Abstract

This paper investigates data processing schemes that define the distribution of decision making that affects system accuracy and energy consumption. There exist two typical schemes, namely: centralized and distributed schemes. In a centralized scheme, nodes collect samples and send them to a “fusion center.” This scheme provides optimal decision accuracy; however, it consumes considerable energy. In contrast, distributed schemes allow nodes to make local 1-bit decisions, which are sent to the fusion center to make the final decision. In a hybrid scheme, the network specifies the level of accuracy required for the whole system. This can be achieved by manipulating the scheme to work interchangeably as centralized or distributed. Most of the energy consumed is in the transmission process; therefore, this paper proposes an energy-saving hybrid scheme that focuses on optimizing transmission energy. In this proposed scheme, each node is able to alternate between centralized and decentralized scheme according to its location and path length. To validate the proposed approach, it is simulated and the results are compared with the hybrid scheme.

1. Introduction

The main goal of WSNs is to detect certain events in the environment. It is important to try to achieve maximum detection accuracy and to minimize false alarms. At the same time, availability of WSN resources and accessibility limitations should be considered. The solution is a trade-off between two factors: accuracy and energy efficiency. With sensor capabilities a tremendous societal benefit is achieved when sensors are integrated into available devices, machines, and environments. They can help to avoid infrastructure failure disasters, protect precious natural resources, enhance security, and enable new “smart” applications such as context-aware systems and home technologies. Wireless sensor networks are based on numerous advanced technologies such as very large scale integration (VLSI), microelectromechanical systems (MEMS), and wireless communications. The development of these technologies is contributing to a wider application of WSNs. For example, with the enhancement of MEMS technology, sensors are becoming smaller, and developments in semiconductor technologies are producing smaller microprocessors with higher processing capacities. The improvement of computing and sensing technologies is enabling the development of flexible WSNs, which can be widely applied [1, 2].

Monitoring environmental changes and detecting specified events is the main function of sensor networks. This function is achieved through four basic components of a sensor network [3]: distributed or localized sensors, an interconnecting network (most often wireless based), a central point of information clustering a set of computing resources at the central point or network core to handle data collecting, event trending, status querying, and data mining. WSNs use centralized fusion centers (sinks), which work as cluster gateways, and many distributed sensors (motes) [4]. These sensors sense and send observations to the centralized unit. The centralized unit decides if an event is initiated or not.

Most of the power consumed in a network is used in processing, transmitting, and sensing. Until now limited power resources for sensors has been the main constraint in WSNs. It is very important to reduce sensor power consumption while maintaining acceptable detection accuracy according to application requirements. Many researchers have focused on the above three processes [5], attempting to enhance the power consumption efficiency of the sensors for each of them. Some schemes enhance the operating system and reduce the required processing cycles; other schemes optimize the RF part including collision space and noise filtering. This thesis focuses on schemes which study decision processing and transmitting where those schemes define how to collect observations (sampling rate), where to process them (locally or centralized), and the data to be sent from nodes to the fusion center, which will affect the degree of loss of data and accuracy [6]. The main goal of this paper is to produce an optimum controlling scheme that extends network/sensor lifetime by reducing power consumption and maximizing the network efficiency and accuracy. Our proposed scheme balances between the reduction of data transmission and processing by distributing these two activities among the nodes and the central unit (sink).

Existing wireless communication protocols are shown in Table 1, including IEEE 802.11 (WiFi), IEEE 802.15.1 (Bluetooth), IEEE 802.15.4 (ZigBee, 6LoWPAN, WirelessHART, and ISA-100.11a), and IEEE 802.16 (WiMAX).

The main WSN solutions such as ZigBee, WirelessHART, 6LoWPAN, and ISA-100 are based on this standard, which offers a complete networking solution by developing the remaining upper communication layers.

ZigBee. ZigBee [79] is a simple, low cost, low power wireless technology used in LR-PANs embedded applications. ZigBee provides the network layer and the framework for the application layer. The MAC sublayer and lower layers are based on the IEEE 802.15.4 standards (see Figure 1).

The ZigBee network layer supports star, tree, and mesh topologies. It is utilized in three types of devices: ZigBee coordinator, ZigBee routers, and end devices.

WirelessHART. Based on IEEE 802.15.4 standard highway addressable remote transducer (HART) foundation, WirelessHART [1012] was developed for low-power 2.4 GHz operation. Similar to ZigBee, WirelessHART specifies four principal devices (Figure 2): network manager, gateways, field devices, and handhelds, as well as adapters, which allow existing HART field devices to be integrated into the network.

6LoWPAN. 6LoWPAN [13, 14] is the abbreviation of IPv6 over low power wireless personal area networks, in which standard IPv6 packets are enabled to communicate over an IEEE 802.15.4-based network. Using 6LoWPAN, low power devices have all the benefits of IP communication and management. It is targeted at wireless IP networking applications in home, office, and factory environments.

ISA100.11a. The core wireless technology employed by ISA100.11a [15] is IEEE 802.15.4, which sorts the 2.4 GHz unlicensed band into 16 channels.

As shown in Table 6, the network layer is based on IETF RFC4944 (6LoWPAN):(i)IP connectivity through compressed IPv6 and UDP packets,(ii)addressing scheme:(a)EUI-64 (64 bits),(b)IPv6 (128 bits),(c)short address (16 bits IEEE 802.15.4).

The entire ISA100.11a stack is constructed employing widely accepted and proven industry standards.

As mentioned earlier, each node has the responsibility of collecting, processing, transmitting, and receiving data. The common functions of every detection scheme are that (1) nodes collect observations, and (2) the fusion center (sink) takes the final decision.

There are two traditional detection schemes: the centralized detection scheme and the distributed detection scheme, the methodologies of which will be covered in details. In our approach, we use a tree topology where nodes are “independently and identically distributed” (i.i.d.). They are connected to the Fusion Center (FC) through a multihop route, where nodes also act as hops to receive data from child nodes and forward it to the FC with any processing, encryption or encoding. The focus here is only on accuracy and energy consumption, and it is assumed that lower layers are working perfectly and that there are no efficiency problems caused by RF or by packet collisions; that is, there is no data retransmission.

2.1. Bayesian Decision Theory
2.1.1. Binomial Distribution

A Bernoulli trial can result in a success with probability p and a failure with probability . Equation (1) gives the probability distribution of the binomial random variable . The number of successes in independent trials is

The probability that two events, A and B, will both occur will be . From this formula the main equations (2) of Bayes’ rule can be derived:

From Figure 3 we find .

The distribution of H, given D, which is called the posterior distribution, where is the marginal distribution of , is given by

Binary assumption is defined by , which represents event occurrence: if an event happens and if not; is the actual event status: is the final decision; K is node counts; is the collected samples, is sample count at each node, and is the node path length. For each sample where is varied from 1 to and J from 1 to collected in a node ,  , .

Bayes Decision. Choose event happened if ; otherwise choose not happened.

2.2. Centralized Detection Schemes

In centralized detection schemes a network will have K number of nodes. These nodes will collect samples of observations from the environment every specific period, and they will send samples together at the end of the period. At the fusion center samples will be received.

According to Bayes, a final decision can be calculated as shown in the following:

The probability of error can be calculated using the following equation:

To calculate power consumption for the whole network in (6), the following equation can be used, where E = total energy, = transmission energy, = receiving energy, and = processing energy:

2.3. Distributed Detection Scheme

In this scheme nodes collect data and make local decisions according to these observations and conclude the event appearance as a 1-bit result. This result is sent to the fusion center to make a final decision according to the collected 1-bit results from all nodes. In this scheme data accuracy between nodes and the fusion center has been lost.

We propose number of nodes; these nodes will collect samples of environmental observations with ( = number of 1s for node ) and will send a 1-bit local decision every specific period.

At the fusion center, samples will be received.

According to Bayes, a local decision can be calculated as shown in the following:

From (1) and (4), we can calculate local decision as shown in the following:For final decision we collect = total 1s if local decisionFrom (1) and (4), we can calculate final decision as shown in the following:The probability of error can be calculated using

To calculate power consumption for the whole network (12) can be used, where = total energy, , = receiving energy, and = processing energy:

2.4. Hybrid Detection Scheme

Neither the centralized nor the distributed detection scheme is flexible enough for designers to choose between detection accuracy and energy consumption. Yu et al. [16] proposed a hybrid scheme that balances detection accuracy and total energy consumption. According to a defined level of accuracy, the nodes will vary between sending all collected data and sending a 1-bit result. Thus, such schemes attempt to balance accuracy and energy consumption.

In this scheme, assume there are number of nodes. These nodes will collect samples of environmental observations with ( = number of 1s for node ). There will be upper and lower bounds and , where . The node result will be 0 if the number of 1s is less than . In other words, if the number of 0s collected is greater than or equal to , 1 will be sent if the number of 1s is greater than or equal to . Otherwise all the collected data will be sent, as shown in (17): From (12), assume that out of sensor nodes, nodes send 1s, nodes send 0s, and nodes send all their observations. The total data sent, Ω, will be From (12) we can derive the following probability:Following from (16) and (17), the final probability of error can be determined usingTo calculate power consumption for the whole network (16) can be used, where = total energy, , = receiving energy, and = processing energy:

3. System Model (Telos)

In order to evaluate and develop our scheme, the behavior of WSN sensors should be understood, and a power consumption model should be defined [17]. For this purpose the typical operation conditions of TelosB (Figure 4) have been selected as a basis for our power model [18, 19].

