This paper presents an opportunistic reception (OR) algorithm for energy-efficient transmission in cooperative wireless sensor networks (WSNs), where the characteristics of random linear network coding and the energy consumption property of WSNs are jointly considered. In OR, the sensor nodes in intermediate cluster generate the independent coding vector through simple forwarding or decoding-recoding manners opportunistically, so that the number of received packets can be reduced. To evaluate the algorithm, we derive the average number of received packets, the transmitting nodes, and decoding failure probability under specific assumption. The obtained theoretical and simulation results verify the effectiveness offered by the proposed approach.
1. Introduction
Due to the wide range of applications, wireless sensor networks (WSNs) have attracted numerous research interests in recent years, such as target tracking [1], military surveillance [2], and environment monitoring [3]. In most cases, the sensor nodes in WSNs are equipped with low-complexity hardware and single antenna, which restrain their communication quality in wireless fading channels. Therefore, transmission reliability becomes one of the key issues in the applications of WSNs.
Cooperative communication (CC) [4] is one approach to improve transmission reliability of single-antenna devices. A transmitting node that uses CC can share its packet with neighboring nodes, and then these nodes can transmit the packet to the intended receiver cooperatively, thereby creating a virtual multiple-input-multiple-output (MIMO) system. The intended receiver can obtain diversity gains by combining the received signals, which brings a signal-to-noise ratio (SNR) advantage over the single-input-single-output (SISO) case. Several works have focused on the applications of CC in WSNs (cooperative WSNs); for example, Li et al. [5] proposed a space time block code- (STBC-) based cooperative scheme to improve the bit error rate (BER), while Cui et al. [6] employed CC to reduce the transmission energy of the sensor nodes. All these cooperative schemes require strict synchronization between the nodes; however, due to the inexpensive hardware and limited resources, strict synchronization is difficult to be realized in WSNs, which deteriorates the performance of CC [7].
On the other hand, by means of combining the incoming packets at intermediate nodes in the networks, network coding (NC) [8] brings a breakthrough to the transmission efficiency. As a class of NC, Li et al. demonstrated that the network throughput can achieve the max-flow-min-cut bound through linear network coding (LNC) [9]. Furthermore, Koetter and Médard [10] presented an algebraic framework to construct the NC coefficient for LNC. On the basis of that, random LNC (RLNC) [11–13] was proposed to reduce the complexity and make LNC to be deployed as the distributed manner. RLNC enables the intermediate nodes to select combination coefficient randomly from a Galois field of size q, while the incoming packets are also treated and combined as a vector over this field. In this way, RLNC provides a simple, yet effective, approach to improve the latency [14] and delay-tolerance [15] in wireless networks.
The distributed deployment and simplicity of RLNC loose the synchronization requirement, which makes it very suitable to be deployed in cooperative WSNs. Recent work [16] has employed RLNC to increase the redundancy of the original packets, so that the transmission reliability of the cooperative WSNs can be improved. In [16], the intermediate node tries to receive and combine all the incoming packets to construct its linear independent coding vector (CV). However, since the sensor nodes are usually deployed in hostile circumstances and powered by limited batteries, energy consumption [17, 18] is another important issue in cooperative WSNs. For popular sensor transceiver today, the receiving circuit energy consumption of a packet is even larger than the transmitting one, because decoding is a rather complex operation requiring a lot of computing power, which has been a big threat to the lifetime of the networks [19]. Therefore, it indicates that, for cooperative WSNs, not only transmission reliability [16] but also energy consumption characteristic should be taken into consideration in RLNC scheme design.
In this paper, we propose an opportunistic reception (OR) algorithm to reduce the received packets at the intermediate nodes. Different from the former work [16], by considering some characteristics of RLNC, our OR algorithm enables the intermediate sensor nodes to generate independent CV through simple forwarding or decode-and-select manners opportunistically. To examine its performance, the average number of received packets, the transmitting nodes, and decoding failure probability are derived under specific assumption. In this way, our study provides a trade-off between energy efficiency and transmission reliability for cooperative WSNs.
The remainder of this paper is organized as follows. Section 2 describes the system model. The proposed OR algorithm is presented in Section 3, and the corresponding performances are theoretically analyzed in Section 4. Simulation results are presented and compared for performance evaluation in Section 5. Finally, Section 6 concludes the paper.
2. System Model
We consider multihop clustered WSNs, in which a source node in the source cluster sends data to a sink with the aid of several intermediate clusters, as depicted in Figure 1. Each cluster is composed of n sensor nodes, and the operation of the system is broken into rounds. It is assumed that the source node has data to send in each round.
