Beruflich Dokumente
Kultur Dokumente
Abstract Wireless Sensor Networks (WSNs) is the most Proactive Routing Protocol
developing areas in many factors like environment & wildlife
monitoring, security & military surveillance, healthcare and Reactive Routing Protocol
many more. Also, routing protocols play a very important part in
Hybrid Routing Protocol
terms of efficiency in WSNs. Due to limitations of unreliable low
power links and resources between the sensor nodes; design of an Protocol Operation is used to describe the major
efficient routing protocol is a difficult problem. This paper has operational characteristics of routing protocols like pattern for
surveyed about Routing Techniques and basically about communication, next hop, and method of delivery, hierarchy,
Hierarchical based routing with its protocols like LEACH, and computation [4]. These are classified into the following;
TEEN, PEGASIS, SEP and DEEC. And then finally their
comparative study is provided. Negotiation Based Routing
Keywords Wireless Sensor Networks (WSNs), Base Station Multipath Based Routing
(BS), Sensor nodes (SNs), Cluster Head (CH), Routing Techniques,
Query Based Routing
Hierarchical Protocols.
QOS Based Routing
I. INTRODUCTION
WSNs are one of the rising areas due to the advancement Coherent & Non- Coherent Based Routing
of wireless technologies and embedded systems. Their
applications include monitoring, tracking, event detection, Routing Techniques in WSNs
surveillance, disaster management, preventive maintenance etc
[1, 2].
Routing is one of an interesting research issue in WSNs. Route Processing Protocol operation Network Structure
But it is a complex job to develop a routing protocol which is
efficient due to its inherent characteristics of WSNs like Proactive Negotiation Flat Network
highly dynamic network, application specific, limited energy, Based
storage and processing capability etc. Reactive Multipath Hierarchical
Network
Rest of the paper is structured as below; various routing Hybrid
techniques used in WSNs in Section II, followed by the Query
Location
Hierarchical based routing in section III & Section IV gives Based
the Comparative study of various Hierarchical routing QoS
Protocols. Finally Section V gives the Conclusion.
Coherent
II. ROUTING TECHNIQUES IN WSNS
Routing is used for discovering and maintaining the energy Fig. 1. WSNs Routing Techniques
efficient routes for data to provide energy efficient and reliable
communication from source to destination [3]. Fig. 1 shows Network Structure plays an important role in operation of
classification of various routing techniques used in WSNs [5- WSNs. It is used to define two main characteristics of a
8] in terms of Route Processing, Network Structure and network i.e. characteristics of BS and characteristics of SNs
Protocol Operation. [4]. These are classified into the following;
Route Processing means how a node finds out its route Flat Network Routing
from source to BS. These are classified into the following;
Hierarchical Network Routing
Location Based Routing
III. HIERARCHICAL BASED ROUTING multi-hop communication suffers from the problem of energy
Hierarchical based (also called cluster-based) routing is hole.
considered as one of the most famous routing technique. A
Clustering hierarchical method for the WSNs topology breaks Cluster Base Station (BS) Cluster Head
the whole network of SNs into several areas called clusters (CH)
and each cluster has a CH (Fig. 2) [9]. The CH plays the role
of data aggregating and sending the aggregated and refined
data to the BS. A data transfer always takes place from a lower
clustered layer to a higher one.
Cluster
Head Sensors Nodes (SNs)
(CH)
Time Division Multiple Access (TDMA) format. Another CH After being elected as CH, it broadcasts its status of being
responsibility is of sending aggregated information to the BS CH by using Carrier Sense Multiple Access (CSMA) Media
and it is sent as a Code Division Multiple Access (CDMA) Access Control (MAC) protocol. Each SN chooses their own
pattern so as to avoid interference. These two mechanisms CH on the basis of RSSI value offered by each CH. All SNs
used by LEACH as collision preventions, within each cluster send their willingness messages to their suitable CH using
(TDMA) and between clusters (CDMA). CSMA MAC protocol. Then CHs schedules all the SNs using
TDMA frame for data transmission.
Sensor Base Station (BS) Cluster Head In steady state phase, every SN forwards their date to the
Nodes (CH) respective CH in its allotted time frame. After that every CH
(SNs) combines and aggregates the collected information and
transferred that to the BS.
