Skip to main content

Advertisement

Log in

Energy-efficient node selection in application-driven WSN

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The growth of wireless networks has resulted in part from requirements for connecting people and advances in radio technologies. Wireless sensor networks are an example of these networks in which a large number of tiny devices interacting with their environments may be inter-networked together and accessible through the Internet. As these devices may be scattered in an unplanned way, a routing protocol is needed. The RPL protocol is the IETF proposed standard protocol for IPv6-based multi-hop WSN. RPL requires that communication paths go through a central router which may provide suboptimal paths, not considering the characteristics of the applications the nodes run. In this paper is proposed an Application-Driven extension to RPL which enables to increase the WSN lifetime by limiting the routing and forwarding functions of the network mainly to nodes running the same application. As nodes may join a network at a non predictable time, they must be synchronized with respect to their application duty cycles. Therefore, nodes have to wake up and sleep in a synchronized way. In this paper it is also proposed such synchronization mechanism. The results confirm that the proposed solutions provide lower energy consumption and lower number of packets exchanged than the conventional RPL solution, while maintaining fairness and the packet reception ratio high.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36
Fig. 37
Fig. 38
Fig. 39

Similar content being viewed by others

References

  1. Accettura, N., & Piro, G. (2014). Optimal and secure protocols in the IEFT 6TiSCH communication stack. In Proceedings of IEEE international symposium on industrial electronics (ISIE).

  2. Akyildiz, I. F., Vuran, M. C., Akan, O. B., & Su, W. (2006). Wireless sensor networks: A survey revisited. Computer Network Journal (Elsevier Science).

  3. Anastasi, G., Conti, M., Francesco, M. D., & Passarella, A. (2009). Energy conservation in wireless sensor networks: A survey. Ad Hoc Networks, 7(3), 537–568. doi:10.1016/j.adhoc.2008.06.003.

    Article  Google Scholar 

  4. Baccelli, E., Philipp, M., & Goyal, M. (2011). The P2P-RPL routing protocol for IPv6 sensor networks: Testbed experiments. In: 2011 19th international conference on software, telecommunications and computer networks (SoftCOM) (pp. 1–6) (2011).

  5. BeagleBone Black. (2014). http://beagleboard.org/BLACK.

  6. Boudec, J. (2010). Performance evaluation of computer and communication systems. Computer and communication sciences. EFPL Press. http://books.google.pt/books?id=nibpCdEjUEYC.

  7. Catarinucci, L., Colella, R., Del Fiore, G., Mainetti, L., Mighali, V., Patrono, L., et al. (2014). A cross-layer approach to minimize the energy consumption in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 11. doi:10.1155/2014/268284.

    Article  Google Scholar 

  8. Chipcon Products and Texas Instruments. (2006). 2.4 GHz IEEE 802.15.4/ZigBee-ready RF transceiver. Document SWRS041.

  9. Crossbow TelosB. (2004). http://www.memsic.com/userfiles/files/Datasheets/WSN/6020-0094-02_B_TELOSB.pdf.

  10. Culler, D. E. (2008). Wireless mesh networks promise low power ip-based connectivity. Industrial Ethernet Book, 49, 16–22.

    Google Scholar 

  11. Dunkels, A. (2013). Contiki OS, open source, highly portable, multi-tasking operating system for memory-efficient networked embedded systems and wireless sensor networks. http://www.contiki-os.org.

  12. Dunkels, A., Osterlind, F., Tsiftes, N., & He, Z. (2007). Software-based on-line energy estimation for sensor nodes. In EmNets ’07: Proceedings of the 4th workshop on Embedded networked sensors (pp. 28–32). New York, NY: ACM. doi:10.1145/1278972.1278979.

  13. Fasolo, E., Rossi, M., Widmer, J., & Zorzi, M. (2007). In-network aggregation techniques for wireless sensor networks: A survey. Wireless Communications, IEEE, 14(2), 70–87. doi:10.1109/MWC.2007.358967.

    Article  Google Scholar 

  14. Montenegro, G., Kushalnagar, N., & Culler, D. (2007). Transmission of IPv6 packets over IEEE 802.15.4 networks. In IETF.

  15. Hester, L., Huang, Y., Andric, O., Allen, A., & Chen, P. (2002) NeuRon netform: A self-organizing wireless sensor network. In Proceedings of the eleventh international conference on computer communications and networks (pp. 364–369).

  16. Hui, J., & Culler, D. (2008). Extending ip to low-power, wireless personal area networks. Internet Computing, IEEE, 12(4), 37–45. doi:10.1109/MIC.2008.79.

    Article  Google Scholar 

  17. IEEE Computer Society. (2006). IEEE Standard for Information technology— Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs).

  18. IEEE-Computer-Society. (2006). IEEE Std 802.15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs). Revision of IEEE Std 802.15.4-2003.

  19. IETF Network Working Group. (2003). Ad-hoc on-demand distance vector (AODV) routing algorithm. http://tools.ietf.org/html/rfc3561.

  20. Jain, R., Chiu, D. M., & Hawe, W. (1998). A quantitative measure of fairness and discrimination for resource allocation in shared computer systems. CoRR cs.NI/9809099 (1998). http://dblp.uni-trier.de/db/journals/corr/corr9809.html#cs-NI-9809099.

  21. JENNIC. (2006). Calculating 802.15.4 data rates. Application Note: JN-AN-1035.

  22. Khan, M. R. H., Hossain, M. A., & Mukta, M. S. H. (2008). Zigbee cross layer optimization and protocol stack analysis on wireless sensor network for video surveillance. In International conference on electronics, computer and communication (ICECC 2008) (pp. 795–799). Bangladesh: University of Rajshahi.

  23. Koushanfar, F., Taft, N., & Potkonjak, M. (2006) Sleeping coordination for comprehensive sensing using isotonic regression and domatic partitions. In INFOCOM 2006. Proceedings of 25th IEEE international conference on computer communications (pp. 1–13). doi:10.1109/INFOCOM.2006.276.

  24. Latré, B., Mil, P. D., Moerman, I., Dhoedt, B., Demeester, P., & Dierdonck, N. V. (2006). Throughput and delay analysis of unslotted IEEE 802.15.4. JNW, 1(1), 20–28.

    Article  Google Scholar 

  25. Levis, P., Clausen, T., Hui, J., Gnawali, O., & Ko, J. (2011). The trickle algorithm. RFC 6206 (Proposed Standard). http://www.ietf.org/rfc/rfc6206.txt.

  26. Ma, T., Xu, Z., Hempel, M., Peng, D., & Sharif, H. (2014). Performance analysis of a novel low-complexity high-precision timing synchronization method for wireless sensor networks. Wireless Communications, IEEE Transactions on, 13(9), 4758–4765. doi:10.1109/TWC.2014.2331286.

    Article  Google Scholar 

  27. Marques, B. F., & Ricardo, M.P. (2011). Application-driven design to extend WSN lifetime. In Proceedings of 1st Portuguese national conference on sensor networks (CNRS2011), Coimbra, Portugal.

  28. Marques, B. F., & Ricardo, M. P. (2014). Improving the energy efficiency of WSN by using application-layer topologies to constrain RPL-defined routing trees. In Ad Hoc networking workshop (MED-HOC-NET), 2014 13th annual Mediterranean (pp. 126–133). doi:10.1109/MedHocNet..6849114.

  29. Martin, J. (1965). Distribution of the time through a directed acyclic network. European Journal of Operations Research, 13, 44–66.

    MathSciNet  Google Scholar 

  30. Mendes, L. D., & Rodrigues, J. J. (2011) A survey on cross-layer solutions for wireless sensor networks. Journal of Network and Computer Applications 34(2), 523–534. doi:10.1016/j.jnca.2010.11.009. http://www.sciencedirect.com/science/article/pii/S1084804510002079. Efficient and Robust Security and Services of Wireless Mesh Networks.

