Preprint
Article

Energy-Efficient Opportunistic Routing Algorithm for Post-disaster Mine Internet of Things Networks

Altmetrics

Downloads

79

Views

10

Comments

0

A peer-reviewed article of this preprint also exists.

This version is not peer-reviewed

Submitted:

31 July 2023

Posted:

02 August 2023

You are already at the latest version

Alerts
Abstract
The Mine Internet of Things (MIoT), as a key technology for reconstructing post-disaster communication networks, enables to realize the safety monitoring and controlling of the affected roadway. However, due to the challenging underground mine environment, the MIoT suffers from severe signal attenuation, vulnerable nodes, and limited energy, which result in low network reliability of the post-disaster MIoT. To improve the transmission reliability as well as to reduce energy consumption, a directional-area-forwarding-based energy-efficient opportunistic routing (DEOR) for the post-disaster MIoT is proposed. DEOR defines a forwarding zone (FZ) for each node to route packets toward the sink. The candidate forwarding set (CFS) is constructed by the nodes within the FZ that satisfy the energy constraint and the neighboring node degree constraint. The nodes in CFS are prioritized based on the routing quality evaluation by taking the local attributes of nodes into consideration, such as the directional angle, transmission distance, and residual energy. DEOR adopts a recovery mechanism to address the issue of void nodes. The simulation results validate that the proposed DEOR outperforms ORR, OBRN and ECSOR in terms of energy consumption, average hop count, packet delivery rate, and network lifetime.
Keywords: 
Subject: Engineering  -   Telecommunications

1. Introduction

The Mine Internet of Things (MIoT) has become a widely used technique, which achieves the construction of smart mines by employing IoT technologies to mining industrial scenarios [1]. Generally, the MIoT system architecture is composed of three layers, i.e., perception layer, network layer and application layer, as shown in Figure 1. The perception layer is the foundation of MIoT applications, consisting of various intelligent terminals and devices equipped with sensors, responsible for collecting physical information such as personnel, equipment, and environment in the mine. The information collected by the perception layer will be transmitted to the application layer through the network layer. At present, there are many wireless communication technologies available for data transmission in underground mines, such as 4G\5G, Wi-Fi, and LoRa [2]. In the application layer, the collected information can be processed and analyzed, and appropriate decisions are made to meet different production requirements. The MIoT system has been utilized to realize the monitoring of the entire mine status, thereby improving the production safety and accident prevention level of the mine [3].
In the actual coal mining process, disasters such as gas explosions, roof shedding and water penetration can easily occur due to the harsh environmental conditions [4]. These disasters usually cause roadway blockages or personal injuries, etc., resulting in underground personnel unable to actively evacuate the accident area and only being able to wait for rescue in the mine roadway. However, rescuers entering the accident area after the disaster are prone to secondary accidents with unknown environmental information in the mine, triggering even more casualties. In order to access specific information about the disaster roadway, the environment detection of affected area should be carried out before the rescue [5]. In fact, some communication facilities may be damaged in accidents, leading to the interruption of original communication links and the loss of on-site information in post-disaster accident areas [6]. Consequently, restoring normal communication between the accident area and the ground command center as soon as possible after the disaster has become an urgent issue.
Figure 1. Architecture of MIoT system.
Figure 1. Architecture of MIoT system.
Preprints 81012 g001
In general, post-disaster communications can be restored by laying cables or adding auxiliary communication devices in accident tunnels. However, this approach is costly to deploy and cannot be achieved in a short time underground the mine [7]. To ensure timely and efficient underground communications, the surviving facilities can be utilized to reconfigure post-disaster network quickly. In addition, the post-disaster communication should be capable of perceiving environmental and personnel information and promptly transmitting the site information from the incident area to the rescue center. Therefore, the reconstruction of MIoT with wireless networks is an effective solution.
In the fully mechanized mining face accident rescue scenario of MIoT, a large number of surviving nodes are randomly scattered in the accident area, and a planar topology self-organization management is used to re-establish the post-disaster MIoT network based on the wireless multi-hop routing sensor network. These nodes have the ability to perceive and transmit data information. When the source node collects mine disaster data information, it uses a multi-hop routing data transmission method to forward the data packet to the sink node, thus completing effective monitoring of the fully mechanized mining face. Unlike normal mining scenarios, the surviving nodes in post-disaster MIoT networks have extremely limited energy and cannot be timely replenished. Besides that, frequent data transmission after disasters can generate high communication energy consumption, thereby shortening the entire network lifetime [8]. Due to the collapse and dispersion of objects such as coal blocks, rock mass, and electrical devices, network nodes in the roadway can be damaged or displaced, which cause to the sparse topology [9]. In addition, the affected roadway environment is highly complex with a non-uniform layered geological structure that conducts a large amount of signal loss and multipath attenuation. As a result, the high packet loss rate will lead to the post-disaster MIoT fail to ensure reliable data transmission. Due to the aforementioned problems, existing wireless network routing protocols cannot be well applied to post-disaster MIoT data transmission. Therefore, an efficient and reliable routing protocol is urgently required for post-disaster MIoT.
Opportunity routing (OR) can improve the reliability of data transmission in wireless networks by fully utilizing the broadcasting characteristics of wireless channels and collaboration between forwarding nodes [10]. Initially, OR was designed to meet the communication requirements of ad-hoc networks in sparse mobile scenarios. Nowadays, it has become an important technique for data collection and sharing in wireless multi-hop networks. Considering various Quality-of-Service (QoS) requirements for WSNs, a fuzzy based load-balanced opportunity routing protocol is proposed [11]. Different form traditional deterministic wireless network routing protocols, OR does not require the sender to select a specific relay node before data forwarding, but only needs to maintain candidate forwarding set (CFS). Moreover, OR can effectively address the problem of link unreliability caused by unstable wireless channels, thus reducing packet retransmissions and improving network throughput. In [12], a virtual-range-forwarding-based opportunistic routing is proposed to overcome the unfavorable characteristics of wireless channels. Hence, the OR method can effectively cope with the vulnerability and the intermittent connectivity of the post-disaster MIoT networks.
Nevertheless, there are some drawbacks in traditional OR researches. On the one hand, the selection of routing metrics is relatively single, without considering various attributes of the network comprehensively. On the other hand, these protocols is designed to improve packet delivery success rates by using a large number of duplicate packets, while ignore the high latency problem in the network. In reality, high latency in MIoT scenarios can seriously affect the efficiency of accident rescue work. Different from the terrestrial routing method, there exists the following challenges for opportunistic routing in the post-disaster MIoT. First, the surviving nodes after the disaster are constrained by the limited power resource. If there are too many nodes participating in packets forwarding, high communication energy consumption will be generated in the network, and nodes will fail quickly due to energy depletion, thereby aggravating the intermittent connectivity of the post-disaster MIoT. Conversely, if there are few nodes for packets forwarding, the packets delivery success rate of the post-disaster MIoT cannot be guaranteed. Therefore, the size of the candidate forwarding set becomes a crucial factor affecting the network performance. Second, the MIoT network data transmission in tunnels tends to be directional, and critical network nodes close to the sink will undertake more transmission tasks, resulting in the routing hotspot problem, which severely reduces the energy utilization of surviving nodes. Third, the harsh environment in post-disaster tunnels makes surviving nodes prone to physical damages, causing unstable network topology and the void routing, which severely degrade the reliability of transmission links.
To the best of our knowledge, there are fewer studies on OR methods in the post-disaster MIoT. Therefore, the focus of our work is to address the aforementioned problems of opportunistic routing in the post-disaster MIoT. In this paper, we propose a directional-area-forwarding-based energy-efficient opportunistic routing (DEOR) algorithm to improve the reliability and robustness of data transmission in post-disaster MIoT networks.
The main contributions of this paper are summarized as follows.
  • In order to restore post-disaster data transmission of MIoT in the planar accident area rescue scenarios such as fully mechanized coal face, a post-disaster flat network architecture of MIoT based on multi-hop routing of surviving nodes is established, which consists of a sink node and multiple surviving sensor nodes. This network architecture achieves the purpose of comprehensive perception and effective transmission of environmental information in the planar accident mine after disasters.
  • We propose a directional-area-forwarding-based candidate forwarding set construction strategy. In the network initialization phase, according to the deployment density and communication radius of nodes in the accident roadway, a forwarding zone (FZ) is designed for each node to route packets toward the sink. Then, the candidate forwarding set (CFS) is constructed by the nodes within the FZ that satisfy the energy constraint and the neighboring node degree constraint. By restricting the number of duplicated packets in the network, DEOR improves the energy utilization of the nodes.
  • We propose a relay nodes selection method based on routing quality evaluation. In the data transmission phase, we take multiple attributes of nodes into account, such as direction angle, transmission distance, and residual energy. Next, nodes in CFS are prioritized based on the routing quality and the forwarding node with the highest priority is selected as the relay node to forward packets. Other nodes in CFS discard packets after listening for a successful transmission message. By utilizing the collaboration between forwarders, DEOR addresses the hot-spot problem and balances the traffic load between nodes.
  • We design a recovery mechanism for void nodes. When packets encounter the routing void during forwarding, a recovery mechanism is triggered. By employing the modified routing quality evaluation function, packets can bypass the void routing region and select available relay nodes to continue forwarding. DEOR overcomes the void routing node problem and improves the robustness of the whole network.
The rest of this paper is organized as follows. Section 2 discusses the related works. In Section 3, we describe the system model and problem description. Section 4 explains the proposed DEOR algorithm. Section 5 elaborates simulation setup and simulation results. Finally, Section 6 concludes this paper.