System model of cooperative WSNs.
The transmission round consists of four phases, as shown in Figure 2. Phase I is the intrasource cluster broadcasting, as shown in Figure 2(a); the source node splits the original data into m packets as and then broadcasts it to the other nodes in the source cluster, named as , . It is assumed that the intracluster communication is error-free, so randomly selects a CV and combines all the incoming packets to generate its data as
Note that , , and are the elements over Galois field of size q and is randomly selected with probability .
Transmission procedure of cooperative WSNs.
Phase II is the source-intermediate cluster transmission, as depicted in Figure 2(b). In this phase, each transmits its outgoing packet to the intermediate cluster in the next hop. Note that the outgoing packet encapsulates both CV and data . Each sensor node in the intermediate cluster, named as , tries to receive all the packets [16] from the source cluster. After that, it recodes all the successfully received data as
is also a randomly selected L-length vector over Galois field, where L is the number of successfully received packets at . With (1), we rewrite the coded data as the product of a CV and P:
where . After that, each reencapsulates and into its outgoing packet, and the recoding and reencapsulation procedure is shown in Figure 3.
Recoding and recapsulation procedure.
Phase III is the inter-intermediate clusters communications, as shown in Figure 2(c). In this phase, if fails to receive all the incoming packets in Phase II, it keeps silent. Otherwise, sends its recapsulated packet to the next cluster. The remaining intermediate clusters perform the operation in the same manner as the one in Figure 2(b), so the coded packets are delivered one by one, until the last cluster near the sink.
Phase IV is the decoding phase, in which the sink tries to receive all the packets from the last cluster nearby, as shown in Figure 2(d). We assume that
is the w received coded data, and
is the w received CVs, in which and are extracted from the packet of . Thus, (4) can be rewritten as
and if no less than m out of the CVs in are linearly independent, the original data P can be recovered through Gaussian elimination [11]. Otherwise, the decoding failure occurs at sink.
3. Opportunistic Reception Algorithm
To facilitate the analysis, we simplify the above model to a two-hop one, which is the basic building block of more complex multihop networks. Firstly, according to the principle of RLNC [11], it should be confirmed that the only purpose of combining all the incoming packets at the sensor nodes [16] is nothing else but generating linearly independent CV. From this perspective, the linear combination in (3) can be replaced by the following two manners. (1) Forwarding: since and are randomly selected by and , , , it is naturally guaranteed that they are linearly independent of each other at high probability; in other words, they can be directly employed as the CV of the sensor nodes in intermediate cluster. For example, and can simply forward the packets from and , respectively, without receiving and combining other packets anymore. (2) Decoding-recoding: if successfully receives m packets, the received data can be written as
in which
can decode P by solving (7), and, then, it locally recodes P as
In this way, successfully generates linearly independent CV while further reception is also avoided.
By considering the above two characteristics, we propose a reception algorithm for the nodes in intermediate cluster to reduce the received packets. Let be the number of successfully received packets at . is the index set of the nodes which fail to generate independent CV, while and are those which generate independent CV due to forwarding and decoding-recoding, respectively. is the flag to identify whether is selected from , through the value true or false. Thus, the pseudocode description of the proposed algorithm is presented in Algorithm 1.
We propose an example to illustrate the effectiveness of OR algorithm. As depicted in Figure 4, an OR process is presented when , . In Figure 4(a), successfully broadcasts its packet to all the nodes in intermediate cluster, except for , which experiences link failure. According to the reception state, is updated, , while indexes 2, 3, and 4 are removed from to . Figure 4(b) depicts the node selection in ; that is, one of the nodes in is selected to generate its CV by the manner of forwarding. Here, we assume that index 3 is selected, so it is deleted while the others are removed from to . Besides, is ready to transmit and will not receive packets anymore. In Figure 4(c), broadcasts and all the nodes in intermediate cluster try to receive, except for . Similarly, is updated and index i is classified into or according to the rules of OR. In Figure 4(d), since index 1 is the only element of , is selected to forward the packet of . Meanwhile, because , and will generate their CVs by the decoding-recoding. Thus, all the nodes are ready to transmit, without further reception from and . In this example, packets are received in total. Comparing with packets by the manner of combination [16], the merit of OR is revealed.
An example of OR process.
4. Performance Analysis
To evaluate the performance of OR, we derive the mathematical expectation of the received packets, the transmitting nodes, and the decoding failure probability when , . (In fact, it is difficult to exhaust all the cases with large values of m and n. However, the low parameters do not influence the evaluation result of this paper. On the other hand, it has been proved in [20] that is optimal for NC and can also be used to describe the cluster with many nodes, in which 4 are alive while the others are asleep.) For simplicity, it is assumed that all incoming links at any sensor node exhibit the same value of failure probability P.
4.1. Mathematical Expectations of the Received Packets and Transmitting Nodes
In OR algorithm, is able to generate independent CV only in the following 2 cases: (1) index as well as j is selected from ; (2) index . Let V and VV denote these two events, respectively, and we denote d as the number of the sensor nodes that generate independent CV. In this way, CV generation can be presented by a d-size vector which consists of V and VV. For example, (V, VV) represents the event that in total 2 sensor nodes generate independent CV through cases (1) and (2), respectively. Thus, all cases of CV generations can be described by such vectors, as shown in Table 1.
In Table 1, when , a possible sample of (V) can be written as (V1, O, O, O). These 4 elements represent the reception situation of the 4 sensor nodes in intermediate cluster after Phase II, where V1 denotes that a node successfully receives the packet from , while O represents that a node fails to receive all the incoming packets. To derive the probability of each case, we introduce the following lemma.
Lemma 1.
In the proposed OR algorithm, if the CV generation is represented by a vector consisting of only one element V, then the sensor nodes that fail to generate independent CV can successfully receive at most packets.
Proof.
If successfully receives m packets, the index i will be included in and will generate CV by (7) and (9), so the corresponding vector description will contain the element VV, which contradict the hypothesis.
With Lemma 1, it can be deduced that, in all samples of (V), the sensor nodes that fail to generate independent CV can receive at most 1 () packet. Thus, all possible samples of (V) can be listed in Table 2.
All possible realizations of (V).
Case
Possible sample
1
(V1, O, O, O), (V2, O, O, O), (V3, O, O, O), (V4, O, O, O)
2
(V1, V1, O, O), (V2, V2, O, O), (V3, V3, O, O), (V4, V4, O, O)
Let denote the probability of the event that , . In Table 2, the event can be divided into 4 cases; for each case, the probability is denoted as , so can be expressed as
Each case is further divided, and can be written as
where denotes the probability of the jth sample of case i in Table 2. Let N denote the total number of the received packets by intermediate cluster per transmission round, and its mathematical expectation can be written as
where is the number of received packets in the corresponding sample. can be used to evaluate the average energy consumption of the network by the reception per round.
We take as an example to show the derivation. As listed in Table 2, it can be derived as
where stands for the probability that 2 out of 4 nodes in intermediate cluster fail to receive all the incoming packets. In this sample, the remaining 2 nodes both successfully receive the packet from , and one of them is selected with probability 1/2 to forward this packet, so the factor in (13) stands for the above event. accounts for the probability that a node successfully receives the packet from , but it is selected to neither forward nor successfully receive the rest of incoming packets. Meanwhile, we can calculate for this sample, since the node that is selected to simply forward receives only one packet, while the others receive all 4 incoming ones.
In Table 1, for the vector descriptions that only contain the element V, the possible samples and probabilities can be derived in similar way. For the ones that contain both V and VV, we take (V, VV) as an example. We denote and as the samples of V and VV, respectively. Thus, the following lemma can be proved.
Lemma 2.
In OR algorithm, all the realizations of (V, VV) can be written as the form of , , .
Proof.
If a sample of (V, VV) can be expressed as , , then according to OR it can be concluded that, besides and , the sample must contain the element . This fact indicates that the realization is a case of (V, V, VV), which contradicts the assumption.
With Lemma 2, all the samples of can be expressed as in Table 3, where , , and . The calculation is similar to the one of (V); for example, let denote the probability of , and it can be written as
while . In this way, all the possible samples and probabilities of (V, VV) can be derived, so as the ones that contain both V and VV in Table 1. By substituting these results into (12), can be obtained. The derivations of the other possible samples and probabilities listed in Table 1 are presented in the appendix.
All possible realizations of (, VV).
Case
Possible sample
1
,
2
,
3
,
4
,
5
,
6
,
Similarly, the mathematical expectation of transmitting nodes can be obtained as
where is derived in the Appendix. can be used to evaluate the average energy consumption of the network by the transmission per round.
4.2. Decoding Failure Probability
As defined in Section 2, the decoding failure probability can be expressed as
where s denotes the number of independent CVs at sink. In [21], it has been proved that two randomly selected CVs are correlated with each other at very small probability (5.63 × 10−8) when . In fact, small values of q increase the correlation of randomly selected CVs, which will dominate the decoding performance. On the other hand, too large value is also unnecessary, which increases the complexity. Hence, we assume that s equals the number of successfully received packets by sink. In our studied case, , , and it is assumed that all incoming links at sink exhibit the same failure probability . Thus, can be written as
By substituting (17) and into (16), the decoding failure probability can be obtained.
5. Simulation Results
We compare OR with NC based cooperative communication (NCCC) in [16], in terms of , , lifetime, and . The simulation model follows the simplified two-hop one in Section 3 with , , and . We define the lifetime as the time that the first node in intermediate cluster dies, which is widely used in the literatures. The energy model in [19] is employed, which has transmitting circuit energy of 45 nJ/packet and receiving circuit energy of 135 nJ/packet, and all the nodes have the initial energy of 500 mJ.
Figure 5 presents the mathematical expectation of received packet conditioned to the link failure probability P. For OR, the theoretical values are calculated by (12). It shows that our theoretical analysis perfectly matches the simulation results, and OR always yields less received packets comparing with NCCC. In the figure, the theoretical and simulation results also confirm that, for OR, the maximum and minimum values of are 16 and 7 when and 0, respectively. These points show the performance of OR when the link is in extreme state, for the sample (O, O, O, O) corresponds to while corresponds to . Due to less reception, OR consumes less receiving circuit energy than NCCC.
Mathematical expectation of received packet versus P.
Figure 6 shows the mathematical expectation of transmitting nodes versus P. For OR, the theoretical values are calculated by (15). It shows that OR is close to NCCC when P is near 0, which indicates that these two algorithms supply similar redundancy for original data when the link is in good state. In brief, OR always enables less nodes to transmit under the same P. Combining this result with the one in Figure 5, we can conclude that OR consumes less energy than NCCC.
Mathematical expectation of transmitting nodes versus P.
Figure 7 presents the lifetime comparisons, in which the minimal residual energy of the nodes is simulated after each round. The result shows that OR can support more transmission rounds than NCCC when the energy is exhausted. Besides, it also shows that when , OR performs better than . This result corresponds well with the one in Figure 5, because smaller value of P will yield less received packets, which dominate the energy consumption in the employed model.
Lifetime comparisons.
Figure 8 depicts the gradient comparisons of the minimal residual energy presented in Figure 7. This metric essentially reflects the energy consumption per round. We observe that, for NCCC, the gradient is fixed to −585 nJ. This is due to the fact that each node will always receive 4 packets and transmit 1 per round. Comparing with NCCC, the result shows that OR always yields less gradient, and it fluctuates with time. This is caused by the dynamic manner selection, through which the nodes opportunistically generate their CVs. Moreover, it also shows that superior link quality yields smaller gradient for OR.
Gradient comparisons.
Figure 9 depicts the decoding failure probability versus P. It indicates that OR performs close to NCCC when P is near 0, which corresponds well with the result in Figure 6. Again, our theoretical analysis matches the simulations very well. On the other hand, the gap between the two compared algorithms grows as increases, which shows that OR is less efficient under poor relay-sink links. However, different from our simplified model, the sink generally locates in the sink cluster in practice and hence the other sensor nodes in the sink cluster also help to receive, which yields superior reception performance even when is in poor state.
Decoding failure probability versus P.
6. Conclusion
In this paper, we proposed an energy-efficient OR algorithm to reduce the energy consumption of the sensor nodes in cooperative WSNs. The theoretical and simulation results show that OR outperforms NCCC in energy consumption, while it also obtains similar decoding failure probability to that of NCCC when the incoming links are in good state. The proposed algorithm provides a trade-off between energy efficiency and transmission reliability.
Footnotes
Appendix
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This work was supported by the National Basic Research Program of China (973 Program) (2013CB329104), the National Natural Science Foundations of China (61372124, 61171093, and 61427801), the Key Projects of Natural Science Foundations of Jiangsu University (11KJA510001), Jiangsu 973 Projects (BK2011027), and NUPTSF (NY214138).
References
1.
AkyildizI. F.SuW.SankarasubramaniamY.CayirciE.A survey on sensor networksIEEE Communications Magazine200240810211410.1109/mcom.2002.10244222-s2.0-0036688074
2.