I use the datasheet of Telos working at 250 kbps and 2.4 GHz (ultralow power IEEE 802.15.4 compliant wireless sensor module), which is one of the most widely known WSN nodes, and I use the power details from Table 2.

From the power consumption model in Figure 5, it can be concluded that transmission is responsible for a large amount of node power consumption.

So far, only the behavior of a single node has been discussed. Now the power consumption of all the nodes in the network should be addressed.

The formula for calculating the overall power consumed while sending a single bit from source (sensor node) to destination (fusion center) through hop nodes equals the energy required to send and receive this bit between all of the hops, where = total energy, , and :

So, for the special case where a node is directly connected to the FC, energy used = .

For instance, if hops count = 10, energy used will = .

Thus, the length of a route affects the overall power consumed in the network and the network life time as well.

3.1. Power Calculation

We use TelosB model to calculate power consumption [20, 21], with the following:(i)MCU current consumption: 2.4 mA,(ii) current consumption: 23 mA,(iii) current consumption: 21 mA.

3.2. Processing Energy

The MSP430 [22] is running at a clock rate of 8 MHz, Instruction Cycle Time = 200 ns, so in every cycle we can finish 40 Instructions/Cycle, .

Let us assume that we need 2,000 instructions for the measurement, for data processing, and for preparing a packet for transmission over the network. This would result in ; the amount of energy consumed per sample at a current of 2.4 mA would be

3.3. Transmission Energy

Using CC2420, sending data takes place at a speed of 250 kbps. If one node collects from a local sensor or from all the children 1 bit of data to be forwarded to the parent node, power consumption can be calculated as in the following equations:

3.4. Simulation Network Design

In order to derive more realistic data from our simulation model, we will apply TelosB properties in our network, with maximum coverage = 100 m. A total of sensors are randomly deployed in the region of interest (ROI) which is a square area of . I have selected to be equal to 300 m; hence the ROI = 0.09 km2. The locations of sensors are unknown before deployment time. However, it is known that all sensors are i.i.d., and every sensor locations will follow a uniform distribution in the ROI.

4. Enhanced Hybrid Detection Scheme

The hybrid scheme adjusts the behavior of the network to vary between centralized and distributed schemes and also establishes and parameters to define that behavior, and is the number of observations equal to 1. We propose to enhance the hybrid scheme by dynamically choosing the , parameter instead of it being static.

In the hybrid scheme if is between and the node will act as centralized; otherwise it will act as distributed, as shown in Figure 6. For the special case the node will always act as distributed, and the node will act more centralized if becomes larger (until and ).

However, and can be made dynamic, with a preference for a distributed orientation for nodes with longer route paths; for the remaining nodes it can remain more centralized, as in the original hybrid scheme, according to the requirements of the application.

For every sensor varied from 1 to we will assign specific . These sensors will be classified according to the route path:

Since , we will have a finite number of combinations for and . These combinations—or groups of them should be mapped to all sensors, depending on sensor path weight.

The above mapping is a normal -to-one mapping problem, which in our case can be solved experimentally by testing it in different deployed wireless sensor applications.

4.1. Network Deployment

Similar to most wireless sensor networks, the FC is deployed in an accessible location, while the sensor nodes are deployed randomly in the targeted area. This can be considered as a mesh network. After deploying the nodes, discovering the network is the first action to be taken. The FC broadcasts discover packets to all nodes in the covered area. These nodes then broadcast to further nodes until all the nodes are covered and routing paths; next hop and node configuration are defined.

To simplify the problem, nodes discover paths to the FC based on SPF (shortest path first) and select subsequent hops to forward received packets to. This information is crucial.

Since the nodes have already collected the broadcast packets, which include source, destination, and path, the nodes are able to select their routes based on the path length.

4.2. Nodes Configuration

For each node there are fixed configurations such as power, frequencies, and calculation process. Some parameters need to be configured by the manufacturer or the user in order to optimize network efficiency. On the other hand, some parameters may be configured by the network itself.

In our scheme, every node has certain parameters that are defined during the manufacturing phase or by the developer during network deployment, that is, sampling rate , , and .

is the probability that the system works as centralized, which can be calculated from and . In our scheme each node will select and depending on its path length. and should generate where .

From those inputs each node is able to calculate the and that satisfy application requirements.

From we can find combinations = , which is our ROT. Every node should be able to map the proper from both () and , as can be seen in Figure 7.

