WSN Routing Protocols
WSN Routing Protocols
In
Wireless Sensor Network
1
Prepared by:
Virendra Singh Thakur
GTU PG School, Ahmedabad
Overview
Routing in WSNs is challenging due to distinguish from
other wireless networks like mobile ad hoc networks or
cellular networks.
First, it is not possible to build a global addressing scheme for
a large number of sensor nodes. Thus, traditional IP-based
protocols may not be applied to WSNs. In WSNs, sometimes
getting the data is more important than knowing the IDs of
which nodes sent the data.
Second, in contrast to typical communication networks,
almost all applications of sensor networks require the flow of
sensed data from multiple sources to a particular BS.
2
Overview (cont.)
Third, sensor nodes are tightly constrained in terms of
energy, processing, and storage capacities. Thus, they
require carefully resource management.
Fourth, in most application scenarios, nodes in WSNs are
generally stationary after deployment except for, may be, a
few mobile nodes.
Fifth, sensor networks are application specific, i.e., design
requirements of a sensor network change with application.
Sixth, position awareness of sensor nodes is important
since data collection is normally based on the location.
Finally, data collected by many sensors in WSNs is typically
based on common phenomena, hence there is a high
probability that this data has some redundancy.
3
Overview (cont.)
The task of finding and maintaining routes in WSNs is
nontrivial since energy restrictions and sudden
changes in node status (e.g., failure) cause frequent
and unpredictable topological changes.
To minimize energy consumption, routing techniques
proposed for WSNs employ some well-known routing
strategies, e.g., data aggregation and in-network
processing, clustering, different node role
assignment, and data-centric methods were
employed.
4
Outline
o Routing Challenges and Design Issues in WSNs
o Flat Routing
o Hierarchical Routing
o Location Based Routing
o QoS Based Routing
5
Routing Challenges and Design
Issues in WSNs
6
Overview
The design of routing protocols in WSNs is influenced by many
challenging factors. These factors must be overcome before
efficient communication can be achieved in WSNs.
Node deployment
Energy considerations
Data delivery model
Node/link heterogeneity
Fault tolerance
Scalability
Network dynamics
Transmission media
Connectivity
Coverage
Data aggregation/convergecast
Quality of service
7
Node Deployment
Node deployment in WSNs is application dependent
and affects the performance of the routing protocol.
The deployment can be either deterministic or
randomized.
In deterministic deployment, the sensors are
manually placed and data is routed through pre-
determined paths.
In random node deployment, the sensor nodes are
scattered randomly creating an infrastructure in an
ad hoc manner.
8
Energy Considerations
Sensor nodes can use up their limited supply of
energy performing computations and transmitting
information in a wireless environment. Energy
conserving forms of communication and
computation are essential.
In a multi-hop WSN, each node plays a dual role as
data sender and data router. The malfunctioning of
some sensor nodes due to power failure can cause
significant topological changes and might require
rerouting of packets and reorganization of the
network.
9
Data Delivery Model
Time-driven (continuous)
Suitable for applications that require periodic data
monitoring
Event-driven
React immediately to sudden and drastic changes
Query-driven
Respond to a query generated by the BS or another node
in the network
Hybrid
The routing protocol is highly influenced by the data
reporting method
10
Node/Link Heterogeneity
Depending on the application, a sensor node can
have a different role or capability.
The existence of a heterogeneous set of sensors
raises many technical issues related to data routing.
Even data reading and reporting can be generated
from these sensors at different rates, subject to
diverse QoS constraints, and can follow multiple data
reporting models.
11
Fault Tolerance
Some sensor nodes may fail or be blocked due to
lack of power, physical damage, or environmental
interferences
It may require actively adjusting transmission powers
and signaling rates on the existing links to reduce
energy consumption, or rerouting packets through
regions of the network where more energy is
available
12
Scalability
The number of sensor nodes deployed in the sensing
area may be on the order of hundreds or thousands,
or more.
Any routing scheme must be able to work with this
huge number of sensor nodes.
