A Survey on Routing Protocols in Wireless Sensor Networks.pdf

Embed Size (px)

Citation preview

  • 8/9/2019 A Survey on Routing Protocols in Wireless Sensor Networks.pdf

    1/6

    A Survey on Routing Protocols in Wireless Sensor

    Networks

    Mallanagouda PatilDepartment of Computer Science and Engineering

    Wireless Information Systems Research Laboratory

    Reva Institute of Technology and Management

    Bangalore-560 064, India

    Email: [email protected]

    Rajashekhar C. BiradarDepartment of Electronics and Communication Engineering

    Wireless Information Systems Research Laboratory

    Reva Institute of Technology and Management

    Bangalore-560 064, India

    Email: [email protected]

    AbstractThis paper presents a survey of state-of-the-art rout-ing techniques in Wireless Sensor Networks (WSNs). Comparedwith traditional wireless networks, WSNs are characterized withdenser levels of node deployment, higher unreliability of sensornodes and severe power, computation and memory constraints.Various design challenges such as energy efficiency, data deliverymodels, quality of service, overheads etc., for routing protocolsin WSNs are highlighted. We addressed most of the proposedrouting methods along with scheme designs, benefits and resultanalysis wherever possible. The routing protocols discussed areclassified into seven categories such as Data centric routing,Hierarchical routing, Location based routing, Negotiation basedrouting, Multipath based routing, Quality of Service (QoS)routing and Mobility based routing. This paper also compares therouting protocols against parameters such as power consumption,scalability, mobility, optimal routing and data aggregation. Thepaper concludes with possible open research issues in WSNs.

    Keywords: WSNs, Energy Efficiency, QoS, Cluster;

    I. INTRODUCTION

    With the popularity of laptops, cell phones, global posi-

    tioning system (GPS) devices, radio frequency infrared devices(RFID) and intelligent electronics, computing devices have be-

    come cheaper, more mobile, distributed and pervasive in daily

    life. Wireless Sensor Network (WSN) consists of large number

    of small low-cost, low-power and multifunctional sensor nodes

    where each node has a processing capability, multiple types of

    memory, radio frequency (RF) transceiver and a power source.

    In addition, the nodes accommodate sensors and actuators [1].

    In many WSN applications, the deployment of sensor nodes

    is performed in an adhoc fashion without careful preplanning

    and engineering. After the initial deployment, sensor nodes

    communicate wirelessly and self organize into an appropriate

    network infrastructure often with multihop connections among

    sensor nodes. Sensor nodes are typically battery-powered andshould operate without attendance for a relatively longer period

    of time. In most cases, it is very difficult and even impossible

    to change or recharge batteries for the sensor nodes. The design

    of routing protocols in WSNs is challenging because of several

    network constraints with an emphasis on energy effeciency.

    A. Routing Challenges in Sensor Networks

    Some of the routing challenges in WSN are as follows.

    Energy Consumption : As sensor nodes in WSN have lim-

    ited battery power, it becomes challenging to perform computa-

    tion and transmission while optimizing energy consumption[1].

    In fact the transmission of one bit of data consumes more

    energy than processing the same bit of data. Sensor node life

    time strongly depends on its battery life.

    Node Deployment : Sensor nodes are usually denselydeployed in the field of interest depending on application

    thus influencing the performance of a routing protocol. The

    deployment can be either deterministic or self-organizing.

    In deterministic case, the sensor nodes are manually placed

    and sensed data is routed through determined paths. In self-

    organizing systems, sensor nodes are scattered randomly cre-

    ating a topology in an adhoc manner[2].

    Data Delivery Models : Data delivery models can be time

    driven, data driven, query driven and hybrid (combination of

    delivery models) depending on the application of sensor nodes

    and time criticality of data reporting. These data delivery mod-

    els highly influence the design of routing protocols especially

    with regard to reducing energy consumption[3],[4].

    Node Capability : Depending on the application, a sensor

    node can have different role or capability such as relaying,

    sensing and aggregation since engaging all these functions on

    the same node would drain the energy of that node more

    quickly. Different capabilities of sensor nodes raise multi-

    ple issues related to data routing and makes routing more

    challenging[5],[6],[7].

    Network Dynamics : Most of the network architectures

    assume that sensor nodes are static but the mobility of base

    stations and sensor nodes is necessary in some applications

    [8]. Routing packets in such dynamic architectures becomes

    challenging in addition to minimizing energy consumption andbandwidth utilization.

