Abstract
Wireless technologies have been increasingly applied in industrial automation systems due to flexible installation, mobility, and cost reduction. Unlike traditional wireless sensor networks (WSNs), industrial wireless sensor networks (IWSNs), when expanding from wireless monitoring to wireless control, have more stringent requirements on reliability, real-time performance, and robustness in a number of industrial applications. Successive transmission failures or deadline misses in these applications may severely degrade the control quality and result in serious economic losses and safety problems. Therefore, when deploying IWSNs in harsh industrial environments, to achieve reliable and deterministic end-to-end transmissions is critically important. In this paper, we explain the primary challenges of designing appropriate routing protocols and present a reliable real-time flooding-based routing protocol for IWSNs (REALFLOW). Instead of traditional routing tables, related node lists are generated in a simple distributed manner, serving for packet forwarding. A controlled flooding mechanism is applied to improve both reliability and real-time performance. A seamless transition in the event of topology change can be achieved by REALFLOW. Performance evaluations via simulations verify that significant improvements of reliability, real-time performance, and network recovery time can be achieved by REALFLOW, compared with traditional routing protocols.
1. Introduction
Nowadays, wireless sensor networks (WSNs) have been exhibiting their attractive advantages over traditional wired counterpart for industrial automation systems, such as the avoidance of cabling and flexible installation. Industrial wireless sensor networks (IWSNs) can serve a number of purposes, such as monitoring and control. Currently, wireless monitoring via IWSNs for industrial applications has been widely applied [1]. Nevertheless, wireless control, as an essential part of automation, is still lacking support in IWSNs [2]. Compared with wireless monitoring, data transmissions for wireless control in many industrial applications should be sufficiently reliable [3] and deterministic with the latency of the order of seconds, or even milliseconds [2]. Transmission failures or deadline misses may result in disturbances to the process, degradation of the overall control performance, and even more serious economic losses or human safety problems. Once both wireless monitoring and control are fully supported, the booming development of IWSN applications can be expected. Besides high reliability and real-time performance, low energy consumption is also an important issue [4–6]. However, compared with the former two requirements, reducing energy consumption should not be prioritized as high as reliable and deterministic transmission for different industrial applications.
Compared with environments for traditional WSNs, industrial environments for IWSNs are harsher and more dynamic due to a great number of metallic surfaces, extreme temperature, high vibrations, and mobility of nodes and other objects [7]. Measurements from [8, 9] have shown that deep fading and shadowing in industrial environments may result in extremely low received signal strength indicator (RSSI) values with high variances or even packet losses. Moreover, authors in [7, 10] pointed out coexisting communication systems in the same frequency band as another major source of disturbances to wireless industrial applications. Hence, the major challenge is to achieve reliable and deterministic end-to-end transmissions in industrial environments by using IWSNs. Currently, several standards have been published for process measurements and control applications. Among them, Zigbee [11] is shown to be unsuitable for industrial automation because there are no frequency diversity, no path diversity, and the MAC unreliability problem [12, 13]. WirelessHART [14] and ISA 100.11a [15] are another two standards designed for process automation (PA). Although some successful deployment instances exhibit the confidence on these standards, there is still a long way to go to fulfill the reliability and real-time performance requirements for most of industrial applications [2]. The improvement can be achieved on different layers. On existing devices, limited efforts can be taken on the physical layer due to restrictions imposed by hardware and/or software limitations. On the MAC layer, a number of techniques, such as channel hopping and black listing, are used to improve reliability, but in harsh industrial environments, transmission failures still occur quite often. Although automatic repeat-request (ARQ) is applied in most of the standards, and it is a straightforward method to increase reliability, the real-time performance is degraded due to retransmissions. The previous empirical results [16] exhibit serious consequences such as network congestions, caused by excessive unexpected retransmissions. On the network layer, the routing protocol plays an extremely important role in achieving high reliability and low latency [1], but the current standards fail to provide sufficient guidance on how to guarantee reliable and real-time transmission by using appropriate routing protocols. Although a number of research efforts have been taken to design a reliable real-time routing protocol for IWSNs [17–22], there is still no sufficient evidence to show that the problem has been fully solved.
