Now, ARtaih+s is the difference between Rfah and Rta+hs at time instance t and t + s. Let A^^3 be found using (4):

^T = <h - Rt{h if (n, s)et, s = 0,1,2.... n. (5)

However, for AR*,^ = 0, there is no sensor nodes on mobility within a cluster. AR*,^ is the negative value for sensor nodes in a cluster moving away from the cluster head; A^^3 is the positive value cluster head and cluster member moving towards to each other. Now, the RSS (received signal strength) can be calculated at any time instance t and t + n in

RS^b - RSSab-current - RSSab-min

RSS0r - RSSa+Scurrent - RSSab-min 6 t'

whereas RSSah-min is the minimum required threshold value and RSSa+-current is the current threshold value at time instance t. If RSS is a positive value, the cluster members join in an appropriate cluster and communicate with corresponding cluster head. In this case, ARSStf+s is the difference between

RSS^ and RSSa+s, which can be found from

ARSSaf5 - RSSl - RSS1+s

wherever, ARSS^^ < 0, Cluster member move away from the current position of the cluster head. ARSS^^ > 0, both cluster member and cluster head move towards each other from their current position. G"b is the value assigned to sensor node a for each round, which indicates its robustness for connection with cluster head b. The dimensionless value and kct is a linear combination with constant coefficients between 0 and 1. The coefficients represent the consequence of each factor and are denoted as follows:

+ (g + Vg + Kcr - 1

Therefore, (8) can be originated into Gnah and in (9) represented as

G"ab -K X

F —F

max b-current

b-current

b-current

ab-min

ba - Rl

ab-current ab

4.3. DCT Communication. After the intracluster communication phase, DCT formation phase is initiated. It is based on the threshold value, connection time, and network traffic. DCT makes a communication link between the cluster head and sink. Let it be visualized that the 2D network position of the cluster head b and DCN e or h at time t is

Xb = xb + Vb *cosdht; Yb = yh + Vb * sin dht

Xe = xe + ve * cos det; Ye = ye + ve * sin det (10)

Xh = xh + Vh * cos dht-> Yh = y h + Vh * sin dht-

On each round, the distance between cluster head b to DCN e and h has been calculated from (10). Let the distance Rhe and Rteh be denoted in

Ri >((Xb -Xe)2 + (Yb -Ye)2)

Rlh >((Xe -Xh)2 + (Ye -Yhf)m, 0 <t <

Let t = 0; the distance Rbe and R^ in (11) can be considered

4e > ((Xb -Kef + (yb -ye)2)

Kh > ((Xe - *h)2 + (ye - yh)2)'1', t-0,ynet

For any cluster head to DCN or DCN to DCN or sink to DCN communication, the threshold value U?V has been calculated in (13)byadding totalnumberofDCN with multiplied factors such as the residual energy, and current speed between cluster head to DCN or DCN to DCN. Let u be considered instead of b (it represents that cluster head or sink or DCN), v as a substitute of e and h (it signifies that DCN):

' F - F V - V

jjp - ^ + I v-max v-current w v-max v-current

V-max V-current

, (13)

where Hv is the count for DCN, Ev-current is the current cluster head energy, Vv-current is the current speed of the cluster head, £v-max is the initial energy, and Vv-max is the maximum speed of cluster head. Let ARttfv+n be the diversity with R'uv and At the time instance t and t + n, ARj;vt+n is represented in

ARZ+" = <v -C, t = 0,1,2...n,yn et. (14)

However, ARtlfv+n = 0, both nodes (cluster head and DCN or any two DCN) not in mobility, which is separated in even

distance. AR*f^" is the negative value for both nodes moving away; AR*?*" is the positive value for both nodes moving towards each other. Consequently, the RSS (received signal strength) between any two nodes, at the time instance t and t + n is calculated in

RSSf,,, = RSSf,,

- RSS„

TJCCi+" _ T)CCt+" _ TJCC

RSSuv = RSSuv-current RSSuv-min

Vn e t,

where RSSuv-min

RSSt+n

is the minimum required threshold value and RSS"V"current is the current threshold value. If RSS^V" is a positive value, then the cluster head or DCN has a likelihood to join with nearest DCN, which can establish the communication with corresponding nodes. ARSS^+" can be found using (15) as follows:

CIDT ---MBC

Number of nodes

HEED — - LEACH

Figure 6: Packet delivery ratio versus number of nodes.

