Open Access

Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks

  • Davut Incebacak1Email author,
  • Bulent Tavli2,
  • Kemal Bicakci2 and
  • Ayşegül Altın-Kayhan2
EURASIP Journal on Wireless Communications and Networking20132013:252

https://doi.org/10.1186/1687-1499-2013-252

Received: 7 March 2013

Accepted: 11 October 2013

Published: 30 October 2013

Abstract

In wireless sensor networks, multi-path routing is proposed for energy balancing which prolongs the network lifetime as compared to single-path routing where utilization of a single route between a source node and the base station results in imbalanced energy dissipation. While it is evident that increasing the number of routing paths mitigates the problem of energy over-utilization in a subset of nodes acting as relays, the net effect of the proliferation of multiple routing paths on energy balancing remains unclear. It is imperative to keep the number of routing paths as low as possible without significantly deteriorating the network lifetime; therefore, determination of the optimal number of routing paths in multi-path routing by considering the tradeoff in routing complexity and network lifetime extension is an interesting research problem. In this study, to investigate the impact of the number of routing paths in multi-path routing on network-wide energy balancing under optimal operating conditions, we build a novel mixed integer programming framework. We explore the parameter space consisting of a number of paths, number of nodes, maximum transmission range, network area, and network topology. The results of the analysis show that by utilizing the optimization scheme proposed, it is possible to achieve near-optimal energy consumption (within 1.0% neighborhood of the case where no restrictions are imposed on the number of routing paths in multi-path routing) using at most two paths for each node.

1 Introduction

Optimization of energy expenditure (e.g., energy-efficient routing) is one of the most important design goals in the wireless sensor network (WSN) system design [1]. In WSNs, routing protocols discover and maintain paths between sensor nodes and the base station. The data of a sensor node is conveyed towards the base station on a single path or on multiple paths. By distributing the routing burden on multiple paths as opposed to transmitting on only a single path, multi-path routing leads to a more balanced energy dissipation in the network. There are several protocols designed for multi-path routing in WSNs [27]. The common goal of these protocols is to improve the energy efficiency of the network through multi-path routing. Additionally, they provide other capabilities (e.g., intrusion detection [2], renewable energy [3], mobile sensors [4], fault tolerance [5], quality-of-service [6], and security [7]).

Earlier studies revealed that multi-path routing improves the energy efficiency of WSNs; however, the impact of the number of paths on the level of energy efficiency is not well understood (i.e., what amount of energy efficiency improvement should be expected with each additional path?). As the number of paths increases, so does the complexity of the routing protocol. Hence, it is desirable to limit the number of paths at some point if a further increase does not improve energy efficiency significantly, yet an analysis of the impact of limiting the number of paths on energy efficiency has not been performed in the literature.

In this study, an optimization scheme to minimize the energy consumption of sensor nodes under multi-path routing is proposed. In fact, our main goal is to investigate the impact of multi-path routing on energy consumption characteristics of sensor nodes in WSNs. By developing a novel problem formulation using mathematical programming, we capture the essence of both routing and energy dissipation characteristics of multi-path routing. We analyze the impact of limiting the number of routes from the energy efficiency perspective within a general framework and without considering any specific protocol or algorithm. This approach abstracts us away from the protocol-specific overhead or implementation details. Characterization of the impact of limiting the number of routes on energy balancing in WSNs is a novel research contribution and may provide valuable insights for the design of future protocols.

There are several related concepts in this area which can also be referred as multi-path routing and may be confused with the meaning of multi-path routing as it is used in this paper. In this paper, we use the term multi-path routing for partitioning the data into groups of data packets without employing data redundancy and sending each group of packets via a different path towards the base station. Alternate path routing is different from multi-path routing in the sense that a single path is used in normal operation, but alternative paths are kept ready to be used in case the primary path becomes unavailable. Redundant multi-path routing is another related term that means the data to be conveyed to the base station is transported via multiple paths with added redundancy (e.g., multiple replicas of the data are sent on different paths) [8].

Mathematical programming is a powerful tool utilized in many studies to analyze different aspects of WSNs [9]. Here, we briefly overview the previous work most relevant to our work. In [10], a mixed integer programming (MIP) framework is proposed to analyze capacity and energy consumption of IEEE 802.15.4 cluster-tree hierarchy for organizing transmissions to provide the optimal solution for the network capacity. In [11], the problem of minimizing the network cost through the minimum number of relay-station installation in continuous data-gathering WSNs is investigated by using an MIP model. In [12], an MIP-based framework for optimizing the placement of RF chargers used for energy harvesting in WSNs is proposed. In [13], two joint routing and scheduling algorithms which minimize the data delivery latency while enhancing the energy efficiency in WSNs are proposed and investigated through an MIP framework. In [14], the impact of limiting the number of incoming and outgoing links of nodes on the network lifetime is formulated as an MIP problem.

We introduce the MIP model for multi-path routing in Section 2. Section 3 presents the results of numerical analysis. Conclusions are drawn in Section 4.

2 Model

In our framework, we make the following assumptions:
  1. 1.

    The network consists of stationary nodes (both sensor nodes and the base station).

     
  2. 2.

    For a substantial amount of time (epochs), topology discovery and route creation operations are not repeated [1].

     
  3. 3.

    Network reorganization period is long enough; therefore, the energy costs of topology discovery and route creation operations constitute a small fraction (e.g., less than 1.0% [15]) of the total network energy dissipation. Hence, routing overhead can be neglected in stationary WSNs without leading to significant underestimation of total energy dissipation.

     
  4. 4.

    A time division multiple access (TDMA)-based media access control (MAC) layer is in operation which mitigates interference between active links through a time slot assignment algorithm which outputs a conflict-free transmission schedule. A combinatorial interference model can be used to model interference, and scheduling constraints can then be modeled by a conflict graph [16, 17]. In [18], it is shown that such an algorithm is possible; hence, collision-free communication is achieved if sufficient bandwidth requirements are satisfied. In fact, in our model, we use a modified version of the sufficient condition presented in [18]. Furthermore, it is also possible to reduce data packet collisions to negligible levels in practical MAC protocols designed with a dynamic TDMA approach [19, 20].

     
  5. 5.

    Energy dissipation for idle listening or overhearing in promiscuous mode is negligible. There are many intelligently designed MAC protocols for wireless networks that avoid energy waste in these modes [19, 21]. We assume such a MAC layer is used in our framework.

     
  6. 6.

    The transmission energy model is such that the bit error rate (BER) is constant and the same for all links [2224].

     
  7. 7.

    Energy dissipation for transmission and reception is only for data packets. The framework described in this paper can be easily extended to model the energy consumption for acknowledgement (ACK) packets as well; however, in general, the size of a typical ACK packet is much smaller than the size of data packets. Therefore, we assume that the receiver is informed of correct or incorrect reception of a data packet through an ideal feedback channel [22, 25, 26]. Furthermore, data packets are treated as indivisible data units (i.e., data packets are neither fragmented nor combined with other data packets until they reach the base station).

     

In our network model, there is a single base station and there are N sensor nodes in the network. Time is organized into rounds with duration T rnd , and the total number of rounds is M rnd . Each sensor node-i creates the same number of data packets (s i ) with packet length L P bits at each round to be conveyed to the base station (i.e., sensor nodes create CBR flows). The network topology is represented by a directed graph, G=(V,A), where V is the set of all nodes including the base station as node-0 and A={(i,j):iW,jVi, d ij Rmax} is the ordered set of arcs. We also define set W which includes all nodes except node-0 (i.e., W=V{0}). Note that we use the expression ‘node-i’ when it is used in a sentence; however, we use only ‘i’ when it is used within a mathematical expression or when we need to refer to the indices of mathematical expressions in the narrative. The definition of A implies that no node sends data to itself or to a node that is separated from it beyond the maximum transmission range Rmax. The distance between node-i and node-j is denoted by d ij . Each node can forward its generated data towards the base station using at most N P paths. Different paths can be either disjoint or braided (i.e., two paths can share common links in their chains of links forming paths). Data generated at node-k forwarded on the l th path flowing from node-i to node-j is represented as f ij kl. Moreover, b k l is the total amount of data packets generated by node-k (kW) and transmitted on the l th configuration to the base station, and a ij k l indicates if arc (i,j)A is used in the l th routing configuration originated at node-k (kW).