There are several challenges to design an appropriate routing protocol for IWSNs. Firstly, if high reliability cannot be achieved by the lower layers, multipath diversity can be applied by routing protocols on the network layer to increase reliability. Retransmission is an effective method to increase reliability, but the transmission delay is also prolonged. For many industrial applications where hard deadline is strictly required, outdated packets are of limited use for their destinations. Therefore, the second challenge is that real-time performance should be provided by a routing protocol. Thirdly, routing protocols should be tolerant of sudden topology changes, such as link failures and node halting. Once the topology changes, the routing protocol should provide an alternative path as soon as possible; otherwise data transmissions may be terminated during the path recalculation period. The last challenge is that the workload of nodes should be also considered. Different from traditional WSNs, the network structure of an IWSN is typically centralized, since operators in the central control room must have the knowledge of the status of the whole network. Thus, the gateway or network manager, as the central device, is involved in most of network activities. The gateway or network manager should not spend too long time on calculating routing information, since partial communication in the network may be halted during the calculation period due to the outdated routing information. Therefore, when designing a routing protocol for IWSNs, these challenges should be addressed.
In this paper, we propose a reliable real-time flooding-based routing protocol for IWSNs (REALFLOW) to address all challenges mentioned above. REALFLOW consists of a routing establishing and maintenance part and packet forwarding part. The gateway periodically broadcasts discovering messages, named as list-updated messages, to discover the current network topology. After list-updated messages are received, all nodes should send corresponding responses, named as list-updated messages, back to the gateway. The list-response message transmission stage has two purposes: one is that it helps the gateway obtain the current network topology information; the other is that related node lists are generated in all nodes based on receiving list-response messages from other nodes. For both uplink and downlink transmissions, packets are forwarded according to the related node lists in all intermediate nodes. In order to improve reliability, REALFLOW is based on the controlled flooding mechanism to provide multipath diversity. The real-time performance is also considered, so outdated packets are automatically discarded in intermediate nodes. Due to redundant paths and flooding mechanism, REALFLOW can be tolerant of parts of network topology changes. Since related node lists are distributively generated in all nodes, the workloads of the gateway are greatly reduced.
Due to flooding mechanism, more resources may be required than traditional routing protocols in WSNs. However, as we emphasized previously, in many industrial applications, especially those from industrial automation systems, reliability and real-time performance should be prioritized for IWSNs, rather than energy consumption. Moreover, it is proven that energy consumed by local processing, such as sensoring, dominates the overall energy consumption [23]. Although additional communication is introduced in the network due to flooding, the increment of energy consumption caused by additional communication is not obvious. Therefore, our work bridges the gap of current research works to provide reliable and real-time end-to-end transmissions in IWSNs.
The rest of this paper is organized as follows: Section 2 presents the previous work on routing protocols in WSNs. In Section 3, we briefly describe the current IWSN architecture as background knowledge. In Section 4, we outline the proposed routing protocol REALFLOW. The simulation settings and scenarios are described in Section 5, followed by the simulation result analysis in Section 6. Finally, we conclude the paper in Section 7.
2. Related Work
Designing reliable routing protocols in WSNs, as one of the most challenging research topics, has attracted a great number of research interests. Traditional routing protocols, such as dynamic source routing protocol (DSR) [24] and ad hoc on-demand distance vector protocol (AODV) [25], have been successfully applied in traditional WSNs, such as Zigbee networks. For this set of routing protocols, route discovery messages are broadcast to discover all available paths. In order to maintain the updated routing information, all nodes have to frequently exchange information for being aware of channel status. If any link is broken or node halts, all corresponding nodes have to recalculate the routing information and try to establish another new path. During this period, parts of the network may not work properly, which makes the network suffer from higher latency and lower reliability. Several extensions of traditional routing protocols were also proposed, for instance, the ad hoc on-demand multipath distance vector protocol (AOMDV) [26], the ad hoc on-demand distance vector multipath routing protocol (AODVM) [27], and split multipath routing (SMR) [28]. These extensions intend to improve reliability by identifying multiple nodes or edge-disjoint paths. However, primary drawbacks, such as excessive control messages and unpredictable network recovery time, still exist. Besides these extensions, multipath routing protocols have been extensively studied in other research works aiming for high reliability [17–20]. Authors in [19] split each packet into several subpackets by using erasure codes and send them instead of the whole packet. This scheme might be effective in traditional WSNs, but in IWSNs there exist very short packets with the strict deadline; this scheme may be hardly used in IWSNs, since the real-time performance is not fully considered. A reliable information forwarding using multiple paths (ReInForM) protocol proposed in [20] can achieve controlled reliability by sending redundant copies of a packet along multiple paths. However, this protocol can only be used under a number of assumptions. For instance, every node has knowledge of the local channel error and is able to compute the information content and importance of sensed events, which can hardly be obtained in many practical scenarios.
