Routing Techniques for Reliable Wireless Sensor Network

Embed Size (px)

Citation preview

  • 8/6/2019 Routing Techniques for Reliable Wireless Sensor Network

    1/4

    Abstract Wireless Sensor Network (WSN) is a collection ofthousands of tiny sensor nodes having capability of wirelesscommunication, limited computation and sensing. It is now usedin many application including military, environmental,healthcare application, home automation and traffic control. In

    this paper we will compare Data centric routing protocols forwireless sensor network. It also discusses about simulation basedstudy of routing protocols such as Flooding and DirectedDiffusion.

    KeywordsRouting Protocols, Wireless Sensor Network, Data-

    centric, Flooding, Directed Diffusion

    I. INTRODUCTIONA sensor network is composed of a large number of tinyautonomous devices, called sensor nodes [1] [2]. Sensors are

    small nodes which are capable of data processing andcommunication. The sensor node measures ambient conditionsfrom environment, transform it into electrical signals and

    sends via radio transceiver to a sink and then this aggregated

    information is sent back to a base station through a gateway

    [1]. Sensor networks are distributed sensors to monitor

    conditions like temperature, sound, vibration, pressure and

    pollutants etc. WSN links physical world and digital datanetwork and provide a distributed network having the

    constraint of scalability, lifetime and energy efficiency.

    Routing in sensor networks is very challenging due to several

    characteristics that distinguish them from contemporary

    communication and wireless ad-hoc networks. First of all, it isnot possible to build a global addressing scheme for the

    deployment of sheer number of sensor nodes. Therefore,

    classical IP-based protocols cannot be applied to sensor

    networks. Second, in contrary to typical communication

    networks almost all applications of sensor networks requirethe flow of sensed data from multiple regions (sources) to a

    particular sink. Third, generated data traffic has significant

    redundancy in it since multiple sensors may generate samedata within the vicinity of a phenomenon. Such redundancy

    needs to be exploited by the routing protocols to improve

    energy and bandwidth utilization. Fourth, sensor nodes aretightly constrained in terms of transmission power, on-board

    energy, processing capacity and storage and thus require

    careful resource management. The main contribution of this

    paper is that we have carried out a simulation based study of

    routing protocols such as Flooding and Directed Diffusion to

    understand their behavior when used in a sensor network

    environment. We also provide the study of previous research

    work of routing protocol which comes under data-centric

    category. Our aim is to help better understanding of thecurrent data-centric routing protocols for wireless sensor

    networks.

    II.DESCRIPTIONOFROUTINGPROTOCOLRouting is a process of determining a path between source and

    destination upon request of data transmission. In WSNs, the

    layer that is mainly used to implement the routing of theincoming data is called as network layer. When the sink is far

    away from the source or not in the range of source node,

    multi-hop technique is followed. So, intermediate sensor

    nodes have to relay their packets. In many applications of

    sensor networks, it is not feasible to assign global identifiers to

    each node due to the sheer number of nodes deployed. Such

    lack of global identification along with random deployment of

    sensor nodes makes it hard to select a specific set of sensor

    nodes to be queried.

    Protocols, which name the data and query the nodes based on

    some attributes of the data are categorized as data-centric.In

    data-centric routing, the sink sends queries to certain regions

    and waits for data from the sensors located in the selected

    regions. In this category, protocols mainly apply flood based

    data transferring .Since data is being requested through

    queries, attribute based naming is necessary to specify the

    properties of data.Some of the Data centric Routing Protocols

    are: Flooding, Sensor Protocols for Information via

    Negotiation (SPIN), Directed Diffusion, Improved Directed

    Diffusion,and Rumor Routing.

    In this section, we will describe these protocols in details and

    highlight the key ideas.

    A. FloodingIn flooding [5] [6], the source node floods all events to every

    node in the network. Whenever a sensor receives a datamessage, it keeps a copy of the message and forwards the

    message to every one of its neighboring sensors and the cycle

    repeats until the packet arrives at the destination or themaximum number of hops for the packet is reached as shown

    in Figure 2.1.

    Routing Techniques for Reliable Wireless Sensor Networks

    Samir Agarwal Susant K. Satpathy Lokesh K Sharma Department of CSE Department of CSE Department of IT

    RCET, RCET, Bhilai, (C.G.), India Bhilai, (C.G.), India Bhilai, (C.G.), India

    [email protected] [email protected] [email protected]

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]
  • 8/6/2019 Routing Techniques for Reliable Wireless Sensor Network

    2/4

    Figure 2.1 The Flooding Protocol

    It is suitable for various network types, node distributions and

    environments. The main advantage of flooding is the increased

    reliability provided by this routing method. Since the message

    will be sent to at least once to every host it is almost

    guaranteed to reach its destination. But the unlimited

    broadcasting the packets in the flooding scheme will cause the

    broadcast storm. The flooding routing protocol has three

    deficiencies as:

    Implosion: Because the nodes in the flooding schemedeliver the packets by broadcasting, the same packet

    may achieve the same node via different routes.

    When a sensor node receives a packet, it will not

    check the packet if it has received the packet before.

    This character makes the duplicated packets sent to

    the same place.

    Overlap: When these two sensors detect same event,they may both send a data of this event to the sink.

    This may cause that the duplicated information of an

    event is sent to the sink.

    Resource blindness: When a sensor node is nottransmitting packets in flooding, it doesnt change

    their actives, even if the sensor nodes dont have

    much power to operation.

    B. Directed DiffusionDirect Diffusion [4][5][6] is the data centric protocol.

    It consists of several elements: interests, data

    messages, gradients, and reinforcements. First, sink

    node requests data by sending interests. An interest

    message is a query or an interrogation, which

    specifies what a user wants to its neighbors for

    named data. The data is named using attribute-value

    pairs and it is the collected or processed information

    of a phenomenon thatmatches an interest of a user.The interests are flooded over the whole network by

    the sink. Such data can be an event, which is a shortdescription of the sensed phenomenon. Whenever a

    node receives an interest, it will check whether the

    interest exists or new one. If it is a new interest, the

    sensor node will set up a gradient toward the senderto draw down data that matches the interest. Eachpair of neighboring nodes will establish a gradient to

    each other. After the gradient establishment stage, the

    source node begins to send the related data that

    matches the interest to the sink. The data are

    generally broadcasted to all its gradient neighbors.

    Events are propagated toward the interest originators

    along multiple gradient paths. The sensor network

    reinforces one or a small number of these paths. The

    reinforcement scheme in directed diffusion is

    generally designed for minimum delay or maximum

    number of packets received during a certain period oftime as shown in Figure 2.2

    Figure 2.2 Directed Diffusion,(a) Interest Propagation, (b) Intial

    Gradient Setup, (c) Data Delivery

    Simulation of flooding and Directed Diffusion protocol is

    performed on same topology having 20 nodes with energy 6

    joules. Nodes in the network are in random position. The

    difference between the simulation of flooding and directed

    diffusion is that in directed diffusion the communication starts

    from sink itself the sink sends the interest about what it needs,source node sends a gradient in reply and then data is being

    delivered to the sink. In this simulation scenario in flooding

    the lifetime of the network with energy 6 joule is almost 75seconds and in directed diffusion is 87 sec. After this

    simulation time the network reaches to the crashing stage and

    communication between the nodes vanish completely. If

    energy of the network is increased, it will work for more

    simulation time. Figure 2.3 showing Number of sent packets is

    increasing more in directed diffusion with simulation time and

    also showing number of dropped packets is less as compare to

    flooding with simulation time.

    Figure 2.3 Comparison in flooding and Directed Diffusion

  • 8/6/2019 Routing Techniques for Reliable Wireless Sensor Network

    3/4

    C. Energy-aware routingShah et al. [3][8] proposed to use a set of sub-optimal pathsoccasionally to increase the lifetime of the network. These

    paths are chosen by means of a probability function, which

    depends on the energy consumption of each path. Network

    survivability is the main metric that the approach is concerned

    with. The approach argues that using the minimum energy

    path all the time will deplete the energy of nodes on that path.

    Instead, one of the multiple paths is used with a certainprobability so that the whole network lifetime increases. The

    protocol assumes that each node is addressable through a

    class-based addressing which includes the location and typesof the nodes.

    The described approach is similar to Directed Diffusion in the

    way potential paths from data sources to the sink are

    discovered. In Directed Diffusion, data is sent throughmultiple paths, one of them being reinforced to send at higher

    rates. On the other hand, Shah et al. select a single path

    randomly from the multiple alternatives in order to save

    energy. Therefore, when compared to Directed Diffusion, it

    provides an overall improvement of 21.5% energy saving anda 44% increase in network lifetime. However, such single pathusage hinders the ability of recovering from a node or path

    failure as opposed to Directed Diffusion. In addition, the

    approach requires gathering the location information and

    setting up the addressing mechanism for the nodes, which

    complicate route setup compared to the Directed Diffusion.

    D. Rumor RoutingRumor routing [7] is another variation of Directed Diffusion

    and is mainly intended for contexts in which geographic

    routing criteria are not applicable. Generally Directed

    Diffusion floods the query to the entire network when there is

    no geographic criterion to diffuse tasks. However, in somecases there is only a little amount of data requested from the

    nodes and thus the use of flooding is unnecessary. Analternative approach is to flood the events if number of events

    is small and number of queries is large. Rumor routing is

    between event flooding and query flooding. The idea is to

    route the queries to the nodes that have observed a particularevent rather than flooding the entire network to retrieve

    information about the occurring events.

    In order to flood events through the network, the rumor

    routing algorithm employs long lived packets, called agents.

    When a node detects an event, it adds such event to its local

    table and generates an agent. Agents travel the network inorder to propagate information about local events to distant

    nodes. When a node generates a query for an event, the nodes

    that know the route, can respond to the query by referring its

    event table. Hence, the cost of flooding the whole network isavoided. Rumor routing maintains only one path between

    source and destination as opposed to Directed Diffusion where

    data can be sent through multiple paths at low rates.

    Simulation results have shown that rumor routing achieves

    significant energy saving over event flooding and can also

    handle nodes failure. However, rumor routing performs well

    only when the number of events is small. For large number of

    events, the cost of maintaining agents and event-tables in each

    node may not be amortized if there is not enough interest on

    those events from the sink. Another issue to deal with is

    tuning the overhead through adjusting parameters used in the

    algorithm such as time-to-live for queries and agents.

    E. Gradient-Based RoutingSchurgers et al. [8] have proposed a slightly changed version

    of Directed Diffusion, called Gradient-based routing (GBR).

    The idea is to keep the number of hops when the interest is

    diffused through the network. Hence, each node can discoverthe minimum number of hops to the sink, which is called

    height of the node. The difference between a nodes height

    and that of its neighbor is considered the gradient on that link.

    A packet is forwarded on a link with the largest gradient.

    The authors aim at using some auxiliary techniques such as

    data aggregation and traffic spreading along with GBR inorder to balance the traffic uniformly over the network. Nodes

    acting as a relay for multiple paths can create a data

    combining entity in order to aggregate data. On the otherhand, three different data spreading techniques have beenpresented:

    Stochastic Scheme: When there are two or more nexthops with the same gradient, the node chooses one of

    them at random.

    Energy- based scheme: When a nodes energy dropsbelow a certain threshold, it increases its height so

    that other sensors are discouraged from sending data

    to that node.

    Stream-based scheme: The idea is to divert newstreams away from nodes that are currently part ofthe path of other streams.

    The data spreading schemes strives to achieve an even

    distribution of the traffic throughout the whole network, which

    helps in balancing the load on sensor nodes and increases the

    network lifetime. The employed techniques for traffic load

    balancing and data fusion are also applicable to other routing

    protocols for enhanced performance. Through simulation GBR

    has been shown to outperform Directed Diffusion in terms of

    total communication energy.

    F. CADRConstrained anisotropic diffusion routing (CADR) [9] is a

    protocol, which strives to be a general form of Directed

    Diffusion. Two techniques namely information-driven sensor

    querying (IDSQ) and constrained anisotropic diffusion routing(CADR) are proposed. The idea is to query sensors and route

    data in a network in order to maximize the information gain,

    while minimizing the latency and bandwidth. This is achieved

    by activating only the sensors that are close to a particular

    event and dynamically adjusting data routes. The major

    difference from Directed Diffusion is the consideration of

  • 8/6/2019 Routing Techniques for Reliable Wireless Sensor Network

    4/4

    information gain in addition to the communication cost. In

    CADR, each node evaluates an information/cost objective and

    routes data based on the local information/cost gradient and

    end-user requirements. The information utility measure is

    modeled using standard estimation theory.

    Since CADR diffuses queries by using a set of information

    criteria to select which sensors to get the data, simulation

    results confirmed that it is more energy efficient than DirectedDiffusion where queries are diffused in an isotropic fashion,

    reaching nearest neighbors first.

    G. COUGARA data-centric protocol that views the network as a huge

    distributed database system is proposed in the main idea is to

    use declarative queries in order to abstract query processing

    from the network layer functions such as selection of relevant

    sensors etc. and utilize in-network data aggregation to save

    energy. The abstraction is supported through a new querylayer between the network and application layers.

    Figure 2.4: Query Plan at leader node: The leader node gets all the reading,

    calculates the average and if it is greater than a threshold sends it to the

    gateway (sink).

    COUGAR proposes architecture for the sensor database

    system where sensor nodes select a leader node to performaggregation and transmit the data to the gateway (sink). The

    architecture is depicted in Fig. 2.4, which is redrawn from

    [24]. The gateway is responsible for generating a query plan,

    which specifies the necessary information about the data flow

    and in-network computation for the incoming query and send

    it to the relevant nodes.. Third, the leader nodes should be

    dynamically maintained to prevent them from failure.

    III. CONCLUSIONThere are different routing protocols for routing in WSN,

    these protocols are application specific and therefore a careful

    selection of the underlying routing protocol for WSN is a key

    element to measure the performance of a WSN as a whole. In

    this paper, we have summarized simulation results of flooding

    and Directed Diffusion routing protocols. Directed Diffusion

    having more send packets and less Dropped packets compare

    to Flooding with increase in simulation time. Thus Directed

    Diffusion can perform much better than the Flooding scheme

    in similar conditions of networks size and work load. we have

    also summarized recent research results on data routing in

    sensor networks which comes under data-centric category We

    also included in the table whether the protocol is utilizing data

    aggregation or not, since it is an important consideration for

    routing protocols in terms of energy saving and traffic

    optimization.

    TABLE I. COMPARISION BETWEEN FLOODING AND DIRECTED

    DIFFUSION

    Protocol Initial Energy

    (joules)

    Network Life

    Time

    Flooding 6 75sec

    Directed Diffusion 6 87sec

    TABLEII.COMPARISON BETWEEN DATA-CENTRIC AND AGGREGATION

    Routing protocol Data centric Data aggregation

    SPIN

    Directed Diffusion

    Rumor Routing

    Shah et al.

    GBR

    CADR

    COUGAR

    REFERENCES

    [1] Chaczko, Z.; Ahmad, F.; Mahadevarr, V "Wireless sensors in networkbased collaborative environments, Information Technology BasedHigher Education and Training, 2005. . 6th International Conference

    ITHET 2005. Page(s): F3A/7 - F3A13.2005.[2] R. Min, et al., "An Architecture for a power aware distributed

    microsensor node", in the Proceedings of the IEEE Workshop on signal

    processing systems (SIPS'00), October 2000.

    [3] [2] Yan-Xiao Li; Hao-Shan Shi; Shui-Ping Zhang; "An Efficient EnergyAware MAC Protocol for Wireless Sensor Network , International

    Conference ICMULT.2010.

    [4] Shousheng Zhao, Fengqi Yu, Baohua Zhao," An Energy EfficientDirected Diffusion Routing Protocol", International Conference on

    Computational Intelligence and Security 2007.

    [5] Arun Kumar and Ashok Kumar Turuk,"Simulation of Sensor NetworkProtocols and their Comparison", International Conference on Sensors

    and Related Networks (SENNET07), VIT University, Vellore, India.Dec. 12-14, 2007. Pp.448-453.

    [6] Linliang Zhao, Gaoqiang Liu, Jie Chen, Zhiwei Zhang"Flooding andDirected Diffusion Routing Algorithm in Wireless Sensor

    Networks,Ninth International Conference on Hybrid IntelligentSystems,2009.

    [7] D. Braginsky and D. Estrin, "Rumor Routing Algorithm for SensorNetworks," in the Proceedings of the First Workshop on Sensor

    Networks and Applications (WSNA), Atlanta, GA, October 2002.

    [8] C. Schurgers and M.B. Srivastava, Energy efficient routing in wirelesssensor networks, in the MILCOM Proceedings on Communications forNetwork-Centric Operations: Creating the Information Force, McLean,

    VA, 2001.

    [9] M. Chu, H. Haussecker, and F. Zhao, "Scalable Information-DrivenSensor Querying and Routing for ad hoc Heterogeneous Sensor

    Networks," The International Journal of High Performance Computing

    Applications, Vol. 16, No. 3, August 2002.