A bidirectional congestion control transport protocol for the internet of drones

A bidirectional congestion control transport protocol for the internet of drones

Journal Pre-proof A bidirectional congestion control transport protocol for the internet of drones Bhisham Sharma, Gautam Srivastava, Jerry Chun-Wei L...

13MB Sizes 0 Downloads 20 Views

Journal Pre-proof A bidirectional congestion control transport protocol for the internet of drones Bhisham Sharma, Gautam Srivastava, Jerry Chun-Wei Lin

PII: DOI: Reference:

S0140-3664(19)31546-4 https://doi.org/10.1016/j.comcom.2020.01.072 COMCOM 6193

To appear in:

Computer Communications

Received date : 30 October 2019 Revised date : 5 January 2020 Accepted date : 29 January 2020 Please cite this article as: B. Sharma, G. Srivastava and J.C.-W. Lin, A bidirectional congestion control transport protocol for the internet of drones, Computer Communications (2020), doi: https://doi.org/10.1016/j.comcom.2020.01.072. This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. © 2020 Published by Elsevier B.V.

Journal Pre-proof

lP repro of

A Bidirectional Congestion Control Transport Protocol for the Internet of Drones Bhisham Sharmaa,∗, Gautam Srivastavab,c,∗, Jerry Chun-Wei Lind a Chitkara

University School of Engineering and Technology, Chitkara University, Himachal Pradesh, India. Email: [email protected] b Department of Mathematics and Computer Science, Brandon University, Brandon, MB, CANADA c Research Centre for Interneural Computing, China Medical University, Taichung, TAIWAN d Department of Computer Science, Electrical Engineering and Mathematical Sciences, Western Norway University of Applied Sciences, Bergen 5063, Norway. Email: [email protected]

Abstract

Wireless sensor networks (WSNs) are composed of energy constrained devices that autonomously form networks through which sensed information is trans-

ported from the region of interest to the central control station (sink), integration with unmanned aerial vehicles (UAVs) leads to enlarged monitoring area

and to enhance overall network performance. Due to application specific nature of wireless sensor networks, it is challenging to design a congestion control

rna

protocol that is suitable for all types of applications in the Internet of Drones (IoD). Congestion avoidance and control in wireless sensor networks mainly

aims at reducing packet drop due to congestion and maintaining fair bandwidth allocation to all network flows. In this research work, we propose a reliable and congestion based protocol, which provides both bidirectional reliability and rate adjustment based congestion control. It uses Technique for Order Prefer-

Jou

ence by Similarity to Ideal Solution (TOPSIS) method to select optimal path for data transmission because TOPSIS selects an alternative such that it has shortest distance from the ideal one and greatest distance from negative ideal ∗ Corresponding

author Email address: [email protected],[email protected] (Gautam Srivastava)

Preprint submitted to Journal of LATEX Templates

January 30, 2020

Journal Pre-proof

lP repro of

solution. Congestion is detected by using proportion of average packet service time over average packet inter-arrival time as congestion degree. Then, congestion is notified using implicit notification to save energy and reduce overhead.

To mitigate congestion along with maintaining fairness, an equal priority index is assigned to all data sources and when congestion occurs, rate adjustment

to optimal value based on priority value is used for congestion control. This

approach helps to diminish packet drops, maintain fairness and get better energy efficiency. Finally, we compare the performance of the proposed protocol

with that of existing protocols. Our simulation results show reduced average

delivery overhead, drop packet ratio, queue length and delay with increased average delivery ratio. Moreover, our protocol provides better energy efficiency and fairness when compared with the existing competing protocols.

Keywords: Wireless sensor networks; Transport layer protocols; Internet of Drones; sensor nodes; motes; TOPSIS; Energy Efficiency; Fairness; UAV

1. Introduction

Wireless Sensor Networks (WSNs) have constraints like limited energy and limited resources. In past few years, due to innovation in radio technologies and

5

rna

low-power circuit, WSNs have emerged and have achieved enormous popularity. A WSN is comprised of loads of self-organizing, lightweight sensor motes and being used for a wide range of monitoring applications. Each sensor mote is composed of one processing unit, a storage unit, a transceiver, limited battery power with multiple sensors on board. Due to small size and expensiveness of sensor motes, they have limited energy, limited processing power, limited memory and other resources. The mobile sink node shares the data with the sensor

Jou 10

nodes establish on its fixed or dynamically calculated navigation route. This technique decreases the energy consumption but indicates a substantial problem by restricting the mobile collector to flat navigable surfaces. To overwhelmed this drawback, the mobile sink node can be carried by an unmanned aerial vehi-

15

cles (UAV), commonly known by their everyday name, drones. Any protocol for

2

Journal Pre-proof

[23, 31, 4, 24].

lP repro of

WSNs should be designed by considering the limits of sensor motes cautiously

WSN-UAV are having enormous applications like military area monitoring,

smart home monitoring, air-pollution monitoring, target tracking and health20

care etc. The UAV network can undertake the part of mobile base stations when required, in order to regroup the sensor nodes located within the sensing

area, into WSN clusters. Additionally, smarter dimension systems driven by

UAVs embed additional processing at the point of procurement, taking valu-

able critical data that in the hands of the right people, can decode to improved 25

and quicker data-driven results. Wireless Sensor Network have emerged as re-

search areas with a great effect on practical application developments. WSNs are having enormous applications like military area monitoring, smart home

monitoring, air-pollution monitoring, target tracking and healthcare etc. Many WSN applications require reliable data transport for time-critical dynamic ap30

plications with no tolerance for data loss such as transfer of instructions from the sink to sensor motes in order to reprogram them to execute a task different

from the one they are performing currently or change the detection parameters

[7]. It is an important task to collect the data periodically from various sensor

35

rna

nodes for monitoring and recording the physical conditions of the environment.

The sensed data must be received and transmitted between the nodes in the network. In such cases sensor motes get in rather problematic situations, and creating connection with different sensor motes is not easy. Therefore, positive WSN deployment based on together the hardware characteristic and the network self-organization protocols which are used. Such applications have zero tolerance for data loss like if any part of instruction is dropped, then sensor

Jou

40

mote will not be able to interpret the instruction correctly. Further in WSN, data flow can be upstream (sensor-to-sink) and downstream (sink-to-sensor). In upstream data flow, all sensor motes send their sensed data to base station and in downstream flow, sink may send control information or query messages

45

to sensor motes. So, reliability is required in both upstream and downstream directions for efficient working of WSN. Due to limited power resources and fre3

Journal Pre-proof

lP repro of

quent node failures, providing reliability and quality of service in wireless sensor networks can be challenging [3, 27, 35].

The Internet of Drones (IoD) is a layered network control architecture which 50

has been designed predominantly for the coordination of access of UAVs (drones) to airspace that are controlled. Moreover, IoD provided services for navigating between areas referred to as nodes in a WSN. IoD can also provide more general services for a variety of drone applications. Some examples include • package delivery

55

• traffic surveillance • search and rescue

• emergency situation remote coverage

For applications, where sensor nodes send sensed data of a specific area to one or more base stations, traffic load is less in the senor network most of the 60

time. But, when an attention-grabbing event occurs, such as enemy intrusion,

the sensor motes will produce and send out a sudden massive amount of data. During these conditions, congestion occurs when a sensor mote accepts extra

rna

data than it can forward and redundant data has to be buffered. Thus, the restricted buffer space of a node is filled and results in loss of packets (new 65

or old). Due to this, energy and communication resources of sensor nodes are wasted and also packet loss results in reduction of the event detection reliability [25].

The problem of congestion in WSNs is quite different from traditional net-

Jou

works. Protocols used for wired networks like TCP are not suitable for WSNs. 70

Congestion in WSNs has following negative impact on performance like throughput, which is decreased drastically and per-packet energy consumption is increased [11, 43]. Hence, congestion in WSN must be addressed effectively to prolong the network lifetime and congestion control can save energy of nodes and reduce the delay by adjusting the transmitting rates, or by using alternative

75

resources [6, 26].

4

Journal Pre-proof

lP repro of

Currently, many schemes and algorithms have been proposed for congestion control and avoidance, as well as for reliable data transmission in WSNs. In the

great majority of congestion control algorithms, authors use either traffic control or resource control approach. By using traffic control, they choose to control the 80

rates with which sources inject packets in the networks and by using resource

control, they choose alternative resources to route congested traffic. On the other hand, reliable data transmission approaches usually run at the transport layer. Some of them are end-to-end and employ re-transmissions using ACK or NACKs [9]. 85

Energy efficiency is an important aspect of a WSN because it is repeatedly not possible to interchange or revitalize batteries of sensor nodes. Due to this constraint, it is very critical that a protocol be energy-efficient in order

to prolong the network lifetime and allow more data to be collected. In order to diminish the effects of congestion near the base station, an energy-efficient 90

protocol that can handle multiple simultaneous events without losing reliability is needed [44].

WSNs that include UAVs can be converted into applications that provides particular advantages such as: (1) On-site data gathering and examination (2)

95

rna

UAVs can provides ground WSN clustering method by electing the cluster heads

(3) UAVs can make available mapping information. It is also used to support ground WSN deployment. This provides the flexibility of flying UAVs to any place in the area of interest. In WSNs, multi-hop forwarding scheme is used to forward data due to limited communication range of a sensor node [21]. Therefore, when congestion occurs, sensor motes that are closer to sink will be able to send more data to sink as compared to sensor motes that are far-off from

Jou

100

the sink. So, this leads to unfairness towards far away data sources and reduces reliability. Consequently, fairness must be provided among all the sensor motes. The main focus in this paper is to determine the behavior of several network

parameters like traffic load, node density and their impact to congestion in

105

WSNs and present design and analysis of bidirectional reliable and rate adjustment based congestion control transport protocol that is different from existing 5

Journal Pre-proof

lP repro of

traditional protocols. Some other issues such as energy consumption and fairness problems and their relation to congestion are also examined.

The remaining of this paper is systematized as follows. Brief summary of ex110

isting transport layer protocols is defined in Section 2. In Section 3, bidirectional

reliable and congestion control transport protocol (BRCCTP) is proposed. The comparative analysis of both Asymmetric and Reliable Transport (ART) and

BRCCTP protocols has been discussed in Section 4. Lastly, in Section 5 paper is concluded.

115

2. Existing Transport Layer Protocols

Different transport layer protocols have been proposed to locate numerous

problems for example packet loss recovery, reliability, congestion control, energy efficiency, flow control, and heterogeneous application support in wireless sensor

networks. A brief detail of the associated protocols is explained in this section. 120

In [13], the authors proposed the congestion and communication channel

occupation in WSN by examine the states that results in congestion of the communication network by determining the subsequent nodes configuration con-

straints: (1) data packet generation rate, (2) transmission time intervals, and

125

rna

(3) transmitter output control level. From the graphics presented by the au-

thors shows that around is a saturation level, and higher than this level the connection is no longer linear. The degree of this level is start from 20 number of data packets per second to 60 number of data packets per second and if data transmission is higher than this degree, the communication channel will not transmit data successfully, and also delay will increase. In [30, 8], the authors proposed the adaptive cuckoo search based optimal

Jou

130

rate adjustment (ACSRO) for the congestion prevention and mitigation in WSN. The realization of the proposed protocol is calculated by using various performance parameters for example latency, throughput, congestion level, normalized packet loss, and normalized queue size. The position of the congestion is dy-

135

namic at the sensor node, which implies that the ACSRO performs the action

6

Journal Pre-proof

lP repro of

and removes congestion in the system. It uses the rate optimization approach

to control the congestion by decreasing the rate of the child nodes in the sensor network.

In [20, 28], the authors deal with congestion avoidance and interference reg140

ulation in WSN by developing the method named IACC (Interference-Aware

Congestion Control). This method provides maximum bandwidth size consump-

tion for each node through efficient rate control among the interfering nodes. IACC is based on two phases verification. In first phase, the overall bandwidth

capacity among every node and its parent node is projected and further forward145

ing projected dimensions to the base-station. In second phase, the scheduling

scheme is used to guarantee the fairness though mitigating congestion in the network.

In [2], the authors proposed dynamic rate control on source node in transport layer protocol for WSN. They established a dynamic source rate based adjust150

ment control algorithm that implements a cache-aware method where cache

management strategies are active to inform the comparative amount of packet

losses and set boundary limit for transmission window size. This rate control method accomplished 30% rise in cache consumption although sustaining a ra-

155

rna

tional portion of bandwidth distribution among child nodes which did not lower than ERCTP and did not improve than static DTC and DTSN + protocols.

In [10], the authors developed an energy efficient conditional multi-path and multi-copy routing technique. It consists of two novel data transmission schemes, viz. CM and CMrest along with consistent mathematical programming models. It also includes two legal dissimilarities in order to decrease the resolution periods for mathematical prototypes with profitable solvers. Authors

Jou

160

also define a heuristic method, that can implement together for the CM and CM

rest

. Both of these solution techniques, precise model through legal dif-

ferences and the heuristic technique, can be implemented to resolve CM and CMrest depending on the balance among quality and solution time in a specific

165

application.

In [12], The degree of congestion of the child node is calculated by determin7

Journal Pre-proof

lP repro of

ing buffer occupancy ratio and further sending this data to the current node.

Rate of transmission is adjusted by the current node to mitigate the difficulty

of congestion and increasing the throughput of network with multi-classification 170

gained through Support Vector Machines (SVMs). Simulations results of author

express that the finest tool for data classification is SVM. Moreover, results validate that the proposed scheme requires less energy consumption and increased throughput.

In [19], the authors proposed Reliable, Efficient, Fair and Interference-Aware 175

Congestion Control (REFIACC) protocol for WSNs. This protocol avoids the

interference and guarantees an increased fairness of bandwidth consumption by planning the communications among sensor nodes. Linear programming is

currently used to achieve optimal consumption proficiency of the determined

existing bandwidth. It has been implemented in TOSSIM simulator and related 180

with two existing works. In REFIACC congestion control is established on physical dimensions of radio links size.

In [29, 41], the authors proposed a Hierarchical Energy Efficient Reliable

Transport Protocol (HEERTP) for the data communication in WSNs. It is

transport layer protocol based on cluster-based selection that reduces energy consumption by decreasing repetitive data transportation over wireless sensor

rna

185

networks. It minimizes the broadcast of detected repetitive data with the direction of the base station. It makes an order of groups comprising of motes for data collection inside the network. One node in the network is selected as the cluster head (CH). It is accountable for gathering the data from the sensor 190

nodes. It forwards the gathered data to the CHs and then to the base station.

Jou

The CH is nominated on the foundation of remaining energy of the sensor motes and coordinate position. In [22, 1, 34], the authors defined congestion control method called packet

priority intimation (PPI). It includes PPI bit in every packet to highlight its

195

status. The key benefit of this method is to send highest priority packets with least latency. The congestion is mitigated and the data traffic is maintained in an effective way through low and high priority array. This technique is useful 8

Journal Pre-proof

lP repro of

not only in single health care, but also in numerous wireless sensor network applications. It is extended and improved from First Come First Serve (FCFS) 200

scheme and can increase the efficiency in relations to latency, packet drop rate, energy efficiency, and throughput.

In [36], the authors proposed protocol for multicast communication and retransmission based reliable error control to make it explicitly for data centric networks. It functions in three phases: first phase is communication setup in 205

which the multicast subtrees are formed and the suitable bloom filters are dis-

persed. Second phase is primary content distribution in which the producer

directs the full information and assembles collective feedback. Third phase is retrieval where single or multiple cycles of originating re-transmissions and gathering novel combined response, till entire subscribers have finished the transfer 210

positively.

In [39], the authors proposed an effective redundancy coding-based data communication method for wireless sensor networks (RECODAN), which assures re-

liable data communication in hop-by-hop manner over hybrid re-transmission. It makes use of selective Reed-Solomon coding to decrease the procedure of en215

coding in an intermediary node. To increase data reliability, it makes use of an

rna

adaptive codeword re-transmission. It also uses the Ornstein-Uhlenbeck (OU)

method to determine the packet receiving rate and reduce data redundancy in code delivery as well as increasing the network lifetime. Simulation experiments were conducted in MATLAB and outcomes demonstrate that RECODAN can 220

considerably increase the data communication reliability and reduce the delay

Jou

and energy consumption.

3. Bidirectional Reliable and Congestion Control Transport Protocol In this section, we first evaluate the functioning of an existing protocol Asym-

metric and Reliable Transport (ART) and from the literature studied it has been

225

found that only ART provides bidirectional reliability that is required for the application wherever a user node wants to re-task a cluster of sensor motes in

9

Journal Pre-proof

lP repro of

its locality by inserting program images into target nodes and where the loss of packets is not tolerated. Now we define the drawbacks of current protocol and afterwards we deliver the resolution to those drawbacks in our recommended 230

Bidirectional Reliable and Congestion Control Transport Protocol (BRCCTP) protocol for WSN.

3.1. Analysis of a Prevailing Transport Protocol

An ART mechanism for WSN is a transport protocol that delivers bidirec-

tional reliability for reliable event and query communication in wireless senor 235

networks. ART implement an event-driven data delivery model to transmit data

from sensors to the sink. Sensors transfer data only if they sense an event. If an event is sensed in the time of an update interval, a sensor reports the event

to the sink by transmitting consecutive messages. Authors uses the parameter

event-reporting frequency to modify how often a sensor node transfer event re240

ports when phenomenon is in its sensing range. On the other hand, the sink

makes use of a continuous data delivery model, by transporting periodic queries to the sensors. Likewise, ART uses query-reporting frequency, as a simulation parameter to sustain traffic load in downstream direction. It handles with only

245

rna

a subgroup of the huge number of sensor nodes accordingly letting a decrease

in complexity in cases of loss message recovery. To acclimatize to the essential characteristics of upstream (sensors-to-sink) and downstream (sink-to-sensors) traffic, authors proposed an asymmetric method, making use of ACK and NACK methods. Reliability necessities for both sink-to-sensor and sensor-to-sink data transfer that is addressed by existing protocol [14, 15, 42, 5]. It achieves these properties using energy aware classification of sensors and using NACK and

Jou

250

ACK based mechanisms. In ART authors proposed an energy-aware sensor classification algorithm to create a network topology that is consists of sensors in providing required level of bidirectional reliability. Firstly, authors proposed an energy-aware node classification algorithm, which is a weighted-greedy algo-

255

rithm to find a set of sensors, named as essential nodes. For this requirement, weight function is well-defined to signify the weight of a sensing area of a sensor 10

Journal Pre-proof

lP repro of

on the basis of its remaining energy. The proposed algorithm takes into account the residual battery power on the sensors to facilitate sensors running short on battery has a lesser chance of being essential. It provides a substantial flexibility 260

for controlling the existing energy in the network between all the sensors, therefore providing a larger network lifetime. The reliability of ART is constructed upon the classification of sensors as essential (E) nodes and non-essential (N) nodes. So as to choose the set of E-nodes, authors maintained a coverage set,

represented by C, to which E-nodes belong. Then it uses a greedy approach to 265

discover an approximating coverage set running in polynomial time. Though, ART mechanism is diverse in two aspects. Primary, it does not require a con-

nected set, subsequently N-nodes can still be used to forward the data packets. Secondary, it selects the coverage set of sensors to increase the benefit in terms of coverage, specifically, the major uncovered sensing area is covered with the 270

smallest number of sensors. Consequently, ART mechanism is used to cover the whole area with least number of sensors having more remaining energy. ART mechanism also defined an energy-aware greedy algorithm to locate a nearby optimal coverage set. In every phase, it chooses one node from the unselected

sensors which covers the largest area with maximum remaining energy level.

For this requirement, weight function is used to characterize the weight of a

rna

275

sensing area of a sensor based on its remaining energy. In addition, congestion control mechanism is incorporated to improve network performance by saving and balancing energy that leads to increased network lifetime. It is asymmetric in the way it deals with event (upstream) reliability and query (downstream) 280

reliability. Reliability is established in the sense that queries from the base sta-

Jou

tion are acknowledged by a lesser number of sensor nodes that can cover the whole sensing area and critical event data is received by base station. It classifies nodes into essential nodes (E-nodes) and non-essential nodes to

ensure reliability. Essential nodes are selected in a way that they cover the

285

entire sensing region. So, selection of essential nodes ensures that event is identified by as a minimum one essential sensor node and query of base station affects entire sensible terrain. A periodic weighted greedy mechanism is used 11

Journal Pre-proof

lP repro of

at sink node to select essential nodes. This mechanism selects nodes based on their residual energy and their sensing region from uncovered area. Each time 290

essential nodes are updated, nodes with higher energy levels are selected so that energy consumption is fair among all sensors. Set of essential nodes is updated

locally and globally in the network. When an essential node fails, then new

essential nodes are selected locally and global update of all essential nodes is done after predetermined update intervals. 295

ART is mainly comprised of three different key roles: reliable query transfer, reliable event transfer, and distributed congestion control. Reliability of event

transfer is directed from E-nodes to sink node provided by using ACK mechanism. Whenever a new event occurs, E-node sends the event alarm message

having Event Notification (EN) bit set. When sink receives this alarm message 300

with EN bit set, it sends the ACK for that message. If E-nodes do not receive

ACK within certain time interval, then E-nodes re-transmit the event alarm message.

Functionality of query reliability is well-defined to be accomplished when each query of the sink is acknowledged by those sensors that cover the complete 305

sensible terrain inside the region of deployment, which is essential and adequate

rna

for sink-to-sensor route reliability. Reliability of query transfer that is from sinkto-sensors is done by means of negative acknowledgments (NACK). Queries are

sent in sequence number by the sink, so any query loss can be detected by essential nodes using sequence numbers. Essential nodes send NACK message 310

if any out of order query is received. Though, lost query messages can be distinguished when E-Nodes obtain a new query message. This might affect in

Jou

two problems. Initial, damage of the last query message cannot be perceived. Reflect the last message qk with sequence number k is lost. E-Node might not deal with the lost message since there is no successive query. Next, the

315

query transmission frequency might be very low such that lost queries cannot be recovered before timeout mechanism. To detect the loss of final query message and other losses before timeout when query frequency is very low, a Poll/Final (P/F) bit is used. When query is last query or next query will be sent after 12

Journal Pre-proof

320

lP repro of

a long time, P/F bit is set. Essential nodes send ACK for query with P/F

bit set to indicate successful reception of query. If ACK is not received, Sink re-transmits the query until ACK is not received.

In ART authors uses Congestion Timeout (CTO) for congestion detection,

that is dynamically determined on the basis of Round Trip Time (RTT) like adaptive retransmission timeout in TCP. Suppose that all sensors have an ini325

tial RTT that is the interval among the time after the message is sent and the time when the ACK of the message is acknowledged at the sender. Then,

RTT is calculated dynamically on the basis of latest RTT by means of time

stamp field. Sensors emphasize the time information in their messages sent back through ACKs by the sink. Therefore, E-nodes can control the RTT by 330

relating the time stamp acknowledged by ACK. Congestion control in ART is

done in a distributed manner by using E-nodes. Congestion detection is done on the basis of reception of ACK of event message. After classifying sensors as

essential and non-essential sensors, the primary purpose of asymmetric acknowledgement (ACK) message and negative acknowledgement (NACK) message is 335

to provide end-to-end reliable communications and signaling between E-nodes

and the sink node. For event reliability, ART uses lightly-loaded ACK mecha-

rna

nism among the E-Nodes and the sink node. Though, using an ACK mechanism

that needs acknowledgement for every message may result ineffective usage of battery power, which is measured to be a very scarce resource in WSNs. In 340

ART, congestion control is managed by the E-nodes in a distributed way. It is positioned on monitoring the ACK packets of event reports. If ACK message is not received by essential node within timer, E-node sends Congestion Alarm

Jou

(CA) message to neighbouring N-nodes, N-nodes that receive CA message will stop sending their data to sink node. Then Event message is re-transmitted, if

345

ACK is still not received before timeout period then CA message is again sent by increasing hop-count value. Each node that receives CA message stops sending data and decreases hop-count. Congestion Alarm message is forwarded till hop-count becomes 0. When ACK is acknowledged, E-node sends Congestion Safe (CS) message having same hop-count value that is of last congestion alarm 13

Journal Pre-proof

message directed by essential node. All nodes that receive CS message resume

lP repro of

350

their normal operation. Thus, regulation of excessive traffic for congestion control is done by reducing the number of sensors that send their information to sink node [37].

3.2. Drawbacks of Existing Protocol 355

We have formerly explained the working of an existing protocol in preceding part. In this part, we discuss major drawbacks of competing existing protocol, which are enhanced by proposed protocol.

3.2.1. NACK based Query Reliability Problem

NACK centered methods suffer from all-packet-lost and last-segment-lost 360

difficulties since the reception node does not have any method to identify the occurrence of some missing segments except some segment that reach the node

which has a sequence number greater than estimated [33]. Subsequently ART

protocol is founded on NACKs; there can be difficulties of all-packet-lost and

last-segment-lost. ART protocol does not address the query reliability problem 365

because reliability is ensured by using NACK message for missing sequenced

query. To indicate last query, Poll/Final bit is used and an ACK is expected

rna

for the last query. From the start of transmitting query from the sink node to the essential node, working condition like sensor node is either switched off or

temporarily shut down and inputting process is not verified. If an E-node is 370

temporarily switched off while receiving queries from sink, it will not be able to send ACK for query with P/F bit set and after specified time interval, sink node will gain send query until the ACK message is not received. This affects

Jou

in more energy consumption of sensor nodes and increases delay in the network. 3.2.2. Congestion Mitigation Problem

375

ART protocol does not address the congestion mitigation problem efficiently

because congestion control method used by ART uses Congestion Alarm and Congestion Safe signaling messages to handle congestion. Reception of ACK message of event reporting message is used as congestion detection. If ACK 14

Journal Pre-proof

380

lP repro of

message is not received for an event reporting message within a timer greater than round trip time, then E-node sends Congestion Alarm (CA) message to

neighbor non-essential nodes. Consequent to reception of this Congestion Alarm message, those immediate nodes pause sending messages. After certain fixed

time interval, if the congestion is still no more alleviated, then essential node will resend the congestion alarm message with increased hop-count. This con385

gestion alarm message is forwarded till hop count becomes 0. As soon as the ACK message is acknowledged, it sends a Congestion Safe (CS) message to the

neighbor non-essential nodes with latest hop-count value and those nodes start

sending messages. The present method of congestion control does not use rate

control system. The usage of CA and CS messages reduces the average data 390

transfer ratio in case of heavy traffic and for more number of sensor motes. The

present congestion control method similarly presents delay in the network as no non-essential node be able to deliver messages that have received CA messages. Similarly, the usage of external messages to inform congestion dissipate network

energy and extra memory is required to store data values. Therefore, we require 395

a congestion control method that does not use external control messages rather than rate control mechanism to optimize values.

rna

3.2.3. Bandwidth Allocation Problem

Existing competing protocol does not address the issues of fairness among sensor nodes in terms of bandwidth allocation. In ART, packets of each source 400

node are routed independently and can follow various available routes to the sink. Hence due to multi-hop forwarding scheme, nodes nearer to sink will

Jou

achieve more delivery ratio when compared to nodes that are far away from sink. Thus, unfairness towards the senor nodes that are distant from sink in ART protocol must be prevented so that all source nodes that share the same

405

downstream traffic jam would have equal network bandwidth allocation.

15

lP repro of

Journal Pre-proof

Table 1: End-to-End Delay and Drop Packet Ratio of existing protocol.

No. of sensor nodes

End-to-End Delay (secs.)

Drop Packet Ratio

50

6.62

0.23

7.85

0.26

8.39

0.31

11.13

0.39

13.52

0.49

100 150 200 250

3.2.4. End-to-End delay and Drop Packet Problem

ART is simulated on mobile sensors having a maximum speed of 20 m/s. ART works good under lightly loaded traffic; having event reporting frequency 1 secs. and query reporting frequency 10 secs. For this, drop packets is below 410

20% and end-to-end delay is 1.5-6.5 secs. In the following situations, drop packet

ratio, latency and energy consumption of ART are increased in the network like when we increase the number of sensor nodes in the network and when packet

load increases with the increase in number of events and queries per second. End-to-End delay and drop packet ratios in four scenarios having heavily loaded 415

traffic with event reporting frequency 0.1 secs. and query reporting frequency

rna

2 secs. are shown in the Table 1.

ART does not address this issue and needs an improvement in end-to-end delay, drop packet ratio and energy consumption for increased number of nodes. ART has not any accurate rate control method. Therefore, it depends on the 420

nodes to manage their own data transmission rates.

Jou

3.3. Proposed Protocol

In the proposed solution, we use optimal path selection for transmission,

priority based fair bandwidth allocation and rate adjustment-based congestion control to increase network throughput [32]. The proposed method selects the

425

optimal paths to transmit the sensed data and guarantees reliable data transmission between sensor nodes and the sink node. In this paper, we use a optimal

16

Journal Pre-proof

lP repro of

path selection method to remove threats to the path to deliver both reliable

data transmission and over-all energy conservation. In the proposed method, the routing path is created by considering the energy required for data transmis430

sion, loss rate and delay. The optimal path in the sense is the path with lowest energy and hop. The emphasis is to decrease the path breaking and to surge the network lifetime. First, essential nodes are selected based on their sensing region and remaining energy. Selected essential nodes work as coverage set of

entire sensing field. Then we use Technique for Order Preference by Similarity 435

to Ideal Solution (TOPSIS) [40] approach to select optimal transmitting path

from the various alternative paths between any essential node and sink node.

Evaluation of various alternative paths is performed on the basis of metrics like remaining energy, and loss rate and delay. Then the optimal path is selected.

TOPSIS technique is a standard method to multiple criteria decision making 440

(MCDM) and has been broadly used in the existing methods. In real-world operations, we need to choose one output, which will fulfill the diverse objectives

to some range. Such a resolution is termed as finest compact solution. TOPSIS technique has the capability to recognize the finest alternate from a restricted

set of choices rapidly. It built upon the idea that the selected alternate must have the minimum distance from the optimistic perfect resolution and the ex-

rna

445

treme from the adverse utmost solution. TOPSIS can integrate relative weights of standard significance. To check the working condition of a node in order to increase query reliability, an initial control message is sent by sink to all nodes before sending queries. Then to control congestion, we use priority based rate 450

adjustment approach that also ensures fairness in terms of bandwidth allocation.

Jou

3.3.1. Optimal Path Selection using TOPSIS Approach After selecting essential nodes, each essential node uses TOPSIS approach

to select optimal path to sink when data is to be transmitted. Let Pe,d represent the routes from essential node e to sink node d, where

455

k k Pe,d is the kth route. In case node j is on route Pe,d , then represent it as j ∈

k Pe,d . Infer Psk0 sn is formed by s0 → s1 → s2 → . . . → sn . Then the evaluation

17

Journal Pre-proof

lP repro of

of route Psk0 sn is done on the basis of following parameters:

1. Delivery success rate: Let P LRj,d be the Packet Loss Rate on single-hop

connection between node j and its nearby sink node d. Next the Delivery Success Rate DSRks0 sn of Psk0 sn is calculated as given in Eq. (1): DSRks0 sn = 1 −

n−1 Y

m=0

(1 − P LRsm sm+1 )

(1)

2. Delay: Let Dj,d be the Delay of single-hop connection among node j and

its nearby sink node d. Later delay Dsk0 sn of Psk0 sn can be calculated as the aggregate of delay among all the nearby nodes on it as given in Eq. (2):

Dsk0 sn

=

n−1 X

Dsm sm+1

(2)

m=0

3. Hop count: Hop Count (HC ) has also influence while selecting optimal route. Value of hop count is given in Eq. (3):

HC ks0 sn = N f or Psk0 sn : s0 → s1 → s2 → . . . → sn

(3)

4. Energy: Transmitting possibility and residual lifetime of wireless sensor networks directly depends on residual energy of nodes on route P ks0 sn . If

rna

any node on route Psk0 sn dies out as a result of drained energy, then route

Psk0 sn will be unsuccessful to finish its communication. Let RE sm be the Residual Energy of node sm . Then, residual energy RE ks0 sn of route Psk0 sn depends on the minimal residual power of any node on it. Therefore, RE ks0 sn can be calculated as given in Eq. (4):

Jou

RE ks0 sn = min{RE sm |m = 0, 1 . . . , n, s ∈ Psk0 sn }

Let TPsk s

0 n

(4)

is the calculated outcome of route Psk0 sn while TOPSIS is imple-

mented on entire above metrics. Then TPsk s is as shown in Eq. (5): 0 n

TPsk s = F (DSRks0 sn , Dsk0 sn , HC ks0 sn , RE ks0 sn ) 0 n

(5)

F represents the evaluating function of TOPSIS having four parameters delivery success rate, delay, hop-count and residual energy and gives the evaluated value 18

Journal Pre-proof

TPsk s . Among all the alternatives, the one with maximum value of TPsk s is

lP repro of

460

0 n

0 n

the considered the optimal one.

3.3.2. TOPSIS evaluation mechanism

Following steps are followed for TOPSIS evaluation: i. A decision matrix M = [mi,j ]P N s 465

tributes, i.e.

DSRks0 sn ,

0 sn ×4

k 1/Ds0 sn ,

is constructed to optimize four at-

1/HC ks0 sn , RE ks0 sn . Every Row of M

correlates to a single alternate route Psk0 sn where P N s0 sn is the number of the alternate routes among node s0 and node sn .

ii. Then, normalize the matrix M and obtain a new matrix M 0 = [m0 i,j ]P N s Matrix can be normalized as given in Eq. (6): sX m0 i,j = mi,j / m2i,j

0 sn

×4 ,

(6)

j

iii. Next, assign a weight to each attribute according to the weight age of im-

portance of each attribute in decision making and multiply each column

of matrix M 0 with its assigned weight wj to build the weighted controlled selection matrix. Then weighted controlled selection matrix R is given in Eq. (7):

(7)

rna

R = [ri,j ]P N s0 sn ×4

Where ri,j = wj × m0 i,j

470

  iv. Determine the ideal solution R+ = rj+ 1×4 , rj+ = maxri,j , i = 1, 2, . . .   P N s0 sN and negative ideal solution R− = rj− 1×4 , rj− = minri,j , i = 1, 2, . . . P N s0 sN .

Where R+ specify the best desirable alternate and R− the minimum desir-

Jou

able alternate.

v. Determine the difference between every alternate route from optimistic best resolution and undesirable perfect solution. The difference of any alternate route from positive best resolution is calculated as given in Eq. (8): v u 4 uX 2 + ri,j − rj+ di = t j=1

19

(8)

Journal Pre-proof

lP repro of

The difference of any alternate path from undesirable perfect resolution is calculated as given in Eq. (9):

v u 4 uX 2 t d− = ri,j − rj− i

(9)

j=1

vi. Determine the relative nearness of each alternate path Psk0 sn relating to ideal solution as shown in Eq. (10):

TPsk s = 0 n

d+ i + d− i + di

(10)

vii. Rank the order of alternative paths according to value of TPsk s and a path 0 n

475

Psk0 sn with highest value of TPsk s is selected as optimal path. 0 n

Two packets are used for selecting optimal path, i.e. PREQ and PREP.

Let an essential node e broadcasts a PREQ packet to find a path to sink

node d when a packet is to be transmitted and there is no existing path between e and d. PREQ packet contains fields for TPe,d of current path P ke,d , minimum k 480

energy, delay, and loss rate record.

When a node receives PREQ packet, it will receive link information from PREQ and update reverse routing table if:

rna

a) There is no existing reverse path.

b) Sequence no. of PREQ packet is greater than previous PREQ packet. 485

c) TPe,d is greater than stored in reverse routing table. k Moreover, it broadcasts the updated PREQ packet to find out the remaining path to destination.

Jou

When PREQ packet reaches sink node d, it replies with PREP packet. When

an intermediate node receives PREP packet, it calculates TPe,d based on ink

490

formation passed in PREP packet, selects the optimum route and then sends updated PREP packet in reverse direction. Essential node e receives all PREP packets and selects the optimal path

based on TPe,d k value.

20

Journal Pre-proof

495

lP repro of

After selecting an optimal path, data is transmitted along that path. Further, path selection is done periodically to remove drained nodes and corrupt routes, which need to be informed in timely manner. Fresh paths might direct

communications to improved routes in direction to extend the life-cycle and increase the throughput.

3.3.3. Reliable Event Transfer 500

After selection of optimal path, Each E-node sends the event data on selected optimal path, which increases the average delivery rate and network lifetime.

Algorithm 1 Reliable Event Packet Data Transfer from Sensor Node to Sink Input: Specified a network of sensor as G. Any Essential-Node is directing an Event-Alarm message pEA i ; set timeout period tout ;

1. Essential-Node: If pi = pEA i , fixed the Event-Notification bit, and check if optimal path is selected. If no optimal path selection is done before,

initiate the path selection based on TOPSIS approach. Send message to the sink on optimal path, begin clock and store pEA till an ACK is granted. i Else, forward message to sink node and remove it from memory.

