Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
ENERGY EFFICIENT MULTI LEVEL AND DISTANCE
CLUSTERING MECHANISM FOR WIRELESS SENSOR
Submitted in partial fulfillment of the requirement s for the degree of DOCTOR OF
Supervisor-I Dr. Shafiullah K
Supervisor-II Dr. Bilal Shams
Institute of Information TechnologyKohat University of Science & Technology, Kohat
ENERGY EFFICIENT MULTI LEVEL AND DISTANCE
CLUSTERING MECHANISM FOR WIRELESS SENSOR
NETWORKS
Submitted in partial fulfillment of the requirement s for the degree of DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE
by
AMJAD MEHMOOD
CS420112001
Dr. Shafiullah Khan Institute of information Technology KUST, Kohat
Dr. Bilal Shams Institute of information Technology KUST, Kohat
Institute of Information Technology Kohat University of Science & Technology, Kohat-2600,
Pakhtunkhwa, Pakistan August, 2014
ENERGY EFFICIENT MULTI LEVEL AND DISTANCE AWARE
CLUSTERING MECHANISM FOR WIRELESS SENSOR
Submitted in partial fulfillment of the requirement s for the degree of COMPUTER SCIENCE
Institute of information Technology .............. Signature
Institute of information Technology ............... Signature
2600, Khyber-
i
Similarity Index Certificate
The Thesis/Synopsis ____________________________________________________ (Line 1 of the title in bold)
___________________________________________________ (Line 2 of the title in bold, if any)
___________________________________________________ (Line 2 of the title in bold, if any)
Submitted by: ___________________________________________________ (Full Name of the Student in bold)
___________________________________________________ (Registration Number of the Student)
Through the: ___________________________________________________ (Chairman/Director)
____________________________________________________________________________
(Department/Institute)
was scanned using the software Turnitin. A total number of _________ words
(Excluding the table of contents, references, and the other preliminary pages) were
scanned and a similarity of ________ percent was found against the acceptable limit
(19%) set by the Higher Education Commission of Pakistan. The above titled
document is, therefore, declared Not Plagiarized. This certificate is issued on______ (Plagiarized/Not Plagiarized) (Date)
Prepared by: _____________________________ ______________________ (Full Name of the QEC official who scanned the document) Signature
______________________
Director QEC
Kohat 26000, Khyber Pakhtunkhwa, Pakistan, Tel #0922-52914786, Fax # 0922-554556
Kohat University of Science and Technology
ii
CERTIFICATION FROM THE SUPERVISORS
This thesis entitled ENERGY EFFICIENT MULTI LEVEL AND DISTANCE
AWARE CLUSTERING MECHANISM FOR WIRELESS SENSOR
NETWORKS submitted by MR. AMJAD MEHMOOD to the Kohat University of
Science &Technology for the award of DOCTOR OF PHILOSOPHY IN
COMPUTER SCIENCE presents bonafide research work carried out under our
supervision. This work (in full or in part) has not been submitted to any other
Institution for award of any degree/ diploma/certificate.
Supervisor-I ________________________ __________________ (Name) (Signature) ______________________________________________________ (Affiliation) Supervisor-II ________________________ __________________ (Name) (Signature) ______________________________________________________ (Affiliation)
Dr. Shafiullah Khan
Dr. Bilal Shams
Institute of IT, KUST
Institute of IT, KUST
iii
CERTIFICATION FROM THE EXAMINERS
This thesis entitled ENERGY EFFICIENT MULTI LEVEL AND DISTANCE
AWARE CLUSTERING MECHANISM FOR WIRELESS SENSOR NETWORKS
presents a bonafide record of original research work carried out by AMJAD ME-
HMOOD in partial fulfillment of the degree of DOCTOR OF PHILOSOPHY IN
COMPUTER SCIENCE, Kohat University of Science & Technology, Kohat. We find
the work satisfactory for the award of the degree if other requirements are met. The
Viva Voce was held on (date) .
Internal Examiner ________________________ ______________
(Name) (Signature)
___________________________________________________
(Affiliation)
External Examiner ________________________ ______________
(Name) (Signature)
___________________________________________________
(Affiliation)
Chairman/Director:
(Name & Signature)
iv
ACKNOWLEDGMENT
The success and final outcome of this research required a lot of guidance and assistance
from many people and I am extremely fortunate to have got this all along the completion
of my research work. Whatever I have done is only due to such guidance and assistance
and I would not forget to thank them.
I respect and thank Dr. Shafi Ullah Khan, for giving me an opportunity to do the research
work in WSNs and providing me all support and guidance which made me complete the
research on time. I am extremely grateful to him for providing such a nice support and
guidance though he had busy schedule managing the office affairs.
I heartily thank our internal research supervisor, Dr. Bilal Shams, Director, Institute of
Information Technology, for his guidance and suggestions throughout my research work.
I owe my profound gratitude to Prof. Dr. Jaime LIoret, who took keen interest in my
research work and guided me all along, till the completion by providing all the necessary
information for developing a good system.
I would not forget to remember Mr. Abdur Rehman, Mr. Roman, Dr. Jawad Ashraf, Dr.
and Dr. Asad Habib, of Institute of Information Technology for their unlisted
encouragement and more over for their timely support and guidance till the completion of
my research work.
I am thankful to and fortunate enough to get constant encouragement, support and
guidance from all teaching staffs of Institute of IT which helped me in successfully
completing my research work. Also, I would like to extend our sincere regards to all the
non-teaching staff of my Institute for their support.
Amjad Mehmood.
v
No man succeeds without a good woman behind him. Wife or mother, if it is both, he is twice blessed indeed.
Dedicated to my mother and wife
vi
By Amjad Mehmood Institute of Information Technology, KUST, Kohat, Khyber PakhtunKhwa, Pakistan
Summary
PhD Thesis (2014)
vii
The latest progresses and the amalgamation of micro electro-mechanical systems
technology, integrated circuit technologies, nanotechnology and microprocessor
hardware, wireless communication, ad-hoc networking, distributed signal processing, and
embedded systems have made the notion of Wireless Sensor Networks (WSNs). It
enables the administrator to examine and act in response to a phenomenon in appropriate
surroundings. The WSNs consist of large number of small, low-cost, multi-functional
machines known as sensor nodes that have the capability to sense, process and
communicate with each other. The comfort of installation, economical cost, multi-
functional, and ad-hoc character has illustrated WSN an interesting option for many
applications, such as health-care applications, environmental monitoring, transportation,
military practices, weather forecasting, safe-keeping applications, fire detection, real time
tracking, and so on. WSNs have some constraints such as memory, bandwidth, hardware,
and computation. The plan of this study is to recognize the limitations of WSN and
investigate their unplanned act of routing protocols. We propose Energy-Efficient Multi-
level and Distance-Aware Clustering (EEMDC) mechanism for WSNs. In this
mechanism the network area is divided into three logical layers with respect to the BS.
The logical partition of the network area helps to bridge the problem of distributing
workload among clusters in the network. Similarly, in order to enhance the performance
of the protocol, it selects the Cluster Head (CH) by acquiring the average residual energy
divided by average hop-count values of the nodes. It derives combined data to BS by
practicing minimum CHs as relay nodes.
In order to demonstrate the overall network lifetime, an experiential inspection has been
conducted in OMNET++. It is an object oriented modular discrete event based simulator
viii
having Castalia-3.2 as plug-in for WSN and Body Area Network (BAN). We simulated
different routing protocols, taking into consideration their challenges and the results are
shown. Different results show that EEMDC is more energy-efficient as compared to
other existing conventional protocols, such as Minimum Transmission Energy (MTE),
Direct, Low Energy Adaptive Clustering Hierarchy (LEACH), Low Energy Adaptive
Clustering Hierarchy-Centralized (LEACH-C), A Hybrid, Energy-Efficient, Distributed
Clustering (HEED), and Dynamic Clustering and Distance Aware Routing Protocol
(DDAR).
ix
Contents
PhD Thesis (2014) By Amjad Mehmood Institute of Information Technology, KUST, Kohat, Khyber PakhtunKhwa, Pakistan
x
ACKNOWLEDGMENT ....................................................................................................................... IV
SUMMARY ............................................................................................................................................ VI
CONTENTS ............................................................................................................................................ IX
LIST OF FIGURES .............................................................................................................................. XII
LIST OF TABLES .............................................................................................................................. XIV
LIST OF ACRONYMS ........................................................................................................................ XV
CHAPTER # 01
INTRODUCTION
1.1 WIRELESS SENSOR NETWORKS .............................................................................................................. 1 1.2 RESEARCH OBJECTIVES ......................................................................................................................... 4 1.3 OVERVIEW OF THE RESEARCH ............................................................................................................... 4 1.4 PROBLEM STATEMENT ........................................................................................................................... 6 1.5 ORGANIZATION OF THESIS ..................................................................................................................... 8
CHAPTER # 02
LITERATURE REVIEW
2.1 INTRODUCTION ...................................................................................................................................... 9 2.1.1 Applications of WSN .................................................................................................................... 14
2.2 WSNS ROUTING CHALLENGES COMPARED WITH OTHER WIRELESS NETWORK .................................. 16 2.3 ROUTING PROTOCOLS CLASSIFICATION ............................................................................................... 18
2.3.1 Structure Base Routing Protocols ................................................................................................ 21 2.3.2 Protocol Operation based Classification..................................................................................... 31 2.3.3 Sensor Node architecture based Classification ........................................................................... 39 2.3.4 Packet’s Destination based Classification................................................................................... 40 2.3.5 Source -Destination Recovery based classification ..................................................................... 43 2.3.6 Cooperative Routing .................................................................................................................... 44 2.3.7 Protocol’s initialization point based classification ..................................................................... 44 2.3.8 Epidemic behavior based Classification ...................................................................................... 45 2.3.9 Application based routing protocols Classification ..................................................................... 46 2.3.10 K. Sha et al. based Classification .............................................................................................. 46 2.3.11 M. Perillo et al. based Classification......................................................................................... 46 2.3.12 State based Classification .......................................................................................................... 47 2.3.13 Energy-Efficient Routing Protocols based Classification .......................................................... 48
2.4 DISTINCTIVENESS OF CLUSTER BASED ROUTING PROTOCOLS .............................................................. 61 2. 5 ROUTING CHALLENGES AND DESIGN ISSUES ...................................................................................... 61
2.5.1 Node Placement ........................................................................................................................... 62 2.5.2 Energy Utilization without Losing Precision ............................................................................... 62 2.5.3 Data Reporting Model ................................................................................................................. 63 2.5.4 Node/Link Heterogeneity: ............................................................................................................ 63 2.5.5 Fault Tolerance ........................................................................................................................... 64 2.5.6 Scalability .................................................................................................................................... 64 2.5.7 Network Dynamics ....................................................................................................................... 65 2.5.8 Transmission Media .................................................................................................................... 65 2.5.9 Connectivity ................................................................................................................................. 65 2.5.10 Coverage .................................................................................................................................... 66 2.5.11 Data Aggregation ...................................................................................................................... 66 2.5.12 Quality of Service (QoS) ............................................................................................................ 66 2.5.13 Network Cost ............................................................................................................................. 67
2.6 COMPARATIVE ANALYSIS .................................................................................................................... 67
xi
CHAPTER # 03
ENERGY-EFFICIENT MULTI-LEVEL AND DISTANCE-AWARE CLUSTERING MECHANISM FOR WSNS
3.1 INTRODUCTION ............................................................................................................................... 85 3.2 EEMDC OPERATION ....................................................................................................................... 87
3.2.1 DATA TRANSMISSION FROM CLUSTER HEAD TO THE BASE STATION ............................ 93 3.2.2 FLOWCHART OF THE EEMDC OPERATION .......................................................................... 93
3.3 SIMULATION RESULTS .................................................................................................................. 99 3.3.1 Network and Radio Model ........................................................................................................... 99 3.3.2 Simulation Model ....................................................................................................................... 101 3.3.3 Performance Evaluation ............................................................................................................ 102
3.4 CONCLUSION...................................................................................................................................... 120
CHAPTER # 04
CONCLUSIONS AND FUTURE WORK
4.1 CONCLUSIONS .................................................................................................................................... 122 4.2 FUTURE WORK .................................................................................................................................. 125
BIBLIOGRAPHY ........................................................................................................................... 126
xii
List of Figures
Figure 1.1. Workflow of wireless sensor network ........................................................................................... 1
Figure 1.2. Cluster based strategy for WSNs .................................................................................................. 3
Figure 1.3. A round in cluster based protocols ................................................................................................ 4
Figure 2.1.Sensor node components .............................................................................................................. 10
Figure 2.2. Routing protocols in WSNs ........................................................................................................ 21
Figure 2.3. Single-hop and multi-hop connections to the sink ...................................................................... 24
Figure 2.4. Categorization of different characteristics of clustering in WSNs .............................................. 30
Figure2.5. Directed diffusion scenario .......................................................................................................... 33
Figure 2.6. Directed diffusion: (a) interest propagation, (b) initial gradients set up, and (c) data delivery. .. 34
Figure 2.7. Query plan at a bellwether node: The bellwether node acquires all the understandings,
determines the average and if it is more preponderant than a threshold throw it to the BS........................... 35
Figure 2.8. Categorization of routing protocols ............................................................................................ 40
Figure 2.9. Percentage of number of nodes death vs. number of rounds in the area of 50m*50m ................ 70
Figure 2.10. Percentage of nodes death vs number of rounds in the area of 100m* 100m .......................... 71
Figure 2.11. Number of rounds over number of nodes alive ......................................................................... 73
Figure 2.12 (a) . Number of rounds against number of data messages received ........................................... 74
Figure 2.12 (b). Average energy dissipation against number of data messages received .............................. 75
Figure 2.13. Average energy dissipation over varying network areas ........................................................... 77
Figure 2.14. Number of nodes alive as a function of network area ............................................................... 78
Figure 2.15. First node death over the simulation time [seconds] ................................................................. 79
Figure 2.16. Total 100 nodes: half node die (HND) over the simulation time [seconds] .............................. 80
Figure 2.17. Total 100 nodes: last node die (LND) over simulation time [seconds] ..................................... 81
Figure 2.18. Energy consumed by nodes over simulation time [seconds] ..................................................... 82
Figure 2.19. Number of nodes alive over simulation time [seconds] ............................................................ 83
Figure 2.20. Energy utilized by nodes over simulation time [seconds] ......................................................... 84
Figure 3.1. LEACH protocol's round details (Adv CH: Advertisement advertise by CH, TDMA Sch:
TDMA Schedule) .......................................................................................................................................... 86
Figure 3.2. Message flow in a cluster (FLC) ................................................................................................. 91
Figure 3.3. EMCDR protocol's logical division in levels (TLC, SLC, FLC) ................................................ 92
Figure 3.4. Flowchart of EMCDR working ................................................................................................... 95
Figure 3.5. Calculate hop-count and cluster level ......................................................................................... 96
Figure 3.6. Sending data to the BS considering minimum hop ..................................................................... 97
Figure 3.7. EEMDC’s algorithm: process of clustering in WSNs ................................................................. 99
Figure 3.8. Total 100 nodes: first node die (FND) over simulation time [seconds] .................................... 105
Figure 3.9. Total 200 nodes: first node die (FND) over simulation time [seconds] .................................... 105
xiii
Figure 3.10. Total 100 nodes half node die (HND) over simulation time [seconds] .................................. 106
Figure 3.11. Total 200 nodes half node die (HND) over simulation time [seconds] .................................. 107
Figure 3.12. Total 100 nodes: last node die (LND) over simulation time [seconds] .................................. 108
Figure 3.13. Total 200 nodes: last node die (LND) over simulation time [seconds] ................................... 109
Figure 3.14. Energy consumed by nodes over simulation time [seconds] .................................................. 110
Figure 3.15. Number of nodes alive over simulation time [seconds] ......................................................... 111
Figure 3.16. Percentage of node death vs number of rounds in the area of 50m* 50m .............................. 113
Figure 3.17. Percentage of node death vs number of rounds in the area of 100m* 100m .......................... 114
Figure 3.18. Number of rounds over a number of nodes alive .................................................................... 115
Figure 3.19 (a). Number of rounds over a number of data messages received ............................................ 116
Figure 3.19 (b). Number of rounds over number of data messages received .............................................. 117
Figure 3.20. Network Area over number of nodes alive ............................................................................. 118
Figure 3.21. Network area over average energy dissipation ........................................................................ 120
xiv
LIST OF TABLES
Table 2.1. Applications of WSNs .................................................................................................................. 16
Table 2.2. Routing protocols classification ................................................................................................... 21
Table 2.3. Hierarchical vs. flat topologies routing ........................................................................................ 25
Table 2.4: Energy consumption by nodes as either useful or wasteful source .............................................. 48
Table 2.5. Summary of the most important features of the routing protocols included in this section ......... 60
Table 2.6. Simulation parameters for Figure 2.11 and Figure 2.12 ............................................................... 68
Table 2.7. Percentage of node death over network area of 50m *50m and 100m*100m .............................. 69
Table 3.1. Clustering protocols categorization parameters............................................................................ 86
Table 3.2. Notation used in the equations ................................................................................................... 101
Table 3.3. Network model parameters......................................................................................................... 102
Table 3.4. Percentage of node death over a network area of 50m *50m and 100m*100m ......................... 112
xv
List of Acronyms
Wireless Sensor Networks WSNs Energy Efficient Multi Level and Distance Aware Clustering EEMDC Base Station BS Cluster Head CH Analog-to-Digital Converter ADC Quality of Service QoS Global Position System GPS Medium Access Control MAC Time Division Multiple Access TDMA Mobile Ad hoc Network MANET Sensor Protocols for Information via Negotiation SPIN Directed Diffusion DD Rumor Routing RR Stream Enable Routing SER Gradient Based Routing GBR Threshold Sensitive Energy Efficient Sensor Network Protocol TEEN Adaptive Periodic APTEEN Constrained Anisotropic Diffusion Routing CADR Low-Energy Adaptive Cluster Hierarchy LEACH Leach-Centralized LEACH-C Small Mecn SMECN Geography Adaptive Fidelity GAF Self-Organization SOP Hierarchical Periodic Event-Driven and Query-Based HPEQ Power Efficient Gathering in Sensor Information System PEGASIS Hierarchical PEGASIS H-PEGASIS Hierarchical Energy Aware Protocol for Routing and Aggregation in Sensor Networks
HEAP
Simple Hierarchical Routing Protocol SHRP Minimum Energy Communication Network MECN Small MECN SMECN Geographic and Energy Aware Routing GEAR Stateless Protocol for Real-Time Communication in Sensor Network SPEED Stateless Non-Deterministic Geographic Forwarding SNGF Single Winner Algorithm SWE Multi Winner Algorithm MWE Sensor Nodes SN Distance Source Routing DSR Destination-Sequenced Distance Vector Routing DSDV Ad hoc on Demand Distance Vector Routing AODV Greedy/ Geographic Forwarding GF Face Routing FR Attributes A Soft Threshold ST Hard Threshold HT Court Time CT Heterogeneous Heed H-HEED Reactive Energy Decision Routing Protocol REDRP Scaling Hierarchical Power-Efficient Routing SHPER Simple Energy-Efficient Routing SEER Balance Energy-Aware Routing BEAR Dynamic Clustering And Distance Aware Routing Protocol DDAR First Node Death FND
xvi
Last Node Death LND Half of The Nodes Alive HNA Minimum Transmission Energy MTS Distance-Energy Cluster Structure Algorithm DECSA Hierarchical Routing Protocol HRP Low Energy And Adaptive Clustering Hierarchy LEACH Partition Based Leach pLEACH Power Efficient And Adaptive Clustering Hierarchical PEACH Hybrid Energy Efficient Distributed HEED Energy Efficient Heterogeneous Clustered Scheme For Wireless Sensor Networks
EEHC
Tree-Base Clustering Protocol CBT Energy Efficient Clustering Scheme EECS Dynamic Clustering And Distance Aware Routing Protocol DDAR First Level Clusters FLC Second Level Clusters SLC Third Level Clusters TLC Average Hop-count Value AvgHcv Node’s Energy NdeEnergy Single Hop, Multi Hop SH ,MH Cluster Member CM Average Residual Energy AvgRE
INTRODUCTION
PhD Thesis (2014)
By Amjad Mehmood Institute of Information Technology, KUST, Kohat, Khyber PakhtunKhwa, Pakistan
1
1
1.1 Wireless Sensor Networks
Due to recent advancements in electronic circuitry, WSNs have achieved great interest of
academia and industries. They are deployed in harsh and unattainable environments. A
WSN is made up of large number of sensing devices called nodes, which are associated
wirelessly. Each node in a network consists of short memory, low Central Processing
Unit (CPU) power, limited battery, and transceiver device for sending and receiving data.
Its size and cost depends upon the application. In a sensor network, all the nodes work in
such a manner to get information from the physical environment, process it, and send the
information to the Base Station (BS) for making the decisions [1] as shown in figure 1.1.
The research community has proposed different types of routing protocols to decrease the
energy dissipation, and hence increases the battery life of the network. Intended for
Figure 1.1. Workflow of wireless sensor network
Sensor Nodes
Sensor field
BS
Internet and Satellite
2
energy efficiency among the nodes in WSNs, researchers proposed different types of
techniques such as tree, chain, grid, density, model, and minimum transmission.
However, it has been observed that cluster based protocols are more energy efficient as
compared to the mentioned techniques [3]. Cluster is defined as the collected works of
nodes into groups. In cluster based methodology, there are three main entities such as
CH, members, and BS. The CH collects data from the members. CHs then send the data
for decision making to BS as shown in figure 1.2.
The disadvantages of cluster based routing protocols are as follow:
There is a need to deploy an optimal number of CHs, otherwise, these protocols act same
as flat based protocols.
Division of nodes into clusters creates latency or delay in the network so it could affect
the throughput of the network.
Overlapping among the clusters should be minimized otherwise, it could also affect the
overall lifetime due to traffic congestion.
Nomination of the CHs could also affect the lifetime if we select the node having
minimum energy in cluster, it will get down sooner.
Clusters near BS consume more energy than the clusters far away, so they should
properly be managed to balance the workload among the clusters.
The size of the clusters does matter in energy consumption.
Intra and inter-clusters distances should also be regarded to save the rate of energy
consumption.
Cluster based routing protocols
disadvantages.
Cluster based routing
setup and steady phase
(i) Setup phase
It is further
(a) CH selection
(b) Formation
Cluster based routing protocols could be more energy efficient if we address its
Cluster based routing protocol work in rounds. Each round consists of two phases
phases.
phase
further subdivided into
election
ormation of cluster
Member of Cluster
Base Station(BS)
Figure 1.2. Cluster based strategy for WSNs
3
more energy efficient if we address its
work in rounds. Each round consists of two phases, i.e.
Cluster Head(CH)
Shows flow of data
4
(ii) Steady phase
It is further subdivided into
(a) Aggregation of data
(b) Communication of data
This mechanism is shown in figure 1.3.
1.2 Research Objectives
The main objectives of this work are
• To increase the lifetime of WSNs
• To develop scalable, fault-tolerant, and load-balancing mechanism
• To divide the whole network into multi-levels to avoid the funneling effect
• To increase the throughput and decrease the delay
1.3 Overview of the Research
The research has the following features:
Setup Sate
Steady State
CH Selection Formation of Cluster Aggregation of Data Data
Communication
Round
Figure 1.3. A round in cluster based protocols
Setup phase Stead phase
5
i. Each node in WSNs has limited energy, and usually deployed in harsh
environments. Therefore, their energy can’t be recharged incase of depletion. This
limited energy is used by the nodes for sensing, processing, and communication.
In comparison the communication process consumes more energy than the others.
Therefore, in order to increase the lifespan of network for sending the data from
sensor nodes to BS, energy-efficient routing protocol is highly demanded by the
environment.
ii. In a network some nodes perform more tasks than others which could lead to
deplete their energy earlier. Hence, in order to distribute the workload among the
nodes in the network, load-balancing mechanism is required.
iii. In steady phase, in the multi-hop scenario, the CHs away from BS send their data
using more than one CHs as a relay node. As more CHs are used as relay node, so
it would increase delay as well as minimize the lifetime of the overall network.
Therefore, less numbers of CHs are used as a relay node, in order to maximize the
lifetime and minimize the delay in sending the data from CH to BS.
iv. It is the network of hundreds of thousands of nodes interconnected wirelessly with
each other. So in dense environment more than one node can sense the
phenomenon and send the data to the CHs. As a result, redundant data reaches the
CH, in case CH broadcasts the same data. It causes congestion on the channel,
and wastes the energy of the nodes. In order to fuse the redundant data,
aggregation is performed on the CH, to reduce the congestion and consume less
amount of energy of node which receives it.
6
v. Each node in the network has an equal chance to become the CH of the cluster,
but the decision is made on the basis of residual energy of the nodes.
vi. The distance between the nodes, the CH, and between the CHs and BS is also
considered in order to save the energy of the network. Otherwise it may cause
congestion on the channel which may result in consumption of the energy. Hence
it affects the overall performance of the system.
vii. As the network consists of large numbers of nodes, therefore, keeping the whole
routing table at individual node is difficult, and it also makes use of high
bandwidth during communication. Therefore, clustering technique makes the
routing table localized to the cluster and also makes use of limited bandwidth due
to inter-cluster communication to CHs.
viii. Clustering mechanism helps to achieve scalability factor. It handles large number
of nodes in the network and their associated functions and tasks. Hence it helps to
scale to such a high level to acquire advantage of high density of such network.
ix. Nodes in WSNs are more prone to unexpected failure as compared to other
networks. The clustering mechanism brings the fault tolerance ability to the nodes
in the network, so that they may sustain for longer periods of time.
1.4 Problem Statement
WSNs have several design and implementation challenges, primarily due to insufficient
resources and restricted abilities such as processing, storage, bandwidth, sensing,
communication, and scalability. However, one of the most important constraints in WSNs
is the battery or lifetime of the sensor nodes. The routing protocols are divided into two
7
main categories such as flat, and cluster/hierarchical based protocols. Flat based protocols
have following shortcomings:
• They consume more energy.
• They are less scalable.
• They produce high data transmission, which may result in network congestion.
• They can’t perform load balancing.
Hierarchical or Cluster based protocols have the following shortcomings:
• Clusters near BS consume more energy as compared to cluster away from BS.
• The distances between member nodes and CH and to BS onward also play an
important role in energy dissipation.
• Overlapping of the clusters also affects the lifetime of a network.
• The size of clusters does matter as moving away from BS.
• The number of nodes in a cluster is also one of the concerns of energy
dissipation.
• The CH responsibility on the nodes is one of the factors to consume energy.
• As CHs might have redundant data in their ranges which need to be aggregated,
otherwise consume energy due to propagating of redundant data in the network.
• The CHs Send the data to BS over the CHs as relay nodes in multi-hop
communication could affect the lifetime of the network.
By considering the above mentioned problems of flat and cluster based protocols, it is
desirable to design an energy-efficient routing protocol. Therefore, we proposed EEMDC
routing protocol which is more energy efficient than the existing protocols. It helps
8
reduce the energy consumption by dividing the nodes of the network into many small
segments. Moreover, cluster based protocols constraints are addressed in EEMDC by
organizing clusters in multi-level with respect to BS. This can further enhance the
performance, energy load-balancing, scalability and the network- lifetime of the sensor
nodes in the network.
1.5 Organization of Thesis
The chapter-wise organization of the thesis is as follows:
Chapter 2: discusses the energy efficient communication protocols for WSNs suggested
by the research community.
Chapters 3: gives details of the contributions in regards to energy efficient routing
protocol for wireless sensor networks.
Chapter 4: explains the conclusions drawn out of the thesis and directions for future
work of the research.
LITERATURE REVIEW
PhD Thesis (2014)
2
By Amjad Mehmood Institute of Information Technology, KUST, Kohat, Khyber PakhtunKhwa, Pakistan
9
2.1 Introduction
The distributed nature and dynamic topology of WSNs introduces very special
requirements in routing protocols that should be met. The most important feature of a
routing protocol, in order to be efficient for WSNs, is the energy consumption and the
extension of the network's lifetime. Many routing, power management, and data
dissemination protocols have been specifically designed for WSNs where energy
awareness is an essential design issue. Routing protocols in WSNs might differ
depending on the application and network architecture. Consequently, the WSNs are
usually application specific. The most important are military, environment- monitoring,
agricultural-activities, industry, healthcare, cardiac, weather monitoring, sleep-apnea,
disaster-recovery, temperature, security, sound, and water applications [3]. With the
advancement in the technology, the nodes in the WSNs become more accurate, reliable,
energy efficient, smaller in size, cheaper in cost, and robust. This technology has already
addressed different types of applications from fortification to support. It is cost-effective,
easy to install, changes with industry needs, and its uses are countless. It comprises of
small nodes with inadequate processing, storing, sensing, bandwidth, and energy (or
battery power) for communication. Each sensor device consists of a microcontroller for
processing, one or more flash memories to keep long-lived data and program-code, for
dynamic data it needs RAM, for communication it needs wireless-transceiver, an analog-
to-digital converter (ADC), one or more sensors, power source, and an antenna. Consider
the example of MicaZ mote of Crossbow, it has an Atmel Atega microcontroller, 4KB
RAM , 128KB program flash , 512KB flash memory, IEEE 802.15.4 2.4-GHz transceiver
10
supports 250 KBps maximum, and 50 meters of range, ADC supports 10-bit, and runs
two AA batteries which draw 8 mA in active mode [4].
It has the capability to correspond with each other and drive their info to the sink or put
on the air the data to BS directly. The BS is the place which has no resource constraint
like processing, storing, power supply, and others. Once the data arrives on BS, it moves
the data collected from WSNs to internet, where users take a decision accordingly as
shown in figure 2.1.
Figure 2.1.Sensor node components
Po
we
r Un
it
Se
nso
r A
DC
Processing
Storing
Position Finding System Mobilizer
Tra
nsce
iver
Internet/
Satellite
BS
User
11
They are deployed sparsely or densely to the field depending on application requirements
and environment of deployment field. Moreover, nodes are randomly or deterministically
installed. When the nodes are manually mounted then they are normally sparsely
deployed and work under the attended environments, e.g. bridge monitoring, or fire alarm
system. Since nodes are dropped from an airplane or helicopter in disaster affected areas
and work in unattended manner, they get the updates about the area, and make the rescue
squared more equipped about the situations.
In fact, the nodes in WSN have a number of limitations, but energy or battery life is the
most crucial one. Since, nodes are normally planted in the environments which are
unworkable for the user, i.e. battlefield, military surveillance, and moisture tracking,
therefore, recharge or replace of the battery is impossible. Hence, bring into being a huge
issue for network designers, to develop an energy proficient routing protocol for WSNs.
Additionally, sensor nodes are unable to work properly due to their unreliable and
breakable behavior, in order to fix such problem nodes are densely deployed in the
environment. Therefore, all the algorithms and protocols suggested by research
community are mostly energy efficient to increase the functioning lifetime of the
network.
In the recent past years, a huge number of researches have been done in WSNs, which are
increasing the association, processing, and management of the sensor nodes in the
gathering of data from the environment. Sensor nodes have limited resources. Due to
limitations of the constraints and the installation of a huge number of nodes fabricates a
large number of design, management confronts, and focus to consider the energy
consciousness at all the levels of the protocol stack, e.g. at the network level, it is
12
considered that how energy-efficiently the data would be collected from the sensor motes
and routing to BS, in order to escalate the lifespan of the network.
By taking into account the inherited characteristics of WSNs, there are many types of
routing protocols which have been suggested by the research community. The direction-
finding protocols are categorized into the following three groups:
� Network Structure-wise
� Protocol Operation-wise
� Route Discovery-wise protocols.
The structure-wise category is further divided into the following sub-categories:
� Flat-based
� Hierarchical-based
� Location-based
While routing protocols under the category of protocol operation categorized as the
following:
� Multipath-based
� Query-based
� QoS-based
� Negotiation-based
� Coherent-based
� Negotiation-based.
13
In the flat-base routing protocols, each node has the likewise role and responsibility
without any discrimination in acquiring data from the environment, coordinate with each
other, and transferring data to BS. In the cluster based protocols, nodes are collected into
clusters. Each cluster has a CH. Nodes in the cluster, collect data and launch their
information to the CH. CH after getting the data, appends its own data, and throws to BS
straightforwardly (single hop) or using relay CHs (multi hop) in transportation. While in
location-based routing protocol sensor nodes know their position in the network.
Therefore, instead of spreading the data in the entire network they send their data to the
destination directly. The last category of routing protocol is consisting of protocols
supported on the operation that depend upon the procedure used in the protocol. In multi-
path based routing nodes use multiple paths for sending their data which make the system
reliable and increase the performance of the network. In query-based protocol BS sends
query in the network, the node responsible for sensing and gathering data sends the data
to requested station or BS in response to that query. In QoS-based protocols consider
power capability and quality of the figures in the network. In negotiation-based protocols,
nodes focus on restricting the redundant information to transfer from the nodes to their
neighbors or the BS. In the coherent-based protocol nodes collect data and perform
minimum processing over it, and launch their records to aggregator for additional
processing. Whereas, the last category of routing protocols consists of route discovery
which is sub-divided into reactive, proactive, and hybrid schemes. The proactive routing
practices are also termed as table driven protocols. In these procedures paths are
calculated before the communication takes place between nodes and the sink. In the
reactive protocols paths were established at the time of communication. While in case of
14
hybrid protocols paths establishment takes place through the amalgamation of proactive
and reactive protocols. In this document, we explore the recent routing protocols as per
their category, in detail, to clear their understanding which in term open new research
directions in the field.
2.1.1 Applications of WSN
The sensor is the most demanding technology of day to day life, to track the sources and
send their data to the destination, without the need of any administrator. Its uses are
countless however the most significant applications against their fields are demonstrated
in Table 2.1.
Area Applications
Health-Care
Applications
� Examine and take-care of patients [5, 6].
� Health industry could save approximately 25$ billion if WSN is
incorporated in health care systems [7].
� Sensor for blood pressure, oxygen measurement, blood flow,
respiration rate, Pulse oxy-meter, ECG (electrocardiogram) [8].
� Monitor the people's health condition and location [9].
� Health-Gear is Microsoft research product. In the project sensor
nodes are connected to phone via Bluetooth device. It is real time
wearable system for analyzing and monitoring real time
physiological signal [10].
� Mobi-Health is European commission funded project, which is
based on mobile health care. It monitors the patients during health
monitoring using GPRS and UMTS networks [11].
� Artificial Retina [12].
� Vital Sign [13].
15
� Glaucoma Patient [14].
Military
Applications
� Object Tracking [15].
� Military monitoring (MILMON) [16].
� This application informs the commander about the battlefield, and
helps to take the better decision to save their soldiers [17].
It is the application for crucial tasks, such as equipment
management, damage assessment and supply management [18].
� It works in hazardous circumstances specially use in battle [19].
Emergency
Applications
� Disaster Recovery applications named as CodeBlue [20].
� Fire crisis discovery and reply for construction surroundings is a
new application area for the operation of WSNs [21].
� FireGuide [22].
� Fire and water detectors [23].
Agricultural
Applications
� The wireless Vineyard [24, 25] is the Intel’s project in which motes
are planted on vine plants in a vine-yard.
� Use of WSN provides accurate amount of water to agricultural
activities, which consumes 70% of world wide water [26].
� Francois Depienne, is a project for moisture tracking [27].
Environmental
Applications
� Study the animals without alarming them
o Great Duck Island network [28].
o ZebraNet [29].
� Fellow-Me [30].
� WSN based Storm and Weather gathering application [31].
� Examine volcanic and seismic actions [32].
� Security applications [33].
16
Table 2.1. Applications of WSNs
2.2 WSNs Routing Challenges Compared with other Wireless Network
There are number of routing challenges which differentiate WSNs from other wireless
networks e.g. mobile-ad-hoc, or wireless mesh networks due to its characteristics [47].
• It is an overhead to maintain a large number of IP (Internet base protocol scheme) due
to length of sensor nodes in the network.
• It works un-attended while other networks need administrator or the same.
Industrial
Applications
� Place sensors inside the machine and measure the attributes such
as heat and vibrations [34].
� WSNs are used to safe the employee in many industries [35].
� Keep control the industry process and automation [36].
Inventory
Tracking
� Suppliers ensure the safety of gas cylinders [37].
� Inventory management to Storage Silo, named as AnyBridge [38].
� Gas Cylinder Management [39].
� CityNet application to monitor the air quality in Urban Areas [40].
Smart Spaces � Smart-M3 [39] interoperable platform for smart devices [41].
� In Smart homes integrated systems work together and inform
home what they are doing and respond them accordingly [42].
Process
Monitoring
� Business Process Modeling Notation (BPMN) it is the
combination of both engine of business working and WSN [43].
� Graphic Workflow Execution Language for Sensor Network
(GWELS) process model helps to understand the services
oriented programming paradigm for sensor networks, hence
makes easy to develop and integrate with sensor network
applications [44].
17
• In WSN data is more important than who has sent the data( no need of IP)
• Flow of data has always been from the sensor nodes to BS, no other way possible like
peer to peer or multi-cast techniques.
• Sensor nodes unlike the other networks have limited processing, storing, battery,
therefore, need intensive management of the resources
• Nodes remain fixed after deployment, but in some application they are allowed to
move but with very low mobility, while in other network nodes are free to move,
resulting in frequent change in the topologies.
• They are application specific, their requirements of design change to the application.
• Sensor nodes normally read one phenomenon, therefore, redundant information flow
in the network. So such redundancy filtered out in order to better utilize the
bandwidth channel.
• They are normally data-centric networks, in which facts are sensed based on specific
characteristics called as attribute-based addressing.
• Nodes in WSN must know their position because on the basis of position information
is collected. In order to get the position,
• GPS (Global Positioning System) hardware is not a feasible solution in term of cost,
energy, and physical constraints. There are large numbers of GPS free solutions
suggested by the researchers.
• Sensor nodes are deployed once in their whole lifetime.
18
2.3 Routing Protocols Classification
The node-to-node communication between the devices takes place at the network layer.
This means that two systems can communicate with each other through an arbitrary
number of intermediate nodes called hops. Whereas transmission between two neighbors
takes place on data link layer, the routing decision in multi-hop communication is taken
on the network layer. As WSNs is a special branch of infrastructure-less environments,
therefore, it has to take all its decisions by its own. Consequently, each node in the
network could be a source of information or act as a router. Normally the nodes in the
network are the source nodes they collect data from their surroundings and send it to the
sink or BS, and depending on the applications, some acts as router nodes to relay the
information between arbitrary numbers of nodes. This makes simpler routing decisions,
notably.
Since there is a limited amount of energy available to each sensor node in the network,
therefore, MANET protocols can’t be used to address the same problem of the WSNs.
Initially, some researchers applied the MANET protocols to WSNs problems, but due to
the application specific nature of the networks, they were failing to provide better results,
therefore, researchers of WSNs focus develop their own protocols as per the demands of
the application.
There are various types of classification for WSNs routing protocols presented in a
literature.
19
Network Structure based
Classification [48]
i. Flat or Data-Centric based routing
ii. Hierarchical or Cluster-based routing
iii. Location based routing
Protocol Operation based
Classification [49]
i. Multi-Path based routing
ii. Query-based routing
iii. Negotiation-based routing
iv. QoS-based routing
v. Non-Coherent & Coherent data processing based
routing
Sensor Node architecture
based Classification [49]
i. Protocols work on Flat topology( In the network all
nodes are treated equally called as homogeneous)
ii. Protocols work on hierarchical topology (in the
network some nodes have more responsibilities than
the others are called as Heterogeneous)
Packet Destination based
Classification [50]
i. Gossiping and Agent based Unicast Forwarding
ii. Energy-efficient unicast
iii. Broadcast and Multi cast
iv. Geographic routing
v. Mobile nodes
Source -Destination Recovery
based classification [51,48]
i. Proactive
ii. Reactive
iii. Hybrid
Cooperative Routing [52] i. The technique in which sensor nodes send their
data to central node that combines the data to
diminish the energy consumption.
20
Protocol’s initialization point
based classification [48]
ii. Source-initiated (Src-initiated)
iii. Destination-initiated (Dst-initiated)
Epidemic behavior based
Classification [53]
i. Pull-based epidemic algorithm
ii. Push-based epidemic algorithm
iii. Pull-push based epidemic algorithm
Application based routing
protocols Classification [54]
i. Query-based WSN applications
ii. Event-driven based applications
iii. Periodic WSN applications
K. Sha et al based
Classification[55]
i. Greedy geographic Routing
ii. Load-balanced Routing
iii. Energy aware Routing
iv. Fault tolerant Routing
v. Information exploiting Routing
M. Perillo et al based
Classification[56]
i. Resource-Aware Routing
ii. Energy-aware Routing
iii. Fidelity-aware Routing
iv. Data-Centric Routing
v. Geographic Routing
vi. Clustering
State based Classification [57] i. Stateful ad hoc Routing
ii. Stateless Geometric ad hoc Routing
21
Energy-Efficient Routing
Protocols based Classification
[58]
i. Protocols for energy efficiency, which manage the
communication power plane at each node while
maintaining the network connected.
ii. Protocols that take decisions on the bases of
power maximization objectives.
iii. Protocols that take care of network topology by
determining which nodes should take part in the
function and which shouldn’t.
Table 2.2. Routing protocols classification
2.3.1 Structure Base Routing Protocols
It is one of the divisions of routing protocols of WSNs, which is further divided into flat,
hierarchical, and location predicated routing protocols. Under this category, protocols are
quantified with regard to design structure of the network area.
i. Flat or Data Centric based Routing
Figure 2.2. Routing protocols in WSNs
Multi-Path Based Routing
Coherent Based Routing
Routing Protocols in WSN
Negotiation Based Routing
Multi-Path Based Routing
QoS Based Routing
Network Structure
Hierarchical
Base
Flat Based
Location Based
Protocol Operation
Route Discovery
Reactive Protocol
Proactive Protocol
Hybrid Protocols
22
ii. Hierarchical or Cluster based Routing
iii. Location based Routing
i. Flat or Data Centric based Routing
In this type of routing technique, every node has the same responsibility for sending,
receiving, and communicating, and mostly use flooding based technique for transferring
of data. Since flooding includes collapse, which occurs due to duplicate messages being
sent to the same node. In flat based protocols overlapping occurs when two or more
nodes sense the same area, and put on the air their packets to the same neighbor node.
This resource blindness could cause to consume large amount of energy. Similarly, in flat
based network nodes work together to accomplish the job of sensing. As in WSNs have a
sizable voluminous quantity of nodes as compared to other networks, therefore, it is not
feasible to give a unique address to each node. In order to address the problem, data
centric routing is started, in which BS transmits the queries to a specified area in the
network and waits for their acknowledgement. Since the information is being
acknowledged in the course of inquiries, therefore, an attribute supported naming is
necessary to indicate the properties of data. They require no topology organization. The
Flat based protocols are classified as follows:
� Sensor Protocols for Information via Negotiation (SPIN)
� Directed Diffusion, Rumor Routing
� Stream Enable Routing
� Gradient based routing
� Threshold sensitive Energy efficient sensor network protocol (TEEN)
� Adaptive periodic (APTEEN)
23
� Constrained Anisotropic Diffusion Routing (CADR).
ii. Hierarchical or Cluster based Routing
In this brand of protocols nodes are grouped into clusters, in order to address the
problems of scalability and energy efficiency of flat based protocols. Thus, in hierarchical
routing protocols, each node of the cluster communicates with its manager node typically
entitled as CH. Nodes in hierarchical routing protocols have different roles, i.e. CH and
non-CH nodes. The CH nodes have normally supplementary energy, as compared to the
regular sensor nodes. The CH nodes process and send the information to BS, while the
non-CH nodes are used to sense the physical phenomenon in the area. The hierarchical
routing technique is used to develop energy efficient, scalable, and reliable protocols for
WSNs. It is also an efficient way to downsize the energy utilized in the cluster. The
hierarchical protocols help to reduce collision in the wireless channel and make easy the
work cycles of sensor motes, which in turn amplify the overall existence of the network.
The advantage of the clustering protocols is to aid in the improvement of routing
protocols, but it might follow longer routes as compared to the flat based protocols. The
CH in clustering process also performs aggregation on sensor’s collected data, because
data might be coming from the overlapped region, before passing the information to the
sink. The passing of records to BS is performed by the following two ways, i.e. single-
hop or multi-hop. In the single-hop CH passes the statistics to BS directly, while in multi-
hop CH uses relay CHs to convey the facts to BS. Following are examples of routing
protocols, i.e.
� Geography Adaptive Fidelity (GAF)
� Self-Organization (SOP)
24
� Hierarchical Periodic, Event-driven and Query-based (HPEQ)
� Power Efficient Gathering in Sensor Information System (PEGASIS)
� Hierarchical PEGASIS
� Hierarchical Energy Aware Protocol for routing and Aggregation in Sensor
networks (HEAP)
� SPAN, Simple Hierarchical routing protocol (SHRP).
Member of Cluster
Cluster Head(CH)
Sink
Shows flow of data
Figure 2.3. Single-hop and multi-hop connections to the sink
( b ): Multi-Hop ( a ): Single-Hop
25
a) Hierarchical or Cluster based Routing Protocols are classified as follows
In this segment we discuss different features of cluster based routing protocols
Hierarchical Routing Flat Routing Reservation-based scheduling Contention-based scheduling
Collisions avoided Collision over-head in attendance
Reduced duty cycle due to periodic sleeping Changeable duty-cycle by governing
sleep time of nodes Data aggregation by cluster-head Nodes on multi-hop pathway aggregate
in-coming data from the neighbors Uncomplicated but non-optimal routing Routing can be made best possible but
with an added complications. Call for global and local synchronization Without synchronization, Links are
created on the fly Operating cost of cluster formation throughout the network
Routes formed only in areas that have data for communication
Lower latency as multiple hops network formed by CHs always available
Latency in coming around the intermediate nodes and placing up the multipath
Energy dissipation is regular Power dissipation trusts traffic models Energy dissipation cannot be restricted Power dissipation adjusts to traffic
models Fair channel allotment Fairness not certain
Table 2.3. Hierarchical vs flat topologies routing
26
• Cluster Formation Method
The cluster formation method consists centralized, distributed and hybrid. In the
centralized technique, there is a central body which takes the decision of forming clusters
and CHs, in the distributed approach each node runs its own logic to form clusters and
CH, while in hybrid approach combination of both the centralized and distributed
approaches are used to form clusters and CHs.
• Cluster Formation Properties
Clustering process has the following properties for the formation of clusters. These are
the internal features of the cluster’s structure.
• Count Clusters
This feature means to count total number of clusters formed in a round. In some cluster
approaches, selection of CH is done before deployment such formation is called as Fixed
selection, while in others, selection of CH takes place randomly, so it is called as Random
selection of CH.
• Size of Cluster
It represents the length or distance of CH’s members from the CH. In case the distance is
small, it saves energy dissipation and also reduces the load on the CH. In some cases this
distance is fixed, while in others it keeps on changing i.e. variable.
• Density of Cluster
It is described as the proportion of the immense number of nodes in the cluster area and
cluster. The important, confront to diminish the energy burning-up in dense clusters. In
27
case of fixed clustering normally considers a sparse cluster, while in dynamic cluster, the
density of the cluster is variable.
• Count Messages
It counts the total number of messages interchanged during the selection of CH. In case of
more messages exchanged, it consumes more energy. In most of the non-probabilistic
approaches, exchange of messages is required for the selection of CH, and in probabilistic
techniques there is no message exchange.
• Stability
If the members of a cluster don’t remain fixed, then that cluster is called as adaptive
cluster, otherwise it is called as fixed. The fixed Count of Clusters increases the stability
of a WSN.
• Intra cluster communication
It means the communication which is performed in a cluster. It could be single or multi-
hop. In Single-hop also called as Direct Link nodes send their data directly to CH, while
in multi-hop nodes in a cluster uses relay nodes to send their data to CH see figure 2.6.
• Inter cluster communication
It indicates the communication between the CH/nodes and BS. If a CH doesn’t have the
range to send the data to BS, then the cluster strategies make sure through intermediate
condition to route the data to BS.
28
• CH- Potentials
The CH potentials in cluster strategies affect the system performance in-succession of
stability and lifetime of WSN. The following are some characteristics on the basis of
which CH strategies are differentiated.
• Node Type
There are different types of nodes some are defined as CH before their deployment
because they have more energy at the beginning than the member nodes in a cluster,
while other CHs have the same energy as member nodes in a cluster.
• CH Mobility
Some CHs are Mobile while others are Stationary. The Mobile CH changes its location
where there is a need to balance the workload, and hence helps to achieve the best
performance. In case of Static CH which remains in its place once deployed, so the
workload is divided among all the members of the CH, in order to achieve the
performance.
• Role of CH
Role defines the operations performed by CHs. So CH performs aggregation, collection
of data from its members, and it also relays the information to BS.
• CH Selection
CH selection can be before, or after deployment of the nodes of WSNs [8].
29
• Probabilistic Based
CH is selected on the basis of probabilistic based techniques. In this technique each node
has predefined probabilistic approach to determine the initial CHs.
• Non-Probabilistic Based
In the non-probabilistic based technique decision of the CH selection is supported on
outstanding power, degree and connectivity of the nodes in a cluster, Location based,
Position based Neighbor nodes, etc.
• Formation of Cluster
The formation of CH takes place such that CH broadcasts the packet to their neighbors,
which comes under its radio range. After receiving the packet nodes acknowledge to the
CH, and hence cluster is formed. In case of single hop nodes forward their data to the CH
directly, although in multi-hop nodes transmit through neighbor nodes. In the figure 3
cluster based protocols parameters have been classified.
30
iii. Location Oriented Routing
Geographic or location-base routing protocols exercise the location information of the
sensor nodes to spread the information to the destination rather than the complete
network. Nodes establish their locality using localization schemes and algorithms, i.e.
localization techniques. Therefore nodes are connected using geographic information
instead of topological connectivity knowledge to formulate promoting decisions. In the
unicast position supported protocols sender nodes not only have the information of their
own, but the information of the destination nodes as well. It obtains the information
either through questioning e.g. flooding, an inquiry to the destination to send its position
or a location agent service that plans the node’s identity into their locations. Although in
multicast location based or broadcast guided routing protocols, the matching packet is
Non-Probabilistic Based
Non-Probabilistic Based
Cluster Formation Properties
CH- Potentials CH Selection
Formation of Cluster Cluster Formation
Properties CH- Potentials CH Selection
Formation of Cluster
Count Clusters
Size of Cluster
Density of Cluster
Count Messages
Stability
Intra cluster communication
Inter cluster
Node Type
CH Mobility
Role of CH
Cluster Formation
Method
Distribute
Centralized
Hybrid
Probabilistic Based Single-hop
Multi-hop ingle-hop
Characteristics of Clustering
Figure 2.4. Categorization of different characteristics of clustering in WSNs
31
disseminated to various targets. Moreover, multicast protocols have the benefit that they
have the knowledge of the sites of the motes which therefore minimize the consumption
of resource by dropping redundant links. In most location based protocols the location
message is exercised to determine the space linking the nodes to deduce the power
utilization. Since nodes are spatially organized in an area, and have no such scheme of
addressing like IP in regular networks. So the data are transmitted to all the motes that
stay alive in a specific geographic area. This approach, of access is called as geo-casting,
i.e. to diffuse query to certain region instead of flooding the whole network. This
technique saves both the energy as well as bandwidth of the channel which increase the
overall performance of the network. Once the packet arrives at the target, it could either
be disseminated to all the sensor nodes within the region which is called as multi-cast, or
transmits the packet to at least one node in the network, which is also called as any-cast.
As compared to other routing protocols, location based protocols want only the
geographic awareness and therefore not necessary to hold the routing table information
and also do not require to set up the back-to-back paths connecting senders and receivers,
hence avoid the requirement of administering message. Illustrations of location supported
routing procedures are Geographic Adaptive Fidelity (GAF), Minimum Energy
Communication Network (MECN), Geographic and Energy Aware Routing (GEAR), and
Small MECN (SMECN).
2.3.2 Protocol Operation based Classification
It’s also an important component of routing protocols of WSNs. In the following group
of routing protocols are measured with respect to the operation of routing protocols and
they are categorized as follows [6].
32
i. Multi-Path based routing
ii. Query-based routing
iii. Negotiation-based routing
iv. QoS-based routing
v. Non-Coherent & Coherent data processing based routing
i. Multi-path based Routing
Multipath routing protocols are most widely used protocols to address the limitations of
the networks. They can also enhance the performance demand of certain applications.
However, on one hand it improves the performance while on the other hand it might
adversely affect the performance of certain application of WSNs. Since sending of
duplicate copies of the same message increase the reliability, but also affect the network
performance as well due to the reason of traffic overhead. Therefore, choosing the
appropriate protocol is depending upon the nature of the applications. The most important
multi-path routing protocol is Directed Diffusion.
• Directed Diffusion
It follows a data-centric approach. Data in such routing protocols are indicated as an
attribute-value tuple. Once the data are generated by the nodes, it is requested through an
attribute-value tuple identified by the application. The BS infuses a notice to the network
[33]. The node updates its interior awareness with the notice acknowledged from the
messages.
The node also has cache to store the most recent messages. The data rate is also
determined through this layout. On
replication path to the source of the progenitor of the interest.
This path is described as gradient and it facilitates to describe the data rate, and running
out time. Moreover, nodes allow their sensors
establish multiple gradients to
optimum gradient is performed by considering affirmative and negative fortifications.
This procedure works with two kinds
Exploratory gradients perform path repair and setup, whereas information gradients are
exercised to transmit actual information.
Figure2.5. Directed diffusion scenario
The node also has cache to store the most recent messages. The data rate is also
determined through this layout. On getting the communication, the nodes construct the
replication path to the source of the progenitor of the interest.
This path is described as gradient and it facilitates to describe the data rate, and running
out time. Moreover, nodes allow their sensors to receive the planned records. The nodes
blish multiple gradients to BS on receiving the interest message. The selection of the
optimum gradient is performed by considering affirmative and negative fortifications.
This procedure works with two kinds of inclines: exploratory, and statistics gradients.
Exploratory gradients perform path repair and setup, whereas information gradients are
exercised to transmit actual information.
33
The node also has cache to store the most recent messages. The data rate is also
getting the communication, the nodes construct the
This path is described as gradient and it facilitates to describe the data rate, and running-
to receive the planned records. The nodes
BS on receiving the interest message. The selection of the
optimum gradient is performed by considering affirmative and negative fortifications.
of inclines: exploratory, and statistics gradients.
