Professional Documents
Culture Documents
J. Parallel Distrib. Comput.: Jalel Ben-Othman Bashir Yahya
J. Parallel Distrib. Comput.: Jalel Ben-Othman Bashir Yahya
J. Parallel Distrib. Comput.: Jalel Ben-Othman Bashir Yahya
70 (2010) 849–857
Energy efficient and QoS based routing protocol for wireless sensor networks
Jalel Ben-Othman ∗ , Bashir Yahya
Department of Computer Science, PRiSM Laboratory, University of Versailles Saint Quentin, 45 Avenue des Etats-Unis, 78000 Versailles, France
data normally have different attributes, where it may contain delay 2. Multipath routing
sensitive and delay tolerant data. For example, the data generated
by a sensor network that monitors the temperature in a normal Single path routing protocols in sensor network are designed
weather monitoring station are not required to be received by the to discover a single path between a source/destination pair. From
processing center or the sink node within certain time limits. On the other hand, multipath routing consists of finding multiple
the other hand, for a sensor network that used for fire detection in a paths between the source and destination nodes. These multiple
forest, any sensed data that carries an indication of a fire should be paths can be used to solve some trade-offs in such networks and
reported to the processing center within certain time limits. Fur- accommodate with the dynamic nature of WSNs. In this section,
thermore, the introduction of multimedia sensor networks along we discuss some benefits and advantages of multipath routing. As
with the increasing interest in real-time applications have made well, we mention some problems that arise when using multipath
strict constraints on both delay and throughput in order to report routing in wireless sensor networks.
the time-critical data (in such applications) to the processing cen-
ter or sink within certain time limits and bandwidth requirements 2.1. Benefits of multipath routing
without any loss. These performance metrics (i.e. delay and band-
width) are usually referred to as Quality of Service (QoS) require- As mentioned in the introduction, multipath routing protocols
ments [1]. Therefore, enabling real-time applications in sensor can provide load balancing, fault tolerance, bandwidth aggrega-
networks requires energy and QoS awareness in different layers tion, and reduced delay. Below, we discuss how to provide each
of the protocol stack in order to have efficient utilization of the of these benefits in multipath routing.
network resources and effective access to sensors readings. Thus
QoS routing is an important topic in sensor networks research, and
2.1.1. Load balancing
it has been under the focus of the research community of WSNs.
As stated in [11], one of the reasons for which classical
Refer to References [1,8] for surveys on Quality of Service based
multipath routing has been explored is to provide load balancing.
routing protocols for WSNs.
Load balancing can be achieved by splitting the traffic across
Many routing solutions specifically designed for WSNs have
multiple paths. This use of multipath routing is applicable to
been proposed [3,20]. In these proposals, the unique properties
WSNs. Load balancing can spread energy utilization across nodes
of the WSNs have been taken into account. These routing
in the sensor network, potentially resulting in longer lifetimes.
techniques can be classified according to the protocol operation
Furthermore, load balancing helps in avoiding congestion and
into negotiation based, query based, QoS based, and multi-path based.
bottleneck problems.
The negotiation based protocols have the objective to eliminate
the redundant data by include high level data descriptors in the
message exchange. In query based protocols, the sink node initiates 2.1.2. Reliability and fault tolerance
the communication by broadcasting a query for data over the Reliability means that the probability that a message generated
network. The QoS based protocols allow sensor nodes to make a at one place in the network can actually routed to the intended
tradeoff between the energy consumption and some QoS metrics destination. Reliability is a big issue in WSNs, because data
before delivering the data to the sink node [21]. Finally, multi- transmission is subject to lost due to several reasons: various kinds
path routing protocols use multiple paths rather than a single of interference, media access conflicts, network topology changes,
path in order to improve the network performance in terms of etc. These reasons affect the wireless radios to correctly decode the
reliability and robustness. Multi-path routing establishes multiple wireless signals.
paths between the source–destination pair. Multi-path routing One of the reasons behind developing multipath routing is to
protocols have been discussed in the literature for several years provide route failure protection, and increase resiliency to route
now [25]. Multi-path routing has focused on the use of multiple failures. Discovering and maintaining multiple paths between
paths primarily for load balancing, fault tolerance, bandwidth the source–destination pair improves the routing performance
aggregation, and reduced delay. We focus on supporting quality of by providing alternative routes. When the primary path fails, an
service through multi-path routing. alternative path will be used to transfer the data. In this case the
In this paper, we propose EQSR protocol: Energy efficient multiple paths are not used simultaneously.
and QoS based multi-path routing protocol for WSNs to recover Multiple paths can be used simultaneously for data routing.
from node failures and achieves load balancing through splitting Simultaneous multipath routing could be used to improve
up the traffic across a set of available node-disjoint paths in reliability. This could be done by sending multiple copies of data
across different paths. As long as, one of the multiple paths does
order to efficiently balance the energy consumption over multiple
not fail, the receiver node will receive the data. Sending multiple
sensor nodes. Furthermore, EQSR increases the reliability of data
copies is not the only way to provide fault tolerance, but there
delivery through utilizing a light wait XOR-based FEC (Forward
are many methods that are suitable for sensor networks by using
Error Correction) technique to provide data redundancy. Data
source coding schemes such as FEC techniques [16].
redundancy increases resiliency to path failures and enables the
protocol to recover lost data and reconstruct the original message,
while avoiding any excessive delay due to data retransmissions. 2.1.3. Highly aggregated bandwidth
EQSR uses the residual energy, node available buffer size, and Bandwidth may be limited in a WSN, routing over a single path
Signal-to-Noise Ratio (SNR) to predict the next hop through the may not provide enough bandwidth for a connection. However,
path construction phase. EQSR employs a queuing model that is if data are routed over multiple paths simultaneously, the overall
designed to handle real-time and non-real-time traffic through bandwidth of the paths may satisfy the bandwidth requirement of
service differentiation by giving real-time traffic higher priority an application.
than non-real-time traffic.
The remainder of the paper is organized as follow: In Section 2, 2.1.4. Minimizing end to end delay
we describe and discuss some of the related work. We detail By assuming that the paths between the source–destination
our proposal in Section 3. Section 4 presents the performance pair are node disjoint paths where correlation between the paths
evaluation. Finally, we conclude the paper in Section 5. is very low, and there is no route coupling between different
J. Ben-Othman, B. Yahya / J. Parallel Distrib. Comput. 70 (2010) 849–857 851
domain and reliability domain. Multiple QoS levels are provided Hop Residual Free Link
Source ID
in the timelines domain by using different delivery speeds, while Count Energy Buffer Quality
different reliability requirements are supported by probabilistic
multipath forwarding. However, MMSPEED lacks a method for Fig. 2. HELLO message structure.
dealing with the data redundancy problem, which leads to
consuming a large amount of energy as shown in [32]. In this 4.2. Link cost function
context a data aggregation mechanism can be added to enhance
the performance of the protocol. The link cost function is used by the node to select the next hop
Recently, X. Huang and Y. Fang have proposed a multi- during the path discovery phase. We use a cost function such as
constrained QoS multi-path routing (MCMP) protocol [14] that presented in [17] with some changes. Let Nx be the set of neighbors
uses braided routes to deliver packets to the sink node according of node x. Then our cost function includes an energy factor,
to certain QoS requirements expressed in terms of reliability available buffer factor, and interference factor with appropriate
and delay. The problem of the end-to-end delay is formulated weights (α , β , and γ ):
as an optimization problem, and then an algorithm based on
Next hop = max{α Eresd,y + β Bbuffer ,y + γ Iinterference,xy },
linear integer programming is applied to solve the problem. The y∈Nx
protocol objective is to utilize the multiple paths to augment
where, Eresd,y is the current residual energy of node y, where y ∈ Nx ,
network performance with moderate energy cost. However, the
Bbuffer ,y is the available buffer size of node y, and Iinterference,xy is
protocol always routes the information over the path that includes
the SNR for the link between x and y. In this cost function, we
minimum number of hops to satisfy the required QoS, which
only consider the residual energy of node y but not x. Because
leads in some cases to more energy consumption. Authors
node y consumes energy for data reception and transmission if it
in [5], have proposed the Energy constrained multi-path routing
is selected as a next hop for node x. We do not consider node x,
(ECMP) that extends the MCMP protocol by formulating the QoS
because whatever node y is, node x still needs to spend the same
routing problem as an energy optimization problem constrained
amount of energy on data transmission [17].
by reliability, play-back delay, and geo-spatial path selection
The total cost (Ctotal ) for a path P consists of a set of K nodes is
constraints. The ECMP protocol trades between minimum number
the sum of the individual link costs l(xy)i,i∈K along the path. Then we
of hops and minimum energy by selecting the path that satisfies
have:
the QoS requirements and minimizes energy consumption.
K −1
Meeting QoS requirements in WSNs introduces certain over- X
Ctotal,P = l(xy)i .
head into routing protocols in terms of energy consumption, inten-
i =1
sive computations, and significantly large storage. This overhead
is unavoidable for those applications that need certain delay and
bandwidth requirements. In our proposal, we combine different 4.3. Paths discovery phase
ideas from the previous protocols in order to optimally tackle the
problem of QoS in sensor networks. In our proposal we try to satisfy Based on the idea of the directed diffusion [11,15], the sink
the QoS requirements with the minimum energy. Our EQSR routing node starts the multiple paths discovery phase to create a set of
protocol performs routes discovery using multiple criteria such as neighbors that able to forward data towards the sink from the
energy remaining, remaining buffer size and signal-to-noise ratio. source node. The constructed multi-paths are node-disjoint paths
In the next section we detail our proposal. (i.e. have no common nodes except the source and the destination).
In multi-path routing, node-disjoint paths are usually preferred
4. Description of EQSR protocol because they utilize the most available network resources, and
hence are the most fault-tolerant. If an intermediate node in a set
of node-disjoint paths fails, only the path containing that node
In this section, we first define some assumptions, then we
is affected, so there is a minimum impact to the diversity of the
provide the details of multiple paths discovery and maintenance,
routes [11].
as well as the traffic allocation and data transmission across the
The path discovery procedure is executed according to the
multiple paths.
following phases:
4.1. Assumptions
• Initialization phase: Each sensor node broadcast a HELLO
message to its neighboring nodes in order to have enough
information about which of its neighbors can provide it with the
We assume N identical sensor nodes are distributed randomly
highest quality data. Each sensor node maintains and updates
in the sensing filed. All nodes have the same transmission range,
its neighboring table during this phase. The neighboring table
and have enough battery power to carry their sensing, computing, contains information about the list of neighboring nodes of
and communication activities. The network is fully connected and the sensor node. Fig. 2 illustrates the structure of the HELLO
dens (i.e. data can be sent from one node to another in a multi- message. The link quality field is expressed in terms of signal-to-
hop bases). Each node in the network is assigned a unique ID and noise ratio (SNR) for the link between any node and its neighbor.
all nodes are willing to participate in communication process by Hop count gives the distance in hops for the message from its
forwarding data. Furthermore, we assume that the sensor nodes originator. As the message is only broadcasted to the neighbors
are stationery for their lifetime. Additionally, at any time, we of the node, this field is not used in this version of the protocol.
assume that each sensor node is able to compute its residual • Primary Path discovery phase: After initialization phase each
energy (the remaining energy level), and its available buffer size sensor node has enough information to compute the cost
(remaining memory space to cache the sensory data while it is function for its neighboring nodes. Then, the sink node locally
waiting for servicing), as well as record the link performance computes its preferred next hop node using the link cost
between itself and its neighboring node in terms of signal-to- function, and sends out a RREQ message to its most preferred
noise ratio (SNR). By examining recent link performance data, next hop (Fig. 3 shows the structure of the RREQ message).
predications and decisions about path stability may be made. Similarly, through the link cost function, the preferred next hop
J. Ben-Othman, B. Yahya / J. Parallel Distrib. Comput. 70 (2010) 849–857 853
RREQ RREQ
i1
Sink 0 9 P1
L paths for
RT traffic
5 i2
N- available paths
Instant Queue
RREQ IIIUSE
CLASSIFIER
7 RREQ iL
PACKET
2 Source
8 RREQ j1 Destination
3
NRT traffic
j2
M paths for
Non-Real Time Traffic
RREQ
6 RREQ jM
1 FIFO QUEUE
Source PN
4
Fig. 5. Functional diagram of the EQSR protocol.
Primary Path
where xα is the corresponding bound from the standard normal
Alternative Path distribution for different levels of α . Table 1 lists some values for xα .
Now out of the k paths, the protocol picks out a number of l
Fig. 4. Example of path discovery. paths to be used to transfer the real-time traffic, and m paths for
non-real-time traffic, where k = l + m. To calculate l, we assume
node of the sink computes locally its most preferred next hop in that the sensor node knows the size of its traffic (both real-time and
the direction of the source node, and sends out a RREQ message non-real-time traffic). Let Tr represents the size of the real-time
to its next hop, the operation continues until source node traffic, Tnr represents the size of the non-real-time traffic, then we
(see Fig. 4). have:
• Alternative Paths discovery phase: For the second alternate Tr
path, the sink sends alternate path RREQ message to its next l= k,
most preferred neighbor. To avoid having paths with shared Tr + Tnr
node, we limit each node to accept only one RREQ message. Tnr
m= k.
For those nodes that receive more than one RREQ message, Tr + Tnr
only accept the first RREQ message and reject the remaining As we divided the k paths between the real-time and non-real-
messages (see Fig. 4, for an example of path construction. In this time traffic according to the traffic size, we select the best l paths
example Node 9 computes its next preferred neighbor finds it that minimize the end to end delay to transfer the real-time traffic
Node 7. Node 9 generates RREQ message and forwards to node to ensure that the critical-time data is delivered to the destination
7, but node 7 has been included in the primary path, then node within the time requirements, with out any delay. To find the best
7 simply responds to node 9 with an INUSE message indicating baths in terms of the end-to-end delay, during the paths discovery
that node 7 is already selected in a routing path. Immediately phase, each sensor node estimates the time elapsed for the RREQ
node 9, searches its neighboring table and computes the next packet since its transmission from the node’s neighbor till it is
preferred neighbor, which will be node 5, and sends out RREQ received by the node itself. By accumulating this time, the source
message to it. Node 5 accepts the message and continues the node can compute end-to-end delay for each of the available paths.
procedure in the direction of the source node).
4.6. Traffic allocation and data transmission
4.4. Path refreshment
Our protocol employs the queuing model presented in [2] to
In order to save energy, we reduce the overhead traffic through handle both real-time and non-real-time traffic. Two different
reducing control messages. Therefore, instead of periodically queues are used, one instant priority queue for real-time traffic,
flooding a KEEPALIVE message to keep multiple paths alive and and the other queue follows the first in first out basis for non-
real-time traffic. Fig. 5 shows the functional diagram of the EQSR
update cost function metrics, we append the metrics on the data
protocol.
message by attaching the residual energy, remaining buffer size,
The source node knows the degree of the importance of each
and link quality to the data message.
data packet it is sending which can be translated into predefined
priority levels. The application layer sets the required priority level
4.5. Paths selection for each data packet by appending an extra bit of information to
act as a stamp to distinguish between real-time and non-real-time
After the completion of paths discovery phase and the paths packets. Based on the packet type, the classifier directs packets
have been constructed, we need to select a set of paths from the into the appropriate queue. The traffic allocation scheme first
N available paths to transfer the traffic from the source to the des- splits up the packets into a number of equal sized sub-packets
tination with a desired bound of data delivery given by α . To find (or segments), and then schedules sub-packets simultaneously for
the number of required paths, we assume that each path is asso- transmission across the available multiple paths. Before scheduling
ciated with some rate pi (i = 1, 2, . . . , N ) that corresponds to the the sub-packets, the traffic allocation scheme adds error correction
probability of successfully delivering a message to the destination. codes to improve the reliability of transmission and to increase
Following the work done in [9], the number of required paths is the resiliency to paths failures and ensure that an essential portion
calculated as: of the packet is received by the destination without incurring any
v
u N
uX N
X delay and more energy consumption through data retransmission.
k = xα .t pi (1 − pi ) + pi At the sink node, the parts are collected, reassembled, and the
i=1 i =1
original message is recovered. More details are given below.
