<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Enhancing Sensor Network Efficiency Through Optimized Flooding Mechanism</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nadiia Dovzhenko</string-name>
          <email>nadezhdadovzhenko@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleg Barabash</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Musienko</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yevhen Ivanichenko</string-name>
          <email>y.ivanichenko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Iryna Krasheninnik</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bogdan Khmelnitsky Melitopol State Pedagogical University</institution>
          ,
          <addr-line>59 Naukove Mistechko str., Zaporizhzhia, 69000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”</institution>
          ,
          <addr-line>37 Peremogy ave., Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>465</fpage>
      <lpage>470</lpage>
      <abstract>
        <p>Sensor networks play a crucial role in modern technologies, especially with the widespread implementation of the Internet of Things, where they are used for collecting data from the physical world and transmitting it for analysis and further processing. Therefore, data security in sensor networks is a key aspect, as it affects confidentiality, integrity, and availability of information. Sensor networks employ various encryption and authentication methods to protect the transmitted and processed data. Additionally, the issue of securing the sensors and devices themselves from unauthorized access and attacks, such as Denial of Service, is becoming increasingly prominent. Naturally, security standards and protocols, specifically adapted for sensor networks and IoT, are being developed and implemented to minimize security risks. The development of machine learning and artificial intelligence technologies is also gaining popularity, as it enhances threat detection mechanisms and anomalies in network traffic, thereby more effectively protecting sensor networks. In the context of resource management and energy consumption, it is also important to consider security aspects, as attacks on sensor networks can lead to unjustified resource expenditure and, consequently, a reduction in the lifespan of devices and sensors.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Network</kwd>
        <kwd>sensor</kwd>
        <kwd>nodes</kwd>
        <kwd>efficiency</kwd>
        <kwd>flooding</kwd>
        <kwd>anomalies</kwd>
        <kwd>IoT</kwd>
        <kwd>network traffic</kwd>
        <kwd>routing</kwd>
        <kwd>protection</kwd>
        <kwd>security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Sensor networks today are one of the most
promising technologies, having found
widespread application in areas such as the
creation of “smart” cities, industrial
automation systems, environmental
monitoring, healthcare, and many others [1].</p>
      <p>The basis of their popularity lies in the use
of relatively inexpensive components—sensor
nodes, which are combined in large numbers
into wireless networks [2, 3].</p>
      <p>This allows for efficient data collection and
exchange about various physical and
environmental conditions that these sensors
track and monitor.</p>
      <p>Integration with next-generation networks,
such as 5G and the Internet of Things (IoT),
significantly expands the application
possibilities of sensor networks, enhancing
their efficiency and opening access to a wide
range of services.</p>
      <p>Advancements in computing and
communication technologies have enabled the
integration of sensing functions and the
development of wireless communication
interfaces. The use of microprocessors in
miniature devices allows for the processing of
large volumes of data in various environments.</p>
      <p>Incorporating numerous nodes into sensor
networks boosts their functionality but may
compromise the overall network reliability,
owing to a higher probability of failures in
individual nodes.</p>
      <p>Additionally, the distance limitations for
wireless information transmission can restrict
the network's range and efficiency in
distributed applications. To mitigate the risks
associated with node failures and ensure
network reliability, connectivity strategies and
approaches, redundancy, and routing in the
network are applied. This enhances its
resilience to failures, ensuring service
continuity and connectivity between nodes
even in the event of isolation of individual
network elements [4].</p>
      <p>Owing to the close integration between
smart sensors and sensor nodes, sensor
networks acquire unique characteristics that
require a meticulous approach to their design
and implementation.</p>
      <p>The main advantage of such an approach is
the ability to use energy efficiently and
improve the quality of monitoring through
data processing directly on sensor nodes with
the help of intelligent algorithms.</p>
      <p>The main criteria describing sensor
networks include the following:
• The sensor network must be wireless;
this minimizes environmental
interference and simplifies deployment
in various locations;
• The sensor network consists of
thousands of sensors (network nodes)
with any coverage area and performs
any tasks assigned to it; scalability is
critical for adapting to different
applications and territory sizes;
• Sensors within the network must
selforganize into a wireless network capable
of transmitting arbitrary information
between any two sensors in the network,
with the necessary transmission speed;
technologies such as mesh networks
allow sensors to dynamically reorganize
to optimize communication paths;
• Sensor nodes must consume a minimal
amount of energy, as they operate over a
significant period; the use of
energyefficient communication protocols and
energy management algorithms is key to
extending the life of the network;
• Sensor nodes must respond promptly, be
unobtrusive, convenient to use, and
lowcost. The integration of technologies
such as microelectromechanical systems
allows the creation of miniature, highly
efficient sensor nodes at an affordable
price.</p>
      <p>Today, many sensor networks are limited in
terms of coverage area and the number of tasks
they can perform. They are capable of
transmitting only certain types of information
with limited bandwidth.</p>
      <p>However, the continuous development of
technologies and innovations allows for the
expansion of sensor network capabilities,
particularly through the improvement of data
encoding and transmission systems, making
them more flexible and efficient in various
application conditions.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Features of Effective Resource</title>
    </sec>
    <sec id="sec-3">
      <title>Management</title>
      <p>Effective resource management and security in
modern sensor networks require a
comprehensive approach that includes not
only the development of the latest protection
mechanisms and traffic management but also a
focus on optimizing energy consumption and
resource utilization. This is because sensor
networks typically consist of a large number of
devices located in diverse conditions, requiring
adaptability and high efficiency in
management to ensure their long-term
operation.</p>
      <p>For example, in sensor networks, there are
often identical scenarios of abnormal use of
signaling and bandwidth, which can lead to
inefficient use of energy and network
resources.</p>
      <p>• Abnormal use of signaling. If the wireless
network’s idle mode timer is set to ten
seconds, establishing a session involves
additional signaling and sending a single
packet every 11 seconds.
• This results in sending 330 packets or
about 13 KB of data during one operating
period, necessitating at least 54 minutes
of the mobile device’s battery life and
airtime for sending 330 signaling events.
• Abnormal use of airtime. For example,
when a node transmits data for five
seconds, it leads to the continuous active
use of network resources. In this case,
approximately 720 packets or 28.8 KB are
transmitted over one hour, requiring 60
minutes of battery life and only sending
one signal message.
• Anomalous bandwidth usage
demonstrates the significant resource
requirements for downloading large files,
such as videos larger than 1 GB, which
necessitates at least 1.5 hours of continuous
high-frequency communication sessions at
a speed of 1.5 Mbps.</p>
      <p>The mentioned scenarios confirm the need
for developing and implementing effective
traffic and resource management mechanisms,
as well as security methods, including
encryption and authentication algorithms,
protection algorithms against anomaly
detection from DoS attacks, and other threats
[5–7].</p>
      <p>Additionally, significant attention must be
paid to the development of standards and
protocols to ensure equipment compatibility,
which simplifies the integration of new
technologies and the scaling of existing
networks.</p>
      <p>This also includes the development of
comprehensive security systems that protect
data from unauthorized access and
cyberattacks, using advanced methods of
encryption, authentication, and anomaly
detection.</p>
      <p>In conclusion, effective resource
management and security assurance in sensor
networks require an integrated approach that
combines the latest data management
technologies, energy optimization,
cybersecurity, and artificial intelligence. Such
an approach will ensure high reliability,
efficiency, and security of sensor networks,
adapted to complex and dynamic application
conditions [8].</p>
    </sec>
    <sec id="sec-4">
      <title>3. Connectivity in Sensor</title>
    </sec>
    <sec id="sec-5">
      <title>Networks</title>
      <p>
        When designing the sensor network
infrastructure, it is necessary to highlight the
issue of connectivity. After all, establishing
connectivity between the constituent elements
of the network is crucial for several reasons.
First of all, there is efficient use of energy
resources. This is because components, which
often have limited energy resources, are used
in sensor networks. Therefore, rational and
effective connectivity can significantly
minimize energy consumption by optimizing
data transmission routes [
        <xref ref-type="bibr" rid="ref3">9</xref>
        ].
      </p>
      <p>Second, there is less attention paid to issues
of scalability. Clear and logical connectivity
positively affects the incorporation of new
approaches to expand the constituent
components of the sensor network without
significant changes to the existing infrastructure</p>
      <p>
        Thirdly, it’s notable that the reliability of data
transmission increases with rational
connectivity of network components.
Connectivity between nodes facilitates reliable
data transmission from sensors to the central
data collection and processing node, which is
especially important in critical applications such
as medical, military, or security systems [
        <xref ref-type="bibr" rid="ref4">10</xref>
        ].
      </p>
      <p>Fourthly, there is minimization of data loss.
Reliable connectivity reduces the risk of data
loss during transmission between nodes,
ensuring more accurate and dependable
collection and priority processing of data for
further retransmission within the network.</p>
      <p>
        Factors such as coverage, flexibility,
mobility, and response speed of sensor
network nodes are also crucial. Thus, ensuring
effective connectivity is fundamental to the
successful operation of sensor networks [
        <xref ref-type="bibr" rid="ref5">11</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>4. Optimization of the Flooding</title>
    </sec>
    <sec id="sec-7">
      <title>Mechanism</title>
      <p>Flooding is a basic message propagation
mechanism in sensor networks that, despite its
simplicity, can be optimized to reduce
redundancy and enhance efficiency.</p>
      <p>One of the key disadvantages of flooding is
a significant number of redundant messages,
which can quickly exhaust the energy
resources of nodes, especially in conditions of
restriction or economy.</p>
      <p>
        Therefore, it is advisable to optimize the
flooding process using a forwarding tree,
which allows for limiting the number of
transmissions by selectively sending messages
through a structured approach [
        <xref ref-type="bibr" rid="ref6">12</xref>
        ].
      </p>
      <p>The flooding protocol in sensor networks
operates by having each node, upon receiving
a message, transmit it to all its neighbors,
except the source node. A node only uses
information about its nearest neighbors for
transmission.</p>
      <p>To improve efficiency and reduce
redundancy, a “forwarding tree” structure is
used to optimize message distribution by
selectively transmitting authentication codes
not to all neighbors, but only to selected nodes,
which helps reduce the total number of
transmissions.</p>
      <p>The creation of a “forwarding tree” begins
with an initiator that designates each of its
neighbors as the root of a subtree of depth  .</p>
      <p>For each such root, the initiator transmits
the authentication codes required by all nodes
in those subtrees. Further expansion of the tree
occurs by including nodes that meet two
criteria: they are  hops away from the current
root and are reachable from any node at the
last level in the current forwarding tree.</p>
      <p>To illustrate the practicality of the
suggested method, envision a sensor network
comprising 100 nodes, with each node
connected to an average of 10 immediate
neighbors [13].</p>
      <p>Employing conventional flooding for
message dissemination throughout this
network would necessitate each node to
broadcast the message 10 times, cumulatively
resulting in around 1000 transmissions,
excluding additional redundancies.</p>
      <p>However, through the application of a
forwarding tree with a depth of  = 2, it's
possible to markedly decrease the
transmission count.</p>
      <p>Should each initiating node relay messages
solely to its direct neighbors, and
subsequently, these neighbors transmit only to
nodes in the subsequent layer, the total
transmissions could be curtailed to
approximately 200–300, contingent on the
network’s structural configuration and the
nodes’ positioning.</p>
      <p>An increase in the tree depth,  , further
diminishes the requisite number of
transmissions.</p>
      <p>In Fig. 2, the number of transmissions for
different numbers of nodes (10, 50, 100) is
compared between traditional flooding and
optimized flooding using a forwarding tree at
 = 2.</p>
      <p>It is evident that as the number of nodes in
the sensor network increases, the number of
necessary transmissions with traditional
flooding rises linearly and at a much faster rate
than with optimized flooding.
1000
900
800
700
600
500
400
300
200
100
0
0
20
40</p>
      <p>Tr
60
k=2
80
100
Optimized flooding demonstrates significantly
better efficiency by reducing the total number of
transmissions, especially in larger networks [14].</p>
      <p>In Fig. 3, the number of transmissions across
different node counts (10, 50, 100) is compared
between traditional flooding and optimized
flooding utilizing a forwarding tree at various
tree depths ( = 2,  = 3,   = 5).
N, tr
As  increases, the figure illustrates how
deeper forwarding trees can further reduce the
total number of transmissions, thereby
conserving the energy of the nodes [15]. This
highlights the significance of optimizing
message propagation in sensor networks to
enhance efficiency and conserve energy [16].</p>
      <p>Traditionally, flooding is calculated as
follows:</p>
      <p>=  ∗  , (1)
where   is the total energy consumption of
one node,  is the number of transmission
cycles,  is the number of messages
transmitted in one cycle.</p>
      <p>In the traditional flooding scenario, each
node conventionally transmits 10 messages
per cycle, and each node exhausts its energy
after 100 cycles (assuming all energy is spent
on transmission only).</p>
      <p>Optimized flooding is calculated as follows:
   =  ∗   ,
(2)
where   is the total energy consumption of
one node with optimized flooding,   is the
number of messages transmitted in one cycle
when condition  changes.</p>
      <p>In the scenario with optimized flooding for
 = 2, each node will exhaust its energy in 200
cycles; for  = 3—for 333 cycles; for  = 5—
for 500 cycles. This means that for 100
transmission cycles, nodes will be able to stay
active much longer in scenarios with optimized
flooding, especially at larger values of  .</p>
    </sec>
    <sec id="sec-8">
      <title>5. Conclusions</title>
      <p>The optimization of the flooding mechanism
involves the implementation of strategies that
reduce the number of redundant messages
caused by the traditional flooding method. This
is achieved by carefully selecting the nodes
that participate in data transmission to
minimize the energy consumption of each
node and increase the overall efficiency of the
network.</p>
      <p>This approach allows for an increase in the
lifetime of the sensor network and improves
the quality of service by reducing the time of
message delivery and increasing the reliability
of data transmission.</p>
      <p>It is also worth noting that the optimization
of the flooding mechanism in sensor networks
not only reduces energy consumption and
increases the efficiency of data distribution but
also contributes to increasing their security.
Fewer transmissions reduce the risk of
interception and unauthorized access to data
and make Denial-of-Service (DoS) attacks
more difficult because fewer active nodes need
to be attacked. Thus, optimized flooding helps
create a more attack-resistant sensor network
structure.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          , et al.,
          <article-title>Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated System</article-title>
          ,
          <source>in: 2nd International Conference on Conflict Management in Global Information Networks</source>
          , vol.
          <volume>3530</volume>
          (
          <year>2023</year>
          )
          <fpage>102</fpage>
          -
          <lpage>111</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          ,
          <article-title>Stability Verification of Self-Organized Wireless Networks with Block Encryption</article-title>
          ,
          <source>in: 5th International Workshop on Computer Modeling and Intelligent Systems</source>
          , vol.
          <volume>3137</volume>
          (
          <year>2022</year>
          )
          <fpage>227</fpage>
          -
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Dovgiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kopiika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kozlov</surname>
          </string-name>
          ,
          <article-title>Architectures for the Information Systems, Network Resources and</article-title>
          Network Services,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          II Vol.
          <volume>3187</volume>
          (
          <year>2021</year>
          )
          <fpage>293</fpage>
          -
          <lpage>301</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Analytical Assessment of Security Level of Distributed and Scalable Computer Systems, Int. J. Intell. Syst. Appl</source>
          <volume>8</volume>
          (
          <issue>12</issue>
          ) (
          <year>2016</year>
          )
          <fpage>57</fpage>
          -
          <lpage>64</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V.</given-names>
            <surname>Mukhin</surname>
          </string-name>
          , et al.,
          <source>Method of Restoring Parameters of Information Objects in a Unified Information Space Based on Computer Networks, Int. J. Comput. Netw. Inf. Secur</source>
          .
          <volume>12</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          )
          <fpage>11</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>O.</given-names>
            <surname>Barabash</surname>
          </string-name>
          , et al.,
          <article-title>Development of a Hybrid Network Traffic Load Management Mechanism Using Smart</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>