ENERGY EFFICIENT
ROUTING PROTOCOLS
FOR WIRELESS SENSOR
NETWORKS
TERM: ENERGY EFFICIENCY?
Energy efficiency is about using less energy to accomplish the same task,
essentially eliminating energy waste
It refers to a method of reducing energy consumption while maintaining the
same level of useful output.
Reducing energy use has the added benefit of reducing energy costs,
potentially resulting in financial savings for consumers.
QUICK INTRODUCTION OF WIRELESS SENSOR NETWORK
• Wireless Sensor Network (WSN): A network of small, self-sufficient devices
(sensors) that gather data about physical or environmental conditions.
Data Collection: Sensors
gather various types of data, such as temperature, sound, vibration, weight,
and movement.
• Data Transmission: Data is sent to a base station.
• Data Processing: The base station analyzes the data.
• Applications: WSNs can be used in various applications to detect events like
pressure, movement, and fire.
NEED FOR EFFICIENCY IN WSN?
• WSN nodes carry limited power source which is non-rechargeable and
non-replaceable power sources which makes energy consumption an
significant issue.
• It is not easy to replace the nodes which makes power saving important to
increase the lifetime of nodes.
REASON FOR ENERGY EFFICIENT ROUTING PROTOCOL
• Energy-efficient routing protocols are required to minimize the utilization of
the power resources and prolonging the network lifetime path while
transferring data.
• Routing strategies are required for transferring data between the sensor
nodes and the base station.
• Energy conservation is a very important issue for prolonging the lifetime of
the network.
CLASSIFICATION OF ROUTING PROTOCOLS
FUNCTIONING MODE BASED ROUTING PROTOCOLS
• The function of a wireless sensor network specifies its application.
• Therefore, routing protocols can be categorized according to the
operation used to satisfy a WSN function as follows:
• Proactive Protocols: These protocols are also called table-driven protocols.
In Proactive, the data is transmitted to a BS through the predefined route.
Example: LEACH, PEGASIS.
• Reactive Protocol: In Reactive Protocol the route is established on
demand. The route is established dynamically i.e. Network-based route is
found when needed. TEEN, AODV, DSR are some reactive protocols.
• Hybrid protocols: All the routes are found initially and then improved at the
time of sending data. These protocols possess the concepts of both
reactive and proactive. Example: APTEEN.
PARTICIPATION STYLE BASED ROUTING PROTOCOLS
• Some WSNs consist of homogeneous nodes, while others consist of heterogeneous
nodes. These nodes may participate differently in the network based on factors like
remaining energy or their role as a cluster head.
Based on this concept, we can classify the protocols as:
• Direct Communication protocols: In this type, the information sensed by nodes is sent
directly to the Base Station (BS). SPIN is an example of this type of protocol.
• Flat protocols: In this, the nodes search for a valid path and then transmit it to the BS.
For example, the Rumor Routing protocol.
• Clustering Protocols: In this, the area is divided into clusters, and Cluster Heads are
assigned to each cluster. All the nodes in the cluster send data to their corresponding
cluster heads, and then the cluster head sends it to the Base Station. TEEN is an
example of a Network-based routing protocol that falls under this category. Sources
and related content
NETWORK – BASED ROUTING PROTOCOLS
• Network-based routing protocols depend on how the network is prearranged.
They fall under three categories: Data Centric, Hierarchical, and Location Based.
• Data Centric protocols: They are query-based and depend on the naming of the
desired data. They use queries to get information and wait for a reply from the
nodes. SPIN is a data-centric protocol.
• Hierarchical protocols: They use nodes with lower energy to capture information
and nodes with higher energies to process and transfer it. This is why they are
used to perform energy-efficient routing. TEEN and APTEEN are hierarchical
protocols.
• Location Based protocols: They require knowing the location of nodes to find an
optimal path using flooding. GPS is used to get the information about the
location of nodes. GEAR is an example of a location-based protocol.
CONCLUSION
Energy efficiency is a crucial aspect of sensor networks, directly impacting
their longevity, performance, and overall functionality.
Key Points:
1. Extended Network Lifespan.
2. Optimized Resource Utilization.
3. Improved Data Transmission.
4. Scalability and Flexibility.
5. Environmental Impact.
GEOGRAPHIC ROUTING IN SENSOR NETWORKS
INTRODUCTION
• Geographic routing (also known as position-based routing) is a type of
routing protocol commonly used in wireless sensor networks (WSNs), where
the routing decisions are based on the geographic positions of the nodes.
• This method is particularly suitable for large-scale sensor networks where
traditional routing tables would be too cumbersome to maintain.
KEY CONCEPTS OF GEOGRAPHIC ROUTING :
• Node Location Awareness: Each node knows its own position and that of
its neighbors.
• Greedy Forwarding : Data is forwarded to the neighbor that is closest to
the destination.
• Local Minimum Problem : When no closer neighbor exists, routing switches
to alternative strategies to avoid dead-ends.
• Recovery Strategies: Methods like Perimeter Routing and Face Routing are
used to get around obstacles or dead-ends.
• Energy efficiency : Reduces energy consumption by using local
information for routing decisions.
• Scalability : Geographic routing scales well for large and dynamic
networks without needing global routing tables.
COMMON GEOGRAPHIC ROUTING PROTOCOLS
• GPSR (Greedy Perimeter Stateless Routing): One of the most well-known
geographic routing protocols. It uses greedy forwarding in the absence of
obstacles and switches to perimeter forwarding (face routing) when
necessary.
• GOAFR (Geometric-Adaptive Face Routing): Combines both greedy
forwarding and face routing but also adapts its approach based on network
density and topology.
• GFG (Greedy-Face-Greedy): This protocol alternates between greedy
forwarding and face routing to handle dead-end situations.
• GHT (Geographic Hash Tables): Instead of routing packets to a specific node,
GHTs map data to geographic regions, making them useful for data-centric
storage and retrieval in sensor networks.
SECURITY ISSUES IN GEOGRAPHIC PROTOCOLS
• Wireless sensor networks are more prone to security attacks than legacy
wired communication network.
• Geographical routing protocols are inherently less vulnerable to routing
attacks mainly due to their local (almost stateless ) operation.
DEFENDING SYBIL ATTACK
• To prevent Sybil attack, a key management scheme can be adopted.
• Another way to prevent a sensor node from falsifying its location is to
verify its location by challenging it.
DEFENDING SELECTIVE FORWARDING ATTACK
• To defend against selective forwarding or blackhole attacks, nodes should
be capable of detecting malicious nodes and excluding them from their
forwarding candidates list.
• To detect malicious behavior, each node should check whether the
selected next hop neighbor has forwarded the packet either based on
some type of acknowledgment or overhearing its transmissions. This way, the
trustworthiness of the neighbors can be defined and taken into account
during routing decisions.
APPLICATIONS OF GEOGRAPHIC ROUTING :
• Environmental Monitoring.
• Disaster Response Networks.
• Wildