- Research
- Open Access
Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks
- Davut Incebacak^{1}Email author,
- Bulent Tavli^{2},
- Kemal Bicakci^{2} and
- Ayşegül Altın-Kayhan^{2}
https://doi.org/10.1186/1687-1499-2013-252
© Incebacak et al.; licensee Springer. 2013
- Received: 7 March 2013
- Accepted: 11 October 2013
- Published: 30 October 2013
Abstract
In wireless sensor networks, multi-path routing is proposed for energy balancing which prolongs the network lifetime as compared to single-path routing where utilization of a single route between a source node and the base station results in imbalanced energy dissipation. While it is evident that increasing the number of routing paths mitigates the problem of energy over-utilization in a subset of nodes acting as relays, the net effect of the proliferation of multiple routing paths on energy balancing remains unclear. It is imperative to keep the number of routing paths as low as possible without significantly deteriorating the network lifetime; therefore, determination of the optimal number of routing paths in multi-path routing by considering the tradeoff in routing complexity and network lifetime extension is an interesting research problem. In this study, to investigate the impact of the number of routing paths in multi-path routing on network-wide energy balancing under optimal operating conditions, we build a novel mixed integer programming framework. We explore the parameter space consisting of a number of paths, number of nodes, maximum transmission range, network area, and network topology. The results of the analysis show that by utilizing the optimization scheme proposed, it is possible to achieve near-optimal energy consumption (within 1.0% neighborhood of the case where no restrictions are imposed on the number of routing paths in multi-path routing) using at most two paths for each node.
Keywords
- Sensor Node
- Wireless Sensor Network
- Medium Access Control
- Data Packet
- Network Lifetime
1 Introduction
Optimization of energy expenditure (e.g., energy-efficient routing) is one of the most important design goals in the wireless sensor network (WSN) system design [1]. In WSNs, routing protocols discover and maintain paths between sensor nodes and the base station. The data of a sensor node is conveyed towards the base station on a single path or on multiple paths. By distributing the routing burden on multiple paths as opposed to transmitting on only a single path, multi-path routing leads to a more balanced energy dissipation in the network. There are several protocols designed for multi-path routing in WSNs [2–7]. The common goal of these protocols is to improve the energy efficiency of the network through multi-path routing. Additionally, they provide other capabilities (e.g., intrusion detection [2], renewable energy [3], mobile sensors [4], fault tolerance [5], quality-of-service [6], and security [7]).
Earlier studies revealed that multi-path routing improves the energy efficiency of WSNs; however, the impact of the number of paths on the level of energy efficiency is not well understood (i.e., what amount of energy efficiency improvement should be expected with each additional path?). As the number of paths increases, so does the complexity of the routing protocol. Hence, it is desirable to limit the number of paths at some point if a further increase does not improve energy efficiency significantly, yet an analysis of the impact of limiting the number of paths on energy efficiency has not been performed in the literature.
In this study, an optimization scheme to minimize the energy consumption of sensor nodes under multi-path routing is proposed. In fact, our main goal is to investigate the impact of multi-path routing on energy consumption characteristics of sensor nodes in WSNs. By developing a novel problem formulation using mathematical programming, we capture the essence of both routing and energy dissipation characteristics of multi-path routing. We analyze the impact of limiting the number of routes from the energy efficiency perspective within a general framework and without considering any specific protocol or algorithm. This approach abstracts us away from the protocol-specific overhead or implementation details. Characterization of the impact of limiting the number of routes on energy balancing in WSNs is a novel research contribution and may provide valuable insights for the design of future protocols.
There are several related concepts in this area which can also be referred as multi-path routing and may be confused with the meaning of multi-path routing as it is used in this paper. In this paper, we use the term multi-path routing for partitioning the data into groups of data packets without employing data redundancy and sending each group of packets via a different path towards the base station. Alternate path routing is different from multi-path routing in the sense that a single path is used in normal operation, but alternative paths are kept ready to be used in case the primary path becomes unavailable. Redundant multi-path routing is another related term that means the data to be conveyed to the base station is transported via multiple paths with added redundancy (e.g., multiple replicas of the data are sent on different paths) [8].
Mathematical programming is a powerful tool utilized in many studies to analyze different aspects of WSNs [9]. Here, we briefly overview the previous work most relevant to our work. In [10], a mixed integer programming (MIP) framework is proposed to analyze capacity and energy consumption of IEEE 802.15.4 cluster-tree hierarchy for organizing transmissions to provide the optimal solution for the network capacity. In [11], the problem of minimizing the network cost through the minimum number of relay-station installation in continuous data-gathering WSNs is investigated by using an MIP model. In [12], an MIP-based framework for optimizing the placement of RF chargers used for energy harvesting in WSNs is proposed. In [13], two joint routing and scheduling algorithms which minimize the data delivery latency while enhancing the energy efficiency in WSNs are proposed and investigated through an MIP framework. In [14], the impact of limiting the number of incoming and outgoing links of nodes on the network lifetime is formulated as an MIP problem.
We introduce the MIP model for multi-path routing in Section 2. Section 3 presents the results of numerical analysis. Conclusions are drawn in Section 4.
2 Model
- 1.
The network consists of stationary nodes (both sensor nodes and the base station).
- 2.
For a substantial amount of time (epochs), topology discovery and route creation operations are not repeated [1].
- 3.
Network reorganization period is long enough; therefore, the energy costs of topology discovery and route creation operations constitute a small fraction (e.g., less than 1.0% [15]) of the total network energy dissipation. Hence, routing overhead can be neglected in stationary WSNs without leading to significant underestimation of total energy dissipation.
- 4.
A time division multiple access (TDMA)-based media access control (MAC) layer is in operation which mitigates interference between active links through a time slot assignment algorithm which outputs a conflict-free transmission schedule. A combinatorial interference model can be used to model interference, and scheduling constraints can then be modeled by a conflict graph [16, 17]. In [18], it is shown that such an algorithm is possible; hence, collision-free communication is achieved if sufficient bandwidth requirements are satisfied. In fact, in our model, we use a modified version of the sufficient condition presented in [18]. Furthermore, it is also possible to reduce data packet collisions to negligible levels in practical MAC protocols designed with a dynamic TDMA approach [19, 20].
- 5.
Energy dissipation for idle listening or overhearing in promiscuous mode is negligible. There are many intelligently designed MAC protocols for wireless networks that avoid energy waste in these modes [19, 21]. We assume such a MAC layer is used in our framework.
- 6.
The transmission energy model is such that the bit error rate (BER) is constant and the same for all links [22–24].
- 7.
Energy dissipation for transmission and reception is only for data packets. The framework described in this paper can be easily extended to model the energy consumption for acknowledgement (ACK) packets as well; however, in general, the size of a typical ACK packet is much smaller than the size of data packets. Therefore, we assume that the receiver is informed of correct or incorrect reception of a data packet through an ideal feedback channel [22, 25, 26]. Furthermore, data packets are treated as indivisible data units (i.e., data packets are neither fragmented nor combined with other data packets until they reach the base station).
In our network model, there is a single base station and there are N sensor nodes in the network. Time is organized into rounds with duration T_{ rnd }, and the total number of rounds is M_{ rnd }. Each sensor node-i creates the same number of data packets (s_{ i }) with packet length L_{ P } bits at each round to be conveyed to the base station (i.e., sensor nodes create CBR flows). The network topology is represented by a directed graph, G=(V,A), where V is the set of all nodes including the base station as node-0 and A={(i,j):i∈W,j∈V−i, d_{ ij }≤R_{max}} is the ordered set of arcs. We also define set W which includes all nodes except node-0 (i.e., W=V∖{0}). Note that we use the expression ‘node-i’ when it is used in a sentence; however, we use only ‘i’ when it is used within a mathematical expression or when we need to refer to the indices of mathematical expressions in the narrative. The definition of A implies that no node sends data to itself or to a node that is separated from it beyond the maximum transmission range R_{max}. The distance between node-i and node-j is denoted by d_{ ij }. Each node can forward its generated data towards the base station using at most N_{ P } paths. Different paths can be either disjoint or braided (i.e., two paths can share common links in their chains of links forming paths). Data generated at node-k forwarded on the l th path flowing from node-i to node-j is represented as f ij kl. Moreover, ${b}_{k}^{l}$ is the total amount of data packets generated by node-k (k∈W) and transmitted on the l th configuration to the base station, and a ij k l indicates if arc (i,j)∈A is used in the l th routing configuration originated at node-k (k∈W).
Terminology for MIP formulation
Variable | Description |
---|---|
N | Number of nodes |
f ij kl | Number of data packets generated at node-k forwarded on |
the l^{ t h } path flowing from node-i to node-j | |
s _{ i } | Number of data packets generated at node-i |
E_{ rx }(L_{ P }) | Energy consumption for receiving L_{ P } bits of data |
E_{t x,i j}(L_{ P }) | Energy consumption for transmitting L_{ P } bits of data from |
node-i to node-j | |
d _{ ij } | Distance between node-i and node-j |
ρ | Energy dissipated in the electronic circuitry |
ε | Transmitter efficiency |
α | Path loss exponent |
E | Battery energy of each sensor node |
G= (V,A) | Directed graph that represents network topology |
V | Set of nodes, including the base station as node-0 |
W | Set of nodes, except the base station (node-0) |
A | Set of edges (links) |
l | Set of paths |
a ij kl | Binary variable to determine if arc (i,j) ∈A is used in the |
l th routing configuration originated at sensor k∈W. | |
${b}_{k}^{l}$ | Total amount of data sensed by sensor k∈W and |
transmitted on the l th configuration to the base station | |
R | Radius of deployment area |
R _{max} | Maximum transmission range |
N _{ p } | Number of paths |
L _{ P } | Packet length in bits |
M _{ rnd } | Number of rounds |
T _{ rnd } | Round duration |
ξ | Channel data rate (bits/s) |
γ | Interference range multiplier |
φ | BER (bit error rate) |
χ | Packet error rate |
λ | Average packet retransmission rate |
Constraint (2) limits the energy used by each sensor node for data transmission and reception by the total battery energy allocated to it. In fact, the objective is to minimize the energy dissipation of the maximum energy dissipating sensor node. The expression in the parenthesis gives the energy dissipation of node-i on packet transmission and reception for conveying source node-k’s data on its l th routing path. Summation over k and l gives the total energy dissipation of node-i. Energy dissipation for retransmissions are incorporated into the model through the multiplication of the whole expression by λ. If there is no retransmission, then λ=1. The energy model we used [27] enables the adjustment of transmission energy for each node pair to enable a uniform signal-to-noise ratio (SNR) at each receiver.
Constraint (3) is known as the flow conservation constraint, which is satisfied for all i (all nodes including the base station), k (sensor nodes), and l (routing paths). If node-i is the source node (i=k), then the difference between the sum of outgoing flows and the sum of incoming flows is the total amount of packets injected into the network by source node-k on its l th routing path (${b}_{k}^{l}$). If i=0 (the base station), then the all packets generated at each node-k and transmitted on path-l (${b}_{k}^{l}$) reach the base station. If i≠k and i≠0, then the sum of incoming flows is equal to the sum of outgoing flows (node-i is a relay node for source node-k’s flow on its l th path). In summary, constraint (3) ensures that all flow generated at each node-k and transmitted on path-l reach the base station.
Constraint (4) ensures that data generated at sensor node-k and routed out to the rest of the network does not loop back to node-k. In other words, the sum of flows generated at node-k and received by node-k itself is 0. Note that constraint (10) ensures that all flows are non-negative; hence, constraint (4) together with constraint (10) dictates that the value of any flow creating any possible loop is exactly 0.
Constraint (5) guarantees that each node-k (k∈W) generates and sends exactly a total of s_{ k }M_{ rnd } packets to the base station. The total amount of data packets generated at node-k is routed to the base station by using at most N_{ P } paths, and the amount of data injected by node-k into each one of the paths is denoted as ${b}_{k}^{l}$; hence, the summation over l for each k gives the total amount of data generated at node-k. Since both the flows and the amount of data injected on each path are integer variables, the packets cannot be split (all packets are created as L_{ P } bits long and reach the base station with the same length as they are formed). However, different paths can be used in a periodic time interleaved fashion. It is also possible that different paths are used to convey data in an aperiodic sequential arrangement. For example, if s_{ k }=1 packet, M_{ rnd }=3,600 rounds, N_{ P }=3 paths, ${b}_{5}^{1}=1,800$ packets, ${b}_{5}^{2}=1,200$ packets, and ${b}_{5}^{3}=600$ packets, then node-5 can create a cyclic structure with a length of six rounds. At each cycle of six rounds, three data packets, two data packets, and one data packet are conveyed to the base station using the first path, the second path, and the third path, respectively. Alternatively, node-5 can convey all its data from round 1 to round 1,800 on its first path, from round 1,801 to round 3,000 on its second path, and from round 3,001 to round 3,600 on its third path. In our model, we do not impose any timing restriction on scheduling. We determine the optimal paths and the amount of data transported on each path throughout the entire network operation as specified by N_{ P }, s_{ k }, M_{ rnd }, and other parameters. In fact, all feasible schedules that do not violate flow constraints in our model are equivalent.
Constraint (6) ensures that an arc (i,j)∈A is marked as used for conveying data generated at node-k on its l th path only if there is positive flow on (i,j)∈A (a ij kl=1 if f ij kl > 0). Note that the value of f ij kl can at most be s_{ k }M_{ rnd }. Such a case happens if node-k uses only one routing path (i.e., ${b}_{k}^{1}={f}_{\mathit{\text{ij}}}^{k1}$ and ${b}_{k}^{m}=0$ for m>1). If f ij kl=0, then binary variable a ij kl can be either 1 or 0 (i.e., by itself constraint (6) does not force a ij kl to neither 1 nor 0 for f ij kl=0). However, constraint (7) as described below forces a ij kl to be 0 if both options are feasible. Hence, constraint (6) in conjunction with constraint (7)results in a ij kl=0 if f ij kl=0.
The flow on each configuration is guaranteed to be non-bifurcated by constraint (7). Note that constraint (7) must be satisfied for all values of i, k, and l. Consider one of the possible combinations: (i,k,l)=(3,3,1). For this example, constraint (7) states that data generated at node-3 which is designated to flow on its first routing path transmitted by node-3 (the first hop of the path) can have only one receiver (i.e., there should be only one second hop node, which can be the base station or another node acting as a relay). The summation over arc set (3,j) guarantees that only one of the arcs (3,j) have non-zero flow because the sum is equal to or less than 1. In the same example, assume that j=7 (i.e., ${f}_{37}^{31}={b}_{3}^{1}$ and ${f}_{3m}^{31}=0$ for all m≠7). As the second hop relay, node-7 can transmit the data it received from node-3 (${f}_{37}^{31}$) to only one of its neighbors (dictated again by constraint (7)). If the third hop relay is node-8, then ${f}_{78}^{31}={f}_{37}^{31}={b}_{3}^{1}$ and ${f}_{7m}^{31}=0$ for all m≠8. Continuing in this manner, data injected by source node-3 to its first path reaches the base station without being split into multiple branches. In other words, constraint (7) enables the construction of an unbroken and non-branching logical pipe (path) from the source to the base station for transportation of data. Indeed, N_{ P } is the upper limit on the number of such pipes for each source node. The maximum number of such pipes in a network of M sensor nodes can be M N_{ P }.
Constraint (8) is used to have a logical ordering of the configurations for originator nodes. Constraint (8) implies that ${b}_{k}^{1}\ge {b}_{k}^{2}\ge {b}_{k}^{3}\ge \dots \ge {b}_{k}^{{N}_{P}}$ (i.e., the number of packets conveyed on the l th path of source node-k is greater than or equal to the number of packets conveyed on its (l+1)th path).
To address bandwidth limitations in a broadcast medium, we need to make sure that the bandwidth used to transmit and receive at each node is limited by the available channel bandwidth. Such a constraint should take the shared capacity into consideration. For node-i, we refer to the flows around node-i which are not flowing into or flowing out of node-i but affecting the available bandwidth available to node-i as interfering flows. Constraint (9) guarantees that for each node (including the base station), the aggregate amount of incoming flows, outgoing flows, and interfering flows can be scheduled within the given time frame (T_{ rnd } seconds/round × M_{ rnd } rounds = T_{ rnd }M_{ rnd } seconds). The summation over l, k, (i,j), and (j,m) gives the total number of packets sharing the capacity of node-i. Multiplication by L_{ P } (bits/packet) converts the number of packets to number of bits. Division by ξ (channel data rate – bits/second) transforms number of bits to seconds. Scaling with λ is for the extra time needed due to retransmissions. This constraint is a modified version of the sufficient condition given in [18]. We note that in the numerical analysis, we choose the parameters affecting constraint (9) in such a way that the maximum value of the left-hand side of the inequality is more than an order of magnitude lower than the right-hand side value; therefore, construction of a conflict-free transmission schedule through a non-complicated time-slot assignment algorithm is possible. It is also shown that well-designed carrier sense multiple access (CSMA)-based MAC protocols are highly successful in reducing the collision rate to negligible levels provided that the network traffic is much lower (e.g., an order of magnitude) than the available capacity [29, 30].
Finally, constraint (10), constraint (11), and constraint (12) are nonnegativity constraints for the variables of the model.
The objective is to minimize E, which is the energy of the battery in each node. Once the parameter N_{ P } is set, the solution of the model gives the set of paths each node uses to forward its data and the amount of data transported on each of these paths in a way that the energy required by the most energy consuming node is minimized. As a result, all nodes transmit their data in order to keep the required battery energy per sensor node as low as possible. In other words, all nodes dissipate their energies in the most balanced fashion. Sensor nodes are not required to use exactly N_{ P } paths (e.g., it is possible for a node to use only two paths for transporting all its generated data even if N_{ P }>2). Furthermore, the amount of data flow on each path (${b}_{k}^{l}$) is also determined by the MIP framework to optimize energy dissipation.
3 Analysis
We use the General Algebraic Modeling System (GAMS) [31] for the numerical analysis of the MIP model. GAMS consists of high-performance solvers for solving MIP models efficiently, each of which improves upon the basic approach in different ways to attain an increased solution performance. Hence, when we solve our MIP model using GAMS, one of these solvers is used to obtain the best solution. Specific implementation details are beyond the scope of this study. We should mention that we could still use GAMS if we were to solve linear programming (LP) models rather than MIP models.
As we have mentioned, general MIP models are computationally difficult problems. They are in NP-hard class according to their computational complexity [32]. Although there are some MIP problems with efficient optimization property (i.e., they can be solved relatively easier due to their special structures), we are not aware of any previous result on the applicability of such a property in our problem. Our preliminary tests show that the LP relaxation of the problem obtained by relaxing the integrality constraints on binary variables does not provide the same optimal solution with the original MIP model and the gap is actually significant in many cases. Moreover, the solution times increase significantly as the instance sizes get larger. Hence, even for medium-sized instances, the solution times can be quite high, which can be mitigated using several implementation heuristics. Since our motivation in this paper is to explore the impact of multi-path routing rather than developing specialized efficient solution algorithms for the problem, we accept solutions with a relative gap of no more than 1.0%.
Suppose that we have a solution satisfying all integer requirements and have the best objective function value (z^{ B }) found so far. Then, the relative gap for this solution measures the distance between z^{ B } and the available best bound for the optimal objective function value (z^{ L }) using the ratio $\frac{|{z}^{B}-{z}^{L}|}{{z}^{L}}$. LP-based branch-and-bound algorithms are used for solving MIPs in GAMS [31]; thus, z^{ L } is the LP relaxation solution of the MIP problem under consideration. Note that, in general, z^{ L } is not a feasible solution because integer variables are treated as continuous variables (i.e., the occurrence of non-integer values for binary variables is allowed in z^{ L }). The acceptable relative gap can be controlled via the parameter optcr in GAMS, and when it is set to 0.0, the solution algorithm stops with the exact optimal solution. In this study, we let optcr=1.0%, which provides significant time savings in exchange for an immaterial sacrifice for optimality.
Parameters used in analysis
Parameter | Values |
---|---|
ρ | 50 nJ/bit |
ε | 100 pJ/bit/ m^{2} |
α | 2 |
N | 5–50 |
Deployment scenarios | Linear (1-D) equidistant, disc (2-D) random |
Inter-node distance (1-D) | 30 m, 10 m |
Network radius R (2-D) | 100 m − 1,600 m |
s _{ i } | 1 packet |
N _{ p } | 1 - ∞ |
R _{max} | R−R/2 |
L _{ P } | 2048 bits (256 Bytes) |
M _{ rnd } | 3600 rounds |
T _{ rnd } | 60 s |
ξ | 256 Kbps |
γ | 1.7 |
φ | 10^{−4} |
χ | 0.18 |
λ | 1.22 |
For the case of N_{ P } = 1 (i.e., single-path routing), energy overhead becomes 21.30% when compared to the N_{ P }→∞ case - the energy requirement for the maximum energy dissipating node (node-2) is 7.11 J. Unlike N_{ P }→∞ and N_{ P } = 2 cases, in the N_{ P } = 1 case, sensor nodes do not spend an equal amount of energy (e.g., 6.39 J for node-1 and 7.11 J for node-2). Hence, we observe that single-path routing cannot lead to a balanced energy dissipation regime in the network, which leads to over-utilization of some nodes’ batteries. We investigate line topologies by varying the number of sensor nodes and inter-node distance to confirm the effects of limiting the number of routing paths observed in the small scale line topology in Figure 1 which also holds for larger line topologies with different inter-node separation values.
In all topologies explored in this study, our experiments revealed that energy overhead values for N_{ P } > 2 (not presented in the figures) are always less than 1.00%.
4 Conclusion
In this paper, we presented an MIP framework to investigate the energy dissipation of WSNs as a function of the number of routing paths. We explored various WSN scenarios in both one-dimensional and two-dimensional network topologies by sampling the parameter space through the developed model.
Our analysis revealed that single-path routing may lead to more than 30.00% energy overhead due to the lack of sufficient number of energy balancing routes. On the other hand, multi-path routing with only two paths results in near-optimal values with at most 1.00% energy overhead. Thus, our main conclusion is that use of more than two paths for energy balancing in multi-path routing for WSNs does not bring any significant benefit from an energy efficiency perspective. The MIP framework we presented in our study can easily be tailored to accommodate other aspects of multi-path routing in WSNs. Nevertheless, the concept of an end-to-end path should exist for our results to be relevant.
Declarations
Authors’ Affiliations
References
- Akkaya K, Younis M: A survey on routing protocols for wireless sensor networks. Ad Hoc Netw 2005, 3: 325-349. 10.1016/j.adhoc.2003.09.010View ArticleGoogle Scholar
- Ouadjaout A, Challal Y, Lasla N, Bagaa M: SEIF: secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks. In Proc. International Conference on Availability, Reliability and Security (ARES). Barcelona;4–7March 2008:503-508.Google Scholar
- Kandasamy T, Krishnan J: Multipath routing scheme in solar powered wireless sensor networks. Proc. IFIP International Conference on New Technologies, Mobility and Security (NTMS) Tangier,5–7Nov 2008, 1-5.Google Scholar
- Aronsky A, Segall A: A multipath routing algorithm for mobile Wireless Sensor Networks. In Proc. IFIP Wireless and Mobile Networking Conference (WMNC). Budapest; 13-15 Oct 2010:1-6.Google Scholar
- Hadjidj A, Bouabdallah A, Challal Y: HDMRP An efficient fault-tolerant multipath routing protocol for heterogeneous wireless sensor networks. In Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), Volume 74. New York: Springer; 2011:469-482.Google Scholar
- Heikalabad H, Rasouli SR, Nematy F, Rahmani N: QEMPAR: QoS and energy aware multi-path routing algorithm for real-time applications in wireless sensor networks. Int. J. Comput. Sci. Issues 2011, 8: 466-471.Google Scholar
- Gupta R, Dhadhal H: Secure multipath routing in wireless sensor networks. Int. J. Electron. Comput. Sci. Eng 2012, 1: 585-589.Google Scholar
- Bicakci K, Tavli B: Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comput. Stand. Interfaces 2009, 31: 931-941. 10.1016/j.csi.2008.09.038View ArticleGoogle Scholar
- Ishmanov F, Malik AS, Kim SM: Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs), a comprehensive overview. Eur. Trans. Telecommunications 2011, 22: 151-167. 10.1002/ett.1466View ArticleGoogle Scholar
- Theoleyre F, Darties B: Capacity and energy-consumption optimization for the cluster-tree topology in IEEE 802.15.4. IEEE Commun. Lett 2011, 15: 816-818.View ArticleGoogle Scholar
- Prommak C, Modhirun S: Optimal wireless sensor network design for efficient energy utilization. In Proc. IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA). Singapore; 22-25 March 2011:814-819.View ArticleGoogle Scholar
- Erol-Kantarci M, Mouftah HT: Mission-aware placement of RF-based power transmitters in wireless sensor networks. In Proc. IEEE Symposium on Computers and Communications (ISCC). Cappadocia;1–4July 2012:12-17.Google Scholar
- Tran DH, Kim DS: Minimum latency and energy efficiency routing with lossy link awareness in wireless sensor networks. In Proc. IEEE International Workshop on Factory Communication Systems (WFCS). Lemgo; 21-24 May 2012:75-78.Google Scholar
- Tavli B, Akgun MB, Bicakci K: Impact of limiting number of links on the lifetime of wireless sensor networks. IEEE Communications Letters 2011, 15: 43-45.View ArticleGoogle Scholar
- Bicakci K, Gultekin H, Tavli B: The impact of one-time energy costs on network lifetime in wireless sensor networks. IEEE Commun. Lett 2009, 13: 905-907.View ArticleGoogle Scholar
- Jain K, Padhye J, Padmanabhan VN, Qiu L: Impact of interference on multi-hop wireless network performance. In Proc. ACM Annual International Conference on Mobile Computing and Networking (MOBICOM). New York: ACM; 2003:66-80.Google Scholar
- Gupta P, Kumar PR: The capacity of wireless networks. IEEE Trans. Inf. Theory 2000, 46: 388-404. 10.1109/18.825799MathSciNetView ArticleMATHGoogle Scholar
- Cheng M, Gong X, Cai L: Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks. IEEE Trans. Wireless Commun 2009, 8: 3770-3779.View ArticleGoogle Scholar
- Demirkol I, Ersoy C, Alagoz F: MAC protocols for wireless sensor networks: a survey. IEEE Commun. Mag 2006, 44: 115-121.View ArticleGoogle Scholar
- Tavli B, Heinzelman W: Energy and spatial reuse efficient network-wide real-time data broadcasting in mobile ad hoc networks. IEEE Trans. Mobile Comput 2006, 5: 1297-1312.View ArticleGoogle Scholar
- Tavli B, Heinzelman W: Energy-efficient real-time multicast routing in mobile ad hoc networks. IEEE Trans. Comput 2011, 60: 707-722.MathSciNetView ArticleGoogle Scholar
- Madan R, Cui S, Lall S, Goldsmith AJ: Modeling and optimization of transmission schemes in energy-constrained wireless sensor networks. IEEE/ACM Trans. Netw 2007, 15: 1359-1372.View ArticleGoogle Scholar
- Madan R, Cui S, Lal S, Goldsmith A: Cross-layer design for lifetime maximization in interference-limited wireless sensor networks. IEEE Trans. Wireless Commun 2006, 5: 3142-3152.View ArticleGoogle Scholar
- Karnik A, Iyer A, Rosenberg C: Throughput-optimal configuration of fixed wireless networks. IEEE/ACM Trans. Netw 2008, 16: 1161-1174.View ArticleGoogle Scholar
- Sankarasubramaniam Y, Akyildiz IF, McLaughlin SW: Energy efficiency based packet size optimization in wireless sensor networks. In Proc. IEEE International Workshop on Sensor Network Protocols and Applications (SNPA). Anchorage; 11 May 2003:1-8.Google Scholar
- Seada K, Zuniga M, Helmy A, Krishnamachari B: Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks. In Proc. International Conference on Embedded Networked Sensor Systems (SenSys). New York: ACM; 2004:108-121.View ArticleGoogle Scholar
- Heinzelman W, Chandrakasan A, Balakrishnan H: An application specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Commun 2002, 1: 660-670. 10.1109/TWC.2002.804190View ArticleGoogle Scholar
- Rhee I, Warrier A, Aia M, Min J, Sichitiu ML: Z-MAC, a hybrid MAC for wireless sensor networks. IEEE/ACM Trans. Netw 2008, 16: 511-524.View ArticleGoogle Scholar
- Duffy K, Malone D, Leith D: Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Commun. Lett 2005, 9: 715-717. 10.1109/LCOMM.2005.1496592View ArticleGoogle Scholar
- Malone D, Duffy K, Leith D: Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Trans. Netw 2007, 15: 159-172.View ArticleGoogle Scholar
- Brooke A, Kendrick D, Meeraus A, Raman R: GAMS: A User’s Guide. Washington DC: GAMS Development Corporation; 1998.Google Scholar
- Wolsey L: Integer Programming. New York: Wiley-Interscience Series in Discrete Mathematics and Optimization, Wiley; 1998.MATHGoogle Scholar
- Liu X, Mohapatra P: Proc. International Workshop on Measurement, Modelling, and Performance Analysis of Wireless Sensor Networks (SenMetrics). San Diego; 21 July 2005:78-85.Google Scholar
Copyright
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.