766 ieee transactions on industrial informatics, vol. … · 766 ieee transactions on industrial...

8
766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014 An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks Degan Zhang, Member, IEEE, Guang Li, Member, IEEE, Ke Zheng, Member, IEEE, Xuechao Ming, Member, IEEE, and Zhao-Hua Pan, Member, IEEE Abstract—As an important part of industrial application (IA), the wireless sensor network (WSN) has been an active research area over the past few years. Due to the limited energy and com- munication ability of sensor nodes, it seems especially important to design a routing protocol for WSNs so that sensing data can be transmitted to the receiver effectively. An energy-balanced routing method based on forward-aware factor (FAF-EBRM) is proposed in this paper. In FAF-EBRM, the next-hop node is selected ac- cording to the awareness of link weight and forward energy den- sity. Furthermore, a spontaneous reconstruction mechanism for local topology is designed additionally. In the experiments, FAF- EBRM is compared with LEACH and EEUC, experimental results show that FAF-EBRM outperforms LEACH and EEUC, which balances the energy consumption, prolongs the function lifetime and guarantees high QoS of WSN. Index Terms—Energy balance, forward-aware factor (FAF), industrial application (IA), routing, wireless sensor networks (WSNs). I. INTRODUCTION I T is well known that wireless sensor networks (WSNs) is a self-organization wireless network system constituted by numbers of energy-limited micro sensors under the banner of industrial application (IA) [1], [2]. Nowadays, WSN is widely used as an effective medium to integrate physical world and information world of IA [3]–[6]. In the sensor networks, each sensor node is both a sensor and a router, and its computing ability, storage capacity, communica- tion ability, and power supply are limited. Therefore, the design of network topology, routing algorithm, and protocol is the most fundamental and key work in the study of the large-scale WSN Manuscript received October 09, 2012; revised December 07, 2012, January 08, 2013; accepted January 31, 2013. Date of publication March 07, 2013; date of current version December 12, 2013. This work was supported by The National High Technology Research and Development Program of China under Grant 2007AA01Z188, The National Natural Science Foundation of China under Grant 61170173, Grant 61202169, Grant 60773073, and Grant 61001174, the Program for New Century Excellent Talents in University under Grant NCET-09-0895, and The Natural Science Foundation of Tianjin under Grant 10JCYBJC00500. Paper no. TII-12-0710. D. Zhang is with the Tianjin Key Lab of Intelligent Computing and Novel Software Technology, Key Lab of Computer Vision and System, Ministry of Education, Tianjin University of Technology, Tianjin 300384, China (e-mail: [email protected]). G. Li is with Daqing Geophysical Exploration Company, Daqing, Hei- longjiang Province 163357, China, and also with the Tianjin Key Lab of Intelligent Computing and Novel Software Technology, Tianjin University of Technology, Tianjin 300384, China (e-mail: [email protected]). K. Zheng, X. C. Ming, and Z.-H. Pan are with the Tianjin Key Lab of Intelligent Computing and Novel Software Technology, Tianjin Univer- sity of Technology, Tianjin 300384, China (e-mail: [email protected]; [email protected]; [email protected]). Digital Object Identier 10.1109/TII.2013.2250910 communication system [7]–[12]. In recent years, in order to bal- ance the energy consumption and maintain coverage and con- nectivity, multiple mechanisms are applied to WSN topology control and routing designing [13], [14]. Most of the real networks of IA, independent of their age, function, and scope, converge to similar architectures [15], [16], therefore researchers tried to build a unied model for complex networks in the last decades. In [17], Erdös and Rényi propose ER random graph model based on classic graph theory and sta- tistical physics. In [18], the small-world property of complex network is found by Watts and Strogatz, who establish the WS small-world network model. In [19], Barabási and Albert build the BA model, which reveals the scale-free characteristic of complex networks. In [20], the BBV weighted network model is created by Barrat, Barthélemy, and Vespignani; this model not only denes the strength of connections, but also takes the change of connection strength into consideration, which makes the model closer to real network of IA. Nowadays, BBV model is widely used to analyze the real complex networks such as scientist collaboration network (SCN) and worldwide airport network (WWAN) [21]–[23]. Similar to SCN and WWAN, there are numerous nodes and community structures (clusters) in WSN, important nodes (cluster heads) have more connections than common nodes. Many researches on “energy hole” show that the data ow on each connection varies considerably in WSN because of these different distances to the sink node. Thus, it is not suitable to represent a connection as connected (“1”) or connectionless (“0”). Furthermore, global information is limited in WSN of IA sensors exchange information in their “local-world”. Overall, weighted network and local-world theory is appropriate to model WSN of IA. We study the large-scale WSN for static data collection and event detection under the banner of under the banner of In- dustrial application. It takes the balance routing of energy dis- tribution into account. Based on the detailed analysis of the data transmission mechanism of WSN, we quantify the forward transmission area, dene forward energy density, which consti- tutes forward-aware factor with link weight, and propose a new energy-balance routing protocol based on forward-aware factor (FAF-EBRM). Thus balances the energy consumption, prolongs the function lifetime. II. RELATED WORKS A. Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol LEACH protocol is one of the most famous WSN hierarchical routing algorithms. In LEACH, the nodes organize themselves 1551-3203 © 2013 IEEE

