SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 6, Issue 10 (April 2013), PP. 66-70
66
Comparative Study of Flat-Based/Data Centric WSN-
Specific Routing Protocols
Smita Tiwari1
, Neelima Sahu2
, A.K. Dwivedi3
1,2,3
School of Studies in Information Technology, MATS University, Raipur, C.G., India - 492001
3
School of Studies in Computer Sc. & I.T., Pandit Ravishankar Shukla University, Raipur, C.G., India - 492010.
Abstract: - The present research paper contribution is organized in two folds. First focus is on the
basics of data-centric approach for WSN. As well as the first fold focuses on the most popular existing
flat-based/data centric WSN-specific. Finally the second fold presents an analytical comparison table
of some existing flat-based/data centric WSN-specific routing protocols.
Keywords: - Wireless Sensor Network, Protocols, Data Centric, Energy Efficiency.
I. INTRODUCTION
The main objective of data-centric approaches is to perform data aggregation in more energy efficient
way inside region of interest. Data centric approach performs a routing scheme in a network which is totally
different than the traditional end-to-end routing schemes resulting in communication with efficiently more high
data rate. Data centric technology differ from traditional address centric approach by the pattern it follows for
the dissemination of data that are coming from several different data sources and bring them together to a single
destination(sink), resulting in redundancy prevention as well as the number of transmission required is also
lessened which in turn saves the energy. This pattern can also be termed as the converge cast tree. Thus, we can
say that, through data centric approach we can increases the lifetime if a network increases in compare to end-
to-end/address centric routing.
In data centric routing, the data is routing, the data is routed in a network depending on the actual
content of the data and not on the destination where the data is to be disseminated. It applies the rules and
principles to the data content for deciding/verifying the receiver of the data, and for this reason, data centric
technique is also known as content-based routing.
Data-centric routing is used in situation whose it appears to be impractical assigning unique IDs to each and
every node of the network i.e., when the number of nodes in a wireless sensor network is comparatively large
then data to perform efficiently network operations.
II. PROBLEM FORMATION
WSN-specific routing (network layer) protocols were/are very attractive area for research, so huge
works are available on it with a number of classifications exists under this layer. Based on research results
available on that time, authors of a highly cited research contribution [1], compares 28 different routing
techniques according to these metrics: Classification, Mobility, Position Awareness, Power Usage, negotiation
based, Data aggregation, Localization, QoS, State Complexity, Scalability, Multipath, and Query based. After
evaluating a number of highly cited research contribution it has been observed that there is a need in detail
analysis, evaluation, and performance comparison on Data-centric or Flat based routing protocols that fit for a
WSN application.
III. FLAT BASED OR DATA CENTRIC WSN-ROUTING PROTOCOLS: A REVIEW
Directed Diffusion [2]
In directed diffusion protocol all nodes are application-aware; this feature enables diffusion to achieve
energy savings by selecting empirically good paths and by caching and processing data in-network.
MCFA (Minimum Cost Forwarding Algorithm) [3]
An energy efficient protocol, which makes the utilization of the information about the direction of routing.
MCFA gets relieve from the unique ID assignment and the routing table, as an alternative each node in this
protocol maintains the least cost estimate, from the node itself to the base station.
TEEN (Threshold sensitive Energy Efficient sensor Network protocol) [4]
Comparative Study of Flat-Based/Data Centric WSN-Specific Routing Protocols
67
As the LEACH [5], the renowned TDMA-based energy efficient MAC protocol for WSN, having
drawback of TDMA scheduling which assumes that nodes always have some data to send. TEEN was proposed
to overcome this drawback for reactive networks by sensing and gathering information about the network
environment continuously, but it transmits data only when a assured starting point is sensed. This protocol is
appropriate for time decisive purpose and also is energy efficient as the transmission is done comparatively less
frequently. Despite of overcoming the drawbacks encountered in LEACH protocols. TEEN also has a
disadvantage that the nodes will not at all be communicating to each other if in case the thresholds are not
attained, and the user will not be getting any data from the network and will not be able to sense if any or all the
nodes expire in the network.
APTEEN (Adaptive Periodic Threshold sensitive Energy Efficient sensor Network protocol) [6]
A hybrid routing protocol that permits for wide-ranging information retrieval. In WSNs the nodes does
not react only to time-critical conditions, but it also gives an overall representation of the network in an
extremely energy efficient manner, at specific period of time intervals. Such a network provides historical form
of data and this feature gives the facility to the user for making request to the past, present and future data from
the historical data of the network at one time and queries having persistent nature.
EAD (Energy Aware Data) Centric Routing Protocol [7]
EAD is a flat based routing protocol that gives better performance in compare to the other existing
routing protocols such as LEACH. However, EAD encounters an innate difficulty that allows only closed nodes
to be chosen as gateways to the sink which will ultimately lead into isolating the respite of the nodes in the
network even despite the fact that they still have sufficient energy to communicate with the destination (sink
node).
RUMOR Routing [8]
A variant of the most popular data centric protocol directed diffusion. This protocol is primarily
designed for being used in applications where geographic routing is not reasonable. In contrast to directed
diffusion, the use of flooding is not necessary here, as only a small amount of data is requested from the nodes
many times. If a large number of queries are present and the amount of events is comparatively limited then, an
another approach is used in which events are being flooded and routes the queries only to the nodes that have
observed a particular event instead of flooding the whole network for retrieving the information regarding the
occurring events. This algorithm, make use of long-lived packets that are called as agents, which travel through
the network for broadcasting information about local events to remote nodes. The overall cost of the
communication is reduced, as well as only a single path is retained between the source node and the destination
node.
SPIN [9]
It is a family of protocols which is more energy-efficient than popular existing approaches like flooding
or gossiping while distributing data at the same rate or faster than either of these protocols allowing
dissemination of information efficiently in a wireless sensor network. It uses data negotiation and resource-
adaptive algorithms to overcome the shortcomings encountered in traditional approaches. In this approach
before any data is transmitted, nodes assign a name to their data, called meta-data, that represents a high-level
name and perform meta-data negotiations ensuring non-redundant data to be sent all over the network. It also
has the feature of adapting the protocol based on how the fact that how much energy is left by accessing the
current energy level of the node. It has two secure building blocks: SNEP and μTESLA providing data
confidentiality and authenticated broadcast for strictly resource-constrained atmosphere respectively.
CADR (Constrained Anisotropic Diffusion Routing) [10]
A general form of Directed Diffusion is proposed known as CADR (constrained anisotropic diffusion
routing). This routing protocol provides a feature for maximizing the information gain and minimizing the
latency and bandwidth. Routes for data dissemination are adjusted dynamically by activating the nodes that are
close to a specific event. The fact that differentiates it from Directed Diffusion is the motive of getting
information with along with a concern of communication cost. In CADR, data dissemination is done depending
on the local information/cost gradient and according to the requirements of end-user. As observed from
simulation results it has been found that more CADR is more energy efficient than Directed Diffusion as it
delivers data by reaching the nearest neighbors first in an isotropic manner.
Comparative Study of Flat-Based/Data Centric WSN-Specific Routing Protocols
68
COUGAR [11]
A data-centric protocol which treats the network as a vast distributed database system. The working
principle of this protocol is utilizing the declarative queries from the network layer functions for processing. For
obtaining more energy savings COUGAR uses local data aggregation. An additional query layer between the
network and application layers is used that provides the abstraction feature. In this approach a leader node is
selected to perform aggregation for transmitting the data to the base station, and the base station generates a
query plan specifying the required information regarding the data flow as well as tells how a leader should be
selected for the query, providing methods independent of network-layer for querying data. The additional layer
on each sensor node consumes extra energy and memory storage.
SER (Stream Enabled Routing) [12]
A new routing protocol called SER is proposed that depends on the sensor nodes specified by sinks for
performing the tasks. In the absence of global positioning system (GPS), a location awareness protocol is used
to locate their positions. SER is based on instructions or tasks that enables it to be incorporated very easily
within the application layer. An identifier value is defined from a predefined instruction rather than assigning
attributes to a task in order to conserve memory.
EAR (Energy Aware Routing Protocol) [13]
In the field of Wireless sensor Networks (WSNs) EAR has helped to expand a variety of applications
deployment with satisfying the main goal of conserving the energy of network lifetime. It is an energy-efficient
routing protocol in which communication path is selected depending on the overall energy observation of the
network. The path is selected through an energy-weight function by estimating the energy weight of different
nodes along the particular path and the communication path and maximizing the network life.
ACQUIRE [14]
ACQUIRE is an energy efficient protocol for obtaining information in wireless sensor networks, which
determines the query by forwarding an active query through the network. A response is sent directly back to the
node which requested for the query after resolving the query completely.
TTCRP (Two Tier Cluster Based Routing Protocol) [15]
TTCRP is a new architecture for data dissemination for reliable and energy efficient data delivery in
WSNs. It uses a rich resource cluster heads with dual channels providing the power control algorithm for
connecting the isolated low power nodes for achieving the network robustness. It has been observed that TTCRP
is efficient in both uniform as well as non-uniform sensor nodes deployment.
SPEED [16]
It operates on the geographic location for making restricted routing decisions. It provides real-time
communication services, that are real-time unicast, real-time area-multicast and real-time area-any cast. It is
adapted as a stateless algorithm and gives relief from the overhead of control management and where the
resources of each and every node are inadequate , it is a found to be highly efficient and scalable protocol in
WSNs. SPEED is specifically designed for handling congestion.
GBR (Gradient Based Protocol) [17]
Gradient-based routing protocols use no pre-setting of routes for sending data to the sink. While
disseminating data from the source node to the sink node, by acquiring the minimum hop count and energy left
at each node.
IV. COMPARATIVE STUDY
The following table given below shows the comparison of some well known data centric protocols:
Table I: Comparison Table of different Data Centric Protocols
Protocols
Negotiation
based
Data
Aggregation.
Mobility
Localization
QoS
QoS
Scalability
Multi
path
Position
Awarenaess
Querybased
Network
Lifetime
Direct
Diffusion [2]
Yes Yes Limited Yes No Limited Yes No Yes Good
MCFA [3] No No No No No Good No No No -
Comparative Study of Flat-Based/Data Centric WSN-Specific Routing Protocols
69
TEEN [4] No Yes
Fixed
BS
Yes No Good No No No
Very
Good
APTEEN [6] No Yes
Fixed
BS
Yes No Good No No No
Very
Good
EAD [7] - Yes - - - - - - - Good
Rumor
Routing [8]
No No
Very
Limited
No No Good No No Yes
Very
Good
SPIN [9] Yes Yes Possible No No Limited Yes No Yes Good
CADR [10] No Yes No No No Limited No - No Good
COUGAR
[11]
No Yes No No No Limited No No Yes Good
SER [12] Yes Yes - Yes Yes - Yes Yes Yes
Very
Good
EAR [13] No No Limited No Limited No No Yes Good
ACQUIRE
[14]
No Yes Limited No No Limited No No Yes Good
TTCRP [15] - Yes No Yes - - - No - Good
SPEED [16] No No No No Yes Limited No No Yes Good
GBR [17] No Yes Limited No No Limited No No Yes Good
V. CONCLUSION
In the recent years data centric routing protocols in sensor networks has attracted a lot of attention and
introduced unique challenges compared to traditional data routing protocols such as address centric routing
protocols. In this paper, based on recent research results on data routing in sensor networks through data centric
approach has been summarized, including that whether the protocol is utilizing data aggregation or not. Since
data aggregation is an important concern for data centric routing protocols in context of energy saving and
traffic optimization.
ACKNOWLEDGMENT
Authors gratefully acknowledge the immense contribution of the researchers whose work is thankfully
cited in this paper. Their zest for scientific exploration and hard work in conducting various simulation studies
had given a new insight to the research community and paved way for many product developments.
REFERENCE
[1] J.N. Al-Karaki, and A.E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” IEEE
Wireless Communications, pp. 06-28, Dec. 2004.
[2] Z. Shousheng, Y. Fengqi, and Z. Baohua, "An Energy Efficient Directed Diffusion Routing
Protocol," in Proc. of International Conference on Computational Intelligence and Security, Dec. 2007,
pp.1067-1072. doi: 10.1109/CIS.2007.70
[3] F. Ye, A. Chen, S. Liu, and L. Zhang, “A Scalable Solution to Minimum Cost Forwarding in Large
Sensor Networks," in Proc. of the tenth International Conference on Computer Communications and
Networks (ICCCN), pp. 304-309, 2001.
[4] A. Manjeshwar and D. P. Agarwal, "TEEN: a routing protocol for enhanced efficiency in wireless
sensor networks," in Proc. of the 1st International Workshop on Parallel and Distributed Computing
Issues in Wireless Networks and Mobile Computing, April 2001.
[5] W.R. Heinzelman, A. Chandrakasen, and H, Balakrishnan, “Energy-Efficient Communication Protocol
for Wireless Microsensor Networks,” in Proc. of the Hawaii International Conferenece on Sysyem
Sciences, Jan. 2000, Maui, Hawaii.
[6] A. Manjeshwar, and D. P. Agarwal, "APTEEN: A Hybrid Protocol for Efficient Routing and
Comprehensive Information Retrieval in Wireless Sensor Networks," in Proc. of the International
Parallel and Distributed Processing Symposium (IPDPS), 2002, pp. 195-202.
[7] T.A. Al Khdour, and U. Baroudi, "A Generlaized Energy-Aware Data Centric Routing for Wireless
Sensor Network," in Proc. of the IEEE International Conference Signal Processing and
Communications (ICSPC), Nov. 2007, pp.117-120, doi: 10.1109/ICSPC.2007.4728269
Comparative Study of Flat-Based/Data Centric WSN-Specific Routing Protocols
70
[8] D. Braginsky, and D. Estrin, "Rumor routing algorithm in sensor networks," in Proc. of ACM WSNA
in conjunction with ACM MobiCom'02, Atlanta, GA, Sept. 2002, pp. 22-31
[9] Luwei Jing, Feng Liu, and Yuling Li, "Energy saving routing algorithm based on SPIN protocol in
WSN," in Proc. of International Conference on Image Analysis and Signal Processing (IASP), 2011 ,
pp.416-419, Oct. 2011, doi: 10.1109/IASP.2011.6109074
[10] A. Perrig, R. Szewczyk, J,D, Tygar, V. Wen, and D.E. Culler, “SPINS: Security Protocols for Se4nsor
Networks,” Wireless Networks, vol. 8, issue 5, pp. 521-534, Sept. 2002.
[11] Y. Yao, and J. Gehrke, “The Cougar Approach to In-network Query Processing in Sensor Networks,"
SIGMOD Record-Web Edition, vol. 31, no. 3, Sept. 2002.
[12] I. F. Akyildiz, and W. Su, “A Stream Enabled Routing (SER) Protocol for Sensor Networks,” Italy, in
proceeding of Med-hoc-Net 2002, September 2002.
[13] S. Yessad, N. Tazarart, L. Bakli, L. Medjkoune-Bouallouche, and D. Aissani, "Balanced energy
efficient routing protocol for WSN," in Proc. of International Conference on Communications and
Information Technology (ICCIT), 2012 , pp.326-330, 26-28 June 2012 doi:
10.1109/ICCITechnol.2012.6285817
[14] Liu Shaoqiang, Hong Danlong, Chen Lei, and Fan Xiaoping, "Energy saving scheme for data
acquisition of WSN node," in Proc. Of 3rd IEEE International Conference on Computer Science and
Information Technology (ICCSIT), July 2010 , vol.4, pp.518-522, 9-11. doi:
10.1109/ICCSIT.2010.5563547
[15] A.U. Khattak, G.A. Shah, and M. Ahsan,, "Two-Tier Cluster Based Routing Protocol for Wireless
Sensor Networks, in Proc. Of IEEE/IFIP 8th International Conference on " Embedded and Ubiquitous
Computing (EUC), 2010, pp.410-415, Dec. 2010 doi: 10.1109/EUC.2010.68
[16] Tian He, J.A. Stankovic, Chenyang Lu, and T. Abdelzaher, "SPEED: a stateless protocol for real-time
communication in sensor networks," in Proc. of 23rd International Conference on Distributed
Computing Systems,, May 2003, pp. 46- 55, doi: 10.1109/ICDCS.2003.1203451
[17] Hongseok Yoo, Moonjoo Shim, Dongkyun Kim, Kyu Hyung Kim, "GLOBAL: A Gradient-based
routing protocol for load-balancing in large-scale wireless sensor networks with multiple sinks," IEEE
Symposium on Computers and Communications (ISCC), 2010, pp.556-562, 22-25 June 2010
doi: 10.1109/ISCC.2010.5546784

Más contenido relacionado

La actualidad más candente

AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
IJCNCJournal
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
paperpublications3
 
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...
ijdpsjournal
 

La actualidad más candente (14)

Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
Improved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNsImproved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNs
 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
 
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETsODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
 
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
 

Similar a International Journal of Engineering Research and Development (IJERD)

E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 
An Overview of Energy Efficient Hierarchical-Based Routing Protocols for Inte...
An Overview of Energy Efficient Hierarchical-Based Routing Protocols for Inte...An Overview of Energy Efficient Hierarchical-Based Routing Protocols for Inte...
An Overview of Energy Efficient Hierarchical-Based Routing Protocols for Inte...
BRNSSPublicationHubI
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
IJCNCJournal
 

Similar a International Journal of Engineering Research and Development (IJERD) (20)

Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networks
 
F04623943
F04623943F04623943
F04623943
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
An Overview of Energy Efficient Hierarchical-Based Routing Protocols for Inte...
An Overview of Energy Efficient Hierarchical-Based Routing Protocols for Inte...An Overview of Energy Efficient Hierarchical-Based Routing Protocols for Inte...
An Overview of Energy Efficient Hierarchical-Based Routing Protocols for Inte...
 
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...
 
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networks
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 

Más de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 

Más de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Último (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 6, Issue 10 (April 2013), PP. 66-70 66 Comparative Study of Flat-Based/Data Centric WSN- Specific Routing Protocols Smita Tiwari1 , Neelima Sahu2 , A.K. Dwivedi3 1,2,3 School of Studies in Information Technology, MATS University, Raipur, C.G., India - 492001 3 School of Studies in Computer Sc. & I.T., Pandit Ravishankar Shukla University, Raipur, C.G., India - 492010. Abstract: - The present research paper contribution is organized in two folds. First focus is on the basics of data-centric approach for WSN. As well as the first fold focuses on the most popular existing flat-based/data centric WSN-specific. Finally the second fold presents an analytical comparison table of some existing flat-based/data centric WSN-specific routing protocols. Keywords: - Wireless Sensor Network, Protocols, Data Centric, Energy Efficiency. I. INTRODUCTION The main objective of data-centric approaches is to perform data aggregation in more energy efficient way inside region of interest. Data centric approach performs a routing scheme in a network which is totally different than the traditional end-to-end routing schemes resulting in communication with efficiently more high data rate. Data centric technology differ from traditional address centric approach by the pattern it follows for the dissemination of data that are coming from several different data sources and bring them together to a single destination(sink), resulting in redundancy prevention as well as the number of transmission required is also lessened which in turn saves the energy. This pattern can also be termed as the converge cast tree. Thus, we can say that, through data centric approach we can increases the lifetime if a network increases in compare to end- to-end/address centric routing. In data centric routing, the data is routing, the data is routed in a network depending on the actual content of the data and not on the destination where the data is to be disseminated. It applies the rules and principles to the data content for deciding/verifying the receiver of the data, and for this reason, data centric technique is also known as content-based routing. Data-centric routing is used in situation whose it appears to be impractical assigning unique IDs to each and every node of the network i.e., when the number of nodes in a wireless sensor network is comparatively large then data to perform efficiently network operations. II. PROBLEM FORMATION WSN-specific routing (network layer) protocols were/are very attractive area for research, so huge works are available on it with a number of classifications exists under this layer. Based on research results available on that time, authors of a highly cited research contribution [1], compares 28 different routing techniques according to these metrics: Classification, Mobility, Position Awareness, Power Usage, negotiation based, Data aggregation, Localization, QoS, State Complexity, Scalability, Multipath, and Query based. After evaluating a number of highly cited research contribution it has been observed that there is a need in detail analysis, evaluation, and performance comparison on Data-centric or Flat based routing protocols that fit for a WSN application. III. FLAT BASED OR DATA CENTRIC WSN-ROUTING PROTOCOLS: A REVIEW Directed Diffusion [2] In directed diffusion protocol all nodes are application-aware; this feature enables diffusion to achieve energy savings by selecting empirically good paths and by caching and processing data in-network. MCFA (Minimum Cost Forwarding Algorithm) [3] An energy efficient protocol, which makes the utilization of the information about the direction of routing. MCFA gets relieve from the unique ID assignment and the routing table, as an alternative each node in this protocol maintains the least cost estimate, from the node itself to the base station. TEEN (Threshold sensitive Energy Efficient sensor Network protocol) [4]
  • 2. Comparative Study of Flat-Based/Data Centric WSN-Specific Routing Protocols 67 As the LEACH [5], the renowned TDMA-based energy efficient MAC protocol for WSN, having drawback of TDMA scheduling which assumes that nodes always have some data to send. TEEN was proposed to overcome this drawback for reactive networks by sensing and gathering information about the network environment continuously, but it transmits data only when a assured starting point is sensed. This protocol is appropriate for time decisive purpose and also is energy efficient as the transmission is done comparatively less frequently. Despite of overcoming the drawbacks encountered in LEACH protocols. TEEN also has a disadvantage that the nodes will not at all be communicating to each other if in case the thresholds are not attained, and the user will not be getting any data from the network and will not be able to sense if any or all the nodes expire in the network. APTEEN (Adaptive Periodic Threshold sensitive Energy Efficient sensor Network protocol) [6] A hybrid routing protocol that permits for wide-ranging information retrieval. In WSNs the nodes does not react only to time-critical conditions, but it also gives an overall representation of the network in an extremely energy efficient manner, at specific period of time intervals. Such a network provides historical form of data and this feature gives the facility to the user for making request to the past, present and future data from the historical data of the network at one time and queries having persistent nature. EAD (Energy Aware Data) Centric Routing Protocol [7] EAD is a flat based routing protocol that gives better performance in compare to the other existing routing protocols such as LEACH. However, EAD encounters an innate difficulty that allows only closed nodes to be chosen as gateways to the sink which will ultimately lead into isolating the respite of the nodes in the network even despite the fact that they still have sufficient energy to communicate with the destination (sink node). RUMOR Routing [8] A variant of the most popular data centric protocol directed diffusion. This protocol is primarily designed for being used in applications where geographic routing is not reasonable. In contrast to directed diffusion, the use of flooding is not necessary here, as only a small amount of data is requested from the nodes many times. If a large number of queries are present and the amount of events is comparatively limited then, an another approach is used in which events are being flooded and routes the queries only to the nodes that have observed a particular event instead of flooding the whole network for retrieving the information regarding the occurring events. This algorithm, make use of long-lived packets that are called as agents, which travel through the network for broadcasting information about local events to remote nodes. The overall cost of the communication is reduced, as well as only a single path is retained between the source node and the destination node. SPIN [9] It is a family of protocols which is more energy-efficient than popular existing approaches like flooding or gossiping while distributing data at the same rate or faster than either of these protocols allowing dissemination of information efficiently in a wireless sensor network. It uses data negotiation and resource- adaptive algorithms to overcome the shortcomings encountered in traditional approaches. In this approach before any data is transmitted, nodes assign a name to their data, called meta-data, that represents a high-level name and perform meta-data negotiations ensuring non-redundant data to be sent all over the network. It also has the feature of adapting the protocol based on how the fact that how much energy is left by accessing the current energy level of the node. It has two secure building blocks: SNEP and μTESLA providing data confidentiality and authenticated broadcast for strictly resource-constrained atmosphere respectively. CADR (Constrained Anisotropic Diffusion Routing) [10] A general form of Directed Diffusion is proposed known as CADR (constrained anisotropic diffusion routing). This routing protocol provides a feature for maximizing the information gain and minimizing the latency and bandwidth. Routes for data dissemination are adjusted dynamically by activating the nodes that are close to a specific event. The fact that differentiates it from Directed Diffusion is the motive of getting information with along with a concern of communication cost. In CADR, data dissemination is done depending on the local information/cost gradient and according to the requirements of end-user. As observed from simulation results it has been found that more CADR is more energy efficient than Directed Diffusion as it delivers data by reaching the nearest neighbors first in an isotropic manner.
  • 3. Comparative Study of Flat-Based/Data Centric WSN-Specific Routing Protocols 68 COUGAR [11] A data-centric protocol which treats the network as a vast distributed database system. The working principle of this protocol is utilizing the declarative queries from the network layer functions for processing. For obtaining more energy savings COUGAR uses local data aggregation. An additional query layer between the network and application layers is used that provides the abstraction feature. In this approach a leader node is selected to perform aggregation for transmitting the data to the base station, and the base station generates a query plan specifying the required information regarding the data flow as well as tells how a leader should be selected for the query, providing methods independent of network-layer for querying data. The additional layer on each sensor node consumes extra energy and memory storage. SER (Stream Enabled Routing) [12] A new routing protocol called SER is proposed that depends on the sensor nodes specified by sinks for performing the tasks. In the absence of global positioning system (GPS), a location awareness protocol is used to locate their positions. SER is based on instructions or tasks that enables it to be incorporated very easily within the application layer. An identifier value is defined from a predefined instruction rather than assigning attributes to a task in order to conserve memory. EAR (Energy Aware Routing Protocol) [13] In the field of Wireless sensor Networks (WSNs) EAR has helped to expand a variety of applications deployment with satisfying the main goal of conserving the energy of network lifetime. It is an energy-efficient routing protocol in which communication path is selected depending on the overall energy observation of the network. The path is selected through an energy-weight function by estimating the energy weight of different nodes along the particular path and the communication path and maximizing the network life. ACQUIRE [14] ACQUIRE is an energy efficient protocol for obtaining information in wireless sensor networks, which determines the query by forwarding an active query through the network. A response is sent directly back to the node which requested for the query after resolving the query completely. TTCRP (Two Tier Cluster Based Routing Protocol) [15] TTCRP is a new architecture for data dissemination for reliable and energy efficient data delivery in WSNs. It uses a rich resource cluster heads with dual channels providing the power control algorithm for connecting the isolated low power nodes for achieving the network robustness. It has been observed that TTCRP is efficient in both uniform as well as non-uniform sensor nodes deployment. SPEED [16] It operates on the geographic location for making restricted routing decisions. It provides real-time communication services, that are real-time unicast, real-time area-multicast and real-time area-any cast. It is adapted as a stateless algorithm and gives relief from the overhead of control management and where the resources of each and every node are inadequate , it is a found to be highly efficient and scalable protocol in WSNs. SPEED is specifically designed for handling congestion. GBR (Gradient Based Protocol) [17] Gradient-based routing protocols use no pre-setting of routes for sending data to the sink. While disseminating data from the source node to the sink node, by acquiring the minimum hop count and energy left at each node. IV. COMPARATIVE STUDY The following table given below shows the comparison of some well known data centric protocols: Table I: Comparison Table of different Data Centric Protocols Protocols Negotiation based Data Aggregation. Mobility Localization QoS QoS Scalability Multi path Position Awarenaess Querybased Network Lifetime Direct Diffusion [2] Yes Yes Limited Yes No Limited Yes No Yes Good MCFA [3] No No No No No Good No No No -
  • 4. Comparative Study of Flat-Based/Data Centric WSN-Specific Routing Protocols 69 TEEN [4] No Yes Fixed BS Yes No Good No No No Very Good APTEEN [6] No Yes Fixed BS Yes No Good No No No Very Good EAD [7] - Yes - - - - - - - Good Rumor Routing [8] No No Very Limited No No Good No No Yes Very Good SPIN [9] Yes Yes Possible No No Limited Yes No Yes Good CADR [10] No Yes No No No Limited No - No Good COUGAR [11] No Yes No No No Limited No No Yes Good SER [12] Yes Yes - Yes Yes - Yes Yes Yes Very Good EAR [13] No No Limited No Limited No No Yes Good ACQUIRE [14] No Yes Limited No No Limited No No Yes Good TTCRP [15] - Yes No Yes - - - No - Good SPEED [16] No No No No Yes Limited No No Yes Good GBR [17] No Yes Limited No No Limited No No Yes Good V. CONCLUSION In the recent years data centric routing protocols in sensor networks has attracted a lot of attention and introduced unique challenges compared to traditional data routing protocols such as address centric routing protocols. In this paper, based on recent research results on data routing in sensor networks through data centric approach has been summarized, including that whether the protocol is utilizing data aggregation or not. Since data aggregation is an important concern for data centric routing protocols in context of energy saving and traffic optimization. ACKNOWLEDGMENT Authors gratefully acknowledge the immense contribution of the researchers whose work is thankfully cited in this paper. Their zest for scientific exploration and hard work in conducting various simulation studies had given a new insight to the research community and paved way for many product developments. REFERENCE [1] J.N. Al-Karaki, and A.E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” IEEE Wireless Communications, pp. 06-28, Dec. 2004. [2] Z. Shousheng, Y. Fengqi, and Z. Baohua, "An Energy Efficient Directed Diffusion Routing Protocol," in Proc. of International Conference on Computational Intelligence and Security, Dec. 2007, pp.1067-1072. doi: 10.1109/CIS.2007.70 [3] F. Ye, A. Chen, S. Liu, and L. Zhang, “A Scalable Solution to Minimum Cost Forwarding in Large Sensor Networks," in Proc. of the tenth International Conference on Computer Communications and Networks (ICCCN), pp. 304-309, 2001. [4] A. Manjeshwar and D. P. Agarwal, "TEEN: a routing protocol for enhanced efficiency in wireless sensor networks," in Proc. of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, April 2001. [5] W.R. Heinzelman, A. Chandrakasen, and H, Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,” in Proc. of the Hawaii International Conferenece on Sysyem Sciences, Jan. 2000, Maui, Hawaii. [6] A. Manjeshwar, and D. P. Agarwal, "APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks," in Proc. of the International Parallel and Distributed Processing Symposium (IPDPS), 2002, pp. 195-202. [7] T.A. Al Khdour, and U. Baroudi, "A Generlaized Energy-Aware Data Centric Routing for Wireless Sensor Network," in Proc. of the IEEE International Conference Signal Processing and Communications (ICSPC), Nov. 2007, pp.117-120, doi: 10.1109/ICSPC.2007.4728269
  • 5. Comparative Study of Flat-Based/Data Centric WSN-Specific Routing Protocols 70 [8] D. Braginsky, and D. Estrin, "Rumor routing algorithm in sensor networks," in Proc. of ACM WSNA in conjunction with ACM MobiCom'02, Atlanta, GA, Sept. 2002, pp. 22-31 [9] Luwei Jing, Feng Liu, and Yuling Li, "Energy saving routing algorithm based on SPIN protocol in WSN," in Proc. of International Conference on Image Analysis and Signal Processing (IASP), 2011 , pp.416-419, Oct. 2011, doi: 10.1109/IASP.2011.6109074 [10] A. Perrig, R. Szewczyk, J,D, Tygar, V. Wen, and D.E. Culler, “SPINS: Security Protocols for Se4nsor Networks,” Wireless Networks, vol. 8, issue 5, pp. 521-534, Sept. 2002. [11] Y. Yao, and J. Gehrke, “The Cougar Approach to In-network Query Processing in Sensor Networks," SIGMOD Record-Web Edition, vol. 31, no. 3, Sept. 2002. [12] I. F. Akyildiz, and W. Su, “A Stream Enabled Routing (SER) Protocol for Sensor Networks,” Italy, in proceeding of Med-hoc-Net 2002, September 2002. [13] S. Yessad, N. Tazarart, L. Bakli, L. Medjkoune-Bouallouche, and D. Aissani, "Balanced energy efficient routing protocol for WSN," in Proc. of International Conference on Communications and Information Technology (ICCIT), 2012 , pp.326-330, 26-28 June 2012 doi: 10.1109/ICCITechnol.2012.6285817 [14] Liu Shaoqiang, Hong Danlong, Chen Lei, and Fan Xiaoping, "Energy saving scheme for data acquisition of WSN node," in Proc. Of 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), July 2010 , vol.4, pp.518-522, 9-11. doi: 10.1109/ICCSIT.2010.5563547 [15] A.U. Khattak, G.A. Shah, and M. Ahsan,, "Two-Tier Cluster Based Routing Protocol for Wireless Sensor Networks, in Proc. Of IEEE/IFIP 8th International Conference on " Embedded and Ubiquitous Computing (EUC), 2010, pp.410-415, Dec. 2010 doi: 10.1109/EUC.2010.68 [16] Tian He, J.A. Stankovic, Chenyang Lu, and T. Abdelzaher, "SPEED: a stateless protocol for real-time communication in sensor networks," in Proc. of 23rd International Conference on Distributed Computing Systems,, May 2003, pp. 46- 55, doi: 10.1109/ICDCS.2003.1203451 [17] Hongseok Yoo, Moonjoo Shim, Dongkyun Kim, Kyu Hyung Kim, "GLOBAL: A Gradient-based routing protocol for load-balancing in large-scale wireless sensor networks with multiple sinks," IEEE Symposium on Computers and Communications (ISCC), 2010, pp.556-562, 22-25 June 2010 doi: 10.1109/ISCC.2010.5546784