2. Related Work

In this section, we mainly review the related work of MIoT routing protocols and opportunistic routing protocols, respectively.

2.1. MIoT Routing Protocols

Here, we briefly present some existing well-known routing protocol for MIoT networks. A comparison of the protocols is listed in Table 1.
Table 1. Comparison of MIoT routing protocols.
Table 1. Comparison of MIoT routing protocols.
Protocol Scenario Node Status Deployment Routing metric Features
RPAPC-MN[13] Normal Static & mobile Partition Area positive clustering Reduce system energy consumption and extend network lifetime
DESR[14] Normal Static Random Transmission delay, packet loss rate and energy consumption Ensure QoS requirements
LBDA[15] Normal Static Uniform The forwarding data traffic and forwarding nodes Balancing node energy consumption and maximizing network lifecycle
SEC[16] Post-disaster Static Random Energy factor and connectivity factor Extended network stability cycle, and improved network stability
EAUC[17] Post-disaster Static Random Energy and distance factors Balancing cluster head energy consumption and improving data transmission
MVBN[18] Post-disaster Static Random The centrality of intermediate numbers, node compactness, and residual energy Optimized network remaining energy, number of dominant nodes, and node coverage
NHCRA-O[19] Post-disaster Static & mobile Random Residual energy factor, node connectivity, and directional medium Improve node matching efficiency and network coverage efficiency
RIAC[20] Post-disaster Static Random Residual energy, distance, and trust factor Reduce inter-cluster transmission energy consumption
On the one hand, several routing protocols (e.g., [13,14,15]) were proposed to enhance the performance of data transmission in normal coal mine tunnels. Yu et al. [13] proposed a Routing Protocol in mine roadways based on Area Positive Clustering and Mobile Nodes (RPAPC-MN). In RPAPC-MN, an area positive clustering mechanism is applied to avoid data reentry. By utilizing nodes equipped with miners and mobile equipment to forward data, RPAPC-MN reduces the energy consumption and extends the network lifetime. You et al. [14] proposed a Differential Evolution routing (DE) protocol of wireless multimedia sensor networks for underground mines. By setting different weights in normalized sub QoS evaluation function of transmission delay, packet loss rate and transmission energy consumption and applies marking method to obtain the transmission path, DE realize differentiated service and guarantee the QoS for multimedia services. Wu et al. [15] proposed an Optimal Forwarding Algorithm (OFA) for coal mine WSNs. When sensor nodes are evenly deployed in narrow and narrow lanes, OFA can dynamically adjust the node’s forwarded data volume and forwarded routing to balance the node energy consumption and maximize the network life cycle. On the other hand, a number of routing protocols (e.g., [16,17,18,19,20]) were proposed to restore reliable data transmission in mine tunnels after disasters. Wu et al. [16] proposed a Self-organized Energy-efficient Clustering (SEC) protocol for post-disaster reconstructed MIoT networks. SEC designs the election probability function based on the energy factor and connectivity factor. In SEC, cluster head (CH) node was replaced by periodically comparing the residual energy and the threshold energy, which reduce the overall energy consumption and improve the stability of reconfiguration networks. On this basis, Zhao et al. [17] proposed an Energy-balanced Adaptive Uneven Clustering (EAUC) to solve the issue of node energy heterogeneity after disasters. EAUC introduces the CH election threshold function according to residual energy, relative distance and distribution density of surviving nodes. The weight function of relay CH was built by considering the current residual energy of relay CH and the CH with the largest weight was selected as the next hop routing node. Hu et al. [18] proposed a post-disaster reconstruction algorithm of wireless ad hoc network in coal mines based on Multi-dimensional Virtual Backbone Network (MVBN). MVBN constructs a comprehensive evaluation index of virtual backbone nodes by considering betweenness centrality, node closeness and residual energy. In MVBN, the node with large evaluation index is elected as dominant nodes, so as to enhance the robustness of virtual backbone network and prolong the network lifetime. Hu et al. [19] proposed a Network Hole Coverage Reconstruction Algorithm with Obstacles (NHCRA-O) for post-disaster MIoT. In NHCRA-O, Delaunay triangulation is used to divide residual nodes and corner points of obstacles in the network. The virtual repair node position is determined through the distance between the centroid and the vertex of the Delaunay triangle. NHCRA-O selects CHs according to the residual energy factor, node connectivity and directional betweenness, which significantly extends the network lifespan. Chen [20] proposed an energy balanced Routing protocol based on Improved Ant Colony algorithm (RIAC) to address the problem of uneven energy consumption between network clusters after disasters. RIAC introduces residual energy, distance and node trust factors based on the traditional ant colony algorithm. By modifying the transition probability formula, pheromone heuristic function, and pheromone update strategy, RIAC realizes the optimal path selection from CH to base station. However, the above routing protocols used for MIoT networks adopt a clustering approach with predefined routing paths, which ignores the intermittent connection problem of wireless communication links after disasters in the routing process. When sparse topology occurs in the network, these existing methods cannot guarantee reliable data transmission for post-disaster MIoT networks.

2.2. Opportunistic Routing Protocols

Opportunity Routing (OR) was proposed mainly to improve the packet delivery rate of wireless networks. The design of OR protocol focuses on four aspects: 1) Construction of the candidate forwarding set, 2) Selection of relay nodes and forwarders coordination, 3) Data transmission and identification, and 4) Dynamic adaptation to network topology changes. Currently, a plethora of OR protocols were designed for various application scenarios [21]. Sang et al. [22] proposed an opportunistic routing protocol based on trajectory prediction (EORB-TP) to deal with the dynamic topology and unstable links of the FANET. EORB-TP defines the trajectory metric value based on node movement distance, node direction and node density. In EORB-TP, an energy-saving data forwarding strategy is designed to deal with the limited energy resources and storage space of UAVs. In [23], the Delay and Duplicate transmission Avoid CFS optimization algorithm (DDA) was proposed to reduce the transmission delay and duplicate transmission in opportunistic routing for wireless muti-hop networks. DDA divides the nodes in CFS into different fully connected relay networks and choose the most appropriate relay network based on the multi-attribution decision making (MADM) theory. Zhao et al. [24] proposed an opportunistic routing algorithm based on trust relationships for wireless mesh networks (WMNs) to solve the problem of low message delivery rate and high network resource consumption when forwarding messages in opportunistic networks. Li et al. [25] proposed an efficient and reliable transmission power control-based opportunistic routing (ERTO) for wireless ad hoc networks to improve packet delivery probability and reduce energy consumption and network interference. In ERTO, the packet delivery probability, the expected energy consumption, and the relationship between transmission power and node degree are applied to optimize the transmission power and forwarding node degree jointly. Banyal et al. [26] proposed a Hierarchical learning-based sectionalized routing paradigm for pervasive communication and Resource efficiency (HiLSeR) in opportunistic IoT network. HiLSeR enables message routing using a combination of controlled-parameterized flooding and opportunistic sector-based decentralized transmission. Celik et al. [27] proposed a Sector-based Opportunistic Routing (SectOR) protocol for hybrid underwater optic acoustic networks. SectOR uses a variety of local and global metrics to evaluate the fitness of a candidate set (CS) and develops candidate prioritization techniques for various OR metrics. Zhou et al. [28] proposed a Network Coding Combined with Link Correlation (NCCLC) method to improve the energy efficiency in wireless edge IoT applications. In NCCLC, the link correlation was considered when calculating the number of required forwarding and selecting the forwarder set. In [29], the Community clustering Routing protocol based on information Entropy in mobile opportunity Networks (CREN) was proposed to deal with the different characteristics between communities and the inefficient nodes after community clustering. CREN reduces the transmission delay and routing overhead.

3. System Model and Problem Description

3.1. Network Architecture

In the accident rescue communication scenario of planar areas such as fully mechanized coal mining working faces, we consider a network architecture for post-disaster MIoT opportunity routing, as shown in Figure 2. The post-disaster MIoT network consists of two types of available nodes, i.e., multiple surviving sensor nodes and one sink node. All surviving nodes with the ability to sense and transmit information are randomly distributed in the accident tunnel. After the disaster, these sensor nodes are responsible for periodically collecting environmental and equipment information from the accident field. Besides, the sink node is deployed at the entrance of the accident mine and can adopt wired power supply after the disaster, so the power is considered infinite. As the gateway node of the post-disaster network, the sink is responsible for collecting various information collected by sensor nodes. In the post-disaster MIoT, each node can directly or multi-hop forward data packets to the sink node.
Figure 2. Opportunistic routing network model for post-disaster MIoT.
Figure 2. Opportunistic routing network model for post-disaster MIoT.
Preprints 81012 g002
In the data transmission process of post-disaster network shown in Figure 2, the source node n i that currently carries the data packet first constructs CFS within its one-hop communication range for packets forwarding, and sends the data packet to all neighbor nodes in the CFS to improve the success rate of packet forwarding. Then, a candidate node n j is selected as a relay node for n i through the node collaboration in the CFS. When node n j successfully sends the packet to the next hop routing node, other candidate nodes in CFS will drop the packet copies. According to this data transmission method, the sender carrying data packet can select the appropriate relay node to forwarding packet, until the data information of the source node n i is sends to the sink. Next, the information is transmitted to the underground base station in the mine normal region through sink. Finally, the information is sent to the ground control center through mining switches and Ethernet ring networks. Consequently, the post-disaster MIoT enables effective monitoring of the entire accident area through the proposed data transmission scheme.
We assume that all surviving nodes are homogeneous and stationary. Each node knows its geographical location through any re-localization scheme of drift nodes after mine disasters (e.g., the scheme studied in [30,31]) and the location of the sink are public. The post-disaster network is formed from a set of a finite number of surviving nodes, denoted by N = { n 1 , n 2 , , n | N | } . Any node n i N is located at ( x i , y i ) , it has a limited communication range r and initial battery power e ini . For node n i , its neighbor node set is denoted as N i = { n j | n j N & d i , j r } , where N i N and d i , j denotes the Euclidean distance from n i to n j . The length of neighbors set is denoted by m i = | N i | . All nodes know its neighbors using any neighbor discovery strategy (e.g., the strategy studied in [32], [33]), thereby calculating the distribution density of surviving nodes in the current accident area. In this paper, we define the data forwarding direction toward the sink in the underground accident region as an upward routing path, i.e., the forwarder is closer to the sink than the current sender. The notations used frequently in this paper are listed in Table 2.
Table 2. Notations.
Table 2. Notations.
Notation Meaning
N The network. n i N is a sensor node.
N i The neighbors set pf node n i .
m i The size of N i , m i = | N i | .
n s The source node.
n sink The sink node.
e i n i The initial energy of node.
d i , j The transmission distance from the node n i to its neighbor n j .
θ i , j The direction angle between the node n i and n j towards the sink node.
ε i , j The residual energy of neighbor n j of n i .
e The Euler’s constant. Approx. 2.71828.
D The network density.
F i The forwarding zone for the node n i
w i The width of forwarding zone for the node n i
A The area of the target field.
r The communication range of node.
Z i The candidate forwarding zone of n i .
C ( i ) The candidate forwarding set of n i .
α θ , α d , α ε The control parameters of routing metrics.
Q ¯ i , j The routing quality of neighbor n j of n i .

3.2. Energy Model

Usually, the nodes in the MIoT are sensor devices, whose energy is limited and cannot be replenished after the disaster. In this section, we adopt the first-order radio energy consumption model to calculate the energy dissipation of the surviving network nodes [34]. In the MIoT, the energy cost of data transmission mainly considers the energy dissipation of communication modules of nodes. The energy consumption of transmitting a packet of size b from n i to n j is expressed as
E t x ( i , j , b ) = { ( b E e l e c ) + ( b ζ f s d i , j 2 ) , d i , j < d t h r ( b E e l e c ) + ( b ζ a m p d i , j 4 ) , d i , j d t h r
Similarly, the energy consumption of receiving a b(bits) packet by n j is formulated as
E r x ( j , b ) = b E e l e c
where E e l e c represents the circuit energy consumption consumed by the sensor to send or receive each bit of data transmission, ε f s and ε a m p are the expended amplification energy in free space and multipath fading space, respectively, while d t h r = ζ f s / ζ a m p is the threshold distance in meters, and d i , j denotes the Euclidean distance from sender n i to receiver n j .

3.3. Problem Description

As shown in Figure 2, before forwarding the packet to the next hop routing node, the sender needs to construct a CFS within its communication range and copy the packet to all nodes in this set. However, if too many forwarders are selected, the number of packet replicas in the network will increase, resulting in higher communication energy consumption for the nodes. The surviving nodes will quickly die due to energy depletion, thereby exacerbating the intermittent connectivity problem of the post-disaster network; On the contrary, if the number of forwarders is too small, the packet delivery rate of the post disaster network cannot be guaranteed, resulting in lower reliability of the post-disaster data transmission. Therefore, the size of the constructed CFS will affect the transmission performance of the entire post-disaster network. In the multi-hop routing network of MIoT, the post-disaster data transmission in the planar accident area has a directional characteristic towards the sink. In order to reduce the transmission energy consumption of residual nodes and improve the success rate of packet forwarding, the CFS should be constructed by selecting nodes with high residual energy, more neighboring nodes and closer to the sink. After the CFS is determined, it is necessary to further optimize the packet forwarding strategy and select an optimal forwarder from the CFS as the relay node for the current sender. Since the energy of the surviving nodes in the accident area is limited and cannot be replenished after the disaster, energy conservation is a mainly consideration in the post disaster data transmission. In order to reduce the transmission energy consumption generated by forwarding packets, candidate nodes that are farther away from the sink and have lower residual energy should be avoided selecting as relay nodes. Besides, in the accident rescue scenario of the fully mechanized mining face, surviving nodes will be damaged by the environment factor in the accident area and fail at any time, leading to an increase in the probability of invalid nodes being selected as relay nodes. During the post-disaster data transmission, when invalid nodes are selected as relay nodes, data packets will be discarded by the nodes, which not only increases the network energy consumption but also reduces data transmission efficiency. In Figure 2, there are no available relay nodes within the forward communication range towards the sink for the invalid node. Therefore, it is necessary to find new recovery relay nodes on the reverse transmission path towards the sink and continue to forward packets.

4. Proposed DEOR Algorithm

To solve the routing problem described in Section 3.3, a directional-area-forwarding-based energy-efficient opportunistic routing (DEOR) for the post-disaster MIoT network is proposed, aiming to improve the energy efficiency and the data transmission reliability of the post-disaster MIoT network in the planar accident mine. The proposed DEOR algorithm mainly consists of three parts: candidate forwarding set construction, relay node selection, and void routing node recovery. Firstly, a directional-area-forwarding-based candidate forwarding set construction strategy is designed. In the initialization phase, according to the deployment density and communication radius of nodes in the accident roadway, a forwarding zone (FZ) is designed for each node to route packets toward the sink. Then, the CFS is constructed by the nodes within the FZ that satisfy the energy constraint and the neighboring node degree constraint. Subsequently, a relay nodes selection method based on routing quality evaluation is proposed. In the data transmission phase, we take multiple attributes of nodes into account, such as direction angle, transmission distance, and residual energy. All nodes in CFS are prioritized based on the routing quality evaluation and the node with the highest priority is selected as the relay to forward packets. Finally, a recovery mechanism for void nodes is designed. When packets encounter the routing void during forwarding, a recovery mechanism is triggered. By employing the modified routing quality evaluation function, packets can bypass the void region and select available relay nodes to continue forwarding. Details are described below.

4.1. Construction of Candidate Forwarding Set

In this section, we mainly provide a detailed presentation to the construction of Candidate Forwarding Set (CFS). OR utilizes multiple neighbors of the sending node to simultaneously receive and forward packets, thus improving the packet forwarding efficiency. Therefore, the construction criterion of CFS is particularly important in opportunity routing design.
In general, the size of the CFS can affect the post-disaster network performance. The larger the CFS, the more packet copies are generated, the higher packet transfer success rate, however, the waiting time of the sender will also be longer, leading to higher energy consumption and end-to-end latency. On the contrary, the smaller the CFS, the sparser the network topology, and the lower packet transfer success rate, resulting in unreliable data transmission after the disaster. To address the above issue, this paper proposes a directional-area-forwarding-based candidate forwarding set construction strategy. Here, we take the packet forwarding process from the source node ni to the sink in the post disaster network as an example to build a schematic diagram of the CFS selection of node ni, as shown in Figure 3.
Figure 3. Schematic diagram of CFS selection.
Figure 3. Schematic diagram of CFS selection.
Preprints 81012 g003
As shown in Figure 3, it shows the selection of the CFS in proposed DEOR algorithm. It can be seen that when the accident area is certain, the size of CFS is related to the network density D . The higher the network density, the greater probability of packets being overheard and duplicated. In addition, the direction of data transmission in the accident mine is upward to the sink. In order to reduce transmission energy consumption, nodes closer to the sink should be selected as much as possible when constructing the CFS. Therefore, to restrict the number of forwarders and reduce the energy consumption, we defined a Forwarding Zone (FZ) for each node n i , denoted by F i , so that the packets will be routed upwards to the sink within the F i . The size of the FZ is determined by the network density D , larger network density means smaller FZ and fewer forwarders, and vice versa, such that the number of forwarders can be dynamically adjusted. Here, we denote the network density D as
D = 1 2 ( 4 π | N | r 2 A + i = 0 | N | m i | N | ) = 1 2 A | N | ( 4 π | N | 2 r 2 + A i = 0 | N | m i )
where the first term reflects the deployment density in the target field, the second term reflects the degree of connections between sender and other nodes. Note that, ( π | N | r 2 ) is the sum area of | N | nodes, | N | is the size of post-disaster network, r is the communication radius of nodes, A is the area of target field, and m i is the number of neighbors of n i .
In Figure 3, it can be seen that FZ is a rectangular shape with a size of l i × w i defined by four points ( f 1 , f 2 , f 3 , f 4 ) , where the length of FZ is the Euclidean distance from the node to the sink, i.e., l i = d i , sink . Obviously, the width of FZ w i is related to the communication range r and the network density D . The higher the network density, the smaller the width. According to the model studied in [35], the maximum width of FZ satisfies w i , m a x 4 r . Consequently, the w i is expressed as
w i = 4 r D = 4 r 2 A | N | 4 π | N | 2 r 2 + A i = 0 | N | m i
The location of the sink denoted by ( x sink , y sink ) . In the network initialization phase, each node n i computes the location the four points of the F i using formular 5. These four points ( f 1 , f 2 , f 3 , f 4 ) are attached to the header of packets. Obviously, the number of forwarders can be limited according to FZ.
f 1 = ( x sink + w i ( y sink y i ) 2 d i , sink , y sink + w i ( x i x sink ) 2 d i , sink ) f 2 = ( x sink w i ( y sink y i ) 2 d i , sink , y sink w i ( x i x sink ) 2 d i , sink ) f 3 = ( x i + w i ( y sink y i ) 2 d i , sink , y i + w i ( x i x sink ) 2 d i , sink ) f 4 = ( x i w i ( y sink y i ) 2 d i , sink , y i w i ( x i x sink ) 2 d i , sink )
We define the neighbor set of n i within the forwarding zone as F i . In Figure 3, the candidate zone (CZ) of each node n i is defined as the intersection area between the forwarding zone F i and the communication range of n i . Furthermore, the set of nodes within CZ is described as
Z i = { n j | n j ( F i N i ) }
In practice, due to the harsh underground mine environment after the disaster, there still exists the problem of nodes failure at any time. Therefore, in order to void encountering void routing during packet forwarding, candidate nodes with more neighbor nodes should be selected, so that the packet transmission success rate can be improved. In addition, candidate nodes with relatively high residual energy should be selected to balance the node load and extend the network lifetime. Consequently, the node n j in the CFS of node n i should satisfy the formula 7 and formula 8.
N ( m i ) = { { n j , n v } N i | m j v m v m i }
N ( ε i ) = { { n j , n v } N i | ε j 1 2 v ε v m i }
where m j and m v represent the number of neighbor nodes of n j and n v , respectively, while ε j and ε v represent the residual energy of n j and n v , respectively.
As a result, the nodes satisfying formula 6, formula 7, and formular 8 constitute the candidate forwarding set C u p ( i ) of n i as
C u p ( i ) = Z i N ( m i ) N ( ε i )
In this article, the constructed candidate forwarding set C u p ( i ) restricts the number of forwarders, which contributes to reduce the waiting time of the sender. Moreover, the nodes in C u p ( i ) have the characteristics of high energy and more neighboring nodes, which is conductive to improving the network lifetime and data transmission reliability of post-disaster MIoT. The pseudocode of the selection of candidate forwarding set is shown in Algorithm 1.
Algorithm 1: Construct the Candidate Forwarding Set
Input:  C u p ( i ) =
Output: The candidate forwarding set C u p ( i )
1: for each node n i N  do
2:    Define the Forwarding Zone F i using Eq. (5)
3:    Get the subset Z i using Eq. (6)
4: end for
5: for each node n j N i do
6:    Get the subset N ( m i ) using Eq. (7)
7:    Get the subset N ( ε i ) using Eq. (8)
8:  if  n j Z i &&&& n j N ( ε i )
9:    then add n v C u p ( i )
10:   end if
11: end for
12: if  C u p ( i ) ! =
13:    then  C ( i ) = C u p ( i )
14:    switch to Algorithm 3
15: else
16:    switch to Algorithm 2
17: end if

