Professional Documents
Culture Documents
Design of Energy Aware Collection Tree Protocol in Wireless Sens 2017
Design of Energy Aware Collection Tree Protocol in Wireless Sens 2017
2
Amina Khatun, Tata Consultancy Services Ltd, Kolkata
3
Sahanowaj Khan, Assistant Professor, Dumkal Polytechnic, Dumkal
1
tanvir.cs@pace.edu.in
2
aminak77@gmail.com
3
khannowda84@gmail.com
Abstract— ,QWRGD\¶VZRUOG:61 :LUHOHVV6HQVRUQHWZRUN basically processes the data using the memory unit as well as
processing unit. Here process means data gathering, data
KDYH JDLQHG D ORW RI DWWHQWLRQ GXH WR LWV DSSOLFDWLRQV :LUHOHVV
6HQVRU 1HWZRUNV :61V FRQVLVW RI VPDOO QRGHV ZLWK VHQVLQJ
acquisition, data fusion, however it processes the received
FRPSXWDWLRQ DQG ZLUHOHVV FRPPXQLFDWLRQV FDSDELOLWLHV data either incoming or outgoing. Communication subsystems
'HVLJQLQJ D URXWLQJ SURWRFRO LQ :61 LV D YHU\ FKDOOHQJLQJ WDVN
provide Radio communication so that nodes in the WSN
PDQ\ URXWLQJ SRZHU PDQDJHPHQW DQG GDWD GLVVHPLQDWLRQ
communicate with each other to send the data. A power unit is
SURWRFROVKDYHEHHQVSHFLILFDOO\GHVLJQHGIRU:61VZKHUHHQHUJ\
mandatory for the subsystems stated above as it supplies
DZDUHQHVV LV DQ HVVHQWLDO GHVLJQ LVVXH 7KH IRFXV KRZHYHU KDV
EHHQJLYHQWRWKHURXWLQJSURWRFROVZKLFKPLJKWGLIIHUGHSHQGLQJvoltage. In WSNs, power subsystem is an important factor due
to the energy consumption. It supplies sufficient amount of
RQ WKH DSSOLFDWLRQ DQG QHWZRUN DUFKLWHFWXUH ,Q WKLV SDSHU ZH
KDYHGLVFXVVHGDURXWLQJSURWRFRO&73 &ROOHFWLRQ7UHH3URWRFRO current at the time of transmission and reception.
ZKLFK LV UHVSRQVLEOH IRU FRQVWUXFWLQJ DQG PDLQWDLQLQJ WKH The WSN networks are implemented using two
URXWLQJWUHHWRVHQGGDWDWRWKHURRWQRGH:HKDYHSURSRVHGDQ major architectures -Flat architecture and Hierarchical
DOJRULWKPZKLFKVDYHVHQHUJ\LQ&73LQURXWLQJE\UHFRYHULQJD architecture [5]. In flat architecture all sensor nodes are peer
GDPDJHG URXWH :H KDYH UXQ WKH &73 SURWRFRO RQ 7266,0 to each other and they have the equal role in performing
6LPXODWRULQ7LQ\RV
sensing task. In hierarchical architecture cluster is formed. A
cluster is the collection of some sensor nodes. There is a
Keywords— Wireless sensor networks, routing protocols,
cluster head in each cluster. The sensor nodes in the cluster
collection tree protocol, TOSSIM simulator.
cannot send the sensing data to the sink directly; they send
data to the cluster head. The cluster head collects the data
I. INTRODUCTION from the other sensor node and then it sends the data to the
sink. Hierarchical-based routing is the best match for
Wireless Sensor Network (WSN) is a collection of large
scalability and efficient communication [6].
number of sensor nodes (the number may be 100 to 1000)
WSN applications can be divided into two groups:
which are deployed over a region in an ad-hoc manner to
monitoring and tracking [8]. Monitoring applications are
perform a specific task [1]. The sensor nodes sense the
indoor/outdoor environmental monitoring, health and wellness
environment, gather the data and then communicate with each
monitoring, power monitoring, inventory location monitoring,
other through a wireless communication and ultimately
factory and process automation and seismic and structural
transmit the data to the Base Station. The base station may be
monitoring. Tracking applications consist of tracking objects,
a laptop or an access point connecting to a fixed infrastructure
animals, humans, and vehicles. While there are many
or a handheld device. The size of the sensor nodes is very
applications of WSN scattered in the world, few are listed
small. They are low costing, low powering, low processing
here are Security detection, Animal Monitoring, Inventory
and have limited memory. The main source of power is the
Monitoring, Patient Monitoring, Structural Monitoring,
battery of the sensor nodes. Development of smart sensor
Factory Monitoring, Inventory Monitoring, Machine
nodes by Micro-Electro-Mechanical Systems (MEMS)
Monitoring, Chemical Monitoring, Environmental Monitoring,
technology [2], the WSN has gained a lot of attention due to
Enemy Tracking In Defence Sector, Human Trafficking,
its lots of application in many fields such as monitoring,
Home Automation Etc.
tracking etc. in some recent years[3].
The sensor nodes in the WSN are resource
Sensor nodes consist of four major components i.e.
constraints. They have limited storage capacity, low
sensing subsystem, processing subsystem, power subsystem
processing power and constrained communication bandwidth
and communication subsystem [4]. Sensing subsystem play an
[7]. These limitations are because of the small physical size
important role as it set up a link between the real-timework
and limited energy of the sensor nodes. That is why it is very
and the computational environment. It is used to collect the
difficult to design security algorithm in wireless sensor
data of the changing environment. Processing subsystem
network. Energy is a major concern in WSN. Generally
978-1-5090-6480-9/17/$31.00©2017 IEEE 12
Proceedings of 2017 IEEE International Conference on Circuits and Systems (ICCS 2017)
energy consumed by the sensor node can be categorized in depicts results obtained from the work. The last section
three parts: (a) Energy needed for the sensor transducer (b) concluded our work.
Energy needed to communicate among the sensor nodes itself
(c) microprocessor computation. It is found in a study in that II. METHODOLOGY
to transmit a bit in WSNs sensor nodes takes about as much
power as executing 800 to 1000 instructions [15]. So in WSN A lot of algorithms and protocols to perform data
communication is much more costly than computation. collection in wireless sensor networks (WSNs) have been
Energy consumption is increased to expand a message or to developed within the last decade [10]. Among these, the
use a cryptographic function in security purpose in WSN and Collection Tree Protocol (CTP) is widely used for data
cost becomes high. Thus, while designing an algorithm for collection in WSN. CTP provides the “best-effort any cast
WSN we must focus on reducing power consumption by the datagram communication to one of the collection roots in a
algorithm. network” and its specification is provided in TinyOS
Routing protocols for WSN are accountable for Enhancement Proposal.
maintaining the routes in the network and have to guarantee In this work we have used CTP. The Collection Tree
consistent multi-hop communication [7]. Routing in WSNs is Protocol is responsible for the construction and maintenance
challenging than in other networks due to distinguish from of one or more routing trees having sink node as their root
other wireless networks like mobile ad-hoc networks or [11]. The sink can store the received packets or forward them
cellular networks because of the following issues [9]: to an external network, through a dependable and possibly
a) It is impossible to set up an international addressing scheme wired communication link. Within the network, nodes forward
for a huge quantity of sensor nodes. Therefore, traditional IP- packets through the routing tree up to the sink node. Each
based protocols are not suited for WSNs. In WSNs, node picks one of its adjacent nodes as its parent. Parent nodes
sometimes receiving the data is more significant than knowing are responsible of treating the packets they obtain from their
the IDs sending node. children and furthering them towards the sink. To construct
b) In contradiction of classic communication networks, nearly and maintain a routing tree a collection protocol must thus
all applications of sensor networks need the flow of sensed first of all define a metric each node can use to select its
data from numerous sources to a specific base station. parent. The distance in hops to the sink or the quality of the
c) Sensor nodes have limitations in terms of energy, local message link can for instance be used as metrics for
processing and storage capacities. Therefore, they need parent selection. In either case, nodes require to assemble
carefully resource management. information about their adjacent nodes so as to calculate the
d) Sensor networks are application oriented, i.e., design needs parent selection metric. To get the metric nodes frequently
of a sensor network alter with application. exchange corresponding messages, typically called beacons
e) Position consciousness of sensor nodes is significant since that contain information about, e.g., the distance in hops of the
data gathering is generally based on the location. node to the sink or its residual energy. In CTP routing, a node
f) Data composed by several sensors is naturally based on does not forward a message to a particular root instead, it
common phenomenon; henceforth there is a high chance that implicitly selects a root by choosing a next hop. Nodes
this data has certain redundancy. produce routes to roots by a routing gradient. That is why CTP
g) The job of discovery and maintaining routes in WSNs is is called address free. CTP assumes that it has link quality
nontrivial since energy limits and unexpected changes in node estimates of some number of nearby neighbors CTP has
status (e.g. failure) cause frequent and unpredictable several mechanisms in order to improve delivery reliability. It
topological changes. gives best effort delivery service. Usually CTP is designed for
The routing algorithms can be categorized into three comparatively low traffic. CTP uses Expected Transmissions
classes depends on the underlying network structure: flat, (ETX) as a routing metric ETX of root=0 and ETX of a node
hierarchical, and location-based routing. Examples of flat = ETX of its parent + ETX of the link to parent CTP should
Routing Protocols are SPIN, Directed diffusion, Rumor choose the route with the lowest ETX .
routing, MCFA, Gradient-based routing, COUGAR, We know energy is a major concern in sensor node.