We adopt the energy model used in [27]. In this model, the amount of energy to transmit L P bits of data is Et x,i j(L P )=L P (ρ+ε d ij α) and to receive L P bits of data is E rx (L P )=L P ρ, where ρ represents the energy dissipated in the electronic circuitry, ε denotes the transmitter efficiency, and α represents the path loss exponent. Packet error rate is χ = ( 1 ( 1 φ ) L P ) , where φ is the BER. Each packet has to be transmitted λ=1/(1−χ) times (average packet retransmission rate), on the average, for successful delivery of the packets. The interference range of a transmission from node-i to node-j is γ d ij , where γ is the interference range multiplier [18]. To model interference between links, we define a binary interference matrix, I jm i , presented in Equation 1. If node-i is in the interference region of the transmission from node-j to node-m (i.e., γ d jm d ji ), then node-i is blocked from receiving any data because any such flow to node-i results in a conflict (packet collision). Therefore, if I jm i = 1 , then node-i has a conflict with the flow on arc (j,m) (node-i is sharing the bandwidth with the flow on arc (j,m)). On the other hand, if I jm i = 0 , then flow on arc (j,m) is not conflicting with node-i. Generally speaking, the interference range is equal to or greater than the transmission range (i.e., γ≥1) [18, 28]. This means that depending on the value of γ, node-j’s transmission to node-m can interfere with node-i even if the distance between node-j and node-m is less than the distance between node-j and node-i.
I jm i = 1 if γ d jm d ji j W , m V { j } 0 otherwise
(1)
The objective of the optimization problem is to minimize the the maximum energy requirement (E) of sensor nodes. The network flow is modeled in the form of a series of constraints presented in the MIP model for multi-path routing (below). All system variables with their acronyms and descriptions are presented in Table 1.
Table 1

Terminology for MIP formulation

Variable

Description

N

Number of nodes

f ij kl

Number of data packets generated at node-k forwarded on

 

the l t h path flowing from node-i to node-j

s i

Number of data packets generated at node-i

E rx (L P )

Energy consumption for receiving L P bits of data

Et x,i j(L P )

Energy consumption for transmitting L P bits of data from

 

node-i to node-j

d ij

Distance between node-i and node-j

ρ

Energy dissipated in the electronic circuitry

ε

Transmitter efficiency

α

Path loss exponent

E

Battery energy of each sensor node

G= (V,A)

Directed graph that represents network topology

V

Set of nodes, including the base station as node-0

W

Set of nodes, except the base station (node-0)

A

Set of edges (links)

l

Set of paths

a ij kl

Binary variable to determine if arc (i,j) A is used in the

 

l th routing configuration originated at sensor kW.

b k l

Total amount of data sensed by sensor kW and

 

transmitted on the l th configuration to the base station

R

Radius of deployment area

R max

Maximum transmission range

N p

Number of paths

L P

Packet length in bits

M rnd

Number of rounds

T rnd

Round duration

ξ

Channel data rate (bits/s)

γ

Interference range multiplier

φ

BER (bit error rate)

χ

Packet error rate

λ

Average packet retransmission rate

Minimize E Subject to:
λ l = 1 N P k W ( i , j ) A E tx , ij ( L P ) f ij kl + ( j , i ) A E rx ( L P ) f ji kl E i W
(2)
( i , j ) A f ij kl ( j , i ) A f ji kl = b k l i = k b k l i = 0 0 otherwise i V , k W , l = 1 , .. , N P
(3)
( j , k ) A f jk kl = 0 k W , l = 1 , , N P
(4)
l = 1 N P b k l = s k M rnd k W
(5)
f ij kl s k M rnd a ij kl ( i , j ) A , k W , l = 1 , .. , N P
(6)
( i , j ) A a ij kl 1 i , k W , l = 1 , .. , N P
(7)
( j , 0 ) A f j 0 kl + 1 ( j , 0 ) A f j 0 kl k W , l = 1 , .. , N P 1
(8)
λ L P ξ l = 1 N P k W ( i , j ) A f ij kl + ( j , i ) A f ij kl + ( j , m ) A { i } f jm kl I jm i M rnd T rnd i V
(9)
f ij kl 0 ( i , j ) A , k W , l = 1 , .. , N P
(10)
a ij kl { 0 , 1 } ( i , j ) A , k W , l = 1 , .. , N P
(11)
b k l 0 k W , l = 1 , .. , N P
(12)

Constraint (2) limits the energy used by each sensor node for data transmission and reception by the total battery energy allocated to it. In fact, the objective is to minimize the energy dissipation of the maximum energy dissipating sensor node. The expression in the parenthesis gives the energy dissipation of node-i on packet transmission and reception for conveying source node-k’s data on its l th routing path. Summation over k and l gives the total energy dissipation of node-i. Energy dissipation for retransmissions are incorporated into the model through the multiplication of the whole expression by λ. If there is no retransmission, then λ=1. The energy model we used [27] enables the adjustment of transmission energy for each node pair to enable a uniform signal-to-noise ratio (SNR) at each receiver.

Constraint (3) is known as the flow conservation constraint, which is satisfied for all i (all nodes including the base station), k (sensor nodes), and l (routing paths). If node-i is the source node (i=k), then the difference between the sum of outgoing flows and the sum of incoming flows is the total amount of packets injected into the network by source node-k on its l th routing path ( b k l ). If i=0 (the base station), then the all packets generated at each node-k and transmitted on path-l ( b k l ) reach the base station. If ik and i≠0, then the sum of incoming flows is equal to the sum of outgoing flows (node-i is a relay node for source node-k’s flow on its l th path). In summary, constraint (3) ensures that all flow generated at each node-k and transmitted on path-l reach the base station.

