Next Article in Journal
Climate Change Challenges and Community-Led Development Strategies: Do They Fit Together in Fisheries Regions?
Previous Article in Journal
The Corona Phenomenon in Overhead Lines: Critical Overview of Most Common and Reliable Available Models
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Energy-Safe Algorithm for Enhancing the Battery Life for IoT Sensors’ Applications

1
Research Laboratory Modeling, Analysis and Control of Systems (MACS), National Engineering School of Gabès, University of Gabès, Gabès 6072, Tunisia
2
Processes, Energy, Environment and Electrical Systems (Code: LR18ES34), National Engineering School of Gabès, University of Gabès, Gabès 6072, Tunisia
3
Faculty of Information Technology, Engineering and Economics, Østfold University College, Kobberslagerstredet 5, 1671 Fredrikstad, Norway
*
Author to whom correspondence should be addressed.
Submission received: 19 September 2021 / Revised: 7 October 2021 / Accepted: 10 October 2021 / Published: 13 October 2021
(This article belongs to the Special Issue Batteries and Energy Storage Device)

Abstract

:
Energy safe is mandatory for all isolated IoT tools, such as in long way roads, mountains, or even in smart cities. If increasing the lifetime of these tools, the rentability of the global network loop becomes more efficient. Therefore, this paper presents a new approach for saving energy inside the source nodes by supervising the state of energy inside each source node and calculating the duty cycle factor. The relationship between these parameters is based on an optimization problem formulation. In this respect, the present paper is designed to propose a new approach that deals with increasing the lifetime of the wireless sensor network (WSN)-attached nodes, as fixed in the application. The newly devised design is based on implementing the IEEE 802.15.4 standard beacon-enabled mode, involving a cluster tree topology. Accordingly, every subgroup is allotted to apply a specifically different duty cycle, depending on the battery’s remaining energy level, which contributes to creating a wide range of functional modes. Hence, various thresholds are defined. Simulation results prove the efficiency of the proposed approach and show the energetic benefit. The proposed flowchart has minimized the consumed energy for the WSN, which improves the battery lifetime and enhances the IoT application’s robustness. Simulations and experiments have been carried out under different conditions and the results prove that the proposed method is a viable solution.

1. Introduction

With the advent of the Internet of Things (IoT) [1,2,3,4], wireless sensor networks (WSNs) are increasingly used in various applications for various fields, such as healthcare, smart buildings, agricultural management, assisted living, industrial surveillance, and warehouse management [5,6,7].
Wireless sensor networks (WSNs) are formed by many small devices called sensor nodes that detect environmental parameters and route them to a central base station (well). Batteries power the sensor nodes. However, despite several works on the WSN domain, power consumption in actual WSNs remains a big challenge.
The energy constraint of sensor nodes introduces challenges in the design of protocols associated with IoT applications. Most of the standards developed for the protocol stack highlight special attention to the power consumption of sensor nodes. Likewise, energy conservation approaches are required at the Media Access Control (MAC) layer in the IEEE 802.15.4 standard.
This system cannot be active without a robust battery and an efficient recharge method. It seems that an electric vehicle field, the battery state of charge, state of life, and protection are the most important factors that must be supervised and controlled. Different recharging techniques appear in the literature, such as in [8], which uses the deep learning technology for improving the recharge method of the main energy source. In addition, managing the energy coming from the battery for feeding the other equipment seems to help with increasing the battery performance. This idea was discussed in [9], and the authors have used the deep deterministic policy gradient algorithm for carrying out this work. On the other hand, supervising the battery health will provide a clear vision about the performance of the used battery, as shown in [10]. All of the above ideas can help in increasing the battery life and can be applied to any application based on a battery energy source, as in this paper.

1.1. Problem Formulation

In such applications as the road management of vehicles, facilitating the road traffic or minimizing crashes are important issues. For some vehicle energy management problems [11], the solution is based on the IoT sensors’ equipment and how to manage the overall information. The efficiency of this solution depends on the battery IoT sensors’ life, and by increasing their battery life, then the overall system function will be easier and more straightforward to be tuned when needed. Figure 1 shows an explicative view of the vehicle position in a smart city where many IoT smart sensors are placed in different locations of the city to provide information about the vehicles’ situation, helping to manage the road traffic or alert about crashes. Some sensors are placed on buildings, and others are placed on vehicles. The online communication between all of these sensors will use a high energy factor, and managing the energy flow will help to increase the lifetime of this equipment and then the overall supervising loop.
The current designation of the IEEE 802.15.4 standard does not specify the procedure for duty-cycle configuration of sensor nodes to conserve energy. The long activation time of a sensor node leads to a quick loss of the battery capacity and minimizes the network life.
To reduce energy consumption and extend sensor nodes’ lives, effective energy management methods that can dynamically adjust node duty cycles (DC) (alternate nodes between standby and active cycles) are requested and recommended.

1.2. Related Work (Existing Duty-Cycling Approach for IEEE 802.15.4 Standard)

A wide range of research has been focused on investigating the WSN-associated duty cycling techniques. In [12], for instance, the authors put forward several algorithms helpful in increasing the performance of the IEEE 802.15.4 technology beacon-enabled mode. In this regard, two major strategies were advanced, namely, the beacon synchronization and duty-cycling schemes in IEEE 802.15.4, as related to the cluster tree topology. Accordingly, the authors highlight the standard IEEE 802.15.4 parameters’ impacts on the network’s overall performance. In [13], the authors establish a comparison between three different asynchronous radio duty-cycling techniques.
They validate the different approaches experimentally to prove their relevant efficiency concerning the IoT systems and aim to provide valuable assistance to the node designers by enabling them to reach the optimum choice to avoid the possible occurrence of any critical problems. In [14], an attractive, thorough analysis of various duty-cycled wake-up receiver schemes depending on the energy consumed is presented. In this respect, a star-topology-based network is enabled to operate throughout the functional duty cycle.
In [15], Choudhury et al. elaborated a general analysis of the different works dealing with the beacon synchronization and duty-cycle-related mechanisms associated with the IEEE 802.15.4 standard context. They ultimately ended up proposing a new correlation between both techniques. They managed to provide a practical comprehension of the existing schemes, thus helping designers save a remarkable quantity of consumed energy.
In [16], the authors put forward a special duty-cycle managing algorithm, highly reliant on the channel state and assisted by MAC parameters (macMaxFrameRetries, macMinBE, and macMaxCSMABack-offs). Their approach offers a dynamic adaptation-based duty cycle. For an adequate estimation of the delay and energy consumption within the network, a Markov model is established to fit the CSMA/CA protocol. A new method involving a dynamic beacon interval and super-frame adaptation algorithm (DBSAA) is described in [17]. It is based on an accurate adjustment of the network’s duty cycle, in which the traffic load of the network generates the parameters’ adaptation procedure. The adjustment mechanism (BO, SO) is proven to depend on many parameters: the collision ratio, the super-frame occupation ratio, the number of source nodes, and the number of the coordinator received packets. The attained results have been compared to the DSAA (dynamic super-frame adjustment algorithm) and the standard 802.15.4 protocol approaches’ performances.
In [18], a novel energy-harvesting model is displayed, labeled the adaptable duty-cycle adjustment algorithm, ABSD (adaptive beacon order, super-frame order, and duty cycle). It is based on interfering with adjusting the BO and SO values.
On combining a pair of approaches, the energy efficiency problem associated with IEEE 802.15.4 appears to be resolved.
In [19], the authors introduced a unique modification in the IEEE 802.15.4 super-frame structure to resolve the network lifetime problem and enhance the QoS performance: energy consumption, delay, and throughput. The authors undertook to manipulate a wake-up radio mechanism for somewhat effective management of the network nodes’ activity to take place. To this end, a Markov model is used to identify the nodes’ state. The simulation results testify to the efficiency of such an approach, especially concerning the throughput, delay, and packet drop ratio.
By devising a novel mechanism, the authors in [20] envisage changing the super-frame structure to make it liable to handle emergent data, such as periodic data (e.g., those regularly needed by doctors), as well as standard data, such as body temperature. The CSMA/CA algorithm is enabled to transmit an average traffic flow. All data are classified in terms of priorities so that only the most crucial ones could be selected. The entirety of the study is based on the notion of an inter-arrival packet. Thus, should the inter-arrival interval period be increased, the node would appear to consume a more significant amount of energy, which represents a critical issue in a wireless sensor network. The achieved simulation results indicate a special interest in this particular approach.
In [21], a new study is conducted to deal with the IEEE 802.15.4 technology-associated energy/delay performance. In [22], the authors suggest some practical proceedings helpful in selecting the MAC layer-appropriate parameters, accounting for the topology variability. The authors in [23] suggest a RADutyCon approach fitted for implementation with the IEEE 802.15.4-based networks. The work is intended to achieve a highly optimized level (threshold) for energy consumption and end-to-end delay parameters by adapting the duty cycle to the IEEE 802.15.4-based networks.
The authors in [24] consider applying a unique cross-layer method, dubbed as the Battery Aware and Reliable Beacon-Enabled IEEE 802.15.4 (BARBEI). The latter’s efficiency has been demonstrated through the various simulation results published. Similarly, the authors in [25] undertook to change both the beacon interval and super-frame duration relevant values to study their impacts on the performance of the wireless sensor network. In addition, another network traffic-load-based approach has been developed in [26]. The best results have been recorded at both levels of (BO = 7, SO = 5) values.

1.3. Paper Organization

The remainder of this research paper is organized as follows: Section 2 provides a detailed overview of the IEEE 802.15.4 standard. Section 3 presents the proposed method to compute the consumed energy by the node in its different states. Section 4 and Section 5 describe the simulation results, by comparing the proposed solution’s performance with four other methods, and the experimental results, respectively. Finally, Section 6 presents a conclusion and provides some future perspectives of this research.

2. IEEE 802.15.4 Standard

IEEE 802.15.4 technology is a significant standard for the IoT networks [27], as it defines the physical and medium access control (MAC) layers for a low-rate wireless personal area network (LR-WPAN). It supports two categories of devices: full-function devices (FFD) and reduced-function devices (RFD). FFDs can serve as PAN coordinators or sensor nodes, whereas an RFD is not capable of serving as a PAN coordinator and can only function as a sensor node. The FFD nodes are characterized by their remarkable energy storage capacity compared to the other RFD-associated nodes. An RFD is a node limited in energy resources and associated with a single FFD. It is an end device in the network topology.
IEEE 802.15.4 technology supports two activity modes: beacon-enabled mode and non-beacon-enabled mode. In the first mode, the PAN coordinator periodically sends a beacon frame to the associated devices to program their activity and sleep duration. Synchronization between these devices is achieved using a super-frame structure depicted in beacon frames, as shown in Figure 2. This interval duration is determined by two parameters: super-frame duration (SD) and beacon interval (BI) [28]. SD and BI are described according to Equations (1) and (3), respectively:
B I = D B S   2 B O
1 B O 14
S D = D B S   2 S O
1 S O B O 14
where DBS is a MAC sublayer constant and ii is equal to the number of symbols in a super-frame of order zero.
The active period is divided into the CAP (Contention Access Period) and the CFP (Contention-Free Period). Nodes communicate by sending and receiving frames only during the active period. In the CAP, nodes communicate using slotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) [29].
Figure 3 shows the flowchart of the slotted version of the CSMA/CA protocol. A contention window (CW) is used for communication. Each node checks if the channel is idle before sending any packets.
The number of back-offs (NB), the back-off exponent (BE), and the contention window (CW) are the three parameters that control the CSMA/CA slotted protocol. NB and CW parameters are initialized at the start (NB = 0 and CW = 2). Depending on the value of the Battery Life Extension attribute, the back-off exponent is initialized to BE = 2 or BE = min (2, macMinBE). macMinBE is a constant defined in the standard. After a random wait time between 0 and 2^BE−1, the MAC requests the physical layer to perform a clear channel assessment (CCA).
If before the termination of the CAP frame transmission and acknowledgment reception is completed, the MAC waits for other data to pass into the CAP. If the latter is finished, it is necessary to wait for the next CAP and repeat the process to send the current data.
If the value of NB is less than or equal to macMaxCSMABack-offs, the CSMA/CA should return to the random timeout step before CCA is performed; otherwise, the CSMA/CA algorithm should terminate with a failure of access to the canal.

3. Proposed Method Description

Communication between nodes is carried out with the super-frame structure in the IEEE 802.15.4 standard [19]. With the super-frame structure, the communication of each node is handled by the activity interval and the sleep interval. These intervals constitute the duty cycle (DC). The management of the DC helps to minimize the power consumption of the different nodes and subsequently improves the network lifetime.
The DC variation is performed by adjusting two IEEE 802.15.4 parameters, BO and SO. In this work, we will express the remaining energy as a function of BO and SO. In this way, we can control the duty-cycle value according to the remaining energy capacity.

3.1. Energy Expressions

The proposed energy-consumption model takes into consideration the node’s various states: emission, reception, idle, sleep, as well as overhearing and overmitting [24]. Overmitting energy represents the energy wasted when a node sends data and the destination node is not ready to receive it. In this case, the node retransmits the same data several times because it is waiting for an acknowledgment. Overhearing energy occurs when a node receives packets that are not intended for it.
Many transition states could be considered when calculating energy. Even in the transmission phase, the node consumes an essential quantity of energy. When the node sends the data, it loses a quantity of energy, named emission energy, Eemis, which is described by Expression (5):
E e m i s = ( N t S D   F s   E b i n ) + 2   U   I   C C A   T b a c k  
where NtSD stands for the number of data frames existing in the SD, Ebin denotes binary energy, Fs represents the frame size, I designates the current value, U denotes the voltage value, C C A is the Clear Channel Assessment, and Tback is obtained through Expression (6) as follows:
T b a c k = ( 2 P b a c k 1 )   20
where Pback presents the back-off period. In addition, the node loses energy in the reception phase, labeled Erecep, as depicted in (7):
E r e c e p = N r S D   E b i n
where NrSD is the number of received bits during the SD period.
For both overmitting and overhearing duration, the lost energy is described by Eoverm, and it is presented as Expression (8):
E o v e r m = n b r t r   d t r a   E b i n   P E R
where nbrtr describes the number of bits transmitted, Ebin describes the binary energy, PER is the error rate which is computed as the average of the fault transmitted packet, and dtra is the size of the frame (bit). The collision energy, Ecoll, is calculated through (9):
E c o l l = T a t t   U   I   N b p r k  
where Nbprk is the number of attempts that it takes the node to transmit the data with the absence of all kinds of acknowledgment from the receiver node, and Tatt describes the short period spent to access the transmission canal.
However, the sleep period presents the best technique to manage the energy quantity available in the node’s battery. The technology of IEEE 802.15.4 is known for using the cited technique. Therefore, the energy lost in the sleep period, Esleep, could be computed using the following equation:
E s l e e p = ( B I S D )   E b i n  
The consumed energy during the idle state can be computed by (11):
E I d l e = ( U   I )   T S I F S  
where U denotes the voltage value, TSIFS is the short frame spacing period SIFS, and I describes the current value. The energy remaining (Erem) in the battery is calculated using (12):
E r e m = E i n i t E c o n s
where Einit is the initial energy and Econs is the energy consumed during all states. Econs, therefore, is:
E c o n s = E e m i s + E c o l l + E o v e r m + E S l e e p + E r e c e p + E I d l e