Unlike traditional routing protocols and all their extensions, flooding is an effective approach to increase reliability by multipath diversity. However, previous flooding-based routing protocols fail to satisfy industrial requirements. Authors in [29] try to avoid the drawbacks of flooding by randomizing the selection of retransmitters. Their approach may hardly be used for a centralized TDMA-based IWSN, since it may bring difficulties for scheduling. A random routing strategy based on flooding proposed in [30] aims for low energy consumption. However, according to the evaluation results, even higher end-to-end transmission latency may be introduced, although lower energy consumption is provided by their proposed routing algorithm.
Except for reliable routing protocols in traditional WSNs, there also exist a number of newly proposed routing protocols to address the challenges from IWSNs. MERLIN protocol proposed in [21] utilizes multicast for both uplink and downlink transmissions to improve low latency and energy consumption, but high reliability is not the main scope of this protocol. Authors in [31] proposed EARQ, an energy aware routing protocol also for reliable and real-time communications in IWSNs. Next hop selections are based on the estimations of energy consumption, reliability, and deadlines. However, according to their evaluation settings, this protocol may be more suitable for WLAN or Zigbee networks, not centralized TDMA IWSNs. Both authors in [32, 33] proposed a two-hop information-based routing protocol, aiming for enhancing real-time performance with energy efficiency. The routing decision in [32] is based on the two-hop velocity integrated with energy balancing mechanism, whereas the routing decision in [33] is based on the number of hops from source to gateway and two-hop information. However, reliability is not fully considered in these two protocols. Authors from [22] also proposed an entire reliable graph routing scheme for broadcast, uplink, and downlink transmissions in IWSNs with promising evaluation results. One drawback of their routing protocol is the too high workload of the gateway or the network manager to calculate all routing graphs [34].
It is notable that energy efficiency and low power consumption have been stressed by a number of previous research works. However, for many time-critical industrial applications, the high reliability and real-time performance are prior to all other requirements. If there are many packet losses or packets cannot arrive at their destinations before deadlines, optimizing energy efficiency and reducing power consumption become meaningless to the whole system. Reliability, availability, and usability of IWSNs should take top priority for those industrial applications. Therefore, different from previous research works, we mainly focus on improving reliability and real-time performance for IWSNs.
3. Industrial Wireless Sensor Network Architecture
Unlike traditional WSNs, the network structure of an IWSN is generally centralized. Operators in the central control room should have the knowledge of the status of the whole network. A comprehensive IWSN usually contains a number of components, such as network manager, access point, security manager, and field devices. However, the scope of this work is to design routing protocol for reliable and real-time transmissions in IWSNs, so simplified components are considered in this work. Figure 1 shows a typical topology of an IWSN considered in this work. Three basic device types are involved in the formation of an IWSN.
Gateway: it is responsible for managing the whole network, including identifying routing, distributing resources, and scheduling decision making. It also connects the control system to field devices. Sensor nodes: as one type of field devices, the responsibility of a sensor node is to collect all kinds of measurement data and upload to the gateway. Actuator nodes: as another type of field devices, an actuator node performs basic functions of actuating after receiving data or commands from the gateway.

A typical topology of an IWSN.
As shown in Figure 1, in an industrial process control system, a programmable logic controller (PLC) connected to a gateway periodically acquires measurement data from sensor nodes at a certain refresh rate. After executing the control applications, the PLC periodically sends the output values to actuator nodes for actuating. Usually sensor and actuator nodes are deployed in a scattered manner in a large area. According to different wireless channel conditions, uplink and downlink communication may involve one hop or multihop packet transmissions. In order to provide reliable and real-time communication for industrial applications, an appropriate routing protocol serving packet forwarding plays an extremely important role in finding available transmission paths. We should also notice that in many industrial applications the data transmission period is extremely short, for example, 250 ms or 500 ms [2]. Due to the schedulability of transmission timing slots, the network size and node hop numbers are severely limited. Therefore, in many industrial applications an IWSN containing hundreds of nodes and a node with many hops away from the gateway can hardly be seen in those industrial applications.
