On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast Joohwan Kim , Xiaojun Lin , Ness B. Shroff , and Prasun Sinha ∗ † ‡ § School of Electrical and Computer Engineering, Purdue University ∗† Departments of ECE and CSE, The Ohio State University ‡§ Email: jhkim, linx @purdue.edu, [email protected], [email protected] ∗ † ‡ § { } Abstract—Sleep-wake scheduling is an effective mechanism sensitive applications, such as fire detection or tsunami alarm, to prolong the lifetime of energy-constrained wireless sensor which require that the event reporting delay be small. networks. However, it incurs an additional delay for packet Prior work in the literature has proposed the use of anycast delivery when each node needs to wait for its next-hop relay to reduce this event reporting delay [6]–[10]. In contrast to nodetowakeup,whichcouldbeunacceptablefordelay-sensitive traditional sleep-wake scheduling, where each sending node applications.Priorworkintheliteraturehasproposedtoreduce this delay using anycast, where each node opportunistically wakes up a particular next-hop relay node, in anycast each selects the first neighboring node that wakes up among multiple sending node tries to wake up a group of neighboring nodes candidatenodes.Inthispaper,westudythejointcontrolproblem in a candidate set, and the sending node then picks the first ofhowto optimally controlthesleep-wakeschedule, theanycast nodethatwakesuptorelaypackets.Roughlyspeaking,ifeach candidate set of next-hop neighbors, and anycast priorities, to neighboring node wakes up once every T time, by selecting a maximize the network lifetime subject to a constraint on the expectedend-to-enddelay.Weprovideanefficientsolutiontothis candidatesetofnnodes,thetimeneededbeforethefirstnode joint control problem. Our numerical results indicate that the wakes up is on average around T (assuming that the sleep- n proposed solution can substantially outperform prior heuristic wake schedules of the n nodes are independent). Thus, the solutionsintheliterature,especiallyunderthepracticalscenarios delay to wake up the next-hop neighbors can be significantly wherethereareobstructionsinthecoverageareaofthewireless reduced. On the other hand, the end-to-end delay not only sensor network. Index Terms—Anycast, Sleep-wake scheduling, Sensor net- depends on the per-hop delay, but also the end-to-end path work, Energy-efficiency, Delay that packet traverses. Hence, the set of candidate nodes must be carefully chosen because it will also affect the possible I. INTRODUCTION routing paths. The existing anycast schemes in the literature have mainly Sleep-wakeschedulingisaneffectivemechanismtoprolong focused on the so-called “MAC-layer anycast” problem, i.e., the lifetime of energy-constrained sensor networks. In this they try to find the candidate set at each node such that some paper, we are particularly interested in event-driven wireless local measure of delay is minimized. For the routing path, sensor networks, where events occur occasionally. Therefore, theyeitheruseaseparateroutingalgorithm[8],[9],orrelyon byputtingnodestosleepwhentherearenoevents,theenergy geographical information [6], [7], [10]. Thus, the interactions consumptionofthesensornodescanbesignificantlyreduced. between the choice of the candidate set and the routing path In the literature, synchronized sleep-wake scheduling pro- was not systematically studied, and it is then unclear whether tocols have been proposed in [1]–[3]. In these protocols, suchapproacheswill minimizetheactualend-to-enddelay.In sensor nodes periodically or aperiodically exchange synchro- thispaper,wedirectlyoptimizethesystemwithrespecttothe nization information with neighboring nodes. However, these end-to-end delay. In particular, we formulate the joint control synchronous protocols could incur additional communication problem of how to optimally control the sleep-wake schedule, overhead, and consume a considerable amount of energy. the anycast candidate set of neighboring nodes, and anycast In this work, we are interested in asynchronous sleep-wake priorities among neighboring nodes, to maximize the network scheduling protocols such as those proposed in [4], [5]. In lifetime subject to a constraint on the end-to-end delay. We these protocols, the sleep-wake schedule at each node is inde- provide an efficient solution to this joint control problem, and pendent of that of other nodes, and thus no synchronization is as a part of solution, we also show how to optimally choose required. However, due to the lack of knowledge of the sleep- the candidate set in order to minimize the end-to-end delay wake schedule of other nodes, it incurs additional delays for for all nodes. packetdeliverywheneachnodeneedstowaitforitsnext-hop The rest of this paper is organized as follows. In Section node to wake up. This delay could be unacceptable for delay- II, we describe the system model and introduce the lifetime- maximization problem that we intend to solve. In Section ThisworkhasbeenpartiallysupportedbytheNationalScienceFoundation III, we analyze the end-to-end delay under anycast, and we throughawardsCNS-0626703,CNS-0721477,CNS-0721434,CCF-0635202, andAROMURIAwardNo.W911NF-07-10376(SA08-03). develop an optimal distributed anycast algorithm that mini- Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 2. REPORT TYPE 3. DATES COVERED 2008 N/A - 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks 5b. GRANT NUMBER with Anycast 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION School of Electrical and Computer Engineering, Purdue University REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF ABSTRACT OF PAGES RESPONSIBLE PERSON a. REPORT b. ABSTRACT c. THIS PAGE UU 9 unclassified unclassified unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 mizes the end-to-end delay of all nodes. In Section IV, we assumed to maintain a list of nodes i that use node j as a solve the lifetime-maximization problem. In Section V, we forwarder (i.e., j ). As shown in Fig. 1, node i starts i ∈F provide simulation results that illustrate the performance of sending a beacon signal and an ID signal, successively. All ourproposedalgorithmcomparedtootherheuristicalgorithms nodesin hearthesesignalsregardlessofwhomthesesignals i C in the literature. are intended for. A node j that wakes up during the beacon signal or the ID signal will check if it is in the forwarding II. SYSTEMMODEL set of node i. If it is, node j sends one acknowledgement We consider a wireless sensor network with N nodes. Let after the ID signal ends. After each ID signal, node i checks denotethesetofallnodesinthenetwork.Eachsensornode whether there is any acknowledgement from nodes in . If i N F is in charge of both detecting events and relaying packets. If no acknowledgement is detected, node i repeats the beacon- a node detects an event, the node packs the event information ID-signalingandacknowledgement-detectionprocessesuntilit into a packet, and delivers the packet to a sink s via multi- hearsone.Ontheotherhand,ifthereisanacknowledgement, hop relaying. We assume in this paper that there is a single it may take some additional time for node i to identify which sink,however,theanalysiscanbegeneralizedtothecasewith node acknowledges the beacon-ID signals, especially when multiple sinks. there are multiple nodes that wake up at the same time. We We assume that the sensor network employs sleep-wake let t denote the resolution period, during which time node R scheduling to improve energy-efficiency and to prolong the i identifies which nodes have sent acknowledgements, and, network lifetime. With sleep-wake scheduling, nodes sleep if there are multiple awake nodes, chooses one node among for most of the time and occasionally wake up for a short them that will forward the packet. After the resolution period, period of time t . When a node i has a packet for node the chosen node receives the packet from node i during the active j to relay, it will send a beacon signal followed by an ID packet transmission period t , and then starts the beacon- P signal (carrying sender information). Let t and t be the ID-signalingandacknowledgement-detectionprocessestofind B C duration of the beacon signal and the ID signal, respectively. thenextforwarder.Sincenodesconsumeenergywhenawake, When node j wakes up and senses a beacon signal, it keeps t should be as small as possible. However, t has to active active awake, waiting for the following ID signal to recognize the belargerthant becauseotherwise aneighboringnodecould A sender. When node j wakes up in the middle of an ID signal, wake up after an ID signal and could turn to sleep before the it keeps awake, waiting for the next ID signal. If node j next beacon signal. In this paper, we set t = t +t active A C successfullyrecognizesthesender,anditisthenext-hopnode so that the node that wakes up right before the first beacon of node i, it then communicates with node i to receive the signalalsohasthesamechanceofdetectingthebeaconsignal packet. If a node wakes up and does not sense any beacon as nodes that wake up between two beacon signals. signal or any ID signal, it will then go back to sleep. In A. Sleep-wake Schedule, Forwarding Set, and Priority this paper, we assume that the time instants that a node j wakes up follow a Poisson random process with rate λ . We In this model, there are three control variables that affect j also assume that the wake-up processes of different nodes the network lifetime and the end-to-end delay experienced by are independent. The independence assumption is suitable for a packet. the scenario where nodes do not synchronize their wake- 1) Sleep-Wake Schedule: The sleep-wake schedule is up times, which is easier to implement than other schemes determined by the rate λ of the Poisson process with which j that require global synchronization [1]–[3]. The advantage of each node j wakes up. If λ increases, the expected one-hop j Poisson sleep-wake scheduling is that, due to its memoryless delay will decrease, and so will the end-to-end delay of any property,sensornodesareabletouseatime-invariantoptimal routing paths that pass though node j. However, it leads to policy to maximize the network lifetime (see the discussion higher energy consumption at node j so that the network in Section III-B). While the analysis in this paper focuses on lifetime may decrease. In the rest of the paper, it is more thecasewhenthewake-uptimesfollowaPoissonprocess,we convenienttoworkwiththenotionofawakeprobabilitywhich expectthatthemethodologyinthepapercanalsobeextended is a function of λ . j to the case with non-Poisson wake-up processes, with more Suppose that node i sends the first beacon signal at time 0, technically-involved analysis. asinFig.1.Ifnonodesin haveheardthefirstm 1beacon i F − A well-known problem of using sleep-wake scheduling in and ID signals, then node i transmits the m-th beacon and ID sensor networks is the additional delay incurred when a node has to wait for its next-hop node to wake up. To reduce this delay, we use an anycast forwarding scheme described in Fig. 1. Let denote the set of nodes in the transmission range i C of node i. Suppose that node i has a packet, and it needs to pick up a node in to relay the packet. Each node i i C maintains a list of nodes that node i intends to use as a forwarder. We call the set of such nodes a forwarding set, which is denoted by . In addition, each node j is also Fig.1. SystemModel i F signalsinthetime-interval[(t +t +t )(m 1),(t +t + as a forwarder. Note that even though only the nodes in a B C A B C − t )(m 1)+t +t ].Foraneighboringnodej tohearthem- forwarding set need priorities, we here assign priorities to A B C − thsignalsandtorecognizethesender,itshouldwakeupduring all nodes to make priority matrix B an independent control [(t +t +t )(m 1) t t ,(t +t +t )m t t ]. variable from forwarding matrix A. We let denote the set B C A A C B C A A C − − − − − B Therefore,providedthatnodeiissendingthem-thsignals,the of all possible priority matrices. probability that node j wakes up and hears these signals i ∈C B. Performance Metrics is pj =1 e−λj(tB+tC+tA). We call pj the awake probability − of node j. It should be noted that, due to the memoryless We next describe the performance metrics that we are property of a Poisson random process, p is same for each interested in. j beacon-ID signaling iteration, m. 1) End-to-End Delay: We assume that the end-to-end Note that there is a one-to-one mapping between the awake delay for event delivery is dominated by the cumulative sum probability p and waking-up frequency λ . Hence, an awake of the delay for each hop to wake up and to relay a packet to j j probability is also closely related to both delay and energy its next-hop neighbor. This is a reasonable approximation in consumption. Let "p=(p ,i ) represent the global awake many event-driven networks. Note that when an event occurs i ∈N probability vector. inanevent-drivensensornetwork,thefirstpacketgeneratedby 2) Forwarding Set: The forwarding set i is the set the event usually suffers most of the delay because at every F of candidate nodes chosen to forward a packet at node i. hop it has to wait for nodes to wake up so that it can be In principle, the forwarding set should contain nodes that relayed. Once the first packet goes through, the sensor nodes can quickly deliver the packet to the sink. However, since can stay awake for a while, hence the delay of the subsequent the end-to-end delay depends on the forwarding set of all packets are often much smaller. Therefore, in this paper, we nodes, choosing the correct forwarding set is not easy. We define the end-to-end delay as the delay incurred by the first use a matrix A to represent the forwarding set of all nodes packet, which is the sum of the delay for each hop to wake collectively, as follows: up and to relay the packet to its next-hop neighbor. Given A, B, and ",pthe stochastic process with which a A=[a ,i=1,...,N,j =1,...,N] ij packet traverses the network from the source node to the sink where a = 1 if j is in node i’s forwarding set, and a = is completely specified, and can be described by a Markov ij ij 0 otherwise. We call this matrix A the forwarding matrix. process. We define Di("pA, ,B) as the expected end-to-end Reciprocally, we define (A) as the forwarding set of node delay for a packet from node i to reach sink s, when awake i F iunderforwardingmatrixA,i.e., (A)= j a =1 . probabilityvector",pforwardingmatrixA,andprioritymatrix i i ij F { ∈C | } We let denote the set of all possible forwarding matrices. B are given. Since sink s is the destination of all packets, A With anycast, a forwarding matrix determines the paths the delay of packets from sink s is regarded as zero, i.e., that packets can potentially traverse. Let g(A) be the di- Ds("pA, ,B) = 0, regardless of ",pA, and B. If node i is rected graph G(V,E(A)) with vertices V = , and edges disconnected to sink s under forwarding matrix A, packets N E(A) = (i,j)j (A) . If there is a path in g(A) that from the node cannot reach sink s. Therefore, the end-to- i { | ∈F } leads from node i to node j, we say that node i is connected end delay from such a node i is regarded as infinite, i.e., to node j. Otherwise, we call it disconnected to node j. For Di("pA, ,B) = . From now on, we call ‘the expected end- ∞ convenience, we call a node that is ‘connected (disconnected) to-end delay from node i to sink s’ simply as ‘the delay from to sink s’ simply as ‘connected (disconnected).’ An acyclic node i’. path is the path which does not traverse any node more than 2) Network Lifetime: We assume that node i consumes once. If g(A) has any cyclic path, we call it a cyclic graph, ui unit of energy each time it wakes up. Let Qi be the energy otherwise we call it an acyclic graph. available to node i. Then, the expected lifetime of node i is 3) Priority: When multiple nodes send an acknowledge- uQiλii.Byintroducingthepowerconsumptionratioei =ui/Qi, mentafterthesameIDsignal,thesourcenodeineedstopick we can express the lifetime of node i as one of them as a forwarder. We assume that node i assigns 1 t +t +t B C A hpirgiohreistitepsrtiooriatlyl anmodoensgintheCsie, annoddewsitlhlaptiwckaktheeupn.odCelewariltyh, tthhee Ti(")p= eiλi = eiln(1−1pi) . (1) priorityassignmentwillalsoaffecttheexpecteddelay.Weuse Here we have used the definition of the awake probability amatrixBtorepresenttheglobalprioritydecision,asfollows: pi = 1 e−λj(tB+tC+tA) from (1). Note that in this def- − inition of lifetime we have chosen not to account for the B=[b ,i=1,...,N,j =1,...,N] ij energyconsumptionbydatatransmission.Thisisareasonable where b 1, , if j , and b = 0 otherwise. approximation for those event-driven sensor networks where ij i i ij ∈{ ··· |C |} ∈C This b represents the priority of node j from the viewpoint eventsoccurveryrarely,inwhichcasetheenergyconsumption ij of node i. We call this matrix B the priority matrix. The of the sensor nodes is dominated by the energy consumed priority matrix B further satisfies b = b for all distinct during the sleep-wake scheduling. ij1 # ij2 nodes j ,j . Among the awake nodes, the node j that We assume that the network lifetime is determined by the 1 2 i ∈C satisfies b > b for all the other nodes k will be chosen shortest lifetime of all nodes. In other words, the network ij ik lifetime for a given awake probability vector "pis given by T(")p=min T (")p. The methodology of the paper may be i i extendedtoh∈aNndleotherdefinitionsoflifetime,e.g.,whenthe Di("pA, ,B) sensor network is considered operational if less than a certain ∞ = [(t h+t +D ("pA, ,B))P ] I D j j,h percentage of nodes are alive. However, we leave this more general definition of lifetime for future work. h&=1j∈&Fi(A) t I 3)ProblemFormulation:Theobjectiveofthispaperisto = tD+ 1 (1 p ) choose awake probability vector ",pforwarding matrix A, and − − j prioritymatrixBtomaximizethenetworklifetime,subjectto j∈F#i(A) the constraint that the expected delay from each node to sink D ("pA, ,B)p (1 p ) j j k − s is below the maximum allowable delay, i.e., +j∈&Fi(A) k∈Fi(A#):bij<bik .(2) 1 (1 p ) j − − (P) max T(")p j∈F#i(A) "pA,,B We call (2) the local delay relationship, which must hold subject to Di("pA, ,B) ξ∗, i ≤ ∀ ∈N for all nodes i except the sink s. (Recall D ("pA, ,B) = 0 "p (0,1]N, A , B . s ∈ ∈A ∈B regardless of the delay of neighboring nodes.) B. The Optimal Forwarding Set and Priority Assignment where ξ is the maximum allowable delay. ∗ Inthissubsection,wefirstconsiderthehypotheticalscenario where a node i knows the delays D from its neighboring j nodes j to sink s, and such delays D are fixed. Under j III. MINIMIZATIONOFEND-TO-ENDDELAYSFORGIVEN this hypothesis, we will study how node i should adjust its AWAKEPROBABILITIES own forwarding set and priority assignment to minimize the expected delay from node i to sink s. Then, in the next subsection,wewillusetheinsightfromtheresulttodetermine In this section, we consider how each node should choose the optimal forwarding matrix A, and priority matrix B. itsforwardingsetandassignprioritiestoneighboringnodesto Consider that a node i has multiple neighboring nodes with minimizethedelayD ("pA, ,B),whentheawakeprobabilities i fixeddelay.Similarto(2),wecancalculatetheexpecteddelay are given. Then, in Section IV, we relax the fixed-probability from node i to sink s for a given neighboring delay vector assumption to solve problem (P). "π =(D ,j ), forwarding set , and priority assignment i j i i "b as ∈C F i A. Local Delay Relationship f("πi, i,"bi) F t + D p (1 p ) We first derive a recursive relationship for the delay, ! tD+ I j∈F1i j j k∈(1Fi:bipj<)bik − k .(3) D ("pA, ,B). When node i has a packet, the probability P ’ − j∈(Fi − j i j,h that node j in becomes a forwarder right after the h-th We call the function f(, , ) th(e local delay function. i · · · beacon-ID signaCls is equal to the probability that no nodes Wefirstshowthat,inordertominimizef(, , ),theoptimal in i have woken up for the past h 1 beacon-ID-signaling priority assignment "b∗i can be completely d·et·er·mined by the iterCations, and node j wakes up at th−e h-th beacon-ID signals neighboring delay vector "πi. while all nodes with a higher priority than node j remain Proposition 1: Let"b∗i be the priority assignment that gives sleeping at the h-th iteration, i.e., higher priorities to neighboring nodes with smaller delay, i.e., for each pair of nodes j and k satisfying b < b , the ∗ij ∗ik inequality D D holds. Then, for any given , h 1 k ≤ j Fi − Pj,h = (1−pk) pj (1−pk). f("πi,Fi,"b∗i)≤f("πi,Fi,"bi) (4) k∈#Fi(A) k∈Fi(A#):bij<bik for all possible"bi. The detailed proof is provided in Appendix A in our on-line Conditioned on this event, the expected delay from node i to technicalreport[11].TheintuitionbehindProposition1isthat sink s is given by (t +t +t )h+t +t +D ("pA, ,B). when multiple nodes sends acknowledgements, selecting the B C A R P j For ease of notation, we define the iteration period tI !tB+ node with the smallest delay should minimize the expected tC +tA and the data transmission period tD ! tR+tP. We delay. Therefore, priorities must be assigned to neighboring can then calculate the expected delay D ("pA, ,B) of node i nodes according to their (known) delays D , independent of i j for given awake probability vector ",pforwarding matrix A, awake probabilities and forwarding sets. In the sequel, we and priority matrix B as follows: use b ("π ) to denote the optimal priority assignment for given ∗i i neighboring delay vector "π , i.e., for all nodes j and k in , is a subset of j D = fˆ("π , ) t . This means if b∗ij("πi)<b∗ik("πi), then Dik ≤Dj. For ease of notation, wCie Gthat if there exist{s a∈nCodi|e jj such thiatFDi∗j−= fDˆ(}"πi,Fi∗)−tD, define the value of the local delay function with this optimal is not unique. In other words, if such a node j wakes up priority assignment as fˆ("πi,Fi)!f("πi,Fi,"b∗i("πi)). Ffiri∗st, there is no difference in the overall delay whether node The following properties characterize the structure of the i transmits a packet to this node or waits for the other nodes optimal forwarding set. in to wake up. Fi∗ Proposition 2: For a given "πi, let 1, 2, and 3 be Since the optimal forwarding set consists of nodes whose J J J mutually disjoint subsets of Ci satisfying b∗ij2("πi) < b∗ij1("πi) delay is smaller than or equal to some threshold value, for all nodes j1 k and j2 k+1 (k =1,2). Let the simplest solution to find the optimal forwarding sets is ∈J ∈J to run an exhaustive search from the highest priority, i.e., D p (1 p ) DJk = ’j∈Jk j 1j(−k∈Jj∈kJ:bk∗ij((1"πi−)<pb∗ijk)("πi) − k , mki=nim|Ciiz|e,stofˆt(h"πei,lFowi,kes)twprhieorreityF,ii,.ke.,=k{=j 1∈,Ctoi|fibn∗ijd("πthi)e≥k tkh}at. denotetheweightedaverage(delayin k fork =1,2,3.Then, If there are multiple optimal forwarding sets, we only need the following properties related to fˆ(J"π , ) hold to find one of them. In this paper, we chose to use the i (a) fDˆ("πi,+Jt1∪<J3fˆ)(<"π ,fˆ("πi,J1)).⇔DJ3·+tD <fˆ("πi,J1)⇔ sfoetrwFair∗di=ng{sjet∈beCcaiu|Dsejit<isfˆt(h"πei,fiFrsi∗t)o−netDth}atawsethceanopotbimtaianl (b) fˆ(J"π3, D )=ifˆJ("π1∪,J3) D +t =fˆ("π , ) in the exhaustive search. Therefore, we redefine the optimal (c) fDIˆf(Jf"πˆ3(ii,"π+Ji,t11JD∪1=J∪J33fˆ)3(.")πi<,Jfˆ1(i"∪πiJJ,1J3)1.⇔),theJn3fˆ("πiD,J1∪J2i∪JJ13)⇔< fFfˆo(i∗r"πwia,=rFdi∗ian)rgg−msetiDtn}FF.ii∗⊂NCaoistfeˆt(h"tπheia,tfFowir)witaharndtdhinisgFdi∗seefit=ntihti{aotjns,∈atthCisefiieo|sDptjibmo<tahl (d) Iffˆ("πJ, ∪J )=fˆ("π , ),thenfˆ("π , ) forwarding set is unique. Then, the following lemma helps us i 1 3 i 1 i 1 2 3 fˆ("π , J ∪J), and the eqJuality holds onJly∪wJhen∪DJ =≤ to find the optimal forwarding set more quickly. D ifoJr1a∪llJj3 and j . j2 Lemma 1: For all i that satisfies = j i Dj < j3 2 ∈J2 3 ∈J3 fˆ("π , ) t , F ⊂.C F { ∈C | Proof:Thispropositioncanbeshownbynotingthateach i F − D} Fi∗ ⊂F Proof:FromProposition3(a)andthedefinitionof ,all nodesetJk (k =1,2,3)canberegardedasanodewithdelay nodes k satisfy D <fˆ(π , ) t fˆ(π , )Fi∗t , DdtheeJlakpyraofnubdnabcatiwiloitanykecthapanrtobabenaybexinlpiotrydeesPsieJndkJa=ks w1a−ke(s uj∈p.JkT(h1en−, tphje),loi.cea.l, ffˆo(rπia,nFy)∈s−uFbtsDi∗etfoFria⊂llCnokid.esSiknc∈eiFFFi∗i∗.⊂H−CeniDc,ew,≤Fei∗ob⊂itaFiFn.iD−k D< Lemma 1 implies that when we exhaustively search for the fˆ("π , K )=t + tI + Kk=1DJkPJk lk=−11(1−PJl) optimal forwarding set from k = |Ci| to k = 1, we can i ∪k=1Jk D 1 K (1 P ) stop searching if we find the first (largest) k such that for ’ − k=1 (− Jk all nodes j , D <fˆ("π , ) t , and for all nodes i,k j i i,k D for K = 1,2,3. Then, by algebrai(c manipulation, we can l / , D∈Ffˆ("π , ) t F. Sinc−e all neighboring nodes i,k l i i,k D establish Properties (a)-(d). Details are again available in ∈F ≥ F − are prioritized by their delays, we do not need to compare Appendix B in [11]. the delays of all neighboring node with the threshold value. The interpretation of Proposition 2 is straightforward. For Hence, the stopping condition can be further simplified as example,Property(a)impliesthataddinglowerprioritynodes follows: node i searches the largest k such that for node j odfelJay3iifnatondthoenlcyurirfetnhtefworewigahrdteidngavseertaFgei d=elJay1idnecreapsleusstthe with b∗ij("πi)=k, Dj <fˆ("πi,Fi,k)−tD, and for node l with J3 D b ("π )=k 1, D fˆ("π , ) t . is smaller than the current delay. ∗il i − l ≥ i Fi,k − D It should be noted that the optimal forwarding set is time- Using Proposition 2, we can obtain the following main invariantduetothememorylesspropertyofaPoissonrandom result. Prhoapsotshietiofonll3o:wLinegt sFtriu∗ct=uralarpgrompienrtFiei⊂s.Cifˆ("πi,Fi). Then, ptorowceaskse. Suppecisifiaclawllayy,sthteheexspaemcteedastimtIe/pfojrreeagcahrdnleosdseojfinhoCwi Fi∗ long the source node have waited. Therefore, the strategy to (a) must contain all nodes j in that satisfy D < fFˆ(i∗"π , ) t . Ci j minimize the expected delay is also time-invariant. i Fi∗ − D (b) cannot contain any nodes j in that satisfy D > C. Globally Optimal Forwarding and Priority Matrices (c) fFFˆo(i∗"πria,lFl in∗)od−estDj.in Ci that satisfy DCji= fˆ("πi,Fi∗)−jtD, rithWmecnoemxtpuusteintghethiensgilgohbtaollfySoepcttiimonalIIfIo-Brwtaorddienvgelaonpdapnriaolrgioty- the following relationship holds, matrices for given ".pThis algorithm has the flavor of the fˆ("π , )=fˆ("π , j )=fˆ("π , j ). distributed Bellman-Ford’s algorithm for finding the shortest i Fi∗ i Fi∗\{ } i Fi∗∪{ } paths. At each iteration, each node uses the delay estimates We can prove Proposition 3 by using the result of Proposition fromthepreviousiterationtoupdatetheforwardingsetandthe 2. (See the detail provided in Appendix C in [11].) priorityassignment.Wewillshowthatthealgorithmconverges FromProportion3,wecancharacterizetheoptimalforward- in N iterations, and the resulting A and B minimize the ing set as = j D < fˆ("π , ) t , where expected delay D ("pA, ,B). Fi∗ { ∈C i| j i Fi∗ − D}∪G i The algorithm is presented next. 2) The OPT-DELAY algorithm converges within N itera- The OPT-DELAY Algorithm tions. Step (1) At iteration 0, each node i sets 3) Forgiven",p(A∗(")p,B∗(")p)=argminA,BDi("pA, ,B) for all nodes i . Di(0) = 0 if i=s, Proof:Inthispap∈eNr,weshowthebasicideasoftheproof. otherwise. ) ∞ The detailed version of proof is provided in Appendix E in and (0) = . Each node arbitrarily assigns priorities to [11]. neighFbioring no∅des. We first show that D(h+1) D(h) for h 1 and all i ≤ i ≥ Step (2) At iteration h ( 1), each node i sets "b(h) = nodes i. Suppose in contrary that there exists node i such "bfSSo∗ittre(ew"πppia((hr(4d−3)i)1nI)gfE),Daswcei(hthh)fenor=oerdD"π"πDeii((i(hhih(ih−)−−u1=11)p))df=aˆ≥fan(ot"dπ(erDsi(aahllj(−Flsho1n−i()ho1,u)d)Fp,edbijs(ayhi∈t)e)∈fiCs.nNiDd)i.i(n,hgt)hiatshseaflogoloiplortiiwtmh(s5ma)l tDRitDshh2ienae,i((kpkhktr·e)e−·Das·ktm+,i=i(inihus1kg))sD,.itn·t<(h·Fe1ii·x)oshir,D−spit=1hi(nrh’−onos+tco1de1tderd)es+a.uunirchiTtse1h−mh,/1eiwp∈t,snhsC,eaiDaotfctniri(ahio1akn−)smrnua1yfinc∈h[gint<C1ede1,trh]aiai,akDt.i−etosw.i(1en,h2Deq−)skaui(11nch,e.∈a−dnbnCHce1e)Dcosiawhhi(o<u−khofes1−wev,nDkeno)rttoh,i(dh1hdee<a)inesft. terminates.Otherwise,eachnodeincreaseshbyoneandgoes ih 1 ih 1 D I s i −can deli−ver the packet directly to sink s. If sink s is not back to Step (2). h 1 in− , D(2) D(1) = . This leads to a contradiction. To analyze the OPT-DELAY algorithm, we will use the ThuCsih,−D1(h+i1h)−1 ≤D(h)ihf−o1rall∞nodesi anditerationh>1. following notations. We define the subgraph gi(A) = We noiw pro≤ve tihe first property. S∈uNppose in contrary that G(V (A),E (A)) as the graph with vertices V (A) = i i i there is a cyclic path in g(A(h)). Let the sequence of nodes j V(A) i is connected to j in g(A) andedgesE (A)= {{is(j∈c,okn)ne∈cteE|d(Ato)|i{tjs,eklf},⊂i.e.,Vii(A∈)}V.iB(Ay})cofonvrenaltlionA, in∈odAe i. isakhlo+onw1g∈tthhFaitsit(ckhhye)cldfioecrlapykasth=alboe1n,gi21,t,h.i.e2.,,cK·y·c.·liT,cihKpean,t,ahnfsrdoatmiiKsf+[y111]=, wi1e, ic.ea.n, This subgraph g (A) shows all possible paths from node i i underforwardingmatrixA.ForanyforwardingmatrixA,the D(h) >D(h) > >D(h) >D(h). i1 i2 ··· iK i1 numberofdistinctacyclicpathsing(A)isfinitewhenthetotal Thisisacontradiction.Therefore,g(A(h))isanacyclicgraph. number of nodes is finite. Let g(A) be the maximum length | | Let (h) = A g (A) h . (h) denotes the set of acyclic paths in g(A). Then, the following proposition Ai { ∈ A|| i |≤ } Ai of forwarding matrices with which the maximum number of states an important property for analyzing the OPT-DELAY hops along acyclic paths from node i to sink s is less than h. algorithm. We now show that Proposition 4: For any ",pA , and B such that ggi((AA))iisscayccylcilci,c,thger(eAex)ist Ag& (∈∈AAA), aanndd B& ∈∈BB such that Di(h) ≤A m(ihn),BDi("pA, ,B). (6) i & | i & |≤| i | ∈Ai Di("pA, &,B&)≤Di("pA, ,B). tWe+ptro/vpebiyfisnindkucstion.A.Otittheerarwtioisne,1,F(1i()1)=={asn}daDnd(1D) =i(1) =. The detailed proof is provided in Appendix D in [11]. Propo- D I s ∈Ci Fi ∅ (1) i ∞ Now consider the right-hand-side of (6). If is not an sition 4 implies that for any forwarding and priority matrices Ai empty set, this means that node i has a direct path to sink s, thatcauseacyclicpathfromanynodeitosinks,therealways which implies that its expected delay is t +t /p . If (1) exist other forwarding and priority matrices with which all D I s Ai is an empty set, this means that there is no path for node i paths from node i to sink s are acyclic, and the delay from to reach sink s within 1 hop, which implies that the expected node i with the new matrices is equal to or smaller than delay to reach sink s within 1 hop is infinite. Therefore, (6) the delay with the original matrices. This is intuitively true holds at iteration 1. becauseitwillincurhigherdelayifthepacketshavetotraverse Next, assume that the induction hypothesis (6) holds at loops. iteration h, i.e., LetA(h) betheforwardingmatrixthatcorrespondsto (h) ofothrearlwlinsoe.deSsimii∈laNrly,,lie.et.B, a(h(ijh))b=e t1heifpjrio∈rFityi(mh)a,torirxai(injh)wF=hiic0h, Di(h) ≤A∈mA(iihn),BDi("pA, ,B) ∀i∈N . (7) the transpose of the i-th row is"b(h). Let A (")pand B (")pbe Then, using Proposition 4, we can show that (7) also holds at i ∗ ∗ iteration h+1. (See the detail in Appendix E in [11].) Hence, the forwarding and priority matrices when the OPT-DELAY (6) holds for all nodes. algorithm converges. (Note that "pis fixed and given.) We next prove that D ("pA, (h),B(h)) D(h). At iteration Thefollowingpropositionprovidesthekeypropertiesofthe i ≤ i algorithm. 1, Fi(1) ={s} if s∈Ci. Otherwise, Fi(1) =∅. Hence, Proposition 5: The algorithm has the following properties: t +t /p if s , 1) At iteration h, g(A(h)) is an acyclic graph. Di("pA, (1),B(1))= D I s ∈Ci otherwise. ) ∞ Thus, Di("pA, (1),B(1)) = Di(1) for all nodes i, and so Proposition 6: If "q∗ is the optimal solution to problem Di("pA, (h),B(h))≤Di(h) holds at iteration 1. (P2), then so is "qsuch that "q= (qi = maxkqk∗,i ∈N ), Next assume that the induction hypothesis i.e., we can let every node have the same qi. Proof:Sincebothsolutionshavethesameobjectivevalue, Di("pA, (l),B(l))≤Di(l) ∀i∈N (8) it is sufficient to show that if "q∗ is in the feasible set, so is ".q Let "pand "pbe the awakeprobability vectors that correspond holds for all l h. Then, from [11], we can show that (8) ∗ also holds for l≤= h+1. Hence, D ("pA, (h),B(h)) D(h) to "∗q and ",qrespectively, by (10). Since pi is monotonically i ≤ i increasingasq increases,and"q ",qwehave "p ".p(The holds for all i and h. i ∗ - ∗ - symbol ‘ ’ denotes componentwise inequality, i.e., if "q ",p From the previous results, we conclude that - - thenq p foralli,whereq andp arethei-thcomponents i i i i Di("pA, (h),B(h))≤Di(h) ≤A∈mA(iihn),BDi("pA, ,B) (9) ofN"qoatned≤th"a,ptrtehsepedcetliavyelyD.)i("pA, ∗(")p,B∗(")p) from each node i Themaximumlengthofanacyclicpathisequaltoorlessthan is a non-increasing function with respect to each component N. Therefore, (N) = for all nodes i. Since A(h) , at of ".p(See Appendix F in [11].) Since "p∗ ",pfor all nodes iteration N, weAoibtain A ∈A i, we have Di("pA, ∗(")p,B∗(")p) Di("p∗,A-∗("p∗),B∗("p∗)). ≤ Hence, if "q is in the feasible set, so is ".q D ("pA, (N),B(N))=D(N) =minD ("pA, ,B) ∗ i i i Using the above proposition, we can rewrite problem (P2) A,B into a problem with one variable q, from (9). Hence, the algorithm must converge in at most N iterations, and A(h), B(h), and D(h) converge to the (P3) min q, i optimalforwardingmatrix,theoptimalprioritymatrix,andthe subject to maxDi("pA, (")p,B(")p) ξ∗ minimum expected delay from node i to sink s, respectively. i∈N ≤ pi =1 e−q/ei, i − ∀ ∈N Proposition 5 shows that there always exists (A, B) that q (0, ). ∈ ∞ can minimize the delay from all nodes at the same time, and (A(")p,B(")p)correspondstosuchasolution.Furthermore,the If q∗ is the solution to problem (P3), then ("∗p,A("∗p),B("∗p)) graphg(A∗(")p)isacyclic.Thecomplexityofthisalgorithmis (p∗i =1−e−q∗/ei) corresponds to the solution of the original problem (P). givenby (N).Moreover,thisalgorithmcanbeimplemented O Note that max D ("pA, (")p,B(")p) is a non-increasing in a fully distributed fashion. i i ∈N function of p . (See the proof of Proposition 6.) Since "pis an i IV. SOLUTIONTOTHELIFETIME-MAXIMIZATION increasingvectorofq,thesimplestsolutiontoProblem(P3)is PROBLEM tolinearlysearchqsuchthatmaxi Di("pA, (")p,B(")p)=ξ∗ In this section, we solve the original lifetime-maximization where pi =1 e−q/ei. ∈N − We develop an efficient binary search algorithm for problem (P), using the results in previous sections. By letting qi =ln(1 pi)−ei, we can rewrite problem (P) as computing the optimal value of q. − The Binary Search Algorithm for Problem (P3) t (P1) max min I, Step (1) Initially, sink s sets p(1) =0.5 and k =1. subjeq"c,At,tBo Di∈iN("qpiA, ,B)≤ξ∗, ∀i∈N SStteepp ((23))SNinokdesssertusnq(tkh)e=OlPnT(-1D−ELpA(kY))−amlgaoxrii∈thNmei.for given pi =1−e−qi/ei, ∀i∈N (10) "(pk) =(p(ik) =1−e−q(k)/ei,i∈N ). q (0, ), i Step (4) After N iterations, the optimal forwarding set and i ∈ ∞ ∀ ∈N the optimal priority assignment under "p(k) are found. Nodes A , B . ∈A ∈B j that are not in the other node’s forwarding set, i.e., j / ∈ Since for any given ",pA∗(")p and B∗(")p are the optimal Fi∗(A∗("(pk))) for all nodes i, send feedback of their delays forwarding matrix and the optimal priority matrix, respec- D ("(pk),A ("(pk)),B ("(pk))) to sink s. j ∗ ∗ tively, that minimize the delay from all nodes, we have Step (5) Let Dmax be the maximum feedback delay arrived Di("pA, ∗(")p,B∗(")p) Di("pA, ,B) for all A and B. Hence, at sink s. ≤ we can rewrite problem (P1) as follows: IfD >ξ +%,thensinkssetsp(k+1) =p(k)+0.5k+1, max ∗ • (P2) max mintI, increases k by one, and goes back to Step (2). "q i∈N qi • IfDmax <ξ ∗−%,thensinkssetsp(k+1) =p(k)−0.5k+1, subject to Di("pA, ∗(")p,B∗(")p) ξ∗, i increases k by one, and goes back to Step (2). pi =1−e−qi/ei, ∀≤i∈N ∀ ∈N • IafndDrmeatuxr∈ns[ξq∗(k−) a%s,ξth∗e+o%p],titmheanl stohleutailognortiothPmrotbelremmin(aPt3es)., q (0, ), i i ∈ ∞ ∀ ∈N The reason that we take q(k) with respect to the maximum Problem (P2) can be further simplified with the following ei in Step (2) is because this makes all p(ik) less than or proposition. equal to p(k). (Note that we only search p(k) over (0,1].) In Step (4), only such a node j that does not belong to any well-known Bellman-Ford shortest path algorithm, in which other forwarding set needs to send the feedback delay to the thelengthofeachlink(i,j)isgivenbyt /p +t .LetD (")p I j D i sink s because the node with the maximum delay does not denote the minimum delay from node i under deterministic belongtoanyotherforwardingsetaccordingtoProperty(a)in routing. Then, D(h) under the modified algorithm converges i Proposition 3. Since sink s only needs to know the maximum to D (")p. i delay, there is no need for the other nodes to feedback their In this simulation, in order to compare the network lifetime delays. under the different algorithms, we run the binary search algo- rithm for Problem (P3), replacing the OPT-DELAY algorithm V. SIMULATIONRESULTS in Step (3) with the above mentioned algorithms. Inthissection,weprovidesimulationresultstoillustratethe performance advantage of our optimal anycast algorithm. We B. Performance Comparison simulate a wireless sensor network with 400 nodes deployed In Fig. 2, we compare the network lifetime under the randomly over a 10-by-10 area with uniform distribution, and different algorithms, where x-axis represents different max- thesinksislocatedat(0,0).Weassumethatthetransmission imum allowable delays ξ∗ in our original Problem (P), and y- range from each node i is a disc with radius 1.5, i.e., j ∈Ci, axis represents the maximum lifetime for each ξ∗. The curve if the distance between node j and node i is less than 1.5. labeled ‘Anycast (optimal)’ represents the lifetime under the The parameters tI and tD are set to 1 and 5, respectively. We optimal anycast algorithm, i.e., the OPT-DELAY algorithm. also assume that power consumption ratio ei is identical for The curves labeled ‘Anycast (norm)’ and ‘Anycast (naive)’ all nodes i. represent the lifetime under the normalized-latency anycast algorithm,andunderthenaiveanycastalgorithm,respectively. A. Existing Algorithms Proposed in the Literature The curve labeled ‘Deterministic routing’ represents the life- In this subsection, we review some existing algorithms that time under the deterministic routing algorithm. we will compare with our optimal algorithm. Normalized-latency Anycast Algorithm:Thenormalized- 20 latencyalgorithmproposedin[10]isananycast-basedheuris- 18 tic that exploits geographic information to reduce the delay 16 from each node. Let d be the distance from node i to sink i s, and let r be the progress from node i to node j toward 14 ij e m sthinekosn,e-ih.eo.,prdijel=aydfiro−mdnj.odIfeaintoodae nheaxst-ahoppacnkoetd,el,eatnDd lbeet k Lifeti1102 R be the progress between two nodes. Since node i selects etwor 8 thenext-hopnodeprobabilistically,bothD andR arerandom N 6 variables. The objective of the normalized latency algorithm 4 Anycast (optimal) is to find the forwarding set that minimizes the expectation Anycast (norm) of normalized one-hop delay, i.e., E[D]. The idea behind this 2 Anycast (naive) R Deterministic Routing algorithm is to minimize the expected delay per unit distance, 0 0 50 100 150 200 250 which might help to reduce the actual end-to-end delay. Maximum Allowable Delay ξ* Naive Anycast Algorithm: The naive algorithm proposed Fig.2. Thenetworklifetimeaccordingtodifferentallowabledelayξ∗when in [10] is also an anycast-based heuristic algorithm that nodesareuniformlydeployed. exploits geographic information. Under this algorithm, each node includes all neighboring nodes with positive progress in From Fig. 2, we observe that all anycast algorithms sig- the forwarding set. nificantly extend the lifetime compared to the deterministic Deterministic Routing Algorithm: By deterministic rout- routing algorithm. We also observe that the performance of ing, we mean that each node has only one designated next- theoptimalandthenormalized-latencyalgorithmisveryclose. hop forwarding node. Therefore, deterministic routing can be Notethatthenormalized-latencyalgorithmgivespreferenceto viewed as a special case of anycast, in which the size of nodes with larger progress, while our optimal algorithm gives the forwarding set at each node is restricted to one. There- preference to nodes with smaller delays. The results in Fig. 2 fore, instead of finding the optimal forwarding set (h) = seem to suggest that there is a correlation between progress Fi argmin fˆ("π(h−1), ) in Step (3) of the OPT-DELAY and delay when nodes are deployed uniformly. Finally, the algorithmF⊂,Cwie updiate F(h) according to reason for the performance gap between the optimal and the Fi naive algorithms is that transmitting a packet to a neighbor (h) = argmin fˆ("π(h−1), ),. (11) with small progress is often not a good decision if a node Fi i F F⊂Ci:|F|=1 with higher progress is expected to wake up soon. After the above modification, the OPT-DELAY algorithm be- We next simulate a topology where there is a hole in the comes one that finds the optimal next hop under deterministic sensor field as shown in Fig. 3. This is motivated by practical routing. Note that this modified algorithm is equivalent to the scenarios,wherethereareobstructionsinthesensorfield,e.g., a lake or a mountain where sensor nodes cannot be deployed. normalized-latency algorithm, all packet are forwarded only The simulation result based on this topology is provided in to nodes with positive progress, and hence they take longer Fig. 4. detours. Therefore, the result of Fig 3 shows that when the node distribution is not uniform, there may not be a strong 10 correlation between progress and delay. Thus, the anycast- based heuristic algorithms depending only on geographical 9 information could perform poorly. 8 Maximum Delay Node VI. CONCLUSION 7 In this paper, we study how to use anycast to reduce the 6 end-to-enddelayandtoprolongthelifetimeofwirelesssensor 5 networks employing asynchronous sleep-wake scheduling. In 4 Lake particular, we study the joint control problem of how to opti- 3 mally control the sleep-wake schedule, the anycast candidate set of next-hop neighbors, and the anycast priorities, in order 2 to maximize the network lifetime subject to a upper limit on 1 theexpectedend-to-enddelay.Weprovideanefficientsolution 0 to this joint control problem, and as a part of the solution, we 0 2 4 6 8 10 also show how to optimally choose the anycast candidate set Fig. 3. Node deployment and routing paths under different forwarding to minimize the end-to-end delay from all sensor nodes. Our algorithmswhenpi=0.5:Thedottedlinesillustrateallroutingpathsunder theoptimalanycastalgorithm,thethicksolidlinesillustratetheuniquerouting numerical results suggest that the proposed solution can sub- path under the deterministic routing path, and thin solid lines illustrate all stantially outperform prior heuristic solutions in the literature routingpathsunderthenormalized-latencyanycastalgorithm under practical scenarios where there are obstructions in the coverage area of the wireless sensor network. Thealgorithmsthatwehavedevelopedcanbeeasilyapplied 20 to energy-constrained event-driven wireless sensor networks. 18 In future work, we plan to extend the result to the case with 16 non-Poisson sleep-wake patterns, and to handle more general 14 notions of network lifetime. e m eti12 REFERENCES k Lif10 [1] W.Ye,H.Heidemann,andD.Estrin,“MediumAccessControlwithCo- or Netw 8 oTrrdainnsaatcetdioAnsdaopntivNeeStwleoerpkiinngg,fovrolW.1ir2e,lensos.S3e,npspo.r4N9e3tw–5o0r6k,s,”JuInEeE2E0/A04C.M 6 [2] T.vanDamandK.Langendoen,“AnAdaptiveEnergy-EfficientMAC ProtocolforWirelessSensorNetworks,”inProc.SenSys’03,November 4 Anycast (optimal) Anycast (norm) 2003,pp.171–180. 2 Anycast (naive) [3] G. Lu, B. Krishnamachari, and C. S. Raghavendra, “An Adaptive Deterministic Routing Energy-EfficientandLow-LatencyMACforDataGatheringinWireless 0 0 50 100 150 200 250 300 SensorNetworks,”inProc.IPDPS’04,April2004,pp.224–231. Maximum Allowable Delay ξ* [4] J.Polastre,J.Hill,andD.Culler,“VersatileLowPowerMediaAccess for WIreless Sensor Networks,” in Proc. SenSys’04, November 2004, Fig.4. Thenetworklifetimeaccordingtodifferentallowabledelayξ∗when pp.95–107. nodesarenotuniformlydistributed. [5] J. Polastre, J. Hill, P. Levis, J. Zhao, D. Culler, and S. Shenker, “A Unifying Link Abstraction for Wireless Sensor Networks,” in Proc. SenSys’05,November2005,pp.76–89. From this figure, we observe that the optimal anycast algo- [6] M.ZorziandR.R.Rao,“GeographicRandomForwarding(GeRaF)for rithmsubstantiallyoutperformstheotheralgorithmsincluding AdHocandSensorNetworks:EnergyandLatencyPerformance,”IEEE the normalized-latency anycast algorithm. Fig 3 provides us transactionsonMobileComputing,vol.2,no.4,pp.349–365,October 2003. withtheintuitionforthisperformancegap.Weplottherouting [7] ——, “Geographic Random Forwarding (GeRaF) for Ad hoc and paths from the nodes with the largest delay. The dotted lines SensorNetworks:MultihopPerformance,”IEEEtransactionsonMobile (above the hole) illustrate all routing paths under the optimal Computing,vol.2,no.4,pp.337–348,October2003. [8] R. R. Choudhury and N. H. Vaidya, “MAC-Layer Anycasting in Ad anycastalgorithm.Thethicksolidlines(abovethehole)illus- HocNetworks,”SIGCOMMComputerCommunicationReview,vol.34, trate the unique routing path under the deterministic routing no.1,pp.75–80,January2004. algorithm. The thin solid lines (above the hole) illustrate all [9] S.JainandS.R.Das,“ExploitingPathDiversityintheLinkLayerin WirelessAdHocNetworks,”inProc.WoWMoM,June2007,pp.22–30. routing paths under the normalized-latency anycast algorithm. [10] S. Liu, K.-W. Fan, and P. Sinha, “CMAC: An Energy Efficient MAC The routing paths under the naive anycast algorithm are omit- LayerProtocolUsingConvergentPacketForwardingforWirelessSensor ted because they are similar to those under the normalized- Networks,”inProc.SECON’07,SanDiego,CA,June2007. [11] J. Kim, X. Lin, N. B. Shroff, and P. Sinha, “On Max- latency anycast algorithm. In our optimal algorithm, in order imizing the Lifetime of Delay-Sensitive Wireless Sensor to reduce the delay, a packet is first forwarded to neighbors Networks with Anycast,” Technical Report, Purdue University, with negative progress but smaller delay. However, under the http://web.ics.purdue.edu/˜kim309/Kim08tech.pdf,2007.