SlideShare une entreprise Scribd logo
1  sur  5
A Collaborative Wireless Sensor Network Routing
         Scheme for Reducing Energy Wastage
                                  Alan W. F. Boyd, Dharini Balasubramaniam, Alan Dearle
                       School of Computer Science, University of St Andrews, Fife, KY16 9SX, Scotland
                                      Email: {alanb, dharini, al}@cs.st-andrews.ac.uk


Abstract— A Wireless Sensor Network (WSN) is a network of                         indicates that those nodes can communicate with each other.
battery-powered nodes in which data is routed from sources to                     For convenience, we have temporarily assumed that
sinks. Each node consumes energy in order to transmit or receive                  communication is bidirectional.
on its radio. Consequently, an intermediate node that is used by
multiple sources will quickly expire. If some sources are unable
                                                                                     Within the network, it is obvious that certain nodes are
to route without the presence of that node, any remaining energy                  more important to maintaining (source, sink) connectivity than
they have is wasted. We present a new routing scheme known as                     others. For example, the loss of sink Z renders the network
node reliance, which rates the degree to which nodes are relied                   useless. The loss of node C makes source A useless, but
upon in routing. The use of node reliance reduces the contention                  allows source D to continue operating. Finally, the loss of
for intermediate nodes, permitting sources to route to sinks for                  node E or H has no effect.
longer and thus maximising the useful lifetime of the network.

    Keywords- collaborative work, energy management, routing,
sensor networks


                      I.         INTRODUCTION
   A Wireless Sensor Network (WSN) may be described as a
network of small, autonomous, battery-powered nodes. Data is
generated using sensors on source nodes and routed (possibly
through multiple hops) to a sink, which typically lacks energy
constraints. If sources do not coordinate their routes to sinks, it
is possible that one or more nodes may be exhausted due to
                                                                                         Fig. 1: An example network containing two sources and one sink
overuse and the network may be partitioned. When this
occurs, the energy in sources that are disconnected from sinks
                                                                                     In a non-collaborative routing scheme, each source
is wasted, since they have no means to route data.
                                                                                  determines the optimal path for routing to a sink. For example,
   We propose a novel routing scheme known as node
                                                                                  the optimal routes to the sink might be ACZ from source A
reliance, in which each node is weighted according to how
                                                                                  and DCZ from source D. However, both of these routes
much it is relied upon in routing. Sources then devise routes to
                                                                                  require the use of node C, a node that is essential for the
sinks using as few highly weighted nodes as possible.
                                                                                  operation of source A.
   The remainder of this paper is organised as follows: Section
                                                                                     A collaborative scheme may require source D to use the
II discusses the problem to be solved. Section III provides a
                                                                                  non-optimal route DFGZ, thus reducing the energy
review of the current WSN literature relating to the problem.
                                                                                  expenditure of node C. Our scheme is collaborative in that
The node reliance scheme is presented in Section IV. Section
                                                                                  sources determine routes based on a holistic view of the
V shows how node reliance might be calculated using an
                                                                                  network avoiding the use of nodes upon which others rely.
example. Considerations for a protocol based on node reliance
and consequences of a realistic physical layer are discussed in
                                                                                                        III.         RELATED WORK
Section VI. Section VII presents the results of an experimental
comparison between protocols using node reliance and other                           A number of routing schemes have been proposed that
routing schemes, including load balancing. Finally,                               attempt to maximise the efficacy of WSNs. Although many
conclusions and further work are discussed in Section VIII.                       schemes are derived from a combination of others, they can be
                                                                                  loosely grouped into the categories of minimum hop routing,
                II.         PROBLEM STATEMENT                                     minimum energy routing, load balancing routing and potential
                                                                                  based routing, discussed below.
  Consider the network shown in Fig. 1. It consists of nine
nodes (A-H and Z) of which two nodes are sources (A and D)
and one node is a sink (Z). An edge between two nodes




                                                      978-1-4244-6826-3/10/$26.00 ©2010 IEEE
            Authorized licensed use limited to: Bharat University. Downloaded on July 23,2010 at 08:14:37 UTC from IEEE Xplore. Restrictions apply.
A.      Minimum hop routing                                                    therefore returns the minimum hop path of least energy.
   Minimum hop routing selects a path based on the minimum                          Although MLRP assumes bidirectionality, the proposal of
number of hops necessary to reach a sink. The oldest                             using an incremental transmission power can be applied to
minimum hop routing protocol is DSDV [1], later superseded                       virtually any other routing protocol. However, MLRP
by AODV [2] which forms routes on demand rather than                             encourages the global use of nodes with low transmission
proactively. Both protocols operate similarly. A route request                   energies. For example, if the transmission cost of C to Z in
(RREQ) message, containing a sequence number, the source                         Fig. 1 is small then the use of node C is encouraged, even
from which the message originated and the number of nodes                        though its loss would disconnect source A. It could be argued
through which the message has travelled, is flooded through                      that since C’s transmission power is low, it will take much
the network. Eventually, some node that has a path to the                        longer to expire. However node C may only be fractionally
destination or is the destination receives the message, and that                 cheaper than some alternative. Furthermore if every source
node responds with a route reply (RREP), which is routed                         routes through node C, it may still expire very quickly.
back through the network. Each node forwards the RREP to                           C.      Load balancing routing
the node from which it received the original RREQ. Since
                                                                                    Load balancing routing distributes the routing workload
each RREP message is required to travel the same path as the
                                                                                 across as many nodes as possible, even if the paths chosen by
corresponding RREQ, but in the reverse, AODV and DSDV
                                                                                 sources are not optimal with respect to the energy
both require bidirectional edges.
                                                                                 consumption.
   In DSR [3], all RREQ messages contain the sequence of
                                                                                    The MREP [10] (also known as Max-min) routing protocol
nodes through which they have travelled. The RREP is
                                                                                 works by selecting the path whose node of least remaining
encapsulated in its own RREQ so that a path can be
                                                                                 energy is the greatest (the maximum minimum element). In
discovered from the sink back to the source, and contains the
                                                                                 MREP, the cost of a node is inversely proportional to the
sequence of nodes from the RREQ originating from the
                                                                                 remaining energy of that node and the lowest
source. Since the RREP is flooded, there is no requirement for
                                                                                 lexicographically ordered path is used. Lexicographically
edges to be bidirectional. Therefore, route discovery requires
                                                                                 comparing two paths P and Q involves an examination of the
two floods per (source, sink) pair. RREQs and RREPs must
                                                                                 highest cost node on each path. The path whose highest cost
also carry a sequence of node identities rather than a simple
                                                                                 node has the lowest cost has the lowest lexicographic order. If
hop count. These two features combine to limit the scalability
                                                                                 the nodes are of equal cost, the next highest cost nodes are
of protocols such as DSR.
                                                                                 examined, and so on.
   In [4-7] it has been suggested that minimum hop routing is
                                                                                    Load balancing routing suffers from two disadvantages.
prone to a number of disadvantages. Firstly, minimising the
                                                                                 Firstly, it is difficult to determine the remaining energy on
number of hops encouraged the use of nodes that are
                                                                                 each node. Secondly, distributing the routing workload might
geographically distant [4]. Since energy expenditure is argued
                                                                                 cause additional energy expenditure.
to be proportional to either the second [5] or fourth power [8]
                                                                                    In order to provide an accurate approximation to the amount
of the distance, long hops either require more energy or are
                                                                                 of energy stored in a node, Lin [11] proposes representing the
less reliable for a fixed amount of energy. Secondly, it has
                                                                                 energy of nodes using discrete energy levels. Using this
been suggested that the use of minimum hop routing (and
                                                                                 technique, a four-level logarithmic scale is proposed with level
more generally shortest path routing of which minimal hop is
                                                                                 0 corresponding to full energy, level 1 between half and full
an example) causes a subset of nodes to expire more quickly
                                                                                 energy, level 2 between quarter and half energy, and level 3
[6, 7], potentially disconnecting sources from sinks. For
                                                                                 between one eighth and zero energy. Whilst this reduces the
example, in Fig. 1, the use of the minimum hop routes from A
                                                                                 overhead associated with load balancing, routes are required to
and D (ACZ and DCZ) would cause C to expire quickly, and
                                                                                 be recalculated when any node changes its energy level.
disconnect A from Z.
                                                                                    Load balancing typically puts off the time until first node
  B.      Minimum energy routing                                                 expiration by distributing workload. However, this approach
   Since there is a polynomial relationship between the energy                   does not necessarily reduce the wastage of energy of sources
required for transmission and the transmission distance, a                       since it may be to the detriment of the entire network’s energy.
longer sequence of small hops may require less energy than a                       D.     Potential based routing
short sequence of long hops. Minimum energy routing seeks
                                                                                    PMRP [12] aims to limit the path maintenance overhead on
to use (source, sink) paths of least energy expenditure.
                                                                                 node failure. Each node carries a score initially based on its
   In MLRP [9], when an RREQ message is sent from a
                                                                                 distance (in hops) from a sink. Data is always routed to the
source, it specifies a minimum transmission power that must
                                                                                 neighbour with the lowest score. If such a node cannot be
be used. Any node receiving an RREQ retransmits it at the
                                                                                 found, for example after a failure, a widening search is
power specified in the message. After some period of time, if
                                                                                 conducted for a node of lower score. When such a node is
the source has not received an RREP, it increases the
                                                                                 found, the scores of nodes on the path to the discovered node
transmission energy and resends the RREQ. The protocol