3.2. IEEE 802.15.4 Parameter’s Intervention

Concerning a remarkably extended network setting, the first step involves collecting the necessary parameters from the nodes to obtain the nodes’ consumed energy (Econs), thus recognizing the amount of battery energy remaining. A comparison is established between the reached amount and a well-defined threshold before computing the relevant BO and SO values in a second stage. Hence, concerning the beacon-enabled duration, the node consumed power appears to be provided by:
E B I = B I F S   E T
where BI represents the beacon interval period, Fs designates the frame size, and ET denotes the energy loss when frame data is sent. It is also assumed that EBI, which depicts the energy lost during the beacon interval, is inferior to the remaining energy, as expressed by the following Equation (15):
E B I E r e m
Both relations (14) and (15) lead to relation (16):
B I F s   E T E r e m
The interval BI is defined by (17):
B I = 15.36   10 3   2 B O
Equations (16) and (17) lead to (18):
15.36   10 3   2 B O F s E T R r e m  
Equation (18) leads to (19):
2 B O E r e m   F s 15.36   10 3   E T  
The value of BO is presented by (20) and (21):
B O   log ( 2 ) log ( E r e m   F s 15.36   10 3   E T )
B O   log ( E r e m   F s 15.36   10 3   E T ) log ( 2 )
In order to competently manage the remaining quantity of energy, just 10% is manipulated, named Erem1, which is expressed by (22):
E r e m 1 = 0.1   E r e m
The value of BO is computed by (23):
B O = log ( E r e m   F s 15.36   10 3   E T ) log ( 2 )
The value of SO is 70% of BO, as described in the relation (24):
S O = 0.7   log ( E r e m   F s 15.36   10 3   E T ) log ( 2 )

3.3. Duty-Cycle Adjustment According to the Remaining Energy

The proposed method consists of adjusting the energy consumption of a sensor node according to the value of the energy remaining in the battery. As shown in Figure 4, depending on the value of the remaining energy, the PAN coordinator adjusts the values of the IEEE 802.15.4 parameters to calibrate the duty-cycle value and therefore vary the energy consumption by the node.
When the PAN coordinator receives the energy consumed, it calculates the remaining energy of each node. Depending on the remaining energy value, the PAN coordinator intervenes by new calculated values of the parameters BO and SO. As a result, it adopts a new duty cycle according to the remaining energy in the battery, and thus it improves the life of the node.
It is important to mention that the BO and SO parameters have an influence on the calculated duty cycle, as it is shown by Equation (25). SD and BI are calculated in Equations (1) and (3).
DC = SD/BI = 2(SO-BO)

4. Implementation and Simulation Results

To attain these goals, we have used the INETMANET/OMNET++ simulator. The OMNET++ (Objective Modular Network in C++) is the most realistic simulator in the wireless network context. It represents an object-oriented modular fit for implementation with discrete-event network simulation frameworks. It is also considered a critical multidisciplinary tool. OMNET++ displays several advantages, mainly its capacity to model both communication network modes, i.e., the wired and wireless communication classes. The relevant parameters are displayed in Table 1.
Our network incorporates twenty nodes, along with five PAN coordinators and a sink node. It involves five subgroups, and each has a single PAN coordinator and four nodes. The simulation is initiated once the sink node undertakes to send beacon frames to the entirety of the PAN coordinators for the network activities to be globally synchronized. The PAN coordinator then proceeds with sending the beacon frames to their children’s nodes in the network. Every subgroup is characterized with a specifically related IEEE 802.15.4 (BO, SO). Both PAN and sink nodes must be FFD in type, although the other nodes could be RFD-type nodes.
PAN 1 is primarily responsible for the nodes’ allocation (0, 1, 2, and 3), forming subgroup 1. As for PAN 2, it represents the node’s main parent (4, 5, 6, and 7) and makes up subgroup 2. Subgroup 3 is composed of PAN 3 and four relevant children (8, 9, 10, 11). Regarding subgroup 4, it includes PAN 4 combined with the nodes 12, 13, 14, and 15. As regards PAN 5, it is the one responsible for the nodes 16, 17, 18, and 19, jointly forming subgroup 5. Hence, the PAN undertakes to periodically send beacon frames to its associated children to synchronize its activity. Each subgroup has its own specific beacon interval-related parameters and super-frame duration.
Accordingly, five modes are established in the same network. The present work’s advantage lies in providing every subgroup with the chance to manage itself with the actual energy level of its node. The presence of five subgroups in the network leads to the possibility of implementing a wide range of modes. It consists of the ability to apply up to five modes in the same network. The PAN sets the values to the energy thresholds. Concerning our study cases, the existence of four thresholds helps to contribute to four changes of the IEEE 802.15.4 parameters, which result in a four-time manipulation of the duty cycle: DC1 = 50%, DC2 = 25%, DC3 = 12.5%, and DC4 = 6.25%, as illustrated in Figure 5.
Thus, simultaneous multi-modes and multi-thresholds manipulation could be undertaken within the network. Every node undertakes to send data to the corresponding coordinator in the first stage and based on the above-cited Equation (25). The coordinator calculates the energy consumed by its nodes. It then computes the amount of remaining power before comparing it to the initial threshold. If a node’s remaining power appears to be inferior to the set threshold, it turns out to be marked as a risky node (with defective energy). The associated coordinator will then proceed with the second step of changing both nodes relating to BO and SO.
At every level, the battery’s remaining energy amount is checked by the relevant coordinator. The performance of our approach was evaluated by comparing it to four other approaches also focused on monitoring the nodes’ energy consumption within the IEEE 802.15.4 technology context. The four methods, subject to the established comparison, are the Battery Aware Beacon-Enabled IEEE 802.15.4, the adaptive and Cross-Layer Approach (BARBEI) [27], the Adaptive Algorithm to Optimize the Dynamics of IEEE 802.15.4 Network (AAOD) [30], the Optimal Beacon and Super-frame Orders in WSNs (OBSO) [28], as well as the IEEE 802.15.4 with BO = 7 and SO = 5 [29]. Several parameters were subject to testing, namely, the queuing delay and end-to-end duration, along with all kinds of consumed energy, including collision energy, sleep-state energy, emission energy, reception energy, as well as overhearing and overmitting period-associated energy.