ARSS«+n = RSS* - RSSf+n,

Vn e t

wherever ARSS^+" < 0, both nodes moving away from their current position. ARSS^+" > 0, both nodes moving towards each other. The dimensionless value Scr, Çcr, ^CT,and Kcr is a linear combination with constant coefficients between 0 and 1. The coefficients represent the consequence of each factor and are denoted as

$cr + Ccr + Vcr + Kcr = 1

is the value assigned to all u on each round, which indicates its heftiness for connection with v:

CJ = ( S,

v-max v-current

V-current V-current

'Cr ■

+ \ncr-

uv-current

tfCr (Y)

where Ev-max is the initial energy of v, Ev

is the current

energy of v,

is the total number of cluster head or

DCN connected with v, RSSMV-min is the minimum required

RSS to make a connection from u and v, RSSu

is the

current RSS to establish a connection between u and v, duv is the maximum coverage distance between u and v, R*uv is the distance between u and v at any time instance t, Atvuv is the estimated connection time for u begins its transmission to v, and t^iW) is the current duration of the data frame for v.

4.4. Frame Duration. Let us consider the number of current cluster Members Mc and the number of expected cluster members Me can be derived from the following equation:

Mc = Me - (Md + Ms)

Nr -CH - Cr

Me = —c-Z-

Nc = Nt -Nd,

where Mc is the current cluster member from one cluster, Me is the expected number of cluster member, Md is the number

^^ CIDT ---MBC

Number of nodes

HEED LEACH

Figure 7: Throughput versus number of nodes.

of cluster member dead, Ms is the total number of cluster members on sleep state, Nc is the total number of current sensor nodes, Nt is the total number of sensor nodes over a network, Nd is the number of sensor nodes dead, and CH is the cluster head. Now, the current duration of the data frame tl from each cluster is denoted in

tfc xMc

c Ru c

or tf = ^ x Me,

where Lp is the data packet length and Rb is the transmission bit rate.

4.5. Steady State Phase. On steady state phase, each cluster member and the corresponding cluster head build intraclus-ter communication with each other. Initially, all the cluster members send the sensed data to cluster head in an allocated TDMA time slot. Thereafter, the cluster head aggregates the received data, and then forward the data packet to the DCN. Again, DCN aggregates the data packet from its cluster head and then forward to the sink with DCT. In DCT communication, direct sequence spread spectrum techniques can be used to transfer the data packets from the cluster head to DCN and sink. DCT discovers an optimal path between the cluster head and the sinkbased on the distance, connection time, threshold value, and residual energy. Based

Number of nodes

-s- CIDT HEED ---MBC LEACH

Figure 8: Total energy versus number of nodes.

CIDT * HEED ---MBC LEACH

Figure 9: Delay versus number of nodes.

on the optimal path, the entire cluster head forwards the data packets to the nearest DCN. Now, the DCT becomes responsible for forwarding an entire data from the cluster head to sink.

5. Results and Discussion

In this section, the simulation results are used to evaluate the performance of the proposed protocol under various parameter settings. The network simulator was used to carry out a performance study of CIDT to compare with LEACH and MBC. Considering 500 nodes of WSNs, all the nodes were randomly deployed in a square region of 1000 x 1000 m , the size of data packet is 512 bytes, the transmission range within the cluster 40 m, the transmission range between the cluster 80 to 120 m, the sensing range is 20 m, and the base station is located in (x = 500, y = 1050). Further communication energy parameters can be set as £elec = 50 nJ/bit/m2 and £amp = 0.0013 pJ/bit/m4. Then, the energy required for data aggregation is set into EDA = 50 nJ/bit/signal.

Based on CIDT, the network performance was simulated in terms of the packet delivery ratio (PDR), throughput, delay, total energy, and speed. Figures 6, 7, 8, and 9 illustrate the relationship between the number of deployed nodes and the performance of the network (PDR, throughput, total energy consumption, and delay). It is worth noting that LEACH,

Speed (m/s)

-e- CIDT HEED ---MBC LEACH

Figure 10: Packet delivery ratio versus speed.

CIDT HEED ---MBC LEACH

Figure 11: Delay versus speed.

HEED, and MBC fail to prolong the PDR, throughput, total energy consumption, and delay as the number of node increases. However, CIDT makes better performance linearly even the number of sensor node increases over the network. In large-scale mobility-based WSNs, unreliable links may cause the packet loss and retransmissions. In that case, it may increase the energy consumption of sensor nodes. In addition, it may reduce the PDR and throughput. Although, CIDT can provide stable links and guarantee the balanced energy conservation over the network. Therefore, it can be conclude that CIDT protocol has been mended adapting to the high mobility environment.

Figures 10 and 11 show that CIDT has superior performance when compared to MBC, HEED, and LEACH in mobile sensor ambience. In the simulation results, it can be enunciated that CIDT protocol has provided stable links and mended adapting to the high mobility environment. On high mobility environment, CIDT makes better PDR and less end-to-end delay.

Finally, it can be concluded that the proposed CIDT protocol can save the sensor nodes residual energy, extend the network lifetime and network reliability. It is mended adapting to the high mobility environment with better communication quality.

6. Conclusions

With the growing impact of WSNs on real time civil and military applications, numerous sensor nodes are required to monitor the large-scale areas. Cluster tree is a proficient method to construct suspicious network management architecture. The ultimate goal is to exploit the network lifetime, residual energy, throughput, PDR, and stable link for mobile sensor nodes. In this paper, CIDT (cluster independent data collection tree) proposed for mobility-based WSNs, each cluster member chooses the cluster head with better connection time, and RSS. Then, forward the data packets to the corresponding cluster head in an allocated time slot. Consequently, the sink or DCN select the one-hop neighbor DCN or cluster head with the maximum of threshold value, RSS, connection time, and less network traffic. From the simulation results, it is evident that CIDT provides more stable links, throughput, PDR with a reduction of network traffic and a condensed sum of energy utilization than LEACH, HEED, and MBC.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

References

[1] F. Zhao and L. J. Guibas, Wireless Sensor Networks : An Information Processing Approach, Elsevier, 2004.

[2] S. Chen, M. Huang, S. Tang, and Y. Wang, "Capacity of data collection in arbitrary wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 1, pp. 52-60, 2012.

[3] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrish-nan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660-670, 2002.

[4] Q. Mamun, "A qualitative comparison of different logical topologies for wireless sensor networks," Sensors, vol. 12, no. 11, pp. 14887-14913, 2012.

[5] K.-W. Fan, S. Liu, and P. Sinha, "Structure-free data aggregation in sensor networks," IEEE Transactions on Mobile Computing, vol. 6, no. 8, pp. 929-942, 2007.

[6] K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol. 3, no. 3, pp. 325-349, 2005.

[7] W. Heinzelman, J. Kulik, and H. Balakrishnan, "Adaptive protocols for information dissemination in wireless sensor networks," in Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '99), Seattle, Wash, USA, 1999.

[8] C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed diffusion: a scalable and robust communication paradigm for sensor networks," in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 56-67, Boston, Mass, USA, August 2000.

[9] E. Astier, A. Hafid, and A. Benslimane, "Energy and mobility aware clustering technique for multicast routing protocols in

wireless Ad hoc networks," in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '09), Orlando, Fla, USA, April 2009.

[10] D. Braginsky and D. Estrin, "Rumor routing algorithm for sensor networks," in Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA '02), pp. 22-31, Atlanta, Ga, USA, September 2002.

[11] C. Schurgers and M. B. Srivastava, "Energy efficient routing in wireless sensor networks," in Proceedings of the Milcom Communications for Network-Centric Operations: Creating the Information Force, pp. 357-361, McLean, Va, USA, October 2001.

[12] M. Chu, H. Haussecker, and F. Zhao, "Scalable information-driven sensor querying and routing for ad hoc heterogeneous sensor networks," The International Journal of High Performance Computing Applications, vol. 16, no. 3, pp. 293-313, 2002.

[13] Y. Yao and J. Gehrke, "The cougar approach to in-network query processing in sensor networks," SIGMOD Record, vol. 31, no. 3, pp. 9-18, 2002.

[14] N. Sadagopan, B. Krishnamachari, and A. Helmy, "The ACQUIRE mechanism for efficient querying in sensor networks," in Proceedings of the 1st International Workshop on Sensor Network Protocol and Applications, Anchorage, Alaska, USA, 2003.

[15] S. Lindsey and C. S. Raghavendra, "PEGASIS: power-efficient gathering in sensor information systems," in Proceedings of the IEEE Aerospace Conference Proceedings, vol. 3, pp. 1125-1130, Big Sky, Mont, USA, 2002.

[16] N. Tabassum, Q. E. K. Mamun, and Y. Urano, "COSEN: a chain oriented sensor network for efficient data collection," in Proceedings of the 3rd International Conference on Information Technology: New Generations (ITNG '06), pp. 262-267, April 2006.

[17] J. Shin and C. Suh, "CREEC: chain routing with even energy consumption," Journal of Communications and Networks, vol. 13, no. 1, pp. 17-25, 2011.

[18] M. Ye, C. Li, G. Chen, and J. Wu, "EECS: an energy efficient clustering scheme in wireless sensor networks 10a.2," in Proceedings ofthe24thIEEEInternational Performance, Computing, and Communications Conference (IPCCC '05), pp. 535-540, Phoenix, Ariz, USA, April 2005.

[19] X. Liu, "A survey on clustering routing protocols in wireless sensor networks," Sensors, vol. 12, no. 8, pp. 11113-11153, 2012.

[20] O. Younis and S. Fahmy, "HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366379, 2004.

[21] S. D. Muruganathan, D. C. F. Ma, R. I. Bhasin, and A. O. Fapojuwo, "A centralized energy-efficient routing protocol for wireless sensor networks," IEEE Communications Magazine, vol. 43, no. 3, pp. S8-S13, 2005.

[22] S.-M. Jung, Y.-J. Han, and T.-M. Chung, "The concentric clustering scheme for efficient energy consumption in the PEGASIS," in Proceedings of the 9th International Conference on Advanced Communication Technology (ICACT '07), vol. 1, pp. 260-265, Gangwon-Do, Korea, February 2007.

[23] M. Liu, J. Cao, G. Chen, and X. Wang, "An energy-aware routing protocol in wireless sensor networks," Sensors, vol. 9, no. 1, pp. 445-462, 2009.

[24] D. Koutsonikolas, S. M. Das, Y. C. Hu, and I. Stojmenovic, "Hierarchical geographic multicast routing for wireless sensor networks," Wireless Networks, vol. 16, no. 2, pp. 449-466, 2010.

[25] H. Raza, P. Nandal, and S. Makker, "Selection of cluster-head using PSO in CGSR protocol," in Proceedings of the 2nd International Conference on Methods and Models in Computer Science, pp. 91-94, December 2010.

[26] S. Deng, J. Li, and L. Shen, "Mobility-based clustering protocol for wireless sensor networks with mobile nodes," IET Wireless Sensor Systems, vol. 1, no. 1, pp. 39-47, 2011.

[27] Z. Zhang and F. Yu, "Performance analysis of cluster-based and tree-based routing protocols for wireless sensor networks," in Proceedings of the International Conference on Communications and Mobile Computing (CMC '10), vol. 1, pp. 418-422, Shenzhen, China, April 2010.

[28] H. Li, H. Yu, and A. Liu, "A tree based data collection scheme for wireless sensor network," in Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICN/ICONS/MCL '06), p. 119, Morne, Mauritius, April 2006.

[29] D. Messina, M. Ortolani, and G. L. Re, "A network protocol to enhance robustness in tree-based WSNs using data aggregation," in Proceedings of the IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS '07), pp. 1-4, Pisa, Italy, October 2007.

[30] M. R. Saadat and G. Mirjalily, "Efficient convergecast tree for data collection in wireless sensor networks," in Proceedings of the 20th Iranian Conference on Electrical Engineering (ICEE '12), pp. 1534-1539, Tehran, Iran, 2012.

[31] E. Callaway, "Cluster Tree Network—IEEE P802. 15 Wireless personal Area Networks," 2001, http://www.ieee802.org/15/pub/ 2001/May01/01189r0P802-15_TG4-Cluster-Tree-Network.pdf.

[32] J. Yang, B. Bai, and H. Li, "A cluster-tree based data gathering algorithm for wireless sensor networks," in Proceedings of the International Conference on Automatic Control and Artificial Intelligence (ACAI '12), pp. 22-25, Xiamen, China, 2012.

[33] E. Hyytia, H. Koskinen, P. Lassila, A. Penttinen, and J. Virtamo, Random Waypoint Model in Wireless Networks, Networking Laboratory, Helsinki University of Technology, Helsinki, Finland, 2005.

[34] O. Demigha, W. K. Hidouci, and T. Ahmed, "On energy efficiency in collaborative target tracking in wireless sensor network : a review," IEEE Communications Surveys and Tutorials, vol. 15, no. 3, pp. 1210-1222, 2013.

Copyright of ISRN Otolaryngology is the property of Hindawi Publishing Corporation and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.