4. Proposed Reliable Real-Time Flooding-Based Routing Protocol
To achieve higher reliability, flooding method is used in our proposed routing protocol to introduce multipath diversity. However, the inherent drawback of uncontrolled flooding is that the network resources will be rapidly exhausted. Thus, our proposed routing protocol is based on a controlled flooding mechanism in which flooding behaviors are severely restricted within a certain range, so the usage of network resources can be much more efficient. To assist packets in arriving at their destinations, different routing protocols apply different mechanisms. For instance, routing tables are commonly used in a great number of traditional routing protocols, whereas a graph ID embedded in a message is used by graph routing protocols for forwarding messages in the standard WirelessHART. As we mentioned previously, to generate all routing or graph information at the gateway or network manager may require extremely long computation time and lead to overwhelming workload of these devices [34]. Additionally, once the network topology changes, routing tables and graphs need to be recalculated again. During the calculation and recalculation period, partial communication in the network may be terminated due to the outdated routing information. To avoid this problem, we apply a different mechanism and introduce new routing parameters.
In this section, we present the details of REALFLOW. We first introduce the definitions and notations for our proposed protocol. Then we describe the route establishing and maintenance method and packet forwarding method in Section 4.2 and Section 4.3, respectively, followed by an example of our proposed scheme for comprehensive understanding. Finally, a theoretical analysis is given in Section 4.5.
4.1. Definitions and Notations
Provided an IWSAN consists of m nodes (sensors and actuators), the node set
Definition 1.
If the node
In our proposed routing protocol, a node is only able to forward packets sent from or to its relevant node; otherwise packets from or to irrelevant nodes will be dropped by this node. In order to distinguish relevant nodes from irrelevant nodes, each node in the network should maintain a list, named the related node list
Definition 2.
The source address node
Sensor and actuator nodes are usually deployed dispersedly in a large area. Due to the communication distances, interferences, obstacles, and other aspects, packets may require more than one transmission hop to arrive at the destination. To describe the network topology, we define parent, child, and sibling nodes as below.
Definition 3.
If
Definition 4.
If
The key point of REALFLOW is to obtain and maintain the related node list
4.2. Establishing and Maintaining Routes
In order to obtain the current network topology for the gateway and generate related node lists
When a node receives a list-updated message, it will rebroadcast the message as needed. Before the message is forwarded, all those three parameters will be updated. The node also needs to record the information obtained from the list-updated message. In order to establish the related node list, each node needs to maintain three important parameters:
C (the number of received list-updated messages): once the node receives a new list-updated message, this parameter should be increased by one,
Once the gateway broadcasts a list-updated message, this message should be rebroadcast by all other nodes until it propagates in the entire network. The rebroadcasting procedure is summarized in Algorithm 1. The notations mentioned in the algorithm are summarized as below
(1) Extract (2) Obtain (3) (4) (5) (6) (7) (8) (9) (10) (11) (12) (13) (14) (15) (16) (17) (18) (19) (20) (21) (22) (23) (24) Drop (25) (26) (27) (28) (29) Forward (30) (31) Drop (32) (33) (34) Drop (35)
In order to establish appropriate routing paths, the received signal strength of the list-updated message
After receiving list-updated messages, each node shall broadcast a respond to the gateway, named list-response messages. A list-response message also includes three necessary parameters:
In order to identify different list-response messages from a same node, the sequence number
The list-updated message transmission has two purposes. Firstly, the gateway is able to obtain sufficient information to calculate the current network topology according to the content of these messages. Secondly, the related node list
(1) Extract (2) (3) (4) (5) (6) (7) (8) Find (9) (10) (11) (12) Forward (13) (14) Drop (15) (16) (17) Drop (18)
Since the combination of
According to the existing IWSN standards, IWSNs are typically centralized, and TDMA mechanism is applied on the MAC layer. Thus, a TDMA scheduling decision shall be made by the gateway, so each node in the network has the knowledge of its available timeslots for sending and receiving packets. Since designing a TDMA scheduling scheme is out of the scope of this paper, a simplified TDMA scheduling is utilized. Apparently, a parent node requires more timeslots than its child node, since the parent node is involved in forwarding packets for its child node. The number of timeslots required by a parent node depends on the number of its child nodes, the data refresh rate of its child nodes, and the data refresh rate of itself. Therefore, to make an appropriate scheduling decision, the network topology needs to be generated at the gateway first.
As we defined previously, an IWSN consists of m nodes, excluding the gateway.
(1) (2) (3) (4) (5) (6) (7) Set (8) (9) (10) (11) (12) (13) (14) (15) (16) (17) (18)
Once the scheduling decision is made, the gateway sends a list-confirmed message to each node as a new routing confirmation. Moreover, the list-confirmed message also contains the latest scheduling decision. The forwarding scheme of list-confirmed messages is identical to the packet forwarding scheme, which is described in detail in the next subsection. Once a node receives its list-confirmed message, both new related node list and scheduling decision will be applied. As a centralized network, before sending out list-confirmed messages, the gateway is able to change the network topology. If the gateway intends to change the topology, it needs change the calculated topology information locally. Then the gateway encloses a command in the list-confirmed message to inform the corresponding node to delete a certain node in its related node list
4.3. Packet Forwarding Method
After all nodes successfully generate and apply their latest related node list and scheduling decisions, they are able to forward packets. As we described before, the inherent drawback of flooding transmission is excessive packet forwarding. Thus, related node lists are used in our proposed routing protocol to restrict the flooding range. Now we can formulate packet forwarding criteria of REALFLOW in detail. The first forwarding criterion is written as
This criterion indicates that if a node receives a packet with the source address or destination address A, which can be found in its local related node list
However, since flooding is applied rather than unicasting, duplicated packets may appear. In order to filter out duplicated packets and avoid unnecessary packet forwarding, each outgoing data packet must contain a unique identifier. A unique pair P is defined as the identifier. P consists of the sequence number
As mentioned previously, real-time performance is one of the stringent requirements of IWSNs. Thus, data packet should arrive at its destination before the deadline. In many industrial applications, outdated packets are of limited use for industrial systems. It is more reasonable to discard outdated packets in the intermediate node to save the network resources for other transmissions. The final forwarding criterion of our scheme is
Theoretically the refresh interval
Finally, the entire packet forwarding scheme for both uplink and downlink is summarized in Algorithm 4.
(1) Extract (2) (3) (4) Construct the unique pair (5) (6) Update (7) (8) (9) Forward (10) (11) (12) (13) (14) (15) Construct the unique pair (16) (17) Update (18) (19) (20) Forward (21) (22) (23) (24) (25) Drop
So far the details of our proposed routing protocol REALFLOW have been presented. In summary, four proceeding steps and four message types are involved in REALFLOW. First, the gateway broadcasts list-update messages to discover the latest network topology. Then each node replies with a list-response message to report their parent nodes and add itself into the related node lists in all intermediate nodes. After receiving all responses from all nodes, the gateway is able to obtain the latest network topology and calculate the latest TDMA scheduling decisions and send them back to all nodes by list-confirm messages. Finally, all nodes are able to communicate with the gateway based on controlled flooding according to our forwarding rules for both uplink and downlink. A summary of all steps and corresponding messages is shown in Figure 2.

REALFLOW proceeding summary.
4.4. Example: Reliable Real-Time Flooding-Based Routing Protocol
Figure 3 illustrates an example of REALFLOW. Transmissions between Node 7 and the gateway are described in detail. In the beginning, the gateway broadcasts a list-updated message. Propagation routes of the list-updated message to Node 7 are shown as solid arrows in the figure. Numbers on the arrows are the absolute values of RSSI from one node to another. We define

An example of REALFLOW: route establishment and packet forwarding between the gateway and Node 7.
After the related node lists are confirmed by the gateway, when Node 7 sends a packet to the gateway by flooding, only Nodes 1 and 2 are able to forward the packet, and other nodes will drop the packet automatically. By this means, packets are transmitted from Node 7 to the gateway via two paths, so the multipath diversity is achieved. Moreover, flooding transmission is severely controlled and restricted within a small range to avoid excessive packet forwarding.
Usually, many research works reach a consensus that flooding method is much less efficient at packet transmission than unicasting, since much more network resources may be required for flooding. However, it is not always the truth. In this example, as TDMA is used on the MAC layer, for uplink, only 3 timeslots are required to achieve two-path diversity. For traditional unicast routing protocol, four timeslots are needed to achieve the same diversity. A similar situation happens in the reversed direction for the downlink. More analyses of required timeslots, as well as complexity and reliability, are discussed in the following subsection.
4.5. Theoretical Analysis of REALFLOW
In this subsection, the complexity of the algorithm, the network resource efficiency, and reliability performance are analyzed by theory.
