A Geography-free Routing Protocol for Wireless Sensor Networks Yunhuai Liu 1, Lionel M. Ni 1 and Minglu Li 2

Size: px
Start display at page:

Download "A Geography-free Routing Protocol for Wireless Sensor Networks Yunhuai Liu 1, Lionel M. Ni 1 and Minglu Li 2"

Transcription

1 A Geography-free Routing Protocol for Wireless Sensor Networks Yunhuai Liu, Lionel M. Ni and Minglu Li Department of Computer Science Hong Kong University of Science & Technology {yunhuai, Abstract --- In wireless sensor networks, it is critical to provide the data delivery services between sensors and the data collection unit (called sink). Some of the existing approaches require location or ID information which is quite expensive. For those without location or ID information, the usage of the collected information is rather limited. In this paper, we propose a geography-free coordinate system, called GREENWIS, to assist routing. In GREENWIS, sensors are identified by a -tuple with which messages are universally transmitted. Our analysis and experiments show that GREENWIS is reliable and power efficient compared with existing approaches. I. INTRODUCTION Sensor network has become one of the most promising technologies for its extensible capabilities []. The ad-hoc mode and flexible means of deployment make it appropriate for a broad spectrum of applications ranging from environmental and habitat monitoring to military and security surveillance (e.g., []). Some unique features make the wireless sensor networks inherently different from the tradition mobile ad hoc networks [3]. Typically, sensors are characterized as resource critical devices with very limited power, thus the energy consumption arises to be the major concern. In order to lower down the cost and communication overhead, the global ID, such as the widely utilized IP address and the MAC address, is not always available. In the meantime, the large scale and the high density of the deployment also make the routing problem more challenging than in other systems. To provide efficient data delivery services, a first requirement and challenge is to define an effective node ID for nodes. In a purely content-driven computing environment without any ID, messages have to be flooded in the network, which is not power efficient obviously. Most applications also need a scheme to uniquely label the generated data. Otherwise, the collected information has the quite limited usage. Note This research was supported in part by Hong Kong RGC Grants HKUST66/3E and AoE/E-/99. In this paper, we use the term hop count to measure the distance. Unless otherwise specified, the terms hop count and logical distance are used interchangeably. Deptment of Computer Science & Engineering Shanghai Jiao Tong University mlli@sjtu.edu.cn that the location information is a specific kind of ID. It may make the problem more complicate to apply the location information as the id by imposing the localization techniques. On the other hand, too long a node ID does not lead to an efficient solution either, for the introduced communication and storage overhead rely on the number of bits. Thus, a suitable ID mechanism must strike the balance between no ID and a globally, location-dependent ID. Although some work has been done in this area [], few researchers have considered the impact of the ID scheme to the routing tasks. With the assumption of available ID schemes, existing routing protocols can be classified into three categories according to their basic methods. Geography based approaches assume that sensors are aware of their physical locations. Some of them [] setup a small region to flood instead of the whole field. Others seek to deliver messages along a single path by greedy forwarding. (e.g., [6-8]). However, it is too strong an assumption for simple sensors to acquire the location information. Gradient based approaches [9-] use the logical distance rather than the geometric distance to tackle the routing tasks. They weaken on the limited application domain. Random approaches [] introduce the random factors when establishing the routing path. However, such paths are not guaranteed to be optimal in any level. Moreover, the delivery rate of messages is not satisfactory either. In this paper, we propose a geography-free coordinate system GREENWIS, to assist routing. In GREENWIS, nodes are described by a -tuple coordinate (latitude, region-id, longitude, spread-mark) which can be utilized as the node ID. As illustrated in Fig., latitude is the logical distance of a node away from the sink. The sink will then establish a set of meridians as reference lines, where each meridian is identified by a region-id. Each node accordingly measures its distance to the closest meridian, called longitude. Spread-mark is another form of latitude with respect to the selected meridian. Once the GREENWIS coordinate system is established, nodes are roughly positioned and data can be transmitted universally.

2 The rest of this paper is organized as follows. Section presents the design of the GREENWIS and its applications. Section 3 gives the complexity analysis and shows some performance results. In the final section, we conclude this work with our future plan. II. THE GREENWIS COORDINATE SYSTEM In GREENWIS, the application field is divided into several regions by meridians. Each node belongs to one region and maintains a -tuples coordinate to represent its relative position. The greedy forwarding based routing algorithm is based on this coordinate. We assume that there is a local-id scheme available so that every node can distinguish its neighbors without confusion. This local-id can be randomly generated. We also assume that the links are symmetric. This can be easily acquired by remove all the asymmetric links. A. Concept and terminologies Definition : The latitude (lat) of a node is the shortest hop number from the node to the sink. Definition : A meridian is a multi-hop communication path connecting the sink to a node which has the max value of the latitude. Here the max value of the latitude is determined by the sink with the reference of the globally maxima of the latitude. The node on the other end of a meridian is called a pole node. Definition 3: The region-id is the ID of the meridian from which a node measures its coordinates. Definition : Given a meridian, the longitude (long) of a node is its shortest distance from the node to the meridian.. Definition : Given a node M with its associated meridian, the spread-mark (sm) of M is the latitude of the node in the meridian that M reaches with the shortest path (M s longitude). Whenever two paths from a meridian to a node M have the same length, M chooses the one who has the closer latitude with M s owns. For example shown in Fig., both A and B have paths to M that length=3. M.lat =, A.lat = and B.lat =. Then M.sm = A.lat = Definition 6: A cell is the set of nodes having the identical -tuple coordinates. B. Establishment of a single meridian GREENWIS The procedure to establish a single meridian GREENWIS mainly consists of: () setup the latitude; () find a pole node having the max latitude; (3) let the pole node sends a message, an initiator, back to the sink; the initiator triggers all the passing by nodes as the first meridian, called prime meridian; and ()the initiator is flooded to the network to facilitate the setup of other s longitude and sm. ) Determination of latitude Initially only the sink has the coordinates (,,, ). The first step is to assign the latitude by a sink initialized flooding. Many works have been done on how to do this. In particular, the authors of [3] proposed a back-off based flooding scheme which ensure that each node advertises its latitude only once with the eventually correct value. This mechanism avoids unnecessary traffic and improves the performance of flooding. In the process of flooding, another operation for each node is to determine if it has a maximum latitude among all its neighbors by overhearing others flooding messages. A node with the maximum latitude value among its neighbors is called latitude locally max (lmax) nodes. ) Looking for the prime pole To find a prime pole, the sink must determine the latitude globally max (gmax) first. Those lmax nodes should report their coordinates to the sink. Note that the latitude fields are available in present. The technique to deliver a message from a sensor to the sink only by latitude will be described later. The sink then can determine max=gmax. However, the number of nodes having lat=gmax could be very low. Accordingly, max=gmax may incur too few number of candidate pole nodes having lat=max, and thus may introduce too much overhead on finding a pole node. In order to avoid this, the sink can determine the max=gmax- or max=gmax-. Note that the direction of the prime meridian is less relevant to the performance of the GREENWIS coordinates. Although a longer prime meridian can make the transmission path better to some extent, choosing a non-perfect max will not deteriorate GEENWIS too much but can save a lot of efforts in some cases. With the determined max value, the sink disseminates a probe to the network. A probe is a special, long-lived message initiated by the sink and travels the network like a worm. The main objective of a probe is to find a node having lat=max. Any intermediate node randomly picks up a neighbor as the next hop until the probe arrives to a lat=max node. In order to avoid excessive wandering of the probe, for each forwarding node, the neighbors with higher latitude are selected with a higher priority so that the probe is gently encouraged to climb to the high latitude region.

3 3 Prime Meridian Sink Prime Meridian A 3 B 3 3 Node M Sink the prime meridian Figure : The sink builds the prime meridian and sensor nodes measure their coordinates The first lat=max node receiving a probe becomes the pole node of this prime meridian, called the prime pole. 3) Establishment of the prime meridian The prime pole sends an initiator message back to the sink, and all the passing by nodes form the prime meridian (e.g., Fig.3). As all the downstream nodes of the prime pole are involved, the shape of the meridian is not a single path but an ellipse. ) The assignment of the region-id, longitude and sm The initiator message is not sent back only but flooded into the network to facilitate others to establish their region-id, longitude, and sm fields, respectively. C. Routing based on GREENWIS With the available GREENWIS coordinates, messages are greedily forwarded toward the destination. The region-id helps to restrict the transmission within the region. For a sensor-to-sink operation, the value of latitude is sufficient (e.g., [, 3]). Each sender broadcasts the message to the direct neighbors with the sender s latitude. Each receiver then forwards the message if its latitude is less than the sender s which implies that the receiver is on the downstream of the sender. Otherwise, the receiver discards the overhearing message. For the transmissions of a sink-to-sensor message, the longitude and the spread-mark(sm) fields are utilized. Consider the case that sender M at (sm, longitude, region-id) = (,,) wants to send a message to node N at (, 8,). The line MN has an angle more than π/. M then selects nodes at (6,, ) as the next hop. This kind of forwarding never stops until the receiver (, 8, ) is in the same cell of the destination node. This receiver then floods the message within the destination cell. It is possible that an intermediate sender does not have the desirable next hop node. For the example mentioned above, there is no node in cell (6,, ). It implies that there are voids between M and N and the known right-hand rule is followed to traverse the void: the message is sent to nodes at (, 3, ). Figure: M.latitude=; M.region-id=(prime); M.longitude=3; M.sm=. Figure 3: The establishment of the prime meridian (roughly bounded by the ellipse) D. Establishment of other three meridians Instead of employing the single meridian GREENWIS, we are more interested in GREENWIS with multiple meridians. Similar to the procedure of determining the local maxima of latitude, nodes having a local maxima longitude also report to the sink their coordinates. Among all reported nodes, the sink randomly selects one of the nodes having both the local maxima of longitude and the max value of latitude as the second pole node. The sink then acknowledges the second pole by its coordinate. Similarly, the second meridian can be established. Then another turn of flooding the coordinate begins. The only difference is that this time the region-id is the second meridian but not the prime one. The third meridian and the fourth meridian can be repeatedly established. III. ANALYSIS AND PERFORMANCE EVALUATION In this section, we give some analysis and evaluate the performance of GREENWIS. A. Complexity analysis ) Number of flooding to establish GREENWIS Suppose there are K meridians. Consider simple cases of K= m. The setup of the latitude and longitude for the prime meridian require one flooding each. Suppose the field is equally divided into K= m regions. Then each region roughly has the area A/ m where A is the area of the whole field. When K = m+ meridians are imposed in, half of each region is flooded to assign the new coordinates. So the number of flooding log K F = + (). Equation () can be easily extended to cases that are more general when K is any integer.

4 Transmission overhead (number of packets) x Number of meridians 6 RADIUS (hops) Energy(Kilo Jouels) Total Consumed Energy Vs Size of Field GREENWIS GRAB Rumor Routing 7 Radius(hops) Energy (Jouels) 3 3 Max Consumed Energy Vs Size of Field GREENWIS GRAB Rumor Routing 7 Radius(hops) Figure : K vs. R vs. communication overhead Figure : With density=6, the total consumed energy Figure 6: With density=6, the maximum consumed energy for individual nodes Reliability of GREENWIS on Different Node Density Reliability of GRAB on Different Node Density Reliability of Rumor on Different Node Density d= d=7 d= d= d= % % % % % % 3% 6 d= d=7 d= d= d= % % % % % % 3% 6 d= d=7 d= d= d= % % % % % % 3% 3% Figure 7: The reliability of GREENWIS vs. node failure ) Number of meridians With greedy forwarding algorithm on GREENWIS, it is guaranteed that a node at (long,sm) can be reached by at most long+sm hops. More meridians make the longitude smaller and thus a shorter transmission path. On the other hand, more meridians requires more control overhead to establish GREENWIS and storage spaces for sensors to memorize the region-id by the factor log (K). Thus, the number of meridians is a tradeoff between the transmission overhead and the maintenance overhead. Here we present the relationship between the path quality and the number of meridians. Due to page limitation, we ignore the procedure of derivation. Suppose N nodes are deployed in a field with radius R = N / Dπ hops where D is the average node density. Here the density is defined as the average number of neighbors per sensor node []. The network is partitioned by K= m meridians. Suppose the sink has one interaction with each of the sensor. The sum of the transmission overhead (number of messages) ε is: π ε ( ) R 3 Total = + D 3 K The overhead of the control message (flooding) is: log K ε control = ( + ) π R D Combining these two, Fig. shows the relationship among transmission overhead (number of messages), the number of meridians, and radius (hops). Comparing with the single meridian, two meridians can Figure 8: The reliability of GRAB vs. node failure Figure 9: The reliability of Rumor routing vs. node failure significantly reduce the transmission overhead by %. Increasing from to, the reduction is also near %. From to 8 it is only about % improvement. From 8 to 6, the reduction of the overhead is less than %. In this paper, we employ meridians. B. Performance evaluation For the experiment, we select the parameters of the sensor hardware similar to Berkeley motes []. The transmission range of a node is meters with the unit disk model. The power consumptions of full power transmitting, receiving and listening are.66w,.39w and.39w, respectively. The size of the application field varies form m to m. Varied numbers of nodes are deployed for desired node density to examine the scalability of protocols. We also simulate the failure of sensors to evaluate the reliability. To test if GREENWIS achieves its goal in efficient data delivery, we measure the total energy consumption. It is the total amount of energy to support all nodes having one interaction with the sink. An interaction includes one sink-to-sensor and one sensor-to-sink transmission. We also examine the maximum consumed energy for individual nodes. To examine if GREENWIS satisfies the power efficiency with the cost of reliability, we measure the success ratio which is the number of completed interactions to the total number of generated interactions. GREENWIS is compared with the known GRAB [] and Rumor routing []. All of these three protocols are implemented in our simulator. For GRAB,

5 we select the hop count as the cost field, and for Rumor routing, each query generates agents [] to detect an event. C. Transmission overhead We study the relationship between the energy and the size of application field R with fixed node density being 6. Figure shows that in GREENWIS the total energy consumption is linearly increased with a low slope on the radius R. Both Rumor routing and GRAB have exponential increase with that GRAB consumes the most power. Figure 6 shows the maximum consumed energy of individual nodes. GREENWIS also exhibits good performance over both GRAB and Rumor routing. The maximum consumed energy has direct relation to the lifetime of nodes. Reducing the maximum consumed energy can dramatically increase the connectivity and hence extend the lifetime of the network. D. Reliability of transmissions Figures 7-9 compare the transmission reliabilities of GREENWIS, GRAB and Rumor routing, respectively. We study their performances in terms of node failures under different node densities. For GREENWIS (shown in Fig. 7), when sensor nodes are sparsely deployed, a low number of node failure will degrade the performance dramatically. When d=, a % of node failure will decrease the reliability by 3%. On the other hand, increasing the node density can significantly improve the reliability. d=7 can deliver 9% of transmissions even with % of node failure, and d= can withstand 3% of node failure. Rumor routing performs the worst due to the inherent random fashion that Rumor routing employs. Figure 9 shows that the successful rate is no more than 8% even there is no node failure. IV. CONCLUSIONS AND FUTURE WORK In this paper, we presented the promising coordinate system, called GREENWIS. GREENWIS is a geography-free system in which nodes are identified by a -tuple with which messages can be easily delivered. Our preliminary results showed that GREENWIS is power efficient without sacrificing any communication reliability. In our future work, we will explore more applications based on GREENWIS such as maintenance and density control. We will also investigate the GREENWIS under the scenarios of multiple sinks, mobile sensors, and the dynamic addition/deletion of sensors. REFERENCE: [] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on Sensor Networks," IEEE Communications Magazine. Augest, [] D. Culler, D. Estrin, and M. Srivastava, "Sensor Network Applications," IEEE Computer, pp August, [3] E. M. Royer and C.-K. Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks," IEEE Personal Communications. April, 999 [] J. N. Al-Karaki and A. E. Kamal, "A Taxonomy of Routing Techniques in Wireless Sensor Networks," in Sensor Networks Handbook: CRC Publishers,. [] S. Basagni, I. Chlamtac, V. R. Syrotiuk, and B. A. Woodward, "A Distance Routing Effect Algorithm for Mobility (DREAM)," presented at ACM MobiCom, 998. [6] B. Karp and H. T. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," presented at ACM MobiCom,. [7] Y. Xu, J. Heidemann, and D. Estrin, "Geography-informed Energy Conservation for Ad Hoc Routing," presented at ACM MobiCom,. [8] F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "A TwoTier Data Dissemination Model for Largescale Wireless Sensor Networks," presented at ACM MobiCom,. [9] C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed Diffusion: A scalable and roubst communication paradigm for sensor networks," presented at ACM MobiCom,. [] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, "Highly-resilient, energy-efficient multipath routing in wireless sensor networks," presented at ACM MobiCom,. [] F. Ye, G. Zhong, S. Lu, and L. Zhang, "GRAB: A Robust Data Delivery Protocol for Large Scale Sensor Networks," presented at IEEE IPSN, 3. [] D. Braginsky and D. Estrin, "Rumor Routing Algorithm For Sensor Networks," presented at ACM MobiCom,. [3] F. Ye, A. Chen, S. Lu, and L. Zhang, "A Scalable Solution to Minimum Cost Forwarding in Large Sensor Network," presented at ICCCN,. [] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Cullar, and K. Pister, "System Architecture Directions for Networked Sensors," presented at ASPLOS-IX,.

Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

More information

Mobility of sink using hexagon architecture in highly data centric Wireless Sensor Networks

Mobility of sink using hexagon architecture in highly data centric Wireless Sensor Networks Mobility of sink using hexagon architecture in highly data centric Wireless Sensor Networks Nitika Vats Doohan, Sanjiv Tokekar, JitendraPatil Abstract Mobility of sensor nodes brings the new challenges

More information

BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks

BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks Abstract HANY MORCOS IBRAHIM MATTA AZER BESTAVROS {hmorcos, matta, best}@cs.bu.edu Computer Science Department, Boston University

More information

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee, and Young-Bae Ko College of Information and Communication, Ajou University,

More information

An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks

An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks Zehua Zhou Xiaojing Xiang State University of New York at Buffalo Buffalo, NY, USA {zzhou5, xxiang}@cse.buffalo.edu Xin Wang

More information

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea

More information

Zonal Rumor Routing for. Wireless Sensor Networks

Zonal Rumor Routing for. Wireless Sensor Networks Tarun Banka Department of Electrical and Computer Engineering tarunb@engr.colostate.edu Zonal Rumor Routing for. Wireless Sensor Networks Gagan Tandon Department of Computer Science gagan@cs.colostate.edu

More information

SLALoM: A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks

SLALoM: A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks SLALoM A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks Christine T. Cheng *, Howard L. Lemberg, Sumesh J. Philip, Eric van den Berg and Tao Zhang * Institute for Math & its Applications,

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

Event Driven Routing Protocols For Wireless Sensor Networks

Event Driven Routing Protocols For Wireless Sensor Networks Event Driven Routing Protocols For Wireless Sensor Networks Sherif Moussa 1, Ghada Abdel Halim 2, Salah Abdel-Mageid 2 1 Faculty of Engineering, Canadian University Dubai, Dubai, UAE. 2 Faculty of Engineering,

More information

Routing in Sensor Networks

Routing in Sensor Networks Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing

More information

Energy Aware Location Based Routing Protocols in Wireless Sensor Networks

Energy Aware Location Based Routing Protocols in Wireless Sensor Networks Available online at www.worldscientificnews.com WSN 124(2) (2019) 326-333 EISSN 2392-2192 SHORT COMMUNICATION Energy Aware Location Based Routing Protocols in Wireless Sensor Networks ABSTRACT Kalpna Guleria

More information

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Receiver Based Multicasting Protocol for Wireless Sensor Networks Receiver Based Multicasting Protocol for Wireless Sensor Networks Madesha M Assistant Professor, Department of CSE Sahyadri College of Engineering and Management Chaya D Lecturer, Department of CSE H.M.S

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Aggregation Tree Construction in Sensor Networks

Aggregation Tree Construction in Sensor Networks Aggregation Tree Construction in Sensor Networks Min Ding Xiuzhen Cheng Guoliang Xue Abstract Large-scale wireless sensor networks are expected to play an increasingly important role in future civilian

More information

Replacing Failed Sensor Nodes by Mobile Robots

Replacing Failed Sensor Nodes by Mobile Robots Replacing Failed Sensor Nodes by Mobile Robots Yongguo Mei, Changjiu Xian, Saumitra Das, Y. Charlie Hu and Yung-Hsiang Lu Purdue University, West Lafayette {ymei, cjx, smdas, ychu, yunglu}@purdue.edu Abstract

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

Void Traversal for Guaranteed Delivery in Geometric Routing

Void Traversal for Guaranteed Delivery in Geometric Routing Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v

More information

Energy-Efficient Self-Organization for Wireless Sensor Networks

Energy-Efficient Self-Organization for Wireless Sensor Networks Energy-Efficient Self-Organization for Wireless Sensor Networks Thomas Watteyne CTTC, 22nd May 2007 Thomas Watteyne, PhD. candidate CITI Laboratory INRIA / INSA de Lyon France Telecom R&D Grenoble Advisor:

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks

An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks Turkmen Canli, Zhihui Chen, Ashfaq Khokhar University of Illinois at Chicago Ajay Gupta Western Michigan University Abstract-This

