Constructing a CDS-Based Network Backbone for Energy Efficiency in Industrial Wireless Sensor Network

Similar documents
Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Power Efficient Data Gathering and Aggregation in Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

IN WIRELESS SENSOR NETWORKS

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

Power Aware Metrics for Wireless Sensor Networks

Energy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

Algorithms for Minimum m-connected k-dominating Set Problem

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

Algorithms for minimum m-connected k-tuple dominating set problem

Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS

Performance of New Broadcast Forwarding Criteria in MANET

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Performance of a Novel Energy-Efficient and Energy Awareness Scheme for Long-Lifetime Wireless Sensor Networks

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

A3: A Topology Construction Algorithm for Wireless Sensor Networks

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

New Data Clustering Algorithm (NDCA)

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

Glasgow eprints Service

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance

Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network

Enhancement of Hierarchy Cluster-Tree Routing for Wireless Sensor Network

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

An Energy Efficient Clustering in Wireless Sensor Networks

Hybrid Approach for Energy Optimization in Wireless Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

(EBHCR) Energy Balancing and Hierarchical Clustering Based Routing algorithm for Wireless Sensor Networks

K-SEP: A more stable SEP using K-Means Clustering and Probabilistic Transmission in WSN

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Fig. 2: Architecture of sensor node

Keywords Wireless Sensor Network, Cluster, Energy Efficiency, Heterogeneous network, Cluster, Gateway

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

On minimum m-connected k-dominating set problem in unit disc graphs

Gateway Based WSN algorithm for environmental monitoring for Energy Conservation

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks

MultiHop Routing for Delay Minimization in WSN

Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)

Multi-Hop Clustering Protocol using Gateway Nodes in Wireless Sensor Network

Index Terms: Base Station, Hop Count Indicator (HCI), Node Usage Indicator (NUI), Resource Biased Routing (RBR).

Figure 1. Clustering in MANET.

PERFORMANCE EVALUATION OF TOPOLOGY CONTROL ALGORITHMS FOR WIRELESS SENSOR NETWORKS

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

VORONOI LEACH FOR ENERGY EFFICIENT COMMUNICATION IN WIRELESS SENSOR NETWORKS

Constructing a Load-Balanced Virtual Backbone in Wireless Sensor Networks

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks

SCH-BASED LEACH ALGORITHM TO ENHANCE THE NETWORK LIFE TIME IN WIRELESS SENSOR NETWORK (WSN)

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Power Aware Chain Routing Protocol for Data Gathering in Sensor Networks

Extending Network Lifetime of Clustered-Wireless Sensor Networks Based on Unequal Clustering

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Pervasive and Mobile Computing. Improved sensor network lifetime with multiple mobile sinks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

Heterogeneous LEACH Protocol for Wireless Sensor Networks

Performance Comparison of Energy Efficient Clustering Protocol in Heterogeneous Wireless Sensor Network

Mobility Control for Complete Coverage in Wireless Sensor Networks

MODIFIED LEACH-C PROTOCOL FOR CLUSTER BASED ROUTING IN ENERGY EFFICIENT WIRELESS SENSOR NETWORKS

Journal of Wireless Sensor Networks. Topology control in Heterogeneous Wireless Sensor Network

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Connected Dominating Sets in Wireless Networks with Different Transmission Ranges

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Transmit and Receive Power Optimization for Source-Initiated Broadcast in Wireless-Relay Sensor Networks

Integrated Routing and Query Processing in Wireless Sensor Networks

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks

Mobile Agent Driven Time Synchronized Energy Efficient WSN

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

Randomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks

Dropping The Transmission Rate Using Distributed Broadcasting Algorithm In Wireless Ad-hoc Network

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks

CLUSTER HEAD SELECTION USING QOS STRATEGY IN WSN

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

ISSN: X International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 6, Issue 1, January 2017

DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NETWORKS

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

Transcription:

Constructing a CDS-Based Network Backbone for Energy Efficiency in Industrial Wireless Sensor Network Sajid Hussain Fisk University Nashville, TN, USA Email: shussain@fisk.edu Mubashsharul I. Shafique Acadia University Wolfville, NS, Canada Email: 093080s@acadiau.ca Laurence T. Yang St. Francis Xavier University Antigonish, NS, Canada Email: ltyang@stfx.ca Abstract In this work we design a virtual backbone to provide energy-efficient communication in Wireless Sensor Networks (WSNs). WSNs need virtual backbones to support in-network data transmission. In scenarios where there is no spatial redundancy (such as a sensor network in a petroleum installation), Connected Dominating Set (CDS)-based algorithms can be useful for hierarchical network management. We construct a CDSbased backbone to support the operation of an energy efficient network. We focus on three key ideas in our design: (a) a realistic weight matrix, (b) an asymmetric communication link between pairs of nodes, and (c) a role switching technique to prolong the lifetime of the CDS backbone. We simulate our proposed design using realistic scenarios for performance evaluation. We compare the proposed design with a traditional CDS algorithm. The simulation results prove the efficiency of the proposed algorithm in terms of network lifetime and packet loss. Key words: Wireless Sensor Network; Connected Dominating Set; Virtual Backbone; Network lifetime. I. INTRODUCTION A Wireless Sensor Network(WSN) includes deployment of sensor nodes for monitoring environment. Sensor nodes are generally autonomous and communicate to each other via wireless media. The deployment of sensors can be dense and as large as 20000 nodes (in an industrial automation). In order to manage network traffic, WSN needs some form of virtual backbone. We can use the notion of connected dominating set(cds) to create virtual backbone in WSNs. In CDS-based backbone, fewer nodes need to keep track of routing information; these nodes are part of Dominating Set (DS). Thus, relatively less number of nodes receive routing control messages in case of any topological change. A CDS can also reduce the impact of the broadcast storm problem [1]. Furthermore, using CDS backbone, we can put non-cds nodes into periodical sleep mode to conserve overall energy of the network [2]. In this work, we use CDS-based network backbone for a sensor network and try to extend the network life time. From a systems perspective, we consider realistic sensor network characteristics to implement and analyze energy-efficiency for the WSN. The remaining of this paper is organized as follows: in Section II, we state the problem that we address in this work. Section III discusses some related works and then formulates the motivation of our work. Later on, in Section III-B, we describe the details of r-cds algorithm proposed by Li et.al. [3]. Section IV provides the motivations of our work. Our extensions to r-cds algorithm are presented in Section V. Section VI-E describes results and analysis. Finally, Section VII concludes the paper. II. PROBLEM DEFINITION Any computing network needs to have some form of backbone to support in-network data traffic. WSN is not an exception, but unfortunately in most cases WSNs do not have any fixed network structure. Nodes may run out of battery power or they may get physically moved, resulting in changes in network topology. Hence, it requires some form of virtual backbone that can be formed on-the-fly and yet support data flow. There are many algorithms to construct a virtual backbone using CDS. Most of those algorithms mainly focus on two aspects: (a) reducing backbone size; and (b) reducing time/message complexity. There is a need for research that can design CDS backbone for extending network lifetime. In case of many industrial WSNs, every data packet is important. Hence, for such a network, the network life effectively ends with the First Node Death(FND). Due to incomplete data, the remaining energy in the surviving nodes is of no use after FND. Keeping this in mind, our aim in this work is to design a CDS backbone that can delay the death of the first node. We try to prolong network lifetime and reduce energy wastage. A. Previous Works III. LITERATURE REVIEW There has been many research works done on constructing a CDS-based backbone in WSN. Based on the information required to build a CDS, we can divide the existing algorithms into 2 broad categories: (a) Centralized, and (b) Distributed. Further, if we consider the certainty of a CDS construction, algorithms fall into either: (a) Probabilistic, or (b) Deterministic. As centralized CDS construction algorithms require global information on the network, these approaches are not well

