Professional Documents
Culture Documents
2 5
2 5
ROUTING OPTIMISATION
ABSTRACT
Multiple sensor nodes deployed in a common neighborhood to sense an event and subsequently transmit
sensed information to a remote processing unit or base station, has been the recent focus of research. Tiny sensor
nodes, which consist of sensing, data processing, and communicating components, leverage the idea of sensor
networks based on collaborative effort of a large number of nodes. These numerous sensors are used (similar to
different sensory organs in human beings) for delivering crucial information in real-time from environments and
processes, where data collection is impossible previously with wired sensors [1]. Typically, wireless sensor
networks are composed of low power sensor nodes and integrate general-purpose computing with heterogeneous
sensing and wireless communication. Their emergence has enabled observation of the physical world at an
unprecedented level of granularity. One of the most important components of a sensor node is the power unit and
may be supported in most applications by a power scavenging unit such as solar cells. Hence, there is a major
limitation in a wireless sensor networks, such as, the sensor nodes must consume extremely low power. Also,
wireless networks are subject to various kinds of attacks and wireless communication links can be eavesdropped on
without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to
wire-line networks, known attacks like masquerading, man-in-the-middle, and replaying of messages can easily be
carried out. Hence, a fundamental issue in the design of wireless sensor networks is the reliability i.e. how long can
the wireless sensor networks survive and how well are the wireless sensor networks recovery after the malicious
attacks. In this context, in this thesis, the power, mobility, and task management planes that can monitor the power,
movement, and task distribution among the sensor nodes are proposed. These planes help the sensor nodes
coordinate the sensing task and also lower the overall power consumption. In addition, a secure topology discovery
algorithm is proposed and its performance is studied for different types of node distributions. The proposed work is
the development of architecture for secure communication in mobile wireless networks. The approach divides the
network into clusters and implements a decentralized certification authority. Decentralization is achieved using
threshold cryptography and a network secret that is distributed over a number of nodes. While this basic idea has
been proposed earlier partially, its application on a clustered network is a novelty.
1. INTRODUCTION
the data in the network layer and to design a power
A sensor node is made up of four basic components aware Medium Access Control (MAC) protocol
as shown in figure 1: a sensing unit, a processing (where the environment is noisy and sensor nodes
unit, a transceiver unit and a power unit [5]. They can be mobile [7]), (iii) to minimize collision with
may also have application dependent additional neighbors broadcast and to effectively detect the
components such as a location finding system, a aberrant nodes and eliminate them (iv)To devise
power generator and a mobilizer. One of the most simple but robust modulation, transmission and
important components of a sensor node is the power receiving techniques for the physical layer and
unit and may be supported in some cases even by a provide WSNs the flexibility to balance detection
power scavenging unit such as solar cells. These accuracy, sensor density and energy consumption.
nodes must Such energy efficient WSNs will extend the system’s
(i) consume extremely low power life time as sensor nodes usually rely on small and
(ii) operate in high volumetric densities [12] non-renewable batteries [9].
(iii) have low production cost and be dispensable and
(iv) be adaptive to the environment.
The primary objective of this paper is (i) to propose a
secure topology discovery algorithm for a WSN (ii)
To optimize the routing table and effectively route
Authorized licensed use limited to: Korea Advanced Institute of Science and Technology. Downloaded on August 26, 2009 at 02:08 from IEEE Xplore. Restrictions apply.
employing nodes that are adjacent to the base station
to serve as intermediaries for non-adjacent nodes.
Figure 2 depicts an example of such a sensor network
topology.
Authorized licensed use limited to: Korea Advanced Institute of Science and Technology. Downloaded on August 26, 2009 at 02:08 from IEEE Xplore. Restrictions apply.
discover a node as adjacent node or not, the the base station’s address to the preamble
following steps are performed: and the Ψ to the payload (Fig. 6 Step 3).
1. The base station sends a HELLO message 4. In turn, the adjacent node receives the
to each node. transmission, decrypts the header and upon
2. If the node replies with a HELLO-REPLY, seeing the RELAY command, adds the
then the node is adjacent to the base station and the preamble to the payload and transmits it to
base station adds that node to its route table. This is the base station (Fig. 6 Step 4).
illustrated in fig. 4. 5. The base station after receiving the HELLO-
REPLY adds the adjacent node as one of the
route to reach the non-adjacent node.