Constraint (4) ensures that data generated at sensor node-k and routed out to the rest of the network does not loop back to node-k. In other words, the sum of flows generated at node-k and received by node-k itself is 0. Note that constraint (10) ensures that all flows are non-negative; hence, constraint (4) together with constraint (10) dictates that the value of any flow creating any possible loop is exactly 0.

Constraint (5) guarantees that each node-k (kW) generates and sends exactly a total of s k M rnd packets to the base station. The total amount of data packets generated at node-k is routed to the base station by using at most N P paths, and the amount of data injected by node-k into each one of the paths is denoted as b k l ; hence, the summation over l for each k gives the total amount of data generated at node-k. Since both the flows and the amount of data injected on each path are integer variables, the packets cannot be split (all packets are created as L P bits long and reach the base station with the same length as they are formed). However, different paths can be used in a periodic time interleaved fashion. It is also possible that different paths are used to convey data in an aperiodic sequential arrangement. For example, if s k =1 packet, M rnd =3,600 rounds, N P =3 paths, b 5 1 = 1 , 800 packets, b 5 2 = 1 , 200 packets, and b 5 3 = 600 packets, then node-5 can create a cyclic structure with a length of six rounds. At each cycle of six rounds, three data packets, two data packets, and one data packet are conveyed to the base station using the first path, the second path, and the third path, respectively. Alternatively, node-5 can convey all its data from round 1 to round 1,800 on its first path, from round 1,801 to round 3,000 on its second path, and from round 3,001 to round 3,600 on its third path. In our model, we do not impose any timing restriction on scheduling. We determine the optimal paths and the amount of data transported on each path throughout the entire network operation as specified by N P , s k , M rnd , and other parameters. In fact, all feasible schedules that do not violate flow constraints in our model are equivalent.

Constraint (6) ensures that an arc (i,j)A is marked as used for conveying data generated at node-k on its l th path only if there is positive flow on (i,j)A (a ij kl=1 if f ij kl > 0). Note that the value of f ij kl can at most be s k M rnd . Such a case happens if node-k uses only one routing path (i.e., b k 1 = f ij k 1 and b k m = 0 for m>1). If f ij kl=0, then binary variable a ij kl can be either 1 or 0 (i.e., by itself constraint (6) does not force a ij kl to neither 1 nor 0 for f ij kl=0). However, constraint (7) as described below forces a ij kl to be 0 if both options are feasible. Hence, constraint (6) in conjunction with constraint (7)results in a ij kl=0 if f ij kl=0.

The flow on each configuration is guaranteed to be non-bifurcated by constraint (7). Note that constraint (7) must be satisfied for all values of i, k, and l. Consider one of the possible combinations: (i,k,l)=(3,3,1). For this example, constraint (7) states that data generated at node-3 which is designated to flow on its first routing path transmitted by node-3 (the first hop of the path) can have only one receiver (i.e., there should be only one second hop node, which can be the base station or another node acting as a relay). The summation over arc set (3,j) guarantees that only one of the arcs (3,j) have non-zero flow because the sum is equal to or less than 1. In the same example, assume that j=7 (i.e., f 37 31 = b 3 1 and f 3 m 31 = 0 for all m≠7). As the second hop relay, node-7 can transmit the data it received from node-3 ( f 37 31 ) to only one of its neighbors (dictated again by constraint (7)). If the third hop relay is node-8, then f 78 31 = f 37 31 = b 3 1 and f 7 m 31 = 0 for all m≠8. Continuing in this manner, data injected by source node-3 to its first path reaches the base station without being split into multiple branches. In other words, constraint (7) enables the construction of an unbroken and non-branching logical pipe (path) from the source to the base station for transportation of data. Indeed, N P is the upper limit on the number of such pipes for each source node. The maximum number of such pipes in a network of M sensor nodes can be M N P .

Constraint (8) is used to have a logical ordering of the configurations for originator nodes. Constraint (8) implies that b k 1 b k 2 b k 3 b k N P (i.e., the number of packets conveyed on the l th path of source node-k is greater than or equal to the number of packets conveyed on its (l+1)th path).

To address bandwidth limitations in a broadcast medium, we need to make sure that the bandwidth used to transmit and receive at each node is limited by the available channel bandwidth. Such a constraint should take the shared capacity into consideration. For node-i, we refer to the flows around node-i which are not flowing into or flowing out of node-i but affecting the available bandwidth available to node-i as interfering flows. Constraint (9) guarantees that for each node (including the base station), the aggregate amount of incoming flows, outgoing flows, and interfering flows can be scheduled within the given time frame (T rnd seconds/round × M rnd rounds = T rnd M rnd seconds). The summation over l, k, (i,j), and (j,m) gives the total number of packets sharing the capacity of node-i. Multiplication by L P (bits/packet) converts the number of packets to number of bits. Division by ξ (channel data rate – bits/second) transforms number of bits to seconds. Scaling with λ is for the extra time needed due to retransmissions. This constraint is a modified version of the sufficient condition given in [18]. We note that in the numerical analysis, we choose the parameters affecting constraint (9) in such a way that the maximum value of the left-hand side of the inequality is more than an order of magnitude lower than the right-hand side value; therefore, construction of a conflict-free transmission schedule through a non-complicated time-slot assignment algorithm is possible. It is also shown that well-designed carrier sense multiple access (CSMA)-based MAC protocols are highly successful in reducing the collision rate to negligible levels provided that the network traffic is much lower (e.g., an order of magnitude) than the available capacity [29, 30].

Finally, constraint (10), constraint (11), and constraint (12) are nonnegativity constraints for the variables of the model.

The objective is to minimize E, which is the energy of the battery in each node. Once the parameter N P is set, the solution of the model gives the set of paths each node uses to forward its data and the amount of data transported on each of these paths in a way that the energy required by the most energy consuming node is minimized. As a result, all nodes transmit their data in order to keep the required battery energy per sensor node as low as possible. In other words, all nodes dissipate their energies in the most balanced fashion. Sensor nodes are not required to use exactly N P paths (e.g., it is possible for a node to use only two paths for transporting all its generated data even if N P >2). Furthermore, the amount of data flow on each path ( b k l ) is also determined by the MIP framework to optimize energy dissipation.

3 Analysis

We use the General Algebraic Modeling System (GAMS) [31] for the numerical analysis of the MIP model. GAMS consists of high-performance solvers for solving MIP models efficiently, each of which improves upon the basic approach in different ways to attain an increased solution performance. Hence, when we solve our MIP model using GAMS, one of these solvers is used to obtain the best solution. Specific implementation details are beyond the scope of this study. We should mention that we could still use GAMS if we were to solve linear programming (LP) models rather than MIP models.

As we have mentioned, general MIP models are computationally difficult problems. They are in NP-hard class according to their computational complexity [32]. Although there are some MIP problems with efficient optimization property (i.e., they can be solved relatively easier due to their special structures), we are not aware of any previous result on the applicability of such a property in our problem. Our preliminary tests show that the LP relaxation of the problem obtained by relaxing the integrality constraints on binary variables does not provide the same optimal solution with the original MIP model and the gap is actually significant in many cases. Moreover, the solution times increase significantly as the instance sizes get larger. Hence, even for medium-sized instances, the solution times can be quite high, which can be mitigated using several implementation heuristics. Since our motivation in this paper is to explore the impact of multi-path routing rather than developing specialized efficient solution algorithms for the problem, we accept solutions with a relative gap of no more than 1.0%.

Suppose that we have a solution satisfying all integer requirements and have the best objective function value (z B ) found so far. Then, the relative gap for this solution measures the distance between z B and the available best bound for the optimal objective function value (z L ) using the ratio | z B z L | z L . LP-based branch-and-bound algorithms are used for solving MIPs in GAMS [31]; thus, z L is the LP relaxation solution of the MIP problem under consideration. Note that, in general, z L is not a feasible solution because integer variables are treated as continuous variables (i.e., the occurrence of non-integer values for binary variables is allowed in z L ). The acceptable relative gap can be controlled via the parameter optcr in GAMS, and when it is set to 0.0, the solution algorithm stops with the exact optimal solution. In this study, we let optcr=1.0%, which provides significant time savings in exchange for an immaterial sacrifice for optimality.

In our analysis, we investigate two deployment scenarios: (1) linear deployment in which nodes are deployed equidistantly on a line without any randomness and (2) uniform random distribution in which N nodes are deployed in a disc of radius R. There are many applications for linear sensor network deployments including border surveillance, highway traffic monitoring, safeguarding railway tracks, oil and natural gas pipeline protection, structural monitoring, and surveillance of bridges and long hallways [33]. We assume that there is a single base station located at one end in linear deployments and at the center in disc deployments. The communication parameters are chosen as ε = 100 pJ, ρ = 50 nJ, and α = 2, the same as the ones in [27]. For random deployment scenarios, each problem is solved for 100 random topologies, and the results are averaged. The parameters used in the analysis are presented in Table 2.
Table 2

Parameters used in analysis

Parameter

Values

ρ

50 nJ/bit

ε

100 pJ/bit/ m2

α

2

N

5–50

Deployment scenarios

Linear (1-D) equidistant, disc (2-D) random

Inter-node distance (1-D)

30 m, 10 m

Network radius R (2-D)

100 m − 1,600 m

s i

1 packet

N p

1 -

R max

RR/2

L P

2048 bits (256 Bytes)

M rnd

3600 rounds

T rnd

60 s

ξ

256 Kbps

γ

1.7

φ

10−4

χ

0.18

λ

1.22

A small-scale WSN topology is presented in Figure 1 to illustrate the network dynamics clearly. We prefer line topology to avoid more complex flow patterns in Figure 1. The numbers on each arc show the fraction of the total amount of data generated at each sensor node. For example, f 50 53 = 0.23 shows that f 50 53 = 0.23 × λ × s 5 × M rnd packets, which is equal to 1,010 packets; furthermore, it also shows that b 5 1 = 1 , 010 packets. Nodes are placed on a line with 30 m separation and Rmax = 150 m. Base station is node-0. The MIP model is solved with (a) N P , (b) N P = 2, and (c) N P = 1. Energy dissipations are indicated near the nodes. When there is no limit on the number of paths used by each sensor node (N P ), the required battery energy for each node is 5.86 J (i.e., energy dissipations of all nodes are exactly balanced). For the optimal case, node-4 and node-5 use three paths and other nodes use a single path. When the number of paths used by each sensor node is upper limited by 2 (N P = 2), the required energy for each sensor node becomes 5.87 J (i.e., percentage energy overhead is 0.14% with respect to the N P case). Note that all sensor nodes spend the same amount of energy; however, energy dissipation is slightly higher than the N P case due to the suboptimal path selection.
Figure 1

Optimal flows that minimize energy dissipation in (one dimensional) linear topology. The numbers on each arc show the fraction of the total amount of data generated at each sensor node. For example, f 50 53 = 0.23 shows that f 50 53 = 0.23 × λ × s 5 × M rnd packets, which is equal to 1,010 packets; furthermore, it also shows that b 5 1 = 1 , 010 packets. Nodes are placed on a line with 30 m separation and Rmax = 150 m. Base station is node-0. The MIP model is solved with (a) N P , (b) N P = 2, and (c) N P = 1. Energy dissipations are indicated near the nodes.

For the case of N P = 1 (i.e., single-path routing), energy overhead becomes 21.30% when compared to the N P case - the energy requirement for the maximum energy dissipating node (node-2) is 7.11 J. Unlike N P and N P = 2 cases, in the N P = 1 case, sensor nodes do not spend an equal amount of energy (e.g., 6.39 J for node-1 and 7.11 J for node-2). Hence, we observe that single-path routing cannot lead to a balanced energy dissipation regime in the network, which leads to over-utilization of some nodes’ batteries. We investigate line topologies by varying the number of sensor nodes and inter-node distance to confirm the effects of limiting the number of routing paths observed in the small scale line topology in Figure 1 which also holds for larger line topologies with different inter-node separation values.

In Figure 2, energy overhead (with respect to the N P case) as a function of inter-node separation is presented for linear topology and for N P = 1 and N P = 2 cases with the number of nodes ranging from 20 nodes to 50 nodes. All nodes can transmit to and receive from any other node in the network because nodes’ transmission ranges are not limited in this scenario (i.e., Rmax). Energy overhead values of all N P = 2 curves are always less than 1.00%. On the other hand, energy overhead of single-path routing stays in the 5.58% to 11.52% band.
Figure 2

Percentage energy overhead with respect to the N P → ∞ case in linear topology ( R m a x → ∞ ).

In Figure 3, the impact of Rmax on energy overhead in linear topology with 40 nodes for N P =1 and N P =2 is presented. Energy overhead values of all N P =2 curves are less than 1.00%. On the other hand, energy overhead of single-path routing stays in the 1.22% to 7.48% band. In single-path routing (N P =1), energy overhead is lower for lower Rmax because for lower Rmax, the N P case is not as effective as it is with higher Rmax (i.e., the number of paths to choose from decreases as Rmax decreases which narrows the options available for energy balancing).
Figure 3

Percentage energy overhead with respect to the N P → ∞ case in linear topology ( N = 40 ).