    Data Aggregation : Since sensor nodes generate redundant

    data, cluster heads or base stations may receive similar packets

    from multiple nodes and these packets need to be aggregated

    before being forwarded to the base station. Signal processing

    methods can also be used for data aggregation[9].

    Other routing challenges in WSNs are scalability, coverage

    area[10], transmission media[11], fault tolerance and QoS[12].

    978-1-4673-4523-1/12/$31.00 2012 IEEE ICON 201286

  • 8/9/2019 A Survey on Routing Protocols in Wireless Sensor Networks.pdf

    2/6

    I I . TAXONOMY OFROUTINGP ROTOCOLS

    We present taxonomy of routing potocols for WSNs based

    on various classification criteria such as data centric, hier-

    archical, location based, negotiation based, multipath based,

    quality of service and mobility based as shown in figure

    1. The objective of taxonomy is twofold: (1) to provide a

    framework Wireless Sensor Network in which routing and

    data dissemination protocols for WSNs can be examined and

    compared; and (2) to gain new insights into the routing anddata dissemination protocols and thereby suggest avenues for

    future research.

    Data Centric Directed Diffusion

    Hierachical LEACH, TEEN and APTEEN

    Location Based GAF and GEAR

    Negotiation SPIN

    MultiPath Disjoint Path Routing

    and Rumor Routing

    Mobility Joint Mobility

    QOS Based Sequential Assignment Routing

    and Routing

    Fig. 1. Taxonomy of Routing Protocols in WSN

    A. Data Centric Routing

    Lack of global identification along with random deployment

    of sensor nodes makes it hard to select a specific set of sensor

    nodes to be queried. Since data is usually transmitted with

    significant redundancy. This is very inefficient in terms of

    energy consumption, routing protocols that are able to select

    a set of sensor nodes and utilize data aggregation during the

    relaying of data have been considered. This consideration has

    led to data-centric routing, a new communication paradigm

    where attribute based naming is necessary to specify the

    properties of data[13].

    Directed Diffusion :Being an important data-centric routing

    protocol in sensor networks, Directed Diffusion [14] suggeststhe use of attribute-value pairs for the desired data and queries

    sensors in an on demand basis.

    Proposed Scheme : In Directed Diffusion, if a sensor wants

    to receive data, it sends interests for named data. When data is

    sent by a source sensor, the data can be cached or transformed

    by intermediate sensor, which in turn may initiate interests

    based on the data that were previously cached. In addition,

    the data sent by the source sensor may be aggregated by

    intermediate sensors before being forwarded to destination.

    More importantly, interests, data dissemination and data ag-

    gregation occur in directed diffusion in a localized manner

    via exchanging messages between neighboring nodes. Directed

    Diffusion has several key elements: data naming, interests,

    gradients, data propagation and reinforcement. The sink peri-

    odically broadcasts an interest for each active task specifying

    a low data rate. To ensure reliable interest transmission, an

    interest has a time-stamp that allows the sink to refresh the

    interest by resending it with a monotonically increasing time-stamp value. When a sensor receives an interest, it may resend

    it to some subset of its neighbors or even rebroadcast it to all

    of its neighbors (in case it does not have information about

    the sensors that satisfy the interest). This allows interests to

    be diffused throughout the network. A response to the interest

    is also named. A sensor will consult its interest cache to decide

    to which neighbors it has to unicast this event description

    using the highest data rate over all its outgoing gradients.

    Upon receiving a data message, a sensor may drop it if it

    does not find a matching interest in its cache. Otherwise, it

    checks the data cache, which contains the data messages seen

    recently, corresponding to the matching interest entry. As a

    result, this data message can be cached and resent to theneighbors, if it is not already in the data cache. Otherwise,

    this data message is simply dropped. If the data rate specified

    in all gradients is higher than that of incoming events, the

    receiving sensor will simply send the received data message to

    the corresponding neighbors. Otherwise, the receiving sensor

    may down convert to the specified data rate for the neighbors

    with a lower requested data rate. Figure 2 summarizes the steps

    in Directed Diffusion.

    Fig. 2. Directed Diffusion Protocol Description (a) Interest propagation (b)Initial gradients setup (c) Data delivery reinforced.

    Benefits/Demerits of the Scheme : All communication isneighbor-to-neighbor and on demand with no need for node

    addressing mechanism. Caching is a big advantage in terms of

    energy efficiency and delay. Applications that require contin-

    uous data delivery to the sink will not work efficiently with

    such a query-driven on demand data model.

    B. Hierarchical Routing

    In hierarchical architecture, sensor nodes are organized into

    clusters, where a node with lower energy can be used to

    87

  • 8/9/2019 A Survey on Routing Protocols in Wireless Sensor Networks.pdf

    3/6

    perform the sensing task and send the sensed data to its cluster

    head at short distance, while a node with higher energy can

    be selected as a cluster head to aggregate the data from its

    members and forward it to the sink [15]. This process can not

    only reduce the energy consumption, but also balance traffic

    load and improve the scalability[16].

    Threshold Sensitive Energy Efficient Sensor Network Proto-

    col (TEEN ) : A sensing application can be designed in a way

    where the sensors either sense and transmit data periodically tothe sink (proactive) or react immediately to any sudden change

    in the value of sensed attribute (reactive). For time-critical ap-

    plications, a reactive network is more suitable than a proactive

    network. In order to trade-off between energy efficiency, data

    accuracy and response time dynamically, a communication

    protocol, named as TEEN has been proposed[17].

    Proposed Scheme : TEEN is a clustering protocol that

    targets a reactive network and enables cluster heads to impose

    constraint on when the sensor nodes should report their sensed

    data. Each cluster head broadcasts to its members a value,

    called hard threshold (HT), for the sensed attribute beyond

    which a sensor should turn its transmitter on to report its sensed

    data to cluster head. Cluster head also broadcasts another value,called soft threshold (ST), which indicates a small change

    in the value of the sensed attribute, making sensor turn on

    its transmitter and send data to the cluster head. TEEN is

    a hierarchical protocol designed to be responsive to sudden

    changes in the sensed attributes such as temperature. TEEN

    pursues a hierarchical approach along with the use of a data-

    centric mechanism. The Adaptive Threshold sensitive Energy

    Efficient sensor Network protocol (APTEEN) is an extension

    to TEEN and targets both reactive and proactive networks[18].

    Result Analysis : Experimental results have shown that

    TEEN and APTEEN outperform LEACH (Low Energy Adap-

    tive Clustering Hierarchy). APTEENs performance is between

    LEACH and TEEN in terms of energy dissipation and network

    lifetime. TEEN gives the best performance since it decreases

    the number of transmissions.

    Benefits/Demerits of the Scheme : Both hard and soft

    threshold values can be adjusted in order control the number

    of transmissions. However, TEEN is not a good choice for

    periodic data reporting applications. The main drawbacks of

    TEEN and APTEEN are the overhead and complexity of

    forming clusters in multiple levels, implementing threshold-

    based functions and dealing with attribute-based naming of

    queries.

    C. Location Based Routing

    In most cases, location information is needed to calculate

    the distance between two particular nodes so that energy

    consumption can be estimated. Geographic Adaptive Fidelity

    (GAF) protocol [19] is a location based protocol although

    proposed for Mobile Adhoc Networks (MANETs), it favors

    energy conservation and thus can be used for WSNs.

    Geographic Adaptive Fidelity (GAF) : If the region to be

    sensed is known, using the location of sensors, query can

    be diffused only to that region thus reducing the number

    of transmissions significantly. It is possible to locate nodes

    through satellites or GPS (Global Positioning System) on the

    basis of the signal strength passed between neighbor nodes.

    The common approach for energy saving is to use sleep modes

    in nodes expecting no activity in a period of time. This is the

    main idea behind GAF.

    Proposed Scheme : The design of GAF is motivated by an

    energy model that focuses on energy consumption due to the

    reception and transmission of packets as well as idle time[19].GAF is based on the mechanism of turning off unnecessary

    sensors while keeping a constant level of routing fidelity. GAF

    divides sensor field into grid squares and every sensor uses its

    location information to associate itself with a particular grid.

    Size of grid square is chosen in a way such that sensors within

    the same grid are equivalent with regard to routing and that

    sensors in adjacent grids can communicate with each other.

    Equivalent sensors can coordinate with each other to determine

    an energyefficient schedule of their activities, which specifies

    when and for how long the sensors stay awake or sleep. As

    shown in figure 3 the state transition diagram of GAF has three

    states, namely discovery, active and sleeping.

    Sleeping

    Recieve Discovery msg

    from high rank nodes Active

    Discovery

    After Ts

    After Td

    After Ta

    from high rank nodesRecieve msg

    Fig. 3. State Transition Diagram for GAF

    GAF maintains only one node called an active node with

    its radio turned on per grid square and this active node is

    responsible for relaying traffic on behalf of its grid square.

    This responsibility is rotated among all the nodes. Whenever

    a node changes state to discovery or active state, it sends a

    broadcast message containing node ID, grid ID and the value of

    ranking function. If a node in discovery or active state receivesa message from a node in the same grid and a higher value of

    the grid function, it is allowed to change its state to sleep and

    turn its radio transceiver off for time Ts. Usually the ranking

    function selects nodes with longest expected life time as

    the active nodes. In sleeping state, sensor turns off its radio

    for energy savings. In the discovery state, a sensor exchanges

    discovery messages to learn about other sensors in the same

    grid. Even in the active state, a sensor periodically broadcasts

    its discovery message to inform equivalent sensors about its

    88

  • 8/9/2019 A Survey on Routing Protocols in Wireless Sensor Networks.pdf

    4/6

    state. GAF aims to maximize the network lifetime by reaching

    a state where each grid has only one active sensor based on

    sensor ranking rules.

    Benefits/Demerits of the Scheme : The amount of energy

    saved by using GAF protocol is considerable due to large

    number of sleeping nodes. The drawback is that the GAF uses

    extra hardware for finding the location of sensor nodes.

    D. Negotiation Based Routing

    These protocols use high level data descriptors called meta-

    data in order to avoid redundant data transmissions through

    negotiation. Communication decisions are also taken based on

    the resources available.

    SPIN (Sensor Protocol for Information via Negotiation) :

    For applications like intruder detection, disseminating individ-

    ual sensor observations to all sensors in a network should

    be performed as energy efficient as possible. In light of

    this,a family of adaptive protocols named SPIN has been

    proposed. The SPIN protocols were designed to overcome the

    problems of flooding. The SPIN protocols are resource aware

    and resource adaptive. They can make informed decisions for

    efficient use of their own resources[20].Proposed Scheme : SPIN protocols are based on two

    key mechanisms: Negotiation and Resource Adaptation. SPIN

    enables the sensors to negotiate with each other by using meta-

    data before any data transfer to avoid redundant information in

    the network. Each sensor is aware of its resource consumption

    with the help of its own resource manager that is probed by the

    application before any data processing or transmission. This

    helps the sensors monitor and adapt to any change in their

    own energy resources. There are three messages defined in

    SPIN to exchange data between the nodes. These are: ADV

    message to allow a sensor to advertise a particular meta-data,

    REQ message to request the specific data and DATA message

    that carries the actual data.

    Benefits/Demerits of the Scheme : Advantage of SPIN

    protocol is that each node only knows its single-hop neighbors

    thus localizing the topological changes in the network. The

    drawback is that the data advertisement mechanism cannot

    guarantee the delivery of data if the nodes that are interested

    in the data are far away and the nodes between source and

    destination are not interested in that data. Meta-data introduce

    additional costs for storage, retrieval and management.

    E. Multipath Based Routing

    These protocols use multiple paths instead of single path

    to enhance network performance by providing fault tolerance.These alternate paths are kept alive by sending periodic mes-

    sages.

    Disjoint Path Routing : In multipath routing, each source

    sensor node finds the first k shortest paths to the sink and

    divides its load evenly among these paths. Multipath protocols

    help find a small number of alternate paths that have no

    sensor in common with each other and with the primary path.

    These protocols are said to be sensor-disjoint multipath routing

    protocols[21].

    Proposed Scheme : In sensor-disjoint path routing, the

    primary path is best available whereas the alternative paths

    are less desirable as they have longer latency. Being disjoint

    makes those alternate paths independent of the primary path.

    Thus, if a failure occurs on the primary path, it remains local

    and does not affect any of those alternate paths. The sink

    sends out a primary-path reinforcement to its best neighbor.

    This reinforcement process repeats until the construction of

    the primary path is done. After that, the sink iterates the sameoperation for its next most preferred neighbor by sending out to

    it an alternate-path reinforcement. If each sensor accepts only

    the first reinforcement, those alternate paths are guaranteed to

    be disjoint with each other and with the primary path.

    Benefits/Demerits of the Scheme : Although maintaining

    alternate paths introduces some overhead and consumes more

    energy, multipath routing is an effective technique to improve

    robustness in the face of path failures caused by frequent

    topological changes. More specifically, multipath routing helps

    recover from sensor and link failures and provide necessary

    resilience to the network at the cost of excessive redundancy

    and traffic generation.

    F. QoS Based Routing

    In addition to minimizing energy consumption, it is essen-

    tial to consider QoS requirements in terms of delay, reliability

    and fault tolerance for routing in WSNs. Both fault tolerance

    and reliability require the deployment of more than necessary

    sensors so that the network can continue to function properly

    and deliver accurate sensed data to the sink despite some sensor

    failures [22]. Sequential Assignment Routing (SAR) is one of

    the first routing protocols for WSNs that introduces the notion

    of QoS in the routing decisions.

    Sequential Assignment Routing (SAR) : Routing decision in

    SAR depends on three factors: energy resources, QoS on each

    path and the priority level of each packet. To avoid single route

    failure, a multi-path approach and localized path restoration

    schemes are used.

    Proposed Scheme : To create multiple paths from a source

    node, a tree rooted at the source node to the destination nodes

    is built covering each node. SAR is table-driven multipath

    protocol that aims to achieve energy efficiency and fault toler-

    ance. SAR calculates a weighted QoS metric as the product of

    additive QoS metric and weight coefficient associated with the

    priority level of the packet. The objective of SAR algorithm is

    to minimize the average weighted QoS metric throughout the

    lifetime of the network. As a preventive measure, a periodicre-computation of paths is triggered by the base-station to

    account for any changes in the topology. Failure recovery is

    done by enforcing routing table consistency between upstream

    and downstream nodes on each path.

    Benefits/Demerits of the Scheme : Simulation results show

    that SAR offers less power consumption than the minimum-

    energy metric algorithm that does not consider the packet prior-

    ity. Although, SAR ensures fault-tolerance and easy recovery,

    the protocol suffers from the overhead of maintaining the tables

    89

  • 8/9/2019 A Survey on Routing Protocols in Wireless Sensor Networks.pdf

    5/6

    and states at each node especially when the number of nodes

    is huge.

    G. Mobility Based Routing

    Some sensor applications require mobile nodes to accom-

    plish a sensing task. Mobility brings new challenges to routing

    and data dissemination in WSNs and increases the complexity

    of implementation.Joint Mobility and Routing Protocol : A network with a

    static sink suffers from a severe problem, called energy sink-

    hole problem where the sensors located around the static sink

    are heavily used for forwarding data to sink. As a result, those

    heavily loaded sensors close to the sink deplete their battery

    power more quickly, thus disconnecting from the network.

    This problem exists even when the static sink is located at

    its optimum position corresponding to the center of the sensor

    field. To address this problem, a mobile sink for gathering

    sensed data from source sensors has been suggested[23].

    Proposed Scheme : In Joint Mobility and Routing Protocol,

    the sensors surrounding the sink change over time, giving the

    chance to all sensors in the network to act as data relays tothe mobile sink and thus balancing the load. In particular,

    the optimum mobility strategy of the sink is a symmetric

    strategy in which the trajectory of the sink is the periphery

    of the network. This result was shown by comparing mobility

    trajectories on concentric circles of different radii and it was

    proved that the maximum average load of data routing is

    achieved at the network center. Therefore, the trajectory with

    a radius equal to the radius of the sensor eld maximizes

    the distance from the sink to the center of the network that

    represents the hot spot. Regardless of the shape of a sensor

    eld, it is always true that the sensors located on the network

    periphery are almost not used for forwarding sensed data to

    the sink on behalf of other sensors and thus have a longer

    lifetime than all other sensors in the network. Therefore, an

    efcient routing strategy should exploit the available energy

    of those sensors close to the border of the network in order

    to balance the data dissemination load on all the sensors.

    Based on the sink mobility strategy and the routing strategy

    discussed earlier, an energy-efficient heuristic for joint routing

    and mobility is to have the sink moving on a circle of radius

    Rm R, where R stands for the radius of the sensor eld, while

    data routing depends on the location of the source sensors.Note

    that the sensor field is divided into two regions: the inner circle

    and the annulus between the periphery of the network and

    the trajectory of the sink represented by a circle. The sensorswithin the inner circle use the shortest path routing to transmit

    their sensed data to the sink, whereas the sensors in the annulus

    send their data to the sink using two steps. First, a sensor

    uses round routing around the center of the network O until

    the segment OB is reached, where B is the current position

    of the mobile sink. Then, the data is sent to the sink using

    a shortest path. This joint heuristic leads to lower network

    load by reducing the distance between the mobile sink and the

    sensors that follow the shortest path.

    Benefits/Demerits of the Scheme : Although many perfor-

    mance aspects of WSNs may benefit from mobility, the lifetime

    issue seems to have attracted the majority of attention and

    contributions. The traffic load within a WSN is highly unbal-

    anced among nodes that have different distances from the sink.

    Whereas no routing strategy may alleviate such an imbalance,

    actively moving certain network entities may further balance

    the load and hence improve the lifetime. However the mobility

    in WSN leads to an added complexity compared to static WSN.

    III. COMPARISON OFP ROTOCOLS

    The figure 4 shows the similarities between the protocols

    based on the classification criteria used in the taxonomy.

    GEAR

    Limited

    Limited

    NO

    NO

    Limited

    NO

    NO

    NO

    NO

    NO

    NO

    SAR

    Maximum

    Limited

    NO

    NO

    NO

    NO

    NO

    YES

    NO

    YES

    NO

    SPIN

    Limited

    Limited

    NO

    NO

    Possible

    YES

    YES

    NO

    NO

    NO

    NO

    Limited

    Good

    NO

    Limited

    NO

    NO

    NO

    YES

    YES

    NO

    LEACH

    Maximum

    Good

    NO

    NO

    NO

    Fixed Sink

    YES

    YES

    NO

    NO

    NO

    Directed

    Diffusion

    Limited

    Limited

    NO

    YES

    Limited

    YES

    YES

    NO

    YES

    NO

    NO

    GAF

    NO

    Energy Consumption

    Scalability

    Location Awareness

    Optimal Routing

    Mobility

    Commercial

    Military

    MonitoringEnvironment

    Health

    Data Aggregation

    MultiPath

    Fig. 4. Comparison of Routing Protocols in WSNs

    IV. CONCLUSION ANDO PE NI SSUES

    In recent years, routing in WSN has gained tremendous

    attention leading to unique challenges and design issues when

    compared to routing in traditional wired networks. In this

    paper, we have discussed recent research activities on routing

    in WSNs and classified the approaches to routing in seven main

    categories. In case of Data centric routing, naming rules such

    as attribute-value pairs will not work for complex queries that

    are application dependent. The building of standard efficient

    naming schemes is one of the open issues for future research

    in this category. In case of Hierarchical routing, the nodes are

    grouped together to form clusters. Cluster heads are respon-sible for data aggregation and relay of messages to the sink.

    The design issues for such protocols are how to form clusters

    and select cluster heads so that energy consumption in the

    communication of redundant messages as well as aggregation

    is reduced. The factors affecting cluster formation and cluster

    head communication are open future research issues in this

    category. In case of Location based routing protocols, energy

    efficient and intelligent utilization of location information is

    an open research issue. QoS based routing has its own quality

    90

  • 8/9/2019 A Survey on Routing Protocols in Wireless Sensor Networks.pdf

    6/6

    requirements when it comes to real time applications like target

    tracking in battle fields. Handling the QoS requirements in

    energy efficient way is one of the open research issues in

    QoS based routing. Many of the current routing protocols in

    WSN assume that nodes and sink are static. However, there

    are situations like battle field environments where sinks as

    well as the sensor nodes need to be mobile. New routing

    algorithms are required to accommodate mobility and dynamic

    topology changes in energy constrained environment of WSNs.Another possible future research area for routing protocols is

    the integration of internet with WSNs so that the data sensed

    in one part of the world can be sent to the server located in

    another part of the world for further analysis.

    ACKNOWLEDGMENT

    Authors would like to thank Visvesvaraya Technological

    University (VTU), Karnataka, INDIA, for sponsoring the

    part of the project under VTU Research Scheme, grant no.

    VTU/Aca/2011-12/A-9/753, Dated: 5th May 2012.

    REFERENCES

    [1] W. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficientcommunication protocol for wireless sensor networks, in: Proceeding ofthe Hawaii International Conference System Sciences, Hawaii, January2000

    [2] K. Sohrabi et al., Protocols for self-organization of a wireless sensornetwork,IEEE Personal Communications 7(5) (2000)16-27.

    [3] S. Tilak et al., A taxonomy of wireless micro sensor network mod-els,Mobile Computing and Communications Review 6(2) (2002) 28-36.

    [4] W. Heinzelman, Application specific protocol architectures for wirelessnetworks, PhD Thesis, MIT, 2000.

    [5] L. Subramanian, R. H. Katz, An architecture for building self congurablesystems , in: Proceedings of IEEE/ACM Workshop on Mobile Ad HocNetworking and Computing, Boston, MA, August 2000.

    [6] M. Younis et al., Energy-aware routing in cluster-based sensor networks,in: Proceedings of the 10th IEEE/ACM International Symposium on

    Modeling,Analysis and Simulation of Computer and TelecommunicationSystems (MASCOTS2002), Fort Worth, TX, October 2002.

    [7] K. Akkaya et al., An energy-aware QoS routing protocol for wirelesssensor networks, in: Proceedings of the IEEE Workshop on Mobile andWireless Networks (MWN 2003), Providence, RI, May 2003

    [8] F. Ye, et al., Two-tier data dissemination model for large-scale wirelesssensor networks, proceedings of ACM/IEEE MOBICOM, 2002.

    [9] I. Akyildiz et al., A survey on sensor net-works, IEEE CommunicationsMagazine, 40(8) (2002) 102-114.

    [10] D. Pompili et al., Routing algorithms for delay-insensitive and delay-sensitive applications in underwater sensor networks, Proceedings ACMMobiCom06, Los Angeles, CA, Sept. 2006, pp. 298-309.

    [11] http://www.ieee802.org/15/

    [12] A. Woo and D. Culler, A transmission control scheme for media accessin sensor networks, in Proceedings of 2001 ACM/IEEE InternationalConference on Mobile Computing and Networking (MobiCom01), Rome,Italy, July 2001, pp. 221-235.

    [13] Q. Ren and Q. Liang, A contention-based energy-efficient MAC pro-tocol for wireless sensor networks, in Proceedings of 2006 IEEE Wire-less Communications and Networking Conference (WCNC 06),Las Ve-gas,NV,Apr.2006,pp. 1154-1159.

    [14] C. Intanagonwiwat et al., Directed diffusion for wireless sensor network-ing, IEEE/ACM Transactions on Networking 11(1) (2003) 2-16.

    [15] R. Rajagopalan and P.Varshney, Data-aggregation techniques in sensornetworks:A survey,IEEE Communications and Surveys and Tutorials, 8(4)(2006) 48-63.

    [16] A. A. Abbasi and M.Younis, A survey on clustering algorithms forwireless sensor networks,Computer Communications, 30(14-15) (2007)2826-2841.

    [17] A. Manjeshwar and D.P.Agarwal, TEEN: a routing protocol for en-hanced efficiency in wireless sensor networks, in 1st International Work-shop on Parallel and Distributed Computing Issues in Wireless Networksand Mobile Computing,April 2001.

    [18] A. Manjeshwar and D.P.Agarwal, APTEEN: A hybrid protocol forecient routing and comprehensive information retrieval in wireless sensornetworks, Parallel and Distributed Processing Symposium., ProceedingsInternational, IPDPS 2002, pp. 195-202.

    [19] Y. Xu, J. Heidemann and D.Estrin, Geography-informed energyconservation for adhoc routing, Proceedings ACM/IEEE MobiCom,Rome,Italy,July 2001,pp.70-84.

    [20] J. Kulik et al., Negotiation-based protocols for disseminating informationin wireless sensor networks, Wireless Networks, 8(2/3) (2002) 169-185.

    [21] D. Ganesan et al., Highly-resilient, energy-efcient multipath routingin wireless sensor networks, Mobile Computing and CommunicationsReview, 5(4) (2001) 10-24.

    [22] J. Zhu et al., Adaptive localized QoS-constrained data aggre-gation andprocessing in distributed sensor networks,IEEE Transactions on Paralleland Distributed Systems, 17(9) (2006) 923-933.

    [23] J. Luo and J. P. Hubaux, Joint mobility and routing for lifetimeelongation in wireless sensor networks, Proceedings IEEE INFOCOM05,vol.3, Miami, FL, Mar. 2005, pp. 1735-1746.

    91