4.5.1. Algorithm Complexity
REALFLOW consists of four algorithms as shown above. Algorithms 1, 2, and 4 run distributively in each node in the network without requiring the gateway to participate, including related node list generation. The complexity of these three algorithms is
Only Algorithm 3 should run at the gateway to generate the network topology. The parameter
Compared with other routing protocols for IWSNs, such as [34], where the complexity is
4.5.2. Network Resource Efficiency
Regarding a general case, a TDMA IWSN consisting of

An example of a multihop IWSN for analysis.
Different from upper bound calculation, there are two theoretical lower bounds for REALFLOW. To calculate the first lower bound, we still assume that all nodes can find
In reality, a node cannot always find
From (6), since
When nodes with the same hops away from the gateway share the same parent nodes, (8) is obtained. According to (8), even if the hop number X increases, the total required time slots will not grow extraordinarily. Equation (9) is an extreme case in which all nodes can only find one path to the gateway. The required timeslot number is the same as unicast transmission. Thus, it is unnecessary to discuss.
In reality, the required timeslot number of the whole network is most probably between (6) and (8). Therefore, the network resource consumption when applying REALFLOW is definitely not overwhelming to the network, although the control-flooding mechanism is applied.
4.5.3. Reliability Performance
As we emphasized previously, high reliability is one of the most important requirements of IWSNs. REALFLOW is initially designed to achieve high reliability by high multipath diversity.
We use the same network topology (Figure 4) for the reliability analysis. The packet delivery ratio (PDR) of a node X hops away from the gateway is calculated as follows. We assume that there are
Finally the overall PDR between the gateway and the jth node with l hops away from the gateway
It is apparent that from (10)
Since
However, according to (6) and (8), the required number of time slots will also increase at the same time if we increase
5. Experimental Setup
The reliability and real-time performance of REALFLOW are evaluated and compared with those of three traditional routing protocols via simulations in the discrete event simulator QualNet. In this section, the experimental settings and simulation scenarios are described as follows.
5.1. Simulation Settings
We construct a centralized mesh IWSN placed within a 100 × 100 m area. Two types of devices are involved in our simulations, namely, a gateway and a number of nodes, with the complete communication protocol stack. On the network layer, we implemented REALFLOW in QualNet and utilize three other existing transitional routing protocols from QualNet. Besides the network layer, the configurations from other layers are summarized in Table 1.
The protocol parameters.
The configuration of the physical layer is defined according to the standard IEEE 802.15.4 [35], where the communication operates at 2.4 GHz with the bit rate 250 kbps. In order to provide deterministic communication, TDMA mechanism is applied rather than traditional CSMA/CA mechanism. The timeslot duration is determined according to the standard WirelessHART. The reasons for turning off retransmissions are due to the stringent real-time performance requirement and fast refresh rates. Retransmissions bring significantly higher delivery latency, so packets may be already outdated when arriving at their destinations if the deadlines are very short. For many industrial applications, outdated packets are of limited use for destinations. In the standard WirelessHART and ISA 100a, channel hopping is used on the MAC layer as well. For simplicity, we also disable channel hopping in our simulation. On the network layer, besides REALFLOW, we choose three traditional routing protocols, AODV, DSR, and DYMO provided by QualNet. These traditional routing protocols have been already applied in traditional WSNs. Constant bit rate application is selected on the application layer to provide continuous data transmissions.
Besides the protocol stack, the channel parameters and node settings are also included in Table 1. As mentioned before, due to a great number of obstacles, NLOS communication dominates in many industrial environments [8, 9]. Therefore, we choose the Rayleigh fading model. We assume that industrial environments are relatively static, so log-normal model is chosen as the shadowing model. According to the standard WirelessHART, the maximum allowed radio output power is 10 dBm. To achieve the longest communication distance, we set the transmission power as 10 dBm. This radio output power has been already supported by existing devices, such as CC2591 [36]. We choose the receiver sensitivity as −85 dBm to filter out too weak signals. A great number of existing devices are able to support this sensitivity such as CC2591 and CC2531 [37]. In order to prove our simulation setting suitable, we place two nodes in QualNet with around 40 meters away and measure RSSI value at the receiver side. According to the measurement result, although the measured RSSI values from our simulation are around 10 dB less than those from the real environment, the variance of the signal strength follows the same trend. RSSI values may differ from different platforms, so we can consider the channel status to be relatively similar to that in a real industrial environment.
5.2. Simulation Scenarios
We set up three different scenarios to show the results with respect to reliability and real-time performance from REALFLOW. In each scenario, we consider both uplink and downlink transmissions. Thus, each node periodically sends packets to the gateway, and the gateway also periodically sends packets to all nodes. The refresh intervals from three scenarios are 250 ms, 500 ms, and 1 s, respectively. These refresh rates are commonly seen in existing industrial applications [2].
Due to the fast refresh rate, the size of the network is strictly constrained. The faster the refresh rate is, the fewer the timing slots and bandwidth resources are available for each node. If too many nodes exist in the network, the network resources may become unschedulable. It is also important that due to the fast application refresh rate and stringent reliability and timing requirements, the hop number of each node in the network cannot be too large. Not only does larger hop number require more network resources and timing for packet forwarding, but also the end-to-end transmissions are at the risk of higher failure rate. This is one of the major differences between time-critical IWSNs and traditional WSNs. Usually the date refresh rate of traditional WSNs is much lower. Moreover, traditional WSNs have a much higher tolerance to transmission failures. Therefore, the sizes of the network from three scenarios are randomly selected as 10, 18, and 30, respectively, excluding the network manager.
In each scenario, 50% are sensors and 50% actuators. Three scenarios are shown in Figure 5. It is very important to know that arrows in Figure 5 do not mean that all nodes are able to communicate with the gateway directly. These arrows are the configurations from QualNet to show that all nodes are configured to communicate with the gateway periodically. If nodes are farther away than one hop distance to the gateway, intermediate nodes will be involved automatically.

Three simulation scenarios. A mesh network is created in each scenario. The arrows between nodes and the gateway do not mean the direct links but are the QualNet configurations on the application layer for periodic data transmissions.
After mesh networks are established, all nodes periodically send packet to the gateway at a certain refresh rate, and the gateway also periodically sends packet to all nodes. Then we measure packet delivery ratio (PDR), end-to-end transmission latency, and network recovery time. PDR measurements indicate the reliability of different routing protocols. End-to-end latency is calculated from the time when a packet is generated to the time when it arrives at the final destination, which reveals the real-time performance. The network recovery time means the time period spent by a routing protocol on recalculating a new path. It shows the robustness of routing protocols to be tolerant of network topology changes. These are the most important criteria to validate a well-qualified routing protocol for IWSNs.
6. Evaluation Results and Analysis
This section describes the simulation results from all three scenarios, covering the comparison between REALFLOW and three traditional routing protocols. Results of reliability, real-time performance, and network recovery time are analyzed separately in three subsections.
6.1. Packet Delivery Ratio
All PDRs from three scenarios are measured in two ways, namely, overall PDR and deadline PDR. Overall PDRs are measured based on all received packets at the destinations without considering application deadlines, whereas outdated packets are discarded when measuring deadline PDRs. Both PDRs from uplink and downlink are measured separately. Simulation results from three scenarios are shown in Figures 6, 7, and 8, respectively. From the results, we observe that PDRs measured from all scenarios for both uplink and downlink are much higher than the other three traditional routing protocols. Even in Scenario 3 where nodes are placed further away from each other, REALFLOW is still able to achieve more than 70% average PDRs for both uplink and downlink. This observation is mainly because packets are always sending via several paths from the sources to the destinations by our routing protocol, so the probability of packets arriving at the destinations is much higher. Therefore, even if the channel is in a bad status where broken links occur frequently, packets may be still able to find one path to the destination. It is also notable that overall PDRs and deadline PDRs from REALFLOW are the same, since all outdated packets have been discarded at every intermediate node at their respective deadlines.

PDRs of different routing protocols in Scenario 1.

PDRs of different routing protocols in Scenario 2.

PDRs of different routing protocols in Scenario 3.
Compared with REALFLOW, traditional routing protocols perform much worse in the Scenario 3. Not only are all deadline PDRs of traditional routing protocols for both uplink and downlink much lower than those of REALFLOW, but also the overall PDRs of those routing protocols are also quite low. For instance, in Scenario 3, deadline PDRs from all three traditional routing protocols are around 10%, much lower than the PDRs from REALFLOW, 75%. The standard deviations from all routing protocols are similar, which indicates the dynamic changes of the channel status. There are several reasons for the unsatisfying reliability performance of these three traditional routing protocols. The first reason is lack of redundant paths. These traditional routing protocols utilize only one route to forward all packets. Once any broken link occurs in this path, packets fail to be delivered to the destination. Secondly, traditional routing protocols are often used along with ARQ mechanism. Once transmission failure happens, the sender will retransmit the failed packets until they are successfully received or up to maximum retried times. As we described above, since retransmissions may introduce much longer delay, outdated packets are of limited use for destinations. Thus, ARQ is not used in our simulation. Without retransmissions, the traditional routing protocols can hardly achieve high reliability. The last reason is that these traditional routing protocols are initially designed for traditional ad hoc networks instead of industrial centralized networks. Therefore, under these IWSN settings, REALFLOW significantly outperforms traditional routing protocols in the reliability performance.
6.2. End-to-End Latency
Average uplink and downlink transmission latency from three scenarios for both uplink and downlink as well as their standard deviations are shown in Table 2. According to the simulation results, the average uplink and downlink delays of REALFLOW are much lower than the other three routing protocols. It is also notable that even if considering the standard deviations, the transmission latencies are still below the application deadlines. The decent real-time performance of REALFLOW can be explained as follows. Firstly, for REALFLOW, packets are only buffered at intermediate nodes until next available timeslot to transmit. Even if partial links of the network are broken, intermediate nodes will not spend any time on searching for the next hop, which greatly accelerates the packet forwarding procedures. However, for traditional routing protocols, if the links are broken, it will take them extremely long time to find the next available hop. Finally, the packet age is calculated through the time when the packet is generated and checked by all intermediate nodes. Outdated packets will be discarded automatically. Therefore, more network resources can be used to forward valid packets, which also shorten the end-to-end transmission delay. Therefore, REALFLOW can achieve extremely low end-to-end transmission delay. However, these advantages are not held by three traditional routing protocols. Packet ages calculated by traditional routing protocols are based on the packet hop number instead of existing time. Moreover, according to traditional routing protocols, nodes frequently exchange information to update the latest route status. Thus, packets may be buffered at intermediate nodes for long time until the next hop is found. According to the comparison, REALFLOW is proven to be a well-qualified routing protocol for real-time transmissions in IWSNs.
Simulation results of average latency and network recovery time for three scenarios.
6.3. Network Recovery Time
As we mentioned previously, a routing protocol should be tolerant of topology changes, such as intermediate nodes halting. Thus, in this experiment, we halt an intermediate node at a certain time during simulation. Then, the network recovery time is measured by observing the time when a new route is established. During the network recovery period, transmissions from certain nodes may be temporarily terminated, so a new path should be established as soon as possible. The network recovery time of different routing protocols from three scenarios is also shown in Table 2. Because REALFLOW always utilizes more than one path to forward packets, even if one intermediate node halts or one path is blocked, the packets are still able to arrive at the destination via other paths without requiring to establish new paths. Therefore, a seamless transition of the topology change can be achieved by REALFLOW, shown in the results. However, for traditional routing protocols, routing information needs to be updated timely by all nodes. Once a previous path is blocked, traditional routing protocols need to recalculate the latest routing information and try to find a new route. Depending on the channel condition, the time consumption of finding a new path is unpredictable and not deterministic. According to the simulation results, we observe that it took extremely long time for traditional routing protocols to establish a new path. Since packet delivery is blocked, unexpected operations may be taken at the receiver side, which is unacceptable to a great number of industrial applications. Therefore, the result reveals that REALFLOW is more robust for industrial automation.
7. Conclusions and Future Work
In this paper, we abstract the challenges on how to design a usable and robust routing protocol in IWSNs for industrial automation. Then REALFLOW is proposed to address all these challenges of deploying IWSNs for industrial purpose. Reliability, real-time performance, robustness, and node workload are thoroughly considered as REALFLOW designed. Instead of traditional routing tables, a related node list is distributively generated in each node and utilized to assist with packet forwarding. Packet transmissions for uplink and downlink are based on the controlled flooding mechanism and several other forwarding criteria. The simulation shows the outstanding improvement in both reliability and real-time performance, compared with traditional routing protocols. Moreover, a seamless transition in the event of topology change can be achieved by our routing protocol. Since our goal is to deploy IWSNs for industrial control systems, supporting hundreds of nodes in a large scale of networks is out of the scope of this paper.
In future work, REALFLOW can be further improved to support mobility of nodes, if industrial applications require. We shall also continue to look for an optimal scheduling scheme to enhance REALFLOW. Implementation of REALFLOW in real devices and conducting experiments in practical industrial environments is also of the most importance. Although low energy consumption is not the main issue of REALFLOW, to evaluate and analyze the overall energy consumption, compared to other routing protocols, are also parts of our future work.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