Upload: others

Post on 22-Sep-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. … · 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014 An Energy-Balanced Routing Method Based

766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014

An Energy-Balanced Routing Method Based onForward-Aware Factor for Wireless Sensor NetworksDegan Zhang, Member, IEEE, Guang Li, Member, IEEE, Ke Zheng, Member, IEEE, Xuechao Ming, Member, IEEE,

and Zhao-Hua Pan, Member, IEEE

Abstract—As an important part of industrial application (IA),the wireless sensor network (WSN) has been an active researcharea over the past few years. Due to the limited energy and com-munication ability of sensor nodes, it seems especially importantto design a routing protocol for WSNs so that sensing data can betransmitted to the receiver effectively. An energy-balanced routingmethod based on forward-aware factor (FAF-EBRM) is proposedin this paper. In FAF-EBRM, the next-hop node is selected ac-cording to the awareness of link weight and forward energy den-sity. Furthermore, a spontaneous reconstruction mechanism forlocal topology is designed additionally. In the experiments, FAF-EBRM is compared with LEACH and EEUC, experimental resultsshow that FAF-EBRM outperforms LEACH and EEUC, whichbalances the energy consumption, prolongs the function lifetimeand guarantees high QoS of WSN.

Index Terms—Energy balance, forward-aware factor (FAF),industrial application (IA), routing, wireless sensor networks(WSNs).

I. INTRODUCTION

I T is well known that wireless sensor networks (WSNs) isa self-organization wireless network system constituted by

numbers of energy-limited micro sensors under the banner ofindustrial application (IA) [1], [2]. Nowadays, WSN is widelyused as an effective medium to integrate physical world andinformation world of IA [3]–[6].In the sensor networks, each sensor node is both a sensor and

a router, and its computing ability, storage capacity, communica-tion ability, and power supply are limited. Therefore, the designof network topology, routing algorithm, and protocol is the mostfundamental and key work in the study of the large-scale WSN

Manuscript received October 09, 2012; revised December 07, 2012, January08, 2013; accepted January 31, 2013. Date of publication March 07, 2013;date of current version December 12, 2013. This work was supported by TheNational High Technology Research and Development Program of Chinaunder Grant 2007AA01Z188, The National Natural Science Foundation ofChina under Grant 61170173, Grant 61202169, Grant 60773073, and Grant61001174, the Program for New Century Excellent Talents in University underGrant NCET-09-0895, and The Natural Science Foundation of Tianjin underGrant 10JCYBJC00500. Paper no. TII-12-0710.D. Zhang is with the Tianjin Key Lab of Intelligent Computing and Novel

Software Technology, Key Lab of Computer Vision and System, Ministry ofEducation, Tianjin University of Technology, Tianjin 300384, China (e-mail:[email protected]).G. Li is with Daqing Geophysical Exploration Company, Daqing, Hei-

longjiang Province 163357, China, and also with the Tianjin Key Lab ofIntelligent Computing and Novel Software Technology, Tianjin University ofTechnology, Tianjin 300384, China (e-mail: [email protected]).K. Zheng, X. C. Ming, and Z.-H. Pan are with the Tianjin Key Lab of

Intelligent Computing and Novel Software Technology, Tianjin Univer-sity of Technology, Tianjin 300384, China (e-mail: [email protected];[email protected]; [email protected]).Digital Object Identifier 10.1109/TII.2013.2250910

communication system [7]–[12]. In recent years, in order to bal-ance the energy consumption and maintain coverage and con-nectivity, multiple mechanisms are applied to WSN topologycontrol and routing designing [13], [14].Most of the real networks of IA, independent of their age,

function, and scope, converge to similar architectures [15], [16],therefore researchers tried to build a unified model for complexnetworks in the last decades. In [17], Erdös and Rényi proposeER random graph model based on classic graph theory and sta-tistical physics. In [18], the small-world property of complexnetwork is found by Watts and Strogatz, who establish the WSsmall-world network model. In [19], Barabási and Albert buildthe BA model, which reveals the scale-free characteristic ofcomplex networks. In [20], the BBV weighted network modelis created by Barrat, Barthélemy, and Vespignani; this modelnot only defines the strength of connections, but also takes thechange of connection strength into consideration, which makesthe model closer to real network of IA.Nowadays, BBV model is widely used to analyze the real