2. Sink-Node: Deliver a ACK on reverse optimal path if it gets a pEA i .

rna

3. Essential-Node: If no ACK is granted within timer for pEA , then transi mit again pEA and reset clock. i

3.3.4. Solution to NACK based query reliability problem In our proposed protocol query reliability is increased by using optimal path

Jou

for query transfer. Queries are sent on selected optimal paths between essential

505

nodes and sink. If no optimal path exists, then sink initiates the path selection to corresponding essential node and selects the optimal path. Next, sink sends the initial query control message to check the working condition of nodes and waits for ACK from essential nodes. If ACK is not received from an essential node, then sink retransmits control message after time-out period. After receiving

21

Journal Pre-proof

lP repro of

Algorithm 2 Reliable Query Transfer Input: Specified a network of sensor as G; Sink-Node consists of number of queries Q = [q1 , . . . qi , qi+1 , . . . ]

1. Sink-Node: Check if optimal path exists. If not, select one based on TOPSIS approach.

2. Send initial query control message to all the Essential-nodes and wait for an ACK from each Essential-node.

3. If no ACK is acknowledged from an Essential-nodes, Sink will again send query control message after time-out period.

Once all the ACKs are received from the Essential-nodes, start regular process of sending the queries in increasing order: 1, 2, . . . i.

4. Essential-Node: Get the information for qi . Verify the order of sequence number for failure finding.

5. Essential-Node: If a difference is found in the sequence numbers, deliver a NACK to recover the missing communication.

6. Sink-Node: Resend qi−1 if a NACK is acknowledged.

7. Essential-Node: While the queries are acknowledged in order, verify if P/F bit is fixed, and then deliver an ACK to the sink node.

rna

8. Sink-Node: Resend the communication with P/F bit fixed till the ACK is acknowledged.

510

ACKs from all essential nodes, sink will send queries. Our proposed protocol is enhanced when compared to traditional protocol since our proposed protocol

Jou

uses ACK/NACK based scheme for achieving query reliability instead of NACK based scheme used by existing traditional protocol. 3.3.5. Solution to congestion alarm and congestion safe based congestion miti-

515

gation problem

In our proposed solution after transmission of data on optimal path, and in

order to reduce congestion, we measure congestion by means of average packet

22

Journal Pre-proof

lP repro of

inter-arrival time and average packet service time. Here, packet inter-arrival time is the average of interval period between the arrival of two packets either

from source traffic or from routed traffic and the average packet service inter-

val is the average time between a packet arrival at MAC layer and successful transmission of final bit of packet. Many times, in wireless sensor networks packets are routed around the congested area and scatter the excessive number

of packets among the multiple paths. It is vastly likely that the congestion is occurred by burst traffic. For example, the sensor nodes will produce transient

bursts of traffic, when the unexpected events arise. When burst happens close

to node v, the queue length of this node might be low, nevertheless it is clear

that node v is not a suitable destination for the source nodes to send the packet,

as a lot of packets will arrive v due to the burst nearby it and the queue length field cannot differentiate this problem. To solve this problem, we describe the

congestion degree field. Hence, Congestion Degree (cd) is calculated as the per-

centage of average packet service time over average packet inter-arrival time in a quantified interval period for every sensor mote k as shown in Eq. (11): cd(k) = tservice (k)/tinter

arrival (k)

(11)

rna

The calculated value of congestion degree specifies the level of congestion of the

network. Once the congestion is sensed, it is reported using implicit signaling. On reception of congestion notification signal, the transmission rate is controlled so as to decrease the congestion. Congestion degree can be calculated on each node packet-by-packet basis. It represents congestion time of every sensor node. Moreover, it effectively points out at both node-level and link-level congestion.

Jou

To update the congestion degree, packet inter-arrival time and packet service time are calculated by exponential weighted moving average (EWMA) algorithm [16]. Here, tinter

arrival (k)

is updated periodically whenever N new packets

arrives as shown in Eq. (12): tinter

arrival (k)

= (1 − αia ) ∗ tinter

23

arrival (k)

+ αia ∗ TN /N

(12)

Journal Pre-proof

lP repro of

where 0 < αia < 1 is a constant, TN is the time over which N packets arrive

and tservice (k) is updated whenever a packet is forwarded as shown in Eq. (13): tservice (k) = (1 − αs ) ∗ tservice (k) + αs ∗ t0service (k)

(13)

where 0 < αs < 1 is a constant, t0service (k) is the service time of packet communicated.

When congestion degree cd(k) is greater than 1, service time will be larger

than packet inter-arrival time, and then buffer overflow occurs. Otherwise, 520

when service time is less than packet inter-arrival time, congestion degree will

be less than 1, congestion fades away. We use implicit congestion notification to reduce additional control packets. Each sensor mote piggybacks its congestion degree in packet header of outgoing packets. Due to broadcast nature of wireless

channel, this information is heard by all the child motes. Finally, the scheduling 525

rate is increased or decreased on the basis of congestion degree. Our proposed solution is better than existing solution because our scheme uses rate adjustment

based congestion control mechanism that has higher delivery ratio and reduced delay and energy consumption instead of congestion alarm and congestion safe

530

rna

messages used by existing protocol.

3.3.6. Solution to bandwidth allocation problem In order to ensure fair bandwidth allocation, all essential nodes are assigned an equal priority index 2 and all non-essential nodes are assigned with priority index 1, so that essential nodes are having higher priority than non-essential nodes. Thus, all essential nodes with equal priority index have equivalent bandwidth [38]. A global priority index of each node is calculated as the total of

Jou

535

global priority of entire child nodes and priority of itself. If there are no child nodes, global priority is equal to priority of node itself. Global Priority (GP ) of any sensor node k can be computed as shown in Eq.

(14):

GP (k) =

X

GP (child node(k)) + priority(k)

24

(14)

Journal Pre-proof

lP repro of

Each packet includes its global priority in packet header. When congestion occurs, scheduling rate of nodes is reduced based on global priority index to 540

mitigate congestion, which leads to fairness. Our protocol provides better solu-

tion for bandwidth allocation problem by assigning the equal priority to essential and non-essential nodes, which ensures fairness. 3.3.7. Steps of Proposed Method

1. Select Essential nodes based on residual energy and sensing region and 545

assign priority equal to priority index to each essential node.

2. Select optimal path between essential nodes and sink node using TOPSIS approach.

3. Transmit queries and event on selected optimal path.

4. Piggyback congestion degree and global priority index in each forwarded 550

packet header.

5. If congestion degree is greater than previous congestion degree, this means

that congestion is increased, and then child node reduce the scheduling rate based on global priority of parent node and itself as shown in Eq. (15):

rna

Rsch(i) = Rsch(i) ∗ GP (i)/GP (pi)

(15)

6. If congestion degree is less than 1 and lesser than previous congestion degree, then scheduling rate is increased to utilize bandwidth as shown in Eq. (16):

Rsch(i) = Rsch(i)/cd(pi).

(16)

Jou

Update coverage set periodically.

4. Performance Analysis In this section, we have explained the performance investigation of recom-

mended BRCCTP protocol and the traditional protocol. We have implemented

555

packet oriented simulation. The current method works by altering the technique

25

Journal Pre-proof

lP repro of

a prevailing method works at the sensor nodes and sink node. We have com-

bined a few functionalities equally at the sink node and sensor nodes to enhance the algorithm.

4.1. Performance Metrics 560

Comparison has been made with recommended BRCCTP protocol with a prevailing protocol on the foundation of seven metrics. These metrics are described as follows.

4.1.1. Average delivery ratio

It describes the capability of the protocol to effectively allocate the data

packets to last destination inside assured interval. It is the proportion of sum of messages a destination node received to the number of messages a source node injects into the network. We have computed the average of the delivery ratio

of number of simulations to acquire the average delivery ratio. Mathematically, average delivery ratio is given by: Average Delivery Ratio =

565

rna

4.1.2. End-to-End Delay

Number of packets received by destination node Number of packets sent by source node

It represents the time reserved by a packet to reach the destination node from source node. Specifically, the time change among the time when the packet arrives at the transport unit of the receiver and the time when the packet was transmitted by the transport unit of the sender. 4.1.3. Average Delivery Overhead

Average delivery overhead is measured as the sum of messages sent each

Jou

570

data message acknowledged by a destination node. This parameter inspects the transmission cost to accomplish consistent transfer of packets over the network. We average the delivery overhead of some simulation results to find the average delivery overhead.

26

Journal Pre-proof

4.1.4. Drop Packet Ratio

lP repro of

575

Drop Packet Ratio is determined as the ratio of the number of packets drop

to the number of packets generated by data sources. A protocol with less drop packet ratio is more reliable. Mathematically drop packet ratio is given by: Drop Packet Ratio = 4.1.5. Queue Length

Number of Drop Packets Number of sent packets

Queue Length determines the size of queue at each node. Given method

depends on the current node’s message queue holding. When the qualified number of queue up packets exceeds a definite pre-mentioned level (e.g. 75%), 580

the node is measured to be congested, and will continue to alert its peers of that

situation. Therefore, to control congestion, every node identifies congestion by observing its queue occupancy. The congested node then basically piggybacks a congestion degree together with its data, therefore winning benefit of the

transmission environment of the wireless medium to transmit its congestion 585

degree to its neighbors. 4.1.6. Energy Efficiency

rna

It is described as the ratio of the summation of residual energy of nodes to the summation of preliminary energy of nodes. Mathematically, Energy Efficiency =

Sum of residual energy of nodes Sum of initial energy of nodes

A network with high energy efficiency would have high network lifetime as compared to the one with less energy efficiency. So, protocol must achieve high

Jou

energy efficiency.

590

4.1.7. Fairness Index

To measure fairness, we use popular fairness Index that is Jain’s Fairness

Index [18] which is calculated as Pn 2 ( i=1 ri ) Fairness Index (φ) = Pn 2 n ( i=1 ri ) 27

Journal Pre-proof

lP repro of

Where n is the number of sensors in the network and ri is the average rate

of packets delivered from the ith sensor. Fairness index lies between 0 and 1.

If average percentage of packets transported from each node is same, fairness index would be 1. 595

4.2. Simulation Setup

Proposed BRCCTP protocol and the traditional protocol are tested using

NS2 simulator [17]. For Simulations, sensors are placed randomly in a square area. Each sensor is having a fixed sensing range r. Two sensor nodes can

communicate with each other if they are in communication range of each other. 600

A sensing field of 300 × 300 m2 is required for simulations. We simulated the network with sensor nodes 50, 100, 150, 200 and 250 so that we are able to eval-

uate the performance of our protocol from very sparse to large dense networks. Used figure of sensors must be adequate to bind the sensing area for specified

metrics. Wireless sensor nodes are taking communication range of 90m and 605

sensing range of 60m are used. Initial energy of sensors is 3 Joules (J). In these experiments, an action is characterized to identify the phenomenon node in the recognizing area of a sensor.

rna

A data delivery model is based on event-driven and is used to transmit the

data between the sensor nodes and sink node. When an event is detected, 610

sensors send data. If an event occurs during the update interval, then sensor nodes report event to sink node by transmitting successive messages. Event reporting frequency metric is used to modify how often a sensor node directs event reports to sink after phenomenon occurs in its sensing area. Sink is in the

Jou

center of the sensing field. For routing, AODV protocol is used and for MAC, 615

CSMA/CA protocol is used. Table 2 lists the parameters for the simulation. Let us consider scenario of 50 sensor nodes and a sink node 0 as shown in

Fig. 1.

Out of these 50 nodes, essential nodes are selected based on their residual

energy and sensing region. Nodes with grey color filled indicate the essential

620

nodes and dotted circles are used to indicate the sensing region boundary of each 28

lP repro of

Journal Pre-proof

Table 2: Parameters for Simulation.

Sensing field area

300 × 300 m2

No. of sensor motes

50, 100, 150, 200, 250

Time of Simulation

150 secs.

Packet length

100 bytes

Interface queue length

50

Sensor node radio range

90 m

Sensor node sensing range

60 m

Idle power

13 mW

24 mW

Receive power

13 mW

rna

Transmit power

Jou

Figure 1: TOPSIS based 50-node Network Topology.

essential node and remaining nodes with no color filled indicate the non-essential nodes. Union of sensing region of essential nodes cover the entire sensing area. Now each essential node selects an optimal path between itself and sink node by implementing TOPSIS method out of various alternative paths based on

625

the following attributes: hop count, delay, delivery success rate, and residual

29

lP repro of

Journal Pre-proof

Table 3: Comparison of Average Delivery Ratio for Diverse Traffic Loads.

No. of ART

BRCCTP

ART

BRCCTP

ART

BRCCTP

Nodes fe=0.1 secs. fe=0.1 secs. fe=0.5 secs. fe=0.5 secs. fe=1 secs. fe=1 secs. fq=2 secs.

fq=2 secs.

fe=0.5 secs. fe=0.5 secs. fe=1 secs. fe=1 secs.

50

0.768

0.796

0.797

0.828

0.878

0.883

100

0.741

0.761

0.733

0.791

0.846

0.864

150

0.686

0.722

0.714

0.761

0.879

0.871

200

0.604

0.681

0.692

0.746

0.835

0.862

250

0.507

0.579

0.646

0.696

0.802

0.838

energy. Selected path from each essential node is indicated with red arrows and any node that is on optimal path from essential node to sink node is colored with red boundary.

4.3. Simulation Outcomes 630

Simulation has been carried out for ART protocol and the proposed BRCCTP protocol using NS-2 simulator. The network is visualized using NAM

(Network Animator). To do pursuance calculation of ART and BRCCTP pro-

rna

tocol, seven metrics are considered; these are average delivery ratio, end-to-end delay, average delivery overhead, drop packet ratio, queue length, energy effi635

ciency and fairness index.

4.3.1. Average delivery ratio

Table 3 shows result of ART and proposed BRCCTP in the aspect of average

Jou

delivery ratio for various network size and traffic loads. We have simulated three different traffic loads by variable event-reporting frequency (fe ) and query

640

reporting frequency (fq ): heavy: fe = 0.1 secs. and fq = 2 secs., moderate: fe = 0.5 secs. and fq = 5 secs., light: fe = 1 secs. and fq = 10 secs. Every

test is executed ten times and the outcomes presented are an average of these execution.

30

lP repro of

Journal Pre-proof

Jou

rna

Figure 2: Comparing Average Delivery Ratio for Diverse Traffic Loads.

Figure 3: Comparing End-to-End Delay for Diverse Traffic Loads.

As we observe in Fig. 2, our procedure aside from resolving the difficulties

645

with ART accomplishes considerable improvement over the prevailing protocol. When the size of network increases, the total number of packets acknowledged

31

lP repro of

Journal Pre-proof

Table 4: Comparison of End-to-End Delay for Diverse Traffic Loads.

No. of ART

BRCCTP

ART

BRCCTP

ART

Nodes fe=0.1 secs. fe=0.1 secs. fe=0.5 secs. fe=0.5 secs. fe=1 secs.

BRCCTP

fe=1 secs.

fq=2 secs.

fq=2 secs.

fq=5 secs.

fq=5 secs.

fq=10 secs. fq=10 secs.

50

6.621

5.901

2.483

2.082

1.594

1.432

100

7.854

6.892

4.124

3.447

1.985

1.761

150

8.392

7.287

7.891

6.218

2.692

2.234

200

11.131

9.766

10.014

8.183

4.236

3.653

250

13.522

12.092

12.431

10.786

6.298

5.202

at the receiving node diverges. Higher amount of data packets is acknowledged

by receiving node just in case of proposed BRCCTP protocol. The reason of this is that our BRCCTP protocol uses rate adjustment to optimum rate for 650

congestion control. The prevailing protocol Congestion Alarm and Congestion Safe based congestion control method decreases the communication ratio to zero

after a node’s buffer touches the threshold; because of this not any packets can be sent to that node. That decreases delivery ratio for ART protocol. Proposed

655

rna

protocol accomplishes greater average delivery ratio. 4.3.2. End-to-End Delay

End-to-end delay indicates how much interval of time is used by packet to reach the destination. The comparison results of end-to-end delay for existing and projected protocol for three diverse traffic loads are shown in Fig. 3. Table 4 shows end-to-end delay for existing and proposed protocol for three different traffic loads.

Jou

660

It is inferred from Fig. 3 that the BRCCTP protocol has less end-to-end de-

lay than the existing protocol. This improvement in end-to-end delay is because delay of path is used as a selection parameter in TOPSIS approach while choosing optimal path and the one with minimum delay and hop-count is selected.

665

While in ART protocol, packets are independently routed and can follow any

32

Journal Pre-proof

lP repro of

available path. Consequently, delay in packets transmitted on optimal path is

less as compared to existing protocol. Delay of proposed protocol is also reduced

due to congestion control using rate adjustment to optimal value. Body-area networks can gather information about a person’s health, fitness, and energy 670

expenditure. In health care applications the confidentiality and legitimacy of user data has prime importance. Particularly due to the addition of sensor net-

works, with IoT, the user authentication becomes more challenging. End-to-end

delay of proposed protocol is reduced even when node density is equal to 250 and having high traffic load when compared to ART protocol. 675

4.3.3. Average Delivery Overhead

Here, we find transmission rate for reliability in the two systems in numerous

channel environments with a 3-hop network. Transmission rate is determined as the average amount of communication for each data packet. It is known as

average delivery overhead. Our proposed BRCCTP protocol also has reduced 680

communication overhead as compare to ART protocol because our protocol requires less number of per data packet transmission as compared to existing

protocol. Table 5 displays the result of ART and BRCCTP protocols in relation to average delivery overhead for diverse network size and traffic loads. We have

685

rna

simulated three different traffic loads by variable event-reporting frequency (fe ) and query reporting frequency (fq ): heavy: fe = 0.1 secs. and fq = 2 secs.,

moderate: fe = 0.5 secs. and fq = 5 secs., light: fe = 1 secs. and fq = 10 secs. Every test is executed ten times and the outcomes presented are an average of these execution. As we observe in Fig. 4, the rate for BRCCTP is constantly

Jou

lesser than ART protocol in relation to average delivery overhead for different 690

network size and traffic loads. Hence, the proposed protocol chooses the optimal path for data transfer using TOPSIS approach based on various parameters including delivery success rate of the path that provide reliable delivery of data packets to the destination with less number of packet drops.

33

lP repro of

Journal Pre-proof

Table 5: Comparison of Average Delivery Overhead for Diverse Traffic Loads.

No. of ART

BRCCTP

ART

BRCCTP

ART

Nodes fe=0.1 secs. fe=0.1 secs. fe=0.5 secs. fe=0.5 secs. fe=1 secs.

BRCCTP

fe=1 secs.

fq=2 secs.

fq=2 secs.

fq=5 secs.

fq=5 secs.

fq=10 secs. fq=10 secs.

50

4.2

1.8

3.6

1.5

2.9

1

100

4.9

2.1

3.9

1.7

3

1

150

5.4

2.7

4.3

2

3.3

1.3

200

6.1

3.2

4.8

2.4

3.6

1.5

250

6.8

3.5

5.1

2.6

3.9

1.8

4.3.4. Drop Packet Ratio 695

Drop packet ratio measures the number of packets that never received by the destination. The comparison of drop packet ratio for existing and proposed

protocol for three different traffic loads is given in Fig. 5. We have simulated three different traffic loads by variable event-reporting frequency (fe ) and query

Jou

rna

reporting frequency (fq ): heavy: fe = 0.1 secs. and fq = 2 secs., moderate: fe =

Figure 4: Comparing Average Delivery Overhead for Different Traffic Loads.

34

lP repro of

Journal Pre-proof

Figure 5: Comparing Drop Packet Ratio for Different Traffic Loads.

Table 6: Comparison of Drop Packet Ratio for Diverse Traffic Loads.

No. of ART

BRCCTP

ART

BRCCTP

ART

Nodes fe=0.1 secs. fe=0.1 secs. fe=0.5 secs. fe=0.5 secs. fe=1 secs. fq=2 secs.

fq=5 secs.

rna

fq=2 secs.

fe=1 secs.

fq=5 secs.

fq=10 secs. fq=10 secs.

50

0.232

0.204

0.203

0.172

0.122

0.117

100

0.259

0.239

0.267

0.209

0.154

0.136

150

0.314

0.278

0.286

0.239

0.121

0.129

200

0.396

0.319

0.308

0.254

0.165

0.138

250

0.493

0.421

0.354

0.304

0.198

0.162

Jou

700

BRCCTP

0.5 secs. and fq = 5 secs., light: fe = 1 secs. and fq = 10 secs. Table 6 shows the drop packet rate for prevailing and proposed protocol for three different traffic loads.

It is inferred from Fig. 5 that the BRCCTP protocol has lower drop packet

ratio as compared to the existing protocol. This is because the proposed pro-

705

tocol selects the optimal path for data transfer using TOPSIS approach based 35

Journal Pre-proof

lP repro of

on various parameters including delivery success rate of the path. Further, it uses rate adjustment to optimum value for congestion control. So, combination

of both of these techniques reduces drop packet ratio for proposed protocol. The existing protocol uses congestion alarm and congestion safe messages based 710

congestion control mechanism to reduce traffic of non-essential nodes that does not control congestion effectively and increases drop packet ratio for existing

protocol. Drop packet ratio of proposed protocol is reduced effectively under

high traffic load with event-reporting frequency (fe ) equal to 0.1 secs. and query reporting frequency (fq ) equal to 2 secs. 715

4.3.5. Queue Length

As we observe from Fig. 6 and Fig. 7, our proposed BRCCTP protocol queue occupancy is less as compared to ART protocol. As we go away from sink node

buffer occupancy also decreases after applying the proposed algorithm. We con-

trol the queue occupancy at every node by adjusting the reporting rates among 720

sensor nodes then in turn we avoid queue overflows at those nodes. This also

Jou

rna

results in decrease of drop packet ratio. Hence, we overcome the congestion

Figure 6: Queue Length of ART protocol.

36

lP repro of

Journal Pre-proof

Figure 7: Queue Length of BRCCTP protocol.

in sensor network. Our proposed BRCCTP protocol also has less computa-

tion overhead as compared to ART protocol because our proposed solution uses

priority based fair bandwidth allocation and rate adjustment based congestion 725

control instead of congestion alarm and congestion safe based congestion mit-

igation used by ART protocol. The queue availability can also be used as the

rna

reverse of queue occupancy. It characterizes the amount of packets a node might

still accept before it starts to decline arriving data. The proposed protocol emphasizes on proficient organization of queue to deliver reliability and decrease 730

packet loss. It is also inferred from Fig. 6 that most of the time in ART protocol queued packets surpasses a certain predefined threshold (75%) that causes packet loss and large delay in network. In a network, if the queue length is not

Jou

properly maintained, the source node will continue transporting packets at the preliminary level that results in packet loss. Thus, in our proposed protocol we

735

reduce transport ratio of packet transmitters formerly surpassing a determined threshold so as to avoid the packets from being discarded. In a perceptive application identical to health monitoring, loss of packet is the most significant problem that has to be reduced.

37

lP repro of

Journal Pre-proof

Figure 8: Comparing Fairness Index.

4.3.6. Fairness Index 740

Fairness index measures the fairness in terms of reporting rate of all sensor nodes. The evaluation of fairness index for prevailing and proposed protocol by

varying traffic load in relation of packets per second (PPS) is depicted in Fig. 8. Table 7 shows fairness index for existing and proposed protocol at different

traffic loads. It is inferred from Fig. 8 that the BRCCTP protocol has higher fairness index than ART protocol because in our proposed protocol, an equal

rna

745

priority index is assigned to all data source nodes and a global priority index is calculated at each node. Rate adjustment to control congestion is done on the basis of global priority index of nodes that provides fair bandwidth allocation to all data sources. As traffic load that is number of Packets Per Second (PPS) 750

increases, fairness index decreases due to congestion. Nevertheless, BRCCTP

Jou

protocol has better fairness index even under high traffic load condition than existing ART protocol. 4.3.7. Energy Efficiency Energy efficiency of network represents the ratio of remaining energy of net-

755

work to the initial energy of the network. A network having high energy effi-

38

lP repro of

Journal Pre-proof

Table 7: Comparison of Fairness Index.

Traffic Load (PPS)

ART

BRCCTP

0.25

0.919

0.924

0.5

0.672

0.698

1

0.437

0.542

2

0.296

0.451

3

0.248

0.409

4

0.225

0.413

ciency would have better network lifetime. The evaluation of energy efficiency

for prevailing and proposed protocol for different number of nodes is given in Fig. 9. Table 8 shows energy efficiency for existing and proposed protocol at different node densities. 760

It is concluded from Fig. 9 that the proposed protocol has higher residual

energy of network than the prevailing protocol. This is the reason that our pro-

posed protocol always chooses the path with higher remaining energy for data

Jou

rna

transfer using TOPSIS approach and hence maintains an energy balance in the

Figure 9: Energy Efficiency for Different Node Densities.

39

lP repro of

Journal Pre-proof

Table 8: Comparison of Energy Efficiency for diverse node densities.

No. of Nodes

ART

BRCCTP

50

0.329

0.352

100

0.291

0.319

150

0.198

0.242

200

0.153

0.194

250

0.097

0.115

network and the congestion mitigation method in proposed protocol uses ratio 765

regulation strategy that manages congestion efficiently as a result of which less packets are damaged in proposed protocol and therefore, less retransmissions

and lower energy loss. Packet drops are higher in ART protocol and packets

follow in any available path, so energy consumption is more in ART protocol, which reduces the residual energy of network. Resource management is of princi770

pal importance for QoS provisioning as the equivalent resource budgets essential to be guaranteed in order to accomplish certain QoS levels. This is mainly ac-

curate for WSNs where communication, computing and energy resources are

fundamentally restricted. Resource management in WSNs is very challenging,

775

rna

as of the ever-increasing complexity of WSNs. Energy efficiency of proposed

protocol is increased even when node density is equal to 250 and having high traffic load when compared to ART protocol.

5. Conclusion

Jou

To conclude, we propose a new Wireless Sensor Networks (WSNs) protocol called: Bidirectional Reliable and Congestion Control Transport Protocol (BR-

780

CCTP).We analyzed its performance under different scenarios and compared with the competing ART protocol.Simulation results have shown the better performance of our proposed scheme when compared to ART scheme. The BRCCTP makes use of TOPSIS approach to select optimal path and it uses ratio regulation to optimize value based on priority so as to alleviate the effect of 40

Journal Pre-proof

congestion. The latter can be distributed with in an optimum method, but not

lP repro of

785

at the price of decreased throughput and delivery ratio. Priority based rate

adjustment provides fairness among all sensor nodes. It has been shown that BRCCTP protocol performance is superior when compared to ART protocol,

especially form the point view of the average delivery ratio, end-to-end delay, 790

average delivery overhead, drop packet ratio, queue length, energy efficiency and fairness index metrics. The BRCCTP protocol is successful in decreasing drop

packet ratio, end-to-end delay, average delivery overhead and queue length and in having better average delivery ratio, energy efficiency and fairness. References 795

[1] Alejo, D., Cobano, J.A., Heredia, G., Mart´ınez-de Dios, J.R., Ollero, A.,

2015. Efficient trajectory planning for wsn data collection with multiple uavs, in: Cooperative Robots and Sensor Networks 2015. Springer, pp. 53–75.

[2] Alipio, M.I., Tiglao, N.M.C., 2017. Dynamic source rate control for cache800

based transport protocol in wireless sensor networks. Computer Commu-

rna

nications 113, 14–24.

[3] Briff, P., Lutenberg, A., Vega, L.R., Vargas, F., Patwary, M., 2015. Generalised trade-off model for energy-efficient wsn synchronisation. Electronics Letters 51, 291–292. 805

[4] Bryce, R., Srivastava, G., 2018. The addition of geolocation to sensor networks., in: ICSOFT, pp. 796–802.

Jou

[5] Chen, F., Zhao, Z., Min, G., Wu, Y., 2016. A novel approach for path plan of mobile chargers in wireless rechargeable sensor networks, in: 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN),

810

IEEE. pp. 63–68.