4.2. Selection of Relay Node

In this section, the proposed relay nodes selection method based on routing quality based on is described in detail. In opportunistic routing, the relay node is the ultimate node responsible for packets forwarding, so the selection of relay nodes will directly affect the performance of data transmission in the post-disaster MIoT. After the candidate forwarding set is determined, we need to further optimize the forwarding strategy with the goal of selecting the optimal forwarder as the next-hop relay node. Based on the system model shown in Figure 2, aiming to reduce the energy consumption for data transmission in the post-disaster MIoT, an energy-efficient routing path should be selected from the source to the sink [36]. Here, we design a routing quality evaluation function in DEOR for forwarders that considers three factors, including direction angle, transmission distance, and residual energy of nodes. The smaller the directional angle attribute value of the current forwarder, the closer the forwarder is to the sink, and the lower the transmission energy consumption of sensor nodes. The larger the relative distance attribute value between the sender and forwarder, the farther the transmission distance of the current forwarder is within the same communication range, which shortens the total routing path for packets forwarding, and thus reducing the transmission energy consumption of the post-disaster network. In this article, the schematic diagram of the directional angle and transmission distance between sender n i and forwarder n j is shown in Figure 4. Then, nodes in CFS are prioritized based on the routing quality value. After the forwarder’s coordination, the node with the highest priority is selected as the relay to forward packets and other nodes in CFS will drop packets after listening for a successful transmission message.
Figure 4. (a) The direction angle θ i , j from n i to n j with respect to the location of the sink. (b) The transmission distance d i , j from n i to n j .
Figure 4. (a) The direction angle θ i , j from n i to n j with respect to the location of the sink. (b) The transmission distance d i , j from n i to n j .
Preprints 81012 g004
As shown in Figure 4 (a), the directional angle attribute of the node is considered in this paper to give higher priority to forwarders closer to the sink. The direction angle θ i , j between the sender n i and the neighbor n j towards the sink is expressed by formular 10, where a = ( x j x i , y j y i ) and c = ( x sink x i , y sink y i ) . Figure 4(a) shows that smaller the direction angle θ i , j between the sender n i and its neighbor n j , closer the neighbor n j is to the sink and can provide lower energy consumption for packets forwarding. To avoid the situation when θ i , j = 0 , the θ i , j is normalized into θ ¯ i , j by formular 11, where 1 θ ¯ i , j 2 . Then, the distribution of the direction angle θ ˜ i , j is obtained by using the mass function expressed as formular 12.
θ i , j = a r c c o s a c | | a | | | | c | |
θ ¯ i , j = 3 θ i , j 2
θ ˜ i , j = e ( θ ¯ i , j ) α θ k = 0 c i e ( θ ¯ i , k ) α θ
where c i is the number of nodes in C ( i ) , { n j , n k } C ( i ) , α θ ( α θ 0 ) is the control parameter of the direction angle factor. Note that, the larger α θ indicates the greater probability distribution of forwarder, which are closer to the sink being selected as relay nodes.
As shown in Figure 4 (b), the transmission distance attribute of nodes is considered in our work to give higher priority to forwarders that are further away from the sender. This is because when the communication radius r of nodes is fixed, larger the distance between the sender n i and its neighbor n j means the shorter the routing path toward to the sink, thereby reducing the energy consumption for routing packets. The transmission distance d i , j between n i and n j is represented by formular 13. The variable d i , j is normalized to d ¯ i , j by formular 14, where d ¯ i , j [ 1 , 2 ] . Then, the distribution of transmission distance d ˜ i , j is obtained by using the mass function expressed as formular 15.
d i , j = ( x i x j ) 2 + ( y i y j ) 2
d ¯ i , j = d i , j + r r
d ˜ i , j = e ( d ¯ i , j ) α d k = 0 c i e ( d ¯ i , k ) α d
where α d ( α d 0 ) is the control parameter of the transmission distance factor. Note that, the larger α d indicates the greater probability distribution of forwarder, which are closer to the sink being selected as relay nodes.
Furthermore, some network nodes can deplete energy earlier than others nodes due to undertaking more packet forwarding in data transmission. In order to balance the load of network nodes, the energy attribute of nodes is also considered in our work to give higher priority to forwarders with greater residual energy. For a forwarder n j of the sender n i , the residual energy ε i , j is normalized to ε ¯ i , j by formular 16. Then, the distribution of remaining energy ε ˜ i , j is obtained by using the mass function expressed as formular 17.
ε ¯ i , j = ε i , j + e i n i e i n i
ε ˜ i , j = e ( ε ¯ i , j ) α ε k = 0 c i e ( ε ¯ i , k ) α ε
where e i n i is the initial energy of n j , α ε ( α ε 0 ) is the control parameter of the energy factor. Note that, the larger α ε indicates the greater probability distribution of forwarders, which have greater remaining energy being selected as relay nodes.
Based on the above analysis, we define the routing quality of n i ’s forwarder n j as the product of the directional angle factor θ ˜ i , j , the transmission distance factor d ˜ i , j and the residual energy factor ε ˜ i , j , which expressed as Q ˜ i , j by formular 18. Then, it is normalized to Q ¯ i , j by formular 19.
Q ˜ i , j = θ ˜ i , j × d ˜ i , j × ε ˜ i , j
Q ¯ i , j = Q ˜ i , j k = 0 c i Q ˜ i , k = e ( ( ε ¯ i , j ) α ε ( θ ¯ i , j ) α θ + ( d ¯ i , j ) α d ) k = 0 c i e ( ( ε ¯ i , k ) α ε ( θ ¯ i , k ) α θ + ( d ¯ i , k ) α d )
According to formular 19, we can deduce that the forwarder with higher routing quality Q ¯ i , j has a higher chance of being selected as a relay node. Note that, these three factors are controlled by three control parameters α θ , α d and α ε , respectively, so that increasing the value of any control parameter will enhance the impact of the corresponding indicator. Normally, the control parameters are set to α θ = α d = α ε = 1 .
Once the CFS of the sender is determined, the number of packet replicas needs to be limited by the collaboration of candidate forwarders, ensuring that only one forwarder is selected as relay node to forward packets. In this article, the proposed relay node selection method based on routing quality evaluation determines the optimal relay node for packets forwarding, so that an energy-efficient routing path between the sender and the sink will be achieved. By utilizing the local metrics of forwarders to make routing decisions, DEOR reduces routing overhead and extends network lifetime. The schematic diagram of relay node selection is shown as Figure 5.
Figure 5. Schematic diagram of relay node selection.
Figure 5. Schematic diagram of relay node selection.
Preprints 81012 g005
According to the routing quality Q ¯ i , j value, we sort the forwarders of n 1 in descending order, denoted as C ( Q ¯ i ) . As we can see in Figure 5, for the current sender n 1 carrying packets, C u p ( 1 ) is the candidate forwarding sets of n 1 . When n 1 needs to find the next hop, it will send a request message to all neighbors. Based on the directional angle, transmission distance and residual energy of nodes, they calculate their Q ¯ i , j value using formular 19. The sender n 1 selects the candidate with the largest Q ¯ i , j value as the next hop. The best relay node n 4 forwards the packets, and if the transmission is successful, other nodes n 2 and n 3 discard packets copies. Since n 4 is not the destination node, it becomes the new sender and continues to select the next hop through the above process until the packet is forwarded to the sink. Finally, a complete routing path is formed in the network, denoted as ( n 1 ,   n 4 ,   n 6 ,   n 9 ,   S i n k ) in Figure 5. The pseudocode of the selection of relay nodes is shown in Algorithm 2.
Algorithm 2: Select the Best Relay Nodes
Input: Q ¯ i , j = Q ¯ i , 1 , Q ¯ i , 2 , , Q ¯ i , c i )
Output: The ID of the best relay nodes
1: for each node n j C ( i ) do
2:  node n j receives the packets sent by node n i
3:  Get the θ ˜ i , j using Eq. (12)
4:  Get the d ˜ i , j using Eq. (15)
5:  Get the ε ˜ i , j using Eq. (17)
6:  Calculate Q ¯ i . j using Eq. (19)
7:  sort Q ¯ i , 1 , Q ¯ i , 2 , , Q ¯ i , c i ) in descending order to C ( Q ¯ i )
8: end for
9: select the node n j from the highest - C ( Q ¯ i )
10: if  n j forwards the packet successfully
11:  then other nodes in C ( i ) drop the packet
12: else
13:  set the node n j = n v where n j has lower - C ( Q ¯ i )
14: end if
15: until the timer expired
16: if packet is not delivered to Sink
17:  then  n s e n d e r = n j
18:  switch to Algorithm 1
19: end if

4.3. Recovery Mechanism

In this section, we describe in detail of a recovery mechanism in the proposed DEOR. The collapse of loose coal in mines after disasters and the depletion of node energy are common phenomena, which can increase the probability of void nodes being selected as relay nodes [37]. However, although the above methods reduce the probability of selecting void nodes, it cannot completely avoid the problem of void routing. According to the Figure 2, we assume that the routing node n j of the current sender n i is an invalid node, the routing recovery process of void nodes in the post-disaster MIoT network is shown in Figure 6. By adopting the proposed recovery mechanism, the current void node n j can quickly find the optimal relay recovery node n k on the reverse routing path towards the sink, thereby bypassing the void area and improving the packet delivery rate of post-disaster network data transmission.
Figure 6. Schematic diagram of recovery mechanism.
Figure 6. Schematic diagram of recovery mechanism.
Preprints 81012 g006
In Figure 6, if relay node n j of sender n i is a void node, no neighbors in upward path to sink can forward packets, i.e., the candidate forwarders set C u p ( j ) obtained according to Algorithm 1 is empty. Here, we denote the set of neighbor nodes of the void node n j as N j , its subset of neighbors N ( d j ) in downward path can be defined as
N ( d j ) = { n k N j N | d k , sink d j , sink 0 }
where n k is the neighbor of void node n j , d j , sink = ( x j x sink ) 2 + ( y j y sink ) 2 represents the Euclidean distance from n j to the sink.
Similar to formular 8, in order to ensure load balancing and energy conservation in the post-disaster network, nodes with higher residual energy should be selected. Hence, the subset N ( ε j ) of nj’s neighbors that satisfy energy constraints is denoted as
N ( ε j ) = { { n k , n l } N j N | ε k 1 2 l ε l m j ) }
Combining formular 20 and formular 21, the candidate recovery node set C d o w n ( j ) of void node n j can be defined as
C d o w n ( j ) = N ( d j ) N ( ε j )
Unlike the routing method described in Section 4.2, when an invalid node n j selects a recovery relay node in downward path to the sink, it will consume more energy to forward packets to nodes at greater distances. Therefore, the neighbor node with a smaller transmission distance difference from the void node should be selected as the recovery relay node. Consequently, in the recovery mechanism, formula 15 and formular 19 should be rewritten as
d ˜ j , k = e ( d ¯ j , k ) α d k = 0 c j e ( d ¯ j , k ) α d
Q ¯ j , k = Q ˜ j , k l = 0 c j Q ˜ j , l = e ( ( ε ¯ j , k ) α ε ( θ ¯ j , k ) α θ ( d ¯ j , k ) α d ) k = 0 c j e ( ( ε ¯ j , l ) α ε ( θ ¯ j , l ) α θ ( d ¯ j , l ) α d )
where c j is the number of candidate forwarders of void node n j .
Once the void node forwards packets to a normal routing node, it exits the recovery mechanism and continues to route packets to the sink, as described in Section 4.1 and Section 4.2. In the recovery mechanism, nodes will record the ID of the previous hop node, and these nodes will not be repeatedly selected when selecting the recovery relay node, thus avoiding routing loops. By utilizing the updated routing quality assessment, void nodes can select appropriate recovery relay nodes downward in the planar accident mine, thereby effectively restoring the transmission path. The pseudocode of the recovery mechanism is shown in Algorithm 3.
Algorithm 3: Recovery Mechanism of Void Nodes
Input:  N i
Output: The candidate recovery forwarding set C d o w n ( i )
1: for each node n j N i  do
2:    Get the subset N ( d j ) using Eq. (20)
3:    Get the subset N ( ε j ) using Eq. (21)
4:    if n j N ( d j ) & &   n j N ( ε j )
5:     then add n j C d o w n ( i )
6:    C ( i ) = C d o w n ( i )
7:    end if
8: end for
9: switch to Algorithm 2

