DETECTION OF OPTIMAL PATH USING Web Site: www.ijaiem.org Email:

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 8, August 2015
ISSN 2319 - 4847
DETECTION OF OPTIMAL PATH USING
QUADRATIC ASSIGMENT TECHNIQUE IN
WIRELESS SENSOR NETWORKS
1
Vinoba.V,
2
Indhumathi.A
1
Department of Mathematics, K.N. Government Arts college, Tamil Nadu, India.
2
Department of Mathematics, R.M.K College of Engineering and Technology, Research Scholar, Bharathidasan University,
Tamil Nadu, India
ABSTRACT
Wireless sensor networks (WSNs) consist of three nodes which are sensor nodes, intermediate nodes and destination nodes
(sink). The function of sensors is to collect data from the physical environment and sending them to the sink. The intermediate
nodes relay the data to the sink. After detection of an event, this data must be sent to the sink immediately. To send this data
to the sink, there exist several paths in which finding a suitable path can improve the performance of the network. In
this paper a protocol on routing has been proposed, in which protocol sensors cache the identity of neighbouring nodes,
and by first sending a group of the identity of intermediate nodes will be named as the selected path till arriving the sink
node or destination node, during which the next sending will only be carried out through that path.
Keywords:- WSNs; Routing, Coordination, Sensor, Sink node; Quadratic Assignment Technique
1.INTRODUCTION
In recent years, wireless communication has experienced exponential growth caused by the need for connectivity.
Wireless sensor networking is a broad research area, and many researchers have done research in the area of power
efficiency to extend network lifetime. In order to achieve high energy efficiency and increase the network scalability,
sensor nodes can be organized into clusters [1]. This type of networking very useful in industrial, agricultural,
vehicular, residential, medical sensors and actuators have more relaxed throughput requirements [2]. This type of
network consists of a group of nodes and each node has limited battery power. There may be many possible
routes available between two nodes over which data can flow. Assume that each node sensed and generated some
information and this information needs to be delivered to set of destination nodes. A node can easily transmit data to a
distance node, if it has sufficient battery power.
A node transmits its data to other node without any interference, if node lies in its vicinity. A large battery power is
required to transmit the data to a node which is situated far from source node. After few transmissions a node
reaches to its threshold battery level and it may exclude from network path and there will come a condition that no
node is available for the data transmission and overall lifetime of network will decrease. Whereas network lifetime is
defined as the time until the first node in the network dies. For maximizing the lifetime of network, the data
should be forwarded such that energy consumption is balanced among the nodes in proportion to their energy
reserved, instead of routing to minimize consumed power.
2.RELATED WORKS
Routing in WSNs is very challenging due to the inherent characteristics that distinguish these networks from other
wireless networks like mobile ad hoc networks or cellular networks. First, due to the relatively large number of sensor
nodes, it is not possible to build a global addressing scheme for the deployment of a large number of sensor nodes as the
overhead of ID maintenance is high. Therefore, classical IP-based protocols cannot be applied to sensor networks.
Second, in contrary to typical communication networks almost all applications of sensor networks require the flow of
sensed data from multiple regions to a particular sink. Third, generated data traffic has significant redundancy in it
since multiple sensors may generate same data within the vicinity of a phenomenon. Such redundancy needs to be
exploited by the routing protocols to improve energy and bandwidth utilization. Fourth, sensor nodes are tightly
constrained in terms of transmission power, on-board energy, processing capacity and storage and thus require careful
resource management.
Due to such differences, many new algorithms have been proposed for the problem of routing data in sensor networks.
Almost all of the routing protocols can be classified as data-centric, hierarchical or location-based although there are
few distinct ones based on network flow or QoS awareness.
Volume 4, Issue 8, August 2015
Page 69
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 8, August 2015
ISSN 2319 - 4847
Flooding and gossiping are the very traditional ways of transmitting data to the destination. LEACH [3] follows a
hierarchical based cluster formation technique and also proposes a method for the selection of proper cluster heads.
GEAR [4] protocol says that the entire network is divided in to partitions and within partitions, flooding technique is
adopted. Geographic adaptive fidelity GAF [5] is an energy- aware location-based routing algorithm designed primarily
for mobile ad hoc networks, but may be applicable to sensor networks as well. GAF conserves energy by turning off
unnecessary nodes in the network without affecting the level of routing fidelity. It forms a virtual grid for the covered
area.[6] suggested The sensor data is classified using ART1 Neural Network Model. Wireless sensor network populates
distributed nodes. The cooperative routing protocol is designed for communication in a distributed environment. The
classified sensor data is communicated over the network using two different cases of routing: cooperative routing and
diffusion routing. [7] have proposed a different hierarchical routing algorithm based on three tier architecture. Sensors
are grouped into clusters prior to network operation. The algorithm employs cluster heads, namely gateways, which are
less energy constrained than sensors and assumed to know the location of sensor nodes. In this paper, we propose a
model which computes the selection of neighbours and route establishment using updated neighbours.
The minimum energy routing protocol is proposed in [8] this approach minimize the energy consumption to reach the
destination by sending the traffic to same path but if all the traffic follows the same path then all the nodes of that path
will drain out there energy quickly. The maximum lifetime problem is a linear programming problem and solvable in
polynomial time [9]. DBF was used in [10–12] and authors in [13] to generate shortest distance paths in WSNs due to
the distributed structure. However, their overheads are significantly high and the message complexity of these
algorithms is unbounded since the algorithms are asynchronous. In [14], the algorithm was synchronized and the
message complexity is O V .E  . Thus, these algorithms are not suitable for WSNs due to energy problem. On the other
hand, shortest hop path algorithms are used instead of shortest distance path algorithms by many protocols for WSNs.
In [15, 16], the shortest hop paths are constructed in the PEQ and ICE protocol respectively.
Even the method used for shortest hop path construction is straightforward and easy; since the algorithm is
asynchronous, the message complexity cannot be calculated. Furthermore, due to lack of termination detection, the
initiator node cannot know whether the algorithm terminates. Multipath routing techniques have been discussed in the
literature for several years. There are two different approaches including disjoint and braided multipaths. Generally, the
multipath is used in [17–20] for fault-tolerance, load-balancing and security. Very recently, in soliton theory, the linear
superposition principle applies to Hirota bilinear equations to construct soliton solutions [21]. As known, Hirota
bilinear equations are linked to binary Bell polynomials. In this authors showed that a linear superposition principle of
exponential waves applied to Hirota bilinear equations, under some additional condition on the exponential waves and
possibly on the polynomial as well. This is an interesting mathematical problem in the study of polynomials whose
zeros form a vector space, and it determines one class of Hirota bilinear equations possessing the linear superposition
principle of exponential waves. They analyzed some such specific Hirota bilinear equations. In this paper, by using
Quadratic Assignment Technique optimal route in WSN is found.
3.NETWORK MODEL AND PROBLEM DEFINITION
Consider a wireless sensor network with set of N nodes N  1,2,3,....n. Let s i
represent the set of immediate
 N , e t ( avg ) i , j indicates the average energy consumed for data transmission from node i to
node j and E i be the initial battery energy level of node i . Let there be multiple links, where a set of source node and
destination node forms a link. There are set of source nodes S in an application area where information is generated at
node i with rate Qi and a set of destination nodes D among which any node can be reached in order for the
information transfer of link to be considered done. Let  ij be the traffic generated at node i and destined for node
neighbors of node i
j and  ij be the amount of data that needs to be transmitted from node i to node j .
The main objective of this paper is to minimize the energy consumption of each sensor node during transmission and
reception by using optimal path algorithm. The above problem can be solved by using QAP that can be stated as
follows: Let the set of nodes are N  1,2,3,....n and three nxn matrices F  ( f ij ), D  ( d ij ) and C  (cij ) the
quadratic assignment problem with coefficient matrices F , D and
n
n
n
n
C shortly denoted by QAP can be stated as follows:
n
n
minxX  f ik d jl xij xkl  Cij xij
i 1 j 1 k 1 l 1
i1 j 1
(1)
Such that
Volume 4, Issue 8, August 2015
Page 70
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 8, August 2015
ISSN 2319 - 4847
n
x
ij
1
, i N
ij
1
, jN
i 1
n
x
j 1
xij  0 ,1
, i , j N
f ik denotes the amount of flow between facilities i and k, d jl denotes the distance between location j , l and C ij
denotes the cost of locating facility i at location j. A more general version of the QAP was introduced by Lawler(2). In
this paper we are using flow distance products f ik d jl instead of considering dimensional array.