4.1. Comparison of Simulation Results

The traffic load appears to range from 100 to 900 packets/s. Figure 6 highlights the evolution recorded in queue delay concerning all approaches, marking the evolution scored in the node’s traffic load. The end-to-end parameter-associated evolution is depicted in Figure 7, marking the increase in end-to-end delays with increased network traffic load. In effect, the proposed approach appears to register and display the most effective scores concerning the AAOD approach.

4.2. The Stable State-Related Energy Consumption

For effective data transmission to occur, the node is made to involve two different states: a transient state and a stable one. In the first state, the node could be busy transmitting or receiving information. In addition, the node might well appear to suffer from the persistence of an overhearing/overmitting type of problem at this level. Besides, sleeping could also be enabled at this stage. Our study case is characterized by the presence of four phases resulting from the four relevant thresholds. Figure 8 highlights the simulation experiments’ data relevant to the collision state. As could be noted, the energy consumed at this level appears to increase with the growth in the number of data packets. All the approaches under review (AAOD, BARBEI, and the IEEE 802.15.4), except for the OBSO model, were found to display an increase in energy lost during a collision problem. In effect, the most effective results appear to be scored via our proposed architecture.
The same applies to the energy increasing as consumed during the node 15 emission state. All the investigated approaches (OBSO, BARBEI, AAOD) were proven to register a decrease in energy level with the increase in the number of the message packets, except for the IEEE 802.15.4 model and the proposed design, which appear to demonstrate a noticeably lower decrease. In fact, under a rate comprised of between 100 and 600 packets/s, our approach tends to exhibit the most effective results, indicating the minimum value of energy consumed. Even with a remarkably excessive number of packets, our approach reached values that appear to score the same rate value as that recorded via the AAOD method, as it is shown in Figure 9.
Concerning the overmitting and overhearing state, the power lost following implementation of the different methods appears to increase noticeably with an increased number of packets, except for the BARBEI approach, as illustrated in Figure 10. Similarly, our designed approach reflected the most efficient results, as compared to those attained via the IEEE 802.15.4 and OBSO techniques.
The proposed approach displays the lowest energy consumption values even in the reception state once the traffic loads are lower than 300 packets/s. Even with loads exceeding 500 packets/s, our design remains the most highly effective regarding the IEEE 802.15.4, BARBEI, and AAOD, as shown in Figure 11.
As a matter of fact, and with the noticeable evolution in traffic load and development of the duty cycle of the node with faulty energy, the energy lost during the sleep period tends to increase. Once again, the proposed design appears to stand as the most efficient method in terms of energy consumption compared to the examined algorithms, especially at loads’ level of 300 packets/s, as justified through Figure 12.

4.3. The Transient State-Related Energy Consumption

As shown in Figure 13, at this level, still, the proposed approach displays a noticeable decrease in energy consumption, displaying decreased value levels. It is noteworthy that the IEEE 802.15.4 appears to exhibit the most effective results regarding all the other methods.

5. Experimental Results

After comparing our simulation method with four other methods, we concluded that our proposed method is more efficient. In this section, we will present an experimental implementation of our method on a real IoT platform. The platform used is of the Waspmote Libelium type as it is exposed in [31]. Figure 14 shows the waspmote used in our experiment.
The characteristics of the platform are presented in Table 2.
The waspmote platform is widely used in IoT applications. We can connect several types of industrial sensors to the waspmote node by using a sensor board. The experimental tests were carried out in a laboratory. The platform is composed of 5 nodes which are dispersed in the laboratory as shown in Figure 15. Each node was equipped with an XBee-Pro 802.15.4 radio module, from the manufacturer DIGI at the address “9350 Excelsior Blvd Suite 700 Hopkins, MN 55343”. The XBee modules were attached to an antenna. The used space is shown in Figure 15, and is 30 m in length and 20 m in width.
We implemented our energy optimization method in the waspmote node, which acts as the PAN coordinator.
As we mentioned, our approach is based on the duty-cycle adaptation according to the amount of remaining energy associated with each node. In our test, node 1 suffered from an energy shortage. This node sends the amount of energy consumed. The PAN coordinator intervened by changing the BO and SO parameters by changing the duty-cycle value.
We have set a threshold equal to 50% of the battery level. As shown in Figure 16, the remaining energy level in the node battery reaches the threshold set at a time of 36 h. After the detection of this threshold, the coordinating PAN intervenes by varying the values of BO and SO. From the experimental result shown in Figure 17, we can see that the energy consumption is optimized.
After an intervention at the instant t = 36 h, our approach optimizes the energy consumed by 0.4% of the battery capacity at the instant t = 48 h, over a period of 12 h. It optimizes power consumption by 3.2% of battery capacity after a time interval of 96 − 36 = 60 h.

6. Conclusions

In this paper, we proposed a novel energy efficiency algorithm for increasing the battery life for IoT wireless sensor applications. It is noteworthy that these WSNs appear to display several shortcomings, above all, the limited or low energy capacity. In this respect, the present work constitutes a modest attempt to resolve such a challenging issue. By proposing a new approach, we intended to help to increase the nodes’ lifetime duration through somewhat effective exploitation of the battery residual energy amount.
Hence, following a crash, our designed algorithm undertakes to carefully detect the battery’s current energy level by allowing a new mathematical model to compute the nodes’ energy consumption levels throughout the different relevant states. Accordingly, once the energy level appears to reach the determined threshold, the proposed scheme would start to operate. The implemented simulations’ achieved results testify to the proposed architecture’s noticeable efficiency compared to four investigated state-of-the-art algorithms. On the other hand, we implemented our method on an IoT platform of the waspmote-Libelium type. The experimental results proved the effectiveness of our method. Referring to the results in the corresponding section, the algorithm was started at the instance t = 36 h, so the economic mode will start. The evaluation process obtains a yield of 0.4% if the algorithm controls the process for 12 h. It is possible to obtain a yield of 3.2% in addition to the battery capacity if the algorithm is run for 60 h. When this algorithm is in action, the yield is increasing.
Some of the future endeavors of this work can be assigned to the use of some receivers’ equipment based on the wakeup principle, which will reduce the running time and give orders to send information only when the data arrives. This solution can help to save energy, and thus to increase the battery life. It is important to mention that the battery temperature has an influence on the battery yield. It is also possible to add this extension to the algorithm, which can be extended by supervising the battery temperature parameter. When the battery temperature value exceeds the nominal one, the system can react and stop the transmission to help to have more security on the material by increasing the battery life. If concentrating on the used equipment for building, using the LoRa technology, this transmission system can reduce the global emission points as the communication distance can reach 20 km. This will help in reducing the communication points using the IEEE 802.15.4 equipment. However, it is also important to mention that with a piezoelectric solution, the battery state of life can be ameliorated as this equipment can help in feeding the system with a portion of the needed power. Therefore, further research in these fields can help in improving this work.