[6] Culler, D., Estrin, D., Srivastava, M., 2004. Guest editors’ introduction: Overview of sensor networks. Computer 37, 41–49. 41

Journal Pre-proof

lP repro of

[7] Das, S.N., Misra, S., Wolfinger, B.E., Obaidat, M.S., 2016. Temporal-

correlation-aware dynamic self-management of wireless sensor networks. 815

IEEE Transactions on Industrial Informatics 12, 2127–2138.

[8] Dhurandher, S.K., Misra, S., Obaidat, M.S., Gupta, N., 2009. An ant

colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks. Security and Communication Networks 2, 215–224. 820

[9] Dobslaw, F., Zhang, T., Gidlund, M., 2014. End-to-end reliability-aware

scheduling for wireless sensor networks. IEEE Transactions on Industrial Informatics 12, 758–767.

[10] Ekmen, M., Altın-Kayhan, A., 2017. Reliable and energy efficient wireless

sensor network design via conditional multi-copying for multiple central 825

nodes. Computer Networks 126, 57–68.

[11] Ghaffari, A., 2015. Congestion control mechanisms in wireless sensor networks: A survey. Journal of network and computer applications 52, 101– 115.

830

rna

[12] Gholipour, M., Haghighat, A.T., Meybodi, M.R., 2017. Hop-by-hop conges-

tion avoidance in wireless sensor networks based on genetic support vector machine. Neurocomputing 223, 63–76. [13] Godoy, P.D., Cayssials, R.L., Garino, C.G.G., 2018. Communication channel occupation and congestion in wireless sensor networks. Computers & Electrical Engineering 72, 846–858. [14] Huang, H., Yin, H., Min, G., Zhang, J., Wu, Y., Zhang, X., 2017a. Energy-

Jou

835

aware dual-path geographic routing to bypass routing holes in wireless sensor networks. IEEE Transactions on Mobile Computing 17, 1339–1352.

[15] Huang, H., Yin, H., Min, G., Zhang, X., Zhu, W., Wu, Y., 2017b. Coordinate-assisted routing approach to bypass routing holes in wireless

840

sensor networks. IEEE Communications Magazine 55, 180–185. 42

Journal Pre-proof

lP repro of

[16] Hunter, J.S., 1986. The exponentially weighted moving average. Journal of quality technology 18, 203–210.

[17] Issariyakul, T., Hossain, E., 2009. Introduction to network simulator 2 (ns2), in: Introduction to network simulator NS2. Springer, pp. 1–18. 845

[18] Jain, R., 1990. The art of computer systems performance analysis: tech-

niques for experimental design, measurement, simulation, and modeling. John Wiley & Sons.

[19] Kafi, M.A., Ben-Othman, J., Ouadjaout, A., Bagaa, M., Badache, N., 2017. Refiacc: Reliable, efficient, fair and interference-aware congestion control 850

protocol for wireless sensor networks. Computer Communications 101, 1– 11.

[20] Kafi, M.A., Djenouri, D., Othman, J.B., Ouadjaout, A., Bagaa, M., Lasla, N., Badache, N., 2014. Interference-aware congestion control protocol for wireless sensor networks. Procedia Computer Science 37, 181–188. 855

[21] Kar, P., Roy, A., Misra, S., Obaidat, M.S., 2016. On the effects of communication range shrinkage of sensor nodes in mobile wireless sensor networks

2055.

rna

due to adverse environmental conditions. IEEE Systems Journal 12, 2048–

[22] Kashuba, S., Novikov, V., Lysenko, O., Alekseeva, I., 2015. Optimization 860

of uav path for wireless sensor network data gathering, in: 2015 IEEE International Conference Actual Problems of Unmanned Aerial Vehicles

Jou

Developments (APUAVD), IEEE. pp. 280–283. [23] Liu, X., Cao, J., Tang, S., Wen, J., 2015. Enabling reliable and networkwide wakeup in wireless sensor networks. IEEE Transactions on Wireless

865

Communications 15, 2262–2275.

[24] Lou, S., Srivastava, G., Liu, S., 2019. A node density control learning method for the internet of things. Sensors 19, 3428.

43

Journal Pre-proof

lP repro of

[25] Mahmood, M.A., Seah, W.K., Welch, I., 2015. Reliability in wireless sensor networks: A survey and challenges ahead. Computer Networks 79, 166–187. 870

[26] Malina, L., Srivastava, G., Dzurenda, P., Hajny, J., Fujdiak, R., 2019. A

secure publish/subscribe protocol for internet of things, in: Proceedings of the 2019 14th International Conference on Availability, Reliability and Security (ARES 2019), Canterbury, UK, pp. 26–29.

[27] Misra, S., Das, S.N., Obaidat, M.S., 2014. Context-aware quality of service 875

in wireless sensor networks. IEEE Communications Magazine 52, 16–23.

[28] Misra, S., Tiwari, V., Obaidat, M.S., 2009. Lacas: learning automata-based

congestion avoidance scheme for healthcare wireless sensor networks. IEEE Journal on Selected Areas in Communications 27, 466–479.

[29] Mohanty, P., Kabat, M.R., 2014. A hierarchical energy efficient reliable 880

transport protocol for wireless sensor networks. Ain Shams Engineering Journal 5, 1141–1155.

[30] Narawade, V., Kolekar, U.D., 2018. Acsro: Adaptive cuckoo search based rate adjustment for optimized congestion avoidance and control in wireless

885

rna

sensor networks. Alexandria engineering journal 57, 131–145.

[31] Obaidat, M.S., Misra, S., 2014. Principles of wireless sensor networks. Cambridge University Press.

[32] Sergiou, C., Vassiliou, V., Paphitis, A., 2014. Congestion control in wireless sensor networks through dynamic alternative path selection. Computer Networks 75, 226–238.

[33] Sharma, B., Aseri, T.C., 2015. A hybrid and dynamic reliable transport

Jou

890

protocol for wireless sensor networks. Computers & Electrical Engineering 48, 298–311.

[34] Shelke, M.P., Malhotra, A., Mahalle, P., 2017. A packet priority intimationbased data transmission for congestion free traffic management in wireless

895

sensor networks. Computers & Electrical Engineering 64, 248–261. 44

Journal Pre-proof

lP repro of

[35] Shi, T., Li, J., Gao, H., Cai, Z., 2018. Coverage in battery-free wireless sensor networks, in: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, IEEE. pp. 108–116.

[36] Stais, C., Xylomenos, G., Voulimeneas, A., 2015. A reliable multicast 900

transport protocol for information-centric networks. Journal of Network and Computer Applications 50, 92–100.

[37] Thirumalai, C., Mohan, S., Srivastava, G., 2020.

An efficient pub-

lic key secure scheme for cloud and iot security.

Computer Com-

munications 150, 634 – 643. 905

URL: http://www.sciencedirect.

com/science/article/pii/S0140366419314768, doi:https://doi.org/ 10.1016/j.comcom.2019.12.015.

[38] Wang, C., Sohraby, K., Lawrence, V., Li, B., Hu, Y., 2006. Priority-

based congestion control in wireless sensor networks, in: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 910

(SUTC’06), IEEE. pp. 8–pp.

[39] Ye, R., Boukerche, A., Wang, H., Zhou, X., Yan, B., 2016. Recodan: An efficient redundancy coding-based data transmission scheme for wireless

rna

sensor networks. Computer Networks 110, 351–363.

[40] Yoon, K.P., Hwang, C.L., 1995. Multiple attribute decision making: an 915

introduction. volume 104. Sage publications. [41] Zhan, C., Zeng, Y., Zhang, R., 2017. Energy-efficient data collection in uav enabled wireless sensor network. IEEE Wireless Communications Letters

Jou

7, 328–331.

[42] Zhao, Z., Min, G., Gao, W., Wu, Y., Duan, H., Ni, Q., 2018. Deploying

920

edge computing nodes for large-scale iot: A diversity aware approach. IEEE Internet of Things Journal 5, 3606–3614.

45

Journal Pre-proof

lP repro of

[43] Zhu, X., Srivastava, G., M Parizi, R., 2019. An efficient encryption algorithm for the security of sensitive private information in cyber-physical systems. Electronics 8, 1220. 925

[44] Zonouz, A.E., Xing, L., Vokkarane, V.M., Sun, Y., 2016. Hybrid wire-

less sensor networks: a reliability, cost and energy-aware approach. IET

Jou

rna

Wireless Sensor Systems 6, 42–48.

46

Journal Pre-proof

Conflict of Interest and Authorship Conformation Form

lP repro of

Please check the following as appropriate: o

All authors have participated in (a) conception and design, or analysis and interpretation of the data; (b) drafting the article or revising it critically for important intellectual content; and (c) approval of the final version.

o

This manuscript has not been submitted to, nor is under review at, another journal or other publishing venue.

o

The authors have no affiliation with any organization with a direct or indirect financial interest in the subject matter discussed in the manuscript

o

The following authors have affiliations with organizations with direct or indirect financial interest in the subject matter discussed in the manuscript:

Author’s name

Affiliation

Bhisham Sharma Gautam Srivastava Jerry Lin

Jou

rna

Brandon University

Journal Pre-proof

Jou

rna

lP repro of

Bhisham – Conceptualization, Data curation, Formal analysis; Gautam - Funding acquisition, Investigation, Methodology, Project administration, Roles/Writing – original draft; Jerry - Writing – review & editing.