Abstract
Flooding in low duty-cycled wireless sensor networks suffers from a large transmission delay because a sender has to wait until a receiver becomes active to forward a packet. With the presence of unreliable radio links, the delay performance is even more severely degraded. In this article, we aim to reduce the flooding delay in low duty-cycled wireless sensor networks in relation to link unreliability. The key idea is to build a delay-sensitive flooding tree in which a node receives packet through the shortest path in terms of the total expected number of transmissions. In addition, the algorithm allows multiple senders to send through links outside of the tree if they can provide earlier expected delivery time. To give priorities to potential senders, we employ an energy-balancing mechanism which dynamically distributes the sending role among them. The mechanism not only makes sure senders start to acquire the channel at different times to prevent collisions but also lets them alternatively take turns based on residual energy, in order to lengthen network lifetime. Compared with the best known schemes, the proposed algorithm achieves up to 8% improvement in terms of flooding delay, energy consumption, and network lifetime.
Introduction
Wireless sensor networks (WSNs) are often deployed in a large scale, with hundreds to thousands of nodes. They use flooding as a primitive operation to update network parameters, code, or disseminate a route discovery message to each node.1–3 A pure flooding is when a node receives a packet and sends the packet to all neighboring nodes, except the one from which it received. However, this method results in redundant transmissions, since multiple nodes may transmit to a common neighbor. To reduce that redundancy, a handful of studies have focused on building an efficient flooding tree, where the packet is sent according to a parent–child relationship.4–7
Since a WSN is a collection of battery-powered motes, energy consumption is a critical issue. One possible way to prolong network life span is to run sensors in low duty-cycled mode.8–10 As the name suggests, nodes in duty cycle mode periodically switch between active and sleeping states. Each sensor node is active for just a short period of time (time slot), and rest of the time, it stays in sleeping state (turning off the radio). Although a low duty-cycled configuration can greatly enhance network lifetime, it increases the flooding delay. In the case of tree-based flooding, a parent has to wait until a child becomes active to broadcast; and with multiple children being active at different time slots, the parent has to send a packet multiple times. 11 Such multiple transmissions cause not only longer flooding latency but also more energy consumption. 12
In addition, research has shown that the wireless communication channel is unreliable,13–15 especially in WSNs, where nodes with low power are spread over a wide area, and the presence of obstacles and other environmental effects worsen the quality of wireless links. Consequently, to successfully transmit a packet to a receiver, a sender might have to send it several times. Those retransmissions also make the delay and energy consumption performance more severe. Previous approaches for multi-hop ad hoc networks, such as hop-based shortest path tree 6 and minimum connected dominating set, 16 are mostly suitable for a reliable link model. So far, regarding the unreliable environment, only a few studies have addressed the flooding tree construction problem. Among them, Guo et al. 5 proposed a dominant tree-based flooding structure in which the expected total number of transmissions is minimized. In their work, each node selects the one having the least number of expected transmissions to be its parent. Although flooding through this tree structure results in a remarkably smaller delay than pure flooding, the parent–child relationship is built by considering only one-hop neighbors, so that leaf nodes might receive a packet through a long delay path.
This article proposes a flooding scheme that provides efficient delay for low duty-cycled WSNs where the communication links are unreliable. A flooding tree is constructed to minimize the expected cumulative transmissions on each path connecting the source node to any other node. The scheme further enhances the delay performance by opportunistically utilizing links outside the tree that would help in faster packet delivery than tree-based flooding. Additionally, the proposed scheme contains a mechanism to alternatively distribute the sending role among potential senders based on their remaining energy. Such a sending distribution alleviates energy imbalance between potential senders, which plays key role in prolonging network lifetime. In brief, our contributions are as follows:
We design a flooding tree for an unreliable WSN, considering both the hop count and the quality of links to provide a delay-efficient path to any node in the network. Since hop-count information failed to capture the unreliable property of a path, combining it with the expected delay information is necessary to build efficient path between nodes.
We come up with a result that even when a tree is built to minimize the expected delay to each node, there are still chances to improve the delay performance of the network by allowing several sender candidates to participate in a broadcasting task to a single node.
To select a transmitting node among the sender candidates, we devise dynamic priorities to broadcast to a node based on the candidates’ residual energies. The priorities aim to resolve the energy imbalance issue and therefore to lengthen the network lifetime.
The organization of this article is as follows: in section “Related work”, we review important work focusing on the flooding problem in WSNs. Section “Preliminaries and motivation” restates basic terms and assumptions. Section “Delay-sensitive flooding scheme” presents the proposed scheme, which consists of the following: (1) building the delay-efficient flooding tree structure, (2) the determination of opportunistic transmissions based on the tree structure, and (3) the method for alleviating the collision at the receiver and balancing the energy consumption among senders. Section “Performance evaluation” shows simulation results and quantifies the gain over the best known scheme. Finally, we conclude our work in section “Conclusion.”
Related work
The flooding problem in duty-cycled WSNs has been studied intensively in the last decade. Depending on different applications, the scheme may require delay or energy efficiency to be the main metric. This part reviews some existing approaches toward the two concerns when a packet is flooded in an unreliable wireless environment.
So far, there are several methods to conserve energy: radio optimization, data reduction, sleep/wake-up schemes, and mobility. 17 Regarding wireless sensor nodes, Anastasi et al. 18 observed that energy for transmitting, receiving, and idle listening is in the same order of magnitude; only sleeping can drop the energy consumption rate remarkably. Therefore, the sleep/wake-up mechanisms, especially duty-cycling, became a prominent approach toward the energy conservation and have attracted a lot of research efforts. 19 Accordingly, the common ways to assess energy efficiency are through the number of transmissions, 5 the averaged power consumption per node,4,7 or the network lifetime. 20 Among them, network lifetime is an important objective in WSNs, which requires a wise balancing strategy.
In a typical wireless ad hoc network, pure flooding is a fundamental method for disseminating data across the network, but it can cause a broadcasting storm problem. 7 The broadcasting storm introduces a considerable degree of transmission redundancy and a high probability of contentions and collisions. 21 Many researchers tried to resolve the problem, essentially by proposing to broadcast along an efficient spanning tree. Guo et al. 5 introduced an energy-optimal tree (EOT) in which the total number of transmissions for a flooding packet is minimal. Couto et al. 22 considered the expected transmission count (ETX) as an important metric when constructing a communication path in a multi-hop wireless network. Later, Niu et al. 23 used ETX as a criterion to build a minimum delay flooding tree in WSNs. Such an approach is desirable for achieving efficient delay but costly, since each node ignores the hop-count information during the tree construction process. One serious issue of tree-based flooding is that a bottleneck node (e.g. a node with long delay or out of energy) will affect all of the descendants in its subtree.
Several existing approaches improved the robustness and reliability of the flooding performance in WSNs. Guo et al. 5 designed an opportunistic algorithm, utilizing the uncertain nature of the unreliable channel to reduce the flooding delay and alleviate the single path issue. Niu et al.’s 23 algorithm starts with a minimum delay spanning tree and then refines the tree structure to lessen energy consumption while maintaining delay efficiency. Cheng et al.’s 24 algorithm lets each node choose between a delay-optimal path and an energy-optimal path when forwarding a packet based on a real-time context.
Existing schemes can provide either a small flooding delay for a packet or a minimum amount of spent energy to complete a flooding round. However, they neglect a compromise between delay and network lifetime. In our work, we are concerned not only with the flooding delay of a single packet but also with the network lifetime of a low duty-cycled WSN containing unreliable communication links. The proposed scheme considers both hop-count information and quality of links to construct a delay-driven tree (DDT) and dynamically uses opportunistic transmissions.
Preliminaries and motivation
We consider a WSN which consists of N nodes. Every node has an equal transmission range and power supply. The entire time is split into working periods with equal length. In turn, a working period is divided into Ttime slots
Nodes are deployed in a given area, and links between them are unreliable. Link quality can be characterized by a real number indicating the average success rate when the sender transmits to the receiver and can be measured using the wireless link estimation method in Niu et al. 23 Each node maintains a table of link qualities toward its neighbors. Given link qualities between nodes, a communication graph can be easily constructed by connecting every pair of nodes which have a communication link to each other. Figure 1(a) illustrates an example of a communication graph where dashed lines represent the communication links (edges), and the numbers next to the links are the corresponding qualities. Based on the communication graph, the level of a node is defined as the hop distance from the source node in the communication graph. A node only receives a packet from previous-level neighbors, and as a result, a directed acyclic graph (DAG) is formed as in Figure 1(b). The arrows point out the direction of a transmission.

Example of network graphs: (a) communication graph (dashed lines are edges between nodes; a number next to an edge indicates its quality) and (b) directed acyclic graph (arrows indicates possible sending directions).
Recall that the flooding delay of a packet is the time when the last leaf node in the network receives the packet. The objective of this research is to efficiently reduce the flooding delay and balance the energy consumption to prolong network lifetime in low duty-cycled WSNs with the presence of unreliable links. As effective flooding tree construction plays a crucial role in reducing the delay, this work focuses on improving flooding delay in a delay-driven flooding tree. Furthermore, in order to lengthen the network life span, the proposed scheme should consider the residual energy of nodes as an important parameter while making a forwarding decision.
Guo et al.
5
introduced an EOT. For each node, it selects the parent among its previous-level neighbors, so that the link between the two is of highest quality. For example, in Figure 3(a), nodes A, B, and C are one-hop neighbors of node S, so S is the parent of the three nodes. For node E, there are two parent candidates: node B and node C. Because the link quality
The EOT minimizes the number of transmissions for each flooding packet to be spread through the whole network, because each node receives the packet from the node providing the best incoming link quality. Let us say link delay is the time it takes one link’s end (sender) to successfully transmit a packet to the other end (receiver). It can be seen that the number of expected transmissions (ETX) toward a node to get one success is smallest, which can be translated to small link delay. However, since the time a node receives the packet is an accumulation of all link delays along the path from source to that node, and the EOT does not guarantee efficient delay to leaf nodes which lie at the boundary of the network and determine the overall delay.
Given a flooding tree structure, Guo et al. 5 proved that the delay performance can be further improved by utilizing the random nature of a wireless channel. A link quality only represents the average success rate of a link, so that even with a better link, there is no guarantee that the link will deliver the packet earlier than the worse link. The same is true for paths. If there is an opportunity for another path to offer statistically earlier packet delivery than the tree-based one, it will use that one instead. A node therefore can receive the packet through different paths, reducing the chance that a single large-delay node will affect all of its subtree nodes. This approach, opportunistic mechanism, brings flexibility and reliability to the tree-based flooding which solely carries a packet along the tree paths.
Delay-sensitive flooding scheme
In this section, we first sketch the basic idea of the proposed scheme. After that the flooding algorithm is explained in detail, including the following: (1) constructing a DDT, (2) utilizing opportunistic transmissions for faster packet flooding, and (3) implementing a reliable transmission mechanism. Finally, a summary of the scheme is presented concerning the operation flow at the nodes. The idea of the scheme is outlined as follows:
We propose a tree-based flooding structure which aims to improve the flooding delay in WSNs consisting of unreliable links. The key idea is that the tree-build algorithm pays attention to the delay of the path connecting the source with each node rather than individual one-hop transmissions. Because the delay of a flooding packet is determined by the last leaf node receiving the packet, providing an efficient delay path to any node will contribute to a reduction in overall flooding delay. Based on the constructed tree, a statistically expected flooding delay at each node can be measured. Note that when calculating the expected flooding delay, the algorithm ignores the presence of collisions. The expected flooding delay later will be used as one input for the opportunistic forwarding decision.
We use the opportunistic mechanism as an overlaying layer to enhance the delay efficiency of flooding. Given a node, an opportunistic mechanism selects some nodes among the previous-level neighbors, whose links to the node do not belong to the tree, to transmit to the node if the transmission is beneficial in delay. Generally, the nodes selected by the opportunistic mechanism must be the one, which by any chance receives the packet early enough, which can provide a smaller delay to the next-level neighbors (excluding its children) than the tree-based transmissions. Furthermore, the receiver with improved packet delay, in turn, will start to send to its descendants earlier than with the tree-based flooding. Hence, finally, the overall delay of the network is improved. The presence of opportunistic senders, however, raises the problem of collisions at the receiver.
In order to alleviate the collisions at a node, the scheme forms a sender set for the node. Only nodes in the sender set are considered to be opportunistic senders. The algorithm lets each node in the sender set wake up in sequence, so that it can check the channel for potential collisions before deciding to send. Given a set of senders for each node, we propose a novel energy-balancing backoff scheme: a sender with more residual energy has a higher priority to transmit. Such an algorithm is expected to lengthen network lifetime.
Delay-driven tree construction
An ETX of a link is the number of expected transmissions for one success, which is the reciprocal of link quality. In this article, we define path quality to represent the sum of the links’ETX along the path. The goal of the path quality approach is to minimize the total number of transmissions of a single packet along the path from a source to any node. Taking that idea into account, the DDT is built in a manner that each receiver connects to the source node through the path with smallest path quality (smaller is better).
The starting point to build the DDT is the DAG. Basically in the DAG, each receiver might receive a packet from one of the previous-level neighbors. For each node m, we define node ETX,
in which
Figure 2 shows the pseudocode of an algorithm to compute node ETX for all nodes. Starting from the source node of a DAG, each node computes its node ETX and shares that information with the next-level neighbors. A node, upon receiving the information from its previous-level neighbors (line 5), will extract the node

Node ETX computation.
While building the DDT, for node m (not the source node), it takes the node ETX of each previous-level neighbor
To illustrate the difference between DDT and EOT, let us consider the example for the network in Figure 1(a). In Figure 3(a) and (b), the constructed EOT and DDT, respectively, are shown. The solid lines connecting nodes represent the tree’s links, while the dotted lines are edges in the communication graph. The arrows point out the packet flow direction of each link. For instance, link quality from node S to nodes A, B, and C are

(a) EOT and (b) DDT structures.
Compared with the EOT, the DDT needs less cumulative transmissions from the source node toward any node. Therefore, the expected flooding delay to each node in DDT is smaller than that in the EOT. For example, with the EOT in Figure 3(a), the path cost from S to G is
Opportunistic mechanism
In an unreliable transmission environment, the number of retransmissions along a link is a random variable and usually follows the geometric distribution.
5
On a link with quality q, the first successful transmission happens at a
The randomness of an unreliable transmission plays a key role in the foundation of the opportunistic mechanism. Given the link qualities, the reception delay probability distribution could be estimated for each network node, assuming that packet is sent only using the DDT links. Such a probability spectrum is calculated in section “Calculating pmf distribution.” Based on the delay probability distribution of node m, in section “Opportunistic link selection,” we show how a previous-level neighbor can estimate the packet delay at node m with confidence level p. In runtime, a previous-level neighbor, after receiving the packet, computes the expected delay to node m, as if it sent to m, and will decide to opportunistically send to node m or not, for earlier delivery. For the rest of this section, we will use the example from Figure 3(b) to illustrate corresponding calculations. Suppose that the working period is 5, the active time slots for each node are presented in Table 1.
Active time slots of network nodes.
Calculating pmf distribution
In the case of an unreliable communication link, a sender node might have to send multiple times until it is successful. For example, in Figure 4, node S generates the packet, so the probability that node S has the packet is

Reception probability distribution of one-hop transmission.
For a node which is multi-hop away from the source, its pmf not only depends on the link quality from which it receives but also is affected by the pmf of its parent. Let
Formula (3) states that
Then, the probability that the first success occurs at time
Figure 5 shows an example for the calculation of pmf for node D and node G. If node A receives a packet at time

Example of computing pmf.
Opportunistic link selection
After computing the pmf distribution for the whole network, each node estimates its
Applying that to the example in Figure 5, if
When node
Note that
Case 1.
Case 2.

Opportunistic link decision.
For instance, assume that the threshold p is set to 0.9, and flooding packet arrives at node B and node C at times 3 and 7, respectively. We already know that
Reliable transmission
The utilization of opportunistic links leads to multiple senders deciding to send a packet to the same receiver at the same time. To resolve this problem, two steps are applied: building a sender set for each node and an energy-balancing sending prioritization for nodes in the sender set.
Building a sender set
In order to reduce the collisions (caused by the hidden terminal problem), each node maintains a sender set, consisting of nodes that can overhear each other’s transmission. The sender set of a node is the subset of previous-level neighbors in which link quality between any pair of nodes in the set is better than the preset threshold

Building the sender set algorithm.
For instance, in Figure 8, with

Sender set construction for node D, with
Energy-balanced sending prioritization
Nodes in the sender set of node m (m can be any node in the network) could overhear each other’s transmission to m with the probability not less than
In order to define the sending priorities for nodes in the sender set, the existing solution
5
relies on the link quality toward node m. If there is more than one node wanting to transmit, the one with best link quality to node m will have highest priority to send. This approach helps in very short delay but remains an unbalanced energy problem. The node with highest link quality to node m always takes its turn first if a flooding packet has arrived at it. For instance, in Figure 8, among two nodes in the sender set
To resolve this, the proposed algorithm takes both the link quality and the residual energy of the sender into account when determining the sending priorities in a sender set. When the packet has arrived, each node
in which
Then, it can be seen that
Design summary
The proposed scheme consists of three main parts: the design of a flooding tree, the opportunistic mechanism, and the reliable transmission mechanism. The opportunistic mechanism works in tandem with the reliable transmission approach. While the first allows nodes to send a packet along the link with a smaller delay, the second resolves the collision by assigning different priorities to nodes in the sender set which are intended to transmit to the same node.
In the initialization phase of the network, all nodes cooperate to build the DDT. After the tree construction, in the case of opportunistic utilization, each node in the network will make further steps with DDT as a base structure. Two important parameters of the opportunistic mechanism, the statistical delay’s confidence level p and the sender set’s link quality threshold
It is worth noting that the opportunistic mechanism is an optional building block to enhance the delay performance of tree-based flooding. We can also use either the energy-balanced sending prioritization or the link quality–based backoff strategy to resolve potential collisions in the sender set, depending on whether the network lifetime or the delay performance is preferred. The number of schemes that will be examined and their abbreviations are described in Table 2.
Scheme names.
Performance evaluation
This section evaluates the performance of different flooding schemes based on two tree structures: our design DDT and the best known EOT in Guo et al. 5 Either flooding operation on the two structures with or without the integration of opportunistic mechanism will be quantified. We also measure the merit of the energy-balancing prioritization in lengthening network lifetime.
Simulation methodology
We use the same assumptions and methodology as in Guo et al. 5 The network has one source node which has unlimited power, and all the nodes are stationary and homogeneous. Each node picks up its active time slot randomly. The nodes are randomly placed in a two-dimensional squared area, and the source node is positioned at a corner. We vary the duty cycle, network size, and network density and observe the change accordingly. Table 3 shows the simulation’s network configuration.
Network configuration.
The three following metrics are considered: 18
Average flooding delay. The time elapsed from when the flooding packet is sent out by the source node until it reaches all nodes in the network (called one flooding round). Note that we measure the delay by the number of time slots (one time unit equals one time slot).
Energy consumption. The average amount of energy that each node spends in one flooding round. The value is averaged among all the network nodes.
Network lifetime. The number of flooding rounds until the first node runs out of battery.
For evaluating the average flooding delay and energy consumption, the simulator generates 50 random networks. In each network, 50 flooding packets are generated. The performance metrics are averaged among 50 × 50 cases. For the network lifetime, flooding packets are broadcasted until the first node runs out of battery. The lifetime is averaged among the 50 random networks.
Simulation environment
As mentioned above, an important parameter that controls the delay performance of the opportunistic mechanism is the quality threshold p. The larger the p, the bigger the value of statistical delay
We ignore the computational energy cost in sensors, as it is relatively small compared to the communication one. 26 We adopt the energy consumption model of MICA2 as presented in Table 4.27,28
Simulation parameters.
In an active state, a node consumes 9.6 mJ/s and in a sleeping state, it spends 0.33 mJ/s. In the active state, if a node does a transmission or reception, it costs an additional 5.76 × 10−3 mJ/byte or 0.88 × 10−3 mJ/byte, respectively. After a node receives the packet, in its subsequent active time slots in the flooding round, the node will not wake up and listen anymore.
Let one flooding round to be the time from when the source node starts to send out the flooding packet, until the packet reaches every node. Energy consumption of node i in one flooding round is the summation of energy for transmitting, receiving, listening (being active without transmitting/receiving), and sleeping as in equation (10)
in which
Node energy consumption in different modes.
In one flooding round, a node only receives one time, so we have
Impact of duty cycle
Figure 9(a) compares the delays of the EOT and the DDT with different duty cycles (from 2% to 20%). For all the cases, our DDT is around 9% better, and the peak gain is more than 10% when the duty cycle is critically low (duty cycle 2%). The DDT cuts 8.5% off the energy amount that EOT has to spend, as shown in Figure 9(b). When the duty cycle increases, the flooding delay and consumed energy of one flooding round both decrease because each working period contains fewer time slots. Therefore, the time and energy each node spends sleeping decreases. The whiskers show the confidence interval at 95% confidence level. Throughout the collected results, the interval width is less than 4.8% of the corresponding value.

Comparison between EOT and DDT: (a) delay performance and (b) energy consumption performance.
Figure 10 depicts the enhancement when an opportunistic mechanism is present: the DDTo and EOTo schemes have a similar reduction in delay over DDT and EOT, respectively. This improvement persists throughout all our experiments. However, our purpose is to reflect the best achievable delay performance, so that in the following comparisons, we only include schemes with opportunistic utilization (i.e. EOTo, DDTo, and DDToe).

Delay improvement using opportunistic mechanism.
Figure 11(a) shows the changes of an average flooding delay by the number of time slots when we vary the duty cycle settings. In this case, DDTo provides the smallest delay, followed by the DDToe, and then the EOTo. Although based on the same flooding tree DDT, in DDTo, the sending priorities among nodes in the sender set are static over time. DDToe balances between the quality of the link and the remaining energy of the sender; thus, the sending role is distributed across different sender candidates over time. Correspondingly, the delay provided by DDToe is slightly bigger than DDTo’s. The reported gain of DDTo compared with the EOTo is around 7.5%, while DDToe’s flooding delay is 6% smaller than the EOTo.

Flooding performance on different duty cycles: (a) average flooding delay, (b) energy consumption per node, and (c) network lifetime.
Considering the averaged energy consumption per node, for one flooding packet, the DDTo and DDToe show around 6%–8% less energy consumed than the EOTo (Figure 11(b)). This is reasonable, since with the smaller delay of DDTo or DDToe, at the time when the whole network of our two schemes completed flooding, the network with EOTo algorithm continued to operate and consume energy. The levels of energy spent at each node in the two DDT-based schemes are very close, but the number of flooding rounds DDToe can carry is around 3% more than that of DDTo. Compared with EOTo, the DDToe is approximately 6%–7% better. Figure 11(c) shows the increase in network lifetime when the duty cycle increases. With the lower duty cycle, in one flooding round, the higher fraction of energy spent is for sleeping, and the smaller fraction is for transmitting/receiving, so that the network lifetime is proportional to the duty cycle.
Performance comparison for various network sizes
In this test, we evaluate the impact of network sizes on the flooding delay, number of transmissions, and network lifetime. The size of the network varies from 200 to 1000 nodes. The network area is kept squared and its size changes accordingly to keep the network density constant. The duty cycle in this experiment is set to 10%. In Figure 12(a), DDTo and DDToe demonstrate up to 8.3% and 7.5% improvement in delay. Figure 12(b) presents the comparable performance between DDTo and DDToe: both reduce up to 7% energy consumption in one flooding round. In terms of the network lifetime, DDToe is up to 8% longer than the EOTo, while DDTo has up to 7% gain. From Figure 12(c), we can see that DDToe brings the largest number of flooding rounds with the energy-balancing mechanism. As the network size increases, the energy reduced at each node in one round increases, and thus, the number of rounds the network can afford is decreased.

Flooding performance on different network sizes: (a) average flooding delay, (b) energy consumption per node, and (c) network lifetime.
Impact of network density
In order to observe the performance of DDTo and DDToe with the network density variation, we fix the number of nodes at 800, and let the side length vary between 250 and 500 m. When the side length increases, network density decreases, so that the number of neighboring nodes decreases. Consequently, the paths of the network get longer (i.e. the number of hops). In addition, the probability of finding opportunistic links is reduced because of a smaller number of the node’s neighbors. For those reasons, flooding delay increases, network nodes consume more energy, and network lifetime decreases in all the three schemes (Figure 13). As a result, we can see a 7% delay improvement and an 8.6% energy saving (by DDTo) and up to a 7.5% development of network lifetime (by DDToe) over the EOTo.

Flooding performance on different network densities: (a) average flooding delay, (b) energy consumption per node, and (c) network lifetime.
Conclusion
In this article, we proposed a new flooding tree structure, a DDT, in which the path from the source to any sensor node is of the smallest cumulative expected number of transmissions. As a result, the delay along each path to a single node is the lowest possible one, and thus, the overall energy consumption of the network is reduced. In addition to that, we introduced an energy-balancing algorithm that spreads the forwarding role based on the residual energy factor, so that it can prolong the network lifetime, with its ability to carry more flooding packets. We use the opportunistic algorithm and the sender set concept to let previous-level neighboring nodes dynamically take over the sending task of a parent of a receiver. Intensive simulation shows that our algorithm stably outperforms the flooding scheme based on EOT around 8% in terms of flooding delay, energy consumption, and network lifetime.
Footnotes
Academic Editor: Yong Lee
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This research was supported in part by PRCP (NRF-2010-0020210), G-ITRC (IITP-2016-R6812-16-0001), and the Smart TV 2.0 Software Platform (no. 10041244).
