Professional Documents
Culture Documents
Transport layer The messaging done to provide end-to-end reliability, flow control, and congestion avoidance
The idle listening caused by unnecessary wake-ups of routing backbone nodes when there is no transmission
intended
Path augmentation, that is, not using the shortest path to the sink (intentionally by energy-aware routing
Network layer
methods or unintentionally by localized protocols)
The messaging done for route establishment
Point-to-point reliability solutions such as multipath routing
Overhearing
Data link layer Idle listening
Retransmissions because of collisions
Table 1. The factors that impact the energy consumption of sensors categorized by the OSI layers.
Identity-based (STEM-B)
STEM [2] Internal Radio-based Separate (single-channel)
Range-based (STEM-T)
to take advantage of the offered benefits. Different Forms of Use For efficient use of a
Moreover, the trade-offs observed in networks WSN for a target application, wake-up receiver
with wake-up receivers are stated. Each of technology enables various new methods such as
these trade-offs requires detailed analysis to the on-demand target monitoring method pro-
enable the discovery of the optimum network posed in [18] where a node that detects a target
settings. wakes up all its neighbors to receive their obser-
vations about the target. The next section pre-
BENEFITS sents application areas for wake-up receiver
Energy-Conservation A dominant energy waste technology.
observed in WSN applications is idle listening,
which occurs because of periodic wake-ups Dynamic Behavior System-wide parameters cre-
regardless of the data communication needed. ate inefficiencies as the network load differs
The wake-up strategy should be energy effi- based on location. Hence, parameters such as
cient [20]. The wake-up receiver presents an the duty cycle and preamble length should be
energy-efficient solution to idle listening as the dynamically set based on localized requirements.
nodes only wake up when there is a message Since a wake-up receiver enables dynamic duty
intended for them. Chowdhury et al. show that cycling and dynamic communication rendezvous,
the energy consumption of S-MAC can be several inefficient parameter definitions become
reduced significantly using wake-up receivers unnecessary, which results in a more efficient
[14]. Since active wake-up receivers are also an network, as shown by [1, 16].
energy consumption source for sensor nodes,
they should be ultra-low-power to acquire the Overhearing Is Decreased With the help of identi-
energy gain. ty-based wake-up receivers, overhearing is
reduced since only the destined nodes will wake
Minimum Overhead As the wake-up receiver pre- up and listen to the medium, as in [2, 15].
sents a purely asynchronous rendezvous scheme,
the overhead incurred by time synchronization of CHALLENGES
the two other rendezvous schemes are dissipated. Cost and Hardware Complexity If a wake-up radio
This overhead causes higher energy consumption, utilizes separate channel(s), the hardware com-
as shown by [1, 16]. The communication overhead plexity and cost of sensor nodes will increase.
to form the routing backbone also becomes This is especially important when multiple wake-
redundant as each node wakes up its relay. For up channels are employed, as in [3, 7]. However,
instance, Dhanaraj et al. propose a method where as indicated in [2], the radio typically accounts for
a destination node first wakes up its relay before less than 15 percent of the cost of a sensor node.
receiving the data intended for it [10]. In addi-
tion, instead of having clusters with regular duty Delay With a passive wake-up radio, such as
cycles, formation of clusters can be done only the one proposed in [7], wake-up delay is
with event occurrences. incurred, which may become significant for the
Multiplexer
Amplifier 2 increases the high availability of the surveillance
Wake-up signal network through active-standby operation. A
RF input 2 Correlator
2 similar scenario is presented in [20].
In an event-driven application, depending on
Amplifier 3
the rate of events, utilization of the wake-up tech-
RF input 3 Correlator nology may become useless. If events occur fre-
3
quently, some set of sensors have to sleep and
wake up frequently. Hence, for such scenarios
switching to periodic sleep scheduling is wiser. An
Wake example scenario can be the surveillance of muse-
generator
ums. Consider visitors of a historic arena. The
objective of the WSN is to detect the visitors who
Figure 2. Simplified block diagram for a wake-up receiver on the market [3]. are trying to enter unallowed parts of the arena.
During the open hours of the museum, the rate
of these events may be larger than during the
intruder may apply a routing strategy to mini- night shifts. Daytime operation of the network
mize the effect of the jammer by waking up the can be based on periodic sleep scheduling, where-
sensors that are far enough from the intruder. as night time operation can follow the wake-up
For target tracking or sniper localization sce- scheme. Rigorous analysis of when to switch from
narios, sensors that detect an event may trigger a wake-up scheme to sleep scheduling is required
the surrounding nodes, and a locally activated when such bimodal operation is probable.
set of sensors may track/localize the target. Acti-
vating only the sensors close to the path fol- PERIODIC OR QUERY-BASED APPLICATIONS
lowed by the target is a reasonable approach. Periodic or query-based data collection is com-
The awakened group of sensors may localize the mon when environmental properties such as
target more accurately. In surveillance applica- temperature or humidity levels of a field are to
tions, the frontier sensors may invoke some set be monitored. For such applications, wake-up
of valuable or costly sensors behind the perime- circuitry may be utilized to dismiss the time syn-
ter to produce a barrier to reduce the false chronization requirement. Instead of scheduled
alarms. This scheme suggests a layered topology operation, a single sensor can manage the tim-
where overlays are probable. ing, and when the data is to be collected, it initi-
The interaction of the wake-up receivers with ates communication by waking up its neighbors.
the sensor node and with the network for a sim- Hence, an individual sensor may create a dynam-
ple event-driven application is shown in Fig. 3 ic data flooding scheme where the data can be
based on a target detection scenario. The identi- aggregated only by the awakened sensors. For
ty-based wake-up scheme enables point-to-point example, the maximum value of temperature
communication. While waking up the neighbors, readings can be calculated as the data flows to
it is possible to communicate some valuable the sink through the dynamically determined
information. In the surveillance scenario shown route to the sink. Based on the residual energy
in Fig. 3, the sensor that detects a target may levels of individual sensors, the sensors may
communicate the type of target (e.g., a soldier or reject waking up. If a handshaking protocol is
an armored military vehicle), which helps the utilized for the wake-up stage, the sensors may
awakened sensor decide which sensing circuitry dynamically alter their route based on their
to activate. Such an application is reasonable if impacts on their neighbors. For example, during
the sensing circuitry consumes comparable ener- the handshake process, residual energy levels
gy to the radio subsystem. For example, micro can be exchanged to minimize the effect of ener-
impulse radar sensors spend a couple of orders gy consumption on the relay functionality.
higher energy than passive infrared sensors. In Assume that a WSN is deployed to monitor
this scenario, when the first sensor detects the the depletion of minerals in soil where several
target, its sensing circuitry triggers the wake-up types of crops are cultivated. The farmer requires
receiver. First, a burst of signal is sent to the the average level of mineral ratios from a portion
next hop (second sensor) to trigger the first of the field where only one type of crop is nur-
stage of the wake-up receiver. Afterward, the tured. To obtain this information, the WSN must
identity of the second sensor and the target type be queried based on the location of sensors. This
are sent. The second stage of the wake-up receiv- type of sensor network can be regarded as a dis-
er of the second sensor turns on the main radio tributed database. For such applications, the dis-
if the sent identity matches itself. Then the main semination of queries requires intelligent routing
radios can communicate, and the second sensor techniques where wake-up circuitry can be used.
may turn on the neccessary sensing circuitry For example, in this farming scenario the sensors
based on the type of target. located in the region of interest can be awak-
A similar scenario can be devised to consider ened. The medium access layers can be coordi-
the preservation of the sensing coverage in case nated during the wake-up stage to avoid collisions
of sensor failures using the redundancy of the during communication. Some packet transmis-
deployment. Assume that each sensor is assigned sion schedule for the specific event can be deliv-
one or more standby buddy sensors. When the ered to the surrounding nodes within the wake-up
battery level of the active sensor drops below a code. For example, SMAC can be modified to
Sensing units
Wake-up transmitter (1) Event occurred
(oscillator, VGA, PA) Infrared MIR
(2) Event
sensed and
wake-up signal
Sensor node 1 to be sent
Wake-up antenna
(4) Initial burst received, Main antenna
timer set to receive code sequence
Burst detection (7) Message
First stage (detector, comparator,
burst detection is received
timer)
Main
radio
(5) Code sequence received subsystem
Address decoder
Second stage (LNA, detector,
code (ID) decoder) (6)
sequence ID matches,
main radio
is activated Sensing units
Wake-up transmitter
(oscillator, VGA, PA) Infrared MIR
Sensor node 2
Figure 3. Interaction of wake-up receivers with the sensor node and with the network for a simple event-driven application. The sensor
node that detects a target wakes up the next-hop sensor node. The wake-circuitry is simplified from [6].
Reduce Sensor Network Energy Consumption Using a [21] N. Ahmed, S. S. Kanhere, and S. Jha, The Holes Prob-
Wakeup Radio, IEEE Trans. Mobile Comp., vol. 4, no. lem in Wireless Sensor Networks: A Survey, Mobile
3, May/June 2005, pp. 22842. Comp. Commun. Review, vol. 9, no. 2, 2005, pp. 418.
[10] M. Dhanaraj, B. S. Manoj, and C. S. R. Murthy, A
New Energy Efficient Protocol for Minimizing Multi-Hop
Latency in Wireless Sensor Networks, Proc. 3rd IEEE BIOGRAPHIES
PERCOM 05, Washington, DC, 2005, pp. 11726. I LKER D EMIRKOL [M] (ilker@boun.edu.tr) received his B.Sc.
[11] X. Yang and N. H.Vaidya, A Wakeup Scheme for Sen- (with honors), M.Sc., and Ph.D. degrees in computer engi-
sor Networks: Achieving Balance between Energy Sav- neering from Bogazici University, Istanbul, Turkey, in 1998,
ing and End-to-End Delay, Proc. 10th IEEE RTAS 04, 2002, and 2008, respectively. Currently, he is a post-doctor-
May 2004, pp. 1926. al researcher at the University of Rochester, New York. He
[12] R. C. Shah and J. M. Rabaey, Energy Aware Routing worked as a database, system, and network engineer from
for Low Energy Ad Hoc Sensor Networks, Proc. IEEE 1997 to 2004. He was a research and teaching assistant in
WCNC, vol. 1, Mar. 2002, pp. 35055. the Bogazici University Computer Engineering Department
[13] C. Guo, L. C. Zhong, and J. Rabaey, Low Power Dis- from 2004 to 2008. His research interests include the areas
tributed MAC for Ad Hoc Sensor Radio Networks, of wireless communications, wireless ad hoc and sensor
Proc. IEEE GLOBECOM, vol. 5, San Antonio, TX, Nov. networks, and optimization of communication networks.
2001, pp. 294448.
[14] K. Chowdhury et al., CMAC A Multi-Channel Ener- ERTAN ONUR [M] (onure@ieee.org) received a B.Sc. degree in
gy Efficient MAC for Wireless Sensor Networks, Proc. computer engineering from Ege University, Izmir, Turkey, in
IEEE WCNC, vol. 2, Apr. 2006, pp. 117277. 1997, and his M.Sc. and Ph.D. degrees in computer engi-
[15] E. Shih, P. Bahl, and M. J. Sinclair, Wake on Wireless: neering from Bogazici University in 2001 and 2007, respec-
An Event Driven Energy Saving Strategy for Battery tively. He is a BAL93 graduate. After his B.S. degree, he
Operated Devices, Proc. ACM MobiCom, Sept. 2002, worked for LMS Durability Technologies GmbH, Kaiser-
pp. 16071. slautern, Germany. While working on his M.Sc. and Ph.D.
[16] L. Zhong, J. M. Rabaey, and A. Wolisz, An Integrated degrees, he worked as a project leader at Global Bilgi, Istan-
Data-Link Energy Model for Wireless Sensor Networks, bul, and as an R&D project manager at Argela Technologies,
Proc. IEEE ICC, vol. 7, June 2004, pp. 377783. Istanbul. Presently, he is an assistant professor at EEMCS,
[17] R. Subramanian and F. Fekri, Sleep Scheduling and WMC, Delft University of Technology, the Netherlands. His
Lifetime Maximization in Sensor Networks: Fundamen- research interests are in the area of computer networks, per-
tal Limits and Optimal Solutions, Proc. 5th IPSN 06, sonal networks, and wireless and sensor networks.
Apr. 2006, pp. 21825.
[18] L. Song and D. Hatzinakos, A Cross-Layer Architecture of CEM ERSOY [SM] (ersoy@boun.edu.tr) received his B.S. and
Wireless Sensor Networks for Target Tracking, IEEE/ACM M.S. degrees in electrical engineering from Bogazici Univer-
Trans. Net., vol. 15, no. 1, Feb. 2007, pp. 14558. sity in 1984 and 1986, respectively. He worked as an R&D
[19] Khalil, S. Bagchi, and N. B. Shroff, SLAM: Sleep-Wake engineer at NETAS A.S. between 1984 and 1986. He
Aware Local Monitoring in Sensor Networks, Proc. received his Ph.D. in electrical engineering from Polytechnic
37th IEEE/IFIP Intl. Conf. Dependable Sys, and Net., University, Brooklyn, New York, in 1992. Currently, he is a
2007, pp. 56574. professor in the Computer Engineering Department of
[20] A. Boukerche, X. Fei, and R. B. Araujo, An Optimal Bogazici University. His research interests include perfor-
Coverage-Preserving Scheme for Wireless Sensor Net- mance evaluation of communication networks, wireless
works Based on Local Information Exchange, Comp. sensor networks, and mobile applications. He is the chair-
Commun., vol. 30, no. 1415, 2007, pp. 270820. man of the IEEE Communications Society Turkish Chapter.