Service-Aware Clustering: An Energy-Efficient Model for the Internet-of-Things
Abstract
:1. Introduction
1.1. Sensor Network Clustering
1.2. Contributions and Outline
1.2.1. Energy Awareness
1.2.2. Service Awareness
1.2.3. Centralized Routing
1.2.4. Distributed Signaling
2. The Energy-Efficient Internet-of-Things Model
2.1. The SAC Architecture: System and Software
Node Type | Service Delivery | Energy Consumption Profile | Potential Routing Role |
---|---|---|---|
CSN | Sensing | 1 | CH, CS |
STN | Sensing + tagging | 2 | RS |
HSN | Sensing + reading | 3 | CS, RM |
BSN | aggregation + analysis + forwarding | 4 | BS |
Routing Role | Network Service | Energy Consumption Level | Potential Node |
RS | Identification | 1 | STN |
CS | Sensing | 2 | CSN, HSN |
RM | Reading | 3 | HSN |
CH | aggregation + forwarding | 4 | CSN, HSN |
BS | aggregation, analysis + processing | 5 | BSN |
2.2. Radio Model and Energy Budget Computation
- A CSN sensor node acting as CM spends energy on sensing and transmitting data to its cluster head.
- A CSN sensor node acting as CH dissipates energy for receiving, processing and transmitting data from its cluster members, as well as relaying data from other cluster heads.
- An HSN sensor node acting as CM spends energy for sensing and transmitting data to its cluster head, in addition to interrogating sensor tags and relaying data from other HSNs.
- An HSN acting as CH also spends energy for receiving, processing and transmitting data from its cluster members, as well as on interrogating sensor tags and relaying data from other HSNs.
2.2.1. Energy Budget for Sensing Sensor Tags by HSNs
2.2.2. Energy Budget for Data Aggregation by Cluster Heads
2.2.3. Total Energy Dissipation in a Cluster
2.3. The Service-Aware Clustering Model
2.3.1. The Service-Aware Clustering Problem
- Energy-frugal routing expressed by the routing objective Equation (6), where the most energy-efficient routing configuration is the one with the maximum residual energy.
- Energy-aware clustering expressed by the constraint Equation (6a) used in the energy-aware pre-selection phase of the cluster head pre-election process described in Section 2.4. This constraint is used to assign cluster head roles to the nodes depending on the average sensor network residual energy.
- Service-aware clustering expressed by the constraint Equation (6b,c) used in the service-aware pre-selection phase of the cluster head pre-election process described in Section 2.4. These constraints are used to assign cluster head or cluster member/slave roles to the nodes depending on their service level.
2.3.2. The Service-Aware Clustering Solution
- Centralized clustering: The clustering process is led by the gateway attached to the base station rather than the sensor nodes for reasons described above and in order to avoid the energy wastage associated with a distributed model, enabling the sensor nodes to communicate amongst themselves to elect their cluster heads and build their clusters. Figure 4c depicts the clustered network configuration resulting from the initial network in Figure 4a.
- Distributed provisioning: As suggested above, a distributed process is needed for the sensor network provisioning. It is implemented with the objective of building a signaling tree for the sensor nodes’ information discovery by the gateway and sensor nodes’ role confirmation by the gateway. Figure 4b depicts the signaling tree resulting from the initial network configuration of Figure 4a.
- Optimal number of clusters: The algorithm works with a number of predetermined clusters to control the size of messages routed between and within clusters. Such a number might be related to the size of the sensor network, as well as some geo-spatial constraints and/or based on an optimal number of clusters’ computation dictated by energy efficiency requirements.
- Energy-aware routing: The algorithm assumes that the initial and residual node energy might be known at any moment by using the signaling tree to propagate topology information to the gateway for path computation and network provisioning information to the nodes for routing table construction.
- Service-aware clustering: As assumed earlier, the energy profiles of nodes are related to their types and their service delivery types: service-intensive nodes will consume much energy during operation, while energy-frugal nodes will consume less energy during operation. This is taken into consideration by the algorithm through service differentiation.
Distributed Provisioning
- Initialization: The routing process starts with an initial network depicted by the graph in Figure 5a where Node 1 is the sink.
- Beaconing process: As shown in Figure 5b,c and Figure 6a,b a beaconing process is initiated by a sending node, which announces to the receiving node the intention of the sender of becoming the parent of the receiver. In all figures, the beaconing process is identified by red arrows. This beacon message will reach only a set of neighbors of a sender (s) that meet the constraint expressing that the distance between the sender s and any of its neighbors j should be inferior to the wireless coverage range . While Step 1 shows the initial connected graph of the network, Step 2 reveals the initial beaconing process. Step 3 reveals the initial acknowledgment and forwarding of the beaconing process.