B. TEEN (Threshold Sensitive Energy Efficient Sensor
Network protocol)
TEEN [7, 8, 13] protocol is designed to sense the attributes
and respond suddenly. It is used for real time crucial
applications like intruder detection, explosive detection etc
Cluster and it uses data centric mechanism with hierarchical approach.
Its architecture is same as that of LEACH protocol which is
based on hierarchical clustering. Here CH does not send their
date directly to the BS, instead it sends from lower level CH to
Fig. 5. Description of LEACH
one level above CH in hierarchy and so on it reaches to the
The LEACH implementation process includes many sink. Fig. 7 shows how clustering is done in TEEN protocol
rounds and every round have 2 phases, I.e. set-up phase and and how data is transmitted to BS from lower level cluster to
steady data transmission phase. These are as discussed below: higher one.
Frame
Fig. 7. Clustering in TEEN
Fig. 6. Time Line operation of LEACH
After the process of clustering, the CH broadcast two
In Set-up phase, the selection of CH is based on the threshold values to SN i.e.
equation of threshold. Each SN generates an arbitrary random
value between 0 and 1, and if that value of SN is less that Hard threshold and
threshold value then it will become a CH for that round. Soft threshold [16]
Hard threshold reduces the amount of transmissions by
allowing the SNs to send data only to those sensing element
that are in their range of concern.
However, Soft threshold reduces the amount of
Where P is the Probability of selection of CH, transmission by overcoming all other transmissions when
r is the existing round there is slight or no variation in the sensing attribute.
G is the group of SNs that have not been CH in the Here SNs will forward data in current round only, if, the
current epoch. current sensed element value is larger than hard threshold and
Epoch means the number of rounds after which it became if, the current sensed element value is different from previous
again eligible for being CH. value by a value equal to or larger than soft threshold.
IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2016), December 23-25, 2016, Jaipur, India
C. PEGASIS (Power- Efficient Gathering in Sensor Normal SNs. Also, SEP is an advancement over LEACH in
Information Systems) terms of formation of cluster by lessening the interval of
PEGASIS [17] is a sequence (chain) based routing Advance SNs CH epoch. The weighted probability equation of
protocol which is an improvement over LEACH, used to SEP for Normal nodes as well as for Advance nodes is
enhance the network lifetime of WSNs. different, and therefore it gives two different threshold values
for the election of CH.
In PEGASIS, SNs are distributed randomly over the entire
network field. Each SN transmits its data only to its closest The threshold value for selection of Normal SNs as CH is
neighbor (Fig. 8) [18] by adjusting its transmitting power, so given by;
that only the closest neighbor can heard it. Here SN calculates
its distance to the neighbor node via signal strength so as to
locate the closest SNs. With this, a chain is build from SN to
the BS via Greedy Algorithm. After that a node is elected as
leader randomly for transmitting the data from SNs to BS. Where G' is set of Normal SNs which became CH
This approach is used to lower the Bandwidth and reduces the
overhead problem from the BS. r is the existing round
Pnrm is the weighted probability for the Normal SNs and is
given by
Base Station
(BS)
Leader Node
The threshold value for selection of Advance SNs as CH is
Sensor Node
given by;
Protocols
S.No. Parameters
LEACH TEEN PEGASIS SEP DEEC
1 Year 2000 2001 2002 2004 2006
2 Routing Type Proactive Reactive Reactive Reactive Proactive
3 Initial Energy of nodes Homogenous Homogenous Homogenous Heterogeneous Heterogeneous
4 Mobility of Nodes No No No No No
5 BS Position Fixed Fixed Fixed Fixed Fixed
6 Hierarchical Level Single Single Multi-level Bi-level Multi-level
Residual Energy +
Threshold based Threshold based Threshold based on
7 CH Selection Randomly Average Energy of
Probability Probability Weighted Probability
Network
8 Data Aggregation Yes Yes No Yes Yes
9 Algorithm Complexity Low High High Very Low Very Low
10 Stability Medium High Low Medium High
11 Energy Efficiency Very Low Very High Poor Medium High
12 Scalability Very Poor Poor Very Large Medium High
13 Network Lifetime Poor Best Very Good Good Better
14 Delivery Delay Very Small Small Very Large Very Small Very Small
15 QoS No No No No No
16 Data Delivery Model Cluster Head Active Threshold Chain Based Cluster Head Cluster Head
17 Position Awareness No No No No No
18 Load Balancing Medium Good Medium Good Good
REFERENCES
[1] Akyildiz, Ian F., Weilian Su, Yogesh Sankarasubramaniam, and Erdal [5] Al-Karaki, Jamal N., and Ahmed E. Kamal. "Routing techniques in
Cayirci. "Wireless sensor networks: a survey." Computer networks 38, wireless sensor networks: a survey." Wireless communications,
no. 4 (2002): pp 393-422. IEEE 11, no. 6 (2004): pp 6-28.
