Professional Documents
Culture Documents
Conclusion Es
Conclusion Es
Abstract—
Wireless sensor networks are one of the fastest-developing I. INTRODUCTION
information technologies and promise to have a variety of Wireless sensor networks (WSN) have been the preferred
applications in next-generation networks, thus ensuring efficient
and reliable data transport in energy in wireless sensor networks
choice for the design and deployment of next-generation
(WSN) with limited resources is one of the main concerns to monitoring and control systems. It is now possible to
achieve a high degree of efficiency in monitoring and control implement a large number of low-cost sensors to monitor
systems. Reliability is one of the most important attributes in large regions above the ground surface , under water or in the
sensors. The two techniques that are commonly used in WSNs to atmosphere. The most important benefit of sensor networks is
achieve reliability are retransmission or redundancy. The that they extend the calculation capacity to the physical
retransmission is where the reliable transmission of data packets environment where human beings can not reach. They can
is assured in terms of recovering the lost packets by operate for prolonged periods in hostile, challenging or
retransmitting them. This could result in an additional
transmission overhead that not only wastes the limited energy
ecologically too sensitive habitats for human visit. In addition,
resources of the sensors but also causes the network to become they have the potential to provide a large amount of data about
congested and, in turn, affects reliable data transmission. On the the environment in which they are deployed and to deliver
other hand, the use of redundancy is to achieve reliability in non- data through the network to end users.
experimental social networks. In redundancy-based reliability At the heart of the WSN are the sensor nodes. A sensor
mechanisms, a loss of bits within a packet can be recovered using node is a device that has detection, computing and
some kind of coding schemes. This ability to correct lost or communication capabilities. Depending on their detection
damaged bits within a packet would significantly reduce the components and the requirements of the application, the
transmission overhead caused by the retransmission of the entire
packet
sensor nodes can be used to monitor different phenomena
such as temperature, light, movement, pressure and humidity.
Both retransmission and redundancy can be performed hop-by- The processing module of the sensor node is capable of
hop or end-to-end. The hop-by-hop method allows intermediate making a compilation of the detected data and also of the data
nodes to perform retransmission or redundancy. On the other received from other sensors. The communication module in
hand, in the end-to-end approach, retransmission or redundancy the sensor nodes is used to send and receive data packets to
is performed only at the origin and destination nodes. However, a and from neighboring nodes. Since a single sensor provides
hybrid mechanism with an efficient combination of these only limited information, a network of these sensors is used to
retransmission and redundancy techniques to achieve reliability
has until now been neglected by companies.
provide coverage in large environments
Depending on the nature of the application, it is also important to WSNs are spatially distributed systems consisting of
de fi ne the amount of data needed to ensure reliability. This dozens, hundreds or even thousands of sensor nodes,
introduces the concept of reliability at the package or event level. interconnected through the wireless connection channel and
The reliability of the packet requires that all packets from all forming the only network. Figure 1 represents an example of a
relevant sensor nodes reach the sink, while the reliability of the WSN.
event ensures that the sink only gets enough information about a Here we can see a WSN consisting of twelve sensor nodes
given event. Therefore, the techniques of retransmission or and a network receiver, which also functions as a gateway.
redundancy that use hop-by-hop or end-to-end mechanisms aim
to achieve reliability at the packet or event level.
Each sensor node is a device that has a transceiver, a
In this article, we present a survey on reliability protocols in microcontroller and a sensitive element (see Fig. 2). Generally
WSNs. We reviewed several reliability schemes based on relay the sensor node is a stand-alone device. The receiver receives
and redundancy techniques that use different combinations of all the detected data from these sensor nodes, processes them
packet or event reliability in terms of recovering lost data using and sends them to the end user.
jump-to-jump or end-to-end mechanisms. In addition, we
analyze these schemes by investigating the most appropriate .
combination of these techniques, methods and the level of
reliability required to provide an efficient energy reliability
mechanism for WSN with limited resources. This document also
proposes a 3D reference model to classify WSN's reliability
research, which will be used to perform an in-depth analysis of
unexplored areas.
reliability at the level of package or event based on the
requirements of the application.
Shaikh et al. [18] propose tunable reliability with congestion In addition to the reliability of the packet, the reliability of the
control for information transport (TRCCIT), with the aim of event is the other category that is based on the amount of data
required to guarantee reliable transmission using the multiple jump in the WSN, it is beneficial to perform jump-
retransmission technique. In WSN, the reliability of the event, by-hop recovery as compared to end-to-end. In addition, it is
as opposed to the reliability of the packet, should be sufficient also required to choose intelligently the correct recognition
for most applications controlled by the event. The reliability mechanism. Most schemes use an explicit recognition
of this mode is intended to ensure that at least one of the many mechanism, which requires additional communication and
packets of the sensors that detected an event is delivered to the memory. Alternatively, it is much better to use implicit
receiver, instead of all the packets of all the sensors, The acknowledgments when exploiting the transmission nature of
following discussion covers the main reliability schemes of the wireless channel. This reduces the extra message overload
events that fall within the category of event reliability based caused by the transmission of confirmation messages, which
on end-to-end or hop-by-hop relay. in turn reduces channel contention and network congestion.
2.2.1. From end to end (connection oriented) Some of the applications require guaranteed delivery of each
and every packet from source to destination, while others can
This section covers the reliability schemes of retransmission- tolerate some degree of packet loss. A WSN is considered to
based events that achieve reliable data transmission using the work well as long as the sensor nodes in a given area return
connection-oriented approach. Akan et al. [22,23] are the first the data reliably to the sink
to introduce the concept of event reliability when proposing
the event-to-sink reliability protocol (ESRT), where reliability 2.4. Reliability based on redundancy
is measured by the number of packages that contain
information about a particular event that is delivery to the In relay-based reliability, a loss of bits within a packet is
sink. ESRT is a sink-centered protocol, where the data flow is treated as a loss of the entire packet and requires
controlled centrally by the sink in such a way that when the retransmission of that packet to achieve reliable data
required reliability is not reached, the sink will increase the transmission. This motivates the concept of reliability based
frequency of event reporting, f, of the nodes. On the contrary, on redundancy where lost or damaged bits within the packet
it will reduce f when there is congestion to restore the required can be recovered through the use of coding techniques
reliability in the sink. A key assumption of ESRT is that the [30,31]. This significantly reduces the transmission overhead
receiver has a high power radio that can transmit the last value caused by the retransmission of the entire packet [32]. Taking
of f to all sensor nodes in a single broadcast message, and into account the nature of WSN's limited resources, the use of
each node will adjust its f accordingly redundancy techniques will not only enhance overall
reliability, but also conserve the limited energy resources of
2.3. Open problems the sensing nodes.
In a WSN, the sensor nodes collectively detect the 2.5. Reliability of the package
environment and deliver the data through wireless channels.
Limited limitations of sensor nodes, such as low power (ie The reliability of the packet refers to the process of ensuring
limited batteries), short transmission range and small memory, the delivery of each data packet that contains the information
make reliable data delivery one of the biggest challenges in of the event observed by the relevant sensor nodes to the sink.
the WSN area . In view of this, several reliability protocols In redundancy-based reliability schemes, this is achieved by
(for example, [23,26,25]) have been proposed in the existing performing the encoding / decoding at the origin and at the
literature destination node (end-to-end) or each pair of communicating
sensor nodes (ie, each hop) from the origin to the destiny.