suited for: (a) large networks due to a massive number of nodes; (b) dynamic networks due to a variable number of nodes. However, distributed algorithms only need n-hop neighborhood information for small n. These algorithms have low construction cost and show fast convergence. Probabilistic techniques incur low overhead and create CDS with high probability [4]; however, these are network dependent. For a dense network, the backbone size becomes large in these approaches. Deterministic schemes keep the backbone small but require high computation [5]. The good part of a deterministic approach is that it guarantees a CDS in connected networks [6]. Guha et al. proposed a centralized algorithm in their seminal work [7] on CDS. Their algorithm starts from a single node and later on, iteratively, more nodes are added to it. At first all nodes are marked white and the node with maximum white neighbors initiates CDS construction. That node turns into black and its white neighbors turn into gray. Then, the algorithm iteratively checks gray neighbors of it as well as all gray-white pairs, for a candidate having maximum white neighbors. Then, that node/pair of nodes becomes black. In this way, the algorithm continues until there is a single white node in the network. Das et al. [8] proposed a centralized algorithm to construct CDS in a WSN. According to their design, each node needs to know if it has the maximum degree among all nodes in the network. It also requires the backbone nodes to know which 1- and 2-hop-away neighbors are marked. These two requirements force the flooding of node-degree information in the network. Li et al. [3] designed a distributed localized algorithm (r- CDS) to construct a 1-CDS. At first this algorithm chooses a set of Dominators for the backbone, and then, as the CDS construction progresses, some connector nodes get selected to connect the initial Dominators. Similar to other algorithms, it also uses some pruning techniques to reduce the number of dominator nodes in the network backbone. As we base our work on this particular algorithm, we present further discussion on this in Section III-B. Wu et al. [9] proposed both centralized and distributed algorithms to construct k-connected m-dominating set (km-cds) backbones for WSNs. Their distributed km-cds construction is based on Li et al. s r-cds algorithm. Earlier works to build CDS focused on special cases like k=1, 2 or k=m but Wu et al. designed algorithms for general k and m. Both algorithms presented in this work form a km-cds in two phases. In the first phase, algorithms form an m-dominating set, and in the second phase they ensure k-connectivity for that set. B. Details of the r-cds Algorithm In our work, we modify the r-cds algorithm proposed by Li et al.. We choose to use this algorithm because it is distributed in nature, and hence does not require global information. At the same time, it is deterministic. Moreover, it has already been used to construct km-cds [9] for fault tolerance, which reflects its extendability. In this section, we describe the details of this algorithm. r-cds algorithm constructs a 1-CDS in a WSN. Based on the weight comparison among neighbors, some suitable nodes get selected as Dominators. The set of Dominators is a MIS. Those initially selected Dominators, in conjunction with some Connector nodes (known as Dominator2 nodes), later on form the dominating set (or backbone) of the network. On the other hand, nodes that are not part of the dominating set remain as Dominatees, and use neighboring Dominators as next hops for data communication. This algorithm assumes that all nodes know 2-hop-away neighborhood information and have equal transmission range. Table I defines different notations used in this algorithm. Notation d(u) deg(u) r(u) N(u) N[u] TABLE I NOTATIONS USED IN THE r-cds ALGORITHM Meaning Degree of node u The effective node degree of node u. It is the count of white neighbors of u The number of 2-hop away neighbors - d(u); r for brevity Node set that includes u s all 1-hop neighbors excluding u, also called open neighbor set of node u N(u) {u}, also called the close neighbor set of node u 1) Weight Comparison: The weight matrix used in r-cds algorithm is: W i (r i, deg i, ID i ). During weight comparison, node i is more suitable to be a Dominator than neighboring node j, if any of the following is true: 1) r(i) < r(j) 2) r(i) = r(j) and deg(i) > deg(j) 3) r(i) = r(j) and deg(i) = deg(j) and ID(i) < ID(j) 2) Colors and Messages: Sensor nodes in the r-cds algorithm can have three different colors: white, gray and black. Initially all nodes are white. During the execution of algorithm, all nodes change their color to either black or gray. Black nodes form network backbone, whereas gray nodes remain as Dominatees. In this algorithm, nodes can broadcast the following messages: 1) BLACK Message: If a node turns into a Dominator1 node, it sends out this message. 2) GRAY Message: If a node turns gray, it sends out this message. The GRAY message contains two IDs: its own node ID and the ID of the neighbor that caused it to turn gray. 3) deg(u) Message: When a white node receives GRAY or BLACK message, its effective node degree changes, and hence it broadcasts this message. 3) Selecting Dominator1 Nodes: After each node knows about its 2-hop-away neighborhood by neighbor discovery, all nodes broadcast their r values. A node u becomes Dominator1 if it wins in the weight comparison over its neighbors. Then, node u turns black and broadcasts a BLACK message in the neighborhood. If a white node v receives BLACK message from its neighbor u, v becomes gray and broadcasts GRAY

message in its neighborhood. This GRAY message contains the pair (v s ID, u s ID). 4) Selecting Dominator2 Nodes: If a black node w receives GRAY message from a gray node v and the ID of another black node u, and if w and u are not connected yet, then v becomes Dominator2 node (and hence turns into black) in order to connect u and w. In the same way, after receiving a BLACK message from a node w, if a gray node u has already received a notification that there is a 2-hop-away black neighbor v sent by a neighbor x and v has not been connected to w yet, then both u and x become Dominator2 nodes to connect node v and node w. Upon receiving a GRAY or a BLACK message, a white node u decrements its effective degree deg(u) by 1 and broadcasts deg(u) message. IV. MOTIVATIONS OF OUR WORK Every algorithm proposed so far uses some form of weight matrix to pick dominator nodes. Table II lists some algorithms with respective weight matrices. For each weight matrix, the ordering of elements is important. For example, according to the algorithm presented in [10], W i (N i,id i ) > W j (N j,id j ) if either of the followings holds: i) N i > N j or ii) N i = N j and ID i > ID j In Table II, we see that TABLE II WEIGHT MATRIX OF DIFFERENT CDS ALGORITHMS Algorithm Weight matrix [11] N i [5] (S(i, t)), for k-coverage [9] (N i, e i, ID i ) [10] (N i, ID i ) [12] (e i, N i, ID i ) [13] (ID i, e i, M i, T i ) [14] N i ID i N i e i S(i, t) M i T i node id for node i node degree of node i remaining energy of node i forwarding status of node i mobility of node i traffic load of node i some CDS algorithms do not consider the remaining energy of the node, which is unrealistic. Again some other algorithms consider node degree to be the prime factor in weight matrix. According to those algorithms, the higher the node degree, the more is its chance to become dominator. Putting prime importance on one parameter during tuple-based comparison can go either way: small dominator set (when degree is first parameter) with low-energy; or large dominator set (when energy is first parameter). We propose a realistic, composite weight comparison in section V-A. Further, Almost all algorithms consider bidirectional communication across any edge in the graph. It is assumed that if node A can reach node B, node B will also be able to reach node A. Thus they consider uniform transmission range throughout the network that resembles an unit disk graph. However, real life sensor network can have sensor node with variable transmission range, causing asymmetric communication across a link. In section V-B, we explain how we address this issue. In general, algorithms used to design CDS backbone do not consider switching the role of dominators. But if we use same set of dominators, those nodes will carry or relay network traffic all the time. As a result, they will run out of energy quite early compared to dominatee nodes. So research works that aim at delaying the death of first node, switching role of dominators can be useful. For example, once the energy of a dominator goes below a predefined threshold, a different node can take up the responsibility. In section V-C, we discuss to incorporate role switching of dominators. V. EXTENSION OF r-cds ALGORITHM FOR ENERGY-EFFICIENCY In this section, we propose our modifications to r-cds algorithm in order to prolong network lifetime. With the modifications we propose, we name the algorithm modified r-cds or mr-cds. A. Weight Comparison In our algorithm, we propose to use a composite weight matrix comparison instead of single-element tuple-based comparison. We propose to reduce the weight matrix of the r- CDS algorithm (Section III-B.1) into W i (x i, ID i ), where x i = f(n i, e i ). Similar to the weight comparison of the r-cds, the following weight computation and comparison are executed on each node of the network. We assume that during network operation, all nodes send same-length data packets in each data gathering round. Our target here is to delay the first node death. Table III presents different terms that we use in our estimation of remaining energy during weight computation. TABLE III NOTATIONS USED IN WEIGHT CALCULATION OF THE mr-cds Notation e i tx e i rx e i N i m p k i ALGORITHM Explanation Energy cost to send 1 packet from node i (in Joul) Energy cost to receive 1 packet at node i (in Joul) Initial energy of node i (in Joul) Node degree of node i Initial data round count that network is expected to operate Total packet reception at node i after k data rounds 1) Estimating Remaining Energy: Consider the following: p m u : Total packet reception at node u drain u : Total energy drain at u x u : Remaining energy at u After m rounds, p m u = N u m p m v = N v m drain u = m e u tx + p m u (e u rx + e u tx ) drain v = m e v tx + p m v (e v rx + e v tx )

