RBNS Encoded Energy Efficient Routing Protocol for Wireless Sensor Network
Автор: Indrajit Bhattcharya, Prasun Sarkar, Priyasha Basu
Журнал: International Journal of Information Technology and Computer Science(IJITCS) @ijitcs
Статья в выпуске: 5 Vol. 6, 2014 года.
Бесплатный доступ
Self Organizing Wireless Sensor Networks (WSN) is an emergent and challenging technology that is applicable to various real life scenarios. Different routing protocols in the WSN have been proposed over the years. In this type of network the major concern is the energy constraint sensor nodes that operate on limited battery power. Hence energy efficient routing algorithm in WSN need to be developed in order to address the battery power constraint of the sensor nodes. Minimizing the communication overhead during the data transmission and reception can considerably reduce the energy requirement of the sensor nodes. Redundant Binary Number System (RBNS) is one of the energy efficient techniques that can reduce the communication overhead by reducing the number of 1’s required to communicate in a data packet. In our proposed work the RBNS communication technique is applied with an existing popular routing protocol in WSN to achieve an energy efficient routing protocol. The algorithm has been successfully implemented in a simulated environment and the result that has obtained demonstrates the significant enhancement of network lifetime of the sensor network.
Wireless Sensor Network, Redundant Binary Number System, Energy- Efficient Routing
Короткий адрес: https://sciup.org/15012087
IDR: 15012087
Текст научной статьи RBNS Encoded Energy Efficient Routing Protocol for Wireless Sensor Network
Published Online April 2014 in MECS
Wireless Sensor Networks [2] can contain hundreds or thousands of sensing nodes. It is desirable to make these nodes as cheap and energy-efficient as possible and rely on their large numbers to obtain high quality results. Network protocols must be designed to achieve fault tolerance in the presence of individual node failure while minimizing energy consumption. In addition, since the limited wireless channel bandwidth must be shared among all the sensors in the network, routing
-
II. Redundant Binary Number System (RBNS) - An Introduction
-
2.1 Conventional Method of Communication
The rapid expansion of wireless services such as cellular voice, PCS (Personal Communications Services), mobile data and wireless LANs in recent years is an indication that significant value is placed on accessibility and portability as key features of telecommunication. Wireless devices have maximum utility when they can be used “anywhere at any time”. One of the greatest limitations to that goal, however, is finite power supplies. Since batteries provide limited power, a general constraint of wireless communication is the short continuous operation time of mobile terminals. Therefore, power management is one of the most challenging problems in wireless communication, and recent research has addressed this topic. Studies show that the significant consumers of power in a typical laptop are the microprocessor (CPU), liquid crystal display (LCD), hard disk, system memory (DRAM), keyboard/ mouse, CDROM drive, floppy drive, I/O subsystem, and the wireless network interface card. A typical example from a Toshiba 410 CDT mobile computer demonstrates that nearly 36% of power consumed is by the display, 21% by the CPU/memory, 18% by the wireless interface, and 18% by the hard drive. Consequently, energy conservation has been largely considered in the hardware design of the mobile terminal and in components such as CPU, disks, displays, etc. Significant additional power savings may result by incorporating low-power strategies into the design of network protocols used for data communication.
Conventional communication methods are based on using energy for transmitting both 0s and 1s. Example, if e b be the energy required transmitting a bit; transmitting 286 would require 9 e b units of energy.
Energy-based Transmission Strategies [3] (EbTs)
-
• Spend Energy for Every Bit Transmitted
-
• Let e b = Energy required to Transmit a Bit
-
• Example : To transmit (286) 10 = (100011110) 2
Zhu and Sivakumar (2005) had also proposed an energy efficient Communication scheme and named it as through Silence (CtS) [3]. Traditional approaches to energy efficient communication have been through optimization of hardware and MAC protocols [6], intelligent routing and data aggregation techniques. CtS and VarBaTac were the first work to use silence for communicating information. But CtS suffers from exponential communication time in number of bits while the hardware complexity is extremely high in the VarBaTac scheme. Both schemes utilize silence to communicate both 0s and 1s. For example, to transmit a 16 bit message, CtS would require 2^16 time slots. Furthermore, both suffer from synchronization problem between transmitter and receiver. Moreover neither of the schemes talks of the BER or SNR with an actual implementation scenario. The following example demonstrates the communication of information using only Silent Time Slots.
Example 1: To Communicate (11101) 2 = (29) 10
requires 29 time slots
Example 2: To Communicate (01111100) 2 = (124) 10 requires 124 time slots
-
• Exponential Communication Time
– Max. Possible value of n -bit data = 2 n - 1
Chen et. al. (2006) proposed another energy aware communication technology which was an extension of the existing CtS technique. This technique used higher Radix Encoding than CtS. The following example demonstrates the communication of information using the above mentioned scheme.
Example 1: (11101) 2 = (29) 10 = (1D) 16
-
• (1 + 13 + 2 * 2) = 18 time slots in Radix 16
Example 2: (01111100) 2 = (124) 10 = (7C) 16
-
• (7 + 12 + 2 * 2) = 23 time slots in Radix 16
-
2.2 Present Approach
In this scheme the Hardware Complexity increases with Higher Radix Communication Time Larger than n for n -bit Data.
Wireless networking has witnessed an explosion of interest from consumers in recent years for its applications in mobile and personal communications. As wireless networks become an integral component of the modern communication infrastructure, energy efficiency will be an important design consideration due to the limited battery life of mobile terminals. Power conservation techniques are commonly used in the hardware design of such systems. Since the network interface is a significant consumer of power, considerable research has been devoted to low-power design of the entire network protocol stack of wireless networks in an effort to enhance energy efficiency.
With the increasing use of wireless sensor networks (WSN) [5] in diverse applications where data to be communicated can range from few bytes of raw data to multimedia, the need for designing energy-efficient communication has attained paramount importance to increase the operational lifetime of such WSN [5]. Related to this issue, it is important to understand the distribution of runs of 1’s and 0’s in the data to be transmitted, so that suitable communication techniques can be designed. Such knowledge would also help in analyzing and comparing the performances of different energy-efficient communication techniques for a specific WSN application. RBNS [3][4] is one of the special type of energy efficient communication technique. This technique is described as follows. RBNS uses three symbols for communication namely -1, 0 and 1. It considers the positional weights same as Binary number system. In this type of communication system let us represent -1 by 1 ˊ . The communication of data using RBNS is described as follows:
Example 1: (7) 10 ≡ (111) 2 ≡ (1001 ˊ )
Example 2: (30) 10 ≡ (11110) 2 ≡ (10001 ˊ 0)
The Recoding Scheme in RBNS is described as follows:
– Consider a Run of ‘ k’ 1s, k > 1
– Let ‘ i’ be the Starting Bit Position of the Run (i >= 0)
– Let ‘ v’ be Value of the Run
Therefore, v = 2i + 2i + 1+ 2i + 2 + … + 2i + k – 1 (1)
That is,v = 2 k + I – 2 i
Equation 1 implies that a run of k 1 ˊ s is replaced by
– 1 ˊ in Bit Position ‘i’
– (k – 1) intermediate 0’s
– 1 in Bit Position (k + i )
Further two reduction rules are used to reduce the communication of number of bits using RBNS.
-
• Reduction Rule 1 (RR1)
– Recode Runs of 1’s of Length > 1 in Binary String to RBNS as above
-
• Reduction Rule 2 (RR2)
– Replace Every 1 ˊ 1 in Resulting RBNS String by 01 ˊ
The strategy is to transmit resulting RBNS data using Silent Zero Communication Strategy and is described as follows:
– For each 0 in String, Switch off Radio (Sleep Mode)
– If 1 or 1 ˊ encountered, Switch on Radio and Transmit Corresponding Symbol.
-
• Reduction Rule 1 : Energy Savings of ( k – 2) eb per
Run of Length k , k > 1
-
• Additional Savings Generated by Reduction Rule 2
-
• Transmitting (286) 10 = (100011110) 2 = (10010001 ˊ
0) RBNS requires 3 e b instead of 9 e b Units of Energy
Following examples demonstrates the advantage of RBNS scheme for data transmission through a communication channel.
Example 1
– Transmitting (124) 10 = (01111100) 2 = (100001 ˊ 00) RBN requires 2 e b instead of 8 e b Units of Energy
Example 2
– Transmitting (222) 10 = (11011110) 2 → (101 ˊ 10001
ˊ 0)RBN → (1001 ˊ 0001 ˊ 0)RBN requires 3eb instead of 8eb Units of Energy.
-
2.3 Theoretical Analysis of RBNS Scheme
We have derived a recurrence relation for expressing N k , the total number of occurrences of runs of 1’s (or 0’s) of length k ,
– Let n = Binary String Length
– Denote a run of Length ‘ k ’ by R k
-
• y k = 0R k , 0 ≤ k ≤ n, y 0 = singleton 0
– Find Total Number of Occurrences of R k ’s in All Possible 2 n Strings
-
• N n ik,k = Exactly i k number of y k ’s, each of size ( k + 1)
-
• Nn-k = Number of Runs of 1’s of Length ( n – k ), 0 ≤ k ≤ n
-
2.4 Solution to Recurrence Relation
N n - k = 2 N n - k + 1 + 2 k - 2, k ≥ 2
N n = 1, N n - 1 = 2
⇒ N n - k = ( k + 3)2 k - 2, k ≥ 2
Our method of finding this recurrence relation unveils the interdependencies among the total number of runs of different lengths which have hitherto been unexplored.
N n - k = (k + 3)2k - 2, k ≥ 2
-
• Applying Reduction Rules 1 and 2
– Total Number of 1s and 1 ˊ s = ( n + 2)2 n - 2
-
• Total Number of Runs of Ones of All Possible ( n – k ) Lengths
n - 2
S = ∑ ( k + 3)2 k - 2 + 3
k = 0
= n • 2 n - 3
-
• Number of 1s and 1 ˊ s after Applying Reduction Rule 1 is 2S + Number of Singleton 1s:
2 S + ( n + 2)2 n - 3 = (3 n + 2)2 n - 3
-
• Fraction of Energy Savings After Applying Reduction Rules 1 and 2
γ e = 1 -
= 1 -
( n + 2) • 2 n - 2 n • 2 n n + 2
4 n
It results to, 7 e ≈ 69% for n = 8
e → 75% as n →∞
The analytical result shows that the RBNS system can significantly save the transmission energy for large runs of 1’s or 0’s in the string.
-
III. Application of RBNS on WSN Routing
In our work we have applied RBNS transmission system into existing LEACH [5] algorithm to propose an energy efficient routing for wireless sensor network.
Figure 1 shows different routing protocols for WSN.
Routing protocols in WSN
Network structure
Protocol operation
___*____
Flat Networks Routing
___t____
Hierarchical
Network's
Routing
Location based
Routing
negotiation based
Routing
Multi-path based Routing |
Query based Routing |
QoS based Routing |
Coherent based Routing
Fig. 1: Routing protocols in WSNs: A taxonomy
-
3.1 Drawbacks of Existing LEACH
Existing LEACH protocol [1][7] for Wireless Sensor Network has the following drawbacks:
-
> LEACH protocol offers no guarantee on the placement of cluster head nodes.
-
> LEACH Centralized (LEACH -C) [7] a protocol that uses a centralized clustering algorithm and the same steady-state protocol as LEACH.
-
> During the set-up phase of LEACH-C, each node sends information about its current location and energy level to the BS.
-
> The clusters are formed such that total sum of squared distances between all the non- cluster head nodes and the closest cluster head is minimized.
-
3.2 Introduction of RBNS concept in the existing LEACH Algorithm:
-
3.2.1 First Order Radio Model

Fig. 2: First order radio model
The RBNS concept and the advantage of the RBNS encoding system has been described in the earlier sections. Next the existing RBNS encoding technique is applied in the existing LEACH algorithm for WSN. Before we discuss the implementation, we must see the radio model [10], which is used by LEACH protocol. And then we apply the aggregated energy savings in the bit levels.
Currently, there is a great deal of research in the area of low-energy radios. Different assumptions about the radio characteristics, including energy dissipation in transmit and receive modes, will change the advantages of different protocols. In our work, we assume a simple model [11][12] where the radio dissipates E elec =50 nJ/bit to run the transmitter or receiver circuitry and εamp=100pJ/bit/m2 for the transmit amplifier to achieve an acceptable E b /N o . These parameters are slightly better than the current state-of-the-art in radio design. We also assume an r2 energy loss due to channel transmission. Thus, to transmit a k-bit message a distance d using our radio model, the radio expends:
E Tx (k,d) = E Tx-elec (k) + E Tx-amp (k,d)
E Tx (k,d) = E elec * k + ε amp * k * d2
And to receive this message the radio expands:
E Rx (k) = E Rx-elec (k)
E Rx(k) = E elec * k
For these parameter values, receiving a message is not a low cost operation; the protocols should thus try to minimize not only the transmit distances but also the number of transmit and receive operations for each message. We make the assumption that the radio channel is symmetric such that the energy required to transmit a message from node A to node B is the same as the energy required to transmit a message from node B to node A for a given SNR. For our experiments, we also assume that all sensors are sensing the environment at a fixed rate and thus always have data to send to the end-user. For future versions of our protocol, we will implement an “event-driven” simulation, where sensors only transmit data if some event occurs in the environment.
Table 1: Energy details
Operation |
Energy Dissipated |
Transmitter Electronics (ETx elec) Transmitter Electronics (ERx elec) (ETx elec= ERx elec= E elec |
50 nJ/bit |
Transmiy Amplifier (Eamp) |
100 pj/bit/m2 |
-
3.2.2 Introduction of RBNS encoding
Now, we have to introduce RBNS in this radio device [13] and have to compute the energy saves during the transmission. From previous issues we have seen how energy is saved by RBNS by reducing the number of 1s in a data string. Now, from the research and previous project works, we have concluded that no. of possible 1 in a string is = N2N. After applying reduction Rule 1 and 2 the number of possible 1 and 1 ˊ s become less and from recurrence relation we have concluded that, Possible no of 1 and 1 ˊ are (N+2)2N-2.
If we compare this number of 1 in the above two data strings, it is clear that we can save some energy if we introduce this in the LEACH protocol. Now we have to compare, how much energy we can save by this RBNS technique. The equation becomes:
γ e = 1 -
( n + 2) • 2 n - 2 n • 2 n
= 1 -
n + 2
4 n
γ e ≈ 69% for n = 8 ,
γ e ≈ 75% as n →∞
So we can conclude that γ e RBNS n →∞ is nearly 75%. Hence we can say that, in the 1st order radio model E Tx and E Rx can save up to 75% energy.
-
3.3 Results, Energy Comparison and Proposed Implementation
The simulation of LEACH algorithm and modified LEACH algorithm with RBNS encoding have been carried out in MATLAB environment. The proposed work shows how energy is preserved and average lifetime of the network is increased after RBNS encoding scheme is applied over the existing LEACH algorithm. The assumptions made regarding the simulated environment are described in Table 2.
Table 2: Simulation Parameters used
Total Number of Nodes (n) |
100 |
Initial Energy E o |
0.5 J |
ET x |
50*0.000000001 J |
ER x |
50*0.000000001 J |
Ef s |
10*0.000000000001 J |
ε Amp |
0.0013*0.000000000001 J |
EDA |
5*0.000000001 J |
Maximum number of rounds (rmax) |
1250 |
Figure 3 shows the snapshot of execution of existing LEACH algorithm in the simulated environment. Table 3 demonstrates the statistics of the number of dead nodes, alive nodes and the time when the first dead node has been found in the system, after 1250 round of execution of the LEACH algorithm. Figure 4 shows the snapshot of execution of LEACH algorithm with RBNS encoding in the simulated environment. Table 4 summarises the statistics of the number of dead nodes, alive nodes and the time when the first dead node has been found in the system, after 1250 round of execution of the proposed algorithm. From the statistics it can be observed that in the case of LEACH algorithm the first node dies after 851 rounds where as in the second case the first node dies after 987 rounds. In the first case the total number of dead nodes after 1250 rounds is 71 where as in the second case it is only 6 after the same number of rounds. Figure 5 shows that the number of alive nodes with number of rounds in case of existing LEACH algorithm and proposed algorithm, where as Table 5 describes the performance comparisons of the two schemes. From the result it can be stated that our proposed scheme out performs the existing LEACH algorithm in terms of number of alive nodes over number of rounds. This is because in our proposed scheme using RBNS encoding the energy recruitment of the nodes for transmission and receive of packets is reduced extensively. Clearly from figure 5, it can be concluded that using RBNS in a WSN routing protocol can increase the lifetime of the network significantly and thus can save energy.

Fig. 3: System snapshot after 1250 rounds with dead and alive nodes
Table 3: Statistics of the system without RBNS
STATISTICS |
|
first_dead |
851 |
Dead nodes |
71 |
Alive nodes |
29 |
Packets to Base Station |
21 |
Packets to CH |
98 |

Fig. 4: Snapshot of the system after 1250 rounds dead and alive nodes (Leach with RBNS encoding)
Table 4: Statistics with RBNS
STATISTICS |
|
first_dead |
987 |
Dead nodes |
6 |
Alive nodes |
94 |
Packets to Base Station |
20 |
Packets to CH |
99 |
From Figure 5, we can observe the red lines showing number of alive nodes for LEACH algorithm without RBNS encoding and blue lines showing number of alive nodes in case of RBNS encoded LEACH algorithm. Clearly from the above figure, we can conclude that incorporating RBNS in a routing protocol like LEACH increases the lifetime of the nodes and thus saves the energy.
Table 5: comparative study of LEACH algorithm and RBNS encoded Leach algorithm
Parameters |
Without RBNS |
Using RBNS |
first_dead |
851 |
987 |
Dead nodes |
71 |
6 |
Alive nodes |
29 |
94 |
Packets to Base Station |
21 |
20 |
Packets to CH |
98 |
99 |
-
3.4 Proposed Implementation
In this section we present our proposed hybrid modulation scheme that utilizes ASK and FSK to implement the RBNS algorithm. Typically, in FSK we have a carrier freq. fc and two frequencies to represent the 2 binary symbols 0 and 1. For RBNS, we have implemented the hybrid modulation [14][15][16] Scheme Using FSK and ASK. The idea is as follows:
o Carrier Frequency fc o In Binary FSK, 0 and 1 Represented by fc , fc + Df o Map Frequencies fc and (fc + Df) to Symbols 1 and 1
ˊ o For Symbol 0 , Put Radio in Active State o Radio Switched to Transmit State for Other Symbols o Receiver Uses Non-Coherent Detection

-
IV. Conclusion
The work carried out for this paper, investigates energy efficient clustering algorithms related to WSNs. A hierarchical clustering algorithm based on RBNS has been proposed. This increases Network life of WSNs. Secondly, quality of service for IEEE 802.15.4 networks has been investigated for star and mesh topology using routing. The results show that encoding RBNS with LEACH algorithm can considerably save the network energy.
Список литературы RBNS Encoded Energy Efficient Routing Protocol for Wireless Sensor Network
- Koushik Sinha and Bhabani P. Sinha. A Recurrence Relation Characterizing Run Distributions in the Context of Sensor Networks. Int. Jr. of Advanced Computer Engineering & Architecture, Vol. 2, No. 2, pp. 321-330, June-December, 2012.
- Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan. Energy-Efficient Communication Protocol for Wireless Microsensor Networks. Proceedings of 33rd Hwaii International Conference on System Sciences, pp. 1-10, 2000.
- Shio Kumar Singh, M P Singh, and D K Singh. Routing Protocols in Wireless Sensor Networks – A Survey. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.1, No. 2, pp. 63-83, November 2010.
- K. Sinha, B. P. Sinha and D. Datta. An energy efficient communication scheme for wireless networks: a redundant radix-based approach. IEEE Transactions on Wireless Communications, Vol. 10, No. 2, pp. 550-559, 2011.
- B.Baranidharan, B.Shanthi. A Survey on Energy Efficient Protocols for Wireless Sensor Networks. International Journal of Computer Applications, Vol. 11, No. 10, pp. 0975-8887, December 2010.
- LAN/MAN Standards Committee, IEEE Standard for Local and metropolitan area networks- Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Computer Society Approved 16 June 2011, IEEE-SA Standards Board.
- Jun Zheng and Abbas Jamalipour. Wireless Sensor Networks: A Networking Perspective. A book published by A John & Sons, Inc, and IEEEE, 2009.
- S. Misra et al. (eds.). Guide to Wireless Sensor Networks, Computer Communications and Networks, DOI: 10.1007/978-1-84882-218-4 4, Springer-Verlag London Limited 2009.
- K. Scott and N. Bambos. Routing and Channel Assignment for Low Power Transmission in PCS. In 5th IEEE Int. Conf. on Universal Personal Communications, Volume 2, pp. 498-502, September 1996.
- T. Shepard. A Channel Access Scheme for Large Dense Packet Radio Networks. In Proc. ACM SIGCOMM, pp. 219–230, August 1996.
- M. Dong, K. Yung and W. Kaiser. Low Power Signal Processing Architectures for Network Microsensors. In Proceedings of International Symposium on Low Power Electronics and Design, pp. 173–177, Aug. 1997.
- D. Dudgeon and R. Mersereau. Multidimensional Digital Signal Processing. Chapter 6, Prentice-Hall, Inc. 1984.
- M. Ettus. System Capacity, Latency, and Power Consumption in Multihop-routed SS-CDMA Wireless Networks. In Radio and Wireless Conference (RAWCON ’98), pp. 55–58, August 1998.
- D. Hall. Mathematical Techniques in Multisensor Data Fusion. Artech House, Boston, January 2004.
- L. Klein. Sensor and Data Fusion Concepts and Applications. SPIE Optical Engr. Press, WA, 1993.
- X. Lin and I. Stojmenovic. Power-Aware Routing in Ad Hoc Wireless Networks. In SITE, University of Ottawa, TR-98-11, Dec. 1998.