[2] Amanjot Singh Toor, Jain AK, A Review on Wireless Sensor Network. [6] Zin, Shazana Md, Nor Badrul Anuar, Miss Laiha Mat Kiah, and Al-
Journal of Mobile Computing, Communications & Mobile Networks. Sakib Khan Pathan. "Routing protocol design for secure WSN: Review
2015; 2(2): pp 1013. and open research issues." Journal of Network and Computer
[3] Singh, Santar Pal, and S. C. Sharma. "A survey on cluster based routing Applications 41 (2014): pp 517-530.
protocols in wireless sensor networks." Procedia Computer Science 45 [7] Devika, R., B. Santhi, and T. Sivasubramanian. "Survey on routing
(2015): pp 687-695. protocol in wireless sensor network." International Journal of
[4] KC, Ganashree. "Evaluation of Routing Protocols for Wireless Sensor Engineering and Technology 5, no. 1 (2013): pp 350-356.
Networks." IJRCCT 2, no. 6 (2013): pp 322-328.
IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2016), December 23-25, 2016, Jaipur, India
[8] Patil, Mallanagouda, and Rajashekhar C. Biradar. "A survey on routing Optimization (EESCO), 2015 International Conference on, pp. 1-4.
protocols in Wireless Sensor Networks." In Networks (ICON), 2012 IEEE, 2015.
18th IEEE International Conference on, pp. 86-91. IEEE, 2012. [22] Tewari, Mamta, and Kunwar Singh Vaisla. "Performance Study of SEP
[9] Kaur, Manpreet. "Survey on Variants of Distributed Energy efficient and DEC Hierarchical Clustering Algorithm for Heterogeneous WSN."
Clustering Protocols in heterogeneous Wireless Sensor Network." arXiv InComputational Intelligence and Communication Networks (CICN),
preprint arXiv:1406-2311 (2014). 2014 International Conference on, pp. 385-389. IEEE, 2014.
[10] Chandrasekaran, V. "A review on hierarchical cluster based routing in [23] Qing, Li, Qingxin Zhu, and Mingwen Wang. "Design of a distributed
wireless sensor networks." Journal of global research in computer energy-efficient clustering algorithm for heterogeneous wireless sensor
science 3, no. 2 (2012): pp 12-16. networks."Computer communications 29, no. 12 (2006): pp 2230-2237.
[11] Akkaya, Kemal, and Mohamed Younis. "A survey on routing protocols [24] Javeed, Faisal, Aqdas Naz, Talha Naeem Qureshi, Abdul Basit, and
for wireless sensor networks." Ad hoc networks 3, no. 3 (2005): pp 325- Naima Iltaf. "A review on variant clustering designs in heterogeneous
349. WSNs." In2015 National Software Engineering Conference (NSEC), pp.
[12] Tanwar, Sudeep, Neeraj Kumar, and Joel JPC Rodrigues. "A systematic 48-54. IEEE, 2015.
review on heterogeneous routing protocols for wireless sensor [25] Sharma, Tripti, Brijesh Kumar, and Geetam Singh Tomar. "Performance
network."Journal of network and computer applications 53 (2015): pp Comparision of LEACH, SEP and DEEC Protocol in Wireless Sensor
39-56. Network." Proceedings of International Journal of Advances in
[13] Latif, Khalid, M. Jaffar, Nadeem Javaid, M. N. Saqib, Umar Qasim, and Computer Networks and its security (2012).
Zahoor Ali Khan. "Performance analysis of hierarchical routing [26] Jaiswal, Vibhuti PN, and Amit K. Garg. "An efficient protocol for
protocols in wireless sensor networks." In Broadband, Wireless reducing energy consumption in wireless sensor networks." Int. J. Eng.