Exploratory gradients perform path repair and setup, whereas information gradients are
34
(a) (b) (c)
ii. Query Based
Query supported routing protocols are recipient-commenced. The recipient node spreads
a query for the data in the network and a node containing the information that equivalents
the query, sends the matched data back to the query requester. The queries are usually
defined in high-level and natural languages.
• Cougar
Cougar is a query based protocol. It views the network as a giant distributed system. The
main thought behind this protocol is to utilize informative inquiries in turn to conceptual
inquiry dispensation from the network layer utilities, for instance the choice of
appropriate sensors and so on. It performs in-networking aggregation process on the data
to save more energy. The notion is offered by the supplementary layer that exists
Source
Sink
Sink Sink
Source
Interes
Source
Interes
Figure 2.6. Directed diffusion: (a) interest propagation, (b) initial gradients set up, and (c) data delivery.
35
connecting network and application level. It has incorporated structural design of a sensor
database organization in which nodes elect a chief mote to carry out processing of
aggregation and send the information to BS. The query is generated by BS. The query
specifies the information of data flow and its computation, and throws it to the
appropriate nodes. The incoming inquiry also expresses that how to decide on a manager
for the query.
The structural design presents an estimation capability to each sensor nodes in the
network. This computation awards energy efficiency to the sensor nodes, particularly
when the number of nodes produces and transport information to the chief is gigantic.
Since Cougar offered the solution to query the sensor nodes, which is self-governing of
the network cover, but it had some drawbacks. First, it has brought a query layer on each
sensor which puts additional overhead on the sensor motes in term of liveliness
utilization and storage space. Second, in network processing from numerous nodes have
need of bringing together, i.e. a relay node should remain sooner than transport the
information to the chief node until it receives packet from every arriving source node.
The third is that the chief nodes should be maintained vigorously in order to prohibit
them from stoppage.
Partially Aggregated
Select AVG > threshold
Aggregate Operator (AVG)
Network Interface
Average Value
Figure 2.7. Query plan at a bellwether node: The bellwether node acquires all the understandings, determines the average and if it is more preponderant than a threshold throw it to the BS.
36
iii. Negotiation-based
Negotiation based protocols avoid to transmit redundant data transmission by using high
level of descriptor via negotiation. In these protocols, communication decisions are taken
by considering the number of resources available to them. The motivation behind, the
negotiation based protocols is implosion, overlapping and resource blindness between the
sent data in flooding based protocols. Hence due to specified reasons node could receive
duplicate copies of the matching data. It can also affect the energy that is wasted during
the process of communication and processing of duplicated data. So the main theme
behind negation oriented protocols is that they hold down duplicate information by
carrying-out a sequence of negotiation messages to the nodes before actual data
transmission is taking place. It therefore voids the replica of information from being sent
to the next node or BS.
• Sensor Protocols for Information via Negotiation (SPIN)
This family of adaptive protocols is entitled as Sensor Protocols for Information via
Negotiation (SPIN) and is suggested by Heinemann et al [8]. In those protocols every
node broadcasts their information to another node in the network. Consequently, each
node in network carries all the information. It enables the user to get the requested
information instantly, just by querying any node. Since the nodes are very close to each
other, therefore it is assumed that they usually transfer the data which other nodes might
have, causing the redundancy. In order to avoid redundancy in the SPIN protocol’s
family by performing some sort of negotiation and resource adaptive algorithm
37
iv. QoS based Protocols
In this category of routing protocols, the network maintains the balance involving energy
utilization and information excellence. QoS based protocols, particularly ensure the
parameters, i.e. hitch, bandwidth, and energy etc., while transmitting information to BS.
The most important example of a QoS based protocol is Stateless Protocol for Real-Time
Communication in Sensor Network (SPEED).
• SPEED (Stateless Protocol for End-to-End Delay)
This is an instance of QoS based direction-finding protocols. This protocol ensures soft
instantaneous back-to-back communications. Each node in this protocol contains the
information of its neighbors and exercises a geographic front-warding strategy to search
the paths. This protocol further guarantees a certain speed of the packets. So each
application preserves roughly determine back-to-back holdup of the packets by
partitioning the space to BS by the packet speed. Speed protocol avoids the congestion in
the network. It is also interested in providing uniform speed of message release crosswise
the network. So the uninterrupted delay of the packet is dependent upon the distance
between the sender and recipient nodes. Therefore, real time applications approximate
this uninterrupted interruption prior to fashioning access consequences.
In the SPEED rule steering module is entitled as Stateless Non-Deterministic Geographic
forwarding (SNGF) and work through other four components of the network cover up.
The beacon collection gets the aggregation about computing machines and their activity.
Delay estimation is performed on each node by means of reckoning the forgotten time
after it receives the ACK from a neighbor in comeback of a convey information packet.
So SNGF choose those computing devices which athletic contest the cannonball along
38
constraint, If not succeeded, the dispatch percentage of the mote is ensured, this is
intended via appearing in the overlook percentage of the neighbors of a mote i.e. the node
that couldn’t supply the preferred momentum.
In this category of routing protocols, the network maintains the steadiness connecting
power utilization and info worth. QoS based protocols particularly ensure bandwidth,
stopping, and energy etc., when transmitting facts to BS. The most important example of
a QoS based protocol is Stateless Protocol for Real-Time Communication in Sensor
Network (SPEED).
v. Coherent Based Protocols
As in WSN nodes bring together information and throw it to their neighbors or to BS.
The most important in WSNs is the data processing of the composed facts. There are two
types of processing, i.e. coherent and non-coherent approaches of facts computing. In
non-coherent type, nodes collect information, and then perform processing on it before
the data is transferred to their neighbors or aggregator where the next processing is done
on the data. While in coherent type, nodes perform minimum processing like time
stamping or suppression and send it to aggregator for processing. In coherent based
routing, nodes save their energy as compared to non-coherent based routing. As there is a
long data stream produced in coherent data, but using efficient path, energy utilization is
attained. As there are long data streams produced in coherent processing, but using
efficient path, energy utilization is attained. The first-class instance of non-coherent
protocol is Single Winner Algorithm (SWE), whereas Multi Winner Algorithm (MWE) ,
a variable of SWE is also a coherent computing protocol.Coherent protocol Single
39
Winner Algorithm (SWE), whereas Multi Winner Algorithm (MWE), a variable of SWE
is also a coherent computing protocol.
• Single and Multiple Winner Algorithms
These algorithms have been suggested in favor of coherent and non-coherent practices
respectively. In the Single winner algorithms a particular node as an aggregator node is
selected for complicated computing. The selection of the nodes as an aggregator is based
on computation capability and energy assets. In the SWE ending process the minimum
hop spanning tree covers the whole network. While multi winner processing (MWE), is
an extension of SWE. When all nodes throw their facts to aggregator node, an extensive
amount of power is utilized, because this progression has an elevated cost. In one
direction to address this problem is to play down the number of source nodes that
transmit the information to the aggregator node. Instead of preserving a record of the
most excellent contender node, master aggregator node contains the record of all the
candidate nodes also. At the conclusion of MWE procedure, every sensor node has
smallest amount liveliness paths to all sensor nodes (SN) in the network. Afterward,
SWE is exploited node that gives way smallest amount of energy utilization. Thus that
node provides like a middle node in coherent computing. In general, the MWE
progression has high overhead, lengthy setback, and lesser scalability as compared to
non-coherent based computing networks.
2.3.3 Sensor Node architecture based Classification
On the basis of sensor node architecture the routing protocols are categorized as [49]
i. Protocol works on flat based topology containing homogenous nodes
40
ii. Protocol works on the hierarchical topology containing heterogeneous nodes
i. Homogeneous
In this breed of routing protocols the entire nodes keep the identical size, chassis,
configuration, and a method of energy contribution. Similarly, transmission power i.e.
ranges data rates, computing power, security and reliability parameters are all same in all
the nodes. It is further divided into Cluster and Non-Cluster supported. In Cluster carried,
nodes are grouped to form clusters, while in Non-Cluster category, nodes are not
grouped.
ii. Heterogeneous
The routing protocols of this type consist of nodes having unequal size, shape,