Intl J. of Communications, Network and System Sciences, 2011, 4, 403-415
doi:10.4236/ijcns.2011.46048 Published Online June 2011 (http://www.SciRP.org/journal/ijcns)
Copyright © 2011 SciRes. IJCNS
FEAR: Fuzzy-Based Energy Aware Routing Protocol for
Wireless Sensor Networks
Iman M. ALMomani, Maha K. Saadeh
Computer Science department, King Abdullah II School for Information Technology (KASIT),
The University of Jordan, Amman, Jordan
E-mail: i.momani@ju.edu.jo, saadeh.maha@yahoo.com
Received April 9, 2011; revised April 28, 2011; accepted May 7, 2011
Abstract
Wireless Sensor Networks (WSNs) are used in different civilian, military, and industrial applications. Re-
cently, many routing protocols have been proposed attempting to find suitable routes to transmit data. In this
paper we propose a Fuzzy Energy Aware tree-based Routing (FEAR) protocol that aims to enhance existing
tree-based routing protocols and prolong the network’s life time by considering sensors’ limited energy. The
design and implementation of the new protocol is based on cross-layer structure where information from dif-
ferent layers are utilized to achieve the best power saving. Each node maintains a list of its neighbors in or-
der to use neighbors’ links in addition to the parent-child links. The protocol is tested and compared with
other tree-based protocols and the simulation results show that FEAR protocol is more energy-efficient than
comparable protocols. According to the results FEAR protocol saves up to 70.5% in the number of generated
control messages and up to 55.08% in the consumed power.
Keywords: Energy Awareness, Fuzzy Logic, Routing Protocol, Wireless Sensor Network, WSN
1. Introduction
WSNs are envisaged to become a very significant ena-
bling technology in many sectors as they are widely used
in many civilian and military as well as industrial appli-
cations [1,2]. Unlike traditional wireless communication
networks, WSN has its own characteristics. It consists of
small, low cost, and low power sensors. Each sensor is
embedded with a microprocessor and a wireless trans-
ceiver to provide data processing and communication
capabilities besides its sensing facility.
The significant interest in WSNs comes from its im-
portance in many applications. In the healthcare sector,
for example, WSNs are used in different applications
such as patients monitoring, diseases diagnosis and
management, and elderly people homecare [2-5]. The use
of WSNs in healthcare applications aims to provide re-
mote healthcare monitoring by treating and following up
patients in their own homes. This out-of-hospital treat-
ment does not replace the role of hospitals and healthcare
centers; it rather involves the patients to be active par-
ticipants in their own healthcare.
As in medical applications, WSNs have a significant
role in military applications [6,7]. They can be used in
battlefield monitoring, intelligent guiding, and remote
sensing to sense chemical weapons and detect enemies’
attacks. In industrial applications WSNs are successfully
used to monitor manufacturing processes such as prod-
ucts quality and monitoring equipments status [2,8].
In a WSN sensor nodes are scattered in the sensing
field forming a network according to nodes connectivity.
Depending on the underlying network topology sensors
collect different environmental data and send the obser-
vations to the Base Station (BS) which is also known as
the sink node. The sink node is responsible for data
gathering and processing. Also, it connects the WSN to
the Internet or to other networks. Usually the sink node
has unconstrained capabilities in terms of data processing,
data storage, and power resources. Unlike the sink node,
sensors are resource-constrained devices, they have lim-
ited processing and storage capacities, finite battery
power, and short radio range [1,9].
In addition to devices’ limitations, WSNs suffer from
different challenges such as multi node-to-node trans-
mission, data redundancy and high unreliability since
sensors are subject to physical damage and failure. These
limitations and problems present many challenges in the
design and deployment of WSNs. Many recent researches
404 I. M. ALMOMANI ET AL.
have been carried out attempting to solve the design and
implementation issues in WSNs. Some researches at-
tempts to address the problem of limited energy by pro-
posing energy-efficient solutions to prolong the net-
work’s lifetime. These solutions include data routing
protocols [10,11]. Other researches focus on the problem
of unreliable data transmission and provide solutions to
increase the network’s reliability and data availability
such as multi-path and multi-sink protocols [12,13].
This paper proposes a Fuzzy Energy Aware Routing
(FEAR) protocol based on tree routing. The protocol
aims to enhance the existing Tree-based Routing (TR)
protocol supported by IEEE 802.14.5 [14] in terms of
reducing the number of hops and solving the problem of
node/link failure. It aims to eliminate the need for addi-
tional control messages, as in Plus-Tree Routing (PTR)
protocol [15], to build the neighbo rs’ tab les by exploitin g
the control messages that are used for the purpose of tr ee
construction. In this way control messages are used to
construct the tree and at the same time to build the
neighbors’ tables, consequently, the network’s overhead
is reduced. FEAR protocol consists of several phases:
tree construction, data transmission and tree reconstruc-
tion due to either node(s) or link(s) failure.
The rest of this paper is organized as follows: Section
2 summarizes some related work. In Sections 3 the pro-
posed FEAR protocol is discussed in details and an ana-
lytical evaluation for this protocol is also presented. Sec-
tion 4 explains the fuzzy system used by FEAR protocol.
Section 5 discusses the simulation results. Section 6 con-
cludes the paper and presents avenues for future work.
2. Related Work
Many routing protocols have been proposed for WSNs.
Some protocols utilize the concept of hierarchical rou ting
to perform energy-efficient routing in WSNs and extend
system’s lifetime. In these protocols high-energy nodes
can be used to process and send information, while
low-energy nodes can be used to perform sensing [9,16].
A well-known hierarchical protocol is called Low-
Energy Adaptive Clustering Hierarchy (LEACH) [17].
The idea is to divide the network into clusters and choose
a cluster head for each one of them. All local cluster
heads will be used as routers to the sink. This clustering
will save energy since all data is p rocessed locally inside
the cluster. Moreover, all transmissions are performed
through cluster heads rather than involving all sensor
nodes. Cluster heads are changed randomly over time in
order to balance the energy dissipation of nodes. How-
ever, LEACH is not applicable to networks deployed in
large regions, since it uses single-hop routing where each
node can transmit data directly to the cluster head.
Another cluster-based routing protocol that can be
used for large WSNs is Energy Clustering Protocol (ECP)
as proposed in [18]. Unlike LEACH, ECP uses multi-hop
routing. It also utilizes nodes on the cluster edge to send
data to the neighboring clus ter.
Other cluster-based routing protocols were also pro-
posed in [19,20]. Generally, in cluster-based routing
protocols the idea of dynamic clustering brings extra
overhead, which may diminish the gain in energy con-
sumption.
Other protocols had been presented in the literature are
based on constructing a tree between network nodes and
use tree routing for data transmission. Tree-based Rout-
ing (TR) is one of these protocols that are supported by
IEEE 802.15.4 [14]. TR protocol suites small memory,
low power and low complexity networks with light-
weight nodes and it aims to eliminate the overhead of
path searching and updating, therefore, it reduces exten-
sive messages that are exchanged between network
nodes. Although this protocol works well in terms of
energy saving, it suffers from two drawbacks. First,
message transmission depends on source depth; the
deeper the node, the longer the path. Second, it suffers
from node/link failure that causes nodes isolation. To
overcome these drawbacks, many protocols have been
proposed to enhance TR performance. Authors in [15]
[21-23] attempted to enhance TR by finding a shorter
path to be used in data transmission by exploiting
neighbor links rather than using only parent-child links.
However, these protocols do not consider nodes power in
their solutions.
Due to the dynamicity of clustering process and the
complexity of optimizing the number of clusters that
may reduce the gain in power consumption in cluster-
based routing , the propo sed FEAR protocol will be based
on tree routing. Network energy will be considered dur-
ing different stages of the proposed FEAR protocol.
FEAR also enhances TR protocols by avoiding their
shortcomings in terms of solving the nod e(s)/link(s) fail-
ure problem and decreasing the number of required hops
to transmit data messages to the sink. FEAR will be
compared with both TR [14] and Plus-Tree Routing
(PTR) protocol [15]. These two protocols were chosen
for comparison as they construct the tree topology with
the minimum cost. In addition, PTR protocol provides
solutions to recover from node(s)/link(s) failure.
3. FEAR Protocol
The proposed Fuzzy Energy Aware tree-based Routing
(FEAR) protocol is a cross-layer protocol. FEAR proto-
col consists of several phases. Firstly, the protocol con-
structs a logical tree between network nodes. During the
Copyright © 2011 SciRes. IJCNS
I. M. ALMOMANI ET AL.
Copyright © 2011 SciRes. IJCNS
405
construction each node will get a logical ID and con-
struct its neighbors table. Secondly, data packets are
transmitted using neighbor links in addition to the par-
ent-child links. During this stage both intermed iate nod es
energy and depth will be considered . Finally, the tree, or
part of it, may be reconstructed in the event of either
node(s) or link(s) failure or due to a new node entrance.
During both tree construction and tree reconstruction
stages, FEAR protocol uses a ranking system based on
fuzzy inference so that nodes rank their neighbors. By using
fuzzy ranking inference, nodes energy and depth is kept
balanced among all sensor nodes. The fuzzy ranking system
structure will be discussed in details in the next section.
3.1. Control Messages
Different control messages are defined by this protocol.
These messages are listed in Table 1. This table sh ows the
types of these messages, ther structures, when they are i
sent and the actions to be taken when they are received.
3.2. Network Model
The network model of FEAR protocol is described as
follows:
The sensors are scattered in the network field without
isolation.
All sensor nodes have the same capab ilities, the same
transmission range, and limited power resources.
Symmetric model is assumed. That means if sensor A
is within sensor B’s transmission range then sensor B
is within sensor A’s transmission range.
All sensors sense data and transmit it to the sink for
processing.
The sink node assumed to have unconstraint re-
sources.
All sensor nodes are located in fixed places without
mobility.
Table 1. FEAR protocol control messages.
Message Type When to be Sent Actions By Receivers Message Structure
Ready
Is sent when:
1. The node gets an ID, so it is used
to broadcast the ID and tell other
nodes that it is ready to accept
children.
2. The node receives a
New Node or Request Parent
messages.
1. Store the information in the neighbors
table.
2. If receiver node does not have ID, it
will
find neighbors’ rank and send
Engagement message.
1. Node ID
2. Node power
3. Rank average
Unready It is used only to broadcast the ID. Store ID in the neighbors table. 1. Node ID
2. Node power
Engagement Is sent when receiving a Ready mes-
sage and used to request for ID and
request for Parent.
May send Engagement-Acceptance mes-
sage.
Engagement-Acceptance Is sent as a reply to an Engagement
message.
1. Refresh neighbors table.
2. Calculate the ID.
3. Calculate the fuzzy ranking average for
its neighbors.
4. Send Ready message.
1. Node ID
2. Node power
3. Offered ID
New Node Is sent when new node wants to join the
network. Send Ready message or Unready message.
Request Parent Is sent when a node cannot reach its
parent. Send Ready message or Unready message.
Inform Is sent to tell the neighbors that the
node will go down. Reconstruct the tree according to their rela-
tion with the dead node. Node ID
Change ID Is sent when any node change its ID
due to some failure to tell other nodes
to modify the ID in their tables.
1. Modify the ID in neighbors tabl e.
2. If the receiver is one of sender’s chil-
dren it will update its own ID and send
Change ID message.
1. Node ID
2. Node Power
406 I. M. ALMOMANI ET AL.
3.3. FEAR Protocol Stages
Different stages of FEAR protocol will be discussed in
details through the next subsections.
3.3.1. Stage 1: Tree Construction
A sink-rooted tree should be constructed between net-
work nodes before sending a message to the sink. A new
addressing scheme is used in this stage to assign a logical
ID for each node. Each node uses the assigned ID to
calculate its depth and its neighbors’ depth. When a node
receives an Engagement-Acceptance message, it will
calculate its own ID as follows:
Node ID = Parent ID || Offered ID
Each Offered ID is represented by m digits which are
required to represent Cmax nodes, where Cmax is the
maximum number of children a node can have. For ex-
ample, if Cmax < 10 then we need only on e digit to repre-
sent the offered ID (0…9), but for large networks if Cmax
< 100 then we need 2 digits (00…99), and so on. Using
this addressing scheme, each node will be able to know
the depth for a particular ID.
To construct the tree we assume that all nodes, ini-
tially, do not have IDs and they have full energy. Parents
can have at most Cmax children, and at the end of this
stage each node is assigned an ID from which it can cal-
culate its depth.
First, the sink node will set its rank average to 1 which
is the maximum rank th en the tree construction is started
by broadcasting a Ready message to its neighbors, this
message contains the sink’s ID (sink ID = initial ID),
sink’s energy, and the average rank. Each node receiving
this message will store the sink’s information in its
neighbors table and after a short period of time it will
send an Engagement message to the sink. The Engage-
ment message has two purposes: request for a parent, and
request for an ID. For each Engagement message, the
sink node will reply by sending an Engagement-Accep-
tance message only if the number of its children is less
than Cmax.
When the node gets the Offered ID, it calculates its ID
and the fuzzy rank average for its neighbors then it
broadcasts a Ready message allowing its neighbors to
send Engagement messages. Note that the Engagement
messages are sent after a short period during which they
can receive Ready messages from other nodes and find
the fuzzy rank for each one. This waiting will force the
node to be associated with the best possible node among
others (the node that has the best fuzzy rank). Thus, a
balance is kept between nodes. This process continues
until all nodes get IDs and no more Ready messages are
sent. Table 2 illustrates neighbor tab le structure and Ta-
ble 3 illustrates the steps of this phase. Figure 1 shows
Table 2. Neighbors table structure.
Value Description
Neighbor IDThis value is contained in the Ready message sent
by the neighbor.
Neighbor
Power This value is contained in the Ready message sent
by the neighbor.
Neighbor
Distance
This value is calculated by the node when it re-
ceives the Ready message from the neighbor. The
calculation is done according to the strength of the
received signals at the physical layer.
Neighbor
RAVG
This value is contained in the Ready message sent
by the neighbor. It represents the status of the
neighbor’s neighbors (the characteristics of the
nodes around the neighbor).
Neighbor
FR
This value is calculated by the node when it re-
ceives the Ready message from the neighbor. It is
calculated using the Fuzzy Ranking (FR) system
(discussed later in this paper). It represents the
characteristics of the neighbor itself.
Is Child This flag is set to 1 if the node sends an Engage-
ment-Acceptance message to the neighbor; there-
fore the node becom es its parent.
Is Parent This flag is set to 1 if the node receives an En-
gagement-Acceptance message from the neighbor;
therefore the node become s i ts c h il d.
Table 3. Tree construction. Each node will do the follow-
ing.
Step 1. Wait for Ready message when a one is received then go to
step 2.
Step 2. Store message information in the neighbors table and check
the ID if it is “null” then go to step 3.
Step 3. Wait for a predefined period of time and store any Ready
messages information received during this period, then go
to step 4.
Step 4. Calculate the fuzzy rank for each stored neighbor and then
go to step 5.
Step 5. Send Engagement message to the neighbo r with the best
rank. If Engagement-Acceptance message is received, then
go to step 6, else go to step 7.
Step 6. Calculate its ID and its rank average then broadcast a Ready
message. Then go to step 8.
Step 7. Exclude the best neighbor and go back to step 5.
Step 8. Exit.
an example on logical tree construction. Figure 1(a)
represents the logical tree view with the new nodes’ IDs
and Figure 1(b) represents the physical distribution of
sensor nodes. We assume that node 6 is the sink node
and it will initiate the tree construction. The initial ID in
this scenario is 0 and Cmax (number of children) = 2, thus
m (number of digits) = 1. Both nodes 5 and 10 are en-
gaged with the sink which sends them 1 and 2 as Offered
Copyright © 2011 SciRes. IJCNS
I. M. ALMOMANI ET AL.
407
(a)
(b)
Figure 1. Logical tree construction.
IDs. Then they will calculate their ID by concatenating
the Offered ID with sink ID. Next, both nodes 5 and 10
send Ready message to their neighbors. This process
continues until all node s successfully engaged with some
parent.
3.3.2. Sta ge 2: New Node Engageme n t
When a new node wants to join a network, it should
broadcast a New Node message. Then all neighbors will
reply by either Ready message if the number of children
< Cmax, or Unready message if the number of children =
Cmax. The new node will store all information in its
neighbors table and calculate the fuzzy rank number for
each Ready message. Then it will choose the parent that
has the maximum rank, and broadcast a Ready message.
The steps are summarized in Table 4.
Table 4. New node engagement. New nodes will do the fol-
lowing.
Step 1. Broadcast New Node message and go to step 2.
Step 2. Wait for Ready message when one is received, then store its
information and go to step 3.
If any Unready message is received while waiting then
store its information in the neighbors table.
Step 3. Wait for predefined period and store any Ready or Unready
message information received during this period then go to
step 4.
Step 4. Calculate the fuzzy rank for each Ready message’s infor-
mation that is stored in the neighbor table and go to s tep 5 .
Step 5. Send Engagement to the neighbor with the best rank. If
Engagement-Acceptance is received then go to step 6 else
go to step 7.
Step 6. Calculate the ID and the rank average then broadcast a
Ready message. Then go to step 8.
Step 7. Exclude the best neighbor and go back to step 5.
Step 8. Exit.
3.3.3. St a ge 3: Message Transmission
As stated earlier the constructed tree should be
sink-rooted and all other nodes will send data to it. The
message should be forwarded over the best path. To
choose the next hop, the sender will consider both
neighbors depth and power. The neighbor that has the
minimum depth and a power larger than a specific
threshold will be chosen. If all small-depth neighbors
have critical energy then the sender will send the data to
the parent. In this way, the load is balanced among nodes
instead of overloading the parent node as in TR [14] or
the less depth neighbor node as in [15,21-23]. The fuzzy
ranking is not used in this stage since it is not feasible to
calculate the rank when data packets need to be sent. The
fuzzy ranking is only applied to control packets in order
to ensure a balanced topology among nodes.
3.3.4. Stage 4: Tree Reconstruction
If a node’s energy reaches a specific threshold, it should
inform its parent, children, and neighbors that it will go
down, so they can take an action and prepare themselves
to reconstruct the tree. Each node has a relation with the
dead node should take an action regarding to the relation
connecting them. There are three cases; the first one
when the dead node is a parent. In this case the children
have to find a new parent. Each child broadcasts a Re-
quest Parent message and only neighbors with children
less than Cmax will reply by a Ready message, other
nodes send Unready messages. The child then calculates
the fuzzy rank number for each Ready message and then
chooses the node that h as the maximum rank as a parent.
Copyright © 2011 SciRes. IJCNS
408 I. M. ALMOMANI ET AL.
Then it will broadcast a Change ID message to its
neighbors to update the ID in their neighbors’ tables. If
any neighbor is a child for this nod e, it will subsequently
change its ID and broadcast a Change ID message. This
process continues until all IDs are modified.
The second case is when the dead node is a child. In
this case the parent should remove this node from its
neighbors table and decrement the number of children.
Finally, the last case is when the dead node is a neighbor,
then neighbors will remove it from their neighbors’ ta-
bles.
In some cases nodes go down before informing other
nodes that their power is about to end. In this case any
neighbor node (could be child or parent) discover the
absence of this node, should broadcast the dead node ID
in an Inform message and then each node will take an
action as discussed above. The steps are illustrated in
Table 5 and Figure 2.
3.4. FEAR Analysis
In this section we will analyze FEAR protocol in terms
of the number of generated sent and received control
messages and the consumed power according to these
messages during the tree construction and compare them
with PTR protocol [15]. PTR was chosen for comparisons
Table 5. Tree reconstruction. Each node will do the follow-
ing.
Step 1. When any Inform message is received then go to step 2.
Step 2. Remove the dead node from the neighbors table and check
the relation with it. If it is a parent then go to step 3 if it is a
child then go to step 4.
Step 3. Broadcast Request Parent message and go to step 5.
Step 4. Decrement the num b er of children and go to step 11.
Step 5. Wait for Ready message when a one is received then store
its information and go to step 6. If any Unready message is
received while waiting, then store its information in the
neighbors table.
Step 6. Wait for a predefined period and store any Ready or Un-
ready message information received during this period then
go to step 7.
Step 7. Calculate the fuzzy rank for each Ready message’s infor-
mation that is stored in neighbors tabl e and g o to step 8.
Step 8. Send Engagement to the neighbor with the best rank. If
Engagement-Acceptance is received then go to step 9 else
go to step 10.
Step 9. Calculate the new ID and broadcast Chang e ID message.
Then go to step 11.
Step 10. Exclude the best neighbor and go back to step 8.
Step 11. Exit.
Figure 2. Change ID flowchart.
as it constructs the tree topolog y with the minimum cost,
the same as TR. In addition, PTR provides solutions to
recover from node(s)/link(s) similar to FEAR protocol.
3.4.1. Number of Sent and Received Messages
In this subsection we will compare the number of sent
and received messages in both FEAR and PTR protocols.
For both protocols the worst case has been calculated
since the best case is hard to be forecasted.
We derived the number of sent messages in PTR as

1
32
N
i
i
NNen
. Each node sends one Association
message, for N nodes, there will be N Associations. In
the worst case each node will send a Reply message to
each Association from each neighbor, if we represent
each neighbor set by Ne(n), then that requires the
summation of all neighbor sets, . If we

1
N
i
i
Ne n
assume that at the end of the tree construction each node
will successfully get an ID then this requires sending N
messages that contains the IDs. Finally, when the tree is
constructed, each node will broadcast its ID in a
hello_neighbor message to construct the neighbors table.
The total is N hello_neighbor messages. On the other
hand, each node will reply by sending a reply_
hello_neighbor message to all neighbors and this
requires additional messages. Therefore, a
total of control messages are sent in
the PTR protocol.

1
N
i
i
Ne n

i
Nen
1
32
N
i
N
The number of sent messages in FEAR is 2N
Copyright © 2011 SciRes. IJCNS
I. M. ALMOMANI ET AL.
409
struction. Firstly, each node broadcast its ID to its
the worst case occurs when each node will receive en-
Finally, each node will be engaged to only one parent
sages in the FEAR
.4.2. Consumed Power local processing and com-

1
N
i
i
Ne n
as we prove using Theorem 1.
Theorem 1: In FEAR protocol, the number of sent
control messages is at most

1
2N
i
i
NNen
Proof: Three control messages are exchanged between
nodes during tree construction; according to Ready mes-
sages each node will send one Ready to broadcast its ID,
so for N nodes there will be N messages assuming that
all nodes got IDs. For Engagement Messages the worst
case is to send an engagement to each neighbor, so for N
nodes if each node has a set of neighbors represented by
Ne(n), the total is the summation of all neigh-
bor sets which is equal to. Finally, assuming

1
N
i
i
Ne n
that each node will be successfully engaged to one parent
and gets an ID there should be N Engagement- Accep-
tance messages. Therefore, a total of

1
2N
i
i
NNen
control messages are sent in the FEAR protocol.
We derived the number of received messages in PTR
as messages. Each node receives an

1
4N
i
i
NNen
Association from all neighbors in its neighbors set, the
total is the summation of all neighbor sets .

1
N
i
i
Ne n
On the other hand, each node in the worst case expects to
receive a Reply to its Association from all of its
neighbors and that requires another messages.

1
N
i
i
Ne n
Finally, if each node successfully associates to one par-
ent, then it will receive an ID and that requires N ID
messages to be received. For constructing the neighbors
table each node will collect hello_neighbor messages and
reply_hello_neighbor messages from its neighbors and
that needs to receive messages for each
message type. Therefore, a total of is
the number of received control messages in the PTR
protocol. The number of received messages in FEAR
protocol is messages as we prove using
Theorem 2.

1
N
i
i
Ne n

i
Nen

1
4N
i
i
NNen
1
2N
i
N
Theorem 2: In FEAR protocol, the number of received
control messages is at most

1
2N
i
i
NNen
Proof: Three control messages are used in tree con-
neighbors in a Ready message, if we represent each
neighbor set by Ne(n) the total is the summation of all
Sets, (

N). Secondly, for Engagement messages
1i
i
Ne n
gagements from all neighbors in its set. So the total is
the summation of all neighbor sets, i.e.,

N
Ne n.
1i
i
and will receive only one Engagement-Acceptance mes -
sage, so the total is N messages. Therefore, a total of

N
NNen is the number of received control mes-
1
2i
i
protocol.
3
Sensor power is affected by
munication operations. Since communication operations
consume more power than data processing, sensors will
lose most of its power during sending and receiving of
messages [2]. According to [24] a node requires ETx(k, d)
to send k bits message to destination at distance d, and
ERx(k) to receive k bits message. ETx(k, d) and ERx(k) are
defined as:

2
,,
***
TxTx elecTx amp
elec amp
kdEk Ekd
Ek kd



(1)
E

*
RxRx elec
elec
Ek Ek
Ek
(2)
where Eelec = 50 nJ/bit and εamp= 100 pJ/bit/m2. will be
co
(3)
. Fuzzy Ranking System
the FEAR protocol, we have built a fuzzy inference
Using (1) and (2), the maximum power that
nsumed during the tree construction can be calculated
according to Theorem 1 and Theorem 2. The power that
is consumed by sending and receiving control messages
during the FEAR tree construction phase can be calcu-
lated using (3).
 
 
1
1
FEAR Consumed Power,*2
*2
N
Tx i
i
N
RX i
i
EkdN Nen
Ek NNen








4
In
system that will be used in tree construction, tree recon-
struction, and new node engagement phases. The purpose
of this system is to assign a rank for each neighboring
node. This ranking helps the node to be associated with
the best possible neighbor, so the tree is balanced ac-
Copyright © 2011 SciRes. IJCNS
I. M. ALMOMANI ET AL.
Copyright © 2011 SciRes. IJCNS
410
.1. Neighbors Classification
order to rank neighbors, they are classified into four
.2. First Stage of Fuzzy Ranking System
his stage has two-input, one-output fuzzy inference
cording to both nodes energy and depth. The general
structure for the fuzzy ranking system is shown in Fig-
ure 3. This ranking system consists of three stages. The
output from each stage is one of the inputs to the next
stage. The fuzzy inference that is used in all stages is
based on Mamdani fuzzy inference [25].
Far. Usually the transmission range for sensor devices is
about 250 meters, so any neighboring node should be
placed within this range. This input can be calculated
using signal strength [9]. The second input to this stage is
the depth which can be calculated from the neighbor ID
that is stored in the neighbors table. The depth is mapped
into Small, Medium, and Large membership functions
and ranges from 1 to maximum_ tree_depth. The maxi-
mum_tree_depth is calculated according to (4).
4
In max
Maximum_Tree _DepthlogCN (4)
types. Each neighbor node should belong to only one
type in a particular point of time. Table 6 illustrates
these types. This classification is used to know how good
or bad the neighbors are. Neighbors belong to the first
type will take higher rank than other types, so the larger
the number of neighbors belong to this type, the better
the performance of our protocol since many good
neighbors can be utilized as intermediate nodes instead
of parent node.
where:
N is the number of network nodes, and
Cmax is the maximum number of children.
Both distance and depth affect the transmission cost;
larger depth implies larger number of intermediate nodes.
If two neighbors have the same d epth then it is more fea-
sible to forward the message to the nearest one since
short distance requires less power to send the signal.
Transmission_cost is mapped into Low, Medium, and
High membership functions as illustrated in Figure 4(b).
4
4.3. Second Stage of Fuzzy Ranking System
T
system. It finds the cost of transmitting the data to a par-
ticular neighbor in terms of neighbor’s depth and dis-
tance from the sender. The output from this stage is en-
tered to the next stage. Figure 4 shows the structure of
this stage. The inputs are mapped to fuzzy membership
function illustrated in Figure 4 (a). The first input is the
distance which can be Very_Near, Near, Far, and Very
The second stage inputs are Transmission_cost with Low,
Medium, and High membership functions and the
neighbor residual_energy that could be Low, Medium,
and High as illustrated in Figure 5(a). The residual_
ene rg y f or ea ch nei gh bor is stored in the neighbor’s table.
The output from this fuzzy stage is the neighbor_rank.
First Fuzzy
Inference Third Fuzzy
Inference
Second Fuzzy
Inference
Distance
Depth
Transmission Cost
Residual Power
Neighbor Rank
Neighbor Status
New Rank
Figure 3. Fuzzy ranking system.
Table 6. Neighbors type s.
Type Description
Good depth and Good energy longs to this type has a residual energy greater than a specific threshold, and a The node be
depth not larger than sender’s parent depth.
Good depth and Bad energy ount of residual energy, and a depth not larger
Bad depth and Good energy e has a residual energy greater than specific threshold, but its depth
small amount of residual energy, and its depth is larger
The node belongs to this type has a small am
than sender’s parent depth.
The node belongs to this typ
is larger than sender’s parent dep th .
The node belongs to this type has a
Bad depth and Bad energy than sender parent depth.
I. M. ALMOMANI ET AL.
411
Figure 4. First stage fuzzy. (a) The inputs membership functions; (b) The output membe r ship func tion.
Figure 5. Second stage fuzzy. (a) The inputs member ship func tions; (b) The output membership function.
Copyright © 2011 SciRes. IJCNS
I. M. ALMOMANI ET AL.
Copyright © 2011 SciRes. IJCNS
412
his rank
.4. Third Stage of Fuzzy Ranking System
his final stage is used to find the final neighbors rank
est Parent, or
er
y message that contains the average value.
th
etter the
. Simulation Results and Comparison
his section discusses the results obtained using FEAR
.1. Network Overhead
uated in terms of number of
is mapped into Good, Moderate, and Bad. See inference. The higher the average value, the bT
Figure 5(b).
neighbor’s status and the better the chance to be chosen
as a parent. We assume that the Ready message that is
sent by the sink will have the highest possible rank av-
erage since it is the best choice for any neighbor to be
associated with.
4
T
according to their characteristics and status. It takes two
inputs; the neighbo r_rank that resulted from the previou s
stage and the neighbor_status. The neighbor_rank gives
an indication about the neighbor characteristic in terms
of residual_power, depth and distance. These facto rs will
be used to rank the neighbor; th e larger the rank, the bet-
ter the neighbor chance to be chosen as a parent. Figure
6 shows the s tructure for this fuzzy stage. The neighbor_
status is mapped into Good, Moderate, and Bad fuzzy
membership functions. This input gives an indication
about the characteristics of the nodes around the
neighbor (neighbors of a neighbor) and is calculated by
the neighbors themselves as the following:
When a node receives a New Node, Requ
5
T
and compare it with TR [14] and PTR [15] protocols. We
use Java programming language to build our simulator.
Different evaluation metrics are considered in our simu-
lation that will be discussed in the following subsections.
Table 7 shows the simulation parameters that were used.
5
he network overhead is evalT
messages that are sent and received during tree construc-
tion. We use different network sizes 25, 50, 100 and 500.
For each size, the same nodes characteristics (initial
power, nodes distribution, and distance from sink) are
used in the three protocols. We take the average of 10
simulation runs. Figures 7 and Figure 8 show the be-
havior of the three protocols according to the number of
sent and received messages, respectively. It can be no-
ticed that TR curve does not appear as it is almost iden-
tical to FEAR curve, therefore, the results are also illus-
Engagement-Acceptance message, it will calculate the
rank for each neighbor using fuzzy ranking system.
Calculate the average of neighbor ranks. Since pow
and depth are balanced among neighbors, average
will be a good measure to reflect the status of the
neighbors.
Send a Read
Now each node receives the Ready message will use
e average value as the second input to the third stage
Figure 6. Third stage fuzzy. (a) The inputs members hip func tions; (b) The output membership function.
I. M. ALMOMANI ET AL.
413
Table 7.
eter Value
Simulation parameters. Area corresponding to
each network size.
Simulation param
Network Size 25, 50, 100, 500
T) 1000 ×
errain Area (m2500 × 600, 800 × 1000,
1250, 2000 × 2500
None Mobility
Radio Range 250 m
Figure 7. Number of sent messages with different network
sizes.
Figure 8. The overhead of received messages with differen
ated in Table 8 for more precise comparison. As illus-
.2. Network Power Consumption
s stated in the analysis section (Section 3.4) most of the
and received messages in the energy consumption eva-
t
network sizes.
tr
trated earlier, the proposed FEAR protocol has the same
behavior as TR protocol since it uses the minimum pos-
sible messages to construct the tree, it also utilizes these
messages to construct the neighbor tables without the
need to send additional Hello and Hello Reply messages
as used in PTR protocol to aid in node(s)/link(s) failure
recovery. According to the results, FEAR protocol saves
up to 85.67% in the number of sent messages and up to
64.6% in the number of received messages. Overall,
FEAR protocol saves up to 70.5% in the number of con-
trol messages.
5
A
network’s power is consumed by the communication
operations. Therefore, we consider the number of sent
Network Size FEAR TR PTR
Table 8. Network overhead.
25 87 89 362
50 164 168
100 328 329 689
Sent
1488
Messages
500 1585 1590 11064
25 313 315 832
50 586 590 1561
100 1521 1528 3697
Received
Messages 500 10068 10072 28444
e ced power is cd TR
nce i structre eig
les as FEAR protocol, whereas TR constructs only the
ransmission delay is evaluated according to the number
en the sender and the sink.
ransmission delay is affected by sender’s depth; the
Network FEAR/PTR
luation. Th
protocol sionsumoparemwith P
tcons both teand nhbors’ ta-
b
tree. We use the same simulation characteristics that are
used in the overhead evaluation. We take the average of
10 runs for each network size and compute the consumed
power according to (3) (we ignored the distance in the
comparison since we use the same nodes distribution for
both protocols). The results are shown in Table 9 and
Figure 9. As illustrated, FEAR protocol is better than
PTR protocol since it reduces the control messages that
should be exchanged between nodes. It decreases the
consumed power by up to 55.08% comparing with PTR
protocol.
5.3. Transmission Delay
T
of intermediate nodes betwe
T
deeper the node, the larger the number of intermediate
nodes. The same constructed tree is used for the three
considered protocols and the average of different sce-
Table 9. Network consumed power according to network
overhead.
Size FEAR PTR (%)
25 0.9462237 1.9115580.4950013
50 1.8420064 3.6022050.5113552
8 8.
(mj)
852
100
500 4.512887
2 .411308300762
63.248 0.5436715
0.4492034
Consumed
Power
Figure 9. The percentage of the consumed power with dif-
ferent network sizes.
Copyright © 2011 SciRes. IJCNS
414 I. M. ALMOMANI ET AL.
Figure 10. Hop count according to different nodes depth.
Table 10. Failure scenarios. Success: no isolation, Fail: iso-
lation.
Scenario TR PTR FEAR
Dead node is a leaf node SuccessSuccessSuccess
Dead node is a parent and all of
its children are in sink range or
each child has at least one
descendent in sink range
Fail SuccessSuccess
Dead node is a parent but all or
some of its children and de-Fail Fail Success
r(s). (Become isolated
after parent death).
scendents are not in sink range
Dead node is a parent but all or
some of its children do not have
neighbo Fail Fail Fail
nigure 1rares
s protocol has the minimum
dn pro
5ecover from Failure
Tifferent failrenar
each scenato reconstruct the tree
ts compared with the TR and
Pk teristics are
u protocols. We assess whether the sce-
ario is successful or not by performing many simulation
how that
uctin
has several stages:
nk-rooted tree construction, messages transmission, and
The protocol is implemented and compared to other
Ubiquitous
h House, Lon-
Wireless Sensor Network for Wearable
,” Journal of Networks, Vol. 3,
arios is computed. F 0 illusttes the sults. A
hown in the figure, FEAR
elay comparing to the TR a
.4. Possibility to R
d PTRtocols.
his subsection analyzes d
rio, the possibility ue scrios. Fo
No.
and
o recover from the failure i
TR protocols. The same
sed for the threenetwor charac
n
runs for each scenario on different network sizes. As
illustrated in Table 10, TR protocol does not provide
failure recovery mechanisms whereas both FEAR and
TR can recover from failure. The results sP
FEAR solutions are more efficient in reconstr
ee than the one provided by PTR. g the
tr
6. Conclusions and Future Work
In this paper we propose a tree-based routing protocol for
Wireless Sensor Networks (WSNs) that considers both
shortest path and energy balance between nodes. The
proposed protocol is called Fuzzy-based Energy Aware
Routing Protocol (FEAR) as it uses a fuzzy inference
system to rank the nodes. This is used to ensure that each
node is associated with the best neighbor in the tree con-
struction. The protocol provides an energy efficient solu-
tion for both data routing and network failure, thus pro-
longs the network’s life time. FEAR
si
node/link failure problem recovery.
tree-based protocols. The simulation results show that
the new protocol saves up to 70.5% in the number of
control messages and up to 55.08% in the consumed
power comparing with other related work. As a future
work we will consider security issues and possible
threats to develop a secure FEAR protocol.
7. References
[1] R. Biradar, V. Patil, S. Sawant and R. Mudholkar, “Clas-
sification and Comparison of Routing Protocols in Wire-
less Sensor Networks,” Special Issue on
Computing Security Systems, UbiCC Journal, Vol. 4,
2009, pp. 704-711.
[2] A. Jamalipour and J. Zheng, “Wireless Sensor Networks:
A Networking Perspective,” Wiley-IEEE Press, Hoboken,
2009.
[3] M. McGrath and T. Dishongh, “Wireless Sensor Net-
works for Healthcare Applications,” Artec
don, 2010.
[4] P. Pandian, “
Physiological Monitoring
5, 2008, pp. 21-29. doi:10.4304/jnw.3.5.21-29
[5] H. Alemdar and C. Ersoy, “Wireless Sensor Networks for
Healthcare: A Survey,” Computer Networks, Vol. 54, No.
15, 2010, pp. 2688-2710.
doi:10.1016/j.comnet.2010.05.003
[6] S. Diamond and M. Ceruti, “Application of Wireless
Sensor Network to Military Information Integration,”
Proceedings of the 5th IEEE International Conference on
Industrial Informatics, Vol. 1, 2007, pp. 317-322.
doi:10.1109/INDIN.2007.4384776
[7] M. Winkler, K. Tuchs, K. Hughes and G. Barclay,
“Theoretical and Practical Aspects of Military Wireless
Sensor Networks,” Journal of Telecommunications and
Information Technology, Vol. 2, 2008, pp. 37-45.
[8] X. Shen, Z. Wang, and Y. Sun, “Wireless Sensor Net-
works for Industrial Applications,” 5th World Congress
on Intelligent Control and Automation, Vol. 4, 2004, pp.
3636-3640. doi:10.1109/WCICA.2004.1343273
[9] J. Al-Karaki and A. Kamal, “Routing Techniques in
Wireless Sensor Networks: A Survey,” IEEE Wireless
Communications, Vol. 11, No. 6, 2004, pp. 6-28.
doi:10.1109/MWC.2004.1368893
[10] and C. Abbas, “Rout-
tworks,” Sensors, Vol.
L. Villalba, A. Orozco, A. Cabrera
ing Protocols in Wireless Sensor Ne
9, No. 11, 2009, pp. 8399-8421. doi:10.3390/s91108399
Copyright © 2011 SciRes. IJCNS
I. M. ALMOMANI ET AL.
Copyright © 2011 SciRes. IJCNS
415
icular
[11] L. Wang, C. Wang and C. Liu, “Optimal Number of
Clusters in Dense Wireless Sensor Networks: A Cross-
Layer Approach,” IEEE Transactions on Veh
Technology, Vol. 58, No. 2, 2009, pp. 966-976.
doi:10.1109/TVT.2008.928637
[12] D. Djenouri and I. Balasinghanr, “New QoS and Geo-
graphical Routing in Wireless Biomedical Sensor Net-
works,” 6th International Conference on Broadband
Communications, Networks and Systems, Madrid, 14-16
September 2009, pp. 1-8.
doi:10.4108/ICST.BROADNETS2009.7188
[13] E. Stavroua and A. Pitsillidesa, “A Survey on Secure
Multipath Routing Protocols in WSNs,” Computer Net-
works, Vol. 54, No. 13, 2010, pp. 2215-2238.
doi:10.1016/j.comnet.2010.02.015
[14] IEEE, “ZigBee Specification Version 1.0,” ZigBee Al-
liance, San Ra mo n, 20 05.
[15] Y. Park and E. Jung, “Plus-Tree: A Routing Pro
Wireless Sensor Networks,” Le
tocol for
cture Notes in Computer
Science, Vol. 4413, 2007, pp. 638-646.
doi:10.1007/978-3-540-77368-9_62
[16] K. Akkaya and M. Younis, “A Survey on Routing Proto-
cols for Wireless Sensor Networks,” Ad Hoc Networks,
Vol. 3, No. 3, 2005, pp. 32
doi:10.1016/j.adhoc.2003.09.010
5-349.
[17] L. Almazaydeh, E. Abdelfattah, M. Al-Bzoor and A. Al-
Rahayfeh, “Performance Evaluation Of Routing Protocols
in Wireless Sensor Networks,” International
Computer Science and Information
Journal of
Technology, Vol. 2,
No. 2, 2010, pp. 64-73.
doi:10.5121/ijcsit.2010.2206
[18] P. Loh and Y. Pan, “An Energy-Aware Clustering Ap-
proach for Wireless Sensor Network,” International
Journal of Communications, Network and System Sciences,
Vol. 2, No. 2, 2009, pp. 131-141.
doi:10.4236/ijcns.2009.22015
[19] O. Zytoune, Y. Fakhri and
Energy Aware Clustering Technique for
D. Aboutajdine, “A Novel
Routing in
Wireless Sensor Networks,” Wireless Sensor Network,
Vol. 2, No. 3, 2010, pp. 233-238.
doi:10.4236/wsn.2010.23031
[20] A. Mohajerzadeh and M. Yaghmae
and Congestion Aware Routie, “Tree Based Energy
ng Protocol for Wireless
Sensor Networks,” Wireless Sensor Network, Vol. 2, No.
2, 2010, pp. 161-167. doi:10.4236/wsn.2010.22021
[21] M. Al-Harbawi, M. Rasid and N. Noordin, “Improved
Tree Routing (ImpTR) Protocol
International Journal of Com
for ZigBee Network,”
puter Science and Network
Security, Vol. 9, No. 10, 2009, pp. 146-152.
[22] W. Qiu, E. Skafidas and P. Hao, “Enhanced Tree Routing
for Wireless Sensor Networks,” Ad Hoc Networks, Vol. 7,
No. 3, 2009, pp. 638-650.
doi:10.1016/j.adhoc.2008.07.006
[23] M. Zeynali, L. Khanli and A. Mollanejad, “TBRP: Novel
Tree Based Routing Protocol in Wireless Sensor Net-
work,” International Journal of Grid and Distributed
ls for Wireless
tional Conference on
Computing, Vol. 2, No. 4, 2009, pp.35-48.
[24] W. Heinzelman, A. Sinha, A. Wang and A. Chandrakasan,
“Energy-Scalable Algorithms and Protoco
Microsensor Networks,” Interna
Acoustics, Speech, and Signal Processing, Vol. 6, 2000,
pp. 3722-3725. doi:10.1109/ICASSP.2000.860211
[25] E. Mamdani, “Application of Fuzzy Logic to Approxi-
mate Reasoning Using Linguistic Synthesis,” IEEE
Transactions on Computers, Vol. C-26, No. 12, 1977, pp.
1182-1191. doi:10.1109/TC.1977.1674779