Professional Documents
Culture Documents
R T W S N: A S: Outing Echniques in Ireless Ensor Etworks Urvey
R T W S N: A S: Outing Echniques in Ireless Ensor Etworks Urvey
ROUTING TECHNIQUES IN
WIRELESS SENSOR NETWORKS: A SURVEY
JAMAL N. AL-KARAKI, THE HASHEMITE UNIVERSITY
AHMED E. KAMAL, IOWA STATE UNIVERSITY
2,3,7,13 1,8,9,12,17
14,15,16,18 19,22,23,35 25,33,42 2,10,26,28
46,47 3,7 29,34 2,20,27 11,44 11,2,33
39,41,49 31,26,48
detailed overview of the main routing paradigms ations before any data is transmitted. This
in WSNs. We start with network-structure-based ensures that there is no redundant data sent
protocols. throughout the network. The semantics of the
meta-data format is application-specific and not
NETWORK-STRUCTURE-BASED PROTOCOLS specified in SPIN. For example, sensors might
The underlying network structure can play a sig- use their unique IDs to report meta-data if they
nificant role in the operation of the routing pro- cover a certain known region. In addition, SPIN
tocol in WSNs. In this section we survey in detail has access to the current energy level of the
most of the protocols that fall into this category. node and adapts the protocol it is running based
on how much energy is remaining. These proto-
Flat Routing — The first category of routing proto- cols work in a time-driven fashion and distribute
cols are the multihop flat routing protocols. In the information all over the network, even when
flat networks, each node typically plays the same a user does not request any data.
role and sensor nodes collaborate to perform the The SPIN family is designed to address the
sensing task. Due to the large number of such deficiencies of classic flooding by negotiation
nodes, it is not feasible to assign a global identi- and resource adaptation. The SPIN family of
fier to each node. This consideration has led to protocols is designed based on two basic ideas:
data-centric routing, where the BS sends queries 1) Sensor nodes operate more efficiently and
to certain regions and waits for data from the conserve energy by sending data that describe
sensors located in the selected regions. Since the sensor data instead of sending all the data;
data is being requested through queries, for example, image and sensor nodes must moni-
attribute-based naming is necessary to specify tor the changes in their energy resources.
the properties of data. Early work on data cen- 2) Conventional protocols like flooding or
tric routing (e.g., SPIN and directed diffusion gossiping-based routing protocols [11] waste
[8]) were shown to save energy through data energy and bandwidth when sending extra and
negotiation and elimination of redundant data. unnecessary copies of data by sensors covering
These two protocols motivated the design of overlapping areas. The drawbacks of flooding
many other protocols that follow a similar con- include implosion, which is caused by duplicate
cept. In the rest of this subsection, we summa- messages sent to the same node, overlap when
rize these protocols, and highlight their two nodes sensing the same region send similar
advantages and performance issues. packets to the same neighbor, and resource
Sensor Protocols for Information via Negoti- blindness in consuming large amounts of energy
ation: Heinzelman et al. in [9, 10] proposed a without consideration for energy constraints.
family of adaptive protocols called Sensor Proto- Gossiping avoids the problem of implosion by
cols for Information via Negotiation (SPIN) that just selecting a random node to which to send
disseminate all the information at each node to the packet rather than broadcasting the packet
every node in the network assuming that all blindly. However, this causes delays in propaga-
nodes in the network are potential BSs. This tion of data through the nodes.
enables a user to query any node and get the SPIN’s meta-data negotiation solves the clas-
required information immediately. These proto- sic problems of flooding, thus achieving a lot of
cols make use of the property that nodes in close energy efficiency. SPIN is a three-stage protocol
proximity have similar data, and hence there is a as sensor nodes use three types of messages,
need to only distribute the data other nodes do ADV, REQ, and DATA, to communicate. ADV
not posses. The SPIN family of protocols uses is used to advertise new data, REQ to request
data negotiation and resource-adaptive algo- data, and DATA is the actual message itself.
rithms. Nodes running SPIN assign a high-level The protocol starts when a SPIN node obtains
name to completely describe their collected data new data it is willing to share. It does so by
(called meta-data) and perform metadata negoti- broadcasting an ADV message containing meta-
dynamics in the
sensed phenomena.
(c) Send data and path reinforcement
Reduced duty cycle due to periodic sleeping Variable duty cycle by controlling sleep time of nodes
Data aggregation by clusterhead Node on multihop path aggregates incoming data from neighbors
Simple but non-optimal routing Routing can be made optimal but with an added complexity.
Requires global and local synchronization Links formed on the fly without synchronization
Overhead of cluster formation throughout the network Routes formed only in regions that have data for transmission
Lower latency as multiple hops network formed by Latency in waking up intermediate nodes
cluster- heads always available and setting up the multipath
network is divided into a small number of zones. During this process, each intermediate node
To send a message across the entire area, a glob- stores the source information and further for-
al path from zone to zone is found. The sensors wards the message to its adjacent crossing points
in a zone autonomously direct local routing and except the one from which the message comes.
participate in estimating the zone power level. This process continues until the message stops at
Each message is routed across the zones using the border of the network. The nodes that store
information about the zone power estimates. A the source information are chosen as dissemina-
global controller for message routing is assigned tion points. After this process, the grid structure
the role of managing the zones. This may be the is obtained. Using the grid, a BS can flood a
node with the highest power. If the network can query, which will be forwarded to the nearest
be divided into a relatively small number of dissemination point in the local cell to receive
zones, the scale for the global routing algorithm data. Then the query is forwarded along other
is reduced. The global information required to dissemination points upstream to the source.
send each message across is summarized by the The requested data then flows down in the
power level estimate of each zone. A zone graph reverse path to the sink. Trajectory forwarding is
was used to represent connected neighboring employed as the BS moves in the sensor field.
zone vertices if the current zone can go to the Although TTDD is an efficient routing approach,
next neighboring zone in that direction. Each there are some concerns about how the algo-
zone vertex has a power level of 1. Each zone rithm obtains location information, which is
direction vertex is labeled by its estimated power required to set up the grid structure. The length
level computed by a procedure, which is a modi- of a forwarding path in TTDD is larger than the
fied Bellman-Ford algorithm. Moreover, two length of the shortest path. The authors of
algorithms were outlined for local and global TTDD believe that the suboptimality in the path
path selection using the zone graph. length is worth the gain in scalability. Finally,
Two-Tier Data Dissemination: An approach how TTDD would perform if mobile sensor
in [6], called Two-Tier Data Dissemination nodes are allowed to move in the network is still
(TTDD), provides data delivery to multiple an open question. Comparison results between
mobile BS. In TTDD, each data source proac- TTDD and directed diffusion showed that
tively builds a grid structure that is used to dis- TTDD can achieve longer lifetimes and shorter
seminate data to the mobile sinks by assuming data delivery delays. However, the overhead
that sensor nodes are stationary and location- associated with maintaining and recalculating
aware. In TTDD, sensor nodes are stationary the grid as network topology changes may be
and location-aware, whereas sinks may change high. Furthermore, TTDD assumed the avail-
their locations dynamically. Once an event ability of a very accurate positioning system that
occurs, sensors surrounding it process the signal, is not yet available for WSNs.
and one of them becomes the source to generate The above mentioned flat and hierarchical
data reports. Sensor nodes are aware of their protocols are different in many aspects. At this
mission, which will not change frequently. To point, we compare the different routing
build the grid structure, a data source chooses approaches for flat and hierarchical sensor net-
itself as the start crossing point of the grid, and works as shown in Table 2.
sends a data announcement message to each of
its four adjacent crossing points using simple Location-Based Routing Protocols — In this kind of
greedy geographical forwarding. When the mes- routing, sensor nodes are addressed by means of
sage reaches the node closest to the crossing their locations. The distance between neighbor-
point (specified in the message), it will stop. ing nodes can be estimated on the basis of
Classifi- Mobility Position Power Negotiation- Data aggre- Local- QoS State comp- Scalab- Multi- Query-
cation awareness usage based gation ization lexity ility path based
SPIN Flat Poss. No Ltd. Yes Yes No No Low Ltd. Yes Yes
Direct Flat Ltd. No Ltd. Yes Yes Yes No Low Ltd. Yes Yes
diffusion