Open Access

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

  • Felipe da Rocha Henriques1Email author,
  • Lisandro Lovisolo2 and
  • Marcelo Gonçalves Rubinstein2
EURASIP Journal on Wireless Communications and Networking20162016:163

Received: 4 August 2015

Accepted: 28 June 2016

Published: 8 July 2016


When a wireless sensor network (WSN) is employed to monitor environmental data, efficient energy usage is demanded so that the WSN lifetime can be extended. In this context, we propose a distributed energy conservation algorithm (DECA). DECA considers the known past to make predictions on the measurement change over time in order to put sensor nodes into sleep mode, saving energy. Sensor nodes compute their inactivity periods taking into account the inactivity periods of their neighboring nodes. The signals are reconstructed at the sink node, from the sampled values received from sensor nodes. DECA is designed to keep the reconstruction error of the monitored process below a given fraction of its actual value. Since DECA works on the application layer, it can be combined with medium access control and routing protocols to further improve energy management. The proposed algorithm is evaluated with simulations using real data. Results show gains in the network lifetime of up to 1000 % as compared to a WSN without any energy management, while maintaining the error of the reconstructed process at the sink within the desired fraction imposed. Since a strategy for managing the sleeping period in routing nodes is proposed, a metric for evaluating the effects of sleeping periods on network connectivity is also proposed. We have verified that the network connectivity is not impaired by the proposed algorithm, as packet delivery ratios above 90 % were obtained.


Connectivity Energy Estimation Reconstruction Wireless sensor networks

1 Introduction

Recent advances in micro-electronics and wireless communications made it possible to develop and deploy low cost, low energy consumption, and tiny sensors. These have been used to build wireless sensor networks (WSNs) [1]. A WSN can be applied in several domains [24], such as (i) in medical applications, to remotely monitor patients and their biometric data; (ii) for military purposes, to monitor forces; (iii) in industrial automation; and (iv) to sense variables in a region of interest.

In this work, we consider that a WSN is employed to sense a physical variable, a field—a process whose value depends on space coordinates (x,y,z) and on time t. Each sensor S i samples the monitored process at its position (x i ,y i ,z i ) measuring s(x i ,y i ,z i ,t) and, eventually, transmits the measurement to a sink node (for the sake of simplicity in the reminder, we ignore the coordinate z and use the notation s i (t)=s(x i ,y i ,t)). In a WSN, the sink is usually more robust than the sensor nodes, and it can be used as a gateway [1].

The problem that we consider is: How can we make an energy-efficient usage of the WSN while providing an acceptable reconstruction of the sensed field for the monitoring application? As acceptable reconstruction, we assume that the reconstruction error is kept below a predefined value, while energy efficiency involves improving the network autonomy, by increasing its lifetime. More specifically, we assume that the network lifetime is the time until the first node dies, i.e., when its energy ends [5].

In this work, we propose a distributed energy conservation algorithm (DECA) that runs in the application layer for wireless sensor networks in monitoring applications. Roughly, each sensor independently considers information which is expected to be available at the sink node to predict a future measured value and this in turn is used to compute the inactivity period (the interval while the node stays in sleep mode) of a given node S i . Each sensor node sleeps during its inactivity period, and then the node wakes up, measures the desired quantity, and transmits it if the error between the current measurement and the predicted behavior of the monitored field is larger than a given threshold, reiterating the process. Energy saving and the resulting increase in network lifetime is achieved by both reducing the amount of transmissions and also by putting nodes to sleep during their inactivity periods.

The decision whether or not to sleep is performed by each node individually, that is locally. Nodes do not depend on the reception of sleeping commands or data from the sink. Therefore, when making this decision, two aspects need to be considered. The first is that for computing its inactivity period (IP i ), each node S i must consider how the sink reconstructs the process from the measurements the sink receives. As a consequence, in order to guarantee a trusty reconstruction of the process, we impose the constraint of keeping the reconstruction error within an acceptable distortion criterion at the sink and not solely at the sensor. Therefore, since each node takes its own decision, the proposed strategy is decentralized and distributed.

An important issue to be considered when computing the inactivity/sleeping period of a sensor is: How does putting a given node to sleep impact the network connectivity? Therefore, the second aspect driving DECA design refers to multi-hop networks, where nodes can act both as sources (when they measure samples of the monitored process) and as routers/relays (when besides measuring they also forward packets from neighbors), that is, the inactivity period of a sensor node must be at least considered by a sensor that is routing its messages. Inversely, when deciding its inactivity period, each node must account for the impacts of this decision on network connectivity, that is, on other nodes. This is considered in DECA; nodes forward their own inactivity periods together with the measurements and an inactivity period is used by the first-hop router when it computes its inactivity period.

Therefore, although running in the application layer and the decision of how long to sleep being taken autonomously by each sensor, network topology and routes awareness are inherent to DECA since the inactivity periods of sensors being routed by a node are considered by the node when deciding for how long to sleep. In addition, a fringe benefit of forwarding inactivity periods is that sensor nodes are not required to be synchronized, since the algorithm does not demand an absolute time base, employing just relative times (time intervals).

We should highlight that DECA differs from existing proposals in the literature as (i) DECA is applied in the application layer; (ii) DECA does not impose an uniform sampling interval for the measurements time-series; (iii) by design, DECA imposes the reconstruction error of the sensed variable to be within an acceptable distortion criterion; (iv) DECA is decentralized and distributed, since each and every node decides by itself for how long to sleep, although considering information about the nodes it forwards packets for; and (v) DECA uses a deterministic approach for computing the node sleeping/inactivity period.

Since nodes are put to sleep during their estimated inactivity periods, in order to evaluate the impact of this in the network connectivity, we propose a metric that we call success ratio.

The proposed algorithm is assessed by simulations. The IEEE 802.15.4 network standard, which is widely used in WSNs, is considered in the simulations. In addition real environmental data are employed. Results show a significant increase in the network lifetime by using DECA, as compared to WSNs without any energy management scheme. We have also verified that network connectivity is not impaired by the algorithm, what, indeed, makes it worth to use DECA on any monitoring application alike the one considered by DECA.

This work is structured as follows. Section 2 presents related works and proposals dealing with energy conservation in WSNs. In Section 3, we present a model for WSN based monitoring applications. In Section 3.2.1, this model is used to size-up the impacts of putting nodes to sleep in WSNs, and it is employed to derive the proposed algorithm for saving energy in monitoring applications (DECA). In Section 4, we describe DECA algorithm implementation. In Section 5, we present the sensor node energy model used in this work and the simulation aspects. In Section 6, we present results obtained with simulations considering real environmental data. At last, conclusions are discussed in Section 7.

2 Energy saving in WSNs

The design of node’s hardware, its miniaturization, and energy harvesting have gained importance for WSN deployment, but, at the same pace, methods leading to energy saving in a WSN have also turned into an important issue. In [6], a survey of energy saving methods for WSNs is presented, including a taxonomy for energy saving schemes. Some energy saving methods are briefly mentioned hereafter.

According to [1], communication (i.e., transmission and reception) is the task that requires more energy in a WSN. This means that it may be advantageous for a node to process data, in order to compress it or to decide whether to transmit it or not and thus save energy while sleeping [7]. In [8], spatial and temporal correlations between measured samples are used to decrease the amount of transmissions, saving sensor node energy. The sink predicts the field being sensed by sensor nodes using information that it receives from the nodes. Using the received data, the sink estimates for how long each node can sleep and then sends different messages for the distinct nodes conveying their sleeping periods. This strategy is centralized as the sink decides for how long the nodes can sleep, and a given node may not be put to sleep at all, in the case that packets are lost, thus severely impacting energy saving. Differently, our strategy is completely decentralized, since each sensor node computes its own sleeping period.

Similarly, in [9], the temporal pattern of samples measured by sensor nodes is used to reduce the amount of transmissions to the sink node. The monitored process is compared against its expected behavior, if they match then the node does not transmit its value in order to increase network lifetime. If the measurements do not match the expected behavior, then the nodes transmit the values. Since this scheme does not involve node sleeping, a confinement of its gain in network lifetime is obtained. DECA tries to track the monitored process and the sensor nodes do not need to know (a priori) the behavior of the process that is being sensed. Moreover, DECA makes node to switch into a sleeping mode, increasing the autonomy of sensor nodes.

In [10], a sleep-awake scheme is proposed, in which a network coordinator periodically transmits a beacon frame with a sleeping command. Therefore, this scheme is centralized and nodes enter the sleeping state synchronously upon the reception of this command. To improve energy saving, a power control mechanism in the MAC sublayer is also proposed, based on the distance between neighboring nodes. In our proposal, sensor nodes do not receive any sleeping command (which could eventually be lost because of the wireless channel). Furthermore, DECA runs at application layer of sensor nodes, independently of lower-layer protocols.

