A Novel Hierarchical Routing Protocol for Wireless Sensor Networks

Similar documents
WSN Routing Protocols

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism

Mobile Agent Driven Time Synchronized Energy Efficient WSN

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

A Logical Group Formation and Management Mechanism Using RSSI for Wireless Sensor Networks *

Routing in Ad-Hoc Networks

Zonal Rumor Routing for. Wireless Sensor Networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

Integrated Routing and Query Processing in Wireless Sensor Networks

EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks

Prianka.P 1, Thenral 2

Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Energy Aware Data-Centric Routing in Wireless Sensor Network

Wasteful Energy Conserving Maximum Lifetime Routing for Wireless Sensor Network

Event Driven Routing Protocols For Wireless Sensor Networks

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

Improving IEEE Power Saving Mechanism

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

A NOVEL DISTRIBUTED PROTOCOL FOR RANDOMLY DEPLOYED CLUSTERED BASED WIRELESS SENSOR NETWORK:

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

A Color-theory-based Energy Efficient Routing Algorithm for Wireless Sensor Networks

Clustering Routing Protocol Based on Location Node in Wireless Sensor Networks

PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks

Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)

An Energy-Efficient Data-Dissemination Protocol in Wireless Sensor Networks

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

AODV-PA: AODV with Path Accumulation

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

A Fault-recovery Routing Approach for Loop-based Clustering WSN

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks

Low Energy Adaptive Clustering Hierarchy based routing Protocols Comparison for Wireless Sensor Networks

Scalable Distributed Diagnosis Algorithm for Wireless Sensor Networks

The Effect of Physical Topology on Wireless Sensor Network Lifetime

Locating Objects in a Sensor Grid

Available online at ScienceDirect. Procedia Computer Science 54 (2015 ) 7 13

ESCORT: Energy-efficient Sensor Network Communal Routing Topology Using Signal Quality Metrics

A Novel Protocol for Better Energy-Efficiency, Latency and Fault Tolerance in Wireless Sensor Network

A Review on Routing Protocols For Wireless Sensor Network

Energy Efficient Collection Tree Protocol in Wireless Sensor Networks

Multipath Routing Algorithm for Wireless Sensor Networks

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

Low Energy Adaptive Clustering Hierarchy Variance in Wireless Sensor Network (LEACH)

CSMA based Medium Access Control for Wireless Sensor Network

Lecture 8 Wireless Sensor Networks: Overview

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

A Genetic Algorithm-Based Approach for Energy- Efficient Clustering of Wireless Sensor Networks

RWPS: A Low Computation Routing Algorithm for Sensor Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

High Speed Data Collection in Wireless Sensor Network

Routing protocols in WSN

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks

DAPR: A Protocol for Wireless Sensor Networks Utilizing an Application-based Routing Cost

Energy-efficient Data Dissemination in Wireless Sensor Networks

Study on Wireless Sensor Networks Challenges and Routing Protocols

A Comprehensive Review of Distance and Density Based Cluster Head Selection Schemes

Delay Efficient Data Gathering in Sensor Networks

Part I. Wireless Communication

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

Artery: A Data-Centric Architecture for Wireless Sensor Networks

Geographical Grid Based Clustering for WSN

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

A deployment procedure for wireless sensor networks

VORONOI LEACH FOR ENERGY EFFICIENT COMMUNICATION IN WIRELESS SENSOR NETWORKS

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

Outline. Assumptions. Key Features. A Content-Based Networking Protocol For Sensor Networks (Technical Report 2004)

IN a mobile ad hoc network, nodes move arbitrarily.

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Energy Efficient Zonal Stable Election Protocol for WSNs

Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

A CLUSTERING TECHNIQUE BASED ON ENERGY BALANCING ALGORITHM FOR ROUTING IN WIRELESS SENSOR NETWORKS

Power Aware Metrics for Wireless Sensor Networks

Fig. 2: Architecture of sensor node

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Sensors & Transducers Published by IFSA Publishing, S. L.,

Performance Analysis of IEEE based Sensor Networks for Large Scale Tree Topology

An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks

A Service Management Architecture for NEMO in IPv4 and IPv6 Networks

PERFORMANCE EVALUATION OF TOPOLOGY CONTROL ALGORITHMS FOR WIRELESS SENSOR NETWORKS

THE CONSTRUCTION OF A LIFETIME-PRESERVING TREE FOR DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Time Synchronization in Wireless Sensor Networks: CCTS

A Reliable Routing Technique for Wireless Sensor Networks

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

A Topology Discovery Algorithm for Sensor Networks with Applications to Network Management

HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

Transcription:

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks TrongThuaHuynh 1 and Choong Seon Hong 2 Department of Computer Science, Kyung Hee University, 1 Seocheon, Giheung, Yongin, Gyeonggi 449-701 Korea Tel: +82 31 201-2532, Fax : +82 31 204-9082 htthua@networking.khu.ac.kr, cshong@.khu.ac.kr Abstract. In this paper, we propose a novel hierarchical routing protocol for a large wireless sensor network (WSN) wherein sensors are arranged into a multi-layer architecture with the nodes at each layer interconnected as a de Bruijn graph and provide a novel hierarchical routing algorithm in the network. Using our approach, every sensor obtains a unique node identifier addressed by binary addressing fashion. We show that our algorithm has reasonable fault-tolerance, admits simple and decentralized routing, and offers easy extensibility. We also present simulation results showing the average delay, success data delivery radio in our approach. And we received acceptable results for some potential applications. Besides, to evaluate how well our protocol support for WSNs, we compare our protocol with other protocol using two these metrics (average delay, success data delivery radio). 1 Introduction Wireless sensor networks are composed of a large number of sensors densely deployed in inhospitable physical environments. Dissemination information throughout such a network that requires fault-tolerance is a challenge. Although there are applications as described in [4], [9] which do not require addressing of sensors, we have argued many scenarios where addressing nodes is very essential. However, given that an addresses scheme needs to be build, IP-based addressing to this problem would not be a good solution. For one, IP-based addresses are global unique addresses but WSNs require local unique identifier. In our protocol, sensor nodes within a certain area interact with themselves in a distributed manner and come up with an addressing scheme in which each node obtains a unique local address. Motivated by above issues and the advantages of the de Bruijn graph admitting simple routing and possessing good fault tolerant capabilities in many interconnected networks, we introduce a multi-layer addressing architecture wherein sensor nodes are interconnected as de Bruijn graph at each This work was supported by University ITRC Project of MIC, Dr. C.S.Hong is the corresponding author. O. Gervasi et al. (Eds.): ICCSA 2005, LNCS 3480, pp. 339 347, 2005. c Springer-Verlag Berlin Heidelberg 2005

340 T.T. Huynh and C.S. Hong layer. To show how our algorithm supports simple routing, fault tolerance and scalability we introduce a hierarchical routing algorithm that is able to route packets along all possible paths between any pair of the source and destination nodes without performing explicit route discovery, repair computation or maintaining explicit state information about available paths at the nodes. The remainder of the paper is organized as follows. In section 2, we present the related work. The network architecture is shown in section 3. Section 4 provides routing algorithm for the multi-layer network. We present the performance evaluation in section 5. Finally, we conclude the paper in section 6. 2 Related Work Many protocols have been proposed for WSNs in the last few years. In works addressed in [1], [3], [4], all sensors have been treated to be alike and are assumed to have similar functionality. In contrast, sensors in our protocol are heterogeneous. Data dissemination protocols are proposed for WSNs in [2], [3]. SPIN [3] attempts to reduce the cost of flooding data, assuming that the network is source-centric. Directed diffusion [2], on the other hand, selects the most efficient paths to forward requests and replies on, assuming that the network is data-centric. This approach, in company with works addressed in [1], [3], use a powerful concept of data-centric networking for sensor applications. Though this model is very interesting, it may not be applicable to many sensor applications. Certain applications like parking lot networks may require addressability for every sensor node and a method for routing packet to specific nodes. Clustering algorithms have also been proposed in many literatures, such as GAF [6]. SPAN [7] etc. The remarkable one among them is LEACH [8]. LEACH is an application-specific data dissemination protocol that uses clustering to prolong the network lifetime. However, LEACH assumes that all nodes have long-range transmission capability. This limits the capacity of protocol and application. Moreover, cluster head failure is also the problem in this approach. In contrast, our approach makes no assumptions like this and does not organize network as clustering architecture. Instead of this, our approach distributes sensors into several layers. Each layer is organized as a de Bruijn graph. 3 Network Architecture In this section, we give a detailed description of the network architecture. In this architecture, we assume that the sensors are immobile. This assumption is reasonable especially for indoor applications such as smart home or smart building applications. Assume that we deploy a network with N sensors. The network architecture can be organized under a hierarchical model which consists of several layers with the node at each layer interconnected as a de Bruijn graph. For a detailed discussion on features of de Bruijn graph, see the paper by Sanmatham et al. [5]. Our architecture features is addressed as follows:

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks 341 - Sensors are organized in a multi-layer architecture with the order of layer numbered increasingly starting from 1. - k th layer has 2 k sensor nodes. - Sensors are addressed with binary address form, sensors in k th layer use k bits for node addressing. - Each node at k th layer is connected to two children nodes at (k +1) th layer and is connected to its parent node at (k 1) th layer (k>1) - Nodes in 1st layer and 2nd are connected completely. It means that, each node in the first layer has only one neighbor and 2 children. Each node in the second layer has 3 neighbors and 2 children nodes. - Using graph theoretic notation, the de Bruijn graph BG(d,k) has N = d k nodes with diameter k and maximum degree 2d. We are interested in binary de Bruijn graph BG(2,k) which have N = 2 k. A node x addressed x k 1 x k 2...x 1 x 0 in k th layer (k>2) has 4 neighbors as follows: neig 1 (x) = x k 2...x 1 x 0 x k 1 ; neig 2 (x) = x k 2...x 1 x 0 x k 1 neig 3 (x) = x 0 x k 1...x 2 x 1 ; neig 4 (x) = x 0 x k 1...x 2 x 1 where : x is complement of x. The address of a node in k th layer consists of two parts. One is k bit derived from (k 1) th layer. The other is 1 bit (0 or 1) added from right side. Node x addressed x k 1 x k 2...x 1 x 0 has two children nodes and one parent node. These children are addressed as add(x k 1 x k 2...x 1 x 0,0) and add(x k 1 x k 2...x 1 x 0,1) while the parent is addressed as rmv(x k 1 x k 2...x 1 x 0 ). The following definitions describe two address transforming functions addition (add) and remove (rmv). Let K be a k-bit number and y be a binary number. Then add(k,y) = Ky ; rmv(x k 1 x k 2...x 1 x 0 )=x k 1 x k 2...x 1 For example, add(001,1) = 0011; rmv(0110) = 011. Figure 1 shows an example of the 3-layer network architecture followed by above mentioned features. Obviously, the network extension is not issue in this 0 1 Layer 1 00 11 Layer 2 01 10 001 000 110 010 Layer 3 111 011 101 100 Fig. 1. A 3-layer hierarchical architecture. Node 01 (layer 2) is parent of two nodes 010 and 011 (layer 3) but is one of two children of node 0 (layer 1)

342 T.T. Huynh and C.S. Hong architecture. Whenever sensors need to be deployed into the network, they will be added at the highest layer of the hierarchical architecture. Thus extending network requires a fixed number of interconnections between the new nodes and the nodes at the last layer. If number of new nodes are more than that of the last layer can support, the remaining nodes will make up a new layer being last layer in new network architecture. 4 Routing Algorithm In this section, we show that packets can be routed throughout the hierarchical architecture. We first consider routing within each layer and then consider routing across layers. To evaluate the routing complexity, we assume that a packet takes unit time to traverse a link. 4.1 Intra-layer Routing Routing in the first layer and second layer takes unit time step since the nodes are completely connected. In this section, we describe a simple routing algorithm which is based on the construction of the Bruijn graph. Let a binary de Bruijn graph have N =2 k nodes and let S = s k 1 s k 2... s 1 s 0 be the source node that sends a packet to the destination node D = d k 1 d k 2... d 1 d 0. The packet consists of the data and packet header. The packet header contains the routing information. The packet format is depicted in figure 2. The RF is a 2-bit binary number set to - 00: the source and destination nodes are in same layer and the source node use Path 1 to route packet to the destination. (default) - 01: it is the same as 00 but Path 2 is used instead of Path 1. Path 1 and Path 2 will be addressed later. - 10: the source and destination nodes are in different layers. The source node is at a higher layer than the destination. - 11: the source node is at a lower layer than the destination. The counter c is used to record the number of packet hops from the source node to the current node. In addition, it is also used to generate the address of the next node in the path. Now, we describe the simple routing algorithm in each layer. From the construction of the de Bruijn graph, we know that the RF Destination Address Counter c Data Header Fig. 2. Packet format contains the destination addresses, a counter (c), and a routing flag (RF)

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks 343 receives packet Yes addr(x) == addr(d)? No accepts packet Yes addr(d) == addr(neig (x))? i =1 4 next_node = neig (x) No addr(next_node) = d Š x TX x TYG x X (Path 1) or x TY x TZ x X x W d TŠTX (Path 2) The End c = c+1 routes packet to next node Fig. 3. Operations of node x. addr(x), neig i(x), and D present address, i th neighbor of node x, and destination respectively source node at k th layer has the following neighbors - d 0 s k 1 s k 2...s 1 and s k 2... s 1 s 0 d k 1. Using this property we can now generate two paths by appending successive bits of the destination node to the source address. Path 1 Path 2 (c=0) s k 1 s k 2...s 1 s 0 (src address) (c=0) s k 1 s k 2...s 1 s 0 (src address) (c=1) d 0 s k 1 s k 2... s 1 (c=1) s k 2 s k 3... s 1 s 0 d k 1 (c=2) d 1 d 0 s k 1... s 2 (c=2) s k 3... s 0 d k 1 d k 2.... (c=k) d k 1 d k 2...d 1 d 0 (des address) (c=k) d k 1 d k 2...d 1 d 0 (des address) Let x k 1 x k 2... x 1 x 0 be the address of the node x. The figure 3 describes steps executed by x. 4.2 Inter-layer Routing In this session, we suppose that the source and destination nodes are in different layers. So, the RF is set to 10 or 11. In addition, the counter c is not incremented in order to maintain a proper value of the counter for intra-layer routing following the inter-layer routing. In case that the source node is at a higher layer than the destination, the source node first routes the packet to its parent rmv(s). This procedure is repeated recursively until the packet is received by a node at the same layer as the destination node. The RF is set to 00 or 01 now, and the source address is replaced by the address of the node that received the packet. The packet can then be routed to the destination using above intra-

344 T.T. Huynh and C.S. Hong layer routing algorithm. In contrast, when the source node is at a lower layer than the destination, the same procedure is used where the source node first routes the packet to its child using add(s) to generate the address of the next node. 4.3 Fault Tolerant Routing Issue In a large WSN, it is unrealistic to expect all nodes or links along a path to be free-fault at all times. Whenever some nodes or links fail, an alternative path that avoids faulty node or link must be derived. Suppose that nodes x 2 (d c x k 1 x k 2...x 1 )andx 3 (x k 2 x k 3...x 1 x 0 d k c 1 ) are neighbors of node x 1 (x k 1 x k 2... x 1 x 0 ). Also assume that if either node x 2 or the link between x 1 and x 2 has failed, then x 1 chooses the alternative path to node x 3. In addition, x 1 sets RF to 01 (Path 2) and counter c to 0 as well. At worst if both x 2 and x 3 fail, node x 1 routes to one of its two remaining neighbors d c x k 1 x k 2...x 1 or x k 1 x k 2...x 1 x 0 d k c 1 and sets counter c to 0. For inter-layer routing, node x 1 chooses another child if the first child fails. In the worst case of both the children failing, node x 1 will route back to one of its neighbors. The approach is the same if parent of x 1 can not be reached. In all cases, counter c must be set to 0 and RF set to default. 5 Performance Evaluation We developed a simulator based on SENSE simulation [10] to evaluate performance of our approach. The simulation use MAC IEEE 802.11 DCF that SENSE implements. Because network design choices: MAC scheme, network topology, node addressing, and packet routing vary among implementations, we do not compare our nodes to other solutions. In this simulation, we take account on two metrics: the end-to-end delay and the success data delivery radio with and without node or link failure. The end-to-end delay refers the time taken for a data packet to be generated until the time it arrives at the destination. The success data delivery radio is the rate of the number of successfully received data packets at the destination and the total number of packet generated by a source. Some of simulation parameters are listed in Table 1. Table 1. Simulation Parameters Parameter Value Network size 250x250 Number of sensors 254 Packet generating rate 1 packet/sec Forward delay 0.01 sec Data packet size 64 bytes Simulation time 1000 sec Radio of transmission range 20m

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks 345 0.35 1 Average End-To-End Delay (s) 0.3 0.277 0.25 0.2 0.207 254 nodes 510 nodes 0.15 100 200 300 400 500 600 700 800 900 1000 Time (s) Fig. 4 a. Average end-to-end delay a function of simulation time Average success data delivery radio 0.9 0.8 0.7 0.6 14 30 62 126 254 510 Network size (nodes) Fig. 4 b. Average success data delivery radio as a fucntion of network size To illustrate the performance of our protocol, we choose randomly pairs of source and destination nodes in order to communicate each other. For 254 node network, the simulation results in figure 4a depict that the average end-to-end delay in this network is approximately 0.207 seconds. While for 510 node network, the average end-to-end delay is approximately 0.277 seconds. Obviously, this end-to-end delay is quite low and it is an acceptable value in many potential applications. In this simulation, no acknowledgement for data packets sending or forwarding are simulated. Therefore, no retransmission is incurred if a data packet lost because of collision or because a receiving node has returned to the sleep mode before the packet is received. Besides, the simplicity in routing algorithm such as no discovery phase, just passing packets to the next node in the path which is determined base on features of de Bruijn graph and logic of binary addresses reduces the time disseminate data from a source node to a destination node significantly. The simplicity and efficiency of our protocol are examined by simulation in figure 4b. We study metric average success data delivery radio as a function of sensor network size. To do this, we generate a variety of sensor fields of different sizes, ranging from 14 to 510 nodes in increments of 2 i (i = 4,5,6,7, and 8). When the number of node is changed, network size is also proportionally changed by scaling the square and keeping the radio range constant in order to approximately keep the average density of sensor nodes constant. Results show that the data is delivered successfully in the network is quite high (always more than 90%). To indicate the fault-tolerance of our algorithm, we inject failures into the simulated network and evaluate the performance with 5%, 10% and 20% node/link failures one after the other. Results in figure 5a depict that although the average end-to-end delay increases when the network size increases, the increase of average delay is not significant (0.24 second delay for none node or link failure, 0.32 second delay for 20% node or link failures). Plus, figure 5b addresses the increase and decrease of the end-to-end delay as network size changes and there are node/link failures as well. These increase and decrease are insignificant. In figure 6a, we study metric average success data delivery radio as a function of node or link failures. And the results indicate that the success data delivery radio is decreased when the number of node or link failures increases. However, this decrease is not significant. And it still ensures this radio at quite high level accepted in a large amount of sensor network applications. When the next node

346 T.T. Huynh and C.S. Hong Average End-to-End Delay (sec 0.4 0.3 0.2 0.1 0 0% 5% 10% 20% Node/Link Failures Fig. 5 a. Average end-to-end delay as a function of node/link failure Average End-to-End Delay (sec) 0.4 0.3 0.2 0.1 0 Without node/link failure 5% node/link failures 10% node/link failures 20% node/link failures 14 30 62 126 254 510 Network size (nodes) Fig. 5b. Average end-to end dalay as a fucntion of node/link failure as network size changes Average success data delivery ra 1 0.9 0.8 0.7 0.6 0% 5% 10% 20% Node /Link Failure s Fig. 6 a. Average success data delivery radio as a function of node/link failure Average success data delivery radio 1 0.95 0.9 0.85 0.8 0.75 0.7 0.65 0.6 5 Without node/link failure 5% node/link failures 10% node/link failures 20% node/link failures 14 30 62 126 254 510 Network size (nodes) Fig.6 b. Average success data delivery radio as a function of node/link failure as network size changes 1 0.075 0.8 Success rate 0.6 0.4 Our Protocol Directed Diffusion Delay (s) 0.05 0.025 Our Protocol Directed Diffusion 0.2 0 30 62 126 254 510 Network size Fig. 7 a. Average success data delivery radio as a function of network size 0 30 62 126 254 Network size Fig. 7 b. Average end-to-end delay as a function of network size or the link to next node of the node is fail, it is straightforward to the current node alters to another path (Path 1 or Path 2) without performing explicit route discovery, repair computation or maintaining explicit state information about available paths at that node. That is why the increase of average delay and the decrease of success data delivery radio are insignificant when the number of node/link failures increases. Figure 6b, one more again, proves that our protocol can support the fault-tolerance very well. Here, we compare our protocol with another protocol (Directed Diffusion) using two these metrics average delay and success data delivery radio. In figure 7a, results show that the data is delivered successfully in the network is quite high and higher than that of Directed Diffusion. Besides, end-to-end delay is also factor showing the efficiency of our approach. As addressed in figure 7b, the end-to-end delay is quite low and it is a promising value in many potential

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks 347 applications. Because our protocol support the very simple routing algorithm to disseminate data from source to any destination while Directed Diffusion is the complexity protocol (discovery phase, reinforcement phase, routing phase) that create high end-to-end delay. 6 Conclusions This paper describes a hierarchical architecture for WSNs wherein sensor nodes are distributed into layers. Nodes in each layer are interconnected as a de Bruijn graph. Our protocol easily solves fault tolerance and extensibility. We also provide a simple routing algorithm between any node pairs in the network. We created simulations based on SENSE [10] in order to illustrate the performance and bring out the main goal while proposing this approach. Because sensors have limited computation, in this paper, we do not investigate into the shortest path algorithm that consumes much energy than above mentioned simple routing algorithm. As a future work, since multi-year battery life is preferable for future sensors, we need to future study on optimal routing to improve the goodness of our protocol. We also need to study an optimal energy scheme in order to save energy for sensors. References 1. Wendi R.Heinzelman et al., Energy efficient communication protocol for wireless microsensor networks, in Hawaii International Conference on System Sciences, January, 2000. 2. C.Intanagonwiwat et.al., Directed diffusion: A scalable and robust communication paradigm for sensor networks, in ACM Mobicom 2000. 3. J. Kulik, W. Heinzelman, and H. Balakrishnan, Negotiation-based Protocols for Dissemination Information in Wireless Sensor Networks, in ACM/IEEE MobiCom 99, Seattle 4. Deborah Estrin et.al., Next century challenges: Scalable coordination in sensor networks, in MOBICOM 99, Seattle. 5. M. R. Samantham, and D. K. Pradhan, The de Bruijn Multi-processor Network: A Versatile Parallel Processing and Sorting Network for VLSI, IEEE Transaction on Computers, April 1989. 6. Y. Xu, J. Heidemann, and D. Estrin, Geography-Informed Energy Conservation for Ad Hoc Routing, in ACM/IEEE on Mobile Computing and Networking (MO- BICOM), Italy, July 2001. 7. B. Chen et al., Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks, in ACM Wireless Networks, September 2002. 8. W. R. Heinzelman et al., An Application-Specific Protocol Architecture for Wireless Microsensor Networks, IEEE Transactions on Wireless Communications, October 2002. 9. Jeremy Elson and Deborah Estrin, An address free architecture for dynamic sensor networks, submitted for publication. http://www.isi.edu/ estrin/papers/. 10. Gang Chen, et al, SENSE - Sensor Network Simulator and Emulator, http://www.cs.rpi.edu/ cheng3/sense/.