           Authorized licensed use limited to: Bharat University. Downloaded on July 23,2010 at 08:14:37 UTC from IEEE Xplore. Restrictions apply.
are lowered. Adjusting the scores in this manner ensures that                    necessary to determine the cost of each available path in order
other routes to the sink are not disrupted and allows new paths                  to establish the optimal one. The results (Section VII) indicate
to be formed using only a subset of local nodes. Unlike our                      that shortest path routing maximises (source, sink)
proposed routing scheme, PMRP does not actively encourage                        connectivity. Thus, the optimal path is the one where the sum
lifetime extension or the preservation of particular nodes.                      of reliance costs of nodes is the least.
                                                                                    As discussed in Section III, shortest path routing causes a
                  IV.          NODE RELIANCE                                     subset of nodes in the network to be overused and quickly
   None of the routing schemes examined in Section III are                       disconnected from the network. However, these concerns do
suitable for minimising the energy wastage of source nodes.                      not apply when node reliance is used, since the cost of a node
We therefore introduce a new means of costing nodes known                        is inversely proportional to the number of paths on which it
as node reliance and demonstrate how it may be applied to                        lies. Consequently, it is unlikely that the cheapest nodes can
form routes that minimise energy wastage at sources.                             be overused. Even if overused, they will be of little
   The premise of node reliance routing is that each node is                     importance in routing by definition.
assigned a weighting, which gives an indication of how much
that node is relied upon in routing from sources to sinks. A                                                V.          EXAMPLE
node that is greatly relied upon should be avoided where                         To illustrate the approach, we use the network shown in Fig.
possible, whereas a node that is not relied upon can be used                     1. The pair (A, Z) has one simplest path (ACZ). Consequently,
freely. Each source may rely on a particular node to a different                 all three nodes, A, C and Z have a relative reliance of 1.0 to
degree. Any model of node reliance must be able to                               the pair (A, Z). The pair (D, Z) has two simplest paths (DCZ
distinguish between how relied upon a node is to a particular                    and DFGZ). Thus, nodes C, F and G each have a relative
source and in the context of the entire network. To distinguish                  reliance of 0.5 to the pair (D, Z) and D and Z have a relative
between these concepts, we make the following definitions:                       reliance of 1.0 to (D, Z). Nodes that do not lie on any simplest
   • The relative reliance of a node B to a (source, sink)                       path between a (source, sink) pair have a relative reliance of 0.
        pair (A, Z) is the degree to which node B is relied upon                 A node’s absolute reliance is equal to the mean of its relative
        in routing data from A to Z.                                             reliances. For example, node D has a relative reliance of 0 to
   • The absolute reliance of a node B is the degree to                          (A, Z) and a relative reliance of 1 to (D, Z), giving it an
        which node B is relied upon in the entire network.                       absolute reliance of 0.5. The reliance values for the nodes
   Several models may be used to express node reliance. In                       shown in Fig. 1 are shown in Table I.
this paper, we present the simplest paths model. A simplest                                                      TABLE I
                                                                                             RELATIVE AND ABSOLUTE NODE RELIANCE VALUES
path is a sequence of nodes from a source to a sink such that it
                                                                                                      Relative          Relative
is not possible to construct another path between the same                                                                           Absolute
                                                                                        Node         reliance to      reliance to
                                                                                                                                      reliance
(source, sink) pair by removing nodes. For example, in Fig. 1,                                         (A, Z)            (D, Z)
the pair (A, Z) has one simplest path: ACZ and (D, Z) has two:                           A               1.00             0.00          0.50
                                                                                         B               0.00             0.00          0.00
DCZ and DFGZ. The path ABCZ is not a simplest path,
                                                                                         C               1.00             0.50          0.75
because it is possible to remove node B to form the path ACZ.                            D               0.00             1.00          0.50
Our model considers the set of simplest paths between each                               E               0.00             0.00          0.00
(source, sink) pair. A given (source, sink) pair may have                                F               0.00             0.50          0.25
multiple simplest paths associated with it. In the simplest                              G               0.00             0.50          0.25
paths model, a path may never contain more than one sink.                                H               0.00             0.00          0.00
Consequently, the set of paths under consideration is actually                           Z               1.00             1.00          1.00
the set of single-sink, simplest paths.                                             Visual inspection reveals the absolute and relative reliance
   The relative reliance, of a node B to a (source, sink) pair                   values follow intuition. The most valuable node is sink Z
(A, Z) is the proportion of simplest paths between A and Z on                    whose loss would cause the entire network to fail (if the
which node B lies. If node B is a bottleneck, then it lies on all                network had multiple sinks, then this value would be lower).
paths between A and Z and its relative reliance is 1. If node B                  The next highest reliance value node is C. Node C is a
does not lie on any simplest paths, then it is unused in routing,                bottleneck to source A and therefore if C were to expire, A
and it has a relative node reliance of 0. The absolute reliance                  would be disconnected from the network. Furthermore, the
of a node under this model is the average of relative reliance                   loss of node C causes half D’s (source, sink) paths to become
across all pairs for which there is at least one path. The set of                unusable. Thus, node C is given a high absolute value. The
simplest paths is considered in calculating node reliance since                  loss of a source node yields that node unusable and
it contains all routes from a source to a sink that have no                      consequently the source nodes have the next highest reliance
superfluous nodes. The loss of such nodes does not prevent                       value. Although not relevant in this network, where no
sources from routing to sinks.                                                   simplest path contains both sources, it is important to consider
   Once reliance values have been assigned to nodes, it is                       the reliance values of sources, since it may be beneficial to the




           Authorized licensed use limited to: Bharat University. Downloaded on July 23,2010 at 08:14:37 UTC from IEEE Xplore. Restrictions apply.
entire network for one source to route through another. Of the                   process involves one flood per source to find paths to the
remaining nodes, F and G have a low reliance because they                        sink(s) and one flood per sink to discover path to the
are unused by source A and appear on only half the simplest                      source(s). Furthermore, each message must contain a partially
paths of source D. Finally, nodes B, E and H are all unused.                     constructed path to the destination and similarly the RREP
There is no simplest path from any source to any sink that uses                  message must additionally contain the (source, sink) path.
any of these nodes. Thus, their reliance value is 0 and their                    However, it may be argued that any routing protocol that can
loss has no impact on (source, sink) connectivity.                               exploit unidirectional links has lower efficacy than one that
   In general, having assigned reliance values to nodes, it is                   assumes bidirectionality.
possible to determine which path is the cheapest for each
                                                                                   B.      Realistic physical layer
source. It is only necessary to consider the set of simplest
paths; any non-simplest path contains nodes that are                                In a physical WSN deployment, it may be difficult to define
unnecessary, and thus, a path of lower cost must exist.                          when two nodes are connected. In reality, a node B receives a
   The only simplest path from source A to sink Z is ACZ. Its                    transmission from a node A based on some probability P
cost is calculated by adding the node reliance values of A, C                    which is dependent upon the distance between A and B, the
and Z to give a total of 2.25 (0.50 + 0.75 + 1.00). There are                    power with which the transmission is sent, the sensitivity of
two paths from source D to Z, DFGZ and DCZ. The cost of                          the receiver and the local noise which includes other radio
DFGZ is the sum of the costs of D, F, G and Z, which gives                       transmissions. The probability of radio reception may also be
2.00 (0.50 + 0.25 + 0.25 + 1.00). The cost of DCZ is the sum                     dependent on factors that change over time. For example, poor
of the costs of D, C and Z, which gives 2.25 (0.50 + 0.75 +                      weather or obstacles moving between the nodes may cause the
1.00). Thus, the optimal routes are ACZ and DFGZ. Assuming                       reception probability to drop. To address the problem of
the sink has a sufficient energy to receive every message                        deciding when two nodes are connected, Stojmenovic [13]
generated at the source nodes and assuming that every                            provides a number of potential solutions. The simplest of these
message sent from sources to sinks consumes the same                             is for each node to make a number of attempts to communicate
amount of energy on each node then both sources will expire                      with potential neighbours. The nodes that are reliably
simultaneously and no energy will be wasted at any source.                       discovered some proportion of times are considered to be
                                                                                 directly connected. It is possible that some nodes capable of
                    VI.           DISCUSSION                                     receiving transmissions may not be included in this list.
                                                                                 However, those nodes are unlikely to be reliable and so it may
   In this section we discuss node reliance and its implications
                                                                                 be argued that it is undesirable to use them.
for routing protocols. We also examine the significance of
realistic physical layers in which communications may be                           C.     Alternative node reliance models
unreliable and alternatives to the simplest paths model.                            Sometimes the use of a node is predetermined by some
  A.      Node reliance routing protocol                                         earlier routing decision. For example, in Fig. 1, the use of
                                                                                 node F always requires use of node G, which has no impact on
   This paper has described a new routing scheme. We now
                                                                                 the path selection or the attribution of node reliance values.
consider how this scheme may be converted into a routing
                                                                                 Where the use of such nodes is deterministic, it is possible to
protocol. The node reliance routing scheme only requires
                                                                                 contract the network such that the two nodes are combined
knowledge of the network topology. However, since the full
                                                                                 into a single virtual supernode. It is hypothesised that by
set of paths between all sources and sinks in the network must
                                                                                 considering this smaller set of nodes, the accuracy of node
be known, it is necessary to have a view of the entire network.
                                                                                 reliance values may be improved.
Preliminary experiments have indicated that the most suitable
                                                                                    A final consideration is in message overhearing. Since
means of gathering the network topology is by link state
                                                                                 radios do not usually have the ability to unicast, a node may
advertisement (LSA), i.e. each node shares its set of
                                                                                 expend energy receiving a message and decoding it before
neighbours with all other nodes in the network. The growth
                                                                                 determining that it was not the intended recipient. Taking
rate of such an operation is O(n2) where n represents the
                                                                                 overhearing into account when calculating a node’s reliance
number of nodes in the network.
                                                                                 value may improve the accuracy of node reliance values
   Although this growth rate is high, the use of LSA has a
                                                                                 appreciably and further reduce the energy wasted by sources.
number of advantages. Firstly, the cost of LSA does not
                                                                                    In such a scheme, a node’s reliance is composed from two
increase as a result of increasing the proportion of sources
                                                                                 components: the pure reliance values as described earlier and
since each node has a view of the network. Secondly, non-
                                                                                 an inherited component from the node’s neighbours. The
LSA routing protocols often deal poorly with unidirectional
                                                                                 inherited component is derived from the sum of the pure
links. A common tactic is to assume that every edge is
                                                                                 reliance values of those neighbours from which a node
bidirectional. However, this may result in the selection of an
                                                                                 overhears messages. The intuition is that a well-connected
unusable path, causing the routing protocol to fail. Another
                                                                                 node will overhear many messages and will consequently have
solution is to carry out forward and backward path discovery
                                                                                 a high reliance value reflecting the additional energy
in the same way as DSR (discussed in Section III.A). Such a