In [3], a “derivative-based prediction” is employed in each sensor node to manage the need for transmissions. It simply allows each node to verify if the measured quantity did not change enough, in which case it is not transmitted. This approach resembles the one presented in [11]. The energy conservation algorithm in [11] aims at reducing the amount of transmissions by managing the need for them. A sample is transmitted only if the percentage variation between it and the last transmitted sample is greater than a given threshold and nodes sleep between transmissions. The current proposal outperforms the previous one [11] because DECA obtains a constrained reconstruction error.

The proposals in [3, 8, 9] consider a uniform sampling interval for the sampled measurements. This is similar to the proposals for “signal compression” based on piecewise linear smoothing [12]. However, once a node is put into sleep mode, the sampling is not uniform anymore; this aspect emerged in [11] and is fully considered by the algorithm presented in this work.

Finally, DECA can be used together with other energy saving protocols, as for example the ones proposed to save energy in the network layer and in the MAC sublayer [1318] in order to further augment energy saving.

3 Sensing and reconstructing a process with a WSN

Figure 1 summarizes the problem of using a WSN to sense a field. Sensor nodes are spread in a region of interest and measure a collection of samples \(\mathbf {s}_{i}^{(M)}\) of a physical quantity—i indicates the sensor and (M) is used to indicate that these values are in principle known only by the measurement node. As sensor nodes use an algorithm to save energy by managing the necessity of communication, a subset of their measurements is transmitted. The set of transmitted samples by node i is \(\mathbf {s}_{i}^{(T)}\). From node i, the sink node receives the set \(\mathbf {s}_{i}^{(R)}\). Since a wireless channel is used, some packets may be lost and therefore \(\mathbf {s}_{i}^{(R)} \subset \mathbf {s}_{i}^{(T)}\). From the received samples, the sink reconstructs the field.
Fig. 1

Framework considered in this work

3.1 Measurements sampling, transmission, and reception

Let us assume that:
  • A measured sample \(s_{i}^{(M)}\) may be transmitted or not, i.e., it may generate a transmitted sample \(s_{i}^{(T)}\) or not, therefore \(\mathbf {s}_{i}^{(T)} \subset \mathbf {s}_{i}^{(M)}\)

  • A transmitted sample \(s_{i}^{(T)}\) may be received or not, i.e., it may generate a received sample \(s_{i}^{(R)}\) or not, therefore \(\mathbf {s}_{i}^{(R)} \subset \mathbf {s}_{i}^{(T)}\)

  • The monitored process is considered to be sufficiently smooth to be tracked with a simple predictor

  • The received samples are equal to the transmitted samples, except by eventually lost data

Consider a sensor node S i and a sink node S s . The measurements collected by S i can be organized as a vector
$$ \begin{aligned} \mathbf{s}_{i}^{(M)} =&\, \left[s_{i}^{(M)}\left(t_{i}^{(M)}[\!1] \right), s_{i}^{(M)} \left(t_{i}^{(M)}[\!2] \right), \dots,\right.\\ &\quad\left.s_{i}^{(M)} \left(t_{i}^{(M)}[N] \right) \right], \end{aligned} $$
where the \(t_{i}^{(M)}[\!n]\), n [1…N] are the measurement/sampling times and are such that t i (M)[j]< t i (M)[ k] if j<k. One can also define the vector composed of the instants when the elements of \(\mathbf {s}_{i}^{(M)}\) are measured
$$\begin{array}{*{20}l} \mathbf{s}_{i}^{(M)} &= \left [s_{i}^{(M)}[\!1], s_{i}^{(M)}[\!2], \dots, s_{i}^{(M)}[N] \right ], \text{and}\\ \mathbf{t}_{i}^{(M)} &= \left [t_{i}^{(M)}[\!1], t_{i}^{(M)}[\!2], \dots, t_{i}^{(M)}[N] \right ]. \end{array} $$
At the sink node, the reconstruction of the process is done from the available information, which is in principle a subset of the measured samples. Since \(\mathbf {s}_{i}^{(R)} \subset \mathbf {s}_{i}^{(T)} \subset \mathbf {s}_{i}^{(M)}\), reconstruction employs the received samples \(\mathbf {s}_{i}^{(R)}\) and the corresponding times \(\mathbf {t}_{i}^{(R)}\), i.e.,
$$\begin{array}{*{20}l} \mathbf{s}_{i}^{(R)} &= \left [s_{i}^{(R)}[\!1], s_{i}^{(R)}[\!2], \dots, s_{i}^{(R)}[\!K] \right ] \text{and}\\ \mathbf{t}_{i}^{(R)} &= \left [t_{i}^{(R)}[\!1], t_{i}^{(R)}[\!2], \dots, t_{i}^{(R)}[\!K] \right ]. \end{array} $$

The values of the elements of \(\mathbf {t}_{i}^{(R)}\) are the measurement times of samples that are transmitted by the sensors and that are received by the sink. At any given time of the network life the cardinality of \(\mathbf {s}_{i}^{(R)}\) is smaller than or equal to the cardinality of \(\mathbf {s}_{i}^{(M)}\), that is KN. One notes that \({\mathbf {t}_{i}^{(R)}} \subset {\mathbf {t}_{i}^{(M)}}\) and that \({\mathbf {s}_{i}^{(R)}} \subset {\mathbf {s}_{i}^{(M)}}\). Although, the mapping from n in \(s_{i}^{(M)}[\!n]\) to k in \(s_{i}^{(R)}[\!k]\) is will be considered in Section 3.3.

3.2 Reconstruction of the process

Let s i (t)=s(x i ,y i ,t) be the value collected by sensor S i placed at (x i ,y i ) over time and its reconstruction version at the sink be \(\hat {s}_{i}(t) = \hat {s}\left (x_{i},y_{i},t\right)\). The reconstruction error can be defined as
$$ e\left (\mathrm{S}_{i},t\right) = e\left (x_{i},y_{i},t\right) = s_{i}\left (t\right) - \hat{s}_{i}\left (t\right). $$

We want to reconstruct the process s(x,y,t) within an acceptable error criterion. The reconstruction \(\hat {s}_{i}\left (x,y,t\right)\) can be obtained using an interpolator.

3.2.1 Interpolator data

The sink forms the set of received samples from node S i , \(\mathbf {s}_{i}^{(R)}\). In order to save energy nodes do not transmit all measured samples, i.e \(\mathbf {s}_{i}^{(T)} \subset \mathbf {s}_{i}^{(M)}\). In addition, some transmissions may be lost, therefore, \(\mathbf {s}_{i}^{(R)} \subset \mathbf {s}_{i}^{(T)} \subset \mathbf {s}_{i}^{(M)}\). For the moment, we assume that \(\mathbf {s}_{i}^{(R)} \equiv \mathbf {s}_{i}^{(T)}\); packet loss impact is discussed in Section 6.

At time t, the set measurements collected by S i is
$$ {} \begin{aligned} {\mathbf{s}}_{i}^{(M)}(t) = \left \{s_{i}^{(M)}\left(t_{i}^{(M)}[j]\right) \right \}_{t_{i}^{(M)}[j] < t} = \left \{s_{i}^{(M)}[j] \right \}_{t_{i}^{(M)}[j] < t}. \end{aligned} $$

This set allows to predict \(s_{i}^{(M)}(t)\) using a causal predictor

\(\hat {s}_{i}^{(M)}(t) = {\mathcal {P}} \left \{{\mathbf {s}}_{i}^{(M)}(t) \right \}\).

The prediction can also employ the instants of sample measurements, \({\mathbf {t}}_{i}^{(M)}(t) = \left \{ t_{i}^{(M)}[j]\right \}_{t_{i}^{(M)}[j]<t}\), turning into
$$ \hat{s}_{i}^{(M)}(t) = {\mathcal{P}} \left \{\mathbf{s}_{i}^{(M)}(t),~\mathbf{t}_{i}^{(M)}(t) \right \}. $$

Replacement of the superscript (M) by (R) provides a predictor that can be applied at the sink node. It is important to note that although the sets \({\mathbf {s}}_{i}^{(R)}(t)\) and \({\mathbf {t}}_{i}^{(R)}(t)\) are defined similarly to \({\mathbf {s}}_{i}^{(M)}(t)\) and \({\mathbf {t}}_{i}^{(M)}(t)\), they are not the same, since every measurement is neither transmitted by the sensor nor received by the sink.