854 J. Ben-Othman, B. Yahya / J. Parallel Distrib. Comput. 70 (2010) 849–857
Table 2
Simulation parameters.
[14] X. Huang, Y. Fang, Multiconstrained QoS multipath routing in wireless sensor [30] M. Younis, M. Youssef, K. Arisha, Energy aware routing in cluster based sensor
networks, Journal of Wireless Networks 14 (4) (2008) 465–478. networks, in: The Proceedings of the 10th IEEE International Symposium
[15] Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Hei- on Modeling, Analysis, and Simulation of Computer and Telecommunication
demann, Fabio Silva, Directed diffusion for wireless sensor networking, Systems, MASCOTS-2002, Fort Worth, Texas, USA, October 11–16, 2002,
ACM/IEEE Transactions on Networking (TON) 11 (1) (2002) 2–16. pp. 129–136.
[16] Wenjing Lou, Wei Liu, Yanchao Zhang, Performance optimization using mul- [31] Y. Zhang, M. Fromherz, Message-initiated constraint-based routing for
tipath routing in mobile ad hoc and wireless sensor networks, in: M. Cheng, wireless adhoc sensor networks, in: The Proceedings of the First IEEE
Y. Li, D.-Z. Zhu (Eds.), A Book Chapter in Combinatorial Optimization in Com- Consumer Communication and Networking Conference, CCNC-2004, Las
munication Networks Book, Kluwer, 2005, ISBN:978-0-387-29025-6. Vegas, Nevada, USA, Jan 5–8, 2004, pp. 648–650.
[17] Ye Ming Lu, Vincent W.S. Wong, An energy efficient multipath routing protocol [32] Y. Zhang, M. Fromherz, L. Kuhn, Smart routing with learning-based QoS-aware
for wireless sensor networks, International Journal of Communication System routing strategies. in: The Proceedings of First Workshop on QoS Routing,
20 (7) (2007) 747–766. Barcelona, Spain, October 1st, 2004.
[18] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, J. Anderson, Wireless
sensor networks for habitat monitoring, in: The Proceedings of the 1st ACM
International Workshop on Wireless Sensor Networks and Applications, ACM-
WSNA, Atlanta, Georgia, USA, September 28–28, 2002, pp. 88–97.
[19] José-F. Martinez, Ana-B. Garcia, Ivan Corredor, Lourdes Lopez, Vicente Hernan- Jalel Ben-Othman received his B.Sc. and M.Sc. degrees
dez, Antonio Dasilva, Trade-Off Between Performance and Energy Consump- both in Computer Science from the University of Pierre
tion Wireless Sensor Networks, in: Lecture Notes in Computer Science (LNCS), et Marie Curie, (Paris VI) France in 1992, and 1994
4725/2007, Springer-Verlag, Berlin, Heidelberg, 2007, pp. 264–271, ISBN:978- respectively. He received his Ph.D. degree from the
3-540-74916-5. University of Versailles, France, in 1998. He was an
[20] Anahit Martirosyan, Azzedine Boukerche, Richard Werner, Nelem Pazzi, A Assistant Professor at the University of Orsay (Paris 11) and
taxonomy of cluster-based routing protocols for wireless sensor networks, University of Pierre et Marie Curie (Paris 6), in 1998 and
in: The Proceedings of International Symposium on Parallel Architectures, 1999 respectively. He is now an Associate Professor at the
Algorithms, and Networks, ISPAN-2008, Sydney, Australia, May 7–9, 2008, University of Versailles since 2000.
pp. 247–253. Dr. Ben-Othman research interests are in the area of
[21] Anahit Martirosyan, Azzedine Boukerche, Richard Werner, Nelem Pazzi, wireless ad hoc and sensor networks, Broadband Wireless
Energy-aware and quality of service-based routing in wireless sensor Networks, multi-services bandwidth management in WLAN (IEEE 802.11), WMAN
networks and vehicular ad hoc networks, Annales des Télécommunications (IEEE 802.16), WWAN (LTE), security in wireless networks in general and wireless
63 (11–12) (2008) 669–681. sensor and ad hoc networks in particular. His work appears in highly respected
[22] Stephen Muller, Rose P. Tsang, Dipak Ghosal, Multipath routing in mobile ad international journals and conferences, including, IEEE ICC, Globecom, LCN, VTC,
hoc networks; issues and challenges, in: Performance Tools and Applications PIMRC etc.
to Networked Systems, in: Lecture Notes in Computer Science (LNCS), He has supervised and co-supervised several graduate students in these
vol. 2965, Springer, 2004, pp. 209–234, ISBN:3540219455. areas. His widely known for his wok on wireless ad hoc and sensor network, in
[23] K. Sohrabi, J. Pottie, Protocols for self-organization of a wireless sensor particular security. Since 2002, he has served as Technical committee of more than
network, IEEE Personal Communications 7 (5) (2000) 16–27. 40 international IEEE/ACM conferences and workshops including ICC, Globecom,
[24] K. Srinivasan, M. Ndoh, H. Nie, H. Xia, K. Kaluri, D. Ingraham, Wireless MSWIM, LCN, etc. He is a member of IEEE and ACM.
technologies for condition-based maintenance (CBM) in petroleum plants, He is also serving as the Local Arrangement Chair for the 13th IEEE International
in: The Proceeding of the International Conference on Distributed Computing Symposium on Computer Communication (ISCC 09). He serves as a TPC Co-Chair of
in Sensor Systems, DCOSS’05, (Poster Session), Marina del Rey, CA, USA, June 9th international Workshop on Wireless local Networks (WLN09), as a publicity
30–July 1, 2005, pp. 389–390. chair of 12-th ACM International Conference on Modeling, Analysis and Simulation
[25] Jack Tsai, Tim Moors, A review of multipath routing protocols: from wireless ad of Wireless and Mobile Systems (MSWIM 09), IEEE International Symposium on
hoc to mesh networks, in: The Proceedings of ACoRN Early Career Researcher a World of Wireless Mobile and Multimedia Networks (WOWMOM 2010), 25th
Workshop on Wireless Multihop Networking, Sydney, Australia, Jul. 17–18, Biennial Symposium on Communications and he serves as a TPC Co-Chair of IEEE
2006. Globecom Wireless Communications Symposium (Globecom 2010).
[26] Kui Wu, Janelle Harms, On-demand multipath routing for mobile ad hoc And he is active member of IEEE CIS-TC, TC AHSN, WTC.
networks, in: Proceedings of 4th European Personal Mobile Communication
Conference, EPMCC, Vienna, Austria, Feb 20–22, 2001.
[27] Zhiqiang Xiong, Zongkai Yang, Wei Liu, Zhen Feng, A lightweight FEC algorithm Bashir Yahya received a B.Sc. degree in Computer
for fault tolerant routing in wireless sensor networks, in: The Proceedings Engineering from Al-Fateh University, Tripoli, Libya, in
of International Conference on Wireless Communications, Networking and 1994, and an M.Sc. degree in Computer Networks from INT
Mobile Computing, WiCOM-2006, Wuhan, China, September 22–24, 2006, (Institut National des Télécommunications, Evry, France)
pp. 1–4. in 2004. Currently, he is a member of the Network
[28] N. Xu, S. Rangwala, K. Chintalapudi, D. Ganesan, A. Broad, R. Govindan, Architectures and Services (ASR) research group at PRiSM
D. Estrin, A wireless sensor network for structural monitoring, in: The laboratory, University of Versailles, Versailles, France,
Proceedings of the 2nd International Conference on Embedded Networked where he is pursing his Ph.D. degree in Computer Science.
Sensor Systems, Baltimore, MD, USA, November 03–05, 2004, pp. 13–24. Mr. Yahya research interests include medium access and
[29] Bashir Yahya, Jalel Ben-Othman, Towards a classification of energy aware MAC routing in wireless sensor networks, quality of service in
protocols for wireless sensor networks, Journal of Wireless Communications WSNs, cross layer optimization and design, and mobility
and Mobile Computing 9 (12) (2009) 1572–1607. management. He is a member of IEEE, IEEE Communication Society and ACM.