Routing in Sensor Networks. –Routing means carrying data packets from a source node to a destination node (usually called sinks in sensor networks terminology)

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Data and Computer Communications
Communication Networks Recitation 3 Bridges & Spanning trees.
Directed Diffusion for Wireless Sensor Networking
A Presentation by: Noman Shahreyar
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin.
Routing in Sensor Networks. Sensor Networks vs. Ad hoc Networks –Higher number of sensor nodes (several orders of magnitude) –Dense deployment –Prone.
Rumor Routing Algorithm For Sensor Networks
1 Routing Techniques in Wireless Sensor networks: A Survey.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
1 Distributed Adaptive Sampling, Forwarding, and Routing Algorithms for Wireless Visual Sensor Networks Johnsen Kho, Long Tran-Thanh, Alex Rogers, Nicholas.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1-1 Topology Control. 1-2 What’s topology control?
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Before start… Earlier work single-path routing in sensor networks
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Intanagonwiwat, Govindan, Estrin USC, Information Sciences Institute,
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Routing Protocols II.
1 Computer Networks Routing Algorithms. 2 IP Packet Delivery Two Processes are required to accomplish IP packet delivery: –Routing discovering and selecting.
Load Balancing Routing Scheme in Mars Sensor Network CS 215 Winter 2001 Term Project Prof : Mario Gerla Tutor: Xiaoyan Hong Student : Hanbiao Wang & Qingying.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
Routing in Sensor Networks
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
Introduction to Routing and Routing Protocols By Ashar Anwar.
1 Chalermek Intanagonwiwat (USC/ISI) Ramesh Govindan (USC/ISI) Deborah Estrin (USC/ISI and UCLA) DARPA Sponsored SCADDS project Directed Diffusion
Mobile Routing protocols MANET
Wireless Sensor Networks COE 499 Energy Aware Routing
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks ChalermekRameshDeborah Intanagonwiwat Govindan Estrin Mobicom 2000.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Link State Routing David Holmer Generic Link State Routing  Each node monitors neighbors/local links and advertises them to the network.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Ching-Ju Lin Institute of Networking and Multimedia NTU
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Coping with Link Failures in Centralized Control Plane Architecture Maulik Desai, Thyagarajan Nandagopal.
Routing in Sensor Networks. –Routing means carrying data packets from a source node to a destination node (usually called sinks in sensor networks terminology)
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Routing in Sensor Networks
Protocols.
Protocols.
Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]
Presentation transcript:

Routing in Sensor Networks

–Routing means carrying data packets from a source node to a destination node (usually called sinks in sensor networks terminology) –Such routing paths helps to create energy-efficient data dissemination paths between sources (sensors) and sinks (global processing unit or human interface devices) –Two kinds of routing: single-path and multi-path –Since energy efficiency is the most essential factor, routing algorithms must be robust to failures and secure against the compromised and malicious nodes to ensure data delivery without impacting the lifetime of the network Why Routing?

–Probabilistic algorithm and makes packet forwarding decisions based on localized information –Based on a tree-like topology rooted at the sink of the network –Uses forward approach to contribute to end-to-end reliability –Avoids packet loss by sending multiple packets of the single event –Three sources of packets loss expected:  Isolated link  Patterned node failures  Malicious or misbehaving nodes Algorithm for Robust Routing in Volatile Environments (ARRIVE) [Karlof+, 2002]

Terminology –Event: Identified by [SourceID, EventID] –Level: Each node has unique level indicating distance from source to sink (in terms of hops) –Parents: Nodes one level closer to the sink –Neighbors: Nodes on the same level and be able hear each other –Push: Push packet to one of the neighbors –Forward: Forward packet to one of the parents –Forwarding Probability: Included in the packet header and used to probabilistically select whether to push or forward –Reputation History: Each node keeps this information for each of its parents and neighbors –Convergence: Prevents multiple packets of the same event being sent to same source of failure ARRIVE [Karlof+, 2002]

–Achieves diversity in paths in two ways:  Upon receiving a packet, the next hop is selected probabilistically based on link reliability and node reputation  When more than two or more packets of the same event are processed, these packets are ensured to follow different outgoing links –Takes advantage of passive participation and needs to be used cautiously –Each nodes keeps the following information:  Level  Neighbors list  Parents list  Reputation history of neighbors and parents  Convergence history of specific events ARRIVE [Karlof+, 2002]

Assumptions –The networks is assumed to be dense enough that sufficient multiplicity of paths between sources and sink for algorithm to perform well –The network is almost considered as a static network –Sensors are considered to have a low per-node cost –Routes used by the packets are unlikely to be optimal due to the probabilistic nature of the algorithm –Messages flow from nodes to sink, not the other way around –There is only one sink available Performance Metrics –Event delivery ratio –Three other metrics measuring the cost of deploying ARRIVE ARRIVE [Karlof+, 2002]

Algorithm Description –Bread first search rooted at sink is used to initialize level, parents, neighbors state information at each node –When a nodes hears a packets, it checks to see if the packet is addressed for it –If so, threshold processing takes place. Nodes are filtered by their reputation and convergence history of the neighbors and parents –A decision needs to be made to either to choose to forward the packet to a parent or push it to one of its neighbors with the probability value found in the packet header. This is randomly determined by the forwarding probability function P r (f). –Each node is weighed by their reputation. The destination is randomly selected from the rest of the nodes (since bad reputation nodes are eliminated) –If the the packet is forwarded to one of the parents, P r (f) is not changed; however, its value is increased ARRIVE [Karlof+, 2002]

Algorithm for Robust Routing in Volatile Environments (ARRIVE) [Karlof+, 2002] Figure 0: Overview of ARRIVE Adapted from [Karlof+ 2002]

Advantages: –High end-to-end reliability –Provides security by eliminating the compromised or malicious nodes –By using multiple paths to forward the same event, the probability of the event reaching sink is increased and this also ensures to avoid packets being forwarded to the same broken link – Reputation history assists in establishing a reliable path ARRIVE [Karlof+, 2002]

Disadvantages: –Extra power consumption for inactive nodes (passive listeners) are not considered –Better mechanism to take care problems caused by passive listening –There is only one sink, packets are sent from sources to sink and not the other way around –Sensor may have storage problems due to maintaining information about its neighbors and parents (reputation history) –Maintaining multiple paths requires more resources ARRIVE [Karlof+, 2002]

Suggestions/Improvements/Future Work: –Beneficial to measure how much passive listening affects energy use –Nodes can be mobile during the simulation instead of static –If there is a significant mobility, state information should be updated using a better mechanism than flooding –Explanation of how multiple packets are generated –How much redundant data is sufficient to optimize the network –Energy-awareness needs to be taken into consideration –Possibly use energy level parameter in the decision making –Include probabilistic analysis of the algorithm –Study the tradeoff the communication cost of ARRIVE vs. its robustness –Consider load balancing issues such that nodes near the sink deplete their resources sooner than nodes farther away –Lack of quantitative analysis of passive participation for security reasons –Experiment with larger number of events ARRIVE [Karlof+, 2002]

Preliminaries  Each node has its neighbor list, and an events table, with forwarding information to all the events it knows.  After a node witnesses an event, an agent may be created, which is a long-lived packet and travels around the network. Each agent contains an events table, including the routing information for all events it knows.  Since an event happens in a zone, composed of several or many nodes, it’s possible more than one agents are created from the zone and moving in the network. Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002]

Algorithm Description  When a node observes an event, it will add the event to its event table and may also create an agent  An agent will travel in the network and its routing table will be updated if there is a shorter path to an event within the routing table of the node it is visiting  In a similar way, the routing table of the currently visited node will be updated if its route to an event is more costly than the agent’s  Any node may generate a query for a particular event. If it knows the route to the event, it will transmit the query. Otherwise, the query will be sent in a random direction, and this continues until the query reach a node which has a route to the event Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002]

Adapted from [Braginsky+ 2002] Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002]

Adapted from [Braginsky+ 2002] Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002] Figure 3: The agent modifies the exist path (left) to a more optimal one (right)

Advantages:  Deliver queries to events in large networks with less average cumulative hops and lower energy requirements than simple flooding.  The algorithm can handle node failure gracefully, degrading its delivery rate linearly with the number of failed nodes. Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002]

Disadvantages:  The path found by the agent sometimes is not the shortest and could be unavailable if one of the links of the path is broken.  The agent may carry lots of routing information of events even some events have disappeared.  No hints from the paper about the number of agents which should be created from the event zone.  Can the nodes make a query for an event if no such event is existing in the network?  It seems that each event should have an id, but no information is provided in the paper.  Optimization is not considered Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002]

[Braginsky+ 2002] D. Braginsky and D. Estrin, Rumor Routing Algorithm for Sensor Networks, First Workshop on Sensor Networks and Applications (WSNA), September 28, 2002, Atlanta, Georgia, pp [De+ 2003] S. De, C. Qiao, and H. Wu, Meshed multipath routing with selective forwarding: an efficient strategy in wireless sensor networks, Computer Networks, 43, Elsevier Journal, 2003, pp [Ganesan+ 2002] D. Ganesan, R. Govindan, S. Shenker and D. Estrin, Highly Resilient, Energy Efficient Multipath Routing in Wireless Sensor Networks, Mobile Computing and Communications Review (MC2R) Vol 1., No [Intanagonwiwat ] C. Intanagonwiwat, R. Govindan and D. Estrin, Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks, In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networks (MobiCOM 2000), August 2000, Boston, Massachusetts. [Karlof+ 2002] C. Karlof, Y. Li and J. Polastre, ARRIVE: Algorithm for Robust Routing in Volatile Environments, UC Berkley, Tech Report, May [Pottie+ 2000] G. Pottie, W. Kaiser, L. Clare, and H. Marcy, Wireless Integrated Sensor Networks, Communications of the ACM, Vol. 43, No. 5, pp , May 2000 [Weilian+ 2002] W. Su and I. Akyildiz, A Stream Enabled Routing (SER) Protocol for Sensor Networks, Med-hoc-Net 2002, Sardegna, Italy, September References