  31. Montenegro, G., Kushalnagar, N., Hui, J., & Culler, D. (2007). RFC 4944—Transmission of IPv6 packets over IEEE 802.15.4 networks. In IETF RFC.

  32. Nam, Y., Kwon, T., Lee, H., Jung, H., & Choi, Y. (2007). Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach. Computer Communications, 30(13), 2532–2545. doi:10.1016/j.comcom.2007.05.031.

    Article  Google Scholar 

  33. Organization, Z. S. (2008). Zigbee specification. http://www.zigbee.com. Document 053474r17.

  34. Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., & Voigt, T. (2006). Cross-level sensor network simulation with COOJA. In Proceedings 2006 31st IEEE conference on local computer networks (pp. 641–648). doi:10.1109/LCN.2006.322172.

  35. Pantazis, N., Nikolidakis, S., & Vergados, D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. Communications Surveys Tutorials, IEEE, 15(2), 551–591. doi:10.1109/SURV.2012.062612.00084.

    Article  Google Scholar 

  36. Paxson, V., Allman, M., Chu, H. J., & Sargent, M. (2011). Computing TCP’s retransmission timer. http://tools.ietf.org/html/rfc6298.

  37. RaspBerry Pi. (2014). http://www.raspberrypi.org.

  38. Santi, P. (2005). Topology control in wireless ad hoc and sensor networks. ACM Computing Surveys, 37(2), 164–194. doi:10.1145/1089733.1089736.

    Article  MathSciNet  Google Scholar 

  39. Sturek, D. (2009). ZigBee IP stack overview. ZigBee Alliance.

  40. Tang, C. M., Zhang, Y., & Wu, Y. P. (2012). The P2P-RPL routing protocol research and implementation in contiki operating system. In 2012 Second international conference on instrumentation, measurement, computer, communication and control (IMCCC) (pp. 1472–1475). doi:10.1109/IMCCC.2012.345.

  41. van Dam, T., & Langendoen, K. (2003). An adaptive energy-efficient mac protocol for wireless sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems, SenSys ’03 (pp. 171–180). New York, NY: ACM. doi:10.1145/958491.958512.

  42. Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., et al. (2012) RPL: IPv6 routing protocol for low-power and lossy networks. In RFC 6550 (Proposed Standard). http://www.ietf.org/rfc/rfc6550.txt.

  43. Xie, W., Goyal, M., Hosseini, H., Martocci, J., Bashir, Y., Baccelli, E., et al. (2010) A performance analysis of point-to-point routing along a directed acyclic graph in low power and lossy networks. In 2010 13th International conference on Network-based information systems (NBiS) (pp. 111–116). doi:10.1109/NBiS.2010.65.

  44. Ye, W., Heidemann, J., & Estrin, D. (2002). An energy-efficient MAC protocol for wireless sensor networks. In INFOCOM 2002. Proceedings of twenty-first annual joint conference of the IEEE computer and communications societies (Vol. 3, pp. 1567–1576), IEEE. doi:10.1109/INFCOM.2002.1019408.

Download references

Acknowledgments

This work was financed by the Project “NORTE-07-0124-FEDER-000056” by the North Portugal Regional Operational Programme (ON.2 - O Novo Norte), under the National Strategic Reference Framework (NSRF), through the European Regional Development Fund (ERDF), and by national funds, through the Portuguese funding agency, Fundação para a Ciência e a Tecnologia (FCT) within the fellowship “SFRH/BD/ 36221/2007”. Authors would like to thank also the support from Faculty of Engineering, University of Porto, to thank the support from the INESC TEC, and to thank the support from the School of Technology and Management of Viseu.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bruno Marques.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and animal rights

The work does not contain any studies with human participants or animals performed by any of the authors.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Marques, B., Ricardo, M. Energy-efficient node selection in application-driven WSN. Wireless Netw 23, 889–918 (2017). https://doi.org/10.1007/s11276-016-1194-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-016-1194-2

Keywords

Navigation