3.2.2 Error criterion

We impose the ratio between the predicted sample and its actual value to be smaller than a fraction δ of the actual value. This criterion at the node and at the sink translates as
$$ \begin{aligned} &\left|\hat{s}_{i}^{(M)}(t) - s_{i}^{(M)}(t)\right| \leq \delta \left|s_{i}^{(M)}(t) \right| ~\text{and}\\ &\left|\hat{s}_{i}^{(R)}(t) - s_{i}^{(R)}(t)\right| \leq \delta \left|s_{i}^{(R)}(t) \right|. \end{aligned} $$
Assuming the use of interpolators, the errors of the estimated field in the sensor node and at the sink at a given instant t are given by
$$\begin{array}{*{20}l} e\left (s_{i}^{(M)},~t \right) &= \left |{\mathcal{P}} \left \{{\mathbf{s}}_{i}^{(M)}(t),~{\mathbf{t}}_{i}^{(M)}(t) \right \} - s_{i}^{(M)}\left (t\right) \right |, \text{and} \end{array} $$
$$\begin{array}{*{20}l} e\left (s_{i}^{(R)},~t \right) &= \left |{\mathcal{P}} \left \{{\mathbf{s}}_{i}^{(R)}(t),~{\mathbf{t}}_{i}^{(R)}(t) \right \} - s_{i}^{(R)}\left (t\right) \right |, \end{array} $$
while the error bounds in Eq. (7) impose
$$ e\left (s_{i}^{(M)},~t \right) \leq \delta \left |s_{i}^{(M)}\left (t\right) \right | ~\textrm{and } e\left (s_{i}^{(R)},~t\right) \leq \delta \left |s_{i}^{(R)}\left (t\right) \right |. $$

Sensor nodes may estimate a future measurement \(\hat {s}_{i}^{(M)}[\!n] = \hat {s}_{i}^{(M)}\left (t_{i}^{(M)}[\!n] \right)\) from some known samples and their measurement times. Similarly, we can use the time interval between \(\hat {s}_{i}^{(M)}[\!n]\) and \(s_{i}^{(M)}[\!n-1]\), given by \(\hat {t}_{i}^{(M)}[\!n] - t_{i}^{(M)}[\!n-1]\), for the node to sleep and save energy. Putting this altogether, using the restriction \(e\left (s_{i}^{(M)},~t\right) \leq \delta | s_{i}^{(M)}\left (t\right), | \) we can estimate the inactivity period/sleeping time of node i. This resembles the approach on “signal compression” in [12]; however, our approach neither imposes nor assumes a uniform sampling (t i [ n]=n Δ T).

The problem gets more interesting when one imposes that the reconstruction (R) at the sink must closely match the measured (M) process. This is described by
$$ \left | \hat{s}_{i}^{(R)}(t) - \hat{s}_{i}^{(M)}(t) \right | \leq \delta \left |\hat{s}_{i}^{(M)}(t)\right |, $$

that is, we impose the reconstructed value at the sink to be bounded by the error criterion with respect to the measurement prediction at the sensor.

Considering that measurements are always positive (without any loss of generality), from Eq. (11), two situations arise: (i) If \( \hat {s}_{i}^{(R)}[\!n] > \hat {s}_{i}^{(M)}[\!n] \), then \(\hat {s}_{i}^{(R)}[\!n] -\hat {s}_{i}^{(M)}[\!n] \leq \delta \hat {s}_{i}^{(M)}[\!n] ~ \Rightarrow ~ \hat {s}_{i}^{(R)}[\!n] \leq \hat {s}_{i}^{(M)}[n](1+\delta)\) and (ii) else if \(\hat {s}_{i}^{(R)}[\!n] \leq \hat {s}_{i}^{(M)}[\!n]\), then \(- \hat {s}_{i}^{(R)}[\!n] + \hat {s}_{i}^{(M)}[\!n] \leq \delta \hat {s}_{i}^{(M)}[\!n] ~ \Rightarrow ~ \hat {s}_{i}^{(R)}[\!n] \geq \hat {s}_{i}^{(M)}[\!n] (1 - \delta)\). These situations can be easily combined into
$$ 1 - \delta \leq \frac{\hat{s}_{i}^{(R)}[\!n] }{\hat{s}_{i}^{(M)}[\!n]} \leq 1 + \delta. $$

The parameter δ defines the error bounds (and may be application dependent), as we show that it allows to estimate for how long sensors can be put in sleeping mode.

3.2.3 First order predictor

A first order model for \({\mathcal {P}} \left \{ \cdot \right \}\) employs the last two samples to estimate a future value: as the last two measured samples and instants of measurements, we have \(s_{i}^{(M)}[n-1]\) and \(s_{i}^{(M)}[\!n-2]\), \(t_{i}^{(M)}[\!n-1]\), and \(t_{i}^{(M)}[\!n-2]\). We use \(\hat {t}_{i}^{(M)}[n]\) to denote an instant that has not passed yet, that is estimated. Using these definitions, the predicted value (see Fig. 2) is given by
$$\begin{array}{*{20}l} \hat{s}_{i}^{(M)}[\!n] & = {\mathcal{P}} \left \{ \mathbf{s}_{i}^{(M)}\left(\hat{t}_{i}{(M)}[\!n]\right),\mathbf{t}_{i}^{(M)}\left(\hat{t}_{i}{(M)}[\!n]\right) \right \} = \\ & = s_{i}^{(M)}[\!n-1] + \frac{s_{i}^{(M)}[\!n-1] - s_{i}^{(M)}[\!n-2]}{t_{i}^{(M)}[\!n-1] - t_{i}^{(M)}[\!n-2]}\\ &\qquad\times\left (\hat{t}_{i}^{(M)}[\!n] - t_{i}^{(M)}[\!n-1] \right). \end{array} $$
Fig. 2

First order prediction

Assuming that all transmissions are successful, i.e., \(\mathbf {s}_{i}^{(R)} \equiv \mathbf {s}_{i}^{(T)}[\!k]\), a similar equation holds for \(\hat {s}_{i}^{(R)}[\!k]\) (the impact of breaching this assumption is evaluated in Section 6).

We can define the differences (a) between the two last measured samples, (b) between their sample times, (c) between the two last transmitted samples, and (d) between their sample times, using
$$\begin{array}{*{20}l} \Delta s_{i}^{(M)}[\!n-1] & = s_{i}^{(M)}[\!n-1]-s_{i}^{(M)}[\!n-2], \end{array} $$
$$\begin{array}{*{20}l} \Delta t_{i}^{(M)}[\!n-1] & = t_{i}^{(M)}[\!n-1]-t_{i}^{(M)}[\!n-2], \end{array} $$
$$\begin{array}{*{20}l} \Delta s_{i}^{(R)}[\!k-1] & = s_{i}^{(R)}[\!k-1]-s_{i}^{(R)}[\!k-2], \text{and} \end{array} $$
$$\begin{array}{*{20}l} \Delta t_{i}^{(R)}[\!k-1] & = t_{i}^{(R)}[\!k-1]-t_{i}^{(R)}[\!k-2]. \end{array} $$
From these, we can define the variation rates
$$\begin{array}{*{20}l} \alpha^{(M)}_{i}[\!n-1] &= \frac{\Delta s_{i}^{(M)}[\!n-1]}{\Delta t_{i}^{(M)}[\!n-1]} \textrm{and }\\ \alpha^{(R)}_{i}[\!k-1] &= \frac{\Delta s_{i}^{(R)}[\!k-1]}{\Delta t_{i}^{(R)}[\!k-1]}. \end{array} $$
Using the above notations, the first order prediction rules become
$$\begin{array}{*{20}l} \hat{s}_{i}^{(M)}[\!n] &= s_{i}^{(M)}[\!n-1] + \alpha^{(M)}_{i} [\!n-1]\\ &\quad\left(\hat{t}_{i}^{(M)}[\!n] - t_{i}^{(M)}[\!n-1] \right) \text{and} \end{array} $$
$$\begin{array}{*{20}l} \hat{s}_{i}^{(R)}[\!k] & = s_{i}^{(R)}[\!k-1] + \alpha^{(R)}_{i} [\!k-1]\\ &\quad\left(\hat{t}_{i}^{(R)}[\!k] - t_{i}^{(R)}[\!k-1] \right). \end{array} $$

A future sample is guessed using linear interpolation which requires very low computational complexity and memory requirements. As depicted in Fig. 2, this rule could be used to estimate for how long the sensor node can sleep at most. Nevertheless, one wants to keep the reconstruction error at the sink within the bounds in Eq. (11). Therefore, the influence of the quantities known at the sink on the sensor decision to sleep or not needs to be addressed.