4.PROPOSED PROTOCOL (OPFR)
In proposed protocol, sensor nodes broadcast their identification to the neighbour nodes; it means after
configuring the network, every node knows all neighbours. The sensor node sends the RTS signal and resends the
identification to the neighbours depending upon the event. Each node sends only its identification to all other nodes,
and receives identification of its neighbours, cached to its memory. Naturally, in some sensor memory, there exists
identification of sinks. Most of sensor memory only contains one type of identification, which is sensor identification.
Only little sensors have both the sink and sensor identification in the memory. Sensor with two types of
identification, that is, sensor and sink in its memory connects the sensor as a source and the sink as the base
station.
Therefore, there are two types of identification: sink identification and sensor node or source node identification. Every
node can receive two types of identification. The node that receives both these identifications are called boundary node
(BN). Upon receiving the two types of identifications, the task of BN is to send its identification to sink. On other hand,
sink identification attaches its identification sent to previous node. In this order every node receives identifications of
other nodes, and knows that all data will be sent and received along this path. According to Figure1, order of sink
identification will be fixed while passing through intermediate nodes, but sensor's identification modifies frequently by
the first packet that is sent to the source.
Figure 1 Routing and Sink selection
In this method, every sensor has one identification table is shown in Table 1, which contains two fields as Sid and Did.
Sid field is for sensors identification ie sensor receives data from them and Did field is for sink or destination ie
sensor receives messages from them. In total, the data in this table has four statuses: the first is the table can have no
data, it shows this node is out of network and do not have any neighbor; meaning this node has no communication
in the network (dead). Second is only Sid field of table contains data, which shows neighbor nodes are only sensor
node, therefore this node is considered only passing path for all nodes, and not as an interface node. The third is if
only Did column has data, means this node can only send the data to sink and is not able to route every nodes or
network. The fourth is if both columns of one table have data, it means the node can communicate with network and it
is near an sink. Moreover, it can have an interface node role.
A. Mechanism
Once the network is ready to use, every node sends its Id to neighbors by flooding and this way every node detects the
neighbors and saves its identifications (Ids) to its tables. When an event occurs, the sensor that detects the flooding
sends its Id to all its neighbors, and every neighbor saves this Id its table. Then column Sid and Did will be searched for
sink's Id. If in this column no sink Id is found, then the sensor will send its Id and data to all neighbors until it arrives
at the interfaced sensor. But, if sensor finds a sink's Id in its Did column, this means that sensor is near an sink, and can
act as an interface node. It will activate one of the sink Ids and sends its Id and data randomly. Sink node also after
receiving data caches sensor's Id that receives data of it and sends message to interface node that it is available and
Volume 4, Issue 8, August 2015
Page 71
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 8, August 2015
ISSN 2319 - 4847
reacts to the messages which receiving of that sensor. Interface node also sends sink’s Id and its Id to sensor that
caches it in its table. Previous node carries out this action until sink's id and id of one node are delivered to source
sensor. Then, source sensor sends every packet together with its Id destination to one neighbor randomly. In every
sensor, sink's id with data is fixed until data is received at end node, but sensor's id is attached with data, after passing
of every node has removed and gives neighbor's id it sensor. This identifiers show selected path, upon first sending
from sink to source sensor is fixed. Figure.2 shows group of this Ids contain one path that after it source sensor node
and every route node knows that data of source node must be sent to what sink.
(a) Finding Neighbour Node
(b) Selecting suitable Sink
Figure 2 Routing and Sink selection
Since every sink is ready to act, this important source sensor registers first sink's id in its memory. This routing has
three advantages: first, selecting the nearest path to active sink, second: using other sink as backup, and third:
reliability to select optimum sink. A problem that maybe happens in this routing is because every node sends its id to
neighbors. Figure.1 shows sending data in infinitive loop, meaning one node sends its data to another node and
that node sends to node to the same node where it receives the data and this loop continues. Our solution for this
case is every node that receives data from previous node must send data to every neighbour except previous node. In
this case there exist two challenges: first, in neighbour of interface node maybe exist several sinks and interface node
must randomly select only one of them. Second, if two sinks arrive to source sensor at the same time, sink selected by
source sensor the solution is the sensor node must only select one of them randomly and must only send its data of its
path.
