Sivram-base Paper IEEE

Embed Size (px)

Citation preview

  • 8/8/2019 Sivram-base Paper IEEE

    1/8

    2328 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 5, MAY 2009

    Performance Evaluation of Efficient and ReliableRouting Protocols for Fixed-Power Sensor Networks

    Peter Kok Keong Loh, Hsu Wen Jing, and Yi Pan

    AbstractFixed-power wireless sensor networks are prevalentand cost-effective. However, they face mote failures, RF interfer-ence from environmental noise and energy constraints. Routingprotocols for such networks must overcome these problems toachieve reliability, energy efficiency and scalability in messagedelivery. Achievement of these requirements, however, posesconflicting demands. In this paper, we propose an efficient andreliable routing protocol (EAR) that achieves reliable and scal-able performance with minimal compromise of energy efficiency.The routing design of EAR is based on four parameters -expected path length and a weighted combination of distancetraversed, energy levels and link transmission success history, todynamically determine and maintain the best routes. Simulation

    experiments of EAR with four existing protocols demonstratethat a design based on a combination of routing parametersexhibits collectively better performance than protocols based on

    just hop-count and energy or those using flooding.

    Index TermsEnergy efficiency, hop count, reliable routing,routing protocol, wireless sensor network.

    I. INTRODUCTION

    WIRELESS sensor networks (WSNs) open up new ap-plication areas such as tactical surveillance, intelligent

    environmental and structural monitoring and target tracking

    [18]. In a WSN, large numbers of tiny nodes (sensor motes)

    may be deployed in an ad hoc manner. These nodes automati-cally configure a topology by communicating and coordinating

    with each other [13].Nodes assume the roles of both sensing device and router.

    Messages are relayed to other nodes or to a hub in a multi-

    hop fashion. Multi-hop routing in an energy-constrained WSN

    has been shown to give rise to significant gains in network

    performance [27]. With more nodes, the area being monitored

    can be increased or with the same area, the increase in node

    density gives more precise and timely data and also provides

    a degree of operational reliability. Power-controlled networks

    have nodes with variable RF power transceivers that provide

    greater routing performance at the expense of higher powerconsumption and costs [8], [17], [25]. Fixed-power networkshave cheaper motes with fixed-power RF transceivers but may

    be more prone to communication disruptions [2], [14]. Despite

    advances in Micro-Electro Mechanical Systems technology,

    Manuscript received October 12, 2006; revised January 12, 2007; acceptedJanuary 14, 2007. The associate editor coordinating the review of this paperand approving it for publication was Y. B. Lin.

    P. K. K. Loh and W. J. Hsu are with Nanyang Technological University,School of Computer Engineering, Nanyang Avenue, Singapore 639798 (e-mail: {askkloh, hsu}@ntu.edu.sg).

    Y. Pan is with Georgia State University, Department of Computer Science,34 Peachtree Street, Suite 1450, Atlanta, GA 30302-4110 USA (e-mail:[email protected]).

    Digital Object Identifier 10.1109/TWC.2009.060772

    energy limitations still limit sustainability of operations in

    WSNs and new, low energy devices are still experimental[2], [15], [21]. Several routing protocols in fixed-power, multi-

    hop WSNs use shortest-path routing [3], [8]. Since operation

    is often over long unattended periods, the protocol must be

    energy efficient. The environment is also unpredictable and

    often disrupts operation. As such, routing protocols must

    ensure that the WSN can reconfigure [6], [13], be energy

    efficient and resilient to failures [14], [21]. These non-trivial

    requirements pose conflicting demands on protocol design [5],

    [10], [12], [16], [26],[ 30][31]. With these issues in mind,

    we propose an efficient and reliable routing protocol (EAR)that routes messages to one or more hubs for data-aggregationapplications. EAR takes into account the expected path length

    and a weighted combination of distance traversed, energy level

    and past performance of an RF link for its routing decisions.

    Control overheads in EAR are low.

    The rest of this paper is organised as follows. Section II

    surveys some reliable and efficient routing protocols for multi-

    hop WSNs. Section III highlights our motivation. Section IV

    describes the detailed design of EAR. Simulation results and

    some open problems are presented and discussed in Section

    V. Section VI concludes this paper followed by the references

    and acknowledgements.

    I I . RELATED WORK

    Here we discuss four recently proposed routing protocols

    for reliable and efficient many-to-one routing in multi-hopWSNs: Dynamic Source Routing (DSR) [19-20], Gradient-

    Based Routing (GBR) [26], Gradient Broadcast (GRAB) [23],

    [28] and Adhoc On-Demand Vector routing (AODV) [11],

    [24]. These routing protocols are similar in that they use

    neighbourhood information to route packets to the hub. In

    DSR, nodes dynamically discover a complete route acrossmultiple hops to the required destination in the network. To

    do this, each packet header contains the complete, ordered listof traversed nodes (including the source node). The significant

    information overheads here are partially offset by not requiring

    periodic route updates and the monitoring of only routes inuse. If an intermediate node is not the destination or it does

    not have any route to the destination in its route cache, it will

    initiate a route discovery process via request broadcasts to its

    neighbors. If available, the complete route to the destination is

    found and returned to the initiator. Otherwise, the neighbour

    appends its address to the route record and re-broadcasts the

    route request to its neighbors. In noisy environments, route

    discovery incurs large overheads. When routes become invalid,

    DSR adapts by sending a route error packet to the source

    1536-1276/09$25.00 c 2009 IEEE

  • 8/8/2019 Sivram-base Paper IEEE

    2/8

    LOH et al.: PERFORMANCE EVALUATION OF EFFICIENT AND RELIABLE ROUTING PROTOCOLS FOR FIXED-POWER SENSOR NETWORKS 2329

    node, which stops using the route. For better reliability, DSR

    maintains multiple route entries in its routing table.

    In GBR, hop-counts to the hub are computed for each

    node and the difference between a nodes hop count and that

    of its neighbour is the gradient of that link. Gradients arethus established from nodes to the hub and all messages will

    flow in the direction of the greatest gradient. Thus, packet

    routing is similar to distance-based techniques utilised by

    several existing protocols. When a node detects that its energylevel has decreased to 50% or less, it lowers its gradient to

    discourage other nodes from routing packets through it. This

    change in gradient must be propagated as far as needed to

    keep other gradients consistent. Although this process incurs

    significant overhead, it is done only once for each node. If

    a link fails or is disrupted, the RF link with the next highest

    gradient is chosen. No additional route management overheadsare incurred. With multiple neighbours having links with the

    same gradient, one is randomly chosen to route the message.This can spread traffic over time but in WSNs where RF

    transmission varies from one node pair to another, even on

    optimal routes, additional routing information is required toidentify better performing links.

    In GRAB, routing is based on cost and credit. A nodes

    cost is the minimum energy overhead to route a packet to

    the hub. The hub has a cost of 0 and the value increases

    with node distance from the hub. A new packets header is

    initialised with the source nodes cost to the hub and assigns

    a credit value to the packet before broadcasting it. Intermediate

    nodes include their own costs in the packet header but do not

    need to designate next hop nodes as flooding is used. This

    mechanism provides good reliability at the expense of highenergy consumption, latency and increased packet collisions

    especially in a noisy and/or high traffic volume WSN. Onlyneighbours with lower costs may continue routing packets. A

    packets credit is consumed at each intermediate node on the

    path to the hub. When a packet has enough credit, the node

    will forward the packet else it will be dropped. By assigning an

    appropriate amount of credit to each packet, duplicate copies

    of that packet may travel in multiple paths in a mesh from the

    source to the hub. However, this increased in probability of

    delivery depends greatly on the fault locations relative to the

    width of the broadcast mesh with the latter being widest at

    the source. It is also offset by the increased packet collisions.

    In AODV, the on-demand route discovery process is similar

    to DSR except that each node maintains a routing table withonly one entry for each destination. As a result, AODV incurssimilar information overheads as DSR with lower reliability.

    Each table entry records the next hop to that destination

    and a sequence number generated by the destination that

    indicates whether this information is current or dated. Each

    entry also records the addresses of active neighbors through

    which packets for the specified destination can be routed.

    Whenever a link in use is no longer valid, the upstream node

    of that link immediately notifies the active neighbors of the

    link. This is repeated until the source nodes using that link are

    reached. Route recovery is then initiated. Unlike DSR, there

    is reduced recovery overhead as the route request does notrecord traversed nodes but only the traversed node count. A

    node that receives route replies, updates its routing table entry

    and propagates the reply back towards the source only if the

    reply has either a greater destination sequence number (more

    current), or the same sequence number with a smaller hopcount. In noisy environments, multi-round discovery may be

    needed to establish a route, increasing overheads.

    III. MOTIVATION FO R CURRENT WOR K

    Routing based on hop-count and node energy levels doesnot account for dynamically varying RF link conditions in

    the operating environment. An optimal route need not be the

    shortest and a more stable RF link may be more efficient

    and reliable. Duplicate packets that are routed to enhance

    delivery success incur additional energy consumption and

    increased latency. Keeping track of the entire message route

    dynamically is expensive, especially in a noisy, disruptiveoperating environment. The onus is to prolong the operational

    lifetime of the WSN while tolerating mote failures and RF

    disruptions. The performance of the routing protocol also has

    to scale with network size. The challenge then is to develop a

    routing protocol that can meet these conflicting requirementswhile minimizing compromise.

    IV. DESIGN OF EAR

    The procedural design of EAR may be divided into three

    phases: setup, route selection, and data dissemination. These

    are detailed in the following sections.

    A. Setup Phase

    When a hub is powered on, it broadcasts an Advertisement

    (ADV) packet indicating that it wants to receive RPT packets.When a neighbouring node around the hub receives this ADV

    packet, it will store the route to the hub in its routing table.Nodes do not propagate the ADV packet received. When a

    node is powered on, it delays for a random interval of time

    before starting an initialisation process. A node starts the

    initialisation process by broadcasting a Route Request (RREQ)

    packet asking for a route to a hub. When a hub receives

    a RREQ packet, it will broadcast a Route Reply (RREP)

    packet. Similarly, when a node receives a RREQ packet, it will

    broadcast a RREP packet if it has a route to a hub. Otherwise,

    it will ignore the RREQ packet. Nodes do not propagate RREQ

    packets. When a node receives a RREP packet, it will store theroute in its routing table. When it has at least one route to thehub it skips the initialisation process. By introducing random

    delay for each node to begin initialisation process, a portion

    of nodes will receive a RREP packet before they have begun

    their initialisation process. This enables faster propagation of

    routes and saves on the amount of control packets generated in

    the setup phase. A node may store more than one route to the

    hub. A route in the routing table is indexed using the next hop

    nodes ID - that is the ID of the neighbouring node. A node

    keeps only one route entry for a neighbour that has a route to

    the hub even though that neighbour could have multiple routes

    to the hub. For each route entry in the route table, only thebest route is stored. The selection of best routes is described

    next.

  • 8/8/2019 Sivram-base Paper IEEE

    3/8

    2330 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 5, MAY 2009

    B. Route Selection Phase

    Ideally, the best route is the shortest as it incurs the lowest

    latency and consumes the least energy. In an actual environ-

    ment, the performance of an RF link varies with physical dis-tance and the terrain between nodes and should be accounted

    for in routing decisions. In EAR, shortest routes are initially

    admitted into the routing table based on hop-count. As RPT

    packets flow through these links, less desirable ones will start

    to exhibit high packet loss rate and are eventually blacklistedand omitted from the routing table. Links that are omitted

    from the routing table may be re-admitted again only after

    a period of time. Some RF links are affected by temporary

    external disruption and should be given the chance to be re-

    admitted. This allows for adaptiveness. The mechanism uses

    a sliding window that keeps track of the last N attempts toroute packets on a specified link. If a link fails to relay all

    packets in the last N consecutive attempts, then it will beblacklisted and omitted from the table. A metric, LinkScore,is defined as LinkScore = (PE WE + PT WT), wherePE energy level of the next hop node (0.0 to 100.0), WE assigned weight for PE (0.0 to 1.0), PT transmissionsuccess rate (0.0 to 100.0) and WT assigned weight forPT (0.0 to 1.0). Weights, WE and WT, may be determinedempirically but their sum must equal 1. For example, in a low

    noise environment, the probability of successful transmission

    is higher. In this scenario, WE = 0.7 and WT = 0.3may be chosen allowing routing decisions to focus more

    on energy conservation in path selection. Conversely, in anoisy environment, WT = 0.7 and WE = 0.3 could bechosen instead, giving higher emphasis to the selection of high

    reliability paths over energy conservation. LinkScore thentakes on a value from 0 to 100 and a higher value indicates

    a better link. An arbitrary value is initially assigned to PT asthe link performance is unknown. PT rises (or drops) whensubsequent packet transmissions succeed (or fail). PE startsat 100 and drops as a node consumes its energy resources.

    LinkScore is used when there are two links of differentroutes with the same hub distance competing to be admitted

    to the routing table. When a new link is received and therouting table is full, link replacement is initiated. The search

    ignores blacklisted links and targets the link with the lowest

    LinkScore to be replaced. When there is more than one entrywith the same LinkScore, the entry with the longest lengthis chosen to be replaced. This worst route is then compared

    against the incoming route and the shorter route is admittedinto the routing table. If there is a tie in route length, then

    the route with the higher LinkScore is admitted. Since eachnode stores and maintains the best available RF links in its

    routing table, packets travel on the best route from a node to

    a hub at the given time. Since the routing table contains only

    one entry to the next hop node, its size scales slowly with

    network size and multiple hubs.

    C. Data Dissemination

    Sensor nodes generate RPT packets at periodic intervals

    or sleep, waiting for some event to happen. An RPT packetcontains information of interest to network users and has two

    fields in its header: ExpPathLen and N umHopT raversed.

    A

    C

    HubB

    D

    E

    F

    G

    ls=48

    ls=75ls=94

    Fig. 1. Illustration of forwarding based on LinkScore metric.

    The first field is the expected number of hops the packet will

    have to traverse before it reaches the hub. It is defined as:

    ExpPathLen = N H , where 0.0 < 1.0, N His the number of hops from this node to the hub for the

    route selected. The route selected need not be the shortest

    but ExpPathLen is bounded by the network diameter. is an assigned weight such that 0.0 < 1.0 since the

    minimum number of hops to reach the hub is at least 1.NumHopTraversed is the distance a packet has traversedand is initialised as 0. The packet is forwarded to the next

    node in the route. When the next node receives the packet, it

    will increment N umHopT raversed by one and compare itwith ExpPathLen. The algorithm is as follows:

    By assigning >> 0.0, a packet may favour a route withbetter performing links rather than just the shortest route (Fig.1). If the number of hops that a packet has traversed exceeds

    the expected number, there must be changes in the network

    topology. During this period of instability, the packet will take

    the shortest route to the hub. To prevent potential deadlocks

    from occurring, a variable BufUtilLvl is used at each node tostore the current utilisation level of the packet output buffer. Athreshold value, BLThreshold, is defined where BLThreshold< Bmax (max size of buffer). If BufUtilLvl is greater thanBLThreshold, the packet will be relayed on the shortest routeto the hub. This buffer control mechanism ensures that new

    packets will not be injected when the buffer is almost fulland there will always be at least one buffer space for transit

    packets to be routed.

    Proposition 1: EAR is deadlock-free in a connected wire-

    less sensor network.

    Proof: We recall that ExpPathLen = N H . Let hbe the number of hops traversed by a packet.

    Case 1: ExpPathLen h: the data disseminationalgorithm selects the shortest route in the routing table for

    forwarding. In the case of a tie, the route with the highest

    LinkScore is selected. Selecting the shortest route at everyintermediate node will lead the packet to a hub and no node

    is revisited.

    Case 2: ExpPathLen > h: the data dissemination algo-rithm selects the route with the highest LinkScore in therouting table for forwarding. If there is a tie in LinkScore,the shorter route is chosen. In this case, the neighbouring

    node with the highest LinkScore may have the same hopcount to the hub as the sender node and this may resultin the packet being re-transmitted to the sender. Although

    a temporary loop may be possible, a deadlock can never

  • 8/8/2019 Sivram-base Paper IEEE

    4/8

    LOH et al.: PERFORMANCE EVALUATION OF EFFICIENT AND RELIABLE ROUTING PROTOCOLS FOR FIXED-POWER SENSOR NETWORKS 2331

    1 2

    (1) Node 1 sends RTS

    1 2

    (2) Node 2 sends CTS

    1 2

    (3) Node 1 sends data packet

    Nodes with latest

    route info

    Nodes without latest

    route info

    Legend

    Fig. 2. Piggybacking on RTS/CTS packet.

    occur since BLThreshold < Bmax and buffers will neverbe full. A packet will be forwarded on the shortest route if

    the packet output buffer exceeds BLThreshold, thus breakingthe loop. ExpPathLen is bounded by the network diameter.If h ExpPathLen, the packet will travel on the shortestroute to hub, as in case 1.

    Proposition 2: The distance a packet travels before reaching

    a hub is bounded by N H+ D, where D is the distance of thefurthest node from the hub in terms of hops.

    Proof: Consider a packet that is generated at node

    A. When is set to 1, ExpPathLen = N H. WhenExpPathLen > NumHopTraversed, the packet is for-warded to its neighbour node B which has the highestLinkScore. Node B may not be on the shortest route inthe routing table and in the worst case, the packet will be

    relayed along the longest route at every intermediate node

    and the packet will traverse N H hops until ExpPathLen =NumHopTraversed. In the worst case, the packet will havebeen routed to the furthest node from the hub. Now, the packet

    will be forwarded on the shortest route and the packet willneed a maximum of D hops to reach the hub.

    Corollary 1: The routing algorithm of EAR is livelock-free.

    Proof: In a non-ideal environment, loops formed are

    temporary and by Theorem 1, will eventually be exited. By

    Theorem 2, a packet eventually arrives at a hub after a

    maximum of N H + D hops, where D is the distance of thefurthest node from the hub in hops.

    D. Route Update

    Sensor nodes continually update best routes in the routing

    table. Instead of explicit control packets, EAR uses the hand-shaking mechanism at the MAC layer. Route information ispiggybacked onto both RTS and CTS packets. Fig. 2 illustrates

    this scenario. Nodes in blue have received updated route

    information from either node Xs RTS or node Ys CTS

    packet or both. RTS and CTS packets have to be received

    and processed by all nodes as part of the collision avoidance

    mechanism employed by the MAC protocol [29]. Hence, util-

    ising RTS-CTS handshaking instead of separate DATA-ACK

    would result in more current route information for a node.

    As an example, EAR can use S-MAC (Sensor MAC) [17]

    that has energy saving mechanisms. S-MAC uses the same

    four-way handshaking mechanism as IEEE 802.11 to achievereliable link-to-link transmission. One of the energy-saving

    mechanisms known as Overhearing Avoidance specifies that

    Packet Delivery Ratio (PDR) with 10% Source Nodes

    0

    10

    20

    30

    40

    50

    60

    70

    80

    90

    100

    0 50 100 150 200 250 300 350 400

    Number of nodes

    %o

    fpa

    cketsdeliveredsuccessfully

    AODV

    DSR

    EAR

    GBR

    GRAB

    Fig. 3. Packet Delivery Ratio results (with 10% active sources).

    Packet Delivery Ratio (PDR) with 50% Source Nodes

    0

    10

    20

    30

    40

    50

    60

    70

    80

    90

    100

    0 50 100 150 200 250 300 350 400

    Number of nodes

    %o

    fpacketsdeliveredsuc

    cessfully

    AODV

    DSR

    EAR

    GBR

    GRAB

    Fig. 4. Packet Delivery Ratio results (with 50% active sources).

    nodes upon hearing a RTS or CTS packet that is not addressed

    to them will go into sleep mode. Periodically exchanging

    routing information between nodes is costly in terms of energy

    consumption and bandwidth usage. Piggybacking route infor-

    mation onto existing RTS and CTS packets incurs additional

    energy consumption as the packet size increases. However,

    no extra packets need be generated and additional costs are

    negligible compared to the cost incurred in relaying explicitroute information (control) packets.

    Cost analysis of route update: We show the energy

    and latency costs in piggybacking route information on the

    RTS/CTS packet compared to sending an explicit control

    packet. The energy consumed is proportional to packet size

    and we assume the energy cost to transmit 1 bit is 1 unit. Let

    K be the size of the route information in bits, W be the sizeof the routing control packet in bits and the bandwidth be Bbits per second. Then, we have:

    Energy cost of piggybacking = K units, Latency cost ofpiggybacking = K/B seconds,

    Energy cost of explicit control = (SRTS + SCTS + K+W + SACK) units, and

    Latency cost of explicit control = (SRTS/B) +(SCTS/B) + ((K+ W)/B) + (SACK/B) seconds

    where SRTSRT Spacket size in bits, SCTSCT S packetsize in bits and SACK ACK packet size in bits.

  • 8/8/2019 Sivram-base Paper IEEE

    5/8

    2332 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 5, MAY 2009

    Packet Latency with 10% Source Nodes

    0

    0.5

    1

    1.5

    2

    2.5

    0 50 100 150 200 250 300 350 400

    Number of nodes

    Latencyperpacket(s)

    AODV

    DSR

    EAR

    GBR

    GRAB

    Fig. 5. Packet Latency results (with 10% active sources).

    Packet Latency with 50% Source Nodes

    0

    1

    2

    3

    4

    5

    6

    7

    8

    0 50 100 150 200 250 300 350 400

    Number of nodes

    Latencyperpacket(s)

    AODV

    DSR

    EAR

    GBR

    GRAB

    Fig. 6. Packet Latency results (with 50% active sources).

    V. SIMULATION

    GloMoSim [1] was used to emulate a WSN with crossbow

    MICA2 motes [9] for data aggregation. In the simulation, all

    nodes generate data packets that are routed to the hub located

    in the centre of the WSN. To focus on performance variationsdue to design differences among the routing protocols tested,

    we used a simulation model that precludes effects such asfading, shadowing and multipath losses. To ensure consistency,

    the same model is applied to all routing protocols tested.

    The routing protocols are subjected to a series of tests to

    evaluate their performances in a realistic WSN environment

    that is compounded with noise and node failures. We simulated

    network sizes from 50 to 400 nodes with 10% and 50% activesource nodes. Every node except the hub takes on a random

    noise factor between 10% and 50%. The noise factor specifies

    the probability that packets to be received by that node are

    corrupted or lost. Also, 50% of randomly selected nodes fail

    at random times within the simulation duration. Results wereaveraged over 30 runs each with a different seed and are shown

    in Figs. 38. The following standard metrics [10], [13], [23]

    were used:

    Packet delivery ratio (PDR) measures the percentage

    of data packets generated by nodes that are successfully

    delivered, expressed as

    Total number of data packets succesfully delivered

    Total number of data packets sent 100%

    Energy Consumption with 10% Source Nodes

    0

    10

    20

    30

    40

    50

    60

    70

    80

    90

    100

    0 50 100 150 200 250 300 350 400

    Number of nodes

    Energy

    expendedperpacket(mJ)

    AODV

    DSR

    EAR

    GBR

    GRAB

    Fig. 7. Energy Consumption results (with 10% active sources).

    Energy Consumption with 50% Source Nodes

    0

    50

    100

    150

    200

    250

    0 50 100 150 200 250 300 350 400

    Number of nodes

    Energyexpendedperp

    acket(mJ)

    AODV

    DSR

    EAR

    GBR

    GRAB

    Fig. 8. Energy Consumption results (with 50% active sources).

    Packet latency measures the average time it takes to route

    a data packet from the source node to the hub. It is expressedas

    Individual data packet latency

    Total number of data packets delivered.

    Energy Consumption: This measures the energy expended

    per delivered data packet. It is expressed as

    Energy expended by each node

    Total number of data packets delivered.

    We calculate energy expended in transmission and receptionby the nodes RF transceivers. This metric also indirectly

    measures the amount of control packet overhead of a routing

    protocol.Fault Tolerance and Scalability: Values for the above

    metrics are recorded for 10% and 50% active source nodes

    with a specified fault model: 50% of randomly selected nodes

    fail and surviving nodes are exposed to a random noise factor

    ranging from 10% to 50% to disrupt RF communications.

    A. Performance Evaluation

    Packet Delivery Ratio: DSR operates in promiscuous mode

    such that nodes can obtain the latest routing information

    and packets are routed on valid paths with high probability.

    Multiple paths are kept in the routing table giving DSR agood degree of reliability. DSR exhibits moderately high PDR

    (Figs. 3, 4). Besides path length, GBR considers a nodes

  • 8/8/2019 Sivram-base Paper IEEE

    6/8

    LOH et al.: PERFORMANCE EVALUATION OF EFFICIENT AND RELIABLE ROUTING PROTOCOLS FOR FIXED-POWER SENSOR NETWORKS 2333

    energy level to distribute packet traffic more uniformly among

    all nodes. The improvement over DSR and GRAB is evident

    with larger networks and higher traffic levels (Fig. 4). Moreactive sources contribute to a higher rate of packet collisions.

    Spreading of network traffic reduces the chance of collisions.

    However, GBRs selection of the next hop node does not

    account for the stability of RF links that may vary over time.

    GRAB has the second highest PDR on average as it floods

    packets in a mesh to the hub. With 50% active source nodes,however, GRAB is less robust (Figs. 3, 4). Additional packet

    loss is contributed by collisions as flooding generates many

    redundant packets. A packet broadcasted by a source node may

    also be lost for good during transmission as broadcast does not

    provide for link-to-link transmission and acknowledgement.

    Although the route discovery process in AODV is similar to

    DSR, each node only maintains a single routing table entry for

    each destination. A single route discovery in AODV reveals

    less information than in DSR. Hence, within the same time,fewer routes are discovered with the consequence that the

    number of packets delivered is less (Figs. 3, 4).

    With both 10% and 50% active source nodes, EAR achievedabout 97% PDR on average compared to 82% for GRAB and70% for GBR. Besides expected path length, EARs routing

    decisions are based on a weighted combination of distance

    traversed, energy and link performance history. EAR blacklists

    RF links with consistently poor performance and discards

    them from the routing table. The performance is consistenteven with larger networks up to 400 nodes (Figs. 3, 4).

    Packet Latency: GRAB and DSR incur the highest laten-cies, especially on networks with 200 nodes upwards (Figs.

    5, 6). GRAB floods packets in a mesh to the hub. With 50%source nodes, packet latencies increase exponentially, off the

    graph (Fig. 6). Values recorded are: 36.6s (10% active), 94.3s(200 nodes, 50% active), 138.9s (300 nodes, 50% active), and

    318.9s (400 nodes, 50% active). Number of control packets

    produced by GRAB fluctuates significantly across simulations

    and therefore it shows widely fluctuation performance. Largeerror bars have also been observed in an independent study [3].

    DSR exhibits large packet latencies because its route discovery

    takes more time. Every intermediate node tries to extract and

    record information before forwarding a reply. The same thing

    happens when a data packet is routed from node to node.Hence, while route discovery in DSR yields more information

    for delivery, packet transmission slows down. Although route

    discovery process in AODV is similar to DSR, each nodemaintains only one routing table entry for each destination.

    Unlike DSR, AODV does not record traversed nodes, thus

    reducing route update latencies. As network size increases,

    this is more evident (Figs. 5, 6).

    EARs packet latency is 0.05 seconds higher than GBR on

    average. With network sizes of 350 nodes upwards, the packet

    latency is 0.4 seconds higher than GBR on average (Figs.

    5, 6). This is due to the higher control overhead compared

    to GBR, despite the piggy-backing. However, this is good

    compromise resulting in appreciably higher PDR (Figs. 3, 4).

    GBR exhibits the lowest packet latencies of all protocols (Figs.

    5, 6). In GBR, when a nodes energy reserves fall below 50%,the node reduces its gradient with respect to its neighbours,

    discouraging further routing through it. The gradient change

    TABLE IENERGY CONSUMED PER PACKET FOR AODV AN D GRAB

    Energy Expended Per Packet (mJ) for 10% active sources

    50 100 150 200 250 300 350 400

    AODV 7.102 20.777 111.394 175.474 256.966 272.406 331.473 683.139

    GRAB 61.741 112.126 114.814 300.578 183.041 206.479 235.023 449.239

    Energy Expended Per Packet (mJ) for 50% active sources

    50 100 150 200 250 300 350 400

    AODV 29.033 104.697 182.426 293.484 367.358 510.777 585.768 824.233

    GRAB 69.713 131.59 100.48 214.843 148.559 215.705 186.362 314.066

    is progressively propagated to neighbouring nodes to maintain

    consistency. However, this process is initiated only once by

    each node. There is no need for regular updates of routingtables and hence, latency is reduced significantly due to lower

    control overheads.

    Energy Consumption: Route discovery in AODV is energy-intensive. The data packet carries pointers to the full route in

    itself, which incurs additional energy overheads during routing

    compared to data packets of routing protocols that carry only

    neighbourhood information. The additional energy consumed

    is proportional to network size. With an operating environmentthat is plagued with dynamically occurring link disruptions

    and node failures, it may be very difficult to establish a full

    route from source to the destination at a given point in time.

    The source will keep sending the route discovery packet but

    will not receive a definite route response from the destination.

    Route discovery packets will accordingly flood the network

    consuming more energy. The result is exacerbated energy

    overheads, especially manifested in larger networks above 150nodes (Table 1).

    GRAB incurs high levels of energy consumption as it floods

    packets in a mesh to the hub. Energy is also expended to

    build up the costfi

    eld. Excepting AODV, the consumptionlevels of GRAB are at least an order of magnitude higher

    than the other protocols. With larger networks from about

    200 nodes upwards, the additional redundant routes available

    to packets appreciably increase packet delivery success over

    AODV (Fig. 3, 4). Less control packets are needed compared

    to AODV especially for route discovery. Hence, GRABs

    energy overheads show an improvement over AODVs for

    larger network sizes (Fig. 8). Despite the large error bars, the

    appreciably higher energy consumption levels of both AODV

    and GRAB relative to the other protocols are evident fromthe resulting trends. DSR makes use of promiscuous mode to

    constantly update route information. This reduces total energy

    consumption as less re-transmissions and control packets are

    needed. As in AODV, however, route discovery broadcasts in

    DSR can lead to significant energy consumption especially inlarger networks. As an improvement over AODV, DSR uses a

    route cache to reduce route discovery costs (Fig. 7, 8).

    GBR and EAR exhibit the lowest energy overheads (Fig. 7,

    8). As GBR directly monitors each nodes energy reserves, it

    permits a more gradual and uniform rate of energy consump-

    tion over the network. Though the progressive propagation

    of gradient changes to neighbouring nodes consume energy,

    the process is done only once for each node when its

    energy level goes below the 50% threshold. Energy overheadsof EAR are competitive with that of GBR. The slight im-

    provement over GBR with larger networks may be attributed

  • 8/8/2019 Sivram-base Paper IEEE

    7/8

    2334 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 5, MAY 2009

    in part to EAR dynamically accounting for variable link

    performance and forwarding packets only on best routes. By

    piggybacking on RTS/CTS packets, current route informationis disseminated quickly with low energy costs. As the cost

    analysis in Section IV-D shows, the energy cost of a single

    route update is appreciably lower when piggybacking than

    using explicit control packets.

    Fault Tolerance and Scalability: AODV and DSR utilise

    on-demand route discovery based onflooding the network withroute requests and are more suitable for a small- to moderate-

    sized network with minimal noise and RF disruptions. As

    network size scales upwards and in the presence of appreciable

    node and link failures, costs associated with route repair

    scale exponentially. The mesh-broadcast feature of GRABmay increase the robustness of data delivery in the presence

    of faulty nodes and noisy channels. Like AODV and DSR,

    however, GRAB is more suitable for small to moderate-sized

    networks with a small proportion of active source nodes. With

    larger networks and heavy traffic, overheads incurred and

    packet collisions encountered rise disproportionately leading

    to poor performance scalability. Fault tolerance exhibited byGRAB depends very much on the location of node failuresand link disruptions. When these occur nearer the source node,

    theres a higher chance of avoiding it as the mesh is wider.

    The width of the mesh is controlled by the amount of creditthat is used up as packets get closer to the hub. Packet latency

    and energy consumption exhibited by GBR and EAR scale

    well with network size in the presence of node faults and link

    disruptions. GBR latency and energy consumption figures are

    essentially independent of the number of active sources and

    also scale well with network size. Its performance is largely

    due to its one-off approach in monitoring energy levels and its

    use of shortest routes whenever possible. For packet latencyand energy consumption, EAR exhibits performance close to

    GBR. By also accounting for link performance history, EAR

    exhibits consistently higher PDR than GBR over all network

    sizes.

    B. Open Issues

    In the proposed network setup, nodes relay all data packets

    to the hub. In networks with a single, centrally-located hub,neighbouring nodes to the hub route more packets than other

    nodes. These nodes will drain their energy-reserve at a muchfaster rate. One possible solution to this problem could be to

    adopt a clustering approach wherein cluster node membersroute only to the cluster heads and cluster heads may be

    implemented with variable-powered motes.

    VI . CONCLUSION

    This paper has proposed a viable routing protocol, EAR, for

    data aggregation in fixed-power WSNs. Routes are managed

    based on expected path length and a weighted combination

    of distance traveled, energy level and RF link performance

    history. Simulation results have shown that it performs com-

    petitively against existing routing protocols in terms of packet

    delivery ratio, packet latency, scalability and energy con-sumption while operating in a noisy wireless environment

    where network traffic, link disruptions and node failure rates

    are high. Future work includes studying the open issues

    and investigating the security aspects of EAR, especially in

    clustered WSNs.

    ACKNOWLEDGEMENT

    We would like to thank the Nanyang Technological Univer-

    sity and Georgia State University for supporting our research

    efforts. Yi Pans work was also supported by the 111 project

    of China under the grant No. 111-2-14. We acknowledge

    Long Say Huans help in the development and testing ofEAR. We also thank the editors and anonymous reviewers

    recommendations that have significantly improved this paper.

    REFERENCES

    [1] A. R. Bagrodia, L. Bajaj, M. Gerla, and M. Takai, GloMoSim: ascalable network simulation environment," technical report 990027,UCLA, Computer Science Dept., 1999.

    [2] I. F. Akyildiz, E. Cayirci, Y. Sankarasubramaniam, and W. Su, A surveyon sensor networks," IEEE Trans. Commun., pp. 102114, 2002.

    [3] T. Bokareva, N. Bulusu, and S. Jha, A performance comparison of datadissemination protocols for wireless sensor networks," in Proc. IEEEGlobecom, 2004, pp. 8589.

    [4] A. Bourkerche, Performance evaluation of routing protocols for ad hocwireless networks," Mobile Networks Applications, vol. 9, no. 4, pp.333342, 2004.

    [5] A. Bourkerche, R. W. N. Pazzi, and R. B. Araujo, Fault-tolerantwireless sensor network routing protocols for the supervision of context-aware physical environments," J. Parallel Distributed Computing, vol.66, no. 4, pp. 586599, Apr. 2006.

    [6] N. Bulusu, J. Heidemann, D. Estrin, and T. Tran, Self-configuringlocalization systems: design and experimental evaluation," ACM Trans.Embedded Computing Systems, vol. 3, no. 1, pp. 2460, 2004.

    [7] A. Chandrakasan, S.-H. Cho, N. Ickes, R. Min, E. Shih, A. Sinha,and A. Wang, Physical layer driven protocol and algorithm design forenergy-efficient wireless sensor networks," in Proc. 7th Annual Intl.

    Conf. Mobile Computing Networking, 2001, pp. 272287.[8] J.-H. Chang and L. Tassiulas, Maximum lifetime routing in wireless

    sensor networks," IEEE/ACM Trans. Networking, vol. 12, no. 4, pp.609619, Aug. 2004.

    [9] CrossBowMICA2 mote specs [Online]. Available:http://bullseye.xbow.com/Products/productdetails.aspx?sid=192

    [10] S. R. Das, C. E. Perkins, E. M. Royer, and M. K. Marina, Performancecomparison of two on-demand routing protocols for ad hoc networks,"

    IEEE Personal Commun., vol. 8, no. 1, pp. 1629, Feb. 2001.[11] S. R. Das, C. E. Perkins, and E. M. Royer, Ad hoc on-demand distance

    vector (AODV) routing," IETF Internet draft, draft-ietf-manet-aodv-13.txt, Feb. 2003 (work in progress).

    [12] G. Deepak, A. Cerpa, Y. Yu, W. Ye, J. Zhao, and D. Estrin, Networkingissues in sensor networks," J. Parallel and Distributed Computing, vol.64, no. 7, pp. 799814, 2004.

    [13] D. Estrin and A. Cerpa, ASCENT: adaptive self-configurable sensor

    networks topologies," IEEE Trans. Mobile Computing, vol. 3, no. 3, pp.272285, July 2004.

    [14] D. Estrin and J. Elson, Wireless sensor networks: a bridge to thephysical world," Wireless Sensor Networks, pp. 121, 2004.

    [15] D. Estrin, L. Girod, G. Pottie, and M. Srivastava, Instrumenting theworld with wireless sensor networks," in Proc. International Conf.

    Acoustics, Speech Signal Processing (ICASSP), May 2001, pp. 14.[16] D. Estrin, C. Intanagonwiwat, R. Govindan, J. Heidemann, and F. Silva,

    Directed diffusion for wireless sensor networking," IEEE/ACM Trans.Networking, vol. 11, no. 1, pp. 216, 2003.

    [17] A. Goldsmith and S. Chua, Variable-rate variable-power M-QAM forfading channels," IEEE Trans. Commun., vol. 45, pp. 12181230, Oct.1997.

    [18] Z. J. Haas and T. Small, A new networking model for biologicalapplications of ad hoc sensor networks," IEEE/ACM Trans. Networking,vol. 14, no. 1, pp. 2740, Feb. 2006.

    [19] Y. C. Hu, J. G. Jetcheva, D. B. Johnson, and D. A. Maltz, The dynamicsource routing protocol for mobile ad hoc networks," Internet draft,draft-ietf-manet-dsr-09.txt, Apr. 2003.

  • 8/8/2019 Sivram-base Paper IEEE

    8/8

    LOH et al.: PERFORMANCE EVALUATION OF EFFICIENT AND RELIABLE ROUTING PROTOCOLS FOR FIXED-POWER SENSOR NETWORKS 2335

    [20] D. B. Johnson, D. A. Maltz, and J. Broch, DSR: the dynamic sourcerouting protocol for mulit-hop wireless ad hoc networks," Ad Hoc

    Networking, Charles E. Perkins, ed., Chap. 5, pp. 139172. Addison-Wesley, 2001.

    [21] J. M. Kahn, R. H. Katz, and K. S. J. Pister, Next century challenges:mobile networking for smart dust," in Proc. 5th Annual ACM/IEEE

    International Conf. Mobile Computing Networking, 1999, pp. 271278.[22] LAN MAN Standards Committee of the IEEE Computer Society,

    Wireless LAN medium access control (MAC) and physical layer (PHY)specification," New York, USA, IEEE Std 802.11-1997.

    [23] F. Ye, G. Zhong, S. Lu, and L. Zhang, Gradient broadcast: a robustdata delivery protocol for large scale sensor networks," ACM WirelessNetworks, vol. 11, no. 2, pp. 285298, 2005.

    [24] C. E. Perkins, E. M. Belding-Royer, and S. Das, Ad hoc on demanddistance vector (AODV) routing," IETF Internet draft, draft-ietf-manet-aodv-12.txt, Nov. 2002 (work in progress).

    [25] V. Rodoplu and T. H. Meng, Minimum energy mobile wireless net-works," IEEE J. Select. Areas Commun., vol. 17, no. 8, pp. 1333-1344,Aug. 1999.

    [26] C. Schurgers, V. Raghunathan, and M. B. Srivastava, Power manage-ment for energy-aware communication systems," ACM Trans. EmbeddedComputing Systems, vol. 2, no. 3, pp. 431-447, Aug. 2003.

    [27] S. Toumpis and A. J. Goldsmith, Capacity regions for wireless ad hocnetworks," IEEE Trans. Wireless Commun., vol. 2, no. 4, pp. 736748,July 2003.

    [28] F. Ye, G. Zhong, S. Lu, and L. Zhang, Gradient broadcast: a robustdata delivery protocol for large scale sensor networks," ACM Wireless

    Networks, vol. 11, no. 2, pp. 285298, 2005.[29] W. Ye and J. Heidemann, Medium access control in wireless sensor

    networks," Wireless Sensor Networks, pp. 73-91, 2004.[30] Q. Zhao and G. Mohan, Topology knowledge range control for lifetime

    maximization in sensor networks with data aggregation," in Proc. 2ndACM Intl Workshop Performance Evaluation Wirelesss Ad Hoc, Sensor

    Ubiquitous Networks, 2005, pp. 8491.[31] Q. Zhao and L. Tong, Energy efficiency of large-scale wireless net-

    works: proactive versus reactive," IEEE J. Select. Areas Commun., vol.23, no. 5, pp. 11001112, 2005.

    Peter K. K. Loh is currently an Associate Pro-fessor of the School of Computer Engineering,Nanyang Technological University of Singapore.He has authored and co-authored several papers inwireless sensor networks, parallel and distributedsystems, and computer gaming. He has previouslyheld positions as Head of Software Cluster Labsand the Parallel Processing Lab. He obtained hisPh.D. from Nanyang Technological University, theMSc (Comp.Sc.) from Manchester Univeristy, theMSc (Elect.Engg.) and the BEng from the National

    University of Singapore. He is also a registered Professional Engineer(Singapore), Chartered Engineer (UK), and a Senior Member of IEEE.

    Wen-Jing Hsu is presently with the School of Com-puter Engineering, Nanyang Technological Univer-sity. He is also a Faculty Fellow of the Singapore-MIT Alliance (SMA) Computer Science Programsince 2001. At NTU, he has initiated and com-pleted several large scale externally funded researchprojects. He has authored or co-authored many pa-pers on parallel and distributed processing; amongthem four papers were nominated for Best PaperAwards (with two awarded). He is presently Deputy

    Director of the Maritime Research Center, NTU andhas published a book Anatomy of HCTS- a High-capacity Container HandlingSystem for Mega Vessels. He was previously Director of the Center ofAdvanced Information Systems, and Deputy Director of Financial Engineeringat NTU. He also held positions on the faculty of Michigan State University,USA, and was a Visiting Scientist at the IBM T. J. Watson Research Center,Yorktown Heights, and the IBM Palo Alto Scientific Center.

    Yi Pan received his B.Eng. and M.Eng. degreesin computer engineering from Tsinghua University,China, in 1982 and 1984, respectively, and his Ph.D.degree in computer science from the University ofPittsburgh, USA, in 1991. Currently, he is the chairand a full professor in the Department of Com-puter Science at Georgia State University. Dr. Pansresearch interests include parallel and distributedcomputing, optical networks, wireless networks, and

    bioinformatics. Dr. Pan has published more than 80journal papers with 28 papers published in various

    IEEE journals. In addition, he has published over 90 papers in refereedconferences (including IPDPS, ICPP, ICDCS, INFOCOM, and GLOBECOM).He has also co-edited 13 books (including proceedings) and contributedseveral book chapters. His pioneering work on computing using reconfigurableoptical buses has inspired extensive subsequent work by many researchers, andhis research results have been cited by more than 100 researchers worldwidein books, theses, journal and conference papers. He is a co-inventor ofthree U.S. patents (pending) and five provisional patents, and has receivedmany awards from agencies such as NSF, AFOSR, JSPS, IISF and theMellon Foundation. His recent research has been supported by NSF, NIH,NSFC, AFOSR, AFRL, JSPS, IISF, and the states of Georgia and Ohio.He has served as a reviewer/panelist for many research foundations/agenciessuch as the U.S. National Science Foundation, the Natural Sciences andEngineering Research Council of Canada, the Australian Research Council,

    and the Hong Kong Research Grants Council. Dr. Pan has served as an editor-in-chief or editorial board member for eight journals including three IEEETransactions and as a guest editor for seven special issues. He has organizedseveral international conferences and workshops and has also served as aprogram committee member for several major international conferences suchas INFOCOM, GLOBECOM, ICC, IPDPS, and ICPP. Dr. Pan has deliveredover 50 invited talks, including keynote speeches and colloquium talks atconferences and universities worldwide. Dr. Pan is an IEEE DistinguishedSpeaker (20002002), a Yamacraw Distinguished Speaker (2002), a Shell OilColloquium Speaker (2002), and a senior member of IEEE. He is listed in

    Men of Achievement, Whos Who in the Midwest, Whos Who in America,Whos Who in American Education, Whos Who in Computational Scienceand Engineering, and Whos Who of Asian Americans.