Computing, Communication and Applications (BWCCA), 2012 Seventh Res. Appl 2 (2012): pp 530-533.
International Conference on, pp. 620-625. IEEE, 2012. [27] Bhattacharyya, Debnath, Tai-hoon Kim, and Subhajit Pal. "A
[14] Sujee, R., and K. E. Kannammal. "Behavior of LEACH protocol in comparative study of wireless sensor networks and their routing
heterogeneous and homogeneous environment." In Computer protocols." Sensors 10, no. 12 (2010): pp 10506-10523.
Communication and Informatics (ICCCI), 2015 International [28] Sangeetha, M., A. Sabari, and T. Shanthi Priya. "A Review:
Conference on, pp. 1-8. IEEE, 2015. Comparative Study of Enhanced Hierarchical Clustering Protocols in
[15] Maraiya, Kiran, Kamal Kant, and Nitin Gupta. "Efficient cluster head WSN." World Academy of Science, Engineering and Technology,
selection scheme for data aggregation in wireless sensor International Journal of Computer, Electrical, Automation, Control and
network."International Journal of Computer Applications 23, no. 9 Information Engineering 8, no. 8 (2014): pp 1473-1478.
(2011): pp 10-18. [29] Han, Guangjie, Xu Jiang, Aihua Qian, Joel JPC Rodrigues, and Long
[16] Manap, Zahariah, Borhanuddin Mohd Ali, Chee Kyun Ng, Nor Cheng. "A comparative study of routing protocols of heterogeneous
Kamariah Noordin, and Aduwati Sali. "A review on hierarchical routing wireless sensor networks." The Scientific World Journal 2014 (2014).
protocols for wireless sensor networks." Wireless personal [30] Alnuaimi, Mariam, Khaled Shuaib, K. A. Nuaimi, and Mohammed
communications 72, no. 2 (2013): pp 1077-1104. Abdel-Hafez. "Performance analysis of clustering protocols in WSN."
[17] Lindsey, Stephanie, and Cauligi S. Raghavendra. "PEGASIS: Power- In Wireless and Mobile Networking Conference (WMNC), 2013 6th
efficient gathering in sensor information systems." In Aerospace Joint IFIP, pp. 1-6. IEEE, 2013.
conference proceedings, 2002. IEEE, vol. 3, pp. 3-1125. IEEE, 2002. [31] Sardar, Shamim, Angona Sarker, and Ali Newaz Bahar. "Hierarchical
[18] EHLALI, Souad, and Awatif SAYAH. "Efficient Lifetime Maximization Routing Protocol in Wireless Sensor NetworkA Survey." In
Data Gathering Technique for Routing in Wireless Sensor International Journal Of Scientific And Engineering Research 2, no 6
Networks." Applied Mathematical Sciences 8, no. 28 (2014): pp 1381- (2015): pp 184-189.
1389. [32] Bansal, Parul, Poonam Kundu, and Prabhjot Kaur. "Comparison of
[19] Lonare, Savita, and Gayatri Wahane. "A survey on energy efficient LEACH and PEGASIS hierarchical routing protocols in wireless sensor
routing protocols in wireless sensor network." In 2013 Fourth networks."International Journal on Recent Trends in Engineering &
International Conference on Computing, Communications and Technology 11, no. 1 (2014): 139.
Networking Technologies (ICCCNT), pp. 1-5. IEEE, 2013. [33] Kumar, Aditya, and Anand Nayyar. "Energy Efficient Routing Protocols
[20] Smaragdakis, Georgios, Ibrahim Matta, and Azer Bestavros. "SEP: A for Wireless Sensor Networks (WSNs) based on Clustering." In
stable election protocol for clustered heterogeneous wireless sensor International Journal of Scientific & Engineering Research 6, no 5,
networks." InSecond international workshop on sensor and actor (2014): pp 440-448.
network protocols and applications (SANPA 2004), vol. 3. 2004. [34] Kumar, Surender, Sumit Kumar, and Bharat Bhushan. "Energy aware
[21] Suri, Priya, Rajeev Kumar Bedi, and Sunil Kumar Gupta. "Review paper clustering protocol (EACP) for Heterogeneous WSNs." arXiv preprint
on various clustering protocols used in Wireless Sensor Network arXiv: pp 1408-2910 (2014).
(WSN)." InElectrical, Electronics, Signals, Communication and