4.4. Analysis and Flowchart of DEOR

According to the pseudocode of the three sub-algorithms, the DEOR algorithm mainly consists of a cycle in the calculation process, so the computational complexity of the proposed DEOR in this paper is O ( N ) , where N is the number of nodes in the network. The energy consumption in DEOR entirely depends on how many nodes in the sender’s forwarding zone. For the post-disaster MIoT network, this complexity is usually within the computing capacity of nodes, and the proposed DEOR is an energy-saving routing strategy. Therefore, the surviving nodes have the ability to execute the DEOR algorithm, which restricts the number of duplicate packets generated in the network and avoids routing void problem during data transmission.
The proposed DEOR is an opportunistic routing algorithm that considers both global and local information of the network. Nodes make routing decisions based on network density and multiple attributes of neighboring nodes. The flowchart of DEOR is shown as Figure 7. Firstly, during the network initialization phase, each node defines a forwarding area based on the current network density. Then, the sender constructs a candidate forwarding set (CFS) according to the candidate region constraint, energy constraint, and neighboring node degree constraint. If the CFS is empty, the recovery mechanism is activated. Next, the nodes within the CFS calculate their routing quality Q ¯ i , j values, and be sorted in descending order to C ( Q ¯ i , j ) . The nodes in C ( Q ¯ i , j ) are selected in sequence as relay nodes to forward the packets before the timer expires, otherwise the data transmission fails. Finally, if any node in CFS successfully forwards the packet, the other nodes will discard the packet copies and loop the above process until the packet is routed to the sink.
Figure 7. Flowchart of the proposed DEOR.
Figure 7. Flowchart of the proposed DEOR.
Preprints 81012 g007

5. Performance Evaluation

In this section, MATLAB R2018b simulator is applied to evaluate the performance of the DEOR algorithm [38]. First, the simulation settings are introduced before evaluations. Then, DEOR is compared with ORR [39], OBRN [40], and ECSOR [41] in terms of energy consumption, average hop count, packet delivery rate, and network lifetime. ORR is a centralized opportunistic routing algorithm based on distance and residual energy, OBRN is a distributed opportunistic routing algorithm based on energy and load, and ECSOR is a distributed opportunistic routing algorithm optimized for the forwarder nodes set.

5.1. Simulation Settings

Considering the actual post-disaster MIoT environment, we deploy all nodes randomly in a sensing area of 300 m × 50 m in the simulation. This deployment approach ensures that the simulation results in different scenarios are independent of each other. Suppose a sink node with unlimited energy is fixed at the edge of the sensing area and act as a gateway for wireless communication with sensor nodes. Similar to most wireless network routing protocols, we use the Carrier Sense Multiple Access (CSMA) protocol as the underlying MAC protocol. If the channel is idle, the forwarding node can broadcast the data packet. Otherwise, it backs off and the packet will be dropped after backing off for the maximum retransmission times. The maximum retransmission times of each node is set to 4, and the maximum error ratio of each link is set to 0.2. We assume that the network generates a data packet from a random sensor node to the sink in each 0.1s. The size of the data packet is set to 1024bits. The parameter settings required for the simulation are shown in Table 3.
Table 3. Simulation Parameters.
Table 3. Simulation Parameters.
Parameters Valus
Network topology Random
Deployment area 300 m × 50 m
Generate rate 1packet/0.1s
Number of nodes
Sink
200-300
1 static sink (edge)
Transmission rate 1Mbps
Communication range 40m
Simulation time 2000s
RF channels 2.4GHz
Packet size
Initial energy
Sleep power
1020bits
0.5J
0.78mW
E elec
ε amp
ε fs
50 nJ / bit
0.0013 pJ / bit / m 4
10 pJ / bit / m 2
The following routing metrics are used to evaluate the performance of routing algorithms: 1) Energy Consumption (EC): EC is defined as the total energy consumption required to deliver data packets from source nodes to the sink. 2) Average Hop Count (AHC): AHC is defined as the average hop count on the routing path from source to the sink for forwarding data packets. 3) Packet Delivery Ratio (PDR): PDR is defined as the ratio of the number of packets successfully received at the sink to the number of data packets generated by source nodes. 4) Network Lifetime (NL): NL is defined as the time (in seconds) from the simulation starting moment to the moment that the first node completely depletes its energy.

5.2. Effect of Control Parameters

According to formular 19, the routing quality is the multiplication product of three factors, i.e., θ ˜ i , j , d ˜ i , j and ε ˜ i , j . Therefore, increasing the value of any control parameter will enhance the impact of the corresponding factors on routing performance. The control parameters ( α θ , α d , α ε ) can be adjusted to meet the requirements of the various application for post-disaster MIoT. However, there may be a factor that is ineffective in routing in some cases. In order to select the optimal forwarders in the routing process, the setting of control parameter values should ensure that they have a certain effect on three factors. Besides, in order to maximize the lifetime of the post-disaster network, the value of the energy control parameter α ε should be larger than the other two parameters ( α θ , α d ) . In the simulation, the number of nodes is set to 200, the communication range of nodes varying from 30m to 50m, the two control parameters is set to α θ = α d = 1 , and the value of α ε varying from 1 to 6. We can clearly see that when the communication range r is fixed, the network lifetime increases with the larger of α ε . When α ε = 5 , the growth of network lifetime tends to be stable. Therefore, the DEOR algorithm ensures good performance in terms of network lifespan for different control parameters α ε values.
Figure 8. Network lifetime varying control parameters.
Figure 8. Network lifetime varying control parameters.
Preprints 81012 g008

5.3. Performance for Varying Communication Ranges

According to formular 3, it can be seen that for a given sensing area, the network density D is determined by the number of nodes N and the communication range r . The more network nodes or the larger the communication range, the higher the network density. Accordingly, we evaluate the network performance of the DEOR algorithm by varying the communication ranges r and the number of nodes N . In the simulation, the control parameter is set to α θ = α d = α ε = 1 , the number of nodes is set to 200, and the communication range r is varied from 30m to 50m. Other parameters are listed in Table 3. The results can be found in Figure 9, Figure 10, Figure 11 and Figure 12.
Figure 9. Energy consumption varying communication range.
Figure 9. Energy consumption varying communication range.
Preprints 81012 g009
Figure 10. Average number of hops varying communication range.
Figure 10. Average number of hops varying communication range.
Preprints 81012 g010
Figure 11. Packet delivery ratio varying communication range.
Figure 11. Packet delivery ratio varying communication range.
Preprints 81012 g011
Figure 12. Network lifetime varying communication range.
Figure 12. Network lifetime varying communication range.
Preprints 81012 g012
Figure 9 illustrates the influence of the communication range on the energy consumption. From Figure 9, we can see that the energy consumption of all four routing algorithms decreases with the increase of communication range r . This is because as the communication range r increases, the number of hops for packets forwarding to sink will correspondingly decrease, which means that the number of nodes involved in forwarding decreases, and therefore the total energy consumption of the network is reduced. The network energy consumption in ORR is the highest because ORR is a centralized routing algorithm that through utilizing a large number of control packets to transmit nodes information to the sink when calculating routing metrics, resulting in significant energy consumption. Compared with OBRN and ECSOR, DEOR has the least energy consumption. This is because in DEOR, the number of forwarding nodes is restricted by the directional forwarding zone, see formular 6. The sender will dynamically adjust the number of candidate forwarders based on the current communication range r , thereby reducing the number of packet replicas. In addition, based on formular 17, DEOR balances the load of nodes close to the sink and improves the energy utilization efficiency of nodes. Therefore, DEOR has better energy efficiency than ORR, OBRN, and ECSOR.
Figure 10 illustrates the influence of the communication range on the average hop count of delivered packets. It can be clearly seen that as the communication range r increases, the number of routing hops decreases for all four algorithms. This is because the larger the communication range r , the greater the transmission distance of nodes, which means that the packets routing path from the source node to the sink is shortened, and therefore fewer nodes are involved in forwarding. Compared with ORR, OBRN, and ECSOR, DEOR has the least number of hops because the DEOR can adjust the density of candidate nodes in the target area based on the communication range r , and thus dynamically select the appropriate number of forwarders. Besides, DEOR considers the relationship between link length and transmission range, thus ensuring a lower number of hops in the routing path.
Figure 11 illustrates the influence of the communication range on the packet delivery ratio. It is obvious from Figure 11 that DEOR is better than ORR, OBRN and ECSOR, because the PDR of the network is related to the link quality and the number of forwarding nodes. The DEOR algorithm takes into account the effect of transmission distance d i , j on routing when selecting relay nodes, ensuring better path quality of packets throughout the entire routing process. Moreover, DEOR makes each node have multiple forwarders through a recovery mechanism for void routing, which means that when a sender encounters a void node, it can quickly find recovery relay nodes, which in turn improves the packet delivery rate. However, ORR, OBRN, and ECSOR only consider the energy and load factors to make routing decisions. When encountering void nodes, a large number of control packets need to be sent to update network information to calculate new forwarders set, see formular 24, which leads to a higher probability of packet loss. As a result, the DEOR algorithm outperforms the other three algorithms in terms of PDR.
Figure 12 illustrates the influence of the communication range on the network lifetime. As can be seen in Figure 12, the network lifetime of all four algorithms increases as the communication range r becomes larger. Compared to ORR, OBRN, and ECSOR, DEOR achieves the longest network lifetime, while ORR has the shortest network lifetime. In OBRN and ECSOR, the remaining energy of nodes around the sink is not considered when selecting forwarders. There exits that node near the sink participating in excessive packets forwarding, leading to the hotspot problem. Thus, premature depletion of energy by critical routing nodes causes network connection interruption. However, in DEOR, only nodes in the upward path to the sink are eligible to forwarding packets, which effectively reduces the number of redundant packets and shortens the routing path. Meanwhile, DEOR balances the load of nodes through transmission distance factor d ˜ i , j in routing decisions, thereby reducing energy consumption. As a result, DEOR has a longer network lifetime than ORR, OBRN and ECSOR.

5.3. Performance for Varying Number of Nodes

In this section, we evaluate the network performance of the DEOR algorithm by varying the numbers of nodes from 200 to 300. In the simulation, the control parameter is set to α θ = α d = 1 , α ε = 5 , and the communication range is set to 40m. Other parameters for this simulation are listed in Table 3. The results can be found in Figure 13, Figure 14, Figure 15 and Figure 16.
Figure 13. Energy consumption varying number of nodes.
Figure 13. Energy consumption varying number of nodes.
Preprints 81012 g013
Figure 14. Average number of hops varying number of nodes.
Figure 14. Average number of hops varying number of nodes.
Preprints 81012 g014
Figure 15. Packet delivery ratio varying number of nodes.
Figure 15. Packet delivery ratio varying number of nodes.
Preprints 81012 g015
Figure 16. Network lifetime varying number of nodes.
Figure 16. Network lifetime varying number of nodes.
Preprints 81012 g016
Figure 13 illustrates the influence of the number of nodes on the energy consumption. It is clearly seen that as the number of nodes becomes larger, the energy consumption of all four routing algorithms increases. This is because when the size of the monitoring area is fixed, more nodes in the network imply a higher network density, then the number of nodes involved in forwarding increases. Excessive forwarding nodes will generate more redundant packets in the network, which in turn leads to higher energy consumption. DEOR has the smallest increase in energy consumption among the four algorithms, due to the number of forwarders in DEOR is controlled by the network density D . According to formular 4, when the network density D increases, the width w i of the forwarding area will decrease, thereby limiting the number of nodes in the CFS. However, for ORR, OBRN, and ECSOR algorithms, as the number of nodes in the network increases, the number of nodes participating in forwarding will also increase, generating more redundant packets and therefore leading to more energy consumption.
Figure 14 illustrates the influence of the number of nodes on the average hop count of delivered packets. It is observed that the average hop count in all four algorithms gradually decreases as the deployment density of nodes increases. This is because when the communication radius r of nodes is fixed, the number of nodes in the network is small leading to a sparse local topology and packets need to pass through a large number of relay nodes to enter the coverage range of the sink. Therefore, the average number of hops for packets forwarding is higher. On the contrary, when the number of nodes is higher, there are fewer void nodes and packets are theoretically able to enter the coverage of the sink through the shortest path, resulting in fewer average number of hops. Compared with ORR, OBRN, and ECSOR, DEOR has the fewest number of hops. According to formular 23, DEOR updates the transmission distance metric in the routing decision. DEOR selects optimal relay nodes closer to the void node by adopting a recovery mechanism, thereby shortening the length of the communication link.
Figure 15 illustrates the influence of the number of nodes on the packet delivery ratio. Obviously, the PDR of all four algorithms gradually increases as the number of nodes becomes larger. When the deployment density of nodes is higher, the probability of routing void areas will decrease, and there are more available candidate nodes for packet forwarding. As a result, the probability of packet loss is reduced and the packet delivery success rate is improved. ORR has the lowest PDR among the four routing algorithms. This is because only the residual energy of nodes is considered in ORR. If there are fewer nodes in the network, it is prone to a large amount of packet loss. Additionally, as shown in Figure 15, when the number of nodes approaches 300, the PDR of OBRN, ECSOR, and DEOR algorithms are close to the same, approximately 90%. However, when the number of nodes is less than 300, the DEOR algorithm is significantly better than OBRN and ECSOR. This is because when a sparse topology appears in the network, DEOR can increase the number of forwarders, thereby improving the reliability of successful packet forwarding.
Figure 16 illustrates the influence of the number of nodes on the network lifetime. From Figure 16, it can be seen that the network lifetime of the four routing algorithms increases as the number of network nodes increases. This is because DEOR designs a candidate forwarding zone (FZ) for all senders to make appropriate routing decisions. DEOR can limit the number of nodes involved in packets forwarding based on the current network density D , reducing the number of redundant packets generated in the network and thus reducing network energy consumption. Furthermore, DEOR utilizes a routing quality function to balance the traffic load of forwarding nodes, overcoming the problem of hot spots caused by critical routing nodes near sink, and thus improving the network lifetime.

6. Conclusions

In this paper, we propose a directional-area-forwarding-based energy-efficient opportunistic routing (shorted as DEOR) algorithm for the post-disaster MIoT network. Firstly, in order to restore post-disaster data transmission of MIoT in the planar accident area rescue scenarios such as fully mechanized coal face, we design a multi-hop opportunity routing network architecture composed of one sink node and several survival sensor nodes. Then, according to the forwarding area constraint, energy constraint and neighbor node degree constraint, DEOR constructs the candidate forwarding sets to restrict the number of duplicate packets and improve the energy utilization of nodes. Moreover, to meet multiple quality-of-service requirements of the post-disaster MIoT, a routing quality function is designed by considering the directional angle, transmission distance, and residual energy attributes of nodes. DEOR selects a relay node to forward packets based on the priority of the nodes in the CFS, which ensures the network load balancing. Finally, we propose a recovery mechanism aimed at bypassing the void area and forwarding the packets continuously, which can reduce retransmissions and improve the network connectivity. The simulation results demonstrated the proposed DEOR algorithm achieves better performance compared to the ORR, OBRN and ECSOR in terms of energy consumption, average hop count, packet delivery ratio, and network lifetime.
In our future work, we intend to investigate a more reasonable method to obtain the location information of sensor nodes for post-disaster mining scenarios. Moreover, how to construct a realistic post-disaster mine roadway simulation experimental platform is also a meaningful research topic.

Author Contributions

Conceptualization: Q.Z. and W.Y.; writing—original draft preparation: Q.Z., W.Y. and L.Y.Z.; writing—review and editing: Q.Z, W.Y. and L.Y.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of China under Grant, grant number 51874299.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

No applicable.

