[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

Energy enhancement of routing protocol with hidden Markov model in wireless sensor networks

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Energy enhancement is a crucial factor while designing routing models in wireless sensor networks (WSNs). Many energy efficiency routing schemes are implemented to exchange various forms of gathered data by sensors in an optimal routing path through the network to increase its lifespan and maintain high scalability of the WSN. In this paper, a stochastic energy enhancement routing model is proposed to reduce the resource usage by nodes during the routing process. We aim to adapt the stochastic formalism based on the hidden Markov models (HMM) to learn from existing sensor networks, and design a new optimal routing mechanism that significantly exploits the available resources. Meanwhile, the proposed stochastic routing algorithm performs overall energy reduction in the network and permits optimal data transmission. The experimental results show that the proposed technique is efficient in terms of energy consumption, overall resource enhancement, and permits to increase network lifetime at least 19.05% compared to other existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability statements

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Sohraby K, Minoli D, Znati T (2007) Wireless sensor networks: technology, protocols, and applications. John wiley and sons, New Jersey

    Book  Google Scholar 

  2. Kalkha H, Satori H, Satori K (2016) Performance evaluation of aodv and leach routing protocol. Adv Inf Technol Theory Appl 1(1):112–118

    Google Scholar 

  3. Medina Carlos, Segura José C, de la Torre Angel (2013) Accurate time synchronization of ultrasonic tof measurements in ieee 802.15. 4 based wireless sensor networks. Ad Hoc Netw 11(1):442–452

    Article  Google Scholar 

  4. Almesaeed R, Jedidi A (2021) Dynamic directional routing for mobile wireless sensor networks. Ad Hoc Netw 110:102301

    Article  Google Scholar 

  5. Kalkha H, Satori H, Satori K (2017) A dynamic clustering approach for maximizing scalability in wireless sensor networ. Trans Mach Learn Artif Intell. https://doi.org/10.14738/tmlai.54.3328

    Article  Google Scholar 

  6. Akyildiz IF, Weilian S, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422

    Article  Google Scholar 

  7. Zurita G, Shukla AK, Pino JA, Merigó JM, Lobos-Ossandón V, Muhuri PK (2020) A bibliometric overview of the journal of network and computer applications between 1997 and 2019. J Netw Comput Appl 165:102695

    Article  Google Scholar 

  8. Russel A, Moundounga A, Satori H, Satori K (2020). An overview of routing techniques in wsns. In: 2020 fourth international conference on intelligent computing in data sciences (ICDS), pp 1–7. IEEE

  9. Basheer A, Sha K (2017) Cluster-based quality-aware adaptive data compression for streaming data. J Data Inf Qual (JDIQ) 9(1):1–33

    Article  Google Scholar 

  10. Razzaque MA, Bleakley C, Dobson S (2013) Compression in wireless sensor networks: a survey and comparative evaluation. ACM Trans Sens Netw (TOSN) 10(1):1–44

    Article  Google Scholar 

  11. Wang C-F, Shih J-D, Pan B-H, Tin-Yu W (2014) A network lifetime enhancement method for sink relocation and its analysis in wireless sensor networks. IEEE Sens J 14(6):1932–1943

    Article  Google Scholar 

  12. Capo-Chichi EP, Guyennet H, Friedt JM (2009) K-rle: a new data compression algorithm for wireless sensor network. In: 2009 third international conference on sensor technologies and applications, pp 502–507. IEEE

  13. Ortega AP, Ramchurn SD, Tran-Thanh L, Merrett GV (2021) Partner selection in self-organised wireless sensor networks for opportunistic energy negotiation: a multi-armed bandit based approach. Ad Hoc Netw 112:102354

    Article  Google Scholar 

  14. Rawat P, Singh KD, Chaouchi H, Bonnin JM (2014) Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput 68(1):1–48

    Article  Google Scholar 

  15. Swain RR, Dash T, Khilar PM (2019) A complete diagnosis of faulty sensor modules in a wireless sensor network. Ad Hoc Netw 93:101924

    Article  Google Scholar 

  16. Park GY, Kim H, Jeong HW, Youn HY (2013) A novel cluster head selection method based on k-means algorithm for energy efficient wireless sensor network. In: 2013 27th international conference on advanced information networking and applications workshops, pp 910–915. IEEE

  17. Eshaftri M, Al-Dubai AY, Romdhani I, Yassien MB (2015) A new energy efficient cluster based protocol for wireless sensor networks. In: 2015 federated conference on computer science and information systems (FedCSIS), pp 1209–1214. IEEE

  18. Hamzah A, Shurman M, Al-Jarrah O, Taqieddin E (2019) Energy-efficient fuzzy-logic-based clustering technique for hierarchical routing protocols in wireless sensor networks. Sensors 19(3):561

    Article  Google Scholar 

  19. Li J, Liu D (2015) Dpso-based clustering routing algorithm for energy harvesting wireless sensor networks. In: 2015 international conference on wireless communications and signal processing (WCSP), pp 1–5. IEEE

  20. Singh DP, Bhateja V, Soni SK (2014) Prolonging the lifetime of wireless sensor networks using prediction based data reduction scheme. In: 2014 international conference on signal processing and integrated networks (SPIN), pp 420–425. IEEE

  21. Boudries A, Aliouat M, Siarry P (2014) Detection and replacement of a failing node in the wireless sensors networks. Comput Electr Eng 40(2):421–432

    Article  Google Scholar 

  22. Obado V, Djouani K, Hamam Y (2012) Hidden markov model for shortest paths testing to detect a wormhole attack in a localized wireless sensor network. Proc Comput Sci 10:1010–1017

    Article  Google Scholar 

  23. Kalkha H, Satori H, Satori K (2019) Preventing black hole attack in wireless sensor network using hmm. Proc Comput Sci 148:552–561

    Article  Google Scholar 

  24. Saihi M, Boussaid B, Zouinkhi A, Abdelkrim N (2015) Distributed fault detection based on hmm for wireless sensor networks. In: 2015 4th international conference on systems and control (ICSC), pp 189–193. IEEE

  25. Xiaofei X, Zhang Z, Chen Y, Li L (2020) Hmm-based predictive model for enhancing data quality in wsn. Int J Comput Appl 42(4):351–359

    Google Scholar 

  26. Kumar S, Tiwari SN, Hegde RM (2015) Sensor node tracking using semi-supervised hidden markov models. Ad Hoc Netw 33:55–70

    Article  Google Scholar 

  27. Anand S, Rafeeque KM (2022) Enhancing the security in wireless sensor network using hidden markov model. Soft computing for security applications. Springer, Berlin, pp 409–423

    Chapter  Google Scholar 

  28. Tabatabaei S (2020) A novel fault tolerance energy-aware clustering method via social spider optimization (sso) and fuzzy logic and mobile sink in wireless sensor networks (wsns). Comput Syst Sci Eng 35(6):477–494

    Article  Google Scholar 

  29. Fu X, Pace P, Aloi G, Li W, Fortino G (2021) Toward robust and energy-efficient clustering wireless sensor networks: A double-stage scale-free topology evolution model. Comput Netw 200:108521

    Article  Google Scholar 

  30. Song F, Zhu M, Zhou Y, You I, Zhang H (2019) Smart collaborative tracking for ubiquitous power IoT in edge-cloud interplay domain. IEEE Int Things J 7(7):6046–6055

    Article  Google Scholar 

  31. Bahbahani MS, Alsusa E (2017) A cooperative clustering protocol with duty cycling for energy harvesting enabled wireless sensor networks. IEEE Trans Wirel Commun 17(1):101–111

    Article  Google Scholar 

  32. Budianu C, Ben-David S, Tong L (2006) Estimation of the number of operating sensors in large-scale sensor networks with mobile access. IEEE Trans Signal Process 54(5):1703–1715

    Article  MATH  Google Scholar 

  33. Gupta P, Kumar PR (1999) Critical power for asymptotic connectivity in wireless networks. Stochastic analysis, control, optimization and applications. Springer, Berlin, pp 547–566

    Chapter  Google Scholar 

  34. Mozaffari M, Safarinejadian B, Shasadeghi M (2020) A novel mobile agent-based distributed evidential expectation maximization algorithm for uncertain sensor networks. Trans Inst Meas Control 43(7):1609–1619

    Article  Google Scholar 

  35. Wang Q, Hassanein H, Takahara G (2004) Stochastic modeling of distributed, dynamic, randomized clustering protocols for wireless sensor networks. In: Workshops on mobile and wireless networking/high performance scientific, engineering computing/network design and architecture/optical networks control and management/Ad Hoc and Sensor Networks/Compil, pp 456–463. IEEE

  36. Mini RAF, Loureiro AAF, Nath B (2004) The distinctive design characteristic of a wireless sensor network: the energy map. Comput Commun 27(10):935–945