           Authorized licensed use limited to: Bharat University. Downloaded on July 23,2010 at 08:14:37 UTC from IEEE Xplore. Restrictions apply.
expenditure used as a consequence of overhearing.                                   upon for routing. By firstly using those nodes that are least
                                                                                    relied upon, it is theorised that sources will naturally choose
                          VII.          RESULTS                                     paths that either have minimal conflict or whose expiration has
   The Castalia 1.3 simulator was used to compare the efficacy                      the least effect on the network.
of the node reliance routing scheme with other well-known                              Possible further work includes merging features from other
protocols. Networks of 2, 5, 10, 20 and 40 nodes were placed                        routing protocols. For example, by additionally considering
in triangular, square, hexagonal and random shaped                                  load balancing, a routing protocol could encourage the use of
deployments. For each network, sources and sinks were                               nodes with low reliance or with high remaining energy. One
randomly selected and each experiment was repeated 30 times                         might also consider combining node reliance with a clustering
using different random seeds and different sources and sinks.                       protocol such as LEACH [5]. Since clusters are independent,
The simulated application caused each source to generate a                          node reliance values for a cluster would only require the
randomly sized piece of data (between 2 and 100 bytes) every                        topology of that cluster rather than the entire network. Thus,
five seconds and route it to a sink. For each routing protocol,                     the scalability of the routing protocol could be improved.
the normalised total data transfer and connectivity weighted                           Finally, we intend to evaluate the reliance model discussed
transfer (CWT) [14] were calculated. CWT is the product of                          in Section VI.C, in which message overhearing is taken into
transferred data and the number of different sources that                           account when calculating a node’s reliance value.
provided the data, raised to some power (2 in these
experiments). It therefore represents the degree to which                                                           REFERENCES
sources remain connected to sinks and is thus representative of                     [1]        C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination-
                                                                                    Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," ACM
well-spent energy.                                                                  SIGCOMM Computer Communication Review, vol. 24, pp. 234-244, 1994.
                                   TABLE II                                         [2]        C. E. Perkins and E. M. Royer, "Ad-hoc On-Demand Distance
                   COMPARISON OF ROUTING PROTOCOLS
                                                                                    Vector Routing," in Proceedings of the Second IEEE Workshop on Mobile
              Topology                                                              Computer Systems and Applications, New Orleans, USA, 1999, pp. 90-100.
 Heuristic                       Ordering           CWT            Transfer
              Gathering                                                             [3]        D. B. Johnson, et al., "DSR: The Dynamic Source Routing
   Load         LSA               Shortest      0.988±0.000     0.983±0.000         Protocol for Multi-Hop Wireless Ad Hoc Networks," in Ad-Hoc Networking,
Balance [8]                                                                         C. E. Perkins, Ed., ed: Addison-Wesley, 2000, pp. 139-172.
Contracted      LSA               Shortest      0.985±0.000     0.986±0.000         [4]        A. Woo, et al., "Taming the Underlying Challenges of Reliable
                                                                                    Multihop Routing in Sensor Networks," in Los Angeles, California, USA,
 Simplest       LSA               Shortest      0.984±0.000     0.985±0.000         Conference On Embedded Networked Sensor Systems, 2003, pp. 14-27.
                                                                                    [5]        W. R. Heinzelman, et al., "Energy-Efficient Communication
 Min Hop        LSA               Shortest      0.972±0.000     0.983±0.000         Protocol for Wireless Microsensor Networks," in 33rd International
                                                                                    Conference on System Sciences, Hawaii, USA, 2000, pp. 8020-8029.
   Load         DSR               Shortest      0.961±0.000     0.961±0.000
                                                                                    [6]        H. Dai and R. Han, "A Node-Centric Load Balancing Algorithm
Balance [8]
                                                                                    for Wireless Sensor Networks," in IEEE GLOBECOM - Wireless
Contracted      LSA          Lexicographic      0.956±0.001     0.972±0.001         Communications, San Francisco, USA, 2003, pp. 548 - 552.
 Simplest       LSA          Lexicographic      0.954±0.001     0.971±0.001         [7]        S. Singh, et al., "Power-Aware Routing in Mobile Ad Hoc
                                                                                    Networks," in Mobile Computing and Networking, Dallas, Texas, United
                                                                                    States, 1998, pp. 181-190.
                                                                                    [8]        G. J. Pottie and W. J. Kaiser, "Wireless Integrated Network
   The results show that load balancing is slightly better than                     Sensors," Communications of the ACM, vol. 43, pp. 51-58, 2000.
the node reliance approach described here (with a very small                        [9]        B. Zhang and H. T. Mouftah, "Energy-aware on-demand routing
margin). The node reliance approach achieves higher transfer                        protocols for wireless ad hoc networks," Wireless Networks, vol. 12, pp. 481-
                                                                                    494, 2006.
again, with a small margin.                                                         [10]       J.-H. Chang and L. Tassiulas, "Routing for Maximum System
   We postulate that with the addition of the overhearing                           Lifetime in Wireless Ad-hoc Networks," in 37th Annual Allerton Conference
compensation, reflecting real–world conditions, described in                        on Communication, Control and Computing, Monticello, IL, 1999.
                                                                                    [11]       L. Lin, et al., "Asymptotically Optimal Power-Aware Routing for
Section VI.C, that this protocol may prove to be superior.                          Multihop Wireless Networks with Renewable Energy Sources," in 24th Joint
                                                                                    Annual Conference of the IEEE Computer and Communications Societies,
      VIII.           CONCLUSIONS AND FURTHER WORK                                  Miami, FL, USA, 2005, pp. 1262 - 1272.
                                                                                    [12]       D. Y. Kwon, et al., "A Potential Based Routing Protocol for
   This paper has examined mechanisms for reducing the                              Mobile Ad Hoc Networks," presented at the 11th IEEE International
wastage of energy on source nodes in a WSN when routing                             Conference on High Performance Computing and Communications, Seoul,
data from sources to sinks. Common routing protocol                                 Korea, 2009.
                                                                                    [13]       I. Stojmenovic, et al., "Design Guidelines for Routing Protocols in
approaches such as minimum hop routing, minimum energy                              Ad Hoc and Sensor Networks with a Realistic Physical Layer," IEEE
routing and load balancing routing were argued to be                                Communications Magazine (Ad Hoc and Sensor Networks Series), vol. 43,
problematic and may not be capable of resolving the problem.                        pp. 101-106, 2005.
                                                                                    [14]       A. W. F. Boyd, et al., "On the Selection of Connectivity-based
   A new collaborative routing scheme known as node                                 Metrics for WSNs using a Classification of Application Behaviour," in IEEE
reliance was introduced. Rather than having each source                             International Conference on Sensor Networks, Ubiquitous, and Trustworthy
dynamically negotiate which path to use, node reliance assigns                      Computing, Newporn Beach, California, USA (accepted for publication).
a score to each node based on the degree for which it is relied




              Authorized licensed use limited to: Bharat University. Downloaded on July 23,2010 at 08:14:37 UTC from IEEE Xplore. Restrictions apply.

Contenu connexe

Tendances

Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on bufferingenioustech
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...IJASCSE
 
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...IJCNCJournal
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
 
A comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsA comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsIOSR Journals
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingM H
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...IJERA Editor
 
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...ijwmn
 
Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicastingingenioustech
 
Fuessler wkmh03
Fuessler wkmh03Fuessler wkmh03
Fuessler wkmh03hinalala
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]ingenioustech
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocolchirag bhatt
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
 

Tendances (19)

Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on buffer
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
 
Ly2520762079
Ly2520762079Ly2520762079
Ly2520762079
 
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
 
1004.0152v1
1004.0152v11004.0152v1
1004.0152v1
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
 
A comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsA comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETs
 
Lecture5c
Lecture5cLecture5c
Lecture5c
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
 
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
 
Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicasting
 
Fuessler wkmh03
Fuessler wkmh03Fuessler wkmh03
Fuessler wkmh03
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
 
Fa25939942
Fa25939942Fa25939942
Fa25939942
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocol
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation in
 

Similaire à A collaborative wireless sensor network routing

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...ijafrc
 
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTING
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTINGA NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTING
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTINGKhushbooGupta145
 
K dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networksK dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networksijwmn
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETSHAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETScscpconf
 
Haqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetsHaqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetscsandit
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKScscpconf
 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networkscsandit
 
Gateway based stable election
Gateway based stable electionGateway based stable election
Gateway based stable electionijmnct
 
Review on variants of Power Aware AODV
Review on variants of Power Aware AODVReview on variants of Power Aware AODV
Review on variants of Power Aware AODVijsrd.com
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 

Similaire à A collaborative wireless sensor network routing (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
 
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTING
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTINGA NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTING
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTING
 
K dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networksK dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networks
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETSHAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
HAQR: THE HIERARCHICAL ANT BASED QOS AWARE ON-DEMAND ROUTING FOR MANETS
 
Haqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetsHaqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manets
 
Fo2510211029
Fo2510211029Fo2510211029
Fo2510211029
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networks
 
Gateway based stable election
Gateway based stable electionGateway based stable election
Gateway based stable election
 
10.1.1.61.7321
10.1.1.61.732110.1.1.61.7321
10.1.1.61.7321
 
10.1.1.61.7321
10.1.1.61.732110.1.1.61.7321
10.1.1.61.7321
 
Review on variants of Power Aware AODV
Review on variants of Power Aware AODVReview on variants of Power Aware AODV
Review on variants of Power Aware AODV
 
9517cnc06
9517cnc069517cnc06
9517cnc06
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
87
8787
87
 

Plus de ambitlick

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...ambitlick
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsambitlick
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013ambitlick
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocationambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2 ambitlick
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portalambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...ambitlick
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministicambitlick
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...ambitlick
 

Plus de ambitlick (20)

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projects
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 

Dernier

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Dernier (20)

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

A collaborative wireless sensor network routing

  • 1. A Collaborative Wireless Sensor Network Routing Scheme for Reducing Energy Wastage Alan W. F. Boyd, Dharini Balasubramaniam, Alan Dearle School of Computer Science, University of St Andrews, Fife, KY16 9SX, Scotland Email: {alanb, dharini, al}@cs.st-andrews.ac.uk Abstract— A Wireless Sensor Network (WSN) is a network of indicates that those nodes can communicate with each other. battery-powered nodes in which data is routed from sources to For convenience, we have temporarily assumed that sinks. Each node consumes energy in order to transmit or receive communication is bidirectional. on its radio. Consequently, an intermediate node that is used by multiple sources will quickly expire. If some sources are unable Within the network, it is obvious that certain nodes are to route without the presence of that node, any remaining energy more important to maintaining (source, sink) connectivity than they have is wasted. We present a new routing scheme known as others. For example, the loss of sink Z renders the network node reliance, which rates the degree to which nodes are relied useless. The loss of node C makes source A useless, but upon in routing. The use of node reliance reduces the contention allows source D to continue operating. Finally, the loss of for intermediate nodes, permitting sources to route to sinks for node E or H has no effect. longer and thus maximising the useful lifetime of the network. Keywords- collaborative work, energy management, routing, sensor networks I. INTRODUCTION A Wireless Sensor Network (WSN) may be described as a network of small, autonomous, battery-powered nodes. Data is generated using sensors on source nodes and routed (possibly through multiple hops) to a sink, which typically lacks energy constraints. If sources do not coordinate their routes to sinks, it is possible that one or more nodes may be exhausted due to Fig. 1: An example network containing two sources and one sink overuse and the network may be partitioned. When this occurs, the energy in sources that are disconnected from sinks In a non-collaborative routing scheme, each source is wasted, since they have no means to route data. determines the optimal path for routing to a sink. For example, We propose a novel routing scheme known as node the optimal routes to the sink might be ACZ from source A reliance, in which each node is weighted according to how and DCZ from source D. However, both of these routes much it is relied upon in routing. Sources then devise routes to require the use of node C, a node that is essential for the sinks using as few highly weighted nodes as possible. operation of source A. The remainder of this paper is organised as follows: Section A collaborative scheme may require source D to use the II discusses the problem to be solved. Section III provides a non-optimal route DFGZ, thus reducing the energy review of the current WSN literature relating to the problem. expenditure of node C. Our scheme is collaborative in that The node reliance scheme is presented in Section IV. Section sources determine routes based on a holistic view of the V shows how node reliance might be calculated using an network avoiding the use of nodes upon which others rely. example. Considerations for a protocol based on node reliance and consequences of a realistic physical layer are discussed in III. RELATED WORK Section VI. Section VII presents the results of an experimental comparison between protocols using node reliance and other A number of routing schemes have been proposed that routing schemes, including load balancing. Finally, attempt to maximise the efficacy of WSNs. Although many conclusions and further work are discussed in Section VIII. schemes are derived from a combination of others, they can be loosely grouped into the categories of minimum hop routing, II. PROBLEM STATEMENT minimum energy routing, load balancing routing and potential based routing, discussed below. Consider the network shown in Fig. 1. It consists of nine nodes (A-H and Z) of which two nodes are sources (A and D) and one node is a sink (Z). An edge between two nodes 978-1-4244-6826-3/10/$26.00 ©2010 IEEE Authorized licensed use limited to: Bharat University. Downloaded on July 23,2010 at 08:14:37 UTC from IEEE Xplore. Restrictions apply.
  • 2. A. Minimum hop routing therefore returns the minimum hop path of least energy. Minimum hop routing selects a path based on the minimum Although MLRP assumes bidirectionality, the proposal of number of hops necessary to reach a sink. The oldest using an incremental transmission power can be applied to minimum hop routing protocol is DSDV [1], later superseded virtually any other routing protocol. However, MLRP by AODV [2] which forms routes on demand rather than encourages the global use of nodes with low transmission proactively. Both protocols operate similarly. A route request energies. For example, if the transmission cost of C to Z in (RREQ) message, containing a sequence number, the source Fig. 1 is small then the use of node C is encouraged, even from which the message originated and the number of nodes though its loss would disconnect source A. It could be argued through which the message has travelled, is flooded through that since C’s transmission power is low, it will take much the network. Eventually, some node that has a path to the longer to expire. However node C may only be fractionally destination or is the destination receives the message, and that cheaper than some alternative. Furthermore if every source node responds with a route reply (RREP), which is routed routes through node C, it may still expire very quickly. back through the network. Each node forwards the RREP to C. Load balancing routing the node from which it received the original RREQ. Since Load balancing routing distributes the routing workload each RREP message is required to travel the same path as the across as many nodes as possible, even if the paths chosen by corresponding RREQ, but in the reverse, AODV and DSDV sources are not optimal with respect to the energy both require bidirectional edges. consumption. In DSR [3], all RREQ messages contain the sequence of The MREP [10] (also known as Max-min) routing protocol nodes through which they have travelled. The RREP is works by selecting the path whose node of least remaining encapsulated in its own RREQ so that a path can be energy is the greatest (the maximum minimum element). In discovered from the sink back to the source, and contains the MREP, the cost of a node is inversely proportional to the sequence of nodes from the RREQ originating from the remaining energy of that node and the lowest source. Since the RREP is flooded, there is no requirement for lexicographically ordered path is used. Lexicographically edges to be bidirectional. Therefore, route discovery requires comparing two paths P and Q involves an examination of the two floods per (source, sink) pair. RREQs and RREPs must highest cost node on each path. The path whose highest cost also carry a sequence of node identities rather than a simple node has the lowest cost has the lowest lexicographic order. If hop count. These two features combine to limit the scalability the nodes are of equal cost, the next highest cost nodes are of protocols such as DSR. examined, and so on. In [4-7] it has been suggested that minimum hop routing is Load balancing routing suffers from two disadvantages. prone to a number of disadvantages. Firstly, minimising the Firstly, it is difficult to determine the remaining energy on number of hops encouraged the use of nodes that are each node. Secondly, distributing the routing workload might geographically distant [4]. Since energy expenditure is argued cause additional energy expenditure. to be proportional to either the second [5] or fourth power [8] In order to provide an accurate approximation to the amount of the distance, long hops either require more energy or are of energy stored in a node, Lin [11] proposes representing the less reliable for a fixed amount of energy. Secondly, it has energy of nodes using discrete energy levels. Using this been suggested that the use of minimum hop routing (and technique, a four-level logarithmic scale is proposed with level more generally shortest path routing of which minimal hop is 0 corresponding to full energy, level 1 between half and full an example) causes a subset of nodes to expire more quickly energy, level 2 between quarter and half energy, and level 3 [6, 7], potentially disconnecting sources from sinks. For between one eighth and zero energy. Whilst this reduces the example, in Fig. 1, the use of the minimum hop routes from A overhead associated with load balancing, routes are required to and D (ACZ and DCZ) would cause C to expire quickly, and be recalculated when any node changes its energy level. disconnect A from Z. Load balancing typically puts off the time until first node B. Minimum energy routing expiration by distributing workload. However, this approach Since there is a polynomial relationship between the energy does not necessarily reduce the wastage of energy of sources required for transmission and the transmission distance, a since it may be to the detriment of the entire network’s energy. longer sequence of small hops may require less energy than a D. Potential based routing short sequence of long hops. Minimum energy routing seeks PMRP [12] aims to limit the path maintenance overhead on to use (source, sink) paths of least energy expenditure. node failure. Each node carries a score initially based on its In MLRP [9], when an RREQ message is sent from a distance (in hops) from a sink. Data is always routed to the source, it specifies a minimum transmission power that must neighbour with the lowest score. If such a node cannot be be used. Any node receiving an RREQ retransmits it at the found, for example after a failure, a widening search is power specified in the message. After some period of time, if conducted for a node of lower score. When such a node is the source has not received an RREP, it increases the found, the scores of nodes on the path to the discovered node transmission energy and resends the RREQ. The protocol Authorized licensed use limited to: Bharat University. Downloaded on July 23,2010 at 08:14:37 UTC from IEEE Xplore. Restrictions apply.
  • 3. are lowered. Adjusting the scores in this manner ensures that necessary to determine the cost of each available path in order other routes to the sink are not disrupted and allows new paths to establish the optimal one. The results (Section VII) indicate to be formed using only a subset of local nodes. Unlike our that shortest path routing maximises (source, sink) proposed routing scheme, PMRP does not actively encourage connectivity. Thus, the optimal path is the one where the sum lifetime extension or the preservation of particular nodes. of reliance costs of nodes is the least. As discussed in Section III, shortest path routing causes a IV. NODE RELIANCE subset of nodes in the network to be overused and quickly None of the routing schemes examined in Section III are disconnected from the network. However, these concerns do suitable for minimising the energy wastage of source nodes. not apply when node reliance is used, since the cost of a node We therefore introduce a new means of costing nodes known is inversely proportional to the number of paths on which it as node reliance and demonstrate how it may be applied to lies. Consequently, it is unlikely that the cheapest nodes can form routes that minimise energy wastage at sources. be overused. Even if overused, they will be of little The premise of node reliance routing is that each node is importance in routing by definition. assigned a weighting, which gives an indication of how much that node is relied upon in routing from sources to sinks. A V. EXAMPLE node that is greatly relied upon should be avoided where To illustrate the approach, we use the network shown in Fig. possible, whereas a node that is not relied upon can be used 1. The pair (A, Z) has one simplest path (ACZ). Consequently, freely. Each source may rely on a particular node to a different all three nodes, A, C and Z have a relative reliance of 1.0 to degree. Any model of node reliance must be able to the pair (A, Z). The pair (D, Z) has two simplest paths (DCZ distinguish between how relied upon a node is to a particular and DFGZ). Thus, nodes C, F and G each have a relative source and in the context of the entire network. To distinguish reliance of 0.5 to the pair (D, Z) and D and Z have a relative between these concepts, we make the following definitions: reliance of 1.0 to (D, Z). Nodes that do not lie on any simplest • The relative reliance of a node B to a (source, sink) path between a (source, sink) pair have a relative reliance of 0. pair (A, Z) is the degree to which node B is relied upon A node’s absolute reliance is equal to the mean of its relative in routing data from A to Z. reliances. For example, node D has a relative reliance of 0 to • The absolute reliance of a node B is the degree to (A, Z) and a relative reliance of 1 to (D, Z), giving it an which node B is relied upon in the entire network. absolute reliance of 0.5. The reliance values for the nodes Several models may be used to express node reliance. In shown in Fig. 1 are shown in Table I. this paper, we present the simplest paths model. A simplest TABLE I RELATIVE AND ABSOLUTE NODE RELIANCE VALUES path is a sequence of nodes from a source to a sink such that it Relative Relative is not possible to construct another path between the same Absolute Node reliance to reliance to reliance (source, sink) pair by removing nodes. For example, in Fig. 1, (A, Z) (D, Z) the pair (A, Z) has one simplest path: ACZ and (D, Z) has two: A 1.00 0.00 0.50 B 0.00 0.00 0.00 DCZ and DFGZ. The path ABCZ is not a simplest path, C 1.00 0.50 0.75 because it is possible to remove node B to form the path ACZ. D 0.00 1.00 0.50 Our model considers the set of simplest paths between each E 0.00 0.00 0.00 (source, sink) pair. A given (source, sink) pair may have F 0.00 0.50 0.25 multiple simplest paths associated with it. In the simplest G 0.00 0.50 0.25 paths model, a path may never contain more than one sink. H 0.00 0.00 0.00 Consequently, the set of paths under consideration is actually Z 1.00 1.00 1.00 the set of single-sink, simplest paths. Visual inspection reveals the absolute and relative reliance The relative reliance, of a node B to a (source, sink) pair values follow intuition. The most valuable node is sink Z (A, Z) is the proportion of simplest paths between A and Z on whose loss would cause the entire network to fail (if the which node B lies. If node B is a bottleneck, then it lies on all network had multiple sinks, then this value would be lower). paths between A and Z and its relative reliance is 1. If node B The next highest reliance value node is C. Node C is a does not lie on any simplest paths, then it is unused in routing, bottleneck to source A and therefore if C were to expire, A and it has a relative node reliance of 0. The absolute reliance would be disconnected from the network. Furthermore, the of a node under this model is the average of relative reliance loss of node C causes half D’s (source, sink) paths to become across all pairs for which there is at least one path. The set of unusable. Thus, node C is given a high absolute value. The simplest paths is considered in calculating node reliance since loss of a source node yields that node unusable and it contains all routes from a source to a sink that have no consequently the source nodes have the next highest reliance superfluous nodes. The loss of such nodes does not prevent value. Although not relevant in this network, where no sources from routing to sinks. simplest path contains both sources, it is important to consider Once reliance values have been assigned to nodes, it is the reliance values of sources, since it may be beneficial to the Authorized licensed use limited to: Bharat University. Downloaded on July 23,2010 at 08:14:37 UTC from IEEE Xplore. Restrictions apply.
  • 4. entire network for one source to route through another. Of the process involves one flood per source to find paths to the remaining nodes, F and G have a low reliance because they sink(s) and one flood per sink to discover path to the are unused by source A and appear on only half the simplest source(s). Furthermore, each message must contain a partially paths of source D. Finally, nodes B, E and H are all unused. constructed path to the destination and similarly the RREP There is no simplest path from any source to any sink that uses message must additionally contain the (source, sink) path. any of these nodes. Thus, their reliance value is 0 and their However, it may be argued that any routing protocol that can loss has no impact on (source, sink) connectivity. exploit unidirectional links has lower efficacy than one that In general, having assigned reliance values to nodes, it is assumes bidirectionality. possible to determine which path is the cheapest for each B. Realistic physical layer source. It is only necessary to consider the set of simplest paths; any non-simplest path contains nodes that are In a physical WSN deployment, it may be difficult to define unnecessary, and thus, a path of lower cost must exist. when two nodes are connected. In reality, a node B receives a The only simplest path from source A to sink Z is ACZ. Its transmission from a node A based on some probability P cost is calculated by adding the node reliance values of A, C which is dependent upon the distance between A and B, the and Z to give a total of 2.25 (0.50 + 0.75 + 1.00). There are power with which the transmission is sent, the sensitivity of two paths from source D to Z, DFGZ and DCZ. The cost of the receiver and the local noise which includes other radio DFGZ is the sum of the costs of D, F, G and Z, which gives transmissions. The probability of radio reception may also be 2.00 (0.50 + 0.25 + 0.25 + 1.00). The cost of DCZ is the sum dependent on factors that change over time. For example, poor of the costs of D, C and Z, which gives 2.25 (0.50 + 0.75 + weather or obstacles moving between the nodes may cause the 1.00). Thus, the optimal routes are ACZ and DFGZ. Assuming reception probability to drop. To address the problem of the sink has a sufficient energy to receive every message deciding when two nodes are connected, Stojmenovic [13] generated at the source nodes and assuming that every provides a number of potential solutions. The simplest of these message sent from sources to sinks consumes the same is for each node to make a number of attempts to communicate amount of energy on each node then both sources will expire with potential neighbours. The nodes that are reliably simultaneously and no energy will be wasted at any source. discovered some proportion of times are considered to be directly connected. It is possible that some nodes capable of VI. DISCUSSION receiving transmissions may not be included in this list. However, those nodes are unlikely to be reliable and so it may In this section we discuss node reliance and its implications be argued that it is undesirable to use them. for routing protocols. We also examine the significance of realistic physical layers in which communications may be C. Alternative node reliance models unreliable and alternatives to the simplest paths model. Sometimes the use of a node is predetermined by some A. Node reliance routing protocol earlier routing decision. For example, in Fig. 1, the use of node F always requires use of node G, which has no impact on This paper has described a new routing scheme. We now the path selection or the attribution of node reliance values. consider how this scheme may be converted into a routing Where the use of such nodes is deterministic, it is possible to protocol. The node reliance routing scheme only requires contract the network such that the two nodes are combined knowledge of the network topology. However, since the full into a single virtual supernode. It is hypothesised that by set of paths between all sources and sinks in the network must considering this smaller set of nodes, the accuracy of node be known, it is necessary to have a view of the entire network. reliance values may be improved. Preliminary experiments have indicated that the most suitable A final consideration is in message overhearing. Since means of gathering the network topology is by link state radios do not usually have the ability to unicast, a node may advertisement (LSA), i.e. each node shares its set of expend energy receiving a message and decoding it before neighbours with all other nodes in the network. The growth determining that it was not the intended recipient. Taking rate of such an operation is O(n2) where n represents the overhearing into account when calculating a node’s reliance number of nodes in the network. value may improve the accuracy of node reliance values Although this growth rate is high, the use of LSA has a appreciably and further reduce the energy wasted by sources. number of advantages. Firstly, the cost of LSA does not In such a scheme, a node’s reliance is composed from two increase as a result of increasing the proportion of sources components: the pure reliance values as described earlier and since each node has a view of the network. Secondly, non- an inherited component from the node’s neighbours. The LSA routing protocols often deal poorly with unidirectional inherited component is derived from the sum of the pure links. A common tactic is to assume that every edge is reliance values of those neighbours from which a node bidirectional. However, this may result in the selection of an overhears messages. The intuition is that a well-connected unusable path, causing the routing protocol to fail. Another node will overhear many messages and will consequently have solution is to carry out forward and backward path discovery a high reliance value reflecting the additional energy in the same way as DSR (discussed in Section III.A). Such a Authorized licensed use limited to: Bharat University. Downloaded on July 23,2010 at 08:14:37 UTC from IEEE Xplore. Restrictions apply.
  • 5. expenditure used as a consequence of overhearing. upon for routing. By firstly using those nodes that are least relied upon, it is theorised that sources will naturally choose VII. RESULTS paths that either have minimal conflict or whose expiration has The Castalia 1.3 simulator was used to compare the efficacy the least effect on the network. of the node reliance routing scheme with other well-known Possible further work includes merging features from other protocols. Networks of 2, 5, 10, 20 and 40 nodes were placed routing protocols. For example, by additionally considering in triangular, square, hexagonal and random shaped load balancing, a routing protocol could encourage the use of deployments. For each network, sources and sinks were nodes with low reliance or with high remaining energy. One randomly selected and each experiment was repeated 30 times might also consider combining node reliance with a clustering using different random seeds and different sources and sinks. protocol such as LEACH [5]. Since clusters are independent, The simulated application caused each source to generate a node reliance values for a cluster would only require the randomly sized piece of data (between 2 and 100 bytes) every topology of that cluster rather than the entire network. Thus, five seconds and route it to a sink. For each routing protocol, the scalability of the routing protocol could be improved. the normalised total data transfer and connectivity weighted Finally, we intend to evaluate the reliance model discussed transfer (CWT) [14] were calculated. CWT is the product of in Section VI.C, in which message overhearing is taken into transferred data and the number of different sources that account when calculating a node’s reliance value. provided the data, raised to some power (2 in these experiments). It therefore represents the degree to which REFERENCES sources remain connected to sinks and is thus representative of [1] C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," ACM well-spent energy. SIGCOMM Computer Communication Review, vol. 24, pp. 234-244, 1994. TABLE II [2] C. E. Perkins and E. M. Royer, "Ad-hoc On-Demand Distance COMPARISON OF ROUTING PROTOCOLS Vector Routing," in Proceedings of the Second IEEE Workshop on Mobile Topology Computer Systems and Applications, New Orleans, USA, 1999, pp. 90-100. Heuristic Ordering CWT Transfer Gathering [3] D. B. Johnson, et al., "DSR: The Dynamic Source Routing Load LSA Shortest 0.988±0.000 0.983±0.000 Protocol for Multi-Hop Wireless Ad Hoc Networks," in Ad-Hoc Networking, Balance [8] C. E. Perkins, Ed., ed: Addison-Wesley, 2000, pp. 139-172. Contracted LSA Shortest 0.985±0.000 0.986±0.000 [4] A. Woo, et al., "Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks," in Los Angeles, California, USA, Simplest LSA Shortest 0.984±0.000 0.985±0.000 Conference On Embedded Networked Sensor Systems, 2003, pp. 14-27. [5] W. R. Heinzelman, et al., "Energy-Efficient Communication Min Hop LSA Shortest 0.972±0.000 0.983±0.000 Protocol for Wireless Microsensor Networks," in 33rd International Conference on System Sciences, Hawaii, USA, 2000, pp. 8020-8029. Load DSR Shortest 0.961±0.000 0.961±0.000 [6] H. Dai and R. Han, "A Node-Centric Load Balancing Algorithm Balance [8] for Wireless Sensor Networks," in IEEE GLOBECOM - Wireless Contracted LSA Lexicographic 0.956±0.001 0.972±0.001 Communications, San Francisco, USA, 2003, pp. 548 - 552. Simplest LSA Lexicographic 0.954±0.001 0.971±0.001 [7] S. Singh, et al., "Power-Aware Routing in Mobile Ad Hoc Networks," in Mobile Computing and Networking, Dallas, Texas, United States, 1998, pp. 181-190. [8] G. J. Pottie and W. J. Kaiser, "Wireless Integrated Network The results show that load balancing is slightly better than Sensors," Communications of the ACM, vol. 43, pp. 51-58, 2000. the node reliance approach described here (with a very small [9] B. Zhang and H. T. Mouftah, "Energy-aware on-demand routing margin). The node reliance approach achieves higher transfer protocols for wireless ad hoc networks," Wireless Networks, vol. 12, pp. 481- 494, 2006. again, with a small margin. [10] J.-H. Chang and L. Tassiulas, "Routing for Maximum System We postulate that with the addition of the overhearing Lifetime in Wireless Ad-hoc Networks," in 37th Annual Allerton Conference compensation, reflecting real–world conditions, described in on Communication, Control and Computing, Monticello, IL, 1999. [11] L. Lin, et al., "Asymptotically Optimal Power-Aware Routing for Section VI.C, that this protocol may prove to be superior. Multihop Wireless Networks with Renewable Energy Sources," in 24th Joint Annual Conference of the IEEE Computer and Communications Societies, VIII. CONCLUSIONS AND FURTHER WORK Miami, FL, USA, 2005, pp. 1262 - 1272. [12] D. Y. Kwon, et al., "A Potential Based Routing Protocol for This paper has examined mechanisms for reducing the Mobile Ad Hoc Networks," presented at the 11th IEEE International wastage of energy on source nodes in a WSN when routing Conference on High Performance Computing and Communications, Seoul, data from sources to sinks. Common routing protocol Korea, 2009. [13] I. Stojmenovic, et al., "Design Guidelines for Routing Protocols in approaches such as minimum hop routing, minimum energy Ad Hoc and Sensor Networks with a Realistic Physical Layer," IEEE routing and load balancing routing were argued to be Communications Magazine (Ad Hoc and Sensor Networks Series), vol. 43, problematic and may not be capable of resolving the problem. pp. 101-106, 2005. [14] A. W. F. Boyd, et al., "On the Selection of Connectivity-based A new collaborative routing scheme known as node Metrics for WSNs using a Classification of Application Behaviour," in IEEE reliance was introduced. Rather than having each source International Conference on Sensor Networks, Ubiquitous, and Trustworthy dynamically negotiate which path to use, node reliance assigns Computing, Newporn Beach, California, USA (accepted for publication). a score to each node based on the degree for which it is relied Authorized licensed use limited to: Bharat University. Downloaded on July 23,2010 at 08:14:37 UTC from IEEE Xplore. Restrictions apply.