5.SIMULATION MODEL
In our simulation, we have varied the number of nodes from 10 to 100, which are randomly deployed using uniform
distribution in different parts of deployment area with a fixed density.. Here sink node is placed at the location of (50,
50) and (30,70) respectively. Assume that transmission range of each node is limited by 10 meter. The packet size was
kept at 64 bytes. We used Constant Bit Rate (CBR) as traffic source with average packet rate 0.5 packets /sec. We
assume the ns-2 radio energy model and assign each node with the same initial energy level of 10 J at the beginning of
each simulation in order to keep the simulation time within a reasonable time period. By experiment, we find that the
suitable value of θ to be 10 packet andwe have set the duration of each round to 1000 seconds. The input data is
generated randomly at each node every second duration. We assume that each sensor node carries an omni antenna.
Every 500m sec , we obtain the log of the energy level of each node.
6.SIMULATION RESULTS
A. AVERAGE NUMBERS OF MESSAGES FOR THE PROPOSED ROUTING
Average Number of Messages
1
DD
Flooding
Energy Aware Routing
OPFR
Average Number of Messages
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
20
30
40
50
60
70
Number of Nodes
80
90
100
Figure 3 Average numbers of messages Vs Number of Nodes
Volume 4, Issue 8, August 2015
Page 72
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 8, August 2015
ISSN 2319 - 4847
Figure. 3 shows that the numbers of messages are very much in direct diffusion and in flooding and energy aware
routing are almost larger than OPFR. Because in existing methods, sending acknowledgement by sensors cause
network’s congestion which reduces life time of network. The main reason for this congestion in flooding, direct
diffusion and energy aware routing is event area divides to several areas and clusters it. Every cluster sends and
receives messages, and this can cause a lot of congestion. Because of Shortest path method in this evaluation does
not have clustering; acknowledgement and sink request, hence can cause 20% reduction to send a message. Therefore,
in case that size of network is very large, using of OPFR has many advantages.
Average Latency
Average Latency
0.7
DD
Flooding
Energy Aware Routing
OPFR
0.6
Latency (Seconds)
0.5
0.4
0.3
0.2
0.1
0
20
30
40
50
60
70
Number of Nodes
80
90
100
Figure 4 Average Latency Vs Number of Nodes
Figure.4 infers that average latency with respect to number of nodes. Here direct diffusion method with much latency,
meaning increment to network size causes latency to increase very fast. In routing methods comparison of
latency parameters are very important. Latency in OPFR is very low, because transfer time between sensor and sink is
very low. Changing size of network in flooding, energy aware routing and our proposed method (OPFR) doesn't have
any influences.
C. Packet Delivery Ratio
Packet Delivery Ratio
0.8
DD
Flooding
Energy Aware Routing
OPFR
0.75
0.7
Delivery Ratio)
0.65
0.6
0.55
0.5
0.45
0.4
0.35
1
2
3
4
5
6
Packet Rate (P/Sec)
7
8
9
10
Figure 5 Packet Delivery Ratio Vs Packet Rate
Figure 5 show that OPFR increases the delivery ratio by 3.5% to 6.5% as the packet rate is varied. This is mainly
due to its neighborhood discovery does not allow the one-hop neighbor to reply if it is not in the direction to
the destination.
7.CONCLUSION
This paper presents the optimal path forwarding probability for OPFR which is designed for WSN. In general, the
proposed routing protocol OPFR provides high delivery ratio and spends less energy consumption if the optimal path
forwarding probability is used. In this paper we have checked and evaluated existing methods to present a routing
method that is better than existing methods in latency, energy consumption and packet delivery ratio.
REFRENCES
[1] Krishnamachari B and Orid F, “Analysis of Energy efficient Fair Routing in Wireless Sensor Network Through
Non Linear optimization” in the proceedings of workshop on wireless Ad hoc sensor and Wearable Networks in
IEEE Vehicular technology Conference, Florida, pp. 2844-2848, 2003
[2] M.K. Marina, S.R. Das, Ad hoc on-demand multipath distance vector routing, Wireless Commun. Mobile Comput.
6 (7) (2006) 969–988.