More information

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication

More information

Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network

Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network Wireless Sensor Network, 2010, 2, 710-717 doi:10.4236/wsn.2010.29086 Published Online September 2010 (http://www.scirp.org/journal/wsn) Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

Study on Wireless Sensor Networks Challenges and Routing Protocols

Study on Wireless Sensor Networks Challenges and Routing Protocols International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 5 (7): 824-828 Science Explorer Publications Study on Wireless Sensor Networks

More information

Opportunistic Transmission Based QoS Topology Control. QoS; Wireless Sensor Networks

Opportunistic Transmission Based QoS Topology Control. QoS; Wireless Sensor Networks Opportunistic Transmission Based QoS Topology Control in Wireless Sensor Networks Jian Ma, Chen Qian, Qian Zhang, and Lionel M. Ni Hong Kong University of Science and Technology {majian, cqian, qianzh,

More information

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks J. Basic. Appl. Sci. Res., 2(5)4880-4885, 2012 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com New Active Caching Method to Guarantee Desired

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

An Iterative Greedy Approach Using Geographical Destination Routing In WSN ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Artery: A Data-Centric Architecture for Wireless Sensor Networks

Artery: A Data-Centric Architecture for Wireless Sensor Networks Artery: A Data-Centric Architecture for Wireless Sensor Networks Lan LIN Department of Computer Science, University of Denver Denver, CO 80208, USA Hailin WU Department of Computer Science, University

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

Image Transmission in Sensor Networks

Image Transmission in Sensor Networks Image Transmission in Sensor Networks King-Shan Lui and Edmund Y. Lam Department of Electrical and Electronic Engineering The University of Hong Kong Pokfulam Road, Hong Kong, China Email {kslui,elam}@eee.hku.hk

More information

Proposition and evaluation of a novel routing protocol for wireless sensor networks

Proposition and evaluation of a novel routing protocol for wireless sensor networks roposition and evaluation of a novel routing protocol for wireless sensor networks Samira Yessad Louiza Bouallouche Djamil Aissani University of Bejaia, University of Bejaia, University of Bejaia, Algeria

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks RAFE ALASEM 1, AHMED REDA 2 AND MAHMUD MANSOUR 3 (1) Computer Science Department Imam Muhammad ibn Saud Islamic University

More information

Rumor Routing Algorithm

Rumor Routing Algorithm Aleksi.Ahtiainen@hut.fi T-79.194 Seminar on Theoretical Computer Science Feb 9 2005 Contents Introduction The Algorithm Research Results Future Work Criticism Conclusions Introduction is described in paper:

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Application Aware Data Aggregation in Wireless Sensor Networks

Application Aware Data Aggregation in Wireless Sensor Networks Application Aware Data Aggregation in Wireless Sensor Networks Sangheon Pack, Jaeyoung Choi, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul,

More information

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor

More information

Routing and Transport in Wireless Sensor Networks

Routing and Transport in Wireless Sensor Networks Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References

More information

The Firecracker Protocol

The Firecracker Protocol The Firecracker Protocol Philip Levis and David Culler {pal,culler}@eecs.berkeley.edu EECS Department University of California, Berkeley Berkeley, CA 94720 ABSTRACT We propose the Firecracker protocol

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Location-aware In-Network Monitoring in Wireless Sensor Networks

Location-aware In-Network Monitoring in Wireless Sensor Networks Location-aware In-Network Monitoring in Wireless Sensor Networks Volker Turau and Christoph Weyer Department of Telematics, Technische Universität Hamburg-Harburg Schwarzenbergstraße 95, 21073 Hamburg,

More information

Energy Efficient Multipath Routing Protocol with Guaranteed Data Delivery for Wireless Sensor Network

Energy Efficient Multipath Routing Protocol with Guaranteed Data Delivery for Wireless Sensor Network Energy Efficient Multipath Routing Protocol with Guaranteed Data Delivery for Wireless Sensor Network Kirankumar B. Balavalad, Ajayakumar C. Katageri, Poornima M. Chanal, and Gururaj Kori Abstract The

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Energy Aware and Anonymous Location Based Efficient Routing Protocol

Energy Aware and Anonymous Location Based Efficient Routing Protocol Energy Aware and Anonymous Location Based Efficient Routing Protocol N.Nivethitha 1, G.Balaji 2 1 PG student, 2 Asst.Professor Department of Electronics and Communication Engineering Angel College of Engineering

More information

Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network Sukant Kishoro Bisoyi, Mohit Ranjan Panda & Sangeeta Mishra C. V. Raman College of Engineering,

More information

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing 309 Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing Sinchan Roychowdhury Instrumentation Control Engineering Calcutta Institute of Engineering & Management Kolkata, India

More information

ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL

ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL Kunal M Pattani 1, Palak J Chauhan 2 1 Professor,C.U.Shah College of Engineering and Technology Wadhwan City Gujarat, India. 2 M.E Student, Dept.

More information

DETECTION OF OPTIMAL PATH USING QUADRATIC ASSIGMENT TECHNIQUE IN WIRELESS SENSOR NETWORKS

DETECTION OF OPTIMAL PATH USING QUADRATIC ASSIGMENT TECHNIQUE IN WIRELESS SENSOR NETWORKS DETECTION OF OPTIMAL PATH USING QUADRATIC ASSIGMENT TECHNIQUE IN WIRELESS SENSOR NETWORKS 1 Vinoba.V, 2 Indhumathi.A 1 Department of Mathematics, K.N. Government Arts college, Tamil Nadu, India. 2 Department

More information

M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks

M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks Lynn Choi 1, Jae Kyun Jung 1, Byong-Ha Cho 1, and Hyohyun Choi 2 1 Korea University, Anam-Dong, Sungbuk-Ku, Seoul, Korea

More information

Routing towards a mobile sink using virtual coordinates in a wireless sensor network

Routing towards a mobile sink using virtual coordinates in a wireless sensor network Routing towards a mobile sink using virtual coordinates in a wireless sensor network Rouhollah Rahmatizadeh, Saad Ahmad Khan, Anura P. Jayasumana, Damla Turgut and Ladislau Bölöni Department of Electrical

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

A Robust and Light-Weight Routing Mechanism for Wireless Sensor Networks

A Robust and Light-Weight Routing Mechanism for Wireless Sensor Networks A Robust and Light-Weight Routing Mechanism for Wireless Sensor Networks Jing Deng, Richard Han and Shivakant Mishra Department of Computer Science, University of Colorado Campus Box 0430, Boulder, CO

More information

Chapter 11 Chapter 6

Chapter 11 Chapter 6 Routing Protocols References H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

References. Forwarding. Introduction...

References. Forwarding. Introduction... References Routing Protocols H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

Table of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3.

Table of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3. Geographic Protocols in Sensor Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {seada, helmy}@usc.edu Table of Contents 1. Introduction 2. Geographic

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS Saraswati Mishra 1 and Prabhjot Kaur 2 Department of Electrical, Electronics and Communication Engineering,

More information

ISSN Vol.04,Issue.12, September-2016, Pages:

ISSN Vol.04,Issue.12, September-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.12, September-2016, Pages:2134-2140 Secure Routing for Wireless Sensor Networks using Caser Protocol TAYYABA TAMKEEN 1, AMENA SAYEED 2 1 PG Scholar, Dept of

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado

More information

ROUTING is an important issue that affects wireless

ROUTING is an important issue that affects wireless 1 Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks Ming-Jer Tsai, Hong-Yen Yang, Bing-Hong Liu, and Wen-Qian Huang Abstract In this paper, we first propose a method,,

More information

2 Proposed Routing Protocol

2 Proposed Routing Protocol directional flooding (which involves some extra overhead and consumes limited node energy) is to ensure a significant tradeoff in terms of node energy balancing and network lifetime. The key features distinguishing

More information

ENERGY-EFFICIENT ROUTING SCHEME USING MOBILE SINKS IN WIRELESS SENSOR NETWORKS

ENERGY-EFFICIENT ROUTING SCHEME USING MOBILE SINKS IN WIRELESS SENSOR NETWORKS ENERGY-EFFICIENT ROUTING SCHEME USING MOBILE SINKS IN WIRELESS SENSOR NETWORKS 1 KULWARDHAN SINGH, 2 T. P. SHARMA 1,2 Computer Science and Engineering, Department, National Institute of Technology Hamirpur,

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Energy-Efficient Dynamic Query Routing Tree Algorithm for Wireless Sensor Networks

Energy-Efficient Dynamic Query Routing Tree Algorithm for Wireless Sensor Networks Energy-Efficient Dynamic Query Routing Tree Algorithm for Wireless Sensor Networks Si Gwan Kim Dept. of Computer Software Kumoh Nat l Inst. of Technology Gumi, Korea Abstract To exploit in answering queries

More information

Networking Sensors, I

Networking Sensors, I Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

PERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS

PERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS PERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS Shinya Ito 1 and Kenji Yoshigoe 1 BeachHead, Inc., 37899 W. 1 Mile Rd, Suite 100 Farmington Hills, MI

More information

Transmit and Receive Power Optimization for Source-Initiated Broadcast in Wireless-Relay Sensor Networks

Transmit and Receive Power Optimization for Source-Initiated Broadcast in Wireless-Relay Sensor Networks Transmit and Receive Power Optimization for Source-Initiated Broadcast in Wireless-Relay Sensor Networks Chen-Yi Chang and Da-shan Shiu Abstract Minimization of power consumption is a critical design goal

More information

Routing in Ad-Hoc Networks

Routing in Ad-Hoc Networks Routing in Ad-Hoc Networks Ramesh Patil Computer Science Department, University of Texas at Arlington Abstract In this paper, we deal with the basic concept of ad-hoc networks and the need for it. We present

More information

Adaptive Distributed Indexing for Spatial Queries in Sensor Networks

Adaptive Distributed Indexing for Spatial Queries in Sensor Networks Adaptive Distributed Indexing for Spatial Queries in Sensor Networks Vladimir Dyo and Cecilia Mascolo Department of Computer Science, University College London, UK Email: {v.dyo c.mascolo }@cs.ucl.ac.uk

More information

Hint-based Routing in WSNs using Scope Decay Bloom Filters

Hint-based Routing in WSNs using Scope Decay Bloom Filters Hint-based Routing in WSNs using Scope Decay Bloom Filters Xiuqi Li and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 {xli,jie}@cse.fau.edu Jun

More information

The Effect of Physical Topology on Wireless Sensor Network Lifetime

The Effect of Physical Topology on Wireless Sensor Network Lifetime 1 JOURNAL OF NETWORKS, VOL., NO. 5, SEPTEMBER 7 The Effect of Physical Topology on Wireless Sensor Network Lifetime Debdhanit Yupho Planning Department Aeronautical Radio of Thailand Limited, Bangkok,

More information

Data Dissemination with Ring-Based Index for Sensor Networks

Data Dissemination with Ring-Based Index for Sensor Networks Data Dissemination with Ring-Based Index for Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science and Engineering The Pennsylvania State University University Park,

More information

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,

More information

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

A Real-Time Directed Routing Protocol Based on Projection of Convex Holes on Underwater Acoustic Networks

A Real-Time Directed Routing Protocol Based on Projection of Convex Holes on Underwater Acoustic Networks I.J. Wireless and Microwave Technologies, 01,, 65-73 Published Online April 01 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.01.0.10 Available online at http://www.mecs-press.net/ijwmt A Real-Time

More information

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks A Novel Hierarchical Routing Protocol for Wireless Sensor Networks TrongThuaHuynh 1 and Choong Seon Hong 2 Department of Computer Science, Kyung Hee University, 1 Seocheon, Giheung, Yongin, Gyeonggi 449-701

More information

An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks

An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks Abstract A substantial amount of research on routing in sensor networks has focused upon methods for constructing the best

More information

A New Packet Forwarding Algorithm in Geographical Location Based Mobile Ad Hoc Routing Protocol

A New Packet Forwarding Algorithm in Geographical Location Based Mobile Ad Hoc Routing Protocol roceedings of the 5th WSEAS International Conference on Applied Computer Science, Hangzhou, China, April 16-18, 2006 (pp165-170) 1,2 A New acket Forwarding Algorithm in Geographical Location Based Mobile

More information

Data Centric Routing Protocols in Wireless Sensor Networks: A Survey

Data Centric Routing Protocols in Wireless Sensor Networks: A Survey Available onlinewww.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(6):62-69 Review Article ISSN: 2394-658X Data Centric Routing Protocols in Wireless Sensor Networks: A Survey

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Chord-based Key Establishment Schemes for Sensor Networks

Chord-based Key Establishment Schemes for Sensor Networks Chord-based Key Establishment Schemes for Sensor Networks Fan Zhang, Zhijie Jerry Shi, Bing Wang Department of Computer Science and Engineering, University of Connecticut, Storrs, CT 06269 Abstract Because

More information

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR) INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR) R.Sudha

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information