2009 International Conference on Computational Science and Engineering MAW: A Reliable Lightweight Multi-Hop Wireless Sensor Network Routing Protocol Kunjan Patel∗ , Lim Jong Chern† , C.J.Bleakley† and Wim Vanderbauwhede‡ ∗ Institute for System Level Integration, Scotland,UK College Dublin, Dublin, Ireland ‡ University of Glasgow, Glasgow, UK Email: see http://www.kunjanpatel.co.nr/contact, [email protected] † University Abstract—Wireless sensor networks consist of a number of small wireless sensor nodes which take measurements and transmit them over wireless links. As wireless sensors are resource constrained, the usage of energy and memory must be done wisely to increase the lifetime of nodes. It is also necessary to deliver data reliably to make any application more useful to the end user. A reliable and lightweight routing protocol for wireless sensor networks is presented in this paper. The protocol shows more than 90% savings in number of transmissions compared to the message flooding scheme when the same route is used to transmit data messages. This saving increases exponentially as the number of transmissions increases over a same route. The protocol occupies only 16% of total available RAM and 12% of total program memory in MICAz platform which makes it very lightweight to implement in wireless sensor networks. Its self healing capability to recover from livelock and deadlock enhances its reliability as a routing protocol in wireless sensor networks. Index Terms—AODV, wireless sensor network, routing protocol, TinyOS in wireless sensor network which is a modified version of the AODV routing protocol. We address some issues to make this protocol suitable for wireless sensor networks as AODV is designed for mobile nodes in an ad-hoc networks [5]. The major modifications in the proposed protocol compare to AODV routing protocol and features which make this protocol distinct from other protocols are follows: • • I. I NTRODUCTION With the increased demand of the functionality in the embedded systems and networks the need of sensors is becoming more prominent. A sensor allows builtin intelligence to systems. Though a single sensor seems to only provide trivial efficacy when used in a group they are able to accomplish difficult tasks such as event detection. High condition and deployment demands of sensor network applications in various fields have made the communication between these sensors wireless. Networking protocols like TCP/IP are used for homogeneous purposes while the routing protocols for wireless sensor networks are used for specific and collaborative purposes. One of the necessary requirements of a wireless sensor network is to deliver data reliably due to the dynamic and lossy nature of wireless transmissions. In wireless sensor networks (WSNs), the energy dissipation in transmission of data directly depends on the routing algorithm [1]. Hence, resources limited wireless sensors require an optimum algorithm for routing. Ad hoc On-demand Distance Vector (AODV) is a wellknown routing protocol for MANETs. In past few years some implementations were presented on based on the AODV routing protocol. Some of them were implemented for wireless sensor networks (WSNs) [2] [3] [4]. However, some important issues such as data broadcasting storm problems, message traffic overhead, memory requirements were not fully addressed. We propose a lightweight protocol for unicast routing 978-0-7695-3823-5/09 $26.00 © 2009 IEEE DOI 10.1109/CSE.2009.104 487 • • • • AODV routing protocol discovers a path between source and destination node while the proposed protocol is able to find the shortest possible path between two nodes depending on the connectivity in the WSN. As AODV was originally designed for mobile networks its overall message packet length is comparatively higher for WSN. Some of the fields in the AODV message type like, lifetime, separate sequence number fields for source and destination nodes can be avoided. The compact message packet reduces the number of bits transmitted per packet and hence reduces the power consumption. The routing table length of the AODV routing protocol is bigger for memory constrained wireless sensor nodes. It stores information about each group and its group leader in the network while the proposed protocol only stores the information about the reachable neighbor nodes. This makes the memory footprint smaller. One of the most resources wasting problems in WSNs are data broadcasting storm problems like, livelock and deadlock. These problems are addressed to make the protocol robust. The connectivity in WSNs is dependant on a number of ambient factors and hence the message delivery is sometimes uncertain in WSNs. This protocol uses node level acknowledgement scheme to increase the message delivery reliability in WSNs. So, unlike some protocols presented before, the proposed protocol is able to handle point to point routing efficiency. The message retransmission scheme at the node level in conjunction with the acknowledgment timeout scheme reduces the number route discoveries and hence reduces the message traffic overhead. On the failure of a particular node next available node is automatically selected from the routing table which further reduces the message traffic overhead. It also works independent of the topology which makes it suitable for ad-hoc WSNs. The proposed protocol is suitable for data query applications used for environmental monitoring, habitant monitoring etc. It also allows the user to query different types of data by only changing the type of message in the message header field which avoids unnecessary route discovery. For example, an application monitoring temperature, if the user wants to monitor humidity on the same route instead then he just needs to change the message type. • II. R ELATED W ORK Due to the popularity of wireless sensor networks extensive research and development of different routing protocols have been done. Flooding is one of the simplest approach for routing in WSNs but it has a number of drawbacks [6] and can not be used in applications where reliability is an important issue. The authors of [7] proposed one of the earliest data centric routing protocol for wireless sensor networks. Three main deficiencies in a routing protocol for WSN, implosion, overlap and resource-blindness, were handled by negotiation and resource-adaption techniques. The proposed approach showed 3.5 times energy saving than data flooding. The authors of [8] presented an online power aware routing method in wireless ad-hoc networks which does not require the knowledge of message sequence. Two online algorithms, Max-min zPmin algorithm and Zone based algorithm, were presented. The Max-min zPmin algorithm performed more than 80% better than optimal routing strategy [9]. However it requires the knowledge of power level of each node and hence the Zone based algorithm was presented which has nearly the same performance as the Max-min zPmin algorithm [10]. A distributed version of the Max-min zPmin algorithm which does not depend on any centralization was presented in [10]. It showed significant improvement in the performance than a distributed greedy-style algorithm. LEACH [11], TEEN [12] and PEGASIS [13] are some of the clustering based protocols. Clustering based algorithms forward data to the sink node through the header node of each cluster. Although this kind of routing protocols are energy efficient, they suffer from selective routing and message flooding to check the activeness of nodes [14]. The TinyOS beaconing based approach presented in [15] and [16] has issues with reliable routing, hotspot and sometimes message flooding [14]. A routing algorithm intended to increase the lifetime of the WSN is presented in [1]. The presented algorithm showed network lifetime very close to the optimal network lifetime and more than 3 times longer than that of Minimum Total Energy (MTE) approach presented in [17] and [18] and more than 2 times longer than that of Max-Min residual Energy (MMRE) approach. However, the presented algorithm is for static nodes and has comparatively higher overhead for using it in WSNs. The authors of [19] discussed different issues and design strategies for AODV implementation. A detailed discussion about AODV routing protocol for mobile nodes in an ad hoc network was presented in [5]. An AODV like implementation using TinyOS can be found in [4]. In this implementation, after route discovery, bidirectional message routing requires change in routing table alternatively which consumes more power because of frequent access to the memory. In addition to this, on failure of a node in the routing table it initiates the route discovery which is the most power consuming part of the AODV protocol. A detailed comparison of different AODV based protocols is presented in [2]. The proposed protocol is more reactive but memory consumption is 58.5% higher than the AODV implementation of [3]. Although authors evaluated the protocol for IEEE 802.15.4, an evaluation of message traffic overhead is missing. A simplified AODV protocol, AODVjr, was presented in [20]. The protocol discarded some message types and fields from the message of the original AODV specification [5] which are necessary to make the protocol robust and suitable for WSNs. For example, it has discarded the RERR message which is important when node failure occurs. Consequently, this requires destination node to send a message at particular interval to keep the route live which leads to unnecessary overhead in the network. Most of the research work has been concentrated on issues regarding reliability or energy saving in mobile ad hoc network. But in case of WSNs a point-to-point routing protocol having energy, reliability and memory as design constraints is necessary. This paper considers all these issues and presents a lightweight, energy efficient and reliable routing protocol for WSNs. III. OVERVIEW OF THE AODV A LGORITHM AODV is a reactive protocol and a route from one node to another node is only found when needed [19]. This is one of the important advantages of AODV which makes it viable for use it as a routing protocol in WSNs. When a source node needs to communicate with a node in the network, it transmits a Route Request (RREQ) message. Each intermediate node in the network forwards the RREQ message until it reaches the destination node. The destination node responds to the RREQ message by transmitting the Route Reply (RREP) message. As the RREP flows through the network, it determines the route from source node to destination node. The activeness of the route in the routing table is determined by a timer associated with the route and the route will be removed if it is not used after some time interval. The sequence number is increased by each originating node and used to determine whether the received message is the most recent one [5]. The older routing table entries are replaced by the newer ones. Active nodes in the networks are determined by broadcasting a ”Hello” message periodically in the network. If a node fails to reply a link break is detected and a Route Error (RERR) message is transmitted which is used to invalidate the route as it flows through the network. A node also generates a RERR message if it gets message destined to a node for which a route is unavailable. IV. MAW P ROTOCOL Figure 1 shows the brief flow chart of the proposed protocol, Modified AODV for Wireless Sensor Network (MAW), which 488 is a modified version of AODV routing protocol. Although AODV has been proven an efficient protocol for routing purpose in an ad-hoc mobile network [5], it can not be directly implemented in wireless sensor network because of the lossy nature of wireless data transmission and reliability issues in WSNs. There are two major issues with AODV in terms of power consumption. One is route discovery phase and the other is long header field of the message. We have also addressed some other issues and proposed their solutions. The modifications in AODV and addressed issues are as follows. ^ĞŶĚƚŚĞZŽƵƚĞ ZĞƋƵĞƐƚDĞƐƐĂŐĞ EŽ ZĞƉůLJ ZĞĐĞŝǀĞĚ to append the AODV capabilities. Table I gives information about different fields used in the message of MAW protocol. The sequence number is used to determine the change in type of command message and also useful to differentiate between same type of command messages in multicast routing. The length of the payload can be predefined using DATA_LENGTH depending on the application requirements. However, if an application needs more than total 28 bytes then modifications to TinyOS 2.X message types are necessary [22]. Here, 16 bytes are allocated for payload and 4 bytes are left reserved for future extensions of the protocol. ^ĞŶĚŽƚŚĞƌŽŵŵĂŶĚ ŵĞƐƐĂŐĞƐŽƌZŽƵƚĞZĞƋƵĞƐƚ ŵĞƐƐĂŐĞƐĨŽƌŽƚŚĞƌŶŽĚĞƐ ϭϭďLJƚĞƐ dK^,ͺdͺ>E'd,сϮϴďLJƚĞƐ ,ĞĂĚĞƌ EŽ DATA_LENGTH ĂƚĂŵĞƐƐĂŐĞ ZĞĐĞŝǀĞĚ ^ƚŽƉƚŚĞZŽƵƚĞ ZĞƋƵĞƐƚƚŝŵĞƌ ϮďLJƚĞƐ Sequence Number ϭďLJƚĞ Hop Count ϭďLJƚĞ džϭďLJƚĞ ϰďLJƚĞƐ Reserved for Future Extensions Type Payload ϭďLJƚĞ ϭďLJƚĞ Source Node Address Destination Node Address zĞƐ Fig. 2. EŽ The Message Structure in MAW Protocol ĐŬŶŽǁůĞĚŐĞ ŵĞƐƐĂŐĞ ƌĞĐĞŝǀĞĚ TABLE I MAW PROTOCOL M ESSAGE F IELDS Fig. 1. DĞƚĂ zĞƐ zĞƐ ^ĞŶĚƚŚĞŽŵŵĂŶĚ ŵĞƐƐĂŐĞƚŽƚŚĞ ŶĞĂƌĞƐƚŶĞŝŐŚďŽƵƌ ϳďLJƚĞƐ ĂƚĂ Field The Flow Chart of Algorithmic Procedure in MAW Protocol Sequence Number A. Types of Message in MAW protocol There are five types of message defined in MAW protocol: 1) Route Request (REQ) Message: It is used to discover a route to the final destination in WSN. 2) Route Reply (REP) Message: It is used to prepare routing table from destination to source node. 3) Command (CMD) Message: On the reception of this message the source node initiates route discovery in the WSN for the destination node defined in the message. User can define more command messages according to the type of application. For each type of data query a command message should be defined. 4) Data (DAT) Message: It is reply message to the Command type message. It returns the requested data from destination node to the source node specified by the Command message. 5) Route Failure (RTF) Message: A node broadcasts this type of the message if the node fails to communicate with all the nodes in the routing table. B. Structure of the message in MAW protocol In wireless sensors, the transmission consumes around 2000 times more power than processing a single instruction [21] and so the number of fields in the message is kept minimum to keep the overall length of the message as short as possible. Figure 2 shows the structure of the message used in MAW protocol. The data field of the TinyOS 2.x message is used 489 Length (Bytes) 2 Hop Count Type 1 1 Payload 16 Source Node Address 1 Destination Node Address 1 Purpose Differentiates between Command messages Stores the value of hop count Determines the type of the message Stores data depending on the application Store the node ID of the source node Stores the node ID of the destination node C. Routing Table One of the most constraint resources in the wireless sensor is on-chip memory and hence it is important to use it wisely. The routing table plays an important role in AODV routing protocol and the whole routing procedure relies on the routing table. However, spreading over a routing table with unlimited space for routing information is not suitable for the wireless sensor node. So, a memory constrained routing table was prepared for the unicast routing. The routing table has two fields: • Node ID: It stores IDs of nodes which are reachable. • Hop Count: It stores the number of hop count required to reach to the destination node using corresponding node. D. Route Discovery Mechanism The route discovery is initiated on the reception of the CMD type message. The CMD type message can be inserted from user end computer or source node can generate itself. The user can define different types of command messages for different kind of data queries. For example, user can define three kind of CMD messages to query temperature, humidity and light sensor readings. When a CMD message is received by the source node, source node broadcasts a REQ message in the WSN for the destination node defined in the CMD message. The intermediate nodes keep forwarding the REQ message until it reaches the destination node. Figure 3 shows the flow chart of the Route Discovery mechanism. This flow chart shows common Route Discovery mechanism for all nodes in MAW protocol. When the REQ message is received at the DĞƐƐĂŐĞƌĞĐĞŝǀĞĚ ZŽƵƚĞZĞƉůLJ ŵĞƐƐĂŐĞ ŚĞĐŬǁŝƚŚŽƚŚĞƌƚLJƉĞƐ ŽĨŵĞƐƐĂŐĞ zĞƐ /ŶĐƌĞŵĞŶƚƚŚĞŚŽƉĐŽƵŶƚĂŶĚƐƚŽƌĞƚŚĞŚŽƉ ĐŽƵŶƚŝŶƚŚĞƌŽƵƚŝŶŐƚĂďůĞǁŝƚŚƐĞŶĚĞƌŶŽĚĞ/ ƐŽƵƌĐĞŶŽĚĞ/ с ĐƵƌƌĞŶƚŶŽĚĞ/ DĞƐƐĂŐĞƌĞĐĞŝǀĞĚ ZŽƵƚĞZĞƋƵĞƐƚ ŵĞƐƐĂŐĞ EŽ zĞƐ ^Ğƚreply_received ĨůĂŐ TRUE EŽ EŽ ŚĞĐŬǁŝƚŚŽƚŚĞƌƚLJƉĞƐ ŽĨŵĞƐƐĂŐĞ ƌŽĂĚĐĂƐƚƚŚĞŵĞƐƐĂŐĞ zĞƐ Fig. 4. The Flow Chart of Route Reply Forwarding Mechanism in MAW protocol ^ĞƚƚŚĞƐŽƵƌĐĞŶŽĚĞĂĚĚƌĞƐƐ ƚŽĐƵƌƌĞŶƚŶŽĚĞ/ G. Data Message Forwarding Mechanism ƵƌƌĞŶƚŶŽĚĞс ĞƐƚŝŶĂƚŝŽŶ ŶŽĚĞ zĞƐ When the CMD message reaches to the destination node the destination node sends the DAT message corresponding to the type of the CMD message. It uses the same routing table and neighbor sorting mechanism but chooses a neighbor in the reverse order as the message is going to be sent over the same path but in reverse direction. ^ĞŶĚZŽƵƚĞZĞƉůLJŵĞƐƐĂŐĞ EŽ ƌŽĂĚĐĂƐƚƚŚĞŵĞƐƐĂŐĞ Fig. 3. The Flow Chart of Route Discovery Mechanism in MAW Protocol destination node the destination node responds by transmitting a REP message designated for the source node. This may lead to numerous unnecessary message transmissions, depending on the number of nodes and connectivity in the WSN, but the acknowledgement scheme described in Section IV-H prevents unnecessary data flooding. E. Route Reply Message Forwarding Mechanism When the REQ message is received by the destination node, it replies with a REP message which is forwarded until it reaches to the source node. Each intermediate node, on the reception of the REP message, increments the hop count by one and stores the hop count and node ID of the sender node in the routing table. The flow chart of the Route Reply mechanism is shown in Figure 4. F. Command Message Forwarding Mechanism On the successful reception of the REP message the source node sends the Command type message to the nearest neighbor. The nearest neighbor is found using a neighbor sorting mechanism which rearranges the routing table, prepared on the reception of the REP messages, using the hop count information. The intermediate nodes follow the same procedure until the message reaches the destination node. The CMD type message can be a query for the temperature reading, humidity reading etc. A programmer can define more than one type of CMD messages depending on the type of application and usability of nodes in the WSN. 490 H. Acknowledgement and Acknowledgement Timeout Scheme The transmission range of a wireless sensor varies from 10m to 50m, depending on the type of the transceiver available on the wireless sensor [23]. As the range and link quality depend on ambient factors, it is important to implement an acknowledgement scheme in the routing protocol to ensure the delivery of the message. In MAW protocol a node level acknowledgement scheme is implemented. In other words, each node sends an acknowledgement message on the reception of a message from the neighbor node. The acknowledgement timeout scheme checks whether the acknowledgement is received within a certain time period. If an acknowledgement is not received within a predetermined time period than the same message is sent again. This ensures the delivery of the message to the next node. However, this may lead to a number of transmissions if the designated node does not respond or die. A maximum number of retransmissions is set to resolve this problem. If currently selected neighbor node does not respond after a predefined number of retransmissions then the transmitting node will select the next nearest node from the routing table. This process is repeated until the transmitting node tries out all nodes in the routing table. If all the nodes in the routing table fail to respond then the transmitting node broadcasts a RTF message. I. Deadlock The death of a node in the WSN being used in the routing process may lead to unnecessary message transmissions by other nodes. This kind of situation is called deadlock [24]. TABLE II N ODE T OPOLOGY ^ĞƚƚŚĞĚĞƐƚŝŶĂƚŝŽŶŶŽĚĞĂĚĚƌĞƐƐĂŶĚ ƐĞŶĚƚŚĞŵĞƐƐĂŐĞ ^ƚĂƌƚƚŚĞƚŝŵĞƌĐŽƌƌĞƐƉŽŶĚŝŶŐ ƚŽƚŚĞŵĞƐƐĂŐĞ ĐŬŶŽǁůĞĚŐĞ ƌĞĐĞŝǀĞĚ zĞƐ ^ƚŽƉƚŚĞƚŝŵĞƌ EŽ /ŶĐƌĞŵĞŶƚƚŚĞĐŽƵŶƚĞƌ ŽƵŶƚĞƌ ф DĂdžŝŵƵŵƚƌŝĂůƐ zĞƐ 0 1 2 3 4 5 6 7 8 9 10 11 12 1,2,3 0,2,4 0,1,3,4,5 0,2,5,6 1,2,5,7,9,11 2,3,4,6,7,8,9,11 3,5,7,8,10 4,5,6,8,9 5,6,7,10,15,16 4,7,11,13 6,8,16 4,9,12,13 11,13,21 Noise (dB) 50-54 54-55 50-55 50-55 50-54 50-55 50 50 50-53 50 50-53 50-53 50-53 Node neighbors 13 14 15 16 17 18 19 20 21 22 23 24 25 9,11,12,14,20,21 13,15,18 8,14,16,17 17 15,16,24,25 14,19,23,25 18,20,22,23 13,19,21,22 12,13,20 19,20 18,19,25 17,25 17,18,23,24 Noise (dB) 50-53 50-53 50-53 53 50-53 50-53 50-53 50-53 50-53 52-53 50-53 52-53 50-53 ^ĞŶĚƚŚĞƐĂŵĞ ŵĞƐƐĂŐĞĂŐĂŝŶ EŽ V. E XPERIMENTS S ETUP ŚĂŶŐĞƚŚĞ ĚĞƐƚŝŶĂƚŝŽŶŶŽĚĞ/ zĞƐ EŽ ƌŽĂĚĐĂƐƚĂƌŽƵƚĞ ĨĂŝůƵƌĞŵĞƐƐĂŐĞ neighbors a time interval as it will require a knowledge of the WSN topology. ^ĞůĞĐƚƚŚĞŶĞdžƚŶĞŝŐŚďŽƵƌ ŶŽĚĞĨƌŽŵƚŚĞƌŽƵƚŝŶŐƚĂďůĞ /ŶĚĞdžŽĨŶĞdžƚ ŶĞŝŐŚďŽƵƌфdŽƚĂů ŶƵŵďĞƌŽĨŶĞŝŐŚďŽƵƌƐ ŝŶƚŚĞƌŽƵƚŝŶŐƚĂďůĞ Node Fig. 5. The Flow Chart of Acknowledgement Timeout Scheme in MAW protocol This kind of broadcast storm problem can be handled by constraining the number of retransmission [25] [24] and acknowledgement timeout scheme as shown in Figure 5. If a required node in the the routing process dies, then after certain number of retransmissions the node which wants to send the message selects the next nearest neighbor from the routing table. If all nodes in the routing table fail to respond then the node broadcasts a Route Failure message. J. Livelock Livelock is less common than deadlock. But when it occurs it leads to significant reduction in message throughput [24] [26]. Livelock occurs in MAW protocol when two active nodes in the routing process are the nearest neighbor of each other. In this kind of situation each node transmits message to each other and creates a message transmission loop which never ends. This problem is solved by comparing the node ID of recent sender to previous sender and message sequence number. The problem can be also resolved by setting a global timer at the source node which retransmits the message if a response is not received within a certain time interval. But in ad-hoc mobile network it would be difficult to determine such 491 The MAW protocol was written in nesC (network embedded system C) language using TinyOS-2.x [27]. TinyOS is an open source, component based and an event driven operating system. It is written in nesC programming language [28] [29] and designed for wireless sensors having limited resources. TinyOS simulator (TOSSIM) was used to simulate the WSN made of total 26 nodes [30]. TOSSIM for TinyOS-2.x can also simulate noise and interference present in radio links in the WSN [31]. Table II shows the list of nodes, their neighbors and noise present in radio links between nodes. All the simulations were done for the micaz platform [32]. The maximum number of neighbors per node was set to 7 and the number of maximum acknowledgement trials was set to 3. The protocol was simulated for unicast routing only and for a WSN by varying number of nodes. The WSN was simulated for 4, 7, 10, 16, 19 and 25 nodes. Different Python scripts were created to simulate the WSN for different number of nodes and to inject messages in the WSN. As TOSSIM for TinyOS2.x generates massive log files after simulations, shell scripts were created to analyse the log files and get the statistics of the simulation results. VI. R ESULTS Figure 6 shows the number of transmissions, retransmissions, acknowledgement messages, command messages and data messages required to discover a single route and to query a single data message on the discovered route in the WSN as shown in Table II. While the number of acknowledgement messages does not vary so much, the number of transmissions and retransmission messages is linearly proportional to the number of nodes in the WSN. It can be seen from the results that major overhead is in finding a route from the source node to the destination node but once a route is discover then the number of command and data messages are minimal. As command and data messages travel on almost same route in most of the cases, the number of command and data messages is the same. The variation in some cases is due to the noise present in radio links which leads to retransmission of the message or change in the route. ϯϱϬ ϯϬϬ ϮϬϬ ϮϱϬ ϭϱϬ ϭϬϬ ϱϬ Ϭ ϰ dƌĂŶƐŵŝƐƐŝŽŶƐ ϳ ϭϬ ϭϲ ϭϵ ϮϭϮ Ϯϯϳ Ϯϱ ϰϵ ϴϯ ϭϰϵ ZĞƚƌĂŶƐŵŝƐƐŝŽŶƐ ϳ ϭϭ ϮϮ ϯϮ ϯϯ ϯϲ ĐŬŶŽǁůĞĚŐŵĞŶƚƐ ϯϮ ϱϲ ϵϰ ϭϮϲ ϭϯϵ ϭϳϰ ŽŵŵĂŶĚŵĞƐƐĂŐĞƐƚƌĂŶƐŵŝƚƚĞĚ Ϯ ϯ ϱ ϲ ϳ ϳ ĂƚĂŵĞƐƐĂŐĞƐƚƌĂŶƐŵŝƚƚĞĚ Ϯ ϯ ϳ ϳ ϴ ϴ ϯϭϮ Fig. 8. !"# $%& " !& '%(! Memory footprint on MICAz wireless sensor platform Fig. 6. Number of transmissions, retransmissions and acknowledgments required for one route discovery and one data query The chart presented in Figure 7 shows a comparison of total all types of message transmissions required using MAW protocol and without MAW protocol for 10 data query messages and 20 data query messages. It is clear from the results that after route discovery phase when the same route is used to send messages, it saves overall energy by more than 90% compared to message flooding scheme. These figures also include the number of transmissions required to discover the route to the destination node. ϯϱϬϬ ϯϬϬϬ tŝƚŚDt;ϭϬŵĞƐƐĂŐĞƐͿ tŝƚŚŽƵƚDt;ϭϬŵĞƐƐĂŐĞƐͿ tŝƚŚDt;ϮϬŵĞƐƐĂŐĞƐͿ tŝƚŚŽƵƚDt;ϮϬŵĞƐƐĂŐĞƐͿ ϮϱϬϬ ϮϬϬϬ ϭϱϬϬ ϭϬϬϬ introducing different acknowledgement and timeout schemes. Its memory constrained routing tables and low memory requirements make it lightweight. The protocol acquires only 12% of the total program memory and 16% of the total RAM in MICAz platform. The protocol shows more than 90% savings in overall number of transmissions compared to the message flooding scheme. These savings increase exponentially as the communication rate increases on the same route in an ad-hoc wireless sensor network. After a route from the source node to the destination node is discovered, the source and destination node can communicate with minimal message traffic overhead. Results show that as the number of packets sent over a single route increases the energy efficiency of MAW when compared with the message flooding mechanism. The protocol is also able to detect and recover from the broadcast storm problems [24], livelock and deadlock. This enhances its reliability in WSNs. This kind of characteristics make it useful for data query applications in WSNs. VIII. F UTURE W ORK ϱϬϬ Ϭ ϰ ϳ ϭϬ ϭϲ ϭϵ ϮϮ Ϯϱ Fig. 7. Comparison of number transmissions required with and without MAW protocol Figure 8 shows the memory footprint for the MAW protocol on MICAz wireless sensor platform. The proposed protocol requires around 12% of the total program memory and around 16% of the total RAM available on the MICAz wireless sensor platform which lower than the memory consumption mentioned in [2]. This shows very low memory requirements of this protocol which makes it lightweight for implementation in WSNs. VII. C ONCLUSION This paper proposes a reliable lightweight routing protocol for unicast routing in WSNs. The protocol is made reliable by 492 As a real implementation is complex and difficult to debug [33], only simulations were done for the proposed protocol. An implementation on a WSN network is necessary to check the reliability in real life and to identify modifications which might be necessary. After the implementation, it would be also useful to get actual energy consumption readings of nodes present in the WSN to get an idea of the lifetime of the WSN. An implementation of the protocol using Contiki operating system [34] may allow more extensive tests of the proposed protocol. Integration of the protocol with other layers of Open Systems Interconnection (OSI) [35] like Medium Access Control (MAC) would be also useful to save more power in WSNs. ACKNOWLEDGMENT The authors would like to thank Dr. Robert Forbes for his valuable and thoughtful suggestions. The authors would like to thank iSLI and University College Dublin for providing funding for publishing this paper. R EFERENCES [1] J. Chang and L. Tassiulas, “Maximum lifetime routing in wireless sensor networks,” IEEE/ACM Transactions on Networking (TON), vol. 12, no. 4, pp. 609–619, 2004. [2] C. Gomez, P. Salvatella, O. Alonso, and J. Paradells, “Adapting AODV for IEEE 802.15.4 Mesh Sensor Networks: Theoretical Discussion and Performance Evaluation in a Real Environment,” in WOWMOM ’06: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks. Washington, DC, USA: IEEE Computer Society, 2006, pp. 159–170. [3] AODV Implemenatation using TinyOS-1.x. Crossbow Technology. [Online]. Available: http://tinyos.cvs.sourceforge.net/viewvc/tinyos/ tinyos-1.x/contrib/hsn/ [4] “AODV implementation on TinyOS-2.x.” [Online]. Available: http: //usn.konkuk.ac.kr/∼jskim/AODV.html [5] C. Perkins, E. Belding-Royer, S. Das et al., “Ad hoc on-demand distance vector (AODV) routing,” 2003. [6] K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad Hoc Networks, vol. 3, no. 3, pp. 325–349, 2005. [7] W. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks,” in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking. ACM New York, NY, USA, 1999, pp. 174–185. [8] Q. Li, J. Aslam, and D. Rus, “Online power-aware routing in wireless Ad-hoc networks,” in MobiCom ’01: Proceedings of the 7th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2001, pp. 97–107. [9] M. Pearlman and Z. Haas, “Determining the optimal configuration for the zone routing protocol,” IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, pp. 1395–1414, 1999. [10] J. Aslam, Q. Li, D. Rus, K. Words, and J. Wiley, “Three power-aware routing algorithms for sensor networks,” Wireless Communications and Mobile Computing, vol. 3, pp. 187–208, 2003. [11] M. Handy, M. Haase, and D. Timmermann, “Low energy adaptive clustering hierarchy with deterministic cluster-head selection,” in Mobile and Wireless Communications Network, 2002. 4th International Workshop on, 2002, pp. 368–372. [12] A. Manjeshwar and D. Agrawal, “TEEN: a routing protocol for enhanced efficiency in wireless sensor networks,” in Parallel and Distributed Processing Symposium., Proceedings 15th International, 2001, pp. 2009– 2015. [13] S. Lindsey and C. Raghavendra, “PEGASIS: Power-efficient gathering in sensor information systems,” in IEEE Aerospace Conference Proceedings, 2002, vol. 3, 2002. [14] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003. [15] G. Ding, Z. Sahinoglu, P. Orlik, J. Zhang, and B. Bhargava, “TreeBased Data Broadcast in IEEE 802.15.4 and ZigBee Networks,” Mobile Computing, IEEE Transactions on, vol. 5, no. 11, pp. 1561–1574, Nov. 2006. [16] Z. Sun, X. guang Zhang, H. Li, and A. Li, “The Application of TinyOS Beaconing WSN Routing Protocol in Mine Safety Monitoring,” Oct. 2008, pp. 415–419. [17] A. Ephremides, J. Wieselthier, and D. Baker, “A design concept for reliable mobile radio networks with frequency hopping signaling,” Proceedings of the IEEE, vol. 75, no. 1, pp. 56–73, 1987. [18] R. Gallager, P. Humblet, P. Spira, L. for Information, D. Systems, and M. I. of Technology, “A distributed algorithm for minimum-weight spanning trees,” ACM Transactions on Programming languages and Systems, vol. 5, no. 1, pp. 66–77, 1983. [19] I. Chakeres and E. Belding-Royer, “AODV routing protocol implementation design,” in Distributed Computing Systems Workshops, 2004. Proceedings. 24th International Conference on, 2004, pp. 698–703. [20] I. D. Chakeres and L. Klein-Berndt, “Aodvjr, aodv simplified,” SIGMOBILE Mob. Comput. Commun. Rev., vol. 6, no. 3, pp. 100–101, 2002. [21] G. Mathur, P. Desnoyers, D. Ganesan, and P. Shenoy, “Ultra-low power data storage for sensor networks,” in Proceedings of the fifth international conference on Information processing in sensor networks. ACM New York, NY, USA, 2006, pp. 374–381. [22] P. Levis, “TinyOS Extension Proposal (TEP) 111: message t, 2006.” [23] H. Karl and A. Willig, Protocols and architectures for wireless sensor networks. Wiley, 2005. [24] I. Stojmenović, Handbook of sensor networks: algorithms and architectures. Wiley-Interscience, 2005. [25] S. Ni, Y. Tseng, Y. Chen, and J. Sheu, “The broadcast storm problem in a mobile ad hoc network,” in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking. ACM New York, NY, USA, 1999, pp. 151–162. [26] P. Berman, L. Gravano, G. Pifarré, and J. Sanz, “Adaptive deadlockand livelock-free routing with all minimal paths in Torus networks,” in Proceedings of the fourth annual ACM symposium on Parallel algorithms and architectures. ACM New York, NY, USA, 1992, pp. 3–12. [27] The TinyOS 2.x Working Group, “Tinyos 2.0,” in SenSys ’05: Proceedings of the 3rd international conference on Embedded networked sensor systems. New York, NY, USA: ACM, 2005, pp. 320–320. [28] D. Gay, P. Levis, R. Von Behren, M. Welsh, E. Brewer, and D. Culler, “The nesC language: A holistic approach to networked embedded systems,” Acm Sigplan Notices, vol. 38, no. 5, pp. 1–11, 2003. [29] D. Gay, P. Levis, D. Culler, and E. Brewer, “nesC 1.1 language reference manual,” TinyOS documentation site, available in http://today. cs. berkeley. edu/tos/tinyos-1. x/doc/nesc/ref. pdf, 2003. [30] P. Levis and N. Lee, “Tossim: A simulator for tinyos networks,” UC Berkeley, September, 2003. [31] (2009, March) Tutorial for TOSSIM in TinyOS 2.0.1. [Online]. Available: http://docs.tinyos.net/index.php/TOSSIM [32] (2004) MICAz 2.4GHz - Wireless Module. Crossbow Technology. [Online]. Available: http://www.xbow.com/Products/Product pdf files/ Wireless pdf/MICAZ Datasheet.pdf [33] E. Royer and C. Perkins, “An implementation study of the AODV routing protocol,” in 2000 IEEE Wireless Communications and Networking Conference, 2000. WCNC, vol. 3, 2000. [34] A. Dunkels, B. Gronvall, and T. Voigt, “Contiki-a lightweight and flexible operating system for tiny networked sensors,” in Local Computer Networks, 2004. 29th Annual IEEE International Conference on, 2004, pp. 455–462. [35] H. Zimmermann, “OSI reference model–The ISO model of architecture for open systems interconnection,” Communications, IEEE Transactions on [legacy, pre-1988], vol. 28, no. 4, pp. 425–432, 1980. 493
© Copyright 2026 Paperzz