- Acknowledgment and relaying: In the steps in Figure 5c and Figure 6a,b,c, acknowledgments are illustrated by green arrows, which reflect the selection of a parent node chosen among the nodes that sent a beacon message. In contrast to the LIBP protocol where the acknowledgments are used to select a parent among many candidates, the acknowledgment in the SAC protocol is used to both select a parent and to carry a node’s information to the sink/gateway. Note that while all neighbors of the sink have a unique parent selection choice (the sink), the other different nodes select their unique parent from different potential originators of the beacon message. Steps 3, 4 and 5 show how the acknowledgment (in green arrows) and beaconing (in red arrows) processes are recursively repeated, with the expectation of having the beacons reaching the rest of the network, as well as acknowledgments sent back to the root for building a routing topology for the clustered network configuration computation.
- Weight: The least interference paradigm maps the acknowledgment process into a weight setting by: (1) having each node receiving only one acknowledgment from each of its potential children; and (2) the sum of received acknowledgment messages representing a weight on a node expressing the interference on the node of the paths carrying the sensor readings from sensing locations to the sink.
- Termination criteria: The beaconing process is repeated recursively using a breadth-first approach, resulting in the formation of a spanning tree when the beacons reach the leaf nodes, which are marked with weight zero, as they do not receive any acknowledgment message from any node, as expressed by Figure 7a. In such a tree, each node will exhibit a weight corresponding to the number of children it has.
Centralized Clustering
- Step 1: This step consists of applying the distributed provisioning described above to allow the gateway to get the necessary information from the sensor nodes in order to achieve global computation. The node discovery process is piggy backed on the signaling tree construction, which will produce a routing tree used later in the network provisioning phase.
- Step 2: In this step, clusters are constructed based on the information received from the sensor nodes. This step is executed following three main sub-steps: (i) average residual network energy calculation used to achieve energy-aware pre-selection of cluster heads, while the sensor nodes’ service types reported to the gateway are used to achieve service-aware pre-selection; (ii) cluster head election achieved by comparing the number of pre-selected cluster heads to the required number of cluster heads; (iii) cluster head-slave association performed using an optimization method that considers both the geographical location of nodes and their residual energy; and (iv) TDMA schedule generation to preclude an interference-free transmission of the information (sensor readings).
- Step 3: A node’s role confirmation is achieved by using the signaling tree built by making use of the distributed provisioning process described earlier. It aims at informing the nodes of their roles, the next hop to the gateway and also their TDM slots.
- Step 4: During this step, the sensor backbone of cluster heads is constructed by using the highest signal strength - an approach that translates into increasing the probability of selecting the nearest neighbor’s node and, thus, leading to the shortest delays on the backbone.
- Step 5: This step uses the TDMA schedule resulting from Step 2 to enable sensor readings’ dissemination from the nodes to the gateway.
2.4. The SAC Algorithm
2.4.1. Step 1: Nodes’ Discovery
2.4.2. Step 2: Cluster Formation
- Cluster head pre-election: After receiving the broadcast information from all nodes, the base station uses the residual energy information to compute the network’s average residual energy for all nodes . Knowing the network’s residual energy, the base station proceeds with the pre-election of cluster heads. Two processes are used in cluster head pre-election.Energy-aware pre-selection: First, the base station compares the energy of the current node to the average network’s residual energy. If the node energy is higher, then the current node energy is compared to that of the next node in the list. If it is still higher, then the current node is a candidate for the cluster head election. In agreement with Equation (6a) and the nodes’s roles defined in Table 1, the combination of both of these conditions enables the SAC algorithm to increase the possibility of electing as cluster head only those nodes that have the highest energy in the network.Service-aware pre-selection: In the second stage of the pre-election, the base station uses the nodes’ service (SE) to check if the selected node is an HSN. This is because, following the constraint Equation (6c) of the SAC formulation, we want to prevent HSNs from being elected as cluster heads. Here, we assume that using the nodes’ SE, the base station is able to distinguish HSNs from other nodes.
- Cluster head election: Finally, the election process is concluded by checking if the number of nodes that have met the previous requirements are less than the pre-determined number of cluster heads. If this is the case, then the base station re-examines each node in the network and selects any node whose energy is greater than the average.
- Cluster slave association: After the base station has determined all the eligible nodes, it performs an optimization algorithm that uses the geographical location of each candidate and its current residual energy to elect only the best k cluster heads and clusters that optimize the Equation (7).The two functions and provide the base station with the ability to evaluate the fitness level of each individual node . Node is associated with a cluster head only if its distance to is the smallest of its distances to all other cluster heads. With this, the intra- cluster distance between cluster heads and their members and the network’s energy usage are both optimized.
