SlideShare a Scribd company logo
The International Journal Of Engineering And Science (IJES)
|| Volume || 3 || Issue || 12 || December - 2014 || Pages || 20-27||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 20
Comparison of Routing protocols in Wireless Sensor Networks: A
Detailed Survey
Sakshi Anand, Sujata Chandel
1
Department of Electronics& Communication, Shoolini University, Solan
2
Department of Electronics& Communication, Shoolini University, Solan
------------------------------------------------------ABSTRACT---------------------------------------------------
Recent advancement in wireless communication has led to the development of low cost, small devices that
possess sensing, signal processing and capabilities of wireless communication. WSN consist of two terms i.e.
wireless network and sensors. A wireless network is any type of computer network that uses wireless data
connections for connecting network nodes and Sensing is a process of gathering information about a physical
object, including the occurrence of events (i.e., changes in state such as a drop in temperature or pressure). An
object performing such a sensing task is called a sensor. A WSN consist of a large number of sensor nodes
having wireless links for communicating. It is a kind of ad-hoc network. Its main aim is to monitor the physical
conditions like pressure, temperature. Advancement in technology is mainly due to the decrease in the size of
sensors.
KEYWORDS: GAF, Protocols, SMECN, SPIN, Wireless sensor network,
--------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 23 December 2014 Date of Accepted: 05 January 2015
---------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
A WSN mainly consist of densely distributed nodes in a network. The most important part in wireless
sensor network is sensors, popular because of low power, low cost, small size. There are main characteristics of
wireless sensor networks - It has mobility of nodes. It is very easy to use. 3. It contains heterogeneity network
for nodes. 4. It contains power energy constraints. 5. It has ability to cope up in environmental harsh conditions.
Sensor ranges varies from nanoscopic to mesoscopic scale devices. Nanoscopic contains the devices varies from
1 to 100nm in diameter and mesoscopic varies from 100 to 10000nm in diameter. Sensors are mainly self-
powered or may be passive. Sensors are mainly of two types –Active sensors- RADAR & SONAR .Passive
sensors- video sensor, infrared sensor, seismic sensor, acoustic sensor etc. In WSN, the energy availability is
constrained in small sensors and unconstrained in large sensors. WSN can also use large no of wireless
technologies such as WLAN, PAN, Bluetooth, wi-max and 3G. [2]
In this paper, a brief description of all the routing protocols is given and then we do the comparison of all the
routing protocols.
II. ARCHITECTURE
Architecture of WSN mainly follows OSI model. It consists of hardware and software (Tiny OS). It is a
component based. Major components of wireless sensor network are: Sensor field- This Field consists of large
number of sensor nodes and sensor nodes are deployed. [3]
Fig. 1: Architecture of WSN. [5]
Sensor nodes-They are the sensors which are responsible for gathering information and routing information back
to the sink.
Comparison Of Routing Protocols In Wireless Sensor…
www.theijes.com The IJES Page 21
Base station- it is a centralized point to control the network which is mainly used to extract the information from
the network and again passes information back to the network. It is also known as task manager. Communication
is done by satellite or internet communication. Sink: it is also a type of sensor node which performs operations
like receiving, storing data and processing from the other sensor node. This node reduces the energy
requirement.
LAYERS : WSN network architecture mainly consists of large number of layers, five layers and three cross
layer plans are also added. It has application layer, transport layer, data link layer, network layer, physical layer
and three cross layers are power management plane, mobility management plane and task management plane
each layer has its own function. These cross layers increases the efficiency of the network by making the sensors
work together these layers also used to manage the network. WSN OSI layers are [5]
Application layer : This layer provides software which translates a data to an understandable form or sends any
type of queries for different applications to get certain information. This layer is known as user interface which is
responsible for displaying the user information.
Transport layer : This layer is mainly used for the purpose to access other networks when system is organized
to do so. It provides reliability & is more energy efficient. It is also responsible for catching and storage.
Transport protocols are divided into two parts: [10]
Packet driven: where all the packets sent from the source must reach to the destination.
Event driven: The event is detected, and it is enough that one message reaches the sink.
Network layer: This layer is responsible for routing and faces a lot of challenges and the main challenges are
power saving, not self-organized and doesn’t have global id they also have limited memory and buffer. Various
protocols are used in this layer they are hierarchal routing and flat routing.
Data link layer: It is responsible for data frame detection, MAC and error control, multiplexing data streams. It
contains an error and unreliability. The unreliability comes from co channel interference at mac layer and this
problem is solved by MAC protocols. Mainly MAC protocol is responsible for energy efficiency and low access
delay.
Physical layer: This layer is responsible for modulation, frequency selection signal detection and coding. It
provides an interfacing to transmit a stream of bits over a physical medium. These are all lower level operations.
The three cross layers i.e. mobility management is used to detect the movement of sensor nodes. Task
management plane is used schedule the given area sensing task and also determine that which node is kept on
and off. And power management plane manages the power level of sensors nodes.
Fig. 2: OSI layer structure [1], [14], [5]
III. DESIGN ISSUES
In case of ireless sensor network, there are many factors which must be considered. Various design
issues of WSN are given below. [1], [16].
Comparison Of Routing Protocols In Wireless Sensor…
www.theijes.com The IJES Page 22
Fault tolerance: sometimes in network sensor nodes are failed or blocked or some physical damage due to this
failure there is no effect on the network. This fault tolerance is the ability of maintain the functionalities of the
network after node failure. For e.g. If the sensors are used to keep track the temperature and humidity levels of a
house’ tolerance may be low since this type of network does not effected or not easily damaged. Mainly
tolerance is depending upon the application of the network.
Hardware constraints: Sensor nodes usually scattered in sensor area where the sensor nodes are deployed.
Mainly sensor nodes produce information about physical environment of high quality. Every scattered sensor
node has the ability of routing and collecting the data from other sensor or from base station. Sensor nodes have
limited power and memory. Sensor node consist of four basic components
Power unit
Sensing unit
Processing unit
Transmission unit
Fig.3: Architecture of sensor node. [14]
Power unit is supported by a power such as a solar cell which is followed by power generator sensor nodes
consumes the power for performing various operations like sensing a many more. Power is mainly stored in
capacitors and batteries both in rechargeable and non-rechargeable. Supply is mainly needed to support the
operation of a network from few minutes to few hours depending upon the application. Sensing unit- It consist of
two parts: sensor and analog to digital converter. Sensor produces the analog signals based on observed
phenomenon and then converted to digital signals by analog to digital converter. Analog to digital converter is
the device that converts input analog voltage to digital voltage. The output of sensing unit is provided to
processing unit. Processing unit- the output of sensing unit is the input of processing unit i.e. digital input. This
unit consists of small storage and a processor. They are used to handle data manipulation, encryption, digital
modulation and many more. Computational requirement mainly ranges from 8- bit microcontroller to 64-bit
microprocessor. Transmission unit- its main function is to connects the nodes within the network. It is mainly
consist of transceiver. Location finding system and mobilizer- it is mainly used to find out the location and the
accuracy of the network the can also move the sensor when the task is given to the network.
3.3 Production cost-sensor network consist of large number of sensors and the cost of each sensor node is
required to justify the overall cost of networks. We have to keep the cost of each sensor node to be low. To
make the network feasible we have to kept cost less than 1$.
3.4 Transmission media- in multi-hopping sensor network, the communication is done by wireless links and
these links are infrared radio media. For global accessing we have to choose the medium that must be available
worldwide. Infrared communication is very cheaper, license free and easy to build. Two types of transmission
schemes should be there i.e. active transmission and passive transmission. Single channel RF trans receiver
operating at 915 MHz must be used in low sensor devices. A line of sight is required between sender and
receiver in both infrared and optical media. Communication satellite is also a type of transmission media.
Comparison Of Routing Protocols In Wireless Sensor…
www.theijes.com The IJES Page 23
Transmission that can be done from satellite to earth is called downlink and vice –versa is called uplink. They
ate used in application like navigation, radio broadcasting etc. A microwave is also a type of transmission media
it varies from 3oo MHz to 300 GHz. They are the radio waves which provide a high speed transmission signal.
Quality of services (QoS) - it defines the measure of performances in the network including the throughput and
all end to end delay. When sensor sensed the network then it should be delivered within the certain period of
time otherwise it can’t be used. QOS means the quality services which are required in any application. Selection
of Routing protocol will affect this factor.
Node deployment- It mainly affects the routing protocols performance they are mainly of two kinds self-
organizing and deterministic. In deterministic, the sensors should be placed manually and data is being routed by
pre-determined path. And in self -organizing sensor nodes should be randomly scattered in ad-hoc manner.
Route will mainly consist of multi-hopping wireless network.
Data delivery models- its main aim is to determine that when the data is delivered which is collected by the
nodes. The data can be continuous, event driven and query driven. In continuous data model each sensor sends
data in a periodic manner.in event driven model, when event occurs transmission data is triggering. In query
driven, when sink generated a query then data is triggered. Some networks apply a hybrid model also.
IV. ROUTING PROTOCOLS
There are various type of protocols used in wireless sensor network major protocols proposed for
sensor network are divided into various categories. [9], [2].
Location based protocols, Data-centric based protocol, Hierarchical protocols, Mobility-based protocols,
Multipath based protocols, Heterogeneity based protocols, and QoS based protocols
4.1 Location based protocols: It is a type of protocol which depends upon the location. Means of their location
are addressed by sensor nodes. Distance between the two particular nodes can be calculated, for this purpose the
location information is required so that estimation of energy consumption is required for sensor nodes.
4.1.1 Geographic adaptive fidelity (GAF) - It is used in wireless sensor network but mainly proposed for
MANET and based on the mechanism in which it turns off the sensors which are not in use or unnecessary
sensor. GPS provide the information of location to every sensor. It mainly detects the incoming packet presence
in sensor nodes. Due to reception and transmission of packets it considers energy consumption and its main aim
is to maximize the network lifetime. Sensor fields are mainly divided into grid squares so that entire area is
divided into some part each sensor uses the location. With the location information, this routing provides a better
way to route the protocols. Geographical locations provide a way to seekers of information. Each node knows
about direct neighbor locations within its radio region and also source knows the destination location. Packet
delivering could be a single node or multiple nodes. Multiple delivering leads to multiple paths to the
destination. It wastes a lot of energy and bandwidth. It also creates robustness. [4]
Fig. 4: State transition diagram of GAF. [4]
Comparison Of Routing Protocols In Wireless Sensor…
www.theijes.com The IJES Page 24
In this we have three stages i.e. Active, Sleeping and Discovery. In discovery state discovery message is
exchange by sensor to know about the sensor in the same grid. It also determines the neighbor in the grid. If
there is one or more than one node in the discovery state then a state becomes master which has longest expected
lifetime. In sleeping state, when sensor enter in the sleeping state, radio is turned off for saving the energy, to
keep the routing fidelity, the sleeping time is adjusted by sleeping neighbor’s sleeping nodes has to wake up
earlier to take the master node In active state, sleeping mode is wake up before the expiring of the leaving time
of the active nodes. Discovery is periodically broadcast by a sensor to inform about its state.
4.1.2 Geographic and energy aware routing (GEAR): It is an energy- efficient protocol which is proposed for
routing queries in a sensor field to target the region. Based on the principle of demand driven data delivered
model, it faces a problem of limited scalability which is as one of the disadvantage. It can conserve more energy.
It has two phases:
 Packets are forwarded towards the target regions.
 Within the target regions, packets are disseminated to the nodes.
4.1.3 SPAN- In this sensor location information is not required and runs with a geographic forward protocol. It
is mainly for multi hop ad-hoc network.it is distributed where nodes decided where to join or sleep a forwarding
backbone behaves like a co-coordinator. This protocol operates under the routing layer and above the mac and
physical layer .it is proactive type in which each node broadcast periodically.it preserves capacity, decreases
latency and energy saving protocol. Its energy consumption is not constant.
4.1.4 Minimum energy communication network (MECN) - It is a type of minimum energy network and a
self-reconfiguring protocol. When applied to static network it suffers a problem of battery depletion. For
transmitting or forwarding sensed data to the sink it uses same type of neighbor and due to this, neighbor would
die very quickly thus network disconnected.
4.1.5 Small-minimum energy communication network (SMECN) - It is mainly produced to improve MECN
which uses energy efficient property.in this property any sensor associate with network, minimum energy path
between them i.e. path having smallest cost in terms of energy consumption. Immediate neighbors are computed
analytically of the sensor.
4.2 Data-centric protocols-It is a type of energy saving protocol because it requires less transmission to send
the originating data. When data is send from source to sink, immediately sensor can perform some form of
aggregation on the data which is originating from multiple sensors and then send this aggregated data.
4.2.1 Directed diffusion (DD) - It mainly meets the requirement of WSN like salability, robustness, and energy
efficiency. It is a type of data centric protocol for query dissemination and processing. In the beginning of the
process for incoming events, sink specifies a low data rate. Communication is only for named data. It contains a
flooding which is energy consuming. Data in a sensor network is a type of physical phenomenon in which data is
collected and information is processed. It consists of several elements i.e. gradient, data messages, interest and
reinforcement. In gradient, state is created in each node that receives an interest. In data messages, data in a
sensor network is the process of collecting or processing information of physical phenomenon. Name of data is
given by using attribute value pairs. Interest is a type of query it specifies what user want description of sensing
task is contains in interest which is supported by a sensor network. In Reinforce, events flows toward originates
of interest sensor network reinforces one or small number of path and provides a node failures which leads to
path failures. [13]
4.2.2 Rumor routing(RR)- It is based on the concept of agent (long-lived packet) that transmits a network and
informs each sensor it encounters about the events.it takes the shortest path to the event occur in the network.
Agent is including by each sensor. Agent encounters a path of the sensor and synchronized. Agent will travel the
network for a certain number of hops and then die.
4.2.3 Cougar- In cougar, user doesn’t know about which sensor is contacted and how sensed data processed.
This problem is solved by cougar. Every sensor is associated with a Query proxy (higher level services) it
approaches uses a query layer. If a data which is sensed could be fussed into single then it is significant to the
sensor.
Comparison Of Routing Protocols In Wireless Sensor…
www.theijes.com The IJES Page 25
4.2.4 Acquire query forwarding in sensor network (ACQUIRE) – It consist of several sub-queries and used
for querying named data. An active query in a network is indicated by a sensor that follows either a random or
specified trajectory. In this neighboring nodes detect the information of packet and then give message to node.
Node selects a neighbor to propagate the query then query resolved into smaller component until solved then
query is returned back as the process is completed. It allows in the network to inject a complex query.
4.2.5 Energy aware data-centric routing (EAD) – It is associated with a probability of use of each route. This
probability is related to the route of the residual energy of the node. It is a routing protocol responsible for in-
network data processing which builds a virtual backbone composed of active sensor. Each sensor is acting as a
data source or event source and gateway plays a data sink or event sink role.
4.3 Hierarchical protocols- It uses a concept of clustering. Clustering is a communication protocol that is used
by a sensor to inform about the sensed data to the sink. It reduces energy consumption by dividing all nodes
into clusters. Each cluster consists of cluster head. Whole network is divided into clustered layers. Data is
always transferred from low level to high level. It does hopping from one node to another but it covers a
large distance if hops from one layer to another. Different routing differs that how we selects a cluster head
and how node behaves in this cluster domain.
4.3.1 Low energy adaptive clustering hierarchy (leach) –it reduces energy consumption. Each cluster head
(ch) is used by direct communication for forwarding the data to the base station. It is based on aggregation
technique this aggregation technique combines the data in smaller sizes of data in which information is carried
for all individual sensor. It doesn’t require any global information. it reduces the energy consumption.
Communication constant between sensors and their cluster heads is minimized. Network is divided into several
clusters to reduce the amount of data which is transmitted to the sink. [6], [16],[13].
4.3.2 Power efficient gathering in sensor information (PEGASIS) – It is the extension of leach It mainly
avoids cluster formation. In the network, sensors required global information. Chain is formed from the sensor
node. In sensor node, each node transmits and receives from the neighbor and then it selects one node from that
chain to transmit to the base station. Topology used in PEGASIS is dynamic. Network lifetime is also increases
and is twice to that of leach protocol.
4.3.3 Hybrid, energy-efficient distributed clustering (HEED) – it uses multi-hop network. It is also a
clustering protocol. Using residual it uses primary and secondary parameters. In primary, residual energy act as a
parameter and in secondary, node degree and node proximity acts as a secondary parameter .Lifetime of the
sensor network is limited so more nodes is needed to re-energize the sensor network. Locations of the nodes are
unaware. There is similar processing and communication capabilities in the nodes. Heed clustering is done in
phases i.e. initialize and finalize in initialize phase the sensor selects the CH and finalize phase in which least
common cost is join by each sensor. .it also divides into iterations in which not yet received message from CH,
elected to be the probability of CHprop.
4.4 Mobility based protocols- it requires energy efficient protocol for data delivery originated from source
sensor toward sink.
4.4.1 Joint mobility and routing protocol – This protocol suffers from a problem of energy sink-hide
problems. Sensors which are heavily loaded close to the sink, which deplete their battery power more quickly
which is disconnecting the network. Sensors are surrounding to the sink, all the sensors in the network to give the
chance to act as data relays thus balance the load.
4.4.2 Data mules based protocol - It is based on three-tier architecture on mobile entities called (MULE) i.e.
mobile ubiquitous LAN extensions. It contains layer top layer consist of connected devices of wan for analyzing
sensed data. Middle layer has a mobile entity that moves in the sensor field and sensed data is collected from the
source. Sensor directly communicates through short range paths. Its architecture has low cost infrastructures.
4.4.3 Scalable energy –efficient asynchronous dissemination (SEAD) - It is self-organizing protocol or
minimizing delay to a mobile sink. Sensors should know about the geographic locations.
4.5 Multipath-based protocol- In this transmission of data between source sensor and the sink. Two types of
routing are done in this protocol i.e. single path routing and multipath routing. In single path each source sensor
Comparison Of Routing Protocols In Wireless Sensor…
www.theijes.com The IJES Page 26
sends data to the sink via shortest path. In multipath routing, each sensor finds first k shortest path to the sink. Its
main aim is to balance the traffic load in any network.
4.5.1 Disjoint path- it finds small number of paths primary preference is given to the best available path if
failures occurs it remains local and doesn’t affect other path.
4.5.2 Braided path- it is partially disjoint path for this path information first computation of primary path is
done then decides the best path from source to the sensor. It is constructed in localized manner.
4.6 Heterogeneity based protocol - In heterogeneity, two types of sensors are used and having no energy
constraints sensors are having limited lifetime. They use the available energy by minimizing these data
communication potential.
4.6.1 Cluster-head relay routing (CHR) – It is a type of sensors which form a heterogeneous network with
single sink. Two types of sensors are used i.e. L-sensors and H-sensors commonly known as low-end sensors and
high-end sensors. Sensors are aware from the location. It includes a group of sensors that also comprises of L-
sensor and H-sensor. L-sensor is responsible for sensing the forwarded packets and h-sensor is responsible for
data fusion within the cluster.
4.6.2 Information-driven sensor query (IDSQ) – It is responsible for maximizing the gain. Problem of
heterogeneity in WSN is addressed by this protocol. From the whole cluster of sensor a leader sensor is selected,
this is the first step of protocol. The sub-set of sensor node needed to be active for conserving the power.
4.7 QOS- based protocol- this protocol aims a kind of quality of service (QOS). QOS is defined as the measure
of performance in the network which includes end-to –end delay and throughput. Main aim of this protocol is to
find the suitable path between the sender and destination.
4.7.1 Sequential assignment routing (SAR) - it is one of the example of multipath routing. In this multiple
trees are created and each is routed at neighbor of sink, for establishing multiple numbers of paths from each
node to the sink. It minimizes the average weighted it is mainly used in a network which consist of large sensors.
Routing decisions is mainly depending upon factors like energy resources, QOS on each path and the priority
level of ach packet.
4.7.2 SPEED- It provides the services to the real-time communication. It requires the geographic location for
routing. It uses a re-routing scheme to re-route the packets with minimum control overhead. It contains only
immediate neighbor information. It also provides back-pressure to the upper stream. It has three types of real-
time communication i.e. real time unicast, multicast and area-any cast. By studying all routing techniques,
comparison between these protocols is given below- [15].
Table1: Comparison of routing protocol
Name Type of
protocol
Energy Redundant
data
scalability Power
usage
Reliability Packet delivery
GEAR Location based energy efficient Limited Limited Limited good Geo-cast based
SPAN Location based Reduced energy
consumption
Limited Limited Limited Good Proactive type
SMECN Location based Energy efficient
and
consumption
Low Low Limited Good Minimum energy
property based
GAF Location based High Limited Good Limited Good Virtual grid
based
SPIN Data-centric Low energy
consumption
Limited Limited Limited Poor Meta-data based
DD Data-centric Low energy
efficient than
SPIN
Limited Limited Limited High Small interval
basis
RR Data-centric Lower than DD Low Limited Low High Long-lived
packet
COUGAR Data-centric Lower but
higher than DD
Low Limited Limited High Query-proxy
based
ACQUIRE Data-centric Low Low Limited Low High Query- based
Comparison Of Routing Protocols In Wireless Sensor…
www.theijes.com The IJES Page 27
LEACH Hierarchical High energy
consumption
High Good High High Cluster-head
based
PEGASIS Hierarchical Max.energy
consumption
High Good Maximum High Chain- based
SAR QOS based Less high Limited High limited Multipath based
SPEED QOS based Energy efficient low limited Low Low Re-routing based
V. CONCLUSION
In wireless sensor network, routing becomes the main attention in the recent years and has lot of
advantages than the wired networks. This paper is a review which conducts a survey on routing protocols of
wireless sensor network then having comparison of all the routing protocols. The main objective behind the
protocol is to keep the sensor operating as long as possible.
REFERENCES
[1] I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam , E. Cayirci, Wireless sensor networks: a survey, I.F. Akyildiz et al.38 (2002) 393–42.
[2] Luis Javier GarcĂ­a Villalba *, Ana Lucila Sandoval Orozco, Alicia TriviĂąo Cabrera and ClĂĄudia Jacy Barenco Abbas, Routing
Protocols in Wireless Sensor Networks, 2009, 9, 8399-8421.
[3] Jason lester hill, System architecture for wireless sensor networks, University of California, Berkeley, 2003.
[4] Sinchan Roychowdhury, Chiranjib Patra, Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing,
IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010].
[5] Ahmad Abed Alhameed Alkhatib, Gurvinder Singh Baicher, Wireless Sensor Network Architecture, 2012 International Conference
on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) Š (2012) IACSIT Press, Singapore.
[6] Geetu, Sonia Juneja, Performance Analysis of SPIN and LEACH Routing Protocol in WSN, International Journal Of Computational
Engineering Research (ijceronline.com) Vol. 2 Issue. 5.
[7] B.Chen et al.,SPAN: an Energy-efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks, Wireless
Networks, vol. 8, no. 5, pp. 481–94,(Sept. 2002).
[8] S. Lindsey and C. S. Raghavendra , PEGASIS: Power Efficient Gathering in Sensor Information Systems, in the Proceedings of the
IEEE Aerospace Conference, Big Sky, Montana ( March 2002).
[9] Shio Kumar Singh, M P Singh , and D K Singh, Routing Protocols in Wireless Sensor Networks –A Survey, International Journal of
Computer Science & Engineering Survey (IJCSES) Vol.1, No.2, November 2010.
[10] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, Wireless sensor network survey, Computer Networks 52 (2008) 2292–2330.
[11] Mr. Puneet Garg, Mr. Kuntal Saroha, Mrs. Ruchika Lochab, Review of Wireless Sensor Networks- Architecture and Applications,
IJCSMS International Journal of Computer Science & Management Studies, Vol. 11, Issue 01, May 2011 ISSN (Online): 2231 –
5268.
[12] Ms. Surbhi Jain, Ms. Parul Tyagi, Comparative Study of Routing Protocols in Wireless Sensor Network, International Journal of
Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 9, September 2012.
[13] Vandana Jindal, A.K.Verma, Seema Bawa, How the two Adhoc networks can be different:MANET & WSNs, International Journal
of Computer Sci ence & Technology, ISSN : 0976-8491 (Online), Vol. 2, Iss ue 4, Oct . - Dec. 2011.
[14] Ankita, A Survey on Wireless Sensor Network based Approaches, International Journal of Advanced Research in Computer Science
and Software Engineering, ISSN: 2277 128X, Volume 4, Issue 4, April 2014.
[15] Chintan Choksi & Bijon Desai, comparison of routing protocols in wireless sensor networks, International Conference on Computer
Science and Information Technology, ISBN: 978-93-82208-29-7.
[16] Rajesh Chaudhary ,Dr. Sonia Vatta, A Tutorial of routing protocols in wireless sensor networks, International Journal of Computer
Science and Mobile Computing, Vol.3 Issue.6, June- 2014.
BIOGRAPHIES
Sakshi Anand (Guide) is currently working as the Assistant Professor in the department of Electronics and
Communication Engineering at Shoolini University, Solan, Himachal Pradesh (India). She holds the degree of
both B.tech and M.tech. Her area of interest includes wireless networks, securing, MANET, ad-hoc networks
and sensor networks.
Sujata Chandel (Student) received the degree of B.tech in Electronics and Communication Engineering. She is
pursuing M.tech in ECE from Shoolini University Solan. Her area of interest includes wireless networks and ad-
hoc networks.

More Related Content

What's hot

Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
RajShah860705
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
Zaahir Salam
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
vtunotesbysree
 
9345.pdf
9345.pdf9345.pdf
9345.pdf
RajShah860705
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
DeepaDasarathan
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
Muhammad Kaife Uddin
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
eSAT Publishing House
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor Network
Yogesh Vk
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
PeriyanayagiS
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
IJERA Editor
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
Eswar Publications
 
J010216776
J010216776J010216776
J010216776
IOSR Journals
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
ejbyun77
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksAbbas Ali Qureshi
 
Sem
SemSem
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Eswar Publications
 

What's hot (20)

Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
9345.pdf
9345.pdf9345.pdf
9345.pdf
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor Network
 
40120140503011
4012014050301140120140503011
40120140503011
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
 
J010216776
J010216776J010216776
J010216776
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Sem
SemSem
Sem
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
 

Viewers also liked

On Integrablity Of F-Structure Satisfying F 2K+1 +F=0
On Integrablity Of F-Structure Satisfying F 2K+1 +F=0On Integrablity Of F-Structure Satisfying F 2K+1 +F=0
On Integrablity Of F-Structure Satisfying F 2K+1 +F=0
theijes
 
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...
theijes
 
Different Solutions to a Mathematical Problem: A Case Study of Calculus 12
Different Solutions to a Mathematical Problem: A Case Study of Calculus 12Different Solutions to a Mathematical Problem: A Case Study of Calculus 12
Different Solutions to a Mathematical Problem: A Case Study of Calculus 12
theijes
 
Comparable Analysis of Web Mining Categories
Comparable Analysis of Web Mining CategoriesComparable Analysis of Web Mining Categories
Comparable Analysis of Web Mining Categories
theijes
 
Application of Very Low Frequency- Electromagnetic (VLF-EM) Method to Map Fra...
Application of Very Low Frequency- Electromagnetic (VLF-EM) Method to Map Fra...Application of Very Low Frequency- Electromagnetic (VLF-EM) Method to Map Fra...
Application of Very Low Frequency- Electromagnetic (VLF-EM) Method to Map Fra...
theijes
 
Generation of Electricity through Speed Breaker Mechanism
Generation of Electricity through Speed Breaker MechanismGeneration of Electricity through Speed Breaker Mechanism
Generation of Electricity through Speed Breaker Mechanism
theijes
 
Wind-induced Stress Analysis of Front Bumper
Wind-induced Stress Analysis of Front BumperWind-induced Stress Analysis of Front Bumper
Wind-induced Stress Analysis of Front Bumper
theijes
 
Interleaved High Step-Down Synchronous Converter
Interleaved High Step-Down Synchronous ConverterInterleaved High Step-Down Synchronous Converter
Interleaved High Step-Down Synchronous Converter
theijes
 
Research on Terminal Distribution Mode of Express System in University Town
Research on Terminal Distribution Mode of Express System in University TownResearch on Terminal Distribution Mode of Express System in University Town
Research on Terminal Distribution Mode of Express System in University Town
theijes
 
Prevalence of Malaria Infection and Malaria Anaemia among Children Attending ...
Prevalence of Malaria Infection and Malaria Anaemia among Children Attending ...Prevalence of Malaria Infection and Malaria Anaemia among Children Attending ...
Prevalence of Malaria Infection and Malaria Anaemia among Children Attending ...
theijes
 
Effect of Utilizing Geometer’s Sketchpad Software on Students’ Academic Achie...
Effect of Utilizing Geometer’s Sketchpad Software on Students’ Academic Achie...Effect of Utilizing Geometer’s Sketchpad Software on Students’ Academic Achie...
Effect of Utilizing Geometer’s Sketchpad Software on Students’ Academic Achie...
theijes
 
Stratigraphy and Lithology of Naokelekan Formation in Iraqi Kurdistan-Review
Stratigraphy and Lithology of Naokelekan Formation in Iraqi Kurdistan-ReviewStratigraphy and Lithology of Naokelekan Formation in Iraqi Kurdistan-Review
Stratigraphy and Lithology of Naokelekan Formation in Iraqi Kurdistan-Review
theijes
 
Effect of Malting and Fermentation on the Proximate Composition and Sensory P...
Effect of Malting and Fermentation on the Proximate Composition and Sensory P...Effect of Malting and Fermentation on the Proximate Composition and Sensory P...
Effect of Malting and Fermentation on the Proximate Composition and Sensory P...
theijes
 
The Effect of Profitability on Firm Value in Manufacturing Company at Indones...
The Effect of Profitability on Firm Value in Manufacturing Company at Indones...The Effect of Profitability on Firm Value in Manufacturing Company at Indones...
The Effect of Profitability on Firm Value in Manufacturing Company at Indones...
theijes
 
Design of Multi Link Structure for Rear Suspenion of a Heavy Vehicle
Design of Multi Link Structure for Rear Suspenion of a Heavy VehicleDesign of Multi Link Structure for Rear Suspenion of a Heavy Vehicle
Design of Multi Link Structure for Rear Suspenion of a Heavy Vehicle
theijes
 
Simulation of Deep-Drawing Process of Large Panels
Simulation of Deep-Drawing Process of Large PanelsSimulation of Deep-Drawing Process of Large Panels
Simulation of Deep-Drawing Process of Large Panels
theijes
 
Comparative Investigation Ofinter-Satellite Optical Wireless Communication By...
Comparative Investigation Ofinter-Satellite Optical Wireless Communication By...Comparative Investigation Ofinter-Satellite Optical Wireless Communication By...
Comparative Investigation Ofinter-Satellite Optical Wireless Communication By...
theijes
 
Failure Analysis of Feedstock Preheater Unit of the Kaduna Refinery using Fai...
Failure Analysis of Feedstock Preheater Unit of the Kaduna Refinery using Fai...Failure Analysis of Feedstock Preheater Unit of the Kaduna Refinery using Fai...
Failure Analysis of Feedstock Preheater Unit of the Kaduna Refinery using Fai...
theijes
 

Viewers also liked (18)

On Integrablity Of F-Structure Satisfying F 2K+1 +F=0
On Integrablity Of F-Structure Satisfying F 2K+1 +F=0On Integrablity Of F-Structure Satisfying F 2K+1 +F=0
On Integrablity Of F-Structure Satisfying F 2K+1 +F=0
 
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...
 
Different Solutions to a Mathematical Problem: A Case Study of Calculus 12
Different Solutions to a Mathematical Problem: A Case Study of Calculus 12Different Solutions to a Mathematical Problem: A Case Study of Calculus 12
Different Solutions to a Mathematical Problem: A Case Study of Calculus 12
 
Comparable Analysis of Web Mining Categories
Comparable Analysis of Web Mining CategoriesComparable Analysis of Web Mining Categories
Comparable Analysis of Web Mining Categories
 
Application of Very Low Frequency- Electromagnetic (VLF-EM) Method to Map Fra...
Application of Very Low Frequency- Electromagnetic (VLF-EM) Method to Map Fra...Application of Very Low Frequency- Electromagnetic (VLF-EM) Method to Map Fra...
Application of Very Low Frequency- Electromagnetic (VLF-EM) Method to Map Fra...
 
Generation of Electricity through Speed Breaker Mechanism
Generation of Electricity through Speed Breaker MechanismGeneration of Electricity through Speed Breaker Mechanism
Generation of Electricity through Speed Breaker Mechanism
 
Wind-induced Stress Analysis of Front Bumper
Wind-induced Stress Analysis of Front BumperWind-induced Stress Analysis of Front Bumper
Wind-induced Stress Analysis of Front Bumper
 
Interleaved High Step-Down Synchronous Converter
Interleaved High Step-Down Synchronous ConverterInterleaved High Step-Down Synchronous Converter
Interleaved High Step-Down Synchronous Converter
 
Research on Terminal Distribution Mode of Express System in University Town
Research on Terminal Distribution Mode of Express System in University TownResearch on Terminal Distribution Mode of Express System in University Town
Research on Terminal Distribution Mode of Express System in University Town
 
Prevalence of Malaria Infection and Malaria Anaemia among Children Attending ...
Prevalence of Malaria Infection and Malaria Anaemia among Children Attending ...Prevalence of Malaria Infection and Malaria Anaemia among Children Attending ...
Prevalence of Malaria Infection and Malaria Anaemia among Children Attending ...
 
Effect of Utilizing Geometer’s Sketchpad Software on Students’ Academic Achie...
Effect of Utilizing Geometer’s Sketchpad Software on Students’ Academic Achie...Effect of Utilizing Geometer’s Sketchpad Software on Students’ Academic Achie...
Effect of Utilizing Geometer’s Sketchpad Software on Students’ Academic Achie...
 
Stratigraphy and Lithology of Naokelekan Formation in Iraqi Kurdistan-Review
Stratigraphy and Lithology of Naokelekan Formation in Iraqi Kurdistan-ReviewStratigraphy and Lithology of Naokelekan Formation in Iraqi Kurdistan-Review
Stratigraphy and Lithology of Naokelekan Formation in Iraqi Kurdistan-Review
 
Effect of Malting and Fermentation on the Proximate Composition and Sensory P...
Effect of Malting and Fermentation on the Proximate Composition and Sensory P...Effect of Malting and Fermentation on the Proximate Composition and Sensory P...
Effect of Malting and Fermentation on the Proximate Composition and Sensory P...
 
The Effect of Profitability on Firm Value in Manufacturing Company at Indones...
The Effect of Profitability on Firm Value in Manufacturing Company at Indones...The Effect of Profitability on Firm Value in Manufacturing Company at Indones...
The Effect of Profitability on Firm Value in Manufacturing Company at Indones...
 
Design of Multi Link Structure for Rear Suspenion of a Heavy Vehicle
Design of Multi Link Structure for Rear Suspenion of a Heavy VehicleDesign of Multi Link Structure for Rear Suspenion of a Heavy Vehicle
Design of Multi Link Structure for Rear Suspenion of a Heavy Vehicle
 
Simulation of Deep-Drawing Process of Large Panels
Simulation of Deep-Drawing Process of Large PanelsSimulation of Deep-Drawing Process of Large Panels
Simulation of Deep-Drawing Process of Large Panels
 
Comparative Investigation Ofinter-Satellite Optical Wireless Communication By...
Comparative Investigation Ofinter-Satellite Optical Wireless Communication By...Comparative Investigation Ofinter-Satellite Optical Wireless Communication By...
Comparative Investigation Ofinter-Satellite Optical Wireless Communication By...
 
Failure Analysis of Feedstock Preheater Unit of the Kaduna Refinery using Fai...
Failure Analysis of Feedstock Preheater Unit of the Kaduna Refinery using Fai...Failure Analysis of Feedstock Preheater Unit of the Kaduna Refinery using Fai...
Failure Analysis of Feedstock Preheater Unit of the Kaduna Refinery using Fai...
 

Similar to Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey

Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paperPiyush Jalan
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
IRJET Journal
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
eSAT Publishing House
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal
 
F0361026033
F0361026033F0361026033
F0361026033ijceronline
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
IOSR Journals
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Publishing House
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Journals
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
IOSR Journals
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
 
IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED-V1I2P12
IJSRED-V1I2P12
IJSRED
 
L010527175
L010527175L010527175
L010527175
IOSR Journals
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
IJEEE
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Editor IJARCET
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
nanocdac
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
IJERA Editor
 
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformImplementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
IRJET Journal
 

Similar to Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey (20)

Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paper
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
F0361026033
F0361026033F0361026033
F0361026033
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED-V1I2P12
IJSRED-V1I2P12
 
L010527175
L010527175L010527175
L010527175
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformImplementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 3 || Issue || 12 || December - 2014 || Pages || 20-27|| ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 20 Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey Sakshi Anand, Sujata Chandel 1 Department of Electronics& Communication, Shoolini University, Solan 2 Department of Electronics& Communication, Shoolini University, Solan ------------------------------------------------------ABSTRACT--------------------------------------------------- Recent advancement in wireless communication has led to the development of low cost, small devices that possess sensing, signal processing and capabilities of wireless communication. WSN consist of two terms i.e. wireless network and sensors. A wireless network is any type of computer network that uses wireless data connections for connecting network nodes and Sensing is a process of gathering information about a physical object, including the occurrence of events (i.e., changes in state such as a drop in temperature or pressure). An object performing such a sensing task is called a sensor. A WSN consist of a large number of sensor nodes having wireless links for communicating. It is a kind of ad-hoc network. Its main aim is to monitor the physical conditions like pressure, temperature. Advancement in technology is mainly due to the decrease in the size of sensors. KEYWORDS: GAF, Protocols, SMECN, SPIN, Wireless sensor network, -------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 23 December 2014 Date of Accepted: 05 January 2015 --------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION A WSN mainly consist of densely distributed nodes in a network. The most important part in wireless sensor network is sensors, popular because of low power, low cost, small size. There are main characteristics of wireless sensor networks - It has mobility of nodes. It is very easy to use. 3. It contains heterogeneity network for nodes. 4. It contains power energy constraints. 5. It has ability to cope up in environmental harsh conditions. Sensor ranges varies from nanoscopic to mesoscopic scale devices. Nanoscopic contains the devices varies from 1 to 100nm in diameter and mesoscopic varies from 100 to 10000nm in diameter. Sensors are mainly self- powered or may be passive. Sensors are mainly of two types –Active sensors- RADAR & SONAR .Passive sensors- video sensor, infrared sensor, seismic sensor, acoustic sensor etc. In WSN, the energy availability is constrained in small sensors and unconstrained in large sensors. WSN can also use large no of wireless technologies such as WLAN, PAN, Bluetooth, wi-max and 3G. [2] In this paper, a brief description of all the routing protocols is given and then we do the comparison of all the routing protocols. II. ARCHITECTURE Architecture of WSN mainly follows OSI model. It consists of hardware and software (Tiny OS). It is a component based. Major components of wireless sensor network are: Sensor field- This Field consists of large number of sensor nodes and sensor nodes are deployed. [3] Fig. 1: Architecture of WSN. [5] Sensor nodes-They are the sensors which are responsible for gathering information and routing information back to the sink.
  • 2. Comparison Of Routing Protocols In Wireless Sensor… www.theijes.com The IJES Page 21 Base station- it is a centralized point to control the network which is mainly used to extract the information from the network and again passes information back to the network. It is also known as task manager. Communication is done by satellite or internet communication. Sink: it is also a type of sensor node which performs operations like receiving, storing data and processing from the other sensor node. This node reduces the energy requirement. LAYERS : WSN network architecture mainly consists of large number of layers, five layers and three cross layer plans are also added. It has application layer, transport layer, data link layer, network layer, physical layer and three cross layers are power management plane, mobility management plane and task management plane each layer has its own function. These cross layers increases the efficiency of the network by making the sensors work together these layers also used to manage the network. WSN OSI layers are [5] Application layer : This layer provides software which translates a data to an understandable form or sends any type of queries for different applications to get certain information. This layer is known as user interface which is responsible for displaying the user information. Transport layer : This layer is mainly used for the purpose to access other networks when system is organized to do so. It provides reliability & is more energy efficient. It is also responsible for catching and storage. Transport protocols are divided into two parts: [10] Packet driven: where all the packets sent from the source must reach to the destination. Event driven: The event is detected, and it is enough that one message reaches the sink. Network layer: This layer is responsible for routing and faces a lot of challenges and the main challenges are power saving, not self-organized and doesn’t have global id they also have limited memory and buffer. Various protocols are used in this layer they are hierarchal routing and flat routing. Data link layer: It is responsible for data frame detection, MAC and error control, multiplexing data streams. It contains an error and unreliability. The unreliability comes from co channel interference at mac layer and this problem is solved by MAC protocols. Mainly MAC protocol is responsible for energy efficiency and low access delay. Physical layer: This layer is responsible for modulation, frequency selection signal detection and coding. It provides an interfacing to transmit a stream of bits over a physical medium. These are all lower level operations. The three cross layers i.e. mobility management is used to detect the movement of sensor nodes. Task management plane is used schedule the given area sensing task and also determine that which node is kept on and off. And power management plane manages the power level of sensors nodes. Fig. 2: OSI layer structure [1], [14], [5] III. DESIGN ISSUES In case of ireless sensor network, there are many factors which must be considered. Various design issues of WSN are given below. [1], [16].
  • 3. Comparison Of Routing Protocols In Wireless Sensor… www.theijes.com The IJES Page 22 Fault tolerance: sometimes in network sensor nodes are failed or blocked or some physical damage due to this failure there is no effect on the network. This fault tolerance is the ability of maintain the functionalities of the network after node failure. For e.g. If the sensors are used to keep track the temperature and humidity levels of a house’ tolerance may be low since this type of network does not effected or not easily damaged. Mainly tolerance is depending upon the application of the network. Hardware constraints: Sensor nodes usually scattered in sensor area where the sensor nodes are deployed. Mainly sensor nodes produce information about physical environment of high quality. Every scattered sensor node has the ability of routing and collecting the data from other sensor or from base station. Sensor nodes have limited power and memory. Sensor node consist of four basic components Power unit Sensing unit Processing unit Transmission unit Fig.3: Architecture of sensor node. [14] Power unit is supported by a power such as a solar cell which is followed by power generator sensor nodes consumes the power for performing various operations like sensing a many more. Power is mainly stored in capacitors and batteries both in rechargeable and non-rechargeable. Supply is mainly needed to support the operation of a network from few minutes to few hours depending upon the application. Sensing unit- It consist of two parts: sensor and analog to digital converter. Sensor produces the analog signals based on observed phenomenon and then converted to digital signals by analog to digital converter. Analog to digital converter is the device that converts input analog voltage to digital voltage. The output of sensing unit is provided to processing unit. Processing unit- the output of sensing unit is the input of processing unit i.e. digital input. This unit consists of small storage and a processor. They are used to handle data manipulation, encryption, digital modulation and many more. Computational requirement mainly ranges from 8- bit microcontroller to 64-bit microprocessor. Transmission unit- its main function is to connects the nodes within the network. It is mainly consist of transceiver. Location finding system and mobilizer- it is mainly used to find out the location and the accuracy of the network the can also move the sensor when the task is given to the network. 3.3 Production cost-sensor network consist of large number of sensors and the cost of each sensor node is required to justify the overall cost of networks. We have to keep the cost of each sensor node to be low. To make the network feasible we have to kept cost less than 1$. 3.4 Transmission media- in multi-hopping sensor network, the communication is done by wireless links and these links are infrared radio media. For global accessing we have to choose the medium that must be available worldwide. Infrared communication is very cheaper, license free and easy to build. Two types of transmission schemes should be there i.e. active transmission and passive transmission. Single channel RF trans receiver operating at 915 MHz must be used in low sensor devices. A line of sight is required between sender and receiver in both infrared and optical media. Communication satellite is also a type of transmission media.
  • 4. Comparison Of Routing Protocols In Wireless Sensor… www.theijes.com The IJES Page 23 Transmission that can be done from satellite to earth is called downlink and vice –versa is called uplink. They ate used in application like navigation, radio broadcasting etc. A microwave is also a type of transmission media it varies from 3oo MHz to 300 GHz. They are the radio waves which provide a high speed transmission signal. Quality of services (QoS) - it defines the measure of performances in the network including the throughput and all end to end delay. When sensor sensed the network then it should be delivered within the certain period of time otherwise it can’t be used. QOS means the quality services which are required in any application. Selection of Routing protocol will affect this factor. Node deployment- It mainly affects the routing protocols performance they are mainly of two kinds self- organizing and deterministic. In deterministic, the sensors should be placed manually and data is being routed by pre-determined path. And in self -organizing sensor nodes should be randomly scattered in ad-hoc manner. Route will mainly consist of multi-hopping wireless network. Data delivery models- its main aim is to determine that when the data is delivered which is collected by the nodes. The data can be continuous, event driven and query driven. In continuous data model each sensor sends data in a periodic manner.in event driven model, when event occurs transmission data is triggering. In query driven, when sink generated a query then data is triggered. Some networks apply a hybrid model also. IV. ROUTING PROTOCOLS There are various type of protocols used in wireless sensor network major protocols proposed for sensor network are divided into various categories. [9], [2]. Location based protocols, Data-centric based protocol, Hierarchical protocols, Mobility-based protocols, Multipath based protocols, Heterogeneity based protocols, and QoS based protocols 4.1 Location based protocols: It is a type of protocol which depends upon the location. Means of their location are addressed by sensor nodes. Distance between the two particular nodes can be calculated, for this purpose the location information is required so that estimation of energy consumption is required for sensor nodes. 4.1.1 Geographic adaptive fidelity (GAF) - It is used in wireless sensor network but mainly proposed for MANET and based on the mechanism in which it turns off the sensors which are not in use or unnecessary sensor. GPS provide the information of location to every sensor. It mainly detects the incoming packet presence in sensor nodes. Due to reception and transmission of packets it considers energy consumption and its main aim is to maximize the network lifetime. Sensor fields are mainly divided into grid squares so that entire area is divided into some part each sensor uses the location. With the location information, this routing provides a better way to route the protocols. Geographical locations provide a way to seekers of information. Each node knows about direct neighbor locations within its radio region and also source knows the destination location. Packet delivering could be a single node or multiple nodes. Multiple delivering leads to multiple paths to the destination. It wastes a lot of energy and bandwidth. It also creates robustness. [4] Fig. 4: State transition diagram of GAF. [4]
  • 5. Comparison Of Routing Protocols In Wireless Sensor… www.theijes.com The IJES Page 24 In this we have three stages i.e. Active, Sleeping and Discovery. In discovery state discovery message is exchange by sensor to know about the sensor in the same grid. It also determines the neighbor in the grid. If there is one or more than one node in the discovery state then a state becomes master which has longest expected lifetime. In sleeping state, when sensor enter in the sleeping state, radio is turned off for saving the energy, to keep the routing fidelity, the sleeping time is adjusted by sleeping neighbor’s sleeping nodes has to wake up earlier to take the master node In active state, sleeping mode is wake up before the expiring of the leaving time of the active nodes. Discovery is periodically broadcast by a sensor to inform about its state. 4.1.2 Geographic and energy aware routing (GEAR): It is an energy- efficient protocol which is proposed for routing queries in a sensor field to target the region. Based on the principle of demand driven data delivered model, it faces a problem of limited scalability which is as one of the disadvantage. It can conserve more energy. It has two phases:  Packets are forwarded towards the target regions.  Within the target regions, packets are disseminated to the nodes. 4.1.3 SPAN- In this sensor location information is not required and runs with a geographic forward protocol. It is mainly for multi hop ad-hoc network.it is distributed where nodes decided where to join or sleep a forwarding backbone behaves like a co-coordinator. This protocol operates under the routing layer and above the mac and physical layer .it is proactive type in which each node broadcast periodically.it preserves capacity, decreases latency and energy saving protocol. Its energy consumption is not constant. 4.1.4 Minimum energy communication network (MECN) - It is a type of minimum energy network and a self-reconfiguring protocol. When applied to static network it suffers a problem of battery depletion. For transmitting or forwarding sensed data to the sink it uses same type of neighbor and due to this, neighbor would die very quickly thus network disconnected. 4.1.5 Small-minimum energy communication network (SMECN) - It is mainly produced to improve MECN which uses energy efficient property.in this property any sensor associate with network, minimum energy path between them i.e. path having smallest cost in terms of energy consumption. Immediate neighbors are computed analytically of the sensor. 4.2 Data-centric protocols-It is a type of energy saving protocol because it requires less transmission to send the originating data. When data is send from source to sink, immediately sensor can perform some form of aggregation on the data which is originating from multiple sensors and then send this aggregated data. 4.2.1 Directed diffusion (DD) - It mainly meets the requirement of WSN like salability, robustness, and energy efficiency. It is a type of data centric protocol for query dissemination and processing. In the beginning of the process for incoming events, sink specifies a low data rate. Communication is only for named data. It contains a flooding which is energy consuming. Data in a sensor network is a type of physical phenomenon in which data is collected and information is processed. It consists of several elements i.e. gradient, data messages, interest and reinforcement. In gradient, state is created in each node that receives an interest. In data messages, data in a sensor network is the process of collecting or processing information of physical phenomenon. Name of data is given by using attribute value pairs. Interest is a type of query it specifies what user want description of sensing task is contains in interest which is supported by a sensor network. In Reinforce, events flows toward originates of interest sensor network reinforces one or small number of path and provides a node failures which leads to path failures. [13] 4.2.2 Rumor routing(RR)- It is based on the concept of agent (long-lived packet) that transmits a network and informs each sensor it encounters about the events.it takes the shortest path to the event occur in the network. Agent is including by each sensor. Agent encounters a path of the sensor and synchronized. Agent will travel the network for a certain number of hops and then die. 4.2.3 Cougar- In cougar, user doesn’t know about which sensor is contacted and how sensed data processed. This problem is solved by cougar. Every sensor is associated with a Query proxy (higher level services) it approaches uses a query layer. If a data which is sensed could be fussed into single then it is significant to the sensor.
  • 6. Comparison Of Routing Protocols In Wireless Sensor… www.theijes.com The IJES Page 25 4.2.4 Acquire query forwarding in sensor network (ACQUIRE) – It consist of several sub-queries and used for querying named data. An active query in a network is indicated by a sensor that follows either a random or specified trajectory. In this neighboring nodes detect the information of packet and then give message to node. Node selects a neighbor to propagate the query then query resolved into smaller component until solved then query is returned back as the process is completed. It allows in the network to inject a complex query. 4.2.5 Energy aware data-centric routing (EAD) – It is associated with a probability of use of each route. This probability is related to the route of the residual energy of the node. It is a routing protocol responsible for in- network data processing which builds a virtual backbone composed of active sensor. Each sensor is acting as a data source or event source and gateway plays a data sink or event sink role. 4.3 Hierarchical protocols- It uses a concept of clustering. Clustering is a communication protocol that is used by a sensor to inform about the sensed data to the sink. It reduces energy consumption by dividing all nodes into clusters. Each cluster consists of cluster head. Whole network is divided into clustered layers. Data is always transferred from low level to high level. It does hopping from one node to another but it covers a large distance if hops from one layer to another. Different routing differs that how we selects a cluster head and how node behaves in this cluster domain. 4.3.1 Low energy adaptive clustering hierarchy (leach) –it reduces energy consumption. Each cluster head (ch) is used by direct communication for forwarding the data to the base station. It is based on aggregation technique this aggregation technique combines the data in smaller sizes of data in which information is carried for all individual sensor. It doesn’t require any global information. it reduces the energy consumption. Communication constant between sensors and their cluster heads is minimized. Network is divided into several clusters to reduce the amount of data which is transmitted to the sink. [6], [16],[13]. 4.3.2 Power efficient gathering in sensor information (PEGASIS) – It is the extension of leach It mainly avoids cluster formation. In the network, sensors required global information. Chain is formed from the sensor node. In sensor node, each node transmits and receives from the neighbor and then it selects one node from that chain to transmit to the base station. Topology used in PEGASIS is dynamic. Network lifetime is also increases and is twice to that of leach protocol. 4.3.3 Hybrid, energy-efficient distributed clustering (HEED) – it uses multi-hop network. It is also a clustering protocol. Using residual it uses primary and secondary parameters. In primary, residual energy act as a parameter and in secondary, node degree and node proximity acts as a secondary parameter .Lifetime of the sensor network is limited so more nodes is needed to re-energize the sensor network. Locations of the nodes are unaware. There is similar processing and communication capabilities in the nodes. Heed clustering is done in phases i.e. initialize and finalize in initialize phase the sensor selects the CH and finalize phase in which least common cost is join by each sensor. .it also divides into iterations in which not yet received message from CH, elected to be the probability of CHprop. 4.4 Mobility based protocols- it requires energy efficient protocol for data delivery originated from source sensor toward sink. 4.4.1 Joint mobility and routing protocol – This protocol suffers from a problem of energy sink-hide problems. Sensors which are heavily loaded close to the sink, which deplete their battery power more quickly which is disconnecting the network. Sensors are surrounding to the sink, all the sensors in the network to give the chance to act as data relays thus balance the load. 4.4.2 Data mules based protocol - It is based on three-tier architecture on mobile entities called (MULE) i.e. mobile ubiquitous LAN extensions. It contains layer top layer consist of connected devices of wan for analyzing sensed data. Middle layer has a mobile entity that moves in the sensor field and sensed data is collected from the source. Sensor directly communicates through short range paths. Its architecture has low cost infrastructures. 4.4.3 Scalable energy –efficient asynchronous dissemination (SEAD) - It is self-organizing protocol or minimizing delay to a mobile sink. Sensors should know about the geographic locations. 4.5 Multipath-based protocol- In this transmission of data between source sensor and the sink. Two types of routing are done in this protocol i.e. single path routing and multipath routing. In single path each source sensor
  • 7. Comparison Of Routing Protocols In Wireless Sensor… www.theijes.com The IJES Page 26 sends data to the sink via shortest path. In multipath routing, each sensor finds first k shortest path to the sink. Its main aim is to balance the traffic load in any network. 4.5.1 Disjoint path- it finds small number of paths primary preference is given to the best available path if failures occurs it remains local and doesn’t affect other path. 4.5.2 Braided path- it is partially disjoint path for this path information first computation of primary path is done then decides the best path from source to the sensor. It is constructed in localized manner. 4.6 Heterogeneity based protocol - In heterogeneity, two types of sensors are used and having no energy constraints sensors are having limited lifetime. They use the available energy by minimizing these data communication potential. 4.6.1 Cluster-head relay routing (CHR) – It is a type of sensors which form a heterogeneous network with single sink. Two types of sensors are used i.e. L-sensors and H-sensors commonly known as low-end sensors and high-end sensors. Sensors are aware from the location. It includes a group of sensors that also comprises of L- sensor and H-sensor. L-sensor is responsible for sensing the forwarded packets and h-sensor is responsible for data fusion within the cluster. 4.6.2 Information-driven sensor query (IDSQ) – It is responsible for maximizing the gain. Problem of heterogeneity in WSN is addressed by this protocol. From the whole cluster of sensor a leader sensor is selected, this is the first step of protocol. The sub-set of sensor node needed to be active for conserving the power. 4.7 QOS- based protocol- this protocol aims a kind of quality of service (QOS). QOS is defined as the measure of performance in the network which includes end-to –end delay and throughput. Main aim of this protocol is to find the suitable path between the sender and destination. 4.7.1 Sequential assignment routing (SAR) - it is one of the example of multipath routing. In this multiple trees are created and each is routed at neighbor of sink, for establishing multiple numbers of paths from each node to the sink. It minimizes the average weighted it is mainly used in a network which consist of large sensors. Routing decisions is mainly depending upon factors like energy resources, QOS on each path and the priority level of ach packet. 4.7.2 SPEED- It provides the services to the real-time communication. It requires the geographic location for routing. It uses a re-routing scheme to re-route the packets with minimum control overhead. It contains only immediate neighbor information. It also provides back-pressure to the upper stream. It has three types of real- time communication i.e. real time unicast, multicast and area-any cast. By studying all routing techniques, comparison between these protocols is given below- [15]. Table1: Comparison of routing protocol Name Type of protocol Energy Redundant data scalability Power usage Reliability Packet delivery GEAR Location based energy efficient Limited Limited Limited good Geo-cast based SPAN Location based Reduced energy consumption Limited Limited Limited Good Proactive type SMECN Location based Energy efficient and consumption Low Low Limited Good Minimum energy property based GAF Location based High Limited Good Limited Good Virtual grid based SPIN Data-centric Low energy consumption Limited Limited Limited Poor Meta-data based DD Data-centric Low energy efficient than SPIN Limited Limited Limited High Small interval basis RR Data-centric Lower than DD Low Limited Low High Long-lived packet COUGAR Data-centric Lower but higher than DD Low Limited Limited High Query-proxy based ACQUIRE Data-centric Low Low Limited Low High Query- based
  • 8. Comparison Of Routing Protocols In Wireless Sensor… www.theijes.com The IJES Page 27 LEACH Hierarchical High energy consumption High Good High High Cluster-head based PEGASIS Hierarchical Max.energy consumption High Good Maximum High Chain- based SAR QOS based Less high Limited High limited Multipath based SPEED QOS based Energy efficient low limited Low Low Re-routing based V. CONCLUSION In wireless sensor network, routing becomes the main attention in the recent years and has lot of advantages than the wired networks. This paper is a review which conducts a survey on routing protocols of wireless sensor network then having comparison of all the routing protocols. The main objective behind the protocol is to keep the sensor operating as long as possible. REFERENCES [1] I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam , E. Cayirci, Wireless sensor networks: a survey, I.F. Akyildiz et al.38 (2002) 393–42. [2] Luis Javier GarcĂ­a Villalba *, Ana Lucila Sandoval Orozco, Alicia TriviĂąo Cabrera and ClĂĄudia Jacy Barenco Abbas, Routing Protocols in Wireless Sensor Networks, 2009, 9, 8399-8421. [3] Jason lester hill, System architecture for wireless sensor networks, University of California, Berkeley, 2003. [4] Sinchan Roychowdhury, Chiranjib Patra, Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing, IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010]. [5] Ahmad Abed Alhameed Alkhatib, Gurvinder Singh Baicher, Wireless Sensor Network Architecture, 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) Š (2012) IACSIT Press, Singapore. [6] Geetu, Sonia Juneja, Performance Analysis of SPIN and LEACH Routing Protocol in WSN, International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5. [7] B.Chen et al.,SPAN: an Energy-efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks, Wireless Networks, vol. 8, no. 5, pp. 481–94,(Sept. 2002). [8] S. Lindsey and C. S. Raghavendra , PEGASIS: Power Efficient Gathering in Sensor Information Systems, in the Proceedings of the IEEE Aerospace Conference, Big Sky, Montana ( March 2002). [9] Shio Kumar Singh, M P Singh , and D K Singh, Routing Protocols in Wireless Sensor Networks –A Survey, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.1, No.2, November 2010. [10] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, Wireless sensor network survey, Computer Networks 52 (2008) 2292–2330. [11] Mr. Puneet Garg, Mr. Kuntal Saroha, Mrs. Ruchika Lochab, Review of Wireless Sensor Networks- Architecture and Applications, IJCSMS International Journal of Computer Science & Management Studies, Vol. 11, Issue 01, May 2011 ISSN (Online): 2231 – 5268. [12] Ms. Surbhi Jain, Ms. Parul Tyagi, Comparative Study of Routing Protocols in Wireless Sensor Network, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 9, September 2012. [13] Vandana Jindal, A.K.Verma, Seema Bawa, How the two Adhoc networks can be different:MANET & WSNs, International Journal of Computer Sci ence & Technology, ISSN : 0976-8491 (Online), Vol. 2, Iss ue 4, Oct . - Dec. 2011. [14] Ankita, A Survey on Wireless Sensor Network based Approaches, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 4, Issue 4, April 2014. [15] Chintan Choksi & Bijon Desai, comparison of routing protocols in wireless sensor networks, International Conference on Computer Science and Information Technology, ISBN: 978-93-82208-29-7. [16] Rajesh Chaudhary ,Dr. Sonia Vatta, A Tutorial of routing protocols in wireless sensor networks, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.6, June- 2014. BIOGRAPHIES Sakshi Anand (Guide) is currently working as the Assistant Professor in the department of Electronics and Communication Engineering at Shoolini University, Solan, Himachal Pradesh (India). She holds the degree of both B.tech and M.tech. Her area of interest includes wireless networks, securing, MANET, ad-hoc networks and sensor networks. Sujata Chandel (Student) received the degree of B.tech in Electronics and Communication Engineering. She is pursuing M.tech in ECE from Shoolini University Solan. Her area of interest includes wireless networks and ad- hoc networks.