Abstract
Energy enhancement is a crucial factor while designing routing models in wireless sensor networks (WSNs). Many energy efficiency routing schemes are implemented to exchange various forms of gathered data by sensors in an optimal routing path through the network to increase its lifespan and maintain high scalability of the WSN. In this paper, a stochastic energy enhancement routing model is proposed to reduce the resource usage by nodes during the routing process. We aim to adapt the stochastic formalism based on the hidden Markov models (HMM) to learn from existing sensor networks, and design a new optimal routing mechanism that significantly exploits the available resources. Meanwhile, the proposed stochastic routing algorithm performs overall energy reduction in the network and permits optimal data transmission. The experimental results show that the proposed technique is efficient in terms of energy consumption, overall resource enhancement, and permits to increase network lifetime at least 19.05% compared to other existing methods.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability statements
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Sohraby K, Minoli D, Znati T (2007) Wireless sensor networks: technology, protocols, and applications. John wiley and sons, New Jersey
Kalkha H, Satori H, Satori K (2016) Performance evaluation of aodv and leach routing protocol. Adv Inf Technol Theory Appl 1(1):112–118
Medina Carlos, Segura José C, de la Torre Angel (2013) Accurate time synchronization of ultrasonic tof measurements in ieee 802.15. 4 based wireless sensor networks. Ad Hoc Netw 11(1):442–452
Almesaeed R, Jedidi A (2021) Dynamic directional routing for mobile wireless sensor networks. Ad Hoc Netw 110:102301
Kalkha H, Satori H, Satori K (2017) A dynamic clustering approach for maximizing scalability in wireless sensor networ. Trans Mach Learn Artif Intell. https://doi.org/10.14738/tmlai.54.3328
Akyildiz IF, Weilian S, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422
Zurita G, Shukla AK, Pino JA, Merigó JM, Lobos-Ossandón V, Muhuri PK (2020) A bibliometric overview of the journal of network and computer applications between 1997 and 2019. J Netw Comput Appl 165:102695
Russel A, Moundounga A, Satori H, Satori K (2020). An overview of routing techniques in wsns. In: 2020 fourth international conference on intelligent computing in data sciences (ICDS), pp 1–7. IEEE
Basheer A, Sha K (2017) Cluster-based quality-aware adaptive data compression for streaming data. J Data Inf Qual (JDIQ) 9(1):1–33
Razzaque MA, Bleakley C, Dobson S (2013) Compression in wireless sensor networks: a survey and comparative evaluation. ACM Trans Sens Netw (TOSN) 10(1):1–44
Wang C-F, Shih J-D, Pan B-H, Tin-Yu W (2014) A network lifetime enhancement method for sink relocation and its analysis in wireless sensor networks. IEEE Sens J 14(6):1932–1943
Capo-Chichi EP, Guyennet H, Friedt JM (2009) K-rle: a new data compression algorithm for wireless sensor network. In: 2009 third international conference on sensor technologies and applications, pp 502–507. IEEE
Ortega AP, Ramchurn SD, Tran-Thanh L, Merrett GV (2021) Partner selection in self-organised wireless sensor networks for opportunistic energy negotiation: a multi-armed bandit based approach. Ad Hoc Netw 112:102354
Rawat P, Singh KD, Chaouchi H, Bonnin JM (2014) Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput 68(1):1–48
Swain RR, Dash T, Khilar PM (2019) A complete diagnosis of faulty sensor modules in a wireless sensor network. Ad Hoc Netw 93:101924
Park GY, Kim H, Jeong HW, Youn HY (2013) A novel cluster head selection method based on k-means algorithm for energy efficient wireless sensor network. In: 2013 27th international conference on advanced information networking and applications workshops, pp 910–915. IEEE
Eshaftri M, Al-Dubai AY, Romdhani I, Yassien MB (2015) A new energy efficient cluster based protocol for wireless sensor networks. In: 2015 federated conference on computer science and information systems (FedCSIS), pp 1209–1214. IEEE
Hamzah A, Shurman M, Al-Jarrah O, Taqieddin E (2019) Energy-efficient fuzzy-logic-based clustering technique for hierarchical routing protocols in wireless sensor networks. Sensors 19(3):561
Li J, Liu D (2015) Dpso-based clustering routing algorithm for energy harvesting wireless sensor networks. In: 2015 international conference on wireless communications and signal processing (WCSP), pp 1–5. IEEE
Singh DP, Bhateja V, Soni SK (2014) Prolonging the lifetime of wireless sensor networks using prediction based data reduction scheme. In: 2014 international conference on signal processing and integrated networks (SPIN), pp 420–425. IEEE
Boudries A, Aliouat M, Siarry P (2014) Detection and replacement of a failing node in the wireless sensors networks. Comput Electr Eng 40(2):421–432
Obado V, Djouani K, Hamam Y (2012) Hidden markov model for shortest paths testing to detect a wormhole attack in a localized wireless sensor network. Proc Comput Sci 10:1010–1017
Kalkha H, Satori H, Satori K (2019) Preventing black hole attack in wireless sensor network using hmm. Proc Comput Sci 148:552–561
Saihi M, Boussaid B, Zouinkhi A, Abdelkrim N (2015) Distributed fault detection based on hmm for wireless sensor networks. In: 2015 4th international conference on systems and control (ICSC), pp 189–193. IEEE
Xiaofei X, Zhang Z, Chen Y, Li L (2020) Hmm-based predictive model for enhancing data quality in wsn. Int J Comput Appl 42(4):351–359
Kumar S, Tiwari SN, Hegde RM (2015) Sensor node tracking using semi-supervised hidden markov models. Ad Hoc Netw 33:55–70
Anand S, Rafeeque KM (2022) Enhancing the security in wireless sensor network using hidden markov model. Soft computing for security applications. Springer, Berlin, pp 409–423
Tabatabaei S (2020) A novel fault tolerance energy-aware clustering method via social spider optimization (sso) and fuzzy logic and mobile sink in wireless sensor networks (wsns). Comput Syst Sci Eng 35(6):477–494
Fu X, Pace P, Aloi G, Li W, Fortino G (2021) Toward robust and energy-efficient clustering wireless sensor networks: A double-stage scale-free topology evolution model. Comput Netw 200:108521
Song F, Zhu M, Zhou Y, You I, Zhang H (2019) Smart collaborative tracking for ubiquitous power IoT in edge-cloud interplay domain. IEEE Int Things J 7(7):6046–6055
Bahbahani MS, Alsusa E (2017) A cooperative clustering protocol with duty cycling for energy harvesting enabled wireless sensor networks. IEEE Trans Wirel Commun 17(1):101–111
Budianu C, Ben-David S, Tong L (2006) Estimation of the number of operating sensors in large-scale sensor networks with mobile access. IEEE Trans Signal Process 54(5):1703–1715
Gupta P, Kumar PR (1999) Critical power for asymptotic connectivity in wireless networks. Stochastic analysis, control, optimization and applications. Springer, Berlin, pp 547–566
Mozaffari M, Safarinejadian B, Shasadeghi M (2020) A novel mobile agent-based distributed evidential expectation maximization algorithm for uncertain sensor networks. Trans Inst Meas Control 43(7):1609–1619
Wang Q, Hassanein H, Takahara G (2004) Stochastic modeling of distributed, dynamic, randomized clustering protocols for wireless sensor networks. In: Workshops on mobile and wireless networking/high performance scientific, engineering computing/network design and architecture/optical networks control and management/Ad Hoc and Sensor Networks/Compil, pp 456–463. IEEE
Mini RAF, Loureiro AAF, Nath B (2004) The distinctive design characteristic of a wireless sensor network: the energy map. Comput Commun 27(10):935–945
Huang X, Acero A, Hon H-W, Reddy R (2001) A guide to theory, algorithm, and system development, spoken language processing. Prentice Hall PTR, New Jersey
Hu P, Zhou Z, Liu Q, Li F (2007) The hmm-based modeling for the energy level prediction in wireless sensor networks. In: 2007 2nd IEEE conference on industrial electronics and applications, pp 2253–2258. IEEE
Nazli Tekin and Vehbi Cagri Gungor (2020) Analysis of compressive sensing and energy harvesting for wireless multimedia sensor networks. Ad Hoc Netw 103:102164
Yang S, Ma L, Jia S, Qin D (2019) A novel markov model-based low-power and secure multihop routing mechanism. J Sens 2019(2019):1–11
Yen JY (1971) Finding the k shortest loopless paths in a network. Manag Sci 17(11):712–716
Stahlbuhk T, Shrader B, Modiano E (2019) Learning algorithms for scheduling in wireless networks with unknown channel statistics. Ad Hoc Netw 85:131–144
Malek A-G, Chunlin L, Zhiyong Y, Hasan AHN, Xiaoqing Z (2012) Improved the energy of ad hoc on-demand distance vector routing protocol. IERI Proc 2:355–361
Liu S, Srivastava R, Koksal CE, Sinha P (2009) Pushback: a hidden markov model based scheme for energy efficient data transmission in sensor networks. Ad Hoc Netw 7(5):973–986
Rohit Kumar and Joy Chandra Mukherjee (2021) On-demand vehicle-assisted charging in wireless rechargeable sensor networks. Ad Hoc Netw 112:102389
Rabiner LR (1989) A tutorial on hidden markov models and selected applications in speech recognition. Proc IEEE 77(2):257–286
Issariyakul T, Hossain E (2009) Introduction to network simulator 2 (ns2). Introduction to network simulator NS2. Springer, Berlin, pp 1–18
Vouma Lekoundji J-B (2014) Modèles de Markov cachés, PhD thesis, Université du Québec à Montréal
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix 1: Stochastic routing parameters calculation
In order to illustrate our methodology, we used the numerical values reported in the sample graph of Fig. 2 computed with Eqs. (2), (9), and (10), which stand for initial probabilities, transition probabilities, and emission probabilities, respectively.
The \(\Pi \) vector defines in which state the system should be at the beginning, the A matrix reflects the connection between each state, and finally, B describes the probabilities that the system observes symbols L, M, H being in a given state.
We launch observation sequence steps Y randomly for the time \(T = 10\). Each entity \(Y_t\) represents the random path decision made at that time t and show as follows :
\(Y = \{Y_1 = v_1, Y_2 = v_2, Y_3 = v_3, Y_4 = v_3, Y_5 = v_2, Y_6 = v_1, Y_7 = v_1, Y_8 = v_2, Y_9 = v_3 , Y_{10} = v_1 \}\)
We suppose that we observe the short sequence below:
Y sequence represents a random observation selected symbols where each symbol specifies the level of the energies in the system. The probability to observe the sequence given the model \(\lambda \) is estimated in Forward algorithm. Symbols L, M, and H correspond to energy Low, Medium, and High, respectively. Each symbol V illustrates the energy level in which each state can be: \(V = {v_1 = Low(L), v_2 = Medium(M), v_3 = High(H) }.\)
In Fig. 8, the transitions coefficients and initial vector for the proposed model are illustrated. The graph is interconnected by the fact that all transition coefficients between hidden states are not null.
The transition coefficients between states are provided in Table 8.
Table 7 deals with transition between hidden states. Hidden states stand for the energy consumed by nodes corresponding in the shortest path. \(E_1\) for energy in shortest path 1 or state 1, \(E_2\) for energy consumed by nodes in shortest path 2, and \(E_3\) for the energy consumed by nodes in state 3. This part is a completion of the Sect. 4.4.1 where we describe our Fully Connected Hidden Markov Model. These coefficients are then obtained based on the equation proposed to estimate the initial parameters. The K=3 shortest paths between source and destination nodes with a best minimal energy according to the network graph (Figs. 2, 3).
Appendix 2: Forward calculation
The main steps to compute forward probabilities consist of an initialization, induction, and termination as follows:
1.1 Initialization
\(\alpha _1(E_1) = \Pi _{E_1}.b_{E_1}(Y_1 = v_1(L)) = 0.332 \times 0.668 = 0.304776\)
\(\alpha _1(E_2) = \Pi _{E_2}.b_{E_2}(Y_1 = v_1(L)) = 0.333 \times 0.082 = 0.027306\)
\(\alpha _1(E_3) = \Pi _{E_3}.b_{E_3}(Y_1 = v_1(L)) = 0.335 \times 0.250 = 0.08375\)
1.2 Induction
\(\alpha _2(j) = b_j({Y_2}).\sum _{i=1}^{N=3} \alpha _1(i).a_{ij}\)
\(\alpha _2(E_1) = b_{E_1}({Y_2=v_2(M)}).[ \alpha _1(E_1).a_{11} + \alpha _1(E_2).a_{21} + \alpha _1(E_3).a_{31}] \)
\(\alpha _2(E_2) = b_{E_1}({Y_2=v_2(M)}).[ \alpha _1(E_1).a_{12} + \alpha _1(E_2).a_{22} + \alpha _1(E_3).a_{32}] \)
\(\alpha _2(E_3) = b_{E_1}({Y_2=v_2(M)}).[ \alpha _1(E_1).a_{13} + \alpha _1(E_2).a_{23} + \alpha _1(E_3).a_{33}] \)
\(\quad ...\)
\(\alpha _{10}(j) = b_j(Y_{10}).\sum _{i=10}^{10} \alpha _9(i).a_{ij}\)
1.3 Termination
The termination process gives likelihood probability to get the best observe sequence. Equation (23) is used.
At each time (t), we observe a symbol. That means the system can have an energy level depending on a probability. At the time \(T=10\), a summation is made to get the probability to observe our random sequence given the initial model \(\lambda \).
In Table 9, we present the results of the forward process around the time. In the table, the results of Forward algorithm, the \(\alpha \) (see Fig. 9), are the probabilities to observe a symbol \(v_k\) in each hidden state based on the initial random observation sequence. It is important to show that because these numerical values are used to define the Best Routing Probability (BRP) of the stochastic model.
In Fig. 9, we compute the maximal score to get the best path corresponding to the observation sequence Y. That means, find the best sequence in the model \(\lambda \) that maximize \(P(X, Y / \lambda )\) (see Eq. 13). Based on that process and other intermediate one, we forecast that the best hidden state that produced the initial sequence Y with a high score is that observed in Table 7.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Affane, A.R., Satori, H., Sanhaji, F. et al. Energy enhancement of routing protocol with hidden Markov model in wireless sensor networks. Neural Comput & Applic 35, 5381–5393 (2023). https://doi.org/10.1007/s00521-022-07970-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-022-07970-3