- TDMA transmission schedule: After cluster formation, the base station allocates time slots to each node within a cluster using time division multiple access (TDMA) while code division multiple access (CDMA) is used to reduce collision between cluster heads.
2.4.3. Step 3: Node Roles’ Confirmation
2.4.4. Step 4: Backbone Construction
- In order to optimize the routing process, each cluster head uses the closest cluster head as the next hop to the base station, as determined by the signal strength emitted by all neighboring cluster heads, including the base station.
- Each cluster head selects the strongest signal strength neighbor as its next hop to the gateway and adjusts its routing table accordingly by recording the IDs of its pre-hop node and next-hop node. Note that as currently designed, this backbone could lead to a tree-like or mesh topology.
2.4.5. Step 5: TDMA Communication
3. Performance Evaluation
Test Attributes | Test Value |
---|---|
Beacon Interval | 30 s (LIBP), Adaptive (CTP, RPL) |
Messaging Interval | 30 s, but following the TDMA schedule computed by SAC |
Message Contents | “Hello from node” |
Simulation Runtime | 1000 s, but with 120 s for network self-organization |
TX/INTRange | 50 m/100 m |
- Using the Contiki/Cooja environment, build the signaling tree.
- Upload topology to the gateway through the sink interface.
- Compute the efficient routing configuration using centralized clustering.
- Download the routing information in the sensor nodes through the signaling interface.
- Build forwarding tables on the nodes based on the provisioning information received through distributed signaling.
- Emulate data forwarding in the Contiki/Cooja environment and record statistics.
3.1. The SAC Protocol Performance
3.2. The Relevance of Service Awareness
3.3. Sensor Network Lifetime: First and Last Node to Die
BS at the Center | DECSA | MOCRN | SAC |
---|---|---|---|
FND (round) | 332 | 391 | 448 |
LND (round) | 728 | 831 | 968 |
BS Outside | DECSA | MOCRN | SAC |
FND (round) | 255 | 298 | 361 |
LND (round) | 556 | 746 | 802 |
3.4. Sensor Network Lifetime: Average Lifetime and Scalability
3.5. Traffic Engineering Performance
4. Conclusions and Future Works
Author Contributions
Conflicts of Interest
References
- Mitrokotsa, A.; Douligeris, C. Integrated RFID and Sensor Networks: Architectures and Applications; Auerbach Publications: Boca Raton, FL, USA, 2009; pp. 511–536. [Google Scholar]
- Eubanks, W.W. Payment Card Interchange Fees: An Economic Assessment; United States Congressional Research Service: Washington, DC, USA, 2008; pp. 1–13. [Google Scholar]
- Niu, X.; Huang, X.; Zhao, Z.; Zhang, Y.; Huang, C.; Cui, L. The Design and Evaluation of a Wireless Sensor Network for Mine Safety Monitoring. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’07), New Orleans, LA, USA, 26–30 November 2007; pp. 1291–1295.
- Pei, Z.; Deng, Z.A. A Distributed Location Algorithm for Underground Miners Based on Rescue Robot and Coal-Mining Wireless Sensor Networks. In Proceedings of the IEEE Conference on Robotics, Automation and Mechatronics, Chengdu, China, 21–24 September 2008; pp. 884–888.
- Hospital Using RTLS to Monitor Patients’ Conditions. Available online: http://www.rfidjournal.com/articles/view?6685 (accessed on 24 November 2015).
- Jurdak, R.; Ruzzelli, A.G.; Hare, G. Multi-Hop RFID Wake-Up Radio: Design, Evaluation and Energy Tradeoffs. In Proceedings of the 17th International Conference on Computer Communications and Networks (ICCCN), St. Thomas, VA, USA, 3–7 August 2008; pp. 1–8.
- Martin, J. Hybrid RFID Sensors: Design, Implementation and Application. Master Thesis, The University of Cape Town, Cape Town, South Africa, 2014. [Google Scholar]
- Karbab, E.; Djenouri, D.; Boulkaboul, S.; Bagula, A. Car Park Management with Networked Wireless Sensors and Active RFID. In Proceedings of the IEEE International Conference on Electro/Information Technology (EIT), Naperville, IL, USA, 21–23 May 2015; pp. 373–378.
- Bagula, A.; Castelli, L.; Zennaro, M. On the Design of Smart Parking Networks in the Smart Cities: An Optimal Sensor Placement Model. Sensors 2015, 15, 15443–15467. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy Efficient Communication Protocol for Wireless Sensor Networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Hawaii, HI, USA, 4–7 January 2000; pp. 1–10.
- Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Trans. Wireless Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef]
- Yong, Z.; Pei, Q. A energy-efficient clustering routing algorithm based on distance and residual energy for wireless sensor networks. Procedia Eng. 2012, 29, 1882–1888. [Google Scholar] [CrossRef]
- Nam, C.S.; Bae, S.T.; Chung, J.W.; Shin, D.R. Multihop-Based Optimal Cluster Heads Numbers Considering Relay Node in Transmission Range of Sensor Nodes in Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2013, 2013, 1–10. [Google Scholar] [CrossRef]
- Antoine, B.; Djenouri, D.; Karbab, E. On the Relevance of Using Interference and Service Differentiation Routing in the Internet-of-Things. Lect. Notes Comput. Sci. 2013, 8121, 25–35. [Google Scholar]
- Kulik, J.; Heinzelman, W.; Balakrishnan, H. Negotiation-based protocols for disseminating information in wireless microsensor networks. Wirel. Netw. 2002, 8, 169–185. [Google Scholar] [CrossRef]
- Kim, S.; Lee, S.; An, S. Reader Collision Avoidance Mechanism in Ubiquitous Sensor and RFID Networks. In Proceeedings of the WiNTECH’06, Los Angeles, CA, USA, 29 September 2006; pp. 101–102.
- Al-Karaki, J.N.; Kamal, A.E. Routing techniques in wireless sensor networks: A survey. IEEE Trans. Wirel. Commun. 2004, 11, 6–28. [Google Scholar] [CrossRef]
- Wang, A.; Heinzelman, W.; Chandrakasan, A. Energy-Scalable Protocols for Battery-Operated Microsensor Networks. In Proceedings of the IEEE Workshop Signal Processing Systems (SiPS’99), Taipei, Taiwan, 20–22 October 1999; pp. 483–492.
- Bagula, A.; Djenouri, D.; Karbab, E. Ubiquitous Sensor Network Management: The Least Interference Beaconing Model. In Proceedings of the IEEE PIMRC-2013 Conference, London, UK, 8–11 September 2013; pp. 2352–2356.
- Ngqakaza, L.; Bagula, A. Least Path Interference Beaconing Protocol (LIBP): A Frugal Routing Protocol for the Internet-of-Things. In Proceedings of the IFIP Wired/Wireless Internet Communications WWIC 2014, Pairs, France, 26–28 May 2014; pp. 148–161.
- Zennaro, M.; Bagula, A.B. Design of a flexible and robust gateway to collect sensor data in intermittent power environments. Int. J. Sensor Netw. 2010, 8, 172–181. [Google Scholar] [CrossRef]
- Zennaro, M.; Bagula, A.; Gascon, D.; Noveleta, A.B. Planning and Deploying Long Distance Wireless Sensor Networks: The Integration of Simulation and Experimentation. Lect. Notes Comput. Sci. 2010, 6288, 191–204. [Google Scholar]
- Bagula, A.B. Modelling and Implementation of QoS in Wireless Sensor Networks: A Multi-constrained Traffic Engineering Model. Eur. J. Wirel. Commun. Netw. 2010. [Google Scholar] [CrossRef]
- Bagula, A.B.; Krzesinski, A.E. Traffic Engineering Label Switched Paths in IP Networks Using a Pre-Planned Flow Optimization Model. In Proceedings of the 9th International Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems, Cincinnati, OH, USA, 15–18 August 2001; pp. 70–77.
© 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bagula, A.; Abidoye, A.P.; Zodi, G.-A.L. Service-Aware Clustering: An Energy-Efficient Model for the Internet-of-Things. Sensors 2016, 16, 9. https://doi.org/10.3390/s16010009
Bagula A, Abidoye AP, Zodi G-AL. Service-Aware Clustering: An Energy-Efficient Model for the Internet-of-Things. Sensors. 2016; 16(1):9. https://doi.org/10.3390/s16010009
Chicago/Turabian StyleBagula, Antoine, Ademola Philip Abidoye, and Guy-Alain Lusilao Zodi. 2016. "Service-Aware Clustering: An Energy-Efficient Model for the Internet-of-Things" Sensors 16, no. 1: 9. https://doi.org/10.3390/s16010009
APA StyleBagula, A., Abidoye, A. P., & Zodi, G. -A. L. (2016). Service-Aware Clustering: An Energy-Efficient Model for the Internet-of-Things. Sensors, 16(1), 9. https://doi.org/10.3390/s16010009