x u = e u - drain u x v = e v - drain v The total energy drain at any node is the sum of its own packet transmission cost and the relay cost. 2) Selection of Dominator: Algorithm 1 provides the details of selection of a dominator by comparing the ndoe weights. Algorithm 1 Algorithm to Compare Node Weights in mr- CDS /* x u and x v are remaining energy of node u and v after m rounds */ if x u > x v then u becomes Dominator else if x u < x v then v becomes Dominator else if ID u < ID v then u becomes Dominator else v becomes Dominator end if end if end if B. Variable Transmission Range During neighbor discovery phase of the r-cds algorithm, each node broadcasts hello packet. Nodes that receive any such packet are confirmed neighbors of the hello sender. This is only possible if all communication links are symmetric. However, as we consider variable transmission range in the network, we can not assume symmetric communication across any link. This brings up the need to apply acknowledgment scheme during neighbor discovery phase of the mr-cds algorithm. The 3-node network in Figure 1 explains link asymmetry in any WSN. In this Figure, tr w > tr v > tr u, where tr i is transmission range of node i. Following the r-cds algorithm, if all nodes broadcast hello packets in this configuration, node v will receive hello packets from u and w. But due to lower transmission range, v s own hello packet will not reach w. So, even though v receives hello packet from node w, bidirectional communication is not possible between them. In other words, they are not confirmed neighbor. In order to address this issue, we propose following modifications to the neighbor discovery phase of the r-cds algorithm: 1) Each node sends out its hello packet mentioning its node ID, hop-count and remaining energy. 2) As nodes receive hello packets, each node maintains two lists for its potential neighbors: High-list and Low-list. If the remaining energy of the hello sender is greater or equal to its own energy, the hello sender is added to the High-list. On the other hand, a hello sender with lower Fig. 1. Neighbor Discovery in Asymmetric Communication energy ends up in the Low-list. For example, in Figure 1, after receiving hello packets, node v puts u in Low- list and w in High-list. Now, the node in Low-list is its confirmed neighbor, as with greater transmission power, v can reach it. For the node in the Low-list, it sends out an ack packet. And for the node in the High- list, it waits to listen for an ack packets in response to its hello packet. 3) After listening for a predefined period of time, if a node does not receive any ack packet from some node in its High-list, it removes those nodes from the list. For example, in Figure 1, as the hello packet from node v can not reach w, w will not send any ack packet to v. But v will send an ack packet to u. In the end, nodes of both lists make up a node s neighborhood. Following the above steps we can discover neighbors for each node in a network having asymmetric communication links. In a nutshell: an ack packet from a high-energy node u to lowenergy node v means that the hello packet from v reached u, so u and v are neighbors. C. Role Switching Technique In Section IV, we stated the reason for role switching of the Dominators. It can help delay the death of the first node in a network. In order to delay the first-node death, we propose the following rules for role switching: Rule 1: Consider a Dominator node k and the following conditions are true: k is one hop away from sink, k s remaining energy is one-third of its initial energy, and k has n number of neighbor Dominators, j 1... j n, for which it forwards their packets to the sink. Then, k requests j to increase their transmission levels so that they can directly send their packets to the sink.