3.3 How does information cognized at the sink influence sensor nodes?

All information that is available at the sink about the measurements of a sensor is known by the sensor itself. On the other hand, the contrary is hardly true. Let us resort the indices of the last two transmitted (received) samples and their instants of transmissions with respect to the sample indices at the sensor. In doing so, we have \(s_{i}^{(R)}[\!n-j]\) (a measurement taken j samples before the current one) and \(s_{i}^{(R)}[\!n-(j+l)]\) (j+l samples before the current) and their corresponding measurement times \(t_{i}^{(R)}[\!n-j]\) and \(t_{i}^{(R)}[\!n-(j+l)]\). The lags j and j+l indicate that not all measured samples are transmitted to (nor received at) the sink. Using this indexing strategy one has that \(\Delta s_{i}^{(M)}[\!n-1] = s_{i}[n-1]-s_{i}[\!n-2]\), \(\Delta t_{i}^{(M)}[\!n-1] = t_{i}[\!n-1]-t_{i}[\!n-2]\), \(\Delta s_{i}^{(R)}[n-1] = s_{i}[\!n-j]-s_{i}[\!n-j-l]\),and \(\Delta t_{i}^{(R)}[\!n-1] = t_{i}[\!n-j]-t_{i}[\!n-j-l]\).

The variation rates in Eq. (18) are now given by
$$\begin{array}{*{20}l} \alpha^{(M)}_{i}[\!n-1] & = \frac{s_{i}[\!n-1]-s_{i}[\!n-2]}{t_{i}[\!n-1]-t_{i}[\!n-2]} \textrm{and }\\ \alpha^{(R)}_{i}[\!n-1] & = \frac{s_{i}[\!n-j]-s_{i}[\!n-j-l]}{t_{i}[\!n-j]-t_{i}[\!n-j-l]}. \end{array} $$
Therefore, we have that Eqs. (19) and (20) can be expressed as
$$\begin{array}{*{20}l} \hat{s}_{i}^{(R)}[\!n] & = s_{i}[\!n-j] + \alpha_{i}^{(R)}[\!n-1] \left(\hat{t}_{i}[\!n] - t_{i}[\!n-j]\right) \textrm{ and} \end{array} $$
$$\begin{array}{*{20}l} \hat{s}_{i}^{(M)}[\!n] & = s_{i}[\!n-1] + \alpha_{i}^{(M)}[\!n-1] \left(\hat{t}_{i}[\!n] - t_{i}[\!n-1]\right). \end{array} $$
The predictions in Eqs. (22) and (23) are illustrated in Fig. 3. Equation (22) estimates the next measurement (of node S i ) \(\hat {s}_{i}^{(R)}[\!n]\) to be received at the sink, from the last received measurements s i [ nj] and s i [ njl] and their times. Meanwhile, Eq. (23) provides an estimate of the next sample to be collected \(\hat {s}_{i}^{(M)}[\!n]\) from the two last, s i [ n−1] and s i [ n−2] and their times. Equation (23) is applicable only at the sensor and it describes the “local” behavior of the first order predictor while the data employed to compute \(\hat {s}_{i}^{(R)}[\!n]\) is available at the sensor and also at the sink.
Fig. 3

Illustration of the computed estimates and inactivity period

3.3.1 Inactivity period computation

Let us define the time interval between the last transmitted sample and the next sample to be collected (IP i [ n]) and the time interval between the last transmitted sample and the last measured sample (LP i [ n]) of node S i , i.e.,
$$\begin{array}{*{20}l} \text{IP}_{i}[\!n] & = \hat{t}_{i}[\!n] - t_{i}[\!n-j], \text{and} \end{array} $$
$$\begin{array}{*{20}l} \text{LP}_{i}[\!n] & = t_{i}[\!n-1] - t_{i}[\!n-j]. \end{array} $$
With these definitions, Eqs. (22) and (23) become
$$\begin{array}{*{20}l} \hat{s}_{i}^{(R)}[\!n] & = s_{i}[\!n-j] + \alpha^{(R)}_{i} [\!n-1] \text{IP}_{i}[\!n], \textrm{and } \end{array} $$
$$\begin{array}{*{20}l} \hat{s}_{i}^{(M)}[\!n] & = s_{i}[\!n-1] + \alpha^{(M)}_{i} [\!n-1] (\,\text{IP}_{i}[\!n] - \text{LP}_{i}[\!n]). \end{array} $$
Replacing Eqs. (26) and (27) in Eq. (12) to guarantee the desired error bound, after simple manipulations, we obtain the two inequalities
$$ \begin{aligned} \text{IP}_{i}[n] & \leq \frac{s_{i}[n-j] - s_{i}[\!n-1](1 - \delta) + \text{LP}_{i}[\!n]\left [\alpha^{(M)}_{i}[\!n-1](1 - \delta)\right ]}{\alpha^{(M)}_{i}[\!n-1](1 - \delta) - \alpha^{(R)}_{i}[\!n-1]}, \textrm{and } \end{aligned} $$
$$ \begin{aligned} \text{IP}_{i}[n] & \geq \frac{s_{i}[n-j] - s_{i}[\!n-1](1 + \delta) + \text{LP}_{i}[\!n] \left [\alpha^{(M)}_{i}[\!n-1](1 + \delta) \right]}{\alpha^{(M)}_{i}[\!n-1](1 + \delta) - \alpha^{(R)}_{i}[\!n-1]}. \end{aligned} $$

The sensor is aware of its transmissions to the sink. Therefore, one applies the sink reconstruction model at the sensor for obtaining an acceptable range for its inactivity period, IP i [ n]. This range is guaranteed by choosing the smallest case between Eqs. (28) and (29). The acceptable range of IP i [ n] for a given sensor node i guarantees a reconstruction error within a prescribed error at the sink. This ranges depends on (i) the relationship of the variation rates of the sensor at the sink \(\alpha ^{(R)}_{i}[\!n-1]\) and at the sensor itself \(\alpha ^{(M)}_{i}[\!n-1]\); (ii) the distortion bound δ; and (iii) the time interval between the last transmitted sample and the last measured sample, LP i [ n].

Considering the use of a simple linear predictor, we derived for how long a node can sleep while the reconstruction is within an allowed distortion range. For that each sensor compares the predictor model available at the sink for its measurements against a predictor model for the sensor, which is more frequently updated, i.e., it considers non-transmitted measurements. It is worth noticing that other more sophisticated interpolators as spline, cubic, or polynomial could also be evaluated. Next, we use this linear predictor to propose DECA.

4 Distributed energy conservation algorithm for wireless sensor networks – DECA

DECA works directly in the application layer of each sensor node, regardless, for example, of the routing protocol used. The steps of the algorithm are showed in Algorithm 1. The algorithm is presented for a node S i and considers the sensor energy \(\mathcal {E}_{i}\) and that the sensor runs until its energy ends. That is, at each step of the algorithm, \(\mathcal {E}_{i}\) is decreased accordingly to the task that is performed (see Section 5.1). The inactivity period is initially set to T granularity seconds and it is updated by DECA at each sensor. After that, the sensing–processing–(eventual) transmission–sleeping procedure occurs. For ease of understanding, Algorithm 1 is presented in two parts: the first one describes the initialization of sensor nodes (this takes two sampling to have the measurement and transmission queues filled (lines 4–19); the second on is the “main loop” (lines 20–35), in which nodes transmit only if the error between the current measurement and the predicted behavior of the monitored field is larger than allowed.

In Algorithm 1, n indexes the current measurement (\(s_{i}^{(M)}[\!n]\) at \(t_{i}^{(M)}[\!n]\)) and p the current transmission (\(s_{i}^{(T)}[\!p]\) at \(t_{i}^{(T)}[\!p]\)). We use these two distinct indices because some measurements are not be transmitted. Once a node wakes up, it measures the quantity and compares the sampled value against the predicted one, then the node transmits the new value only if the error is larger than δ. This is a basic procedure for saving energy, since unnecessary transmissions are avoided. Following, the sensor node updates its inactivity period and sleeps again.

The sleeping period reduction factor γ (0<γ≤1) is used to increase the probability of S i to be awake to forward packets from its neighbors. Experiments evaluating the impact of γ on DECA are presented in Section 6.2. More details on how DECA considers neighbors (when the sensor has to route data from other sensors) and the reasons for the use of γ are presented in the following.

4.1 Neighbors, routing, and their inclusion in DECA

A given node may act as router for others. The sleeping period of node S i must consider the impact it may provoke on the transmission of the neighbor sensors that use it as a router. In lines 8–11 and 24–27 of Algorithm 1, the node verifies if there are packets to be forwarded. If not, then the inactivity period IP i [ n] depends solely on the quantities that the sensor measures and the ones already available at the sink for reconstruction. Otherwise, the actual inactivity period of the node must consider also the sleeping period of its neighbors.