Authorized licensed use limited to: Korea Advanced Institute of Science and Technology. Downloaded on August 26, 2009 at 02:08 from IEEE Xplore. Restrictions apply.
2. Chose minimum load adjacent node as the taken for simulation etc. The network animator was
route. used to view the simulation in its animated form. To
3. Steps 1 and 2 are repeated till all the non- check the validity of the algorithms proposed in this
adjacent nodes are assigned routes. work, different test inputs were given and the results
This is given in appendix-1 of this paper. were analyzed. The secure topology discovery
algorithm was validated with random distributions
3.1 Load calculation like Poisson, Rayleigh and Exponential. The various
results obtained are explained in the following
Load is calculated based on the number of section.
past assigned nodes (confirmed) and the number of
future possible assignment of nodes. Since the past 5.1 DISCUSSION
assigned nodes are known, they are given higher
weightage than the future possible assignments. For It was assumed that 12mA of current was
an adjacent node the load calculation is done using drawn to transmit a message and 1.8mA to receive a
the formula message. The base station was located at the centre
Load = mP + nQ and 24 sensor nodes are randomly distributed around
Where ‘P’ is the number of past assigned non- the base station. The secure topology discovery
adjacent nodes to the adjacent node and ‘Q’ is the algorithm is validated by giving various random
number of future possible assignment of non-adjacent distributions as the input. The distribution of sensor
nodes to the adjacent node, ‘m’ and ‘n’ are the nodes is made with reference to the base station
weights for P and Q respectively. which is located at the centre. The distributions
considered for study in this work are Poisson,
3.2 Optimal weight Rayleigh and exponential probability distribution
function. A known placement of nodes (uniform
In this algorithm the optimal weight is distribution of nodes) is also considered for study.
chosen by trial and error method. The optimized These are all shown in figures 7 to 10.
route table is compared for different weights and the
set of weights which results in best route table are
chosen as the optimal weights. In this work, by
simulation the optimal weights are found to be m = 1
and n = 0.5. The simulation results are presented in
the last section.
4. CIPHER UPDATING
10
Authorized licensed use limited to: Korea Advanced Institute of Science and Technology. Downloaded on August 26, 2009 at 02:08 from IEEE Xplore. Restrictions apply.
Figure 10 Poisson distribution of sensor nodes
Figure 8 Exponential distribution of sensor nodes
In this work the random node distribution
that gives the best performance for the proposed
algorithm is evaluated. It is established that Poisson
distribution of nodes gives best performance in terms
of time taken and energy required to discover the
topology. The route table optimization algorithm is
implemented for a sample node distribution and the
results are presented. Fig.11 to 13 shows the load on
nodes. The comparison of these plots proves that the
value of weight n = 0.5 results in equal share of load
to the nodes.
11
Authorized licensed use limited to: Korea Advanced Institute of Science and Technology. Downloaded on August 26, 2009 at 02:08 from IEEE Xplore. Restrictions apply.
Figure 15 shows the energy spent in transmission and
reception to discover the given topology using the
secure topology discovery algorithm. Figure 16
shows the energy spent in transmission comparing
the various distributions. The throughput fluctuation
plot obtained is given in figure 17.
12
Authorized licensed use limited to: Korea Advanced Institute of Science and Technology. Downloaded on August 26, 2009 at 02:08 from IEEE Xplore. Restrictions apply.
(5)D. Culler, D. Estrin and M. Srivastave, “Overview of sensor
networks”, IEEE Computer, 37: 4149, August 2004.
(6)J.Elson and D.Estrin,“ Wireless sensor networks”,Kluwer
Academic Publishers, 2004, Ch. Wireless sensor networks: A
bridge to the physical world.
(7)Standard for part 15.4: Wireless Medium Access Control
(MAC) and Physical layer (PHY) specifications for low rate
wireless personal area networks (WPAN), IEEE std 802.15.4,
IEEE, Newyork 2003.
(8)J.Polastre, J.Hill, D. Culler, “Versatile low power media access
for wireless sensor networks”, Proceedings of the SenSys04,35,
November, 2004, Baltimore, Maryland.
(9)Lige Yu, Lin Yuan, Gang Qu, Anthony Ephremides, “ Energy-
driven detection scheme with guaranteed accuracy”, IPSN 06,
April 19-21, 2006, Tennessee, USA.
(10)Wenyu CAI, Xinyu Jin, Yu Zhang, Kangsheng Chen, Jun
Tang, “Research on reliability model of large scale wireless sensor
networks”,1-4244-0517-3/06, 2006 IEEE.
(11)M. Cardei and D.Z. Du, “Improving wireless sensor network
lifetime through power aware organization”,ACM wireless
networks, Vol. 11, No.3, 2005.
(12)F. Akyilidz, W.Su, Y. Sankarasubramaniam and E.Cayirici, “
A survey on sensor networks”, IEEE communication magazine,
Aug 2002: 102-114.
8. BIOGRAPHIES
6. CONCLUSION
7. REFERENCES
(1) Ruizhong Lin, Zhi Wang and Youxian Sun, “ Wireless sensor
networks solutions for real time monitoring of nuclear power
plant” , In Proceedings of 5th world congress on Intelligent Control
and Automation, June 15-19, 2004, China.
(2)Hairong Qi, Phani Teja Kuruganti and Yingyue Xu, “The
development of localized algorithms in wireless sensor
networks”,Computer Networks, 2002, 38, 286-292.
(3)Yue-Shan Chang, Chih-Jen Lo, Ming-Tsung Hsu, Jiun-Hua
Huang and Tong-Ying Juang, “ Fault estimation and fault map
construction on cluster-based wireless sensor network”,
Proceedings of the IEEE international conference on Sensor
networks, Ubiquitous and Trustworthy computing, 2006.
(4)Bonnie Zhu, Bruno Sinopoli, Kameshwar Poolla and Shankar
Sastry, “Estimation over wireless sensor networks”, Proceedings of
the 2007 American Control conference, July 11-13, 2007.
13
Authorized licensed use limited to: Korea Advanced Institute of Science and Technology. Downloaded on August 26, 2009 at 02:08 from IEEE Xplore. Restrictions apply.
APPENDIX-I
Table 1 Connection table
1 2 5 7 10 11 13 14 15 16 17 19 20 21 24
3 0 0 0 0 0 0 1 0 0 1 1 0 1 0 1
4 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0
6 1 0 0 1 0 0 1 0 1 0 0 1 0 1 0
8 0 0 0 1 0 0 0 0 0 0 0 1 0 1 0
9 0 0 0 0 0 0 0 0 0 1 1 0 0 0 1
12 1 0 0 0 0 0 1 0 1 0 1 0 1 0 0
18 1 1 0 1 0 0 1 0 1 0 0 1 0 1 0
22 0 0 1 0 0 1 0 0 0 1 0 0 0 0 1
23 1 1 0 1 1 0 0 0 0 0 0 1 0 1 0
1 2 5 7 10 11 13 14 15 16 17 19 20 21 24
3 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0
4 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0
6 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0
8 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0
9 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0
12 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0
18 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
22 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0
23 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0
1 2 5 7 10 11 13 14 15 16 17 19 20 21 24
3 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0
4 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0
6 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
8 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0
9 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0
12 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0
18 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0
22 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0
23 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0
Note: Table 1 shows the connection table. Table 2 and 3 are obtained after applying the optimization algorithm. The
optimized route table is given in Table 4.
14
Authorized licensed use limited to: Korea Advanced Institute of Science and Technology. Downloaded on August 26, 2009 at 02:08 from IEEE Xplore. Restrictions apply.
Table 4 Optimized route Table
2 D
3 20 16
4 13 15
5 D
6 15 1
7 D
8 7 19
9 16 17
10 D
11 D
12 17 20
13 D
14 D
15 D
16 D
17 D
18 1 2
19 D
20 D
21 D
22 5 11
23 2 7
24 D
15
Authorized licensed use limited to: Korea Advanced Institute of Science and Technology. Downloaded on August 26, 2009 at 02:08 from IEEE Xplore. Restrictions apply.