Rule 2: Consider a Dominator node j i which receives a request from another Dominator k to increase its (j i s) transmission power level. The Dominator j i will act as follows: If j i can directly reach the sink by increasing its current transmission power, j i increases the transmission power level and transmits subsequent packets directly to the sink instead of current next hop k. The sink acknowledges the packet sent because of increasing power level and the sink will add j i in it s neighbor list. Otherwise, if j i cannot directly transmit to the sink even with its maximum transmission power, j i ignores the current request and continue transmitting packets via k. VI. RESULTS AND DISCUSSION We use Java-based custom simulator to evaluate the performance of both r-cds and mr-cds algorithms. The aim of different simulation experiments is to compare mr-cds with r-cds in terms of network lifetime and packet loss. Besides, we analyze energy consumption for both algorithms. We also investigate on how both algorithms perform under varying conditions like- Node Density and Average Node Energy. A. Simulation Terms During the energy cost analysis, we use the following terms: 1) Alive Node: A node is considered alive if it can send out a packet to next hop node towards the sink. In other words, a node is alive as long as its remaining energy is greater than the energy required to transmit a single packet. 2) Data Round: Each data round is defined by all alive nodes sending out a single packet each, to the sink node. 3) Lost packet: A packet is considered lost if it leaves source node but can not reach the sink. 4) Dead Node Count(DNC) at Round i: Global metric to count the number of dead nodes at round i. 5) Packet Loss Count(PLC) at Round i: Global metric to count the number of packets lost till the end of data gathering round i. For example, let us consider only node x dies in data round i(i.e., DNC=1). After x s death, if some other nodes(for which x worked as next hop towards sink) sends Δ packets during round i, all those packets will be lost. Then we can say PLC at round i, P LC i = P LC i 1 + Δ. B. Radio Model In our simulation, we use First Order Radio Model described in [15]. During data reception, a node drains energy for running the radio circuit only. But for data transmission, it also drains energy to amplify the signal. The energy required to run the radio circuit (at transmitter/receiver) is e elec = 50nJ/bit. And energy required to run the amplifier during transmission is e amp = 100 pj/bit/m 2. So if node i tries to send a k-bit packet to node j, which is d ij meters away, energy consumption at node i is: T ij = k.e elec + k.e amp.d ij 2. On the other hand, any node i that receives a k-bit packet drains only R i =k.e elec amount of energy. C. Network Model In our simulation, we consider 100 sensor nodes and a single sink node deployed at random in an area of 50m 50m. Transmission ranges of these nodes vary between 20 to 30 meters. In order to get reliable results, we consider 20 such different networks and take average of them to get all statistics. During each data gathering round, we consider that each alive node sends out a 1000-bit data packet. We consider nodes are stationary, i.e., once deployed, they do not move. Further, similar to the works done in [16] and [17], wireless channel is assumed to be ideal where there is no retransmission of packets due to collision. We consider that constructing a CDS backbone is a one-time operation and hence, we do not add the energy cost to construct CDS backbone in our energy consumption analysis. D. Routing Algorithm After running r-cds or mr-cds algorithm, each node in the network knows about its Dominator neighbor(s). But other than the nodes that have single Dominator in their neighborhood, no node has any idea on what is the next hop Dominator in a least cost path towards the sink. In order to solve this problem, we need a data collection tree after forming a CDS-based backbone. We apply Distance Vector (DV) Routing Algorithm [18] to construct such a tree. The base station acts as the root node and initiates tree formation. Only the Dominator nodes take part into the construction of this least-cost path tree. We can see in Table VI that the number of Dominator nodes is quite low compared to the network size, so running DV algorithm over only Dominators reduces the size of the input space. E. Results We present simulation results in this section. It also contains our analysis on the observed results. 1) Network Lifetime and Packet Loss Count: We evaluate the performance of both implementations (i.e., r-cds and mr- CDS) in terms of Dead Node Count(DNC) and Packet Loss Count(PLC). Nodes were randomly assigned energy of 2 to 3 Jouls. With a total of 100 nodes in our simulation, Table IV presents data for the first 10 node deaths (which is one-tenth of the network) using r-cds algorithm. Here we can see that in average (over 20 simulation networks), first node death occurs in data round 591. Besides, in average, 4 packets are lost by the end of the data round during which the first node death occurred. Similarly, Table V shows node deaths and PLCs for the mr- CDS algorithm. If we compare Table IV with Table V, we can see that our mr-cds algorithm significantly delays the first node death and is far better in terms of PLC. On an average, the first node death occurs in data round 1,189 in the mr-cds, which is more than the double of the original r-cds network lifetime. A comparison of node deaths is portrayed in Figure 2 which also reveals a critical issue: using mr-cds we get a gradual pattern in node deaths.

TABLE IV NETWORK LIFE WITH r-cds FOR 10% NODES Dead Node Count Data Round Packet Loss Count 1 591 4 2 1,036 15,352 3 1,505 35,134 4 2,435 76,877 5 3,314 118,414 6 5,325 215,474 7 7,955 355,587 8 10,676 506,293 9 12,029 593,794 10 14,204 714,384 TABLE V Fig. 3. Comparison on Packet Loss Count NETWORK LIFE WITH mr-cds FOR 10% NODES Dead Node Count Data Round Packet Loss Count 1 1,189 3 2 2,153 9,514 3 3,546 34,138 4 4,612 52,957 5 5,975 83,138 6 8,036 131,293 7 9,165 167,639 8 10,418 205,262 9 12,438 283,964 10 13,283 315,301 After the crossover point between r-cds and mr-cds in Figure 2, the average r-cds line is steep (yet gradual) for a while. Later on, that line is almost constant, which means all nodes start to die at the same time. On the other hand, mr-cds nodes die gradually after the crossover point, and this gradual trend continues for almost more than the double of gradual node deaths in the r-cds. This pattern of node death reflects load balancing of the network in the mr-cds algorithm and is due to the role switching scheme adopted in our design. a) Comparison on Backbone Size: If we compare the size of network backbone, we can see that mr-cds has little edge over r-cds. Table VI shows the total number of Dominator1 and Dominator2 nodes in both r-cds and mr-cds backbones for our 20 input networks. On an average, 22.15 nodes constitute the r-cds backbone, whereas in case of mr- CDS, we have 20.85 nodes in the backbone. As backbone nodes must remain active throughout network operation, with fewer nodes in the backbone, the mr-cds algorithm consumes less overall energy to keep the network operational. Further, a smaller backbone in the mr-cds can allow more nodes(non- Dominators) to be put in a periodic sleep mode and save network energy. b) Comparison on Remaining Energy of the Network after First Node Death: For many data-critical applications, a sensor network is of no use once we stop receiving quality information out of it. So if the network lifetime (FND) expires, remaining energy of other alive nodes does not come to any use. An energy efficient design should try to maximize the use of overall network energy before a network expires. In this context, we examine the average amount of remaining energy on each node after FND. Table VII presents data for both r-cds and mr-cds. As stated in Section VI-E, nodes in our 20 input networks have energy between 2 to 3 Jouls, which averages to 2.136 Joul in our simulation. As we can see in Table VII, we have less energy waste in the mr-cds algorithm compared to the r-cds. TABLE VII AVERAGE REMAINING ENERGY ON EACH NODE AFTER FND Technique Remaining Energy(J) Energy Waste(%) r-cds 2.065 96.71 mr-cds 1.989 93.16 Fig. 2. Comparison on Node Deaths In terms of packet loss, mr-cds works far better than original r-cds. This is due to the fact that some nodes in the r-cds die quite early, causing a whole lot of packet loss early in the network operation, as shown in Table IV, Table V and Figure 3. 2) Energy Efficiency in the mr-cds Algorithm: Less energy waste in the mr-cds algorithm is due to the fact that using this approach, FND occurs later than r-cds. The role switching property of mr-cds does load balancing and as a result, we get less energy waste. VII. CONCLUSION In this work we extended an existing CDS algorithm (r- CDS) to meet real life sensor network requirements. We tried to extend network lifetime by delaying First Node Death. This

TABLE VI NETWORK BACKBONE SIZE FOR 101 NODE NETWORK (r-cds VS. mr-cds) Experiment r-cds Backbone Node Count mr-cds Backbone Node Count No. Dominator 1 Dominator 2 Total Dominator 1 Dominator 2 Total 1 8 8 16 7 13 20 2 10 17 27 7 13 20 3 9 11 20 7 15 22 4 7 19 26 7 12 19 5 8 21 29 7 12 19 6 7 13 20 6 15 21 7 7 13 20 8 17 25 8 5 10 15 5 13 18 9 7 13 20 7 12 19 10 8 21 29 6 15 21 11 11 16 27 7 10 17 12 7 13 20 6 15 21 13 14 13 27 11 10 21 14 7 20 27 8 12 20 15 12 7 19 7 16 23 16 8 6 14 7 13 20 17 8 20 28 7 15 22 18 9 12 21 8 12 20 19 6 13 19 7 18 25 20 7 12 19 8 16 24 Average 8.25 13.9 22.15 7.15 13.7 20.85 delay can help data-critical WSNs like an industrial WSN to continue network traffic for longer period of time. Simulation results proved that mr-cds algorithm outperforms original r-cds algorithm and significantly prolongs network lifetime. Our future focus is on implementing mr-cds algorithm in real sensor hardware by using TinyOS/NesC programming. VIII. ACKNOWLEDGEMENT This work is partially supported by Dr. Sajid Hussain s collaborative research contract with PAWS/CBU project funded by ACOA/AIF, Sydney, Canada and NSERC s Discovery grant. Further, the work is partially supported by Dr. Lei Qian s research funding with NOAA, USA. REFERENCES [1] S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu, The broadcast storm problem in a mobile ad hoc network, in MobiCom 99: Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking. New York, NY, USA: ACM, 1999, pp. 151 162. [2] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, SPAN: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks, Wireless Networks, ACM, vol. 8, no. 5, pp. 481 494, 2002. [3] Y. Li, S. Zhu, M. Thai, and D.-Z. Du, Localized construction of connected dominating set in wireless networks, in Proceedings of NSF International Workshop on Theoretical Aspects of Wireless Ad Hoc, Sensor and Peer-to-Peer Networks (TAWN04), June 2004. [4] Z. Haas, J. Halpern, and L. Li, Gossip-based ad hoc routing, in Proceedings of the IEEE International Conference on Computer Communications(InfoCom), 2002, p. 17071716. [5] F. Dai and J. Wu, On constructing k-connected k-dominating set in wireless ad hoc and sensor networks, Journal of Parallel Distributed Computing (JPDC), Elsevier, vol. 66, no. 7, pp. 947 958, 2006. [6], An extended localized algorithm for connected dominating set formation in ad hoc wireless networks, IEEE Transactions on Parallel Distributed Systems, vol. 15, no. 10, pp. 908 920, 2004. [7] S. Guha and S. Khuller, Approximation algorithms for connected dominating sets, Algorithmica, vol. 20, no. 4, pp. 374 387, 1998. [8] B. Das and V. Bharghavan, Routing in ad-hoc networks using minimum connected dominating sets, in Proceedings of the 1st IEEE International Conference on Communications (ICC), June 1997, pp. 376 380. [9] Y. Wu, F. Wang, M. Thai, and Y. Li, Constructing k-connected m- dominating sets in wireless sensor networks, in Proceedings of the IEEE Military Communications Conference (MILCOM), October 2007, pp. 1 7. [10] Y. Wu and Y. Li, Construction algorithms for k-connected m- dominating sets in wireless sensor networks, in Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, (MobiHoc), May 2008, pp. 83 90. [11] M. Couture, M. Barbeau, P. Bose, and E. Kranakis, Incremental construction of k-dominating sets in wireless sensor networks, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, vol. 6, no. 3, pp. 202 214, November 2006. [12] D. Kim, Y. Wu, Y. Li, F. Zou, and D. Du, Constructing minimum connected dominating sets with bounded diameters in wireless networks, IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 2, pp. 147 157, 2009. [13] W. El-Hajj, Z. Trabelsi, and D. Kountanis, Fast distributed dominating set based routing in large scale manets, Computer Communications, vol. 30, no. 14-15, pp. 2880 2891, 2007. [14] M. Rai, S. Verma, and S. Tapaswi, A power aware minimum connected dominating set for wireless sensor networks, Journal of Networks, Academy Publishers, vol. 4, no. 6, pp. 511 519, 2009. [15] K. Kalpakis, K. Dasgupta, and P. Namjoshi, An energy efficient hierarchical clustering algorithm for wireless sensor networks, in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), 2003. [16] J. Wu and H. Li, On calculating connected dominating set for efficient routing in ad hoc wireless networks, in Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, June 1999, pp. 7 14. [17] I. Stojmenovic, M. Seddigh, and J. Zunic, Dominating sets and neighbor elimination based broadcasting algorithms in wireless networks, in Proceedings of the IEEE Hawaii International Conference on System Sciences, 2001. [18] R. Malhotra, IP Routing, First Edition. O REILLY, January 2002.