complex networks such as scientist collaboration network(SCN) and worldwide airport network (WWAN) [21]–[23].Similar to SCN and WWAN, there are numerous nodes andcommunity structures (clusters) in WSN, important nodes(cluster heads) have more connections than common nodes.Many researches on “energy hole” show that the data flow oneach connection varies considerably in WSN because of thesedifferent distances to the sink node. Thus, it is not suitable torepresent a connection as connected (“1”) or connectionless(“0”). Furthermore, global information is limited in WSN of IAsensors exchange information in their “local-world”. Overall,weighted network and local-world theory is appropriate tomodel WSN of IA.We study the large-scale WSN for static data collection and

event detection under the banner of under the banner of In-dustrial application. It takes the balance routing of energy dis-tribution into account. Based on the detailed analysis of thedata transmission mechanism of WSN, we quantify the forwardtransmission area, define forward energy density, which consti-tutes forward-aware factor with link weight, and propose a newenergy-balance routing protocol based on forward-aware factor(FAF-EBRM). Thus balances the energy consumption, prolongsthe function lifetime.

II. RELATED WORKS

A. Low Energy Adaptive Clustering Hierarchy (LEACH)Protocol

LEACH protocol is one of themost famousWSNhierarchicalrouting algorithms. In LEACH, the nodes organize themselves

1551-3203 © 2013 IEEE

Page 2: 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. … · 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014 An Energy-Balanced Routing Method Based

ZHANG et al.: ENERGY-BALANCED ROUTING METHOD BASED ON FORWARD-AWARE FACTOR FOR WSNs 767

into local cluster, the protocol is divided into a setup phase whenthe clusters are organized and a steady-state phase when dataare transferred from the nodes to the cluster head and on to thesink [1]–[3]. In the setup phase, each node choose a randomnumber between 0 and 1, if this number is less than a certainthreshold T(n), the node will broadcast itself as the cluster head.The noncluster head node chooses the cluster head with greatersignal strength and join the cluster, and then the cluster headnode receives data from all of the cluster members and transmitsdata to the remote sink [4]–[7]. The threshold is given by

else(1)

where is the percentage of the cluster heads account for allthe sensor node, is the current number of round, and is theset of nodes that have not been a cluster head.In the steady-state phase, data are transferred from the nodes

to the cluster head and on to the sink. After each round, a newcluster head will be chosen, and in this way the energy load ofbeing a cluster head is evenly distributed among the nodes.

B. Energy-Efficient Uneven Clustering (EEUC) Protocol

EEUC is an uneven clustering routing protocol in which ten-tative cluster heads use uneven competition ranges to con-struct clusters of uneven sizes [8]–[11]

(2)

where and are the furthest distance and the closestdistance between sink and nodes, is the distance be-tween and Sink (here is index number of the nodes), isthe maximum of the competition ranges (which is a fixed value,but is changeable, in order to show their difference, so markit ), the value of is between 0 and 1 based on the value ofcompetition ranges. It shows that the clusters closer to the sinkhave smaller sizes than those farther away from the sink, thusthe cluster heads closer to the sink can preserve some energy forthe inter-cluster data forwarding.

III. BASIC BBV WEIGHTED NETWORK MODEL ANDLOCAL-WORLD THEORY

Based on our research work, we know the topology evolvingof BBV model can be divided into four stages as follows [20].1) Initialization. The initial network contains nodes and afew edges . Here, is the initial weight, andthe variable parameter of weight is .

2) Growth of topology. At each time step, a new node withedges joins the existing network.

3) Preferential attachment. The existing nodes are preferen-tially attached by edges in step 2) with probabilityas follows:

(3)

where means node to node , the vertex strengthis defined as the sum of edge weights connected to it:

is the weight between node and

Fig. 1. Change of node strength.

node is the set of neighbor nodes (directly connectto node ). The vertex strength is similar.

4) Update of strength and weights (as shown in Fig. 1).The addition of edge not only changes the strength of, but also changes the weights between and its neighbors

(4)

where

(5)

Here, is a positive or negative increment. After the update,repeat steps 2)–4), until the evolving is completed. As an as-sumption, letting , when , the distribution ofedge weight is

(6)

The distribution of the node degree is

(7)

and the distribution of node strength is

(8)

where

(9)

Here also is a positive or negative increment. In a local-worldevolving network model is proposed by Li and Chen [10]. Thestudy shows that, in the real network, a node can only connectto special group of nodes rather than any node in the wholenetwork. nodes are randomly selected from existing nodes asthe local world of the new node , and preferential attachmentprobability is defined as

(10)

where

(11)

Here, nodes from the existing network as thelocal world of new sensor node together with new edges, andis time parameter. In the BBV model, existing nodes fromthe entire network are selected to connect to the new node ,

Page 3: 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. … · 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014 An Energy-Balanced Routing Method Based

768 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014

which is not feasible in a WSN of IA due to the limited com-munication range and energy of sensors. Thus, the local-worldtheory is needed, that is to say, can only connect to the sen-sors within a specific range. Similarly, in SCN, scientists tendto cooperate with others who work in the same country or disci-pline; in WWAN, the length of a flight is always shorter than themaximum range of a plane, which can be seen as the examplesof the local world [10]–[13].

IV. FORWARD-AWARE FACTOR–BASED ENERGY-BALANCEDROUTING METHOD

Based on the detailed analysis of the data transmission mech-anism of WSN, we quantify the forward transmission area,define forward energy density, which constitutes forward-awarefactor with link weight, and propose a new energy-balancerouting protocol based on forward-aware factor, thus balancingthe energy consumption and prolonging the function lifetime.

A. Network Model

As shown in Fig. 2, suppose sensor nodes are randomly dis-tributed in a rectangular sensing field. Data are sent to theregional central node (cluster head), then transferred to the sinknode (Sink). The descriptions and definitions are as follows.1) All sensor nodes are isomorphic, and they have limitedcapabilities to compute, communicate and store data. Theset of sensor nodes is defined as andis the total number of nodes, . Here, is

the identifier for a node.2) The energy of sensor nodes is limited, and the initial energyis . Nodes die after exhausting energy entirely. However,the energy of the sink node can be added. Locations ofnodes and Sink do not change after being fixed, and a nodecannot obtain the absolute position depend on its own lo-cation device.

3) Nodes can vary transmission power according to the dis-tance to its receiver. The sink node can broadcast mes-sage to all sensor nodes in the sensing field. The distancebetween the signal source and receiver can be computedbased on the received signal strength. Regional centralnodes are not selected at the beginning, on the contrary,they spring up during the topology evolution. Importancenodes have more connections, whose degree and intensityare significantly higher than neighbor nodes.

The energy model is the free space model [8]. The energyspent for sending a -bit packet over distance is

(12)

where

(13)

Fig. 2. Distribution map of sink and sensor node.

and are the energy coefficients. The energy spent forreceiving data is defined as

(14)

where is a fixed energy value spent for sending 1-bit data.When the data transmission distance is larger than threshold ,the energy consumption would rise sharply, so the maximumcommunication radius of common sensor nodes is set to .Definition 1: As shown in Fig. 2, the distance between and

Sink is and is given by

(15)

Definition 2: As shown in Fig. 2, the communication radiuscan be controlled, in order to construct a topology with unevenclusters, when is the cluster head, the cluster radius is :

(16)

where is a function for , and

(17)

Definition 3: At time , the weight between and isgiven by

(18)

where are non-negative constants, and areresidual energy, is the distance between two nodes, and

is the data flow of the edge (communication link) . Setthe distance from to Sink farther than , and then

(19)

where is a decreasing function ofand an increasing function of time . The amount of data issmaller when the edge-end node is farther away from sink node.

Page 4: 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. … · 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014 An Energy-Balanced Routing Method Based

ZHANG et al.: ENERGY-BALANCED ROUTING METHOD BASED ON FORWARD-AWARE FACTOR FOR WSNs 769

Fig. 3. Forward transmission area.

As time goes on, the amount of data becomes larger with the in-crease of nodes. In this definition, edge weight representsthe communication capacity. In (18), when is long, thedata transmission tends to choose a short-distance link. Sim-ilarly, when is large, the communication link is busy,the data transmission choose low-load link firstly. Energy playsa key role in edge weight, when the residual energy of andis sufficient, (the edge from to ) is stronger for data

transmission.

B. Establishment of the Model

Definition 4: The forward transmission area of node is. Fig. 3 shows that is a circle with Sink as the center

and as the radius, is a circle with as the center,and as the radius:

(20)

(21)

where is the set of nodes that have communication linkwith node is the set of nodes of that have an edgewith node , and is the distance of node and node .Fig. 3 shows that, in WSN clustered hierarchical routing pro-

tocols, sometimes nodes of a cluster are closer to the sink thanthe cluster head is, but it should transmit data to the head node.If this backward transmission is frequent (in fact, about 1/2 ofthe possibility), it must result in a waste of energy.This paper proposes a communication protocol that uses for-

ward transmission area according to the position of sink andthe final data flow direction. In Fig. 1, the arc of ruled outthe possibility of node ’s backward transmission, which ensurethat there will be no loops. contains all of the nodes thatdirectly connected with node . As an area that satisfy the tworequirements, is the overlap section of the two circles,which contains all of the possible next nodes under topologyand routing algorithm of this paper.

Fig. 4. Minimum area of .

Theorem 1: Based on (21), the area of isand is given by

(22)

Proof: In fact, ,the area of sector is , the area of arch is , and hereis a symbol of sector. According to the Cosine Theorem, we

have

(23)

According to Helen Theorem , we have

(24)

Thus

(25)

(26)

(27)

(28)

Case 1: As shown in Fig. 4, if the sink is a neighbor of node, sink will be the furthest neighbor it is the final informationsource of the whole network. Thus, , according to (20),and the minimum area of is .Case 2: As shown in Fig. 5, if tends to infinity, the max-

imum area of is . When the radius of is in-finity, its arc that passes the center of tends to be a straightline, approximately dividing equally. Thus, the limitation of

can be half the area of . Theorem 1 is proven.Lemma 1: The area of fulfills the inequality

(29)

where is the communication radial limitation of the normalsensor nodes.

Page 5: 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. … · 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014 An Energy-Balanced Routing Method Based

770 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014

Fig. 5. Maximum area of .

Proof: When node is infinitely close to Sink, approxi-mately equals 0, so the minimum of tends to 0 but doesnot equal 0. When the distance is infinity, the communicationradius of node is the limitation . The maximum oftends to be . Lemma 1 is proven.Definition 5: The node’s forward energy density

fulfills the equality

(30)

where is the energy value of node at time andis all of the neighbors’ energy combined in

function .Lemma 2: When fulfills the inequality:

(31)

where is the same energy value of all of the nodes attime 0.

Proof: In Fig. 5, if node has only one neighbor with dis-tance , FTA is defined by this neighbor. The area is maximum,and the whole energy is minimum (only one node’s energy), so

is minimum. When node is infinitely close to Sink,tends to 0, so is maximum and tends to in-

finity. Lemma 2 is proven.Definition 6: The forward-aware factor of the communica-

tion link between node and node is given by

(32)

where is all of the neighbors’ FAF com-bined in . The weight of edge is defined as (18).

is all of the link weights combined that has inFTA, and are positive harmonic coefficients, and

(33)

C. Design of the FAF-EBRM

FAF-EBRM is used for the large-scale WSN for static datacollection and event detection. In (30), the first term takes theFED of all of the possible next-hop nodes into account, which

TABLE IROUTING PARAMETERS OF NODES

means the ability to transmit data. The second term considersthe weight of transmit link, which can be used to choose thenext-hop node directly. Because the definition of the weight ofedge in (32) considers parameters like nodes’ energy, length,and load, the routing algorithm based on FAF is able to considermany factors and get a better energy-balanced solution.The routing algorithm can be divided into seven stages as

follows.1) Determine and all of the possible next-hop nodesof node . First, take as the communication radius, de-termine the set of all of the nodes that have edges with

. Select the nodes that closer to Sink than does,which constitute the set of all of the possible next-hopnodes and the furthest node determine .

2) Determine and of each possible next-hopnode. Determine as we determined . Plugthe furthest distance between and nodes in FTA and thedistance between and Sink into (28) and obtain .

3) Calculate of each possible next-hop node. Plug allof the nodes’ energy into (31) and get .

4) Calculate the weight of edges between and each nodesaccording to (18).

5) Plug the parameters of 3) and 4) into (32) and calculateFAF of each possible transmit link. Choose the next-hopnode according to

(34)

6) If there is no node closer to Sink than in , directlycompare FAF of all of the nodes in , and choose thenext-hop node according to (33). If there is no node in

will increase the transmit power to get a longerradius than until connected with another node, or willabandon the packet.

7) If Sink is among the forward transmit nodes, will transmitdata directly to Sink and accomplish the procedure.

In FAF-EBRM, the routing list structure of nodes is showingas the following table. The information of the table can guar-antee all of the parameters FAF-EBRM algorithm needed. Thecommunication launch node can calculate the weight of edgebetween neighbors. Neighbors can get its own FED. It avoidsthe communication launch node doing all of the algorithms.Thus, each node’s memory should storage its own ID, real timeenergy, distance to the Sink, and FED at any moment, whichcould be feed back to launch node quickly.

D. Local Topology Reconfiguration Mechanism

In the actual routing procedure, nodes with greater signalstrength will have more communication link and result infaster energy consumption. The whole network cannot always

Page 6: 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. … · 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014 An Energy-Balanced Routing Method Based

ZHANG et al.: ENERGY-BALANCED ROUTING METHOD BASED ON FORWARD-AWARE FACTOR FOR WSNs 771

work under these topology structures. A topology reconnectingmechanism of the cluster head rotation algorithm like LEACHis needed. The whole WSN information is limited, and globaltopology change may affect the information perception, theglobal change caused by energy unbalanced area is a waste ofenergy to energy balanced area, so a local topology reconfig-uration mechanism is necessary. This paper proposes a pointstrength-driven local topology reconfiguration mechanismbased on FAF-EBRM.The stages of the algorithm as given here.1) In FAF-EBRM, every time node finishes transmission,check the point strength of the next-hop node . If it is lessthan the average value of all of the sensors’ strengths inFTA, the local topology reconfigurationmechanism shouldbe launched in node ’s FTA.

2) Before the topology reconfiguration mechanism islaunched, remove the link between and , removefrom , and get a new set . Then, reconnectin , and the function of connect possibility isgiven as

(35)

3) The node removed in 2) may be the possible next-hop nodewhen the next transmission is finished, and the revocationof the edge does not affect the possible reconnection. Thenode’s real-time strength is needed to calculate the sum ofstrengths.

V. TEST AND ANALYSIS OF THE RESULTS

As we know, the real networks are mostly complex systemsthat contain lots of members and connections. These membersare abstracted to nodes and connections are abstracted to edges.If a complex network is weighted, the weight not only repre-sents existence of the link between nodes, but also describesthe property and intensity of the connection. In SCN, weightsrepresent the frequency of cooperation between scientists, andin WWAN, weights represent the number of available seats inflights between two airports. Based on our research work, an en-ergy-balanced routing method FAF-EBRM based on forward-aware factor is tested. In FAF-EBRM, the next-hop node is se-lected according to the awareness of link weight and forward en-ergy density, furthermore, a spontaneous reconstruction mech-anism for local topology is designed additionally.Before experiment by many simulations [4], [5], [22], the two

functions in (17) and (19) will be quantized. is calculatedas follows:

(36)

where 87 m, 50 m, 200 m,which is sampled randomly from database used as experimentaldata.Edge weight is given as in (18) as

(37)

Fig. 6. Comparison of theoretical and experimental .

where

(38)

The initial energy of sensor nodes is

Based on expert experimental data [4], [22], is set to beproportional to weight as follows:

(39)

Given and isobtained from topology structure using statistical tool. How dowe select nodes from among the nodes? It is according torandom selection based on probability theory. The same prin-ciple is related to from . The distributions of node degree,strength, and edge weight are shown in Figs. 6–8 with the co-ordinate of scale. Furthermore, the theoretical data frommathematic analysis based on the relative theory are comparedwith experimental data from practice scenarios in the figures.One of the practice scenarios is given as follows. WSNs can

be considered as scale-free weighted networks which reflecttheir existing forms and dynamic characteristics under thebanner of Internet of vehicles (IOV). In the system of IOV,WSNs are widely used in online safety monitoring and safetywarning of transport vehicles, cooperative control of transporta-tion, and intersection optimization. Using vehicular sensorswith excellent performance such as microwave sensors andinfrared sensors and analyzing the pulsation transmitted fromthe radar as well as its frequency changes to avoid collisionaccidents and provide safety warning.The technical equipments used by us are Crossbow, MicaZ,

Iris, and the simulators used by us are TOSSIM, OMNeT++,ATEMU. These technical equipments and the simulators men-tioned above are often used by our research group.As shown in Fig. 6, experimental distributions of IA are

consistent with theoretical distributions, follow power law andshow a “tail”, which are the basic characteristics of scale-freenetworks. As shown in Fig. 6, the probability of

Page 7: 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. … · 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014 An Energy-Balanced Routing Method Based

772 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014

Fig. 7. Comparison of EBF.

is 0.5, indicating that about half of the sensors only have onecommunication link, which forwards data to the next-hop nodeof IA. The probability that a sensor has a large number ofneighbors (degree is larger than 100) is very small, indicatingthat central nodes are in the minority among all sensors, andthe number of communication links connected to one centralnode is limited.In fact, just as we mentioned above, the number of neigh-

bors depends on following parameters: number of nodes, de-ployment area, strategy, and radio link range. For example, ifwe deploy regularly 400 sensors on 200 m 200 m square areaand take radio link range 39 m, the number of neighbors willbe equal to 8. Comparison of theoretical and experimentaland are similar as Fig. 6, so they are ignored. Of course,each set of experimental data has their inaccuracies, and the ex-tent of their inaccuracy is bellow 5% based on our many statisticwork and analysis.We compare LEACH, EEUC, and FAF-EBRM by three pa-

rameters: energy-balanced factor (EBF), number of last- sur-viving nodes (NLN) and function lifetime (FL), packets recep-tion radio (PRR). To measure the balance of energy consump-tion of routing protocols, EBF is defined as the standard devia-tion of all the nodes’ residual energy

(40)

where is the number of the whole network nodes, is theresidual energy of node at time and is the averagevalue of the residual energy of all of the nodes.FL is directly related to NLN; the definition and requirement

of FL is different under different conditions, as some require nodeath node, and some can still workwhen a certain percentage ofnodes still work. In our experiment, we consider two conditionsof FL, one is the time from the network begins to the first deathof the nodes, another is the time from the network begin to halfthe nodes dead.PRR means the ratio of the data that sink actually received to

the data that sink is supposed to be received. PRR can measure

Fig. 8. Comparison of NLN.

Fig. 9. Comparison of PRR every ten rounds.

WSN work situation intuitively. In this paper, we set the co-ordinate of data is random, and average packets emerging rate(APER) is given to test the performance of each protocol. Datafusion mechanism refers to EEUC.To compare three protocols conveniently and intuitively,

FAF-EBRM also uses round as the time scale. Figs. 7–9 showsthat the EBF, NLN, and PRR of three protocols in 350 roundsexperiments.In Fig. 7, the EBF of FAF-EBRM increase slightly at first and

keep a stable situation before Round 250, then increase a littletime, and return to 0 as the energy of the whole network is usingup. In Fig. 8, the first death of FAF-EBRM node turns up untilRound 300, and the procedure of the nodes’ death is fast andlate. In Fig. 9, the PRR of FAF-EBRM keeps 100% ratio for300 rounds, and the decline stage accounting for a small pro-portion. From the above results, we can see that FAF-EBRMhas a higher performance than LEACH and EEUC, which bal-ances the energy consumption, prolongs the function lifetimeand guarantees high QoS (such as Energy-Balanced, Long-Sur-viving, Packets Reception Radio) of WSNs.

Page 8: 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. … · 766 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 1, FEBRUARY 2014 An Energy-Balanced Routing Method Based

ZHANG et al.: ENERGY-BALANCED ROUTING METHOD BASED ON FORWARD-AWARE FACTOR FOR WSNs 773

VI. CONCLUSION

An energy-balanced routing method FAF-EBRM based onforward-aware factor is proposed in this paper. In FAF-EBRM,the next-hop node is selected according to the awareness oflink weight and forward energy density. Furthermore, a sponta-neous reconstruction mechanism for local topology is designedadditionally. In the experiment, FAF-EBRM is compared withLEACH and EEUC, and experimental results show that FAF-EBRM outperforms LEACH and EEUC, which balances the en-ergy consumption, prolongs the function lifetime, and guaran-tees high QoS of WSN. Also, they show that the distributions ofnode degree, strength, and edge weight follow power law andrepresent “tail,” so the topology has robustness and fault tol-erance, reduces the probability of successive node breakdown,and enhances the synchronization of WSN of IA.

REFERENCES

[1] A. L. Barabási, “Scale-free networks: A decade and beyond,” Science,vol. 325, no. 5939, pp. 412–413, 2009.

[2] D. G. Zhang and X. D. Zhang, “Design and implementation of em-bedded un-interruptible power supply system (EUPSS) for web-basedmobile application,” Enterprise Inf. Syst., vol. 6, no. 4, pp. 473–489,2012.

[3] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An ap-plication-specific protocol architecture for wireless sensor networks,”IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670, Oct. 2002.

[4] I. K. Samaras and G. D. Hassapis, “A modified DPWS protocol stackfor 6LoWPAN-based wireless sensor networks,” IEEE Trans. Ind. Inf.,vol. 9, no. 1, pp. 209–217, Feb. 2013.

[5] D. G. Zhang, “A new approach and system for attentivemobile learningbased on seamless migration,” Appl. Intell., vol. 36, no. 1, pp. 75–89,2012.

[6] D. G. Zhang, “Web-based seamless migration for task-oriented no-madic service,” Int. J. Distance E-Learning Technol., vol. 4, no. 3, pp.108–115, 2006.

[7] Q. J. Chen, S. S. Kanhere, and M. Hassan, “Analysis of per-node trafficload in multi-hop wireless sensor networks,” IEEE Trans. WirelessCommun., vol. 8, no. 2, pp. 958–967, Apr. 2009.

[8] J. Jin et al., “Handling inelastic traffic in wireless sensor networks,”IEEE Trans. Sel. Areas Commun., vol. 28, no. 7, pp. 1105–1115, Jul.2010.

[9] D. G. Zhang and X. J. Kang, “A novel image de-noising method basedon spherical coordinates system,” EURASIP J. Adv. Signal Process.,vol. 1, p. 110, 2012.

[10] X. Li and G. R. Chen, “A local-world evolving network model,”Physica A, vol. 328, no. 1–2, pp. 274–286, 2003.

[11] A. S. Ruela et al., “Evolutionary design of wireless sensor networksbased on complex networks[A],” in Proc. 5th Int. Conf. Intell. Sensors,Sensor Netw., Melbourne, Victoria, Australia, 2009, pp. 237–242.

[12] J. Aweya, “Technique for differential timing transfer over packet net-works,” IEEE Trans. Ind. Inf., vol. 9, no. 1, pp. 325–336, Feb. 2013.

[13] C. T. Cheng, C. K. Tse, and F. C. M. Lau, “A clustering algorithmfor wireless sensor networks based on social insect colonies,” IEEESensors J., vol. 11, no. 3, pp. 711–721, Mar. 2011.

[14] H. B. Zhang and H. Shen, “Energy-efficient beaconless geographicrouting in wireless sensor networks,” IEEE Trans. Parallel Distrib.Syst., vol. 21, no. 6, pp. 881–896, Jun. 2010.

[15] S. Vural and E. Ekici, “On multihop distances in wireless sensor net-works with random node locations,” IEEE Trans. Mobile Computing,vol. 9, no. 4, pp. 540–552, Apr. 2010.

[16] F. V. C. Martins and E. G. Garrano, “A hybrid multiobjective evo-lutionary approach for improving the performance of wireless sensornetworks,” IEEE Sensors J., vol. 11, no. 3, pp. 545–554, Mar. 2011.

[17] P. Erdös and A. Rényi, “On the evolution of random graphs,” Math.Inst. Hungarian Acad. Sci., vol. 5, pp. 60–67, 1960.

[18] D. J. Watts and S. H. Strogatz, “Collective dynamics of small-worldnetworks,” Nature, vol. 393, no. 6684, pp. 440–442, 1998.

[19] A. L. Barabási and R. Albert, “Emergence of scaling in random net-works,” Science, vol. 286, no. 5439, pp. 509–512, 1999.

[20] A. Barrat, M. Barthélemy, and A. Vespignani, “Modeling the evolutionof weighted networks,” Phys. Rev. E, vol. 70, no. 6, pp. 1–13, 2004.

[21] A. Barrat et al., “The architecture of complex weighted networks,”PNAS, vol. 101, no. 11, pp. 3747–3752, 2004.

[22] D. G. Zhang, “A new medium access control protocol based on per-ceived data reliability and spatial correlation in wireless sensor net-work,” Comput, Electr. Eng., vol. 38, no. 3, pp. 694–702, 2012.

[23] D. G. Zhang and X. J. Kang, “A new method of non-line waveletshrinkage denoising based on spherical coordinates,” Information—Int.Interdisciplinary J., vol. 15, no. 1, pp. 141–148, 2012.

Degan Zhang (M’01) was born in 1969. Hereceived the Ph.D. degree from Northeastern Uni-versity, Shenyang, China.He is currently a Professor with Tianjin Key Lab

of Intelligent Computing and Novel Software Tech-nology, Key Lab of Computer Vision and System,Ministry of Education, Tianjin University of Tech-nology, Tianjin 300384, China. His research inter-ests include wireless sensor networks and industrialapplications.

Guang Li (M’05) was born in 1972. He receivedthe Ph.D. degree from the University of Science andTechnology Beijing, Beijing, China.She is currently a Researcher with Daqing Geo-

physical Exploration Company, CNPC, Daqing,China, and Tianjin Key Lab of Intelligent Computingand Novel software Technology, Tianjin Universityof Technology, Tianjin, China. Her research interestsinclude wireless sensor networks and industrialapplications.

Ke Zheng (M’11) was born in 1987. He is currentlyworking toward the Ph.D. degree at Tianjin Univer-sity of Technology, Tianjin, China.He is currently a Research with Tianjin Univer-

sity of Technology, Tianjin, China. His research in-terests include wireless sensor networks and mobilecomputing.

Xuechao Ming (M’10) was born in 1986. He is cur-rently working toward the Ph.D. degree at TianjinUniversity of Technology, Tianjin, China.He is currently a Researcher with Tianjin Univer-

sity of Technology, Tianjin, China. His research in-terests include wireless sensor networks.

Zhao-Hua Pan (M’12) was born in 1988. He is cur-rently working toward the Ph.D. degree at TianjinUniversity of Technology, Tianjin, China.He is currently a Researcher with Tianjin Univer-

sity of Technology, Tianjin, China. His research inter-ests include wireless sensor networks and industrialapplications.