Therefore, for router nodes, the inactivity period IP i of each network node S i must consider the inactivity periods of its neighbors (nodes that use S i as a router), because S i has to be awake to forward packets from them. DECA considers that by making the inactivity period of a sensor S i to be defined by
$$ \text{IP}_{i}[\!n] = \min{\left (\text{IP}_{i}[\!n],\{\text{IP}_{k}[\!n]\}_{k \in \text{SN}_{i}} \right) }, $$
where each IP k [ n] represents the inactivity period of each neighbor of S i and SN i represents the set of neighbors of S i . In this work, Eq. (30) is applied at each sensor node in the WSN, since any of them can act as a router. The impact and effectiveness of such an strategy are evaluated in following sections. Figure 4 exemplifies a node scenario with its neighboring nodes; node S i is assumed to have #SN i neighboring nodes (in the example, there are four neighboring nodes— S j , S k , S l , and S m —whose packets are routed by node S i ).
Fig. 4

Example of a sensor role in a network

4.2 Some comments on DECA and its parameters

DECA aims at tracking the variation rate of the monitored process. Nodes should sleep for shorter periods when the monitored process varies more rapidly because they have to transmit more packets. Otherwise, nodes tend to sleep for larger periods when the variation of the monitored process reduces.

DECA has a very low complexity, as each node S i basically computes the bounds on IP i from Eqs. (28) and (29) and chooses the smallest value. If the node also acts as router then it computes the minimum among that bound and the inactivity periods received from neighbors. Each sensor needs to store just the last two measurements of the process and their corresponding measurements instants as well as the two last transmitted measurements and corresponding measurements instants. In the case the node is a router, it is also required to store a list with the inactivity periods of nodes that use it as a router.

As discussed, DECA employs three parameters: (1) an initial sampling interval (T granularity) or inactivity period (which is adjusted locally in each sensor regarding what it measures); (2) δ, the acceptable maximum fraction of distortion; and (3) the parameter γ used to augment the probability of the node to be awaken to forward packets from its neighbors.

The parameter T granularity is the initial sampling interval. It is adjusted by DECA as time goes by. The inactivity period is initially defined to be equal to T granularity. As the nodes sleep during their inactivity periods, samples are taken when the nodes wake up, and therefore it is inherent to DECA sampling the process at a non-uniform sampling rate whose elapsed time between samples is adaptively adjusted. One should note that this time lapse is not the period of the sensor clock, which, in actual deployments, for an awake sensor, is orders of magnitude shorter than this time lapse between successive samples. The parameter δ is defined considering the maximum percentage error allowed in the reconstruction process. The parameter γ is also defined for DECA deployment. The influences of both on DECA are thoroughly evaluated in the sequel.

4.3 Some comments on sensors clocks and sampling times

Synchronization of sensor nodes would require at least some message exchange among them, consuming energy. Therefore, sensor clocks may have small deviations from one to another. However, in our approach, sleeping intervals are computed neither in function of clock pulses nor using time instants. This somehow mitigates drift among sensors clocks. The sleeping interval is obtained from counting clock cycles; therefore, mismatches among sleeping periods are smaller than they would be if instead one considers sensor clock counts since their turning-on instants. Consequently, there is no large impairment on the network connectivity when altering sensor duty cycles as employed by DECA.

Figure 5 presents chronograms of sensor states (between awake or asleep) for nodes in a WSN. More specifically, the states in function of time for one relay and its two neighbors are presented as time goes by. The chronograms were obtained from a simulation run with time granularity of 1 s (sensors stay active during the granularity period). As presented in Algorithm 1, sensor nodes transmit their measurements when in the active state (if the variation of the measured quantity requires that). A relay listens, receives, and forwards transmissions from its neighbors and also acquires and transmits its own measurements. One notes that a sensor node may only transmit packets to its relay when in the active state. For the packet to be received, the relay must also be active. Consequently, only if there is an intersection (over time) between the active periods of the sensor node and its correspondent relay, the packet may be received (if there is no collisions or other reasons for outage in the physical layer). In addition, one readily notes from Fig. 5 that the relay node sleeps for shorter periods than sensor ones, an expected from Eq. (30) and Algorithm 1.
Fig. 5

Example of chronograms of the changes between active (awake) and inactive (asleep) states in a WSN with two sensors and one relay, for time granularity of 1 s

5 Performance evaluation

5.1 Energy model

We assume that each node operates switching between two states: (i) inactive—an energy saving state (sleep mode) [7], in which the sensor radio interface is switched off or (ii) active. In active state, a node is in one of four operation modes: (a) measuring, (b) processing, (c) transmission, and (d) receiving. Therefore, a state-based energy model is adopted in this work. We have extended the energy model in [19] —an empirical model for TELOS commercial hardware—to consider the different operation modes.

The energy consumption of a node is estimated as a function of the period of time in which the node stays in the inactive and the active state and in the different operation modes. Therefore, one can use
$$\begin{array}{*{20}l} \widehat{EC} = & t_{I}\times C_{I} + t_{A}\times C_{A} + t_{M}\times (C_{A} + C_{M}) + t_{P} \\ &\times (C_{A} + C_{P}) +t_{R}\times (C_{A} + C_{R}) + t_{T} \times (C_{A} + C_{T}), \end{array} $$

to evaluate energy consumption, in which t I , t A , t M , t P , t R , and t T are, respectively, the cumulative sum of intervals in which the node remains in inactive and active states, and in measuring, processing, receiving, and transmitting operation modes.

In the active state, a fixed consumption of 10 mJ/s is taken into account; this consumption does not consider performing any specific task. In the transmission mode, a linear relationship between energy consumption and the payload size of the transmitted packet was observed, while for reception, energy consumption was observed to be independent of payload size [20]. Moreover, a consumption of 0.034 mJ for transmitting 1 byte during 0.58 ms was observed [19]. Meanwhile, for reception and sleep modes, 62.4 and 1.8 mJ/s of consumption are reported [19], respectively. Summarizing, the associated consumptions to each state and mode of the energy model employed are presented in Table 1.
Table 1

Energy consumption parameters employed in the simulations

Node initial energy (J)


Transmission power (dBm)


Reception sensibility (dBm)


Radio range (m)


C I : Inactive state consumption (mJ/ s)


C A : Active state consumption (mJ/ s)


C M : Measuring mode consumption (mJ/ s)


C P : Processing mode consumption (mJ/ s)


C R : Rx mode cConsumption (mJ/ s)


C T : Tx mode cConsumption (mJ/ s)


Payload size (byte)


5.2 Simulation scenario

WSNs monitoring environmental data (temperature and humidity signals) are considered. Data comes from the WSN of the Intel Berkeley Research lab, where for more than a month, 54 nodes sensed environmental data [21, 22]. These data correspond to temperature and humidity signals (among others), which indeed depend on the sensor node coordinates x i and y i and on time t (i is the index of a given node S i ); we use s T i (t)=s T (x i ,y i ,t) and s H i (t)=s H (x i ,y i ,t), to refer to them, respectively.

A multi-hop communication model is considered, using the ad-hoc on demand distance vector (AODV) routing protocol [23, 24], in order to forward packets hop-by-hop from sources to the sink. Initially, a WSN with 15 of the 54 nodes of the Berkeley WSN is considered. The sink node is located in the position of node S 20 of [21], (0.5,17) in meters. Coordinates are relative to the upper right corner of the lab. In each simulation run, the positions of the 14 sensor nodes are drawn from the remaining 53 nodes.

The presented simulations consider as benchmark a WSN at which nodes sample and transmit the sensed variable at R s =1/T granularity. DECA starts with the same value for sensors inactivity periods. However, this value is adjusted for each and every sensor, as samples are taken and packets are transmitted. In addition, sensors are considered to have an initial energy of 2J stored in their batteries.

We consider that all sensor values are correct, without noise. As the sensed process is reconstructed at sink, DECA imposes that the reconstruction error has to be kept within an acceptable distortion criterion, defined by δ.

Simulations were performed using TrueTime 1.5 [25], an environment based in MatLab/Simulink, and the network standard was the IEEE 802.15.4 [26, 27]. The CSMA/CA MAC sublayer protocol with no beacons is employed, and therefore, packet losses can occur due to collisions. We also consider a log-distance path loss model as a propagation model.

5.3 Evaluation criteria

The criteria used to evaluate the results obtained with DECA are:
  • Reconstruction error: This is defined in Eq. (4). In addition, to obtain a more precise evaluation of the reconstruction error, we employ the cumulative distribution function (CDF) of it in our analyses.

  • Transmission decrease: This evaluates the reduction in the amount of transmissions (in %) as compared to a network without any energy management—for identical node positions and operation starting times.

  • Lifetime: As pointed out in Section 1, we adopt as network lifetime the elapsed time until the first node exhaust its energy.

  • Lifetime increase: This evaluates the increase of the network lifetime in percentage, by comparing the network lifetime using DECA against the lifetime of the network (for identical node positions and operation starting times) without any energy management scheme.

  • Packet delivery ratio: This is the ratio between the amount of received packets and the amount of transmitted packets.

  • Success ratio: This is the ratio between the amount of packets that a node S i has forwarded to the sink S r and the amount of packets that its neighbors forwarded to it, that is, the success ratio considers all packets that S i has to forward, even if it is sleeping. Therefore, one defines
    $$ \text{SR}_{i} = \frac{\sum_{j=1}^{N} \text{forwarded} \; \text{packets}_{i}^{j \dots N}}{\sum_{j=1}^{N} \text{forwarded} \; \text{packets}_{j \dots N}^{i}}, $$

    in which i is the index of a relay node S i , and jN are the indexes of each neighbor of S i . This metric aims at evaluating the amount of packets that may have been lost by a given relay S i .

The success ratio of S i in forwarding packets from its neighbors may vary with its inactivity period IP i . If S i sleeps for a long period, in order to save energy, then a reduction in the success ratio may be observed due to possible packet losses. Then, a direct influence of γ on the success ratio is expected. Another relevant issue that must be investigated is the influence of the quantity of neighboring nodes #SN i that use S i as relay node on the success ratio. One can expect the success ratio to be affected by #SN i . Figure 4 presents an example in which node S i forwards packets from its neighbors SN i ={S j ,S k ,S l ,S m } to a sink node S r . We employ such scenarios both to evaluate the success ratio and to analyze the network connectivity. More specifically, the effects caused by (1) the factor γ and (2) the amount of nodes using S i as a router in both success ratio and packet delivery ratio are addressed.

6 Results

Initially, we consider a fifteen-node WSN used to sense temperature and humidity real data that uses a multi-hop communication to forward packets from sensor nodes to the sink. For the presented results, γ=0.5 (the effects of γ are investigated in Section 6.2) and threshold δ values of 1, 2, 5, and 8 % are used. Each simulation scenario is run ten times (randomly selecting the 15 nodes composing the WSN from the 54 possible ones), and 95 % confidence intervals for the mean are used when applicable in result graphs, where these intervals are represented by vertical bars.

Results are presented in four subsections, aiming at evaluating different aspects. In the first subsection, the objective is to evaluate the proposed algorithm in augmenting network lifetime, while keeping the error within a predefined fraction. In the second subsection, one aims at evaluating how relay nodes behave when executing the algorithm. In the third, it is investigated how the algorithm behaves in terms of network scalability; networks of different sizes are considered. In the fourth, one aims at investigating the impact of the time granularity in the simulations with DECA, so that possible bias in the evaluation criteria can be overcome.

6.1 Overall algorithm evaluation

Figure 6 presents the percentage reduction in the amount of transmissions and the network lifetime increase, in function of δ, for the monitored environmental data: temperature and humidity. The percentages are computed with respect to networks without any energy management strategy; nodes take measures and transmit them periodically at T granularity. We consider a T granularity of 0.1 s. It should be noted that the actual sampling rate used in the WSN in [21] was 31 s. Here, we assume that the data from [21] is originally sampled at 0.1 s instead of 31 s, that is, as if the process were faster than it originally is. The results for other sampling rates are presented in Section 6.4. Figure 6 shows that increasing δ leads to a reduction of transmissions and therefore augments the network lifetime. Increasing δ makes nodes transmit measured samples with greater variation rates because a larger reconstruction error is allowed. Therefore, nodes may have larger sleeping periods and then transmit fewer measurements. Figure 6 shows gains in the network lifetime of up to 1000 % as compared to a WSN without any energy management.
Fig. 6

Transmission decrease and lifetime increase ×δ

Figure 7 shows the cumulative distribution function (CDF) of the reconstruction error of the monitored signals (temperature and humidity) for the different δ. These curves allow to evaluate if the reconstruction error is kept within the desired threshold δ. The increase of δ leads to the increase of the largest reconstruction error. This behavior is in consonance with results presented in Fig. 6 and derives from the fact that as δ increases, fewer samples are used to reconstruct the monitored signals. However, more important is to observe in Fig. 7 that the reconstruction error is always smaller than the set threshold (δ). In order to show that explicitly, Table 2 shows the maximum percentage reconstruction error, in function of the parameter δ, for the two monitored fields. It can be verified that the imposed constraint (reconstruction error within a desired fractional margin) is satisfied in all cases.
Fig. 7

Reconstruction error CDF of temperature and humidity signals

Table 2

Maximum percentage reconstruction error (emax) ×δ

δ (%)

Emax (%)—temperature

Emax (%)—humidity













We can observe from Fig. 7 and from the data in Table 2 that the reconstruction error for humidity is greater than for temperature. In order to understand this, we evaluate the variation rate of the monitored signals. Using their partial derivatives, we have
$$ sT^{\prime}_{i}(t) = \frac{\partial sT_{i}(t)}{\partial t} \textrm{and } sH^{\prime}_{i}(t) = \frac{\partial sH_{i}(t)}{\partial t}. $$

This provides an idea of the process variation rates. Considering all sensor nodes and sensoring time, for the temperature field, the maximum of this rate is 0.0294 °C/s, and for the humidity field, the maximum is 0.202 %/s. The means of these variation rates are 0.00002 °C/s and 0.00051 %/s, respectively. The humidity signal presents a larger variation rate than the temperature signal, being thus a faster process. As DECA considers the variation rate of the signal, the greater the variation rate, the higher the number of required transmissions. Thus, DECA requires more transmissions for monitoring humidity than for temperature, an inherent feature of the adaptiveness of DECA. This explains the less significant lifetime increase (LI) when monitoring humidity, as shown in Fig. 6. In addition, when using DECA, as the variation rate decreases, nodes tend to sleep for larger time periods. For example, considering δ=2 %, the means of the inactivity periods over all nodes and times are 3.7118 and 1.1659 s when DECA is applied for monitoring temperature and humidity, respectively; the maximum values of the inactivity periods are 14.6594 and 10.4643 s, respectively. These values show that DECA correctly adapts the sleeping periods of sensor nodes according to the behavior of the physical quantity being monitored.

Table 3 shows the packet delivery ratio (PDR) for different δ when considering the monitoring of both signals. A 95 % confidence interval for the mean is also presented. PDRs above 90 % were obtained in all cases. For larger δ, nodes sleep more, impacting more severely network connectivity. Moreover, we verified smaller values of PDR for the case in which the nodes were monitoring humidity. Since this signal presents a larger variation rate, then more transmissions are required for it, which may cause more contention to access the medium and consequently collisions.
Table 3

Packet delivery ratio (PDR) ×δ

δ (%)

PDR (temperature)

PDR (humidity)


0.9774 ± 0.0045

0.9546 ± 0.0050


0.9750 ± 0.0045

0.9500 ± 0.0030


0.9420 ± 0.0050

0.9333 ± 0.0100


0.9180 ± 0.0150

0.9166 ± 0.0080

6.2 Relay nodes

We now analyze how DECA impacts WSN nodes that route packets for other nodes. In this scenario, the topology considered is exemplified in Fig. 4, in which node S i has to forward packets from its neighbors to the sink node S r . We consider cases in which S i has 1, 5, and 13 neighbors. The WSN is monitoring temperature and δ is set as 2 %. Since γ makes nodes sleep for a fraction of the computed inactivity periods, the values in the set {0.1,0.3,0.5,0.7,0.9} are examined. Figure 8 shows the evaluation of network connectivity in two perspectives: (i) micro, by analyzing the local connectivity of the relay with the success ratio metric and (ii) macro, by analyzing the packet delivery ratio metric. In each case, the presented results are means for ten runs and the 95 % confidence intervals are also shown.
Fig. 8

Success ratio and packet delivery ratio ×γ for δ=2.0 %

As γ increases, the node S i sleeps for a period of time closer to the minimum inactivity period among the ones of its neighbors. It is expected to augment the probability of S i not to forward packets from its neighbors because it may sleep for longer periods. In Fig. 8, we can see this behavior. As γ increases, there is a decrease in success ratio (SR). Furthermore, if S i has to forward packets from a larger number of neighbors, this situation worsens. For the same reason, it is also observed that as γ increases, PDR decreases, meaning that the network is losing connectivity.

Since in this work one aims at the energy-efficient reconstruction of a monitored process by a WSN, it is important to evaluate how γ affects the energy consumption of sensor nodes. For the topology exemplified in Fig. 4, where S i has to forward packets from its neighbors, one knows that the IP of S i (IP i ) is a function of the inactivity period of its neighbors and also of γ, as presented in Eq. (30). As γ(0,1), Eq. (30) implies that the smaller the γ value, the shorter the IP i . As a consequence, the smaller the γ, the lower the energy savings because the node wakes up more frequently and makes more transmissions. Figure 9 shows LI in function of γ, for δ=2 % when 1, 5, and 13 neighboring nodes (#SN i ) are served by S i as router. As expected, one observes that increasing γ leads to an increase of the network lifetime independently of #SN i because nodes can sleep for longer periods. When #SN i increases, the sleeping task becomes more critical as there are more packets to forward and the gain in network lifetime decreases, although these gains are still significant.
Fig. 9

Lifetime increase ×γ for δ=2.0 %

However, one should still ponder if connectivity and network lifetime are somehow related. Let S R γ , P D R γ , and L I γ be vectors containing the values of SR, PDR, and LI, respectively, for a given γ obtained with different runs. One can compute the correlation coefficient between S R γ and L I γ , between P D R γ and L I γ , and between P D R γ and S R γ , to evaluate the joint behavior of each variable pair. The correlations coefficients are given by
$$\begin{array}{*{20}l} \text{Corr}_{\gamma}(\text{SR},\text{LI}) & = \frac{\left \langle \mathbf{SR}_{{\gamma}},\mathbf{LI}_{{\gamma}} \right \rangle }{\| \mathbf{SR}_{{\gamma}} \|~ \| \mathbf{LI}_{{\gamma}} \|}, \end{array} $$
$$\begin{array}{*{20}l} \text{Corr}_{\gamma}(\textrm{PDR},\text{LI}) & = \frac{\left \langle \mathbf{PDR}_{{\gamma}},\mathbf{LI}_{{\gamma}} \right \rangle}{\| \mathbf{PDR}_{{\gamma}} \| ~ \| \mathbf{LI}_{{\gamma}} \|}, \text{and} \end{array} $$
$$\begin{array}{*{20}l} \text{Corr}_{\gamma}(\textrm{PDR},\text{SR}) & = \frac{\left \langle \mathbf{PDR}_{{\gamma}},\mathbf{SR}_{{\gamma}} \right \rangle}{\| \mathbf{PDR}_{{\gamma}} \| ~ \| \mathbf{SR}_{{\gamma}} \|}. \end{array} $$

In these, 〈x,y〉 is the inner product between x and y and x is the norm of x.

Figure 10 shows these correlations for DECA with δ=2 % with different neighboring nodes. The solid and dashed curves present the correlations between the success ratio and lifetime and between packet delivery ratio and lifetime, respectively. In these curves, it is observed that the absolute value of the correlation reaches the maximum at γ=0.5, where the statistical relationship is stronger.
Fig. 10

Correlations between SR and LI, between PDR and LI, and between PDR and SR. NN refers to the number of neighboring nodes

The dotted curves in Fig. 10 show the correlations between the packet delivery ratio and success ratio. Since both metrics decrease in function of γ (as seen in Fig. 8), their correlation is positive.

6.3 Network scalability

The increase in the number of nodes in a WSN may cause more transmissions and more contention for the physical medium. This may influence energy conservation by sensor nodes and network connectivity and also the reconstruction of the monitored process. Thus, we evaluate network lifetime, packet delivery ratio, and reconstruction error of the sensed field, considering WSNs having different quantities of sensors. The impact of the network scalability on DECA is evaluated considering the monitoring of temperature [21] with 15, 30, and 50 nodes; which translate into varying node density, since the monitoring area is unaltered.

Figure 11 shows LI in function of δ for the 15-, 30-, and 50-node WSNs. As expected, in the three cases, as δ increases also does LI (this was already observed in Fig. 6). One can also observe that for a given δ there is an increment in LI as the sensor density increases. Since network lifetime is defined here as the time period until the energy of the first node ends, the energy of routers may end sooner as the sensor density diminishes. If the WSN has more nodes then its sensor density increases and packet forwarding tasks can be shared among more routers, resulting in a better balance of energy consumption, redounding in the network lifetime increase.
Fig. 11

Lifetime increase ×δ

Another aspect that can be impacted by sensor density is network connectivity. The greater the number of nodes in the monitored area, the greater the number of transmissions, which could lead to an increase in the contention for the medium. This behavior may result in more collisions, thus affecting network connectivity. In Fig. 12, this is addressed by presenting the PDR for the three different network densities, where a decrease in the PDR can be observed as the quantity of nodes (network density) increases.
Fig. 12

Packet delivery ratio ×δ

Moreover, the impact of the scalability in network connectivity may affect the reconstruction of the monitored field. As packets are lost, there are fewer samples available to reconstruct the field. Corroborating this, one observes in Fig. 13 that the reconstruction error increases with the quantity of sensors in the network—the network density (Fig. 13 considers δ=1 %). However, from the graphs in Fig. 13, it is also verified that the constraint imposed by the algorithm of keeping the reconstruction error within a prescribed fraction is satisfied, even for the 50-node WSN.
Fig. 13

Reconstruction error CDF for δ=1.0 %

6.4 Time granularity

In the previous analyses, time granularity was 0.1 s; the process is assumed to be sampled at this rate, and the nodes of the WSN that we have compared DECA against simply sample the signal of interest at 0.1 s and transmit it to the sink. In this section, we investigate the performance of DECA when other time bases are considered. The aim of such study is to evaluate the performance of DECA for processes having different speeds in function of time. We do that by using three scenarios of different signal sampling rates 0.1, 1, and 31 s. For this experiment, one reconstructs the temperature signal and a fifteen-node WSN is used. We also set γ=0.5 and thresholds δ{1 %,2 %,5 %,8 %} are employed.

Figure 14 shows the percentage reduction in the amount of transmissions and the network lifetime increase, in function of δ, with respect to a WSN in which the sensors simply sample and transmit measurements to the sink, with T granularity=1 s. A significant reduction in the amount of transmissions on the network and a significant lifetime increase (of more than 120 %) are observed. These are similar to the results observed for T granularity=0.1 s. Albeit the transmission decrease is very similar in both cases, the gains in network lifetime are now smaller. This reduction in the gain of network lifetime is explained by the fact that the initial energy of nodes is the same (2J) for the two values of T granularity.
Fig. 14

Transmission decrease and lifetime increase ×δ, for a time-base value of 1 s

The cumulative distribution function (CDF) of the reconstruction error of the monitored temperature signal for different δ is presented in Fig. 15. It can be observed in Fig. 15 that the reconstruction error for T granularity=1 s is always smaller than the threshold, obeying the proposed constraint.
Fig. 15

Reconstruction error CDF of temperature signal, for a time-base value of 1 s

We increased the time granularity up to 31 s obtaining similar results. Table 4 shows the PDR for time-base values of 0.1, 1, and 31 s and different δ. Ninety-five percent confidence intervals for the mean are presented. PDRs around 90 % and above are obtained, showing that the network connectivity is sustained for the different scenarios.
Table 4

Packet Delivery Ratio (PDR) ×δ, for time-base values of 0.1, 1, and 31 s

δ (%)





(T granularity=0.1 s)

(T granularity=1 s)

(T granularity=31 s)


0.9774 ± 0.0045

0.9579 ± 0.0018

0.9182 ± 0.0013


0.9750 ± 0.0045

0.9543 ± 0.0012

0.8959 ± 0.0017


0.9420 ± 0.0050

0.9341 ± 0.0020

0.8944 ± 0.0013


0.9180 ± 0.0150

0.9106 ± 0.0033

0.8815 ± 0.0014

7 Conclusions

In this work, we proposed a distributed energy conservation algorithm (DECA) for WSNs, in order to increase the network autonomy in monitoring applications. DECA uses data about the sensed process that is available at a node to estimate measured values and sleeping periods. By design, DECA imposes the reconstruction error of the monitored process to be lower than a predefined value. This is done by using linear predictors; these allow to easily find bounds on the sleeping periods for each node.

In DECA, the decision of how long a node can sleep is taken locally by each sensor node, that is, it is distributed and decentralized. To consider data routing, nodes transmit their sleeping periods together with the monitored process data so that routers can account for that in their decisions to sleep or not. A sleeping period factor is used in DECA to increase the probability of a routing node to be awake to forward packets from its neighbors. Network relay is a key challenge for energy conservation is WSN. In order to investigate if relay nodes manage their routing and sleeping tasks appropriately when running DECA, we proposed to evaluate the success ratio, which accounts for network connectivity in a micro perspective (locally). We should notice that DECA can be used together with energy-aware routing algorithms to further improve the WSN autonomy.

DECA was evaluated by simulation using actual signals. The reconstruction error, the transmission decrease, and the network lifetime were obtained. Results corroborate (i) that the error of the reconstructed process at the sink is kept within the desired fraction imposed and also (ii) that network lifetime is increased as compared to WSNs were the nodes simply transmit data periodically. The results indicate that for larger networks, the network lifetime increases more. The larger the network, the more possible the emergence of energy balancing, as there are more relays for forwarding packets from sources to the sink. In addition, we observed a decrease in both success ratio and packet delivery ratio with the increase of the sleeping factor and also with the increase of the amount of neighboring nodes. At last, we observed that as the sleeping factor increases, energy conservation also increases because nodes can sleep for larger periods of time.



This work has been supported by FAPERJ and CNPq.

Competing interests

The authors declare that they have no competing interests.

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (, which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Authors’ Affiliations

Coordenação de Telecomunicações, Centro Federal de Educação Tecnológica Celso Suckow da Fonseca (CEFET/RJ)
Programa de Pós–Graduação em Engenharia Eletrônica, Faculdade de Engenharia


  1. IF Akyildiz WSu, Y Sankarasubramaniam, E Cayirci, Wireless sensor networks: a survey. Comput. Netw.38(4), 393Ű-422 (2002). doi:10.1016/S1389-1286(01)00302-4.View ArticleGoogle Scholar
  2. R Beckwith, D Teibel, P Bowmen, in Proceedings of the 2nd International Conference on Pervasive Computing. Pervasive computing and proactive agriculture (IEEEVienna Austria, 2004).Google Scholar
  3. U Raza, A Camerra, AL Mutphy, T Palpanas, GP Picco, in 2012 IEEE International Conference on Pervasive Computing and Communications. What does model-driven data acquisition really achieve in wireless sensor networks? (IEEELugano, 2012), pp. 19–23. doi:10.1109/PerCom.2012.6199853.Google Scholar
  4. R Szewczyk, E Osterweil, J Polastre, Habitat monitoring. Commun. ACM. 47(6), 393–422 (2002). doi:10.1016/S1389-1286(01)00302-4.Google Scholar
  5. ZM Wang, S Basagni, E Melachrinoudis, C Petrioli, in Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Exploiting sink mobility for maximizing sensor networks lifetime (IEEEHawaii, 2005), pp. 3–6. doi:10.1109/HICSS.2005.259.Google Scholar
  6. G Anastasi, M Conti, MD Francesco, A Passarella, Energy conservation in wireless sensor networks: A survey. Ad Hoc Networks. 7(3), 537–568 (2009). doi:10.1016/j.adhoc.2008.06.003.View ArticleGoogle Scholar
  7. PS Sausen, JRB Sousa, MA Spohn, A Perkisich, AMN Lima, in Proceedings of the 15th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems. Dynamic power management with scheduled switching modes in wireless sensor networks (IEEEIstanbul, 2007), pp. 1–8. doi:10.1109/MASCOTS.2007.20.Google Scholar
  8. IF Akyildiz, MC Vuran, OB Akan, in Proceedings of the Modeling and Optimization in Mobile, Ad Hoc and Wireless Sensor Networks. On exploiting spatial and temporal correlation in wireless sensor networks (IEEEUK, 2004), pp. 71–80.Google Scholar
  9. DO Cunha, RP Laufer, IM Moraes, MDD Bicudo, PB Velloso, OCMB Duarte, A bio-inspired field estimation scheme for wireless sensor networks. Ann. Telecommun. Special Issue Wirel. Sensor Netw. 60(7/8), 806–818 (2005). doi:10.1007/BF03219948.Google Scholar
  10. D Gao, L Zhang, H Wang, Energy saving with node sleep and power control mechanism for wireless sensor networks. J. China Univ Posts Telecommun.18(1), 49–59 (2011).View ArticleGoogle Scholar
  11. FR Henriques, L Lovisolo, MG Rubinstein, in Proceedings of the 7th International Telecommunications Symposium. An innovated-based algorithm for energy conservation in multihop wireless sensor networks (SBrTManaus Brazil, 2010).Google Scholar
  12. R Mah, A Tamhane, S Tung, A Patel, Process trending with piecewise linear smoothing. Comput. Chem. Eng.19(2), 129–137 (1995). doi:10.1016/0098-1354(94)E0042-L.View ArticleGoogle Scholar
  13. S Nguyen-Xuan, S Oh, A Sunshin, in Advanced Communication Technology (ICACT), 2014 16th International Conference On. Ee-mac: Energy Efficient-Medium Access Control for Periodic Applications in Border Surveillance Wireless Sensor Networks (IEEEPyeongchang, 2014), pp. 693–697.Google Scholar
  14. M Sha, G Hackmann, C Lu, in Proceedings of the 12th International Conference on Information Processing in Sensor Networks. Energy-Efficient Low Power Listening for Wireless Sensor Networks in Noisy Environments (ACMPhiladelphia, PA, 2013), pp. 277–288.Google Scholar
  15. L Tang, Y Sun, O Gurewitz, DB Johnson, in INFOCOM, 2011 Proceedings IEEE. Pw-mac: An Energy-Efficient Predictive-Wakeup Mac Protocol for Wireless Sensor Networks (IEEEShanghai, 2011), pp. 1305–1313.View ArticleGoogle Scholar
  16. R Ramanathan, R Rosales-Hain, in INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 2. Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment (IEEETel Aviv, 2000), pp. 404–413.Google Scholar
  17. WR Heinzelman, A Chandrakasan, H Balakrishnan, in System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference On. Energy-Efficient Communication Protocol for Wireless Microsensor Networks (IEEEHawaii, 2000), p. 10.View ArticleGoogle Scholar
  18. X-C Hao, M-Q Wang, S Hou, Q-Q Gong, B Liu, Distributed topology control and channel allocation algorithm for energy efficiency in wireless sensor network: from a game perspective. Wirel. Pers. Commun.80(4), 1–21 (2014).Google Scholar
  19. Y Panthachai, P Keeratiwintakorn, in Proceedings of the 4th International Joint Conference on Computer Science and Software Engineering. An energy model for transmission in telos-based wireless sensor networks (Khon Kaen UniversityKhon Kaen, Thailand, 2007).Google Scholar
  20. J Polastre, R Szewczyk, D Culler, in Proceedings of the 4th International Symposium on Information Processing in Sensor Networks. Telos: Enabling ultra-low power wireless research (IEEE, 2005), pp. 364–369. doi:10.1109/IPSN.2005.1440950.
  21. labwsn IB, (2004). > Accessed 6 May 2016.
  22. A Deshpande, C Guestrin, SR Madden, JM Hellerstein, W Hong, in Proceedings of the Thirtieth International Conference on Very Large Data bases-Volume 30. Model-Driven Data Acquisition in Sensor Networks (VLDB EndowmentToronto, 2004), pp. 588–599.Google Scholar
  23. MEM Campista, MG Rubinstein, Advanced routing protocols for wireless networks, 1st edn. (Wiley-IEEE Press, Hoboken, NJ, 2014). ISBN: 978-1-84821-627-3.View ArticleGoogle Scholar
  24. C Perkins, E Belding-Royer, S Das, in RFC 3561. Ad hoc on demand distance vector routing (aodv) (IETF, 2003).Google Scholar
  25. A Cervin, D Herinksson, B Lincoln, J Eker, K-E Arzén, How does control timing affect performance? analysis and simulation of timing using jitterbug and truetime. IEEE Control Systems Magazine. 23(3), 16–30 (2003). doi:10.1109/MCS.2003.1200240.View ArticleGoogle Scholar
  26. J Zheng, MJ Lee, A comprehensive performance study of ieee 802.15.4. Sensor Netw. Oper. IEEE Press Wiley Intersci. Chapter 4:, 218–237 (2006).Google Scholar
  27. P Baronti, P Pillai, V Chook, S Chessa, A Gotta, YF Hu, Wireless sensor networks: a survey on the state of art and the 802.15.4 and zigbee standards. Comput. Commun.30(7), 1655–1695 (2007). doi:10.1016/j.comcom.2006.12.020.View ArticleGoogle Scholar


© da Rocha Henriques et al. 2016