In Figures 4 and 5, we present results on two-dimensional networks to generalize our results in one-dimensional networks to two-dimensional networks. In Figures 4 and 5, energy overheads as functions of the number of sensor nodes and disc radius are presented, respectively, for different Rmax and N P ’s. In Figure 4, for N P = 1, as Rmax decreases, the energy overhead also decreases. This is because for smaller Rmax values even with N P , energy balancing is not as effective as in the case of Rmax due to more limited routing options. In single-path routing, energy overheads are in the 31.43% to 27.53% band and 1.57% to 9.13% band for Rmax = R (200 m) and Rmax = R/2 (100 m), respectively. The characteristics of energy overhead exhibit similar trends in Figure 5 (i.e., energy overhead is dominated by Rmax). Both in Figures 4 and 5, energy overheads of all two-path routing scenarios are less than 1.00%.
Figure 4

Percentage energy overhead with respect to the N P → ∞ case in disc topology with R = 200 m.

Figure 5

Percentage energy overhead with respect to the N P → ∞ case disc topology with 50 sensor nodes.

In all topologies explored in this study, our experiments revealed that energy overhead values for N P > 2 (not presented in the figures) are always less than 1.00%.

4 Conclusion

In this paper, we presented an MIP framework to investigate the energy dissipation of WSNs as a function of the number of routing paths. We explored various WSN scenarios in both one-dimensional and two-dimensional network topologies by sampling the parameter space through the developed model.

Our analysis revealed that single-path routing may lead to more than 30.00% energy overhead due to the lack of sufficient number of energy balancing routes. On the other hand, multi-path routing with only two paths results in near-optimal values with at most 1.00% energy overhead. Thus, our main conclusion is that use of more than two paths for energy balancing in multi-path routing for WSNs does not bring any significant benefit from an energy efficiency perspective. The MIP framework we presented in our study can easily be tailored to accommodate other aspects of multi-path routing in WSNs. Nevertheless, the concept of an end-to-end path should exist for our results to be relevant.

Declarations

Authors’ Affiliations

(1)
Middle East Technical University
(2)
TOBB University of Economics and Technology

References

  1. Akkaya K, Younis M: A survey on routing protocols for wireless sensor networks. Ad Hoc Netw 2005, 3: 325-349. 10.1016/j.adhoc.2003.09.010View ArticleGoogle Scholar
  2. Ouadjaout A, Challal Y, Lasla N, Bagaa M: SEIF: secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks. In Proc. International Conference on Availability, Reliability and Security (ARES). Barcelona;4–7March 2008:503-508.Google Scholar
  3. Kandasamy T, Krishnan J: Multipath routing scheme in solar powered wireless sensor networks. Proc. IFIP International Conference on New Technologies, Mobility and Security (NTMS) Tangier,5–7Nov 2008, 1-5.Google Scholar
  4. Aronsky A, Segall A: A multipath routing algorithm for mobile Wireless Sensor Networks. In Proc. IFIP Wireless and Mobile Networking Conference (WMNC). Budapest; 13-15 Oct 2010:1-6.Google Scholar
  5. Hadjidj A, Bouabdallah A, Challal Y: HDMRP An efficient fault-tolerant multipath routing protocol for heterogeneous wireless sensor networks. In Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), Volume 74. New York: Springer; 2011:469-482.Google Scholar
  6. Heikalabad H, Rasouli SR, Nematy F, Rahmani N: QEMPAR: QoS and energy aware multi-path routing algorithm for real-time applications in wireless sensor networks. Int. J. Comput. Sci. Issues 2011, 8: 466-471.Google Scholar
  7. Gupta R, Dhadhal H: Secure multipath routing in wireless sensor networks. Int. J. Electron. Comput. Sci. Eng 2012, 1: 585-589.Google Scholar
  8. Bicakci K, Tavli B: Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comput. Stand. Interfaces 2009, 31: 931-941. 10.1016/j.csi.2008.09.038View ArticleGoogle Scholar
  9. Ishmanov F, Malik AS, Kim SM: Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs), a comprehensive overview. Eur. Trans. Telecommunications 2011, 22: 151-167. 10.1002/ett.1466View ArticleGoogle Scholar
  10. Theoleyre F, Darties B: Capacity and energy-consumption optimization for the cluster-tree topology in IEEE 802.15.4. IEEE Commun. Lett 2011, 15: 816-818.View ArticleGoogle Scholar
  11. Prommak C, Modhirun S: Optimal wireless sensor network design for efficient energy utilization. In Proc. IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA). Singapore; 22-25 March 2011:814-819.View ArticleGoogle Scholar
  12. Erol-Kantarci M, Mouftah HT: Mission-aware placement of RF-based power transmitters in wireless sensor networks. In Proc. IEEE Symposium on Computers and Communications (ISCC). Cappadocia;1–4July 2012:12-17.Google Scholar
  13. Tran DH, Kim DS: Minimum latency and energy efficiency routing with lossy link awareness in wireless sensor networks. In Proc. IEEE International Workshop on Factory Communication Systems (WFCS). Lemgo; 21-24 May 2012:75-78.Google Scholar
  14. Tavli B, Akgun MB, Bicakci K: Impact of limiting number of links on the lifetime of wireless sensor networks. IEEE Communications Letters 2011, 15: 43-45.View ArticleGoogle Scholar
  15. Bicakci K, Gultekin H, Tavli B: The impact of one-time energy costs on network lifetime in wireless sensor networks. IEEE Commun. Lett 2009, 13: 905-907.View ArticleGoogle Scholar
  16. Jain K, Padhye J, Padmanabhan VN, Qiu L: Impact of interference on multi-hop wireless network performance. In Proc. ACM Annual International Conference on Mobile Computing and Networking (MOBICOM). New York: ACM; 2003:66-80.Google Scholar
  17. Gupta P, Kumar PR: The capacity of wireless networks. IEEE Trans. Inf. Theory 2000, 46: 388-404. 10.1109/18.825799MathSciNetView ArticleMATHGoogle Scholar
  18. Cheng M, Gong X, Cai L: Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks. IEEE Trans. Wireless Commun 2009, 8: 3770-3779.View ArticleGoogle Scholar
  19. Demirkol I, Ersoy C, Alagoz F: MAC protocols for wireless sensor networks: a survey. IEEE Commun. Mag 2006, 44: 115-121.View ArticleGoogle Scholar
  20. Tavli B, Heinzelman W: Energy and spatial reuse efficient network-wide real-time data broadcasting in mobile ad hoc networks. IEEE Trans. Mobile Comput 2006, 5: 1297-1312.View ArticleGoogle Scholar
  21. Tavli B, Heinzelman W: Energy-efficient real-time multicast routing in mobile ad hoc networks. IEEE Trans. Comput 2011, 60: 707-722.MathSciNetView ArticleGoogle Scholar
  22. Madan R, Cui S, Lall S, Goldsmith AJ: Modeling and optimization of transmission schemes in energy-constrained wireless sensor networks. IEEE/ACM Trans. Netw 2007, 15: 1359-1372.View ArticleGoogle Scholar
  23. Madan R, Cui S, Lal S, Goldsmith A: Cross-layer design for lifetime maximization in interference-limited wireless sensor networks. IEEE Trans. Wireless Commun 2006, 5: 3142-3152.View ArticleGoogle Scholar
  24. Karnik A, Iyer A, Rosenberg C: Throughput-optimal configuration of fixed wireless networks. IEEE/ACM Trans. Netw 2008, 16: 1161-1174.View ArticleGoogle Scholar
  25. Sankarasubramaniam Y, Akyildiz IF, McLaughlin SW: Energy efficiency based packet size optimization in wireless sensor networks. In Proc. IEEE International Workshop on Sensor Network Protocols and Applications (SNPA). Anchorage; 11 May 2003:1-8.Google Scholar
  26. Seada K, Zuniga M, Helmy A, Krishnamachari B: Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks. In Proc. International Conference on Embedded Networked Sensor Systems (SenSys). New York: ACM; 2004:108-121.View ArticleGoogle Scholar
  27. Heinzelman W, Chandrakasan A, Balakrishnan H: An application specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Commun 2002, 1: 660-670. 10.1109/TWC.2002.804190View ArticleGoogle Scholar
  28. Rhee I, Warrier A, Aia M, Min J, Sichitiu ML: Z-MAC, a hybrid MAC for wireless sensor networks. IEEE/ACM Trans. Netw 2008, 16: 511-524.View ArticleGoogle Scholar
  29. Duffy K, Malone D, Leith D: Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Commun. Lett 2005, 9: 715-717. 10.1109/LCOMM.2005.1496592View ArticleGoogle Scholar
  30. Malone D, Duffy K, Leith D: Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Trans. Netw 2007, 15: 159-172.View ArticleGoogle Scholar
  31. Brooke A, Kendrick D, Meeraus A, Raman R: GAMS: A User’s Guide. Washington DC: GAMS Development Corporation; 1998.Google Scholar
  32. Wolsey L: Integer Programming. New York: Wiley-Interscience Series in Discrete Mathematics and Optimization, Wiley; 1998.MATHGoogle Scholar
  33. Liu X, Mohapatra P: Proc. International Workshop on Measurement, Modelling, and Performance Analysis of Wireless Sensor Networks (SenMetrics). San Diego; 21 July 2005:78-85.Google Scholar

Copyright

© Incebacak et al.; licensee Springer. 2013

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.