ChongC.-Y.KumarS. P.Sensor networks: evolution, opportunities, and challengesProceedings of the IEEE2003918124712562-s2.0-294268642510.1109/jproc.2003.814918
LanemanJ. N.TseD. N. C.WornellG. W.Cooperative diversity in wireless networks: efficient protocols and outage behaviorIEEE Transactions on Information Theory200450123062308010.1109/tit.2004.838089MR21034842-s2.0-5044252003
5.
LiX.ChenM.LiuW.Application of STBC-Encoded cooperative transmissions in wireless sensor networksIEEE Signal Processing Letters200512213413710.1109/lsp.2004.8408702-s2.0-13244289915
6.
CuiS.GoldsmithA. J.BahaiA.Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networksIEEE Journal on Selected Areas in Communications2004226108910982-s2.0-434471076510.1109/JSAC.2004.830916
7.
NguyenT.-D.BerderO.SentieysO.Impact of transmission synchronization error and cooperative reception techniques on the performance of cooperative MIMO systemsProceedings of the IEEE International Conference on Communications (ICC '08)May 2008460146052-s2.0-5124910599310.1109/icc.2008.863
8.
AhlswedeR.CaiN.LiS. Y. R.YeungR. W.Network information flowIEEE Transactions on Information Theory20004641204121610.1109/18.850663MR17685422-s2.0-0034229404
9.
LiS. R.YeungR. W.CaiN.Linear network codingIEEE Transactions on Information Theory200349237138110.1109/tit.2002.807285MR19667852-s2.0-0037323073
10.
KoetterR.MédardM.An algebraic approach to network codingIEEE/ACM Transactions on Networking200311578279510.1109/TNET.2003.8181972-s2.0-0242334165
11.
HoT.MedardM.KoetterR.KargerD. R.EffrosM.ShiJ.LeongB.A random linear network coding approach to multicastIEEE Transactions on Information Theory200652104413443010.1109/tit.2006.881746MR23008272-s2.0-33947399169
12.
LucaniD. E.StojanovicM.MédardM.Random linear network coding for time division duplexing: when to stop talking and start listeningProceedings of the 28th Conference on Computer Communications (INFOCOM '09)April 2009Rio de Janeiro, Brazil180018082-s2.0-7034966161710.1109/infcom.2009.5062100
13.
LucaniD. E.MedardM.StojanovicM.Random linear network coding for time-division duplexing: field size considerationsProceedings of the IEEE Global Telecommunications Conference (GLOBECOM '09)December 20091610.1109/glocom.2009.54252572-s2.0-77951612022
14.
XiaoM.KliewerJ.SkoglundM.Design of network codes for multiple-user multiple-relay wireless networksIEEE Transactions on Communications201260123755376610.1109/TCOMM.2012.091012.1101212-s2.0-84871659603
15.
NistorM.LucaniD. E.VinhozaT. T. V.CostaR. A.BarrosJ.On the delay distribution of random linear network codingIEEE Journal on Selected Areas in Communications20112951084109310.1109/JSAC.2011.1105182-s2.0-84055221982
16.
LiuX.GongX.ZhengY.Reliable cooperative communications based on random network coding in multi-hop relay WSNsIEEE Sensors Journal20141482514252310.1109/jsen.2014.2310899
17.
SiamM. Z.KrunzM.YounisO.Energy-efficient clustering/routing for cooperative MIMO operation in sensor networksProceedings of the 28th Conference on Computer Communications (INFOCOM '09)April 200962162910.1109/infcom.2009.50619692-s2.0-70349866317
18.
GaoQ.ZuoY.ZhangJ.PengX.-H.Improving energy efficiency in a wireless sensor network by combining cooperative MIMO with data aggregationIEEE Transactions on Vehicular Technology20105983956396510.1109/TVT.2010.20637192-s2.0-77958098684
19.
JungJ. W.WeitnauerM. A.On using cooperative routing for lifetime optimization of multi-hop wireless sensor networks: analysis and guidelinesIEEE Transactions on Communications20136183413342310.1109/tcomm.2013.052013.1207072-s2.0-84883287626
20.
DingZ.RatnarajahT.LeungK. K.On the study of network coded AF transmission protocol for wireless multiple access channelsIEEE Transactions on Wireless Communications20087114568457410.1109/T-WC.2008.0705102-s2.0-57149126361
21.
Trullols-CrucesO.Barcelo-OrdinasJ. M.FioreM.Exact decoding probability under random linear network codingIEEE Communications Letters2011151676910.1109/LCOMM.2010.110310.1014802-s2.0-79551682625