Author Contributions

Conceptualization, A.Z.; methodology, A.Z.; software, A.Z.; validation, A.Z.; formal analysis, A.Z.; investigation, A.Z.; resources, A.Z.; data curation, A.Z.; writing—original draft preparation, A.Z., A.F. and L.M.-P.; writing—review and editing, A.Z., A.F. and L.M.-P.; visualization, A.Z., A.F. and L.M.-P.; supervision, A.Z.; project administration, A.Z.; funding acquisition, L.M.-P. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Al-Shammaa, A.A.; Stocker, A.J. A Novel Method for Event Detection using Wireless Sensor Networks. In Proceedings of the 2018 Imperial College Computing Student Workshop (ICCSW 2018), London, UK, 20–21 September 2018; pp. 1–9. [Google Scholar]
  2. Zikria, Y.B.; Yu, H.; Afzal, M.K.; Rehmani, M.H.; Hahm, O. Internet of Things (IoT): Operating System, Applications and Protocols Design, and Validation Techniques. Future Gener. Comput. Syst. 2018, 88, 699–706. [Google Scholar] [CrossRef]
  3. Zikria, Y.B.; Afzal, M.K.; Ishmanov, F.; Kim, S.W.; Yu, H. A Survey on Routing Protocols Supported by the Contiki Internet of Things Operating System. Future Gener. Comput. Syst. 2018, 82, 200–219. [Google Scholar] [CrossRef]
  4. Tian, Z.; Shi, W.; Wang, Y.; Zhu, C.; Du, X.; Su, S.; Sun, Y.; Guizani, N. Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment. IEEE Trans. Ind. Inform. 2019, 15, 4285–4294. [Google Scholar] [CrossRef] [Green Version]
  5. Golpîra, H.; Khan, S.A.R.; Safaeipour, S. A review of logistics internet-of-things: Current trends and scope for future research. J. Ind. Inf. Integr. 2021, 22, 100194. [Google Scholar]
  6. Choi, W.; Kim, J.; Lee, S.; Park, E. Smart home and internet of things: A bibliometric study. J. Clean. Prod. 2021, 301, 126908. [Google Scholar] [CrossRef]
  7. Trab, S.; Zouinkhi, A.; Bajic, E.; Abdelkrim, M.N.; Chekir, H. IoT-based risk monitoring system for safety management in warehouses. Int. J. Inf. Commun. Technol. 2018, 13, 424–438. [Google Scholar] [CrossRef]
  8. Wei, Z.; Quan, Z.; Wu, J.; Li, Y.; Pou, J.; Zhong, H. Deep Deterministic Policy Gradient-DRL Enabled Multiphysics-Constrained Fast Charging of Lithium-Ion Battery. IEEE Trans. Ind. Electron. 2021. [Google Scholar] [CrossRef]
  9. Wu, J.; Wei, Z.; Liu, K.; Quan, Z.; Li, Y. Battery-Involved Energy Management for Hybrid Electric Bus Based on Expert-Assistance Deep Deterministic Policy Gradient Algorithm. IEEE Trans. Veh. Technol. 2020, 69, 12786–12796. [Google Scholar] [CrossRef]
  10. Wu, J.; Wei, Z.; Li, W.; Wang, Y.; Li, Y.; Sauer, D.U. Battery Thermal- and Health-Constrained Energy Management for Hybrid Electric Bus Based on Soft Actor-Critic DRL Algorithm. IEEE Trans. Ind. Inform. 2021, 17, 3751–3761. [Google Scholar] [CrossRef]
  11. Flah, A.; Mahmoudi, C. Design and analysis of a novel power management approach, applied on a connected vehicle as V2V, V2B/I and V2N. Int. J. Energy Res. 2019, 43, 1–21. [Google Scholar] [CrossRef]
  12. Khanafer, M.; Guennoun, M.; Mouftah, H.T. A survey of beacon-enabled IEEE 802.15. 4 MAC protocols in wireless sensor networks. IEEE Commun. Surv. Tutor. 2014, 16, 856–876. [Google Scholar] [CrossRef]
  13. Uwase, M.P.; Bezunartea, M.; Tiberghien, J.; Dricot, J.M.; Steenhaut, K. Experimental comparison of radio duty cycling protocols for wireless sensor networks. IEEE Sens. J. 2017, 17, 6474–6482. [Google Scholar] [CrossRef] [Green Version]
  14. Mazloum, N.S.; Edfors, O. Comparing Analog Front-Ends for Duty-Cycled Wake-Up Receivers in Wireless Sensor Networks. IEEE Sens. J. 2016, 16, 7016–7021. [Google Scholar] [CrossRef] [Green Version]
  15. Choudhury, N.; Matam, R.; Mukherjee, M. Duty-Cycling in Synchronized IEEE 802.15.4 Cluster-Tree Networks. In Proceedings of the International Conference of Electronics, Computing and Communication Technologies (CONECCT), Bangalore, India, 16–17 March 2018. [Google Scholar]
  16. Choudhury, N.; Matam, R.; Mukherjee, M.; Shu, L. Adaptive Duty Cycling in IEEE 802.15. 4 Cluster Tree Networks Using MAC Parameters. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Chennai, India, 10–14 July 2017. [Google Scholar]
  17. Oliveira, C.H.; Ghamri-Doudane, Y.; Lohier, S. A duty cycle self-adaptation algorithm for the 802.15.4 wireless sensor networks. In Proceedings of the Global Information Infrastructure Symposium, Trento, Italy, 28–31 October 2013; pp. 1–7. [Google Scholar]
  18. Nguyen, T.; Khan, J.; Ngo, D. Energy harvested IEEE 802.15.4 wireless body area network. In Proceedings of the 10th EAI International Conference on Body Area Networks, Sydney, Australia, 28–30 September 2015; pp. 247–253. [Google Scholar]
  19. Rasheed, M.; Javaid, N.; Imran, M.; Khan, Z.; Qasim, U.; Vasilakos, A. Delay and energy consumption analysis of priority guaranteed MAC protocol for wireless body area networks. In Wireless Networks; Springer: Berlin/Heidelberg, Germany, 2017; Volume 23, pp. 1249–1266. [Google Scholar]
  20. Khan, Z.A.; Rasheed, M.B.; Javaid, N.; Robertson, B. Effect of packet inter-arrival time on the energy consumption of beacon enabled MAC protocol for body area networks. In Procedia Computer Science; Elsevier: Amsterdam, The Netherlands, 2014; Volume 32, pp. 579–586. [Google Scholar]
  21. Doudou, M.; Barcelo-Ordinas, J.M.; Djenouri, D.; Badache, N.; Garcia-Vidal, J. Performance optimization of duty-cycled MAC in delay-energy constrained sensor network under uniform and nonuniform traffic generation. Int. J. Commun. Syst. Wiley Online Libr. 2017, 30, 1–17. [Google Scholar] [CrossRef]
  22. Du, W.; Navarro, D.; Mieyeville, F. Performance evaluation of IEEE 802.15. 4 sensor networks in industrial applications. Int. J. Commun. Syst. Wiley Online Libr. 2015, 28, 1657–1674. [Google Scholar] [CrossRef] [Green Version]
  23. Li, Y.; Chai, K.K.; Chen, Y.; Loo, J. Low complexity duty cycle control with joint-optimazation of delay and energy efficiency for beacon-enabled IEEE 802.15. 4 networks. In Proceedings of the 20th European Wireless (EW’14), Barcelona, Spain, 14–16 May 2014. [Google Scholar]
  24. Salayma, M.; Al-Dubai, A.; Romdhani, I.; Yassein, M.B. Battery aware beacon enabled IEEE 802.15. 4: An adaptive and cross-layer approach. In Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, 13–16 September 2015; pp. 1267–1272. [Google Scholar]
  25. Salayma, M.; Mardini, W.; Khamayseh, Y.; Yasin, M.B. Optimal Beacon and superframe orders in WSNs. Topology 2013, 6, 8. [Google Scholar]
  26. Kavian, Y.S.; Rasouli, H. Adaptive IEEE 802.15.4 MAC Protocol for Wireless Sensor Networks. In Technological Breakthroughs in Modern Wireless Sensor Applications; IGI Global: Hershey, PA, USA, 2015; pp. 109–123. [Google Scholar]
  27. Tan, J.; Koo, S.G. A survey of technologies in internet of things. In Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), Santa Clara, CA, USA, 26–28 May 2014; pp. 269–274. [Google Scholar]
  28. Koubaa, A.; Alves, M.; Tovar, E. A comprehensive simulation study of slotted CSMA/CA for IEEE 802.15. 4 wireless sensor networks. In Proceedings of the IEEE International Workshop on Factory Communication Systems—(WFCS 2006), Torino, Italy, 28–30 June 2006; pp. 183–192. [Google Scholar]
  29. Adappa, A.S.; Kumar, K.D.; Boyapati, A. Implementation of unslotted and slotted CSMA/CA for 802.11 and 802.15.4 protocol. In Proceedings of the 2019 Global Conference for Advancement in Technology (GCAT), Bangalore, India, 18–20 October 2019; pp. 1–7. [Google Scholar]
  30. Hurtado-Lopez, J.; Casilari, E. An adaptive algorithm to optimize the dynamics of IEEE 802.15.4 networks. In Proceedings of the International Conference on Mobile Networks and Management, Cork, Ireland, 23–25 September 2013; pp. 136–148. [Google Scholar]
  31. Waspmote Spesification—Spesifikasi Hardware Waspmote. Available online: https://www.libelium.com/products/waspmote/hardware/ (accessed on 25 August 2020).
Figure 1. IoT sensors in a smart city for managing vehicle traffic.
Figure 1. IoT sensors in a smart city for managing vehicle traffic.
Energies 14 06613 g001
Figure 2. The frame composition.
Figure 2. The frame composition.
Energies 14 06613 g002
Figure 3. Flowchart of slotted CSMA/CA algorithm for IEEE 802.15.4.
Figure 3. Flowchart of slotted CSMA/CA algorithm for IEEE 802.15.4.
Energies 14 06613 g003
Figure 4. Flowchart of duty-cycle adjustment algorithm for IEEE 802.15.4.
Figure 4. Flowchart of duty-cycle adjustment algorithm for IEEE 802.15.4.
Energies 14 06613 g004
Figure 5. Duty cycle.
Figure 5. Duty cycle.
Energies 14 06613 g005
Figure 6. Queueing delay.
Figure 6. Queueing delay.
Energies 14 06613 g006
Figure 7. End-to-end delay.
Figure 7. End-to-end delay.
Energies 14 06613 g007
Figure 8. Collision energy consumption.
Figure 8. Collision energy consumption.
Energies 14 06613 g008
Figure 9. Emission energy consumption.
Figure 9. Emission energy consumption.
Energies 14 06613 g009
Figure 10. Overhearing and overmitting energy consumption.
Figure 10. Overhearing and overmitting energy consumption.
Energies 14 06613 g010
Figure 11. Reception energy consumption.
Figure 11. Reception energy consumption.
Energies 14 06613 g011
Figure 12. Sleep energy consumption.
Figure 12. Sleep energy consumption.
Energies 14 06613 g012
Figure 13. Idle energy consumption.
Figure 13. Idle energy consumption.
Energies 14 06613 g013
Figure 14. Waspmote device equipped with the 802.15.4 module.
Figure 14. Waspmote device equipped with the 802.15.4 module.
Energies 14 06613 g014
Figure 15. The testbed.
Figure 15. The testbed.
Energies 14 06613 g015
Figure 16. Battery level versus energy.
Figure 16. Battery level versus energy.
Energies 14 06613 g016
Figure 17. Energy consumption.
Figure 17. Energy consumption.
Energies 14 06613 g017
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParametersValues
Simulation time100 s
Network size(800 m, 400 m)
Initial energy18,720 J
Nodes number20
PAN number5
Sink number1
Network topologyStar
Frequency band2.4 GHz
Radio typeIEEE 802.15.4
Initial duty cycle0.8
Table 2. Waspmote characteristics.
Table 2. Waspmote characteristics.
Energy ConsumptionStatePower Consumed
CPUActive17 mA (mW)
Sleep30 μA (mW)
DeepSleep33 μA (mW)
Hibernate7 μA (mW)
TransceiverTransmit (+19 dBm)79 (mW)
Receive57 (mW)
IDLE26 (mW)
Sleep<0.005 (mW)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zouinkhi, A.; Flah, A.; Mihet-Popa, L. A Novel Energy-Safe Algorithm for Enhancing the Battery Life for IoT Sensors’ Applications. Energies 2021, 14, 6613. https://0-doi-org.brum.beds.ac.uk/10.3390/en14206613

AMA Style

Zouinkhi A, Flah A, Mihet-Popa L. A Novel Energy-Safe Algorithm for Enhancing the Battery Life for IoT Sensors’ Applications. Energies. 2021; 14(20):6613. https://0-doi-org.brum.beds.ac.uk/10.3390/en14206613

Chicago/Turabian Style

Zouinkhi, Ahmed, Aymen Flah, and Lucian Mihet-Popa. 2021. "A Novel Energy-Safe Algorithm for Enhancing the Battery Life for IoT Sensors’ Applications" Energies 14, no. 20: 6613. https://0-doi-org.brum.beds.ac.uk/10.3390/en14206613

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop