Professional Documents
Culture Documents
AMJAD MEHMOOD
CS420112001
..............
Signature
Supervisor-II
...............
Signature
August, 2014
Submitted by:
Through the:
(Chairman/Director)
(Department/Institute)
(Date)
Prepared by:
(Full Name of the QEC official who scanned the document)
Signature
Director QEC
CLUSTERING
MECHANISM
FOR
WIRELESS
SENSOR
(Signature)
_________________________________________
(Affiliation)
Supervisor-II
(Signature)
__________________________________________
(Affiliation)
i
i
(date)
Internal
Examiner
(Name)
(Signature)
(Affiliation)
External
Examiner
(Name)
(Signature)
(Affiliation)
Chairman/Dire
ctor:
ii
i
ACKNOWLEDGMENT
The success and final outcome of this research required a lot of guidance and assistance
from many people and I am extremely fortunate to have got this all along the completion
of my research work. Whatever I have done is only due to such guidance and assistance
and I would not forget to thank them.
I respect and thank Dr. Shafi Ullah Khan, for giving me an opportunity to do the research
work in WSNs and providing me all support and guidance which made me complete the
research on time. I am extremely grateful to him for providing such a nice support and
guidance though he had busy schedule managing the office affairs.
I heartily thank our internal research supervisor, Dr. Bilal Shams, Director, Institute of
Information Technology, for his guidance and suggestions throughout my research work.
I owe my profound gratitude to Prof. Dr. Jaime LIoret, who took keen interest in my
research work and guided me all along, till the completion by providing all the necessary
information for developing a good system.
I would not forget to remember Mr. Abdur Rehman, Mr. Roman, Dr. Jawad Ashraf, Dr.
and Dr. Asad Habib, of Institute of Information Technology for their unlisted
encouragement and more over for their timely support and guidance till the completion of
my research work.
I am thankful to and fortunate enough to get constant encouragement, support and
guidance from all teaching staffs of Institute of IT which helped me in successfully
completing my research work. Also, I would like to extend our sincere regards to all the
non-teaching staff of my Institute for their support.
Amjad Mehmood.
No man
succeeds
without a good
woman behind
him. Wife or
mother, if it is
both, he is
twice blessed
indeed.
5
Dedicated to
my
mother
and wife
Summary
PhD Thesis
(2014)
By Amjad Mehmood
Institute of Information Technology, KUST, Kohat, Khyber PakhtunKhwa, Pakistan
integrated
circuit
technologies,
nanotechnology
and
microprocessor
In
this
mechanism the network area is divided into three logical layers with respect to the BS.
The logical partition of the network area helps to bridge the problem of distributing
workload among clusters in the network. Similarly, in order to enhance the performance
of the protocol, it selects the Cluster Head (CH) by acquiring the average residual energy
divided by average hop-count values of the nodes. It derives combined data to BS by
practicing minimum CHs as relay nodes.
In order to demonstrate the overall network lifetime, an experiential inspection has been
conducted in OMNET++. It is an object oriented modular discrete event based simulator
vi
i
having Castalia-3.2 as plug-in for WSN and Body Area Network (BAN). We simulated
different routing protocols, taking into consideration their challenges and the results are
shown. Different results show that EEMDC is more energy-efficient as compared to
other existing conventional protocols, such as Minimum Transmission Energy (MTE),
Direct, Low Energy Adaptive Clustering Hierarchy (LEACH), Low Energy Adaptive
Clustering Hierarchy-Centralized (LEACH-C), A Hybrid, Energy-Efficient, Distributed
Clustering (HEED), and Dynamic Clustering and Distance Aware Routing Protocol
(DDAR).
Contents
PhD Thesis
(2014)
By Amjad Mehmood
Institute of Information Technology, KUST, Kohat, Khyber PakhtunKhwa, Pakistan
ACKNOWLEDGMENT............................................................................................................................IV
SUMMARY................................................................................................................................................. VI
CONTENTS................................................................................................................................................ IX
LIST OF FIGURES.................................................................................................................................. XII
LIST OF TABLES................................................................................................................................... XIV
LIST OF ACRONYMS............................................................................................................................. XV
CHAPTER # 01
INTRODUCTION
1.1 WIRELESS SENSOR NETWORKS............................................................................................................ 1
1.2 RESEARCH OBJECTIVES....................................................................................................................... 4
1.3 OVERVIEW OF THE RESEARCH............................................................................................................. 4
1.4 PROBLEM STATEMENT......................................................................................................................... 6
1.5 ORGANIZATION OF THESIS................................................................................................................... 8
CHAPTER # 02
LITERATURE REVIEW
2.1 INTRODUCTION........................................................................................................................................... 9
2.1.1 Applications of WSN....................................................................................................................... 14
2.2 WSNS ROUTING CHALLENGES COMPARED WITH OTHER WIRELESS NETWORK..................................16
2.3 ROUTING PROTOCOLS CLASSIFICATION............................................................................................. 18
2.3.1 Structure Base Routing Protocols................................................................................................... 21
2.3.2 Protocol Operation based Classification........................................................................................ 31
2.3.3 Sensor Node architecture based Classification...............................................................................39
2.3.4 Packets Destination based Classification......................................................................................40
2.3.5 Source -Destination Recovery based classification.........................................................................43
2.3.6 Cooperative Routing.......................................................................................................................44
2.3.7 Protocols initialization point based classification.........................................................................44
2.3.8 Epidemic behavior based Classification.........................................................................................45
2.3.9 Application based routing protocols Classification.........................................................................46
2.3.10.....................................................................................................K. Sha et al. based Classification
46
2.3.11................................................................................................M. Perillo et al. based Classification
46
2.3.12.................................................................................................................State based Classification
47
2.3.13.................................................................Energy-Efficient Routing Protocols based Classification
48
2.4 DISTINCTIVENESS OF CLUSTER BASED ROUTING PROTOCOLS............................................................61
2. 5 ROUTING CHALLENGES AND DESIGN ISSUES....................................................................................61
2.5.1 Node Placement.............................................................................................................................. 62
2.5.2 Energy Utilization without Losing Precision..................................................................................62
2.5.3 Data Reporting Model....................................................................................................................63
2.5.4 Node/Link Heterogeneity.................................................................................................................63
2.5.5 Fault Tolerance...............................................................................................................................64
2.5.6 Scalability....................................................................................................................................... 64
2.5.7 Network Dynamics..........................................................................................................................65
2.5.8 Transmission Media........................................................................................................................65
2.5.9 Connectivity.................................................................................................................................... 65
1
0
2.5.10.......................................................................................................................................... Coverage
66
2.5.11.............................................................................................................................Data Aggregation
66
2.5.12...................................................................................................................Quality of Service (QoS)
66
2.5.13.................................................................................................................................... Network Cost
67
2.6 COMPARATIVE ANALYSIS.........................................................................................................................67
CHAPTER # 03
ENERGY-EFFICIENT MULTI-LEVEL AND DISTANCE-AWARE
CLUSTERING MECHANISM FOR WSNS
3.1 INTRODUCTION.................................................................................................................................. 85
3.2 EEMDC OPERATION...........................................................................................................................87
3.2.1 DATA TRANSMISSION FROM CLUSTER HEAD TO THE BASE STATION................................93
3.2.2 FLOWCHART OF THE EEMDC OPERATION.............................................................................93
3.3 SIMULATION RESULTS......................................................................................................................99
3.3.1 Network and Radio Model..............................................................................................................99
3.3.2 Simulation Model..........................................................................................................................101
3.3.3 Performance Evaluation...............................................................................................................102
3.4 CONCLUSION..........................................................................................................................................120
CHAPTER # 04
CONCLUSIONS AND FUTURE WORK
4.1 CONCLUSIONS........................................................................................................................................ 122
4.2 FUTURE WORK......................................................................................................................................125
BIBLIOGRAPHY.............................................................................................................................. 126
1
1
List of Figures
Figure 1.1. Workflow of wireless sensor network..............................................................................................1
Figure 1.2. Cluster based strategy for WSNs......................................................................................................3
Figure 1.3. A round in cluster based protocols...................................................................................................4
Figure 2.1.Sensor node components.................................................................................................................10
Figure 2.2. Routing protocols in WSNs............................................................................................................21
Figure 2.3. Single-hop and multi-hop connections to the sink..........................................................................24
Figure 2.4. Categorization of different characteristics of clustering in WSNs..................................................30
Figure2.5. Directed diffusion scenario..............................................................................................................33
Figure 2.6. Directed diffusion: (a) interest propagation, (b) initial gradients set up, and (c) data delivery...34
Figure 2.7. Query plan at a bellwether node: The bellwether node acquires all the understandings,
determines the average and if it is more preponderant than a threshold throw it to the BS..............................35
Figure 2.8. Categorization of routing protocols................................................................................................40
Figure 2.9. Percentage of number of nodes death vs. number of rounds in the area of 50m*50m...................70
Figure 2.10. Percentage of nodes death vs number of rounds in the area of 100m* 100m.............................71
Figure 2.11. Number of rounds over number of nodes alive............................................................................73
Figure 2.12 (a) . Number of rounds against number of data messages received..............................................74
Figure 2.12 (b). Average energy dissipation against number of data messages received.................................75
Figure 2.13. Average energy dissipation over varying network areas..............................................................77
Figure 2.14. Number of nodes alive as a function of network area..................................................................78
Figure 2.15. First node death over the simulation time [seconds]....................................................................79
Figure 2.16. Total 100 nodes: half node die (HND) over the simulation time [seconds].................................80
Figure 2.17. Total 100 nodes: last node die (LND) over simulation time [seconds]........................................81
Figure 2.18. Energy consumed by nodes over simulation time [seconds]........................................................82
Figure 2.19. Number of nodes alive over simulation time [seconds]...............................................................83
Figure 2.20. Energy utilized by nodes over simulation time [seconds]............................................................84
Figure 3.1. LEACH protocol's round details (Adv CH: Advertisement advertise by CH, TDMA Sch:
TDMA Schedule).............................................................................................................................................. 86
Figure 3.2. Message flow in a cluster (FLC)....................................................................................................91
Figure 3.3. EMCDR protocol's logical division in levels (TLC, SLC, FLC)...................................................92
Figure 3.4. Flowchart of EMCDR working......................................................................................................95
Figure 3.5. Calculate hop-count and cluster level.............................................................................................96
Figure 3.6. Sending data to the BS considering minimum hop........................................................................97
Figure 3.7. EEMDCs algorithm: process of clustering in WSNs....................................................................99
Figure 3.8. Total 100 nodes: first node die (FND) over simulation time [seconds].......................................105
Figure 3.9. Total 200 nodes: first node die (FND) over simulation time [seconds].......................................105
xi
i
Figure 3.10. Total 100 nodes half node die (HND) over simulation time [seconds]......................................106
Figure 3.11. Total 200 nodes half node die (HND) over simulation time [seconds]......................................107
Figure 3.12. Total 100 nodes: last node die (LND) over simulation time [seconds]......................................108
Figure 3.13. Total 200 nodes: last node die (LND) over simulation time [seconds].......................................109
Figure 3.14. Energy consumed by nodes over simulation time [seconds]......................................................110
Figure 3.15. Number of nodes alive over simulation time [seconds].............................................................111
Figure 3.16. Percentage of node death vs number of rounds in the area of 50m* 50m..................................113
Figure 3.17. Percentage of node death vs number of rounds in the area of 100m* 100m..............................114
Figure 3.18. Number of rounds over a number of nodes alive........................................................................115
Figure 3.19 (a). Number of rounds over a number of data messages received................................................116
Figure 3.19 (b). Number of rounds over number of data messages received..................................................117
Figure 3.20. Network Area over number of nodes alive..................................................................................118
Figure 3.21. Network area over average energy dissipation............................................................................120
13
LIST OF TABLES
Table 2.1. Applications of WSNs......................................................................................................................16
Table 2.2. Routing protocols classification.......................................................................................................21
Table 2.3. Hierarchical vs. flat topologies routing............................................................................................25
Table 2.4: Energy consumption by nodes as either useful or wasteful source..................................................48
Table 2.5. Summary of the most important features of the routing protocols included in this section.............60
Table 2.6. Simulation parameters for Figure 2.11 and Figure 2.12...................................................................68
Table 2.7. Percentage of node death over network area of 50m *50m and 100m*100m.................................69
Table 3.1. Clustering protocols categorization parameters................................................................................86
Table 3.2. Notation used in the equations.......................................................................................................101
Table 3.3. Network model parameters............................................................................................................102
Table 3.4. Percentage of node death over a network area of 50m *50m and 100m*100m............................112
1
4
List of Acronyms
Wireless Sensor Networks
Energy Efficient Multi Level and Distance Aware Clustering
Base Station
Cluster Head
Analog-to-Digital Converter
Quality of Service
Global Position System
Medium Access Control
Time Division Multiple Access
Mobile Ad hoc Network
Sensor Protocols for Information via Negotiation
Directed Diffusion
Rumor Routing
Stream Enable Routing
Gradient Based Routing
Threshold Sensitive Energy Efficient Sensor Network Protocol
Adaptive Periodic
Constrained Anisotropic Diffusion Routing
Low-Energy Adaptive Cluster Hierarchy
Leach-Centralized
Small Mecn
Geography Adaptive Fidelity
Self-Organization
Hierarchical Periodic Event-Driven and Query-Based
Power Efficient Gathering in Sensor Information System
Hierarchical PEGASIS
Hierarchical Energy Aware Protocol for Routing and Aggregation in Sensor
Networks
Simple Hierarchical Routing Protocol
Minimum Energy Communication Network
Small MECN
Geographic and Energy Aware Routing
Stateless Protocol for Real-Time Communication in Sensor Network
Stateless Non-Deterministic Geographic Forwarding
Single Winner Algorithm
Multi Winner Algorithm
Sensor Nodes
Distance Source Routing
Destination-Sequenced Distance Vector Routing
Ad hoc on Demand Distance Vector Routing
Greedy/ Geographic Forwarding
Face Routing
Attributes
Soft Threshold
Hard Threshold
Court Time
Heterogeneous Heed
Reactive Energy Decision Routing Protocol
Scaling Hierarchical Power-Efficient Routing
Simple Energy-Efficient Routing
Balance Energy-Aware Routing
Dynamic Clustering And Distance Aware Routing Protocol
First Node Death
WSNs
EEMDC
BS
CH
ADC
QoS
GPS
MAC
TDMA
MANET
SPIN
DD
RR
SER
GBR
TEEN
APTEEN
CADR
LEACH
LEACH-C
SMECN
GAF
SOP
HPEQ
PEGASIS
H-PEGASIS
HEAP
SHRP
MECN
SMECN
GEAR
SPEED
SNGF
SWE
MWE
SN
DSR
DSDV
AODV
GF
FR
A
ST
HT
CT
H-HEED
REDRP
SHPER
SEER
BEAR
DDAR
FND
15
LND
HNA
MTS
DECSA
HRP
LEACH
pLEACH
PEACH
HEED
EEHC
CBT
EECS
DDAR
FLC
SLC
TLC
AvgHcv
NdeEnergy
SH ,MH
CM
AvgRE
1
INTRODUCTION
PhD Thesis(2014)
By Amjad Mehmood
Institute of Information Technology, KUST, Kohat, Khyber PakhtunKhwa, Pakistan
BS
Internet and Satellite
Sensor Nodes
Sensor field
The research community has proposed different types of routing protocols to decrease the
energy dissipation, and hence increases the battery life of the network. Intended for
energy efficiency among the nodes in WSNs, researchers proposed different types of
techniques such as tree, chain, grid, density, model, and minimum transmission.
However, it has been observed that cluster based protocols are more energy efficient as
compared to the mentioned techniques [3]. Cluster is defined as the collected works of
nodes into groups. In cluster based methodology, there are three main entities such as
CH, members, and BS. The CH collects data from the members. CHs then send the data
for decision making to BS as shown in figure 1.2.
The disadvantages of cluster based routing protocols are as follow:
There is a need to deploy an optimal number of CHs, otherwise, these protocols act same
as flat based protocols.
Division of nodes into clusters creates latency or delay in the network so it could affect
the throughput of the network.
Overlapping among the clusters should be minimized otherwise, it could also affect the
overall lifetime due to traffic congestion.
Nomination of the CHs could also affect the lifetime if we select the node having
minimum energy in cluster, it will get down sooner.
Clusters near BS consume more energy than the clusters far away, so they should
properly be managed to balance the workload among the clusters.
The size of the clusters does matter in energy consumption.
Intra and inter-clusters distances should also be regarded to save the rate of energy
consumption.
Cluster based routing protocols could be more energy effici nt if we address its
disadvantages.
Member of Cluster
Base Station(BS)
Cluster
Head(CH)
Shows flow of data
Cluster based routing protocol work in rounds. Each round consists of two phases, i.e.
setup and steady phases.
(i)
Setup phase
It is further subdivided into
(a) CH selection
(b) Formation of cluster
(ii)
Steady phase
It is further subdivided into
Round
H SelectionSetup Formation of Cluster
C Sate
Aggregation of DataData
Steady StateCommunication
Setup phase
Stead phase
To divide the whole network into multi-levels to avoid the funneling effect
i.
Each node in WSNs has limited energy, and usually deployed in harsh
environments. Therefore, their energy cant be recharged incase of depletion. This
limited energy is used by the nodes for sensing, processing, and communication.
In comparison the communication process consumes more energy than the others.
Therefore, in order to increase the lifespan of network for sending the data from
sensor nodes to BS, energy-efficient routing protocol is highly demanded by the
environment.
ii.
In a network some nodes perform more tasks than others which could lead to
deplete their energy earlier. Hence, in order to distribute the workload among the
nodes in the network, load-balancing mechanism is required.
iii.
In steady phase, in the multi-hop scenario, the CHs away from BS send their data
using more than one CHs as a relay node. As more CHs are used as relay node, so
it would increase delay as well as minimize the lifetime of the overall network.
Therefore, less numbers of CHs are used as a relay node, in order to maximize the
lifetime and minimize the delay in sending the data from CH to BS.
iv.
v.
Each node in the network has an equal chance to become the CH of the cluster,
but the decision is made on the basis of residual energy of the nodes.
vi.
The distance between the nodes, the CH, and between the CHs and BS is also
considered in order to save the energy of the network. Otherwise it may cause
congestion on the channel which may result in consumption of the energy. Hence
it affects the overall performance of the system.
vii. As the network consists of large numbers of nodes, therefore, keeping the whole
routing table at individual node is difficult, and it also makes use of high
bandwidth during communication. Therefore, clustering technique makes the
routing table localized to the cluster and also makes use of limited bandwidth due
to inter-cluster communication to CHs.
viii. Clustering mechanism helps to achieve scalability factor. It handles large number
of nodes in the network and their associated functions and tasks. Hence it helps to
scale to such a high level to acquire advantage of high density of such network.
ix.
main categories such as flat, and cluster/hierarchical based protocols. Flat based protocols
have following shortcomings:
They produce high data transmission, which may result in network congestion.
Clusters near BS consume more energy as compared to cluster away from BS.
The distances between member nodes and CH and to BS onward also play an
important role in energy dissipation.
As CHs might have redundant data in their ranges which need to be aggregated,
otherwise consume energy due to propagating of redundant data in the network.
The CHs Send the data to BS over the CHs as relay nodes in multi-hop
communication could affect the lifetime of the network.
By considering the above mentioned problems of flat and cluster based protocols, it is
desirable to design an energy-efficient routing protocol. Therefore, we proposed EEMDC
routing protocol which is more energy efficient than the existing protocols. It helps
reduce the energy consumption by dividing the nodes of the network into many small
segments. Moreover, cluster based protocols constraints are addressed in EEMDC by
organizing clusters in multi-level with respect to BS. This can further enhance the
performance, energy load-balancing, scalability and the network- lifetime of the sensor
nodes in the network.
2
LITERATURE REVIEW
PhD Thesis(2014)
By Amjad Mehmood
Institute of Information Technology, KUST, Kohat, Khyber PakhtunKhwa, Pakistan
2.1 Introduction
The distributed nature and dynamic topology of WSNs
requirements in routing protocols that should be met. The most important feature of a
routing protocol, in order to be efficient for WSNs, is the energy consumption and the
extension of the network's lifetime. Many routing, power management, and data
dissemination protocols have been specifically designed for WSNs where energy
awareness is an essential design issue. Routing protocols in WSNs might differ
depending on the application and network architecture. Consequently, the WSNs are
usually application specific. The most important are military, environment- monitoring,
agricultural-activities, industry, healthcare, cardiac, weather monitoring, sleep-apnea,
disaster-recovery, temperature, security, sound, and water applications [3]. With the
advancement in the technology, the nodes in the WSNs become more accurate, reliable,
energy efficient, smaller in size, cheaper in cost, and robust. This technology has already
addressed different types of applications from fortification to support. It is cost-effective,
easy to install, changes with industry needs, and its uses are countless. It comprises of
small nodes with inadequate processing, storing, sensing, bandwidth, and energy (or
battery power) for communication. Each sensor device consists of a microcontroller for
processing, one or more flash memories to keep long-lived data and program-code, for
dynamic data it needs RAM, for communication it needs wireless-transceiver, an analogto-digital converter (ADC), one or more sensors, power source, and an antenna. Consider
the example of MicaZ mote of Crossbow, it has an Atmel Atega microcontroller, 4KB
RAM , 128KB program flash , 512KB flash memory, IEEE 802.15.4 2.4-GHz transceiver
supports 250 KBps maximum, and 50 meters of range, ADC supports 10-bit, and runs
two AA batteries which draw 8 mA in active mode [4].
It has the capability to correspond with each other and drive their info to the sink or put
on the air the data to BS directly. The BS is the place which has no resource constraint
like processing, storing, power supply, and others. Once the data arrives on BS, it moves
the data collected from WSNs to internet, where users take a decision accordingly as
shown in figure 2.1.
BS
Internet/
Satellite
User
P
o
w
er
U
S
e
n
A
D
Mobilizer
Processing
Tr
a
n
sc
ei
Storing
1
0
They are deployed sparsely or densely to the field depending on application requirements
and environment of deployment field. Moreover, nodes are randomly or deterministically
installed. When the nodes are manually mounted then they are normally sparsely
deployed and work under the attended environments, e.g. bridge monitoring, or fire alarm
system. Since nodes are dropped from an airplane or helicopter in disaster affected areas
and work in unattended manner, they get the updates about the area, and make the rescue
squared more equipped about the situations.
In fact, the nodes in WSN have a number of limitations, but energy or battery life is the
most crucial one. Since, nodes are normally planted in the environments which are
unworkable for the user, i.e. battlefield, military surveillance, and moisture tracking,
therefore, recharge or replace of the battery is impossible. Hence, bring into being a huge
issue for network designers, to develop an energy proficient routing protocol for WSNs.
Additionally, sensor nodes are unable to work properly due to their unreliable and
breakable behavior, in order to fix such problem nodes are densely deployed in the
environment. Therefore, all the algorithms and protocols suggested by
research
community are mostly energy efficient to increase the functioning lifetime of the
network.
In the recent past years, a huge number of researches have been done in WSNs, which are
increasing the association, processing, and management of the sensor nodes in the
gathering of data from the environment. Sensor nodes have limited resources. Due to
limitations of the constraints and the installation of a huge number of nodes fabricates a
large number of design, management confronts, and focus to consider the energy
consciousness at all the levels of the protocol stack, e.g. at the network level, it is
considered that how energy-efficiently the data would be collected from the sensor motes
and routing to BS, in order to escalate the lifespan of the network.
By taking into account the inherited characteristics of WSNs, there are many types of
routing protocols which have been suggested by the research community. The directionfinding protocols are categorized into the following three groups:
Network Structure-wise
Protocol Operation-wise
Route Discovery-wise protocols.
While routing protocols under the category of protocol operation categorized as the
following:
Multipath-based
Query-based
QoS-based
Negotiation-based
Coherent-based
Negotiation-based.
In the flat-base routing protocols, each node has the likewise role and responsibility
without any discrimination in acquiring data from the environment, coordinate with each
other, and transferring data to BS. In the cluster based protocols, nodes are collected into
clusters. Each cluster has a CH. Nodes in the cluster, collect data and launch their
information to the CH. CH after getting the data, appends its own data, and throws to BS
straightforwardly (single hop) or using relay CHs (multi hop) in transportation. While in
location-based routing protocol sensor nodes know their position in the network.
Therefore, instead of spreading the data in the entire network they send their data to the
destination directly. The last category of routing protocol is consisting of protocols
supported on the operation that depend upon the procedure used in the protocol. In multipath based routing nodes use multiple paths for sending their data which make the system
reliable and increase the performance of the network. In query-based protocol BS sends
query in the network, the node responsible for sensing and gathering data sends the data
to requested station or BS in response to that query. In QoS-based protocols consider
power capability and quality of the figures in the network. In negotiation-based protocols,
nodes focus on restricting the redundant information to transfer from the nodes to their
neighbors or the BS. In the coherent-based protocol nodes collect data and perform
minimum processing over it, and launch their records to aggregator for additional
processing. Whereas, the last category of routing protocols consists of route discovery
which is sub-divided into reactive, proactive, and hybrid schemes. The proactive routing
practices are also termed as table driven protocols. In these procedures paths are
calculated before the communication takes place between nodes and the sink. In the
reactive protocols paths were established at the time of communication. While in case of
hybrid protocols paths establishment takes place through the amalgamation of proactive
and reactive protocols. In this document, we explore the recent routing protocols as per
their category, in detail, to clear their understanding which in term open new research
directions in the field.
Area
HealthCare
Applicatio
ns
Applications
Examine and take-care of patients [5, 6].
Health industry could save approximately 25$ billion if WSN
is incorporated in health care systems [7].
Sensor for blood pressure, oxygen measurement, blood flow,
respiration rate, Pulse oxy-meter, ECG (electrocardiogram)
[8].
Monitor the people's health condition and location [9].
Health-Gear is Microsoft research product. In the project sensor
nodes are connected to phone via Bluetooth device. It is real
time wearable system for analyzing and monitoring real time
physiological signal [10].
Mobi-Health is European commission funded project, which is
based on mobile health care. It monitors the patients during
health monitoring using GPRS and UMTS networks [11].
Artificial Retina [12].
Military
Applicatio
ns
Emergenc
y
Applicatio
ns
Agricultur
al
Applicatio
ns
Environmen
tal
Applications
Industrial
Applicatio
ns
Invento
ry
Trackin
g
Smart Spaces
Process
Monitori
ng
accordingly [42].
Business Process Modeling Notation (BPMN) it is the
combination of both engine of business working and WSN
[43].
Graphic Workflow Execution Language for Sensor
Network (GWELS) process model helps to understand the
services oriented programming paradigm for sensor
networks, hence makes easy to develop and integrate with
sensor network applications [44].
Table 2.1. Applications of WSNs
In WSN data is more important than who has sent the data( no need of IP)
Flow of data has always been from the sensor nodes to BS, no other way possible like
peer to peer or multi-cast techniques.
Sensor nodes unlike the other networks have limited processing, storing, battery,
therefore, need intensive management of the resources
Nodes remain fixed after deployment, but in some application they are allowed to
move but with very low mobility, while in other network nodes are free to move,
resulting in frequent change in the topologies.
They are application specific, their requirements of design change to the application.
Sensor nodes normally read one phenomenon, therefore, redundant information flow
in the network. So such redundancy filtered out in order to better utilize the
bandwidth channel.
They are normally data-centric networks, in which facts are sensed based on specific
characteristics called as attribute-based addressing.
Nodes in WSN must know their position because on the basis of position information
is collected. In order to get the position,
GPS (Global Positioning System) hardware is not a feasible solution in term of cost,
energy, and physical constraints. There are large numbers of GPS free solutions
suggested by the researchers.
Network Structure
based Classification
Hierarchical or Cluster-based
[48]
i.
Protocol Operation
based Classification
[49]
Sensor Node
architecture based
based routing
i. Protocols work on Flat topology( In the network
all nodes are treated equally called as
homogeneous)
Classification [49]
Packet Destination
based Classification
[50]
Source -Destination
Recovery based
v.Mobile nodes
i. Proactive
ii. Reactive
iii. Hybrid
classification [51,48]
Cooperative Routing [52]
Protocols initialization
point based classification
[48]
Epidemic behavior
based Classification
[53]
Application based routing
protocols Classification
[54]
K. Sha et al
based
Classification[5
5]
M. Perillo et al
i. Resource-Aware Routing
based
Classification[56]
2
0
Energy-Efficient
Protocols for energy
Routingefficiency,
Protocols based
which manage
Classification
the communication
[58]
power plane
Protocols that take decisions on the bases of power maximization objectives.
Protocols that take care of network topology by determining which nodes should
Network Structure
Route Discovery
Flat Based
Reactive Protocol
Hierarchical
Proactive Protocol
Location Based
Protocol Operation
Hybrid Protocols
Coherent Based Routing
QoS Based Routing
ii.
iii.
( a ): Single-Hop
( b ): Multi-Hop
Member of Cluster
Cluster Head(CH)
Sink
Shows flow of data
Hierarchical Routing
Reservation-based scheduling
Flat Routing
Contention-based scheduling
Collisions avoided
that have
The cluster formation method consists centralized, distributed and hybrid. In the
centralized technique, there is a central body which takes the decision of forming clusters
and CHs, in the distributed approach each node runs its own logic to form clusters and
CH, while in hybrid approach combination of both the centralized and distributed
approaches are used to form clusters and CHs.
Clustering process has the following properties for the formation of clusters. These are
the internal features of the clusters structure.
Count Clusters
This feature means to count total number of clusters formed in a round. In some cluster
approaches, selection of CH is done before deployment such formation is called as Fixed
selection, while in others, selection of CH takes place randomly, so it is called as Random
selection of CH.
Size of Cluster
It represents the length or distance of CHs members from the CH. In case the distance is
small, it saves energy dissipation and also reduces the load on the CH. In some cases this
distance is fixed, while in others it keeps on changing i.e. variable.
Density of Cluster
It is described as the proportion of the immense number of nodes in the cluster area and
cluster. The important, confront to diminish the energy burning-up in dense clusters. In
case of fixed clustering normally considers a sparse cluster, while in dynamic cluster, the
density of the cluster is variable.
Count Messages
It counts the total number of messages interchanged during the selection of CH. In case of
more messages exchanged, it consumes more energy. In most of the non-probabilistic
approaches, exchange of messages is required for the selection of CH, and in probabilistic
techniques there is no message exchange.
Stability
If the members of a cluster dont remain fixed, then that cluster is called as adaptive
cluster, otherwise it is called as fixed. The fixed Count of Clusters increases the stability
of a WSN.
It means the communication which is performed in a cluster. It could be single or multihop. In Single-hop also called as Direct Link nodes send their data directly to CH, while
in multi-hop nodes in a cluster uses relay nodes to send their data to CH see figure 2.6.
It indicates the communication between the CH/nodes and BS. If a CH doesnt have the
range to send the data to BS, then the cluster strategies make sure through intermediate
condition to route the data to BS.
CH- Potentials
Node Type
There are different types of nodes some are defined as CH before their deployment
because they have more energy at the beginning than the member nodes in a cluster,
while other CHs have the same energy as member nodes in a cluster.
CH Mobility
Some CHs are Mobile while others are Stationary. The Mobile CH changes its location
where there is a need to balance the workload, and hence helps to achieve the best
performance. In case of Static CH which remains in its place once deployed, so the
workload is divided among all the members of the CH, in order to achieve the
performance.
Role of CH
CH Selection
Probabilistic Based
CH is selected on the basis of probabilistic based techniques. In this technique each node
has predefined probabilistic approach to determine the initial CHs.
Non-Probabilistic Based
Formation of Cluster
The formation of CH takes place such that CH broadcasts the packet to their neighbors,
which comes under its radio range. After receiving the packet nodes acknowledge to the
CH, and hence cluster is formed. In case of single hop nodes forward their data to the CH
directly, although in multi-hop nodes transmit through neighbor nodes. In the figure 3
cluster based protocols parameters have been classified.
Characteristics of Clustering
Cluster
Formation Method
Centralized
Cluster Formation
Cluster
Formation
Properties
Properties
CH- Potentials
CH- Potentials
Count Clusters
Size of Cluster
Distribute
Density of Cluster
Hybrid
Node Type
CH Mobility
CH Selection
CH Selection
Formation of
Formation of
Cluster
Cluster
Probabilistic Based
Non-Probabilistic Based
Non-Probabilistic
Single-hop
Multi-hop
Role of CH
Count Messages
Stability
Intra cluster communication Inter cluster
iii.
disseminated to various targets. Moreover, multicast protocols have the benefit that they
have the knowledge of the sites of the motes which therefore minimize the consumption
of resource by dropping redundant links. In most location based protocols the location
message is exercised to determine the space linking the nodes to deduce the power
utilization. Since nodes are spatially organized in an area, and have no such scheme of
addressing like IP in regular networks. So the data are transmitted to all the motes that
stay alive in a specific geographic area. This approach, of access is called as geo-casting,
i.e. to diffuse query to certain region instead of flooding the whole network. This
technique saves both the energy as well as bandwidth of the channel which increase the
overall performance of the network. Once the packet arrives at the target, it could either
be disseminated to all the sensor nodes within the region which is called as multi-cast, or
transmits the packet to at least one node in the network, which is also called as any-cast.
As compared to other routing protocols, location based protocols want only the
geographic awareness and therefore not necessary to hold the routing table information
and also do not require to set up the back-to-back paths connecting senders and receivers,
hence avoid the requirement of administering message. Illustrations of location supported
routing procedures are Geographic Adaptive Fidelity (GAF), Minimum Energy
Communication Network (MECN), Geographic and Energy Aware Routing (GEAR), and
Small MECN (SMECN).