ACQUIRE etc. Examples of hierarchical Routing Protocols When the number of transmission grows the energy loss of the
are LEACH, PEGASIS, MECN, Self-organizing protocol, node also increases. So the node near to the root node which
TTDD etc. Examples of location Based Routing Protocols are spreads the maximum no of packets to the root node will die
GEAR, GPSR, Geographic Adaptive Fidelity, MFR, DIR and very soon due to energy loss. Whenever the node dies a new
GEDIR, SPAN etc. CTP is a collection routing protocol that route in CTP is formed. Our proposal is that instead of
attains both agility and effectiveness, while providing highly forming new route, if we recover the previous damaged route
reliable data delivery in sensor networks. CTP has been used then it is much better with respect to energy and time. We
in research, teaching, and in commercial products [16]. discuss our proposal elaborately by explaining with an
In this paper, we have proposed an algorithm for example below. Consider the CTP network provided in fig.
energy saving using CTP routing. Section 2 of the paper [1].
explains the methodology we used in this work. Section 3
13
Proceedings of 2017 IEEE International Conference on Circuits and Systems (ICCS 2017)
(I3URFHHGLQJVRI,(((,QWHUQDWLRQDO&RQIHUHQFHRQ&LUFXLWVDQG6\VWHPV ,&&6
IV. CONCLUSIONS
Fig. 4: node 9 sends packet to the root node 0 through the route 9->3->0
15
Proceedings of 2017 IEEE International Conference on Circuits and Systems (ICCS 2017)
REFERENCES
[1] Rudranath Mitra and Tauseef Khan, “Secure and [9] Hussain, Zair, M. P. Singh, and R. K. Singh. "Analysis
Reliable Data Transmission in Wireless Sensor Network: of lifetime of wireless sensor network." International
A Survey”, International Journal Of Computational Journal of Advanced Science and Technology 53 (2013):
Engineering Research, May-June 2012 , Vol. 2, Issue 117-126.
No.3, 748-754. [10] Johnson, Dhinu, and Gurdip Singh. "Data Gathering
[2] Sasikumar, Ramamoorthy, and Natheem, "An Analysis Protocols for Wireless Sensor Networks." World
on Animal Tracking System using Wireless Academy of Science, Engineering and Technology,
Sensors." International Journal of Advanced Research in International Journal of Electrical, Computer, Energetic,
Computer Science and Software Engineering 4.9 (2014): Electronic and Communication Engineering 6.6 (2012):
155-162. 553-559.
[3] Kalita and Kar, “Wireless Sensor Network Security [11] Colesanti, Ugo, and Silvia Santini. "The collection tree
Analysis”, International Journal of Next-Generation protocol for the castalia wireless sensor networks
Networks (IJNGN),Vol.1, No.1, 2009. simulator." Department of Computer Science, ETH
[4] Kotapati et al., “A Survey on the Energy Conservation in Zurich, Tech. Rep 729 (2011).
Wireless Sensor Networks”, International Journal of [12] Levis, Philip, et al. "Tinyos: An operating system for
Advanced Research in Computer Engineering & sensor networks." Ambient intelligence. Springer Berlin
Technology (IJARCET), Volume 2, Issue 10, 2013. Heidelberg, 2005. 115-148.
[5] Motdhare, Puranik, and Malkhandale, “Study of Various [13] Gay, David, et al. "The nesC language: A holistic
Congestion Control Protocols in Wireless Sensor approach to networked embedded systems." Acm
Networks”, International Research Journal of Sigplan Notices. Vol. 38. No. 5. ACM, 2003.
Engineering and Technology (IRJET), Volume: 03 Issue: [14] Levis, Philip, and Nelson Lee. "Tossim: A simulator for
04 | April-2016 tinyos networks." UC Berkeley, September 24 (2003)
[6] Muhammad Ullah and Ahmad, “Evaluation of Routing [15] Khan, Shafiullah, Al-Sakib Khan Pathan, and Nabil Ali
Protocols in Wireless Sensor Networks”, Master Thesis, Alrajeh, eds. Wireless Sensor Networks: Current Status
2009. and Future Trends. CRC Press, 2016.
[7] Singh et al., “Routing Protocols in Wireless Sensor [16] https://sing.stanford.edu/gnawali
Networks – A Survey”, International Journal of
Computer Science & Engineering Survey (IJCSES)
Vol.1, No.2, November 2010.
[8] Prachi Pandey, “Study Of WSNs: Its Application and
Types”, International Journal of scientific research and
management (IJSRM) ,Volume 3, Issue 6, 3196-3201,
2015.
16
17