Volume 4, Issue 8, August 2015
Page 73
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 4, Issue 8, August 2015
ISSN 2319 - 4847
[3] J. Ben Othman, L. Mokdad, Enhancing data security in ad hoc networks based on multipath routing, J. Parallel
Distrib. Comput. 70 (2010) 309–316.
[4] Yu, Y., Estrin, D. and. Govindan, R. “Geographical and Energy-Aware Routing: A Recursive Data Dissemination
Protocol for Wireless Sensor Networks”, UCLA Computer Science Department Technical Report, UCLA-CSD TR01-0023, 2001.
[5] Xu, Y., Heidemann, J. and Estrin, D. “Geography-informed Energy Conservation for Ad-hoc Routing”,
Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp.
70-84, 2001.
[6] Sudhir G. Akojwar, Rajendra M. Patrikar “Improving Life Time of Wireless Sensor Networks Using Neural
Network Based Classification Techniques with Cooperative Routing” in the International Journal of
Communications Issue 1, Vol. 2, pp – 75, 2008.
[7] M. Younis, M. Youssef, K. Arisha, “Energy-aware routing in cluster-based sensor networks”, in: Proceedings of
the 10th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and
Telecommunication Systems 2002.
[8] S. Singh, M. Woo, and C. S. Raghavendra, “Power- Aware Routing in Mobile ad hoc Networks,” 4th Annual
IEEE/ACM Int. Conf. Mobile Computing and Networking, Dallas, TX, pp. 181–190, 1998.
[9] J.-H. Chang and L. Tassiulas,“ Routing for maximum system lifetime
in wireless ad hoc networks,” 37th
Annual Allerton Conf. Communication, Control, and Computing, Monticello, 1999.
[10] Intanagonwiwat, C., Govindan, R. and Estrin, D. “Directed diffusion: a scalable and robust communication
paradigm for sensor networks”, Proceedings of the ACM MobiCom’00, Boston, MA, pp. 56-67, 2000.
[11] J.H. Chang, L. Tassiulas, Maximum lifetime routing in wireless sensor networks, Journal on IEEE/ACM
Transaction. and Networking, Vol.12, No.4, pp.609–619, 2004.
[12] J.H. Chang, L. Tassiulas, Energy conserving routing in wireless ad-hoc networks, in: INFOCOM, 2000, pp. 22–
31.
[13] S. Coleri, P. Varaiya, Fault tolerant and energy efficient routing for sensor networks, in: GlobeCom, 2004.
[14] O. Yilmaz, K. Erciyes, Distributed weighted node shortest path routing for wireless sensor networks, in: Recent
Trends in Wireless and Mobile Networks, Communications in Computer and Information Science, pp. 304–314,
2010.
[15] K.B. Lakshmanan, K. Thulasiraman, M.A. Comeau, An efficient distributed protocol for finding shortest paths in
networks with negative weights, IEEE Trans. Softw. Eng. 15 (1989) 639–644.
[16] A. Boukerche, R. Werner Nelem Pazzi, R. Borges Araujo, Fault-tolerant wireless sensor network routing protocols
for the supervision of context-aware physical environments, J. Parallel Distrib. Comput. 66 (2006) 586–599.
[17] A. Boukerche, Algorithms and Protocols for Wireless Sensor Networks, Wiley-IEEE Press, 2008.
[18] D. Ganesan, R. Govindan, S. Shenker, D. Estrin, Highly-resilient, energy-efficient multipath routing in wireless
sensor networks, in: Proceedings of the 2nd ACM International Symposium on Mobile ad Hoc Networking &
Computing, MobiHoc’01, 2001, pp. 251–254.
[19] Akyildiz, I., Su, W., Sankarasubramaniam, Y. and Cayirci, E. “A survey on sensor networks”, IEEE
Communications Magazine, Vol. 40, No. 8, pp.102-114, 2002.
[20] Y. Liu, W.K.G. Seah, A scalable priority-based multi-path routing protocol for wireless sensor networks, Int. J.
Wirel. Inf. Netw. 12 (1) (2005) 23–33.
[21] Akkaya, K.; Younis, M. “A survey on routing protocols for wireless sensor networks” International Journal on Ad
Hoc Networks, Vol.3, No.3, pp.325-349, 2005.
Volume 4, Issue 8, August 2015
Page 74
Download