    Article  Google Scholar 

  37. Huang X, Acero A, Hon H-W, Reddy R (2001) A guide to theory, algorithm, and system development, spoken language processing. Prentice Hall PTR, New Jersey

    Google Scholar 

  38. Hu P, Zhou Z, Liu Q, Li F (2007) The hmm-based modeling for the energy level prediction in wireless sensor networks. In: 2007 2nd IEEE conference on industrial electronics and applications, pp 2253–2258. IEEE

  39. Nazli Tekin and Vehbi Cagri Gungor (2020) Analysis of compressive sensing and energy harvesting for wireless multimedia sensor networks. Ad Hoc Netw 103:102164

    Article  Google Scholar 

  40. Yang S, Ma L, Jia S, Qin D (2019) A novel markov model-based low-power and secure multihop routing mechanism. J Sens 2019(2019):1–11

    Google Scholar 

  41. Yen JY (1971) Finding the k shortest loopless paths in a network. Manag Sci 17(11):712–716

    Article  MathSciNet  MATH  Google Scholar 

  42. Stahlbuhk T, Shrader B, Modiano E (2019) Learning algorithms for scheduling in wireless networks with unknown channel statistics. Ad Hoc Netw 85:131–144

    Article  Google Scholar 

  43. Malek A-G, Chunlin L, Zhiyong Y, Hasan AHN, Xiaoqing Z (2012) Improved the energy of ad hoc on-demand distance vector routing protocol. IERI Proc 2:355–361

    Article  Google Scholar 

  44. Liu S, Srivastava R, Koksal CE, Sinha P (2009) Pushback: a hidden markov model based scheme for energy efficient data transmission in sensor networks. Ad Hoc Netw 7(5):973–986

    Article  Google Scholar 

  45. Rohit Kumar and Joy Chandra Mukherjee (2021) On-demand vehicle-assisted charging in wireless rechargeable sensor networks. Ad Hoc Netw 112:102389

    Article  Google Scholar 

  46. Rabiner LR (1989) A tutorial on hidden markov models and selected applications in speech recognition. Proc IEEE 77(2):257–286

    Article  Google Scholar 

  47. Issariyakul T, Hossain E (2009) Introduction to network simulator 2 (ns2). Introduction to network simulator NS2. Springer, Berlin, pp 1–18

    Chapter  Google Scholar 

  48. Vouma Lekoundji J-B (2014) Modèles de Markov cachés, PhD thesis, Université du Québec à Montréal

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hassan Satori.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix 1: Stochastic routing parameters calculation

In order to illustrate our methodology, we used the numerical values reported in the sample graph of Fig. 2 computed with Eqs. (2),  (9), and  (10), which stand for initial probabilities, transition probabilities, and emission probabilities, respectively.

$$\begin{aligned} \Pi= & {} \begin{pmatrix} 0.332\\ 0.333\\ 0.335 \end{pmatrix} ;\\ A= & {} \begin{pmatrix} 0.668 &{} 0.082 &{} 0.25\\ 0.015 &{} 0.817 &{} 0.168\\ 0.046 &{} 0.031 &{} 0.923 \end{pmatrix};\\ B= & {} \begin{pmatrix} 0.918 &{} 0.036 &{} 0.047\\ 0.007 &{} 0.982 &{} 0.011\\ 0.009 &{} 0.002 &{} 0.989 \end{pmatrix} \end{aligned}$$

The \(\Pi \) vector defines in which state the system should be at the beginning, the A matrix reflects the connection between each state, and finally, B describes the probabilities that the system observes symbols L, M, H being in a given state.

We launch observation sequence steps Y randomly for the time \(T = 10\). Each entity \(Y_t\) represents the random path decision made at that time t and show as follows :

\(Y = \{Y_1 = v_1, Y_2 = v_2, Y_3 = v_3, Y_4 = v_3, Y_5 = v_2, Y_6 = v_1, Y_7 = v_1, Y_8 = v_2, Y_9 = v_3 , Y_{10} = v_1 \}\)

We suppose that we observe the short sequence below:

$$\begin{aligned} Y&= v_1, v_2, v_3, v_3, v_2, v_1, v_1, v_2, v_3 , v_1 \end{aligned}$$
(22)

Y sequence represents a random observation selected symbols where each symbol specifies the level of the energies in the system. The probability to observe the sequence given the model \(\lambda \) is estimated in Forward algorithm. Symbols L, M, and H correspond to energy Low, Medium, and High, respectively. Each symbol V illustrates the energy level in which each state can be: \(V = {v_1 = Low(L), v_2 = Medium(M), v_3 = High(H) }.\)

Fig. 8
figure 8

Fully connected HMM trellis

In Fig. 8, the transitions coefficients and initial vector for the proposed model are illustrated. The graph is interconnected by the fact that all transition coefficients between hidden states are not null.

The transition coefficients between states are provided in Table 8.

Table 8 Transition coefficients between states

Table 7 deals with transition between hidden states. Hidden states stand for the energy consumed by nodes corresponding in the shortest path. \(E_1\) for energy in shortest path 1 or state 1, \(E_2\) for energy consumed by nodes in shortest path 2, and \(E_3\) for the energy consumed by nodes in state 3. This part is a completion of the Sect. 4.4.1 where we describe our Fully Connected Hidden Markov Model. These coefficients are then obtained based on the equation proposed to estimate the initial parameters. The K=3 shortest paths between source and destination nodes with a best minimal energy according to the network graph (Figs. 2, 3).

Fig. 9
figure 9

Compute \(\alpha \) process for the observation sequence. This evaluation is based on the sequence of the symbols observed in the sequence \(Y_t\)

Appendix 2: Forward calculation

The main steps to compute forward probabilities consist of an initialization, induction, and termination as follows:

1.1 Initialization

\(\alpha _1(E_1) = \Pi _{E_1}.b_{E_1}(Y_1 = v_1(L)) = 0.332 \times 0.668 = 0.304776\)

\(\alpha _1(E_2) = \Pi _{E_2}.b_{E_2}(Y_1 = v_1(L)) = 0.333 \times 0.082 = 0.027306\)

\(\alpha _1(E_3) = \Pi _{E_3}.b_{E_3}(Y_1 = v_1(L)) = 0.335 \times 0.250 = 0.08375\)

1.2 Induction

\(\alpha _2(j) = b_j({Y_2}).\sum _{i=1}^{N=3} \alpha _1(i).a_{ij}\)

\(\alpha _2(E_1) = b_{E_1}({Y_2=v_2(M)}).[ \alpha _1(E_1).a_{11} + \alpha _1(E_2).a_{21} + \alpha _1(E_3).a_{31}] \)

\(\alpha _2(E_2) = b_{E_1}({Y_2=v_2(M)}).[ \alpha _1(E_1).a_{12} + \alpha _1(E_2).a_{22} + \alpha _1(E_3).a_{32}] \)

\(\alpha _2(E_3) = b_{E_1}({Y_2=v_2(M)}).[ \alpha _1(E_1).a_{13} + \alpha _1(E_2).a_{23} + \alpha _1(E_3).a_{33}] \)

\(\quad ...\)

\(\alpha _{10}(j) = b_j(Y_{10}).\sum _{i=10}^{10} \alpha _9(i).a_{ij}\)

1.3 Termination

The termination process gives likelihood probability to get the best observe sequence. Equation (23) is used.

$$\begin{aligned} P(Y/\lambda ) = \sum _{i=1}^{N=10} \alpha _T(i) \end{aligned}$$
(23)

At each time (t), we observe a symbol. That means the system can have an energy level depending on a probability. At the time \(T=10\), a summation is made to get the probability to observe our random sequence given the initial model \(\lambda \).

Table 9 Probability of forward computation (the \(\alpha \))

In Table 9, we present the results of the forward process around the time. In the table, the results of Forward algorithm, the \(\alpha \) (see Fig. 9), are the probabilities to observe a symbol \(v_k\) in each hidden state based on the initial random observation sequence. It is important to show that because these numerical values are used to define the Best Routing Probability (BRP) of the stochastic model.

In Fig. 9, we compute the maximal score to get the best path corresponding to the observation sequence Y. That means, find the best sequence in the model \(\lambda \) that maximize \(P(X, Y / \lambda )\) (see Eq. 13). Based on that process and other intermediate one, we forecast that the best hidden state that produced the initial sequence Y with a high score is that observed in Table 7.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Affane, A.R., Satori, H., Sanhaji, F. et al. Energy enhancement of routing protocol with hidden Markov model in wireless sensor networks. Neural Comput & Applic 35, 5381–5393 (2023). https://doi.org/10.1007/s00521-022-07970-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-022-07970-3

Keywords

Navigation