The relay-based reliability protocols discussed in Sections 2.1 (jump by jump).
and 2.2 aim to ensure reliable data transfer. Each protocol is
discussed on the basis of different loss recovery methods, such 2.5.1 End-to-end (connection oriented)
as hop-by-hop or end-to-end reliability and packet or event
reliability (see the 3D Reliability Reference Model in Section The schemas explained in this section are within the reliability
2). category of redundancy-based packages that use the
One of the key challenges that most schemes face is the need connection-oriented approach to ensure reliable data
to be energy efficient and at the same time achieve reliability. transmission from source to destination. Ali et al. [36] propose
This requires the use of a distributed approach to achieve the optimal erase encoding of Reed-Solomon (OREC) to
reliability compared to traditional centralized approaches (ie, achieve the reliability of packets based on connection-oriented
a focus on subsidence). redundancy in a WSN. The originating node creates and
Given the short transmission range of the sensor nodes, it is transmits the fragments of a packet using Reed-Solomon
possible that the data has to travel several jumps before it codes, a class of deletion codes, along multiple routes to the
reaches the destination. Each hop introduces entry points for sink where they are rebuilt. The cost of transmitting these
errors that result in the loss of data that must be recovered to fragments in different network conditions is calculated and the
maintain the required reliability. The adoption of the most genetic algorithms (GA) are used to determine the optimized
efficient method (for example, the type of acknowledgment) number of fragments that will be transmitted accordingly. This
to recover lost data is another key issue. For the nature of the scheme assumed a WSN based on the query where the
receiver sends the query to the "Tips", which are nodes to a reliability, and therefore provides a motivation to investigate a
sink hop. The tips further spread the queries across the hybrid mechanism.
network and the relay nodes track the route through which A hybrid mechanism combines the characteristics of
they received the queries. This helps the relay nodes to retransmission and redundancy techniques. One of the
forward the query response to the sink through the teeth, while limitations of redundancy techniques is that rebuilding the
selecting the route with short hop counts or high reliability. original packet at the receiving node will only succeed when
the number of received fragments is equal to or greater than
2.5.2 Jump to jump (oriented to links) the original set of fragments, otherwise the packet is
considered lost. . This introduces the need for a hybrid
This section investigates redundancy-based packet reliability mechanism, where the retransmission technique can be
schemes, where coding / decoding is done using the link- applied when the receiver can not receive the minimum
oriented approach. Wen et al. [38] propose transmission number of fragments needed to rebuild the packet. In this
reliability in sensor networks (TRSN), a packet reliability scenario, the hybrid mechanism will only retransmit enough
mechanism based on efficient link-oriented redundancy. missing fragments to complete the minimum number of
TRSN evaluates the reliable transmission of data in terms of fragments needed to rebuild the original package. This would
probability of arrival of packages when compared with the not only minimize unnecessary retransmissions of the packets,
required reliability, while energy efficiency is evaluated in but also reduce the overall load of the network by requiring
terms of energy consumed in the successful delivery of a only the retransmission of the small fragments instead of the
package entire packet. This results in the conservation of the limited
energy of the sensors and improves the overall reliability.
2.6. Reliability of the event However, such an approach would introduce the latency due
to processing on the node at each hop in the sensor network
In a WSN, achieving event-level reliability instead of packet-
level reliability should be sufficient for most event-driven 3. Analysis
applications. This requires efficient utilization of the event
reliability approach in a technique based on redundancy using Now we present the detailed analysis of the reliability
end-to-end or hop-by-jump methods. In this way, the schemes discussed in Section 2. We have divided the general
reliability of the event based on redundancy aims to perform analysis into characteristics analysis and qualitative analysis.
the encoding / decoding of at least one of the many packets The feature analysis compares and evaluates the schemes
containing information about the same event, instead of all the based on the common taxonomy proposed in the 3D reference
packets of the related sensor nodes. This not only reduces model (see Fig. 2),
communication between the sensor nodes, but also reduces the
processing cost at the sensor nodes 3.1. Reliability schemes based on retransmission
2.7. Hybrid mechanism. Table 1 presents the relay-based reliability schemes discussed
in Sections 2. It can be seen that most of the research focuses
So far we have investigated several protocols in wireless on achieving reliable data transmission from the sensor nodes
sensor networks that aim to achieve reliable data transmission. to the sink node (ie, upstream traffic). ) as compared to the
The most common techniques involved in achieving reliability downstream traffic.
in WSNs are retransmission and redundancy. To our Table 1
knowledge, no existing research has so far considered the use Comparison of retransmission-based reliability schemes.
of a hybrid approach that involves an efficient combination of
both retransmission and redundancy techniques to achieve
The document presents the existing data transport reliability
protocols in wireless sensor networks (WSN). The authors
review various reliability schemes based on retransmission
and redundancy techniques using different combinations of
packet or event reliability in terms of recovering lost data by
using jump-hop or end-to-end mechanisms.
Most WSN reliability evaluations are based on graph theory
and probability theory. The reliability of connectivity
investigates the probability that the network is still connected
for a certain period of time in case some nodes or links fail. Fig. 5. Time diagram of sensor node operation and it testing.
Performance reliability analyzes end-to-end delay, packet
delivery rate, and other network parameters.
The reliability of the WSN is influenced by many factors,
such as the failure of the components, environmental
influences, changes in tasks and the updating of the network.
These factors and the behavior of the network are difficult to
describe or calculate using mathematical models. Network
simulation becomes an important method to analyze the
reliability of the network. Monte Carlo, Petri nets, Bayesian
networks and other simulation methods have been used. To
provide a more efficient and accurate assessment of
transmission reliability in WSNs, the document analyzes
transmission from two directions (uplink and downlink) and
proposes a dynamic evaluation framework. Fig. 6. Markov Chain state transition diagram.
4. Proposed model based on the concept of markow The behaviour of the examined system is described by the
Markov Chain state transition diagram (see Fig. 6), where:
For WSN of the cybernetic system with critical missions or
security relevance, it is important to know that the sensor – completely good state of the sensor node; – test of the
nodes are in operation at any time. During operation, some of sensor node without failure; – hidden failure of the sensor
the WSN sensors operate in cyclic mode. node; – detection of the failure state.
The duration of operation of the sensors can be many times On the base of the state transition diagram for a Markov’s
less than the duration of the pause. In this case, the periodic process shown in Fig. 3, we can write the system of
test can be used to detect potential faults in the pause of the Chapman–Kolmogorov’s equations [19]:
sensor operation. We are going to develop a reliability model
for this category of sensors. P1' (t ) = j P0 (t ) - (y + l ) P1 (t )
The following symbols have been used to develop
P1' (t ) = j P0 (t ) - (y + l ) P1 (t )
equations for the models:
� - Failure Rate P2' (t ) = l P0 (t ) - j P2 (t )
µ - Repair Rate P3' (t ) = l P1 (t ) + j P2 (t ) - m P3 (t )
A - Availability
- Mean time between failures, In this system (1) of equations is the probability of
�
3
- Periodicity of test operations with parameter of
i =0 i
P (t ) = 1
Poisson’s flow
The availability of sensor node and it unavailability
- Time of test operations
may be defined by solution of the
- Parameter of exponential distribution of Kolmogorov’s above mentioned system of equations, where
– stationary probability values of . For high
reliable systems with the equation for unavailability is
U = P1 + P2 P3 = j / (y + l ) + l / j + l / m + lj / m (l +y )
Both relay and redundancy techniques that seek to achieve
The analysis of the shows that it is an unimodal packet or event level reliability work best when using the hop-
function with the extremes in point. The expression for by-hop method compared to the end-to-end method. Large-
the definition of optimal value of the periodicity of control scale WSN high-count counts introduce more entry points for
errors that become the cause of packet loss, which affects
is possible to find out from the condition reliability. This can be avoided to some extent by using a hop-
dU/d =0: by-hop method, since it guarantees the reliability of each
intermediate hop from the source to the destination. However,
this introduces a processing overload in the node and incurs a
T0 + tr
Tmopt = T0tm high general latency in the event information report to the sink
T0 + tm
We believe that the introduction of a hybrid mechanism would
At the Fig. 7 the function of the optimal value of the play an important role in further strengthening the reliability
control periodicity Tm opt =f(tm) is shown for typical reliability of data transmission. In addition, it would also address the
parameters of WSN sensors. challenge of minimizing the total energy consumption in a
WSN with limited resources.