We can map these ranges by means of a simple 1-to-many mapping technique, where we index the initial range and assign the remaining ones equally to the next range, as applied in Algorithm 1.

Define
for each
    = ;
   if
       add to ;
   end if
end for
=
for count()
   
   ;
end for

4.3. , Selection

To be able to select and at each node the problem is divided into simpler problems as follows:(1)Define all combination of and and calculate the equivalent .(2)Define valid and based on and .(3)Define max path length, and map valid to every path zone.

4.3.1. All , Combinations

A selection of and will define when the node will act as more centralized or more distributed. For collected samples we will have . We can have C different combinations for those and , where .

For each combination we can calculate its , and we will have the list of , which should be sorted according to its values.

can be calculated as in the following:where is the cumulative distribution function which can be calculated as in the following:

For example, for , , we generate all possible combinations of as shown in Table 3.

4.3.2. Valid and Combinations

For example, we can select initial , .

First of all we find the valid combinations. The selection of , gives us 4 valid combinations (Table 4).

4.3.3. Map Combinations to Available Zones

In our scheme, every node has certain parameters that are defined during the manufacturing phase or by the developer during network deployment, that is, sampling rate (), , and . All nodes are classified according to path length to zones. We have here a random WSN where maximum path = 6, which means 6 different zones. Figure 8 shows an example of WSN nodes classified into zones.

We define minimum and maximum , where is the maximum combination that can be assigned for zone 1, and is the minimum that can be assigned to the next zones (where all ).

For every zone z, we assign from (23), which can be used to map between zones and combinations (Table 5):

In this scheme we find that are dynamically selected by the nodes, depending on the path length, and the entire procedure described above requires minimal extra processing at the node, since the whole process is part of the network discovery phase.

Out of sensor nodes, nodes send 1s, nodes send 0s, and nodes send all their observation so total send data Ω will be . Our final decision, based on Bayes’ rule, is if . From the above rule we can derive the following relations:where we can calculate and , , and as follows:

5. Simulation Results

5.1. Enhanced Hybrid Detection Scheme
5.1.1. Power Consumption

By applying “Telos” power model and using (18), (19), and (21), power calculation isprocessing power = , , power = , and .

Centralized. In centralized scheme, the RF transmission is the most power consuming process (Figure 9).

Distributed. Similar to the centralized scheme, in the RF scheme, the most power consuming process in is the transmission part, (Figure 10).

Hybrid (). We assume the following: , , , and ; is varied from 10 to 30 (Figure 11).

Enhanced Hybrid. We define the probability of node behavior as centralized ; we get values out of possible combination of and .

Figure 12 shows the power consumption of enhanced hybrid scheme, where we assign and .

All Energy Schemes. The performance of the four schemes is shown in Figure 13, as we can see that enhanced scheme outperforms other schemes.

Accuracy Behavior. In our simulation we are able to get the same result which is given in [16], where we used hybrid , , and as shown in Figure 14.

The performance of the four schemes is shown in Figure 15, as we can see that enhanced scheme outperforms other schemes. In comparison to hybrid scheme our scheme gives a very close level of accuracy, as illustrated in Figure 15.

6. Conclusions

The main purpose of this paper is to enhance the event collection and detection capability of current WSN schemes. Two of the available schemes—centralized and distributed schemes—are basic and have no flexibility. The third scheme—the hybrid scheme—uses the two previous schemes to balance accuracy and energy; nevertheless all the nodes remain with fixed configuration and limited flexibility. On the contrary, the proposed scheme is designed to be more flexible in order to balance the power consumption and the detection accuracy at the node level. Every node is flexible in deciding how to behave, that is, whether to be more centralized or distributed.

To be able to compare the tradeoff between accuracy and power consumption in these schemes the model used should be realistic. This is one of the most significant weaknesses of the previous research, in which all power consumption calculations have been based solely on an assumed model. In the proposed scheme this weakness has been overcome by using a real WSN model, which produces realistic results.

As can be seen from the simulation results, our scheme saves a substantial amount of energy compared to the hybrid scheme, while retaining accuracy to almost the same degree. In addition, our scheme deals more efficiently with larger network area and denser node-number.

Although the focus of this paper has been on reducing overall power consumption, other future enhancements are also possible, for example, enhancing overall network lifetime by improving selection techniques where the following factors can be considered:(i)individual node power level,(ii)event occurrence probability at each node,(iii)next-hop distance and real , power.

Conflict of Interests

The author declares that there is no conflict of interests regarding the publication of this paper.

Acknowledgment

This research is supported by Computer Engineering Department at King Fahd University of Petroleum & Minerals (KFUPM).