In addition, sensor network routing protocols should
be scalable enough to respond to events in the
environment.
13
Network Dynamics
Routing messages from or to moving nodes is more
challenging since route and topology stability
become important issues
Moreover, the phenomenon can be mobile (e.g., a
target detection/ tracking application).
14
Transmission Media
In general, the required bandwidth of sensor data
will be low, on the order of 1-100 kb/s. Related to the
transmission media is the design of MAC.
TDMA (time-division multiple access)
CSMA (carrier sense multiple access)
15
Connectivity
High node density in sensor networks precludes
them from being completely isolated from each other.
However, may not prevent the network topology
from being variable and the network size from
shrinking due to sensor node failures.
In addition, connectivity depends on the possibly
random distribution of nodes.
16
Coverage
In WSNs, each sensor node obtains a certain view of
the environment.
A given sensors view of the environment is limited in
both range and accuracy.
It can only cover a limited physical area of the
environment.
17
Data Aggregation/Convergecast
Since sensor nodes may generate significant
redundant data, similar packets from multiple nodes
can be aggregated to reduce the number of
transmissions.
Data aggregation is the combination of data from
different sources according to a certain aggregation
function.
Convergecasting is collecting information upwards
from the spanning tree after a broadcast.
18
Quality of Service
In many applications, conservation of energy, which
is directly related to network lifetime.
As energy is depleted, the network may be required
to reduce the quality of results in order to reduce
energy dissipation in the nodes and hence lengthen
the total network lifetime.
19
Routing Protocols in WSNs: A taxonomy
20
Network Structure Protocol Operation
Flat routing
SPIN
Directed Diffusion (DD)
Hierarchical routing
LEACH
PEGASIS
TTDD
Location based routing
GEAR
GPSR
Negotiation based routing
SPIN
Multi-path network routing
DD
Query based routing
DD, Data centric routing
QoS based routing
TBP, SPEED
Coherent based routing
DD
Aggregation
Data Mules, CTCCAP
Routing protocols in WSNs
Flat Routing
21
Overview
In flat network, each node typically plays the same role and
sensor nodes collaborate together to perform the sensing
task.
Due to the large number of such nodes, it is not feasible to
assign a global identifier to each node. This consideration
has led to data centric routing, where the BS sends queries
to certain regions and waits for data from the sensors
located in the selected regions. Since data is being
requested through queries, attribute-based naming is
necessary to specify the properties of data.
Prior works on data centric routing, e.g., SPIN and Directed
Diffusion, were shown to save energy through data
negotiation and elimination of redundant.
22
23
SPIN
Sensor Protocols for Information via Negotiation
SPIN -Motivation
Sensor Protocols for Information via Negotiation,
SPIN
A Negotiation-Based Protocols for Disseminating
Information in Wireless Sensor Networks.
Dissemination is the process of distributing individual
sensor observations to the whole network, treating
all sensors as sink nodes
Replicate complete view of the environment
Enhance fault tolerance
Broadcast critical piece of information
24
SPIN (cont.)- Motivation
Flooding is the classic approach for dissemination
Source node sends data to all neighbors
Receiving node stores and sends data to all its
neighbors
Disseminate data quickly
Deficiencies
Implosion
Overlap
Resource blindness
25
SPIN (cont.)-Implosion
26
Node
The direction
of data sending
The connect
between nodes
A
C B
D
x
x x
x
SPIN (cont.)- Overlap
27
q
r
s
(q, r) (s, r)
Node
The direction
of data sending
The connect
between nodes
The searching
range of the
node
A B
C
SPIN (cont.)- Resource blindness
In flooding, nodes do not modify their activities
based on the amount of energy available to them.
A network of embedded sensors can be resource-
aware and adapt its communication and
computation to the state of its energy resource.
28
SPIN (cont.)
Negotiation
Before transmitting data, nodes negotiate with each other
to overcome implosion and overlap
Only useful information will be transferred
Observed data must be described by meta-data
Resource adaptation
Each sensor node has resource manager
Applications probe manager before transmitting or
processing data
Sensors may reduce certain activities when energy is low
29
SPIN (cont.)- Meta-Data
Completely describe the data
Must be smaller than the actual data for SPIN to be
beneficial
If you need to distinguish pieces of data, their meta-data
should differ
Meta-Data is application specific
Sensors may use their geographic location or unique node
ID
Camera sensor may use coordinate and orientation
30
SPIN (cont.)- SPIN family
Protocols of the SPIN family
SPIN-PP
It is designed for a point to point communication, i.e., hop-
by-hop routing
SPIN-EC
It works similar to SPIN-PP, but, with an energy heuristic
added to it
SPIN-BC
It is designed for broadcast channels
SPIN-RL
When a channel is lossy, a protocol called SPIN-RL is used
where adjustments are added to the SPIN-PP protocol to
account for the lossy channel.
31
SPIN (cont.)- Three-stage handshake
protocol
SPIN-PP: A three-stage handshake protocol for point-
to-point media
ADV data advertisement
Node that has data to share can advertise this by
transmitting an ADV with meta-data attached
REQ request for data
Node sends a request when it wishes to receive some
actual data
DATA data message
Contain actual sensor data with a meta-data header
Usually much bigger than ADV or REQ messages
32
SPIN (3-Step Protocol)
33
B
A
SPIN (3-Step Protocol)
34
B
A
Notice the color of the data packets sent by node B
SPIN (3-Step Protocol)
35
B
A
SPIN effective when DATA sizes are large :
REQ, ADV overhead gets amortized
SPIN (cont.)- SPIN-EC (Energy-Conserve)
Add simple energy-conservation heuristic to
SPIN-PP
SPIN-EC: SPIN-PP with a low-energy threshold
Incorporate low-energy-threshold
Works as SPIN-PP when energy level is high
Reduce participation of nodes when approaching
low-energy-threshold
When node receives data, it only initiates protocol if it can
participate in all three stages with all neighbor nodes
When node receives advertisement, it does not request the
data
Node still exhausts energy below threshold by
receiving ADV or REQ messages
36
SPIN (cont.)- Conclusion
SPIN protocols hold the promise of achieving high
performance at a low cost in terms of complexity,
energy, computation, and communication
Pros
Each node only needs to know its one-hop neighbors
Significantly reduce energy consumption compared to flooding
Cons
Data advertisement cannot guarantee the delivery of data
If the node interested in the data are far from the source,
data will not be delivered
Not good for applications requiring reliable data delivery, e.g.,
intrusion detection
37
38
Directed Diffusion
A Scalable and Robust Communication Paradigm for
Sensor Networks
Overview
Data-centric communication
Data is named by attribute-value
pairs
Different form IP-style
communication
End-to-end delivery service
e.g.
How many pedestrians do you
observe in the geographical
region X?
39
Event
Sources
Sink Node
Directed
Diffusion
A sensor field
Overview (cont.)
Data-centric communication (cont.)
Human operators query (task) is diffused
Sensors begin collecting information about query
Information returns along the reverse path
Intermediate nodes aggregate the data
Combing reports from sensors
Directed Diffusion is an important milestone in the
data centric routing research of sensor networks
40
Directed Diffusion
Typical IP based networks
Requires unique host ID addressing
Application is end-to-end
Directed diffusion use publish/subscribe
Inquirer expresses an interest, I, using attribute values
Sensor sources that can service I, reply with data
41
Directed Diffusion (cont.)
Directed diffusion consists of
Interest - Query which specifies what a user wants
Data - Collected information
Gradient
Direction and data-rate
Events start flowing towards the originators of interests
Reinforcement
After the sink starts receiving events, it reinforces at
least one neighbor to draw down higher quality events
42
Directed Diffusion: Pros & Cons
Different from SPIN in terms of on-demand
data querying mechanism
Sink floods interests only if necessary (lots of energy savings)
In SPIN, sensors advertise the availability of data
Pros
Data centric: All communications are neighbor to neighbor
with no need for a node addressing mechanism
Each node can do aggregation & caching
Cons
On-demand, query-driven: Inappropriate for applications
requiring continuous data delivery, e.g., environmental
monitoring
Attribute-based naming scheme is application dependent
For each application it should be defined a priori
Extra processing overhead at sensor nodes
43
Conclusions
Directed diffusion, a paradigm proposed for event
monitoring sensor networks
Directed Diffusion has some novel features -
data-centric dissemination, reinforcement-based
adaptation to the empirically best path, and in-
network data aggregation and caching.
Notion of gradient (exploratory and reinforced)
Energy efficiency achievable
Diffusion mechanism resilient to fault tolerance
Conservative negative reinforcements proves useful
44
45
Hierarchical Routing
Overview
In a hierarchical architecture, higher energy nodes can be
used to process and send the information while low energy
nodes can be used to perform the sensing of the target.
Hierarchical routing is mainly two-layer routing where one
layer is used to select cluster heads and the other layer is
used for routing.
Hierarchical routing (or cluster-based routing), e.g., LEACH,
PEGASIS, TTDD, is an efficient way to lower energy
consumption within a cluster and by performing data
aggregation and fusion in order to decrease the number of
transmitted messages to the base stations.
46
47
LEACH
Low-Energy Adaptive Clustering Hierarchy
LEACH
LEACH (Low-Energy Adaptive Clustering Hierarchy), a
clustering-based protocol that minimizes energy
dissipation in sensor networks.
LEACH outperforms classical clustering algorithms by
using adaptive clusters and rotating cluster-heads,
allowing the energy requirements of the system to be
distributed among all the sensors.
LEACH is able to perform local computation in each
cluster to reduce the amount of data that must be
transmitted to the base station.
LEACH uses a CDMA/TDMA MAC to reduce inter-
cluster and intra-cluster collisions.
48
LEACH (cont.)
Sensors elect themselves to be local cluster-heads at
any given time with a certain probability.
Each sensor node joins a cluster-head that requires
the minimum communication energy.
Once all the nodes are organized into clusters, each
cluster-head creates a transmission schedule for the
nodes in its cluster.
In order to balance the energy consumption, the
cluster-head nodes are not fixed; rather, this position
is self-elected at different time intervals.
49
LEACH
100 m
Base Station
Sensor (Non Cluster Head)
Sensor (Cluster Head)
Initial Data
Aggregated Data
~100m
50
LEACH: Adaptive Clustering
Periodic independent self-election
Probabilistic
CSMA MAC used to advertise
Nodes select advertisement with strongest signal strength
Dynamic TDMA cycles
51
All nodes marked with a given symbol belong to the same cluster, and
the cluster head nodes are marked with a .
Algorithm
Periodic process
Two phases per round:
Setup phase
Advertisement: Execute election algorithm
Members join to cluster
Cluster-head broadcasts schedule
Steady-State phase
Data transmission to cluster-head using TDMA
Cluster-head transfers data to BS (Base Station)
52
53
Algorithm (cont.)
53
Advertisement phase Cluster setup phase Broadcast schedule
Time slot
1
Time slot
2
Time slot
3
Setup phase Steady-state phase
Self-election of cluster
heads
Cluster heads compete
with CSMA
Members
compete with
CSMA
Cluster head Broadcast
CDMA code to members
Fixed-length cycle
Algorithm Summary
Set-up phase
Node n choosing a random number m between 0 and 1
If m < T(n) for node n, the node becomes a cluster-head where
where P = the desired percentage of cluster heads (e.g., P= 0.05),
r=the current round, and G is the set of nodes that have not
been cluster-heads in the last 1/P rounds. Using this threshold,
each node will be a cluster-head at some point within 1/P
rounds. During round 0 (r=0), each node has a probability P of
becoming a cluster-head.
54
1 [ *mod(1/ )] ( )
0 ,
P
if n G
P r P T n
otherwise