Data Availability Statement

No applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Sun, J.P. New technology and development of mine informatization and automation. Coal Science and Technology, 2016, 44, 19-23+83.
  2. Yuan, L. Framework and key technologies of Internet of things for precision coal mining. Industry and Mine Automation, 2017, 43, 1-7.
  3. Li, S.G.; Ma, L.; Yang, S.G. Key technology and application framework of internet plus mine safety informationization. Coal Science and Technology, 2016, 44, 33-40.
  4. Sun, J.P. Accident analysis and big data and Internet of Things in coal mine. Industry and Mine Automation, 2015, 41, 1-5.
  5. Zheng, X.Z.; Tong, X.; Guo, J.; Zhang, D. Research status and development trend of intelligent monitoring and early warning technology in coal mine. Industry and Mine Automation, 2020, 46, 35-40.
  6. Sun, J. P.; Qian, X.H. Emergency rescue technology and equipment of mine extraordinary accidents. Coal Science and Technology, 2017, 45, 112-116+153.
  7. Sun, J. P.; Zhang, G.M. Mine emergency communication system. Industry and Mine Automation, 2019, 45, 1-5.
  8. Hu, Q. S.; Yang, W.; Ding, E.J.; Li, S.Y.; Li, B.H. State-of-the-art and trend of emergency rescue communication technologies for coal mine. Journal on Communications, 2019, 40, 163-179.
  9. Xu, Y.Y.; Yang, W.; Hu, Q.S. An autonomous discovery mechanism of surviving IoT devices for post-disaster coal mine cellular IoT. Journal of China Coal Society, 2019, 44, 800-807.
  10. Chakchouk, N. A survey on opportunistic routing in wireless communication networks. IEEE Commun. Surveys Tuts., 2015, 17, 2214–2241. [CrossRef]
  11. Wu, W.; Wang, X.; Hawbani, A.; Liu, P.; Zhao, L.; Al-Dubai, A. FLORA: Fuzzy Based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs. IEEE Transactions on Mobile Computing, 2023, 22, 253-268. [CrossRef]
  12. Yang, X.; Xu, Y.; Wang, D.; Hua, G. Virtual-Range-Forwarding-Based Opportunistic Routing for Mine Goaf Sensor Networks. IEEE Sensors Journal, 2022, 22, 22244-22254. [CrossRef]
  13. Yu, X.W.; Zhang, K.; Zhou, X.L.; Zhang, F.; Liu, Q.; Hu, F.M. Routing Protocol in Mine Roadway Based on Area Positive Clustering and Mobile Nodes. Information and Control, 2018, 47, 379-384.
  14. You, K.M.; Yang, W.; Yuan, X.X.; Wang, P.Y. Differentiated services routing protocol of WMSNs for underground coal mines. J.Huazhong Univ.of Sci.& Tech. (Natural Science Edition), 2018, 46, 1-8.
  15. Wu, B.; Zhou, X.; Huang, Q. Optimal Data Routing Algorithm for Mine WSNs Based on Maximum Life Cycle. IEEE Access, 2020, 8, 131826-131834. [CrossRef]
  16. Wu, T.; Yang, W.; Wang, Y.P. Self-organized energy-efficient clustering protocol for post-disaster reconstruction network of coal mine IoT. J.Huazhong Univ.of Sci.& Tech. (Natural Science Edition), 2020, 48, 7-13.
  17. Zhao, Q.; Yang, W.; Hu, Q.S. Adaptive uneven clustering algorithm for post-disaster reconstruction of coal mine IoT. J.Huazhong Univ.of Sci.& Tech. (Natural Science Edition), 2021, 49, 120-126.
  18. Hu, Q.S.; Wang, N.S. Post-disaster reconstruction algorithm of wireless ad hoc network in coal mine. Industry and Mine Automation, 2022, 48, 93-99.
  19. Hu, Q.S.; Fan, X.G.; Li, H. Network hole coverage reconstruction algorithm for post-disaster coal mine Internet of things. Industry and Mine Automation, 2022, 48, 39-45.
  20. Chen, Z.G. Research on Clustering Routing Protocol of Coal Mine Emergency Rescue Network. China University of Mining and Technology, China, 2022.
  21. Dalal, R.; Khari, M.; Anzola, J.P.; García-Díaz, V. Proliferation of Opportunistic Routing: A Systematic Review. IEEE Access, 2022, 10, 5855-5883. [CrossRef]
  22. Sang, Q.; Wu, H.; Xing, L.; Ma, H.; Xie, P. An Energy-Efficient Opportunistic Routing Protocol Based on Trajectory Prediction for FANETs. IEEE Access, 2020, 8, 192009-192020. [CrossRef]
  23. Li, N.; Yuan, X.; Martinez-Ortega, J.-F.; Diaz, V.H. The Network-Based Candidate Forwarding Set Optimization for Opportunistic Routing. IEEE Sensors Journal, 2021, 21, 23626-23644. [CrossRef]
  24. Zhao, Y.; Srivastava, G. A Wireless Mesh Opportunistic Network Routing Algorithm Based on Trust Relationships. IEEE Access, 2022, 10, 4786-4793. [CrossRef]
  25. Li, N.; Yan, J.; Zhang, Z.; Martínez-Ortega, J.-F.; Yuan, X. Geographical and Topology Control-Based Opportunistic Routing for Ad Hoc Networks. IEEE Sensors Journal, 2021, 21, 8691-8704. [CrossRef]
  26. Banyal, S.; Bharadwaj, K.K.; Sharma, D.K.; Khanna, A.; Rodrigues, J. J. P. C. HiLSeR: Hierarchical learning-based sectionalized routing paradigm for pervasive communication and resource efficiency in opportunistic IoT network. Sustain. Comput., Informat. Syst., 2021, 30, 100508. [CrossRef]
  27. Celik, A.; Saeed, N.; Shihada, B.; Al-Naffouri, T.Y.; Alouini, M.-S. Opportunistic Routing for Opto-Acoustic Internet of Underwater Thing. IEEE Internet of Things Journal, 2022, 9, 2165-2179. [CrossRef]
  28. Zhou, X.; Yang, X.; Ma, J.; Wang, K.I.-K. Energy-Efficient Smart Routing Based on Link Correlation Mining for Wireless Edge Computing in IoT. IEEE Internet of Things Journal, 2022, 9, 14988-14997. [CrossRef]
  29. Li Q.; Zhang, L.; Zeng, F.; Pan, Y.; Yang, J. Community Clustering Routing Algorithm Based on Information Entropy in Mobile Opportunity Network. IEEE Access, 2022, 10, 25755-25766. [CrossRef]
  30. Zhang, H.N. Research on Re-localization Method of Drift Nodes after Coal Mine Disaster. China University of Mining and Technology, China, 2021.
  31. Cheng, Y. Research on Relocation Method of Drift Node in Coal Mine. China University of Mining and Technology, China, 2020.
  32. Liang, Y.; Wei, Z.; Chen, Q.; Wu, H. Neighbor Discovery Algorithm in Wireless Ad Hoc Networks Based on Successive Interference Cancellation Technology. 2020 International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 2020, 1137-1141. [CrossRef]
  33. Sorribes, J.V.; Peñalver, L.; Calafate, C.T.; Lloret, J. Collision-Aware Deterministic Neighbor Discovery in Static Ad Hoc Wireless Networks. 2020 Global Conference on Wireless and Optical Technologies (GCWOT), Malaga, Spain, 2020, 1-8. [CrossRef]
  34. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy efficient communication protocol for wireless microsensor networks. Proc. 33rd Annu. Hawaii Int. Conf. Syst. Sci., 2000, 10.
  35. Santi, P. Topology control in wireless ad hoc and sensor networks. ACM Comput. Surveys, 2005, 37, 164-194. [CrossRef]
  36. Sivrikaya, F.; Geithner, T.; Truong, C.; Khan, M.A.; Albayrak, S. Stochastic routing in wireless sensor networks. Proc. IEEE Int. Conf. Commun. Workshops, 2009, 1–5. [CrossRef]
  37. Singh, A.; Kumar, D.; Hötzel, J. IoT Based information and communication system for enhancing underground mines safety and productivity: Genesis, taxonomy and open issues. Ad Hoc Networks, 2018, 78, 115-129. [CrossRef]
  38. Hawbani, A.; Wang, X.F.; Abudukelimu, A.; Kuhlani, H.; AI-Sharabi, Y.; Qarariyah, A.; Ghannami, A. Zone probabilistic routing for wireless sensor networks. IEEE Trans. Mobile Comput., 2019, 18, 728–741. [CrossRef]
  39. So, J.; Byun, H. Load-balanced opportunistic routing for duty-cycled wireless sensor networks. IEEE Trans. Mobile Comput., 2017, 16, 1940–1955. [CrossRef]
  40. Padyal, R.H.; Kadam, S.V. Continuous neighbor discovery approach for improvement of routing performance in WSN. 2017 2nd International Conference for Convergence in Technology (I2CT), India, 2017, 675–679.
  41. Fradj, H.B.; Anane, R.; Bouallegue, R. Energy consumption for opportunistic routing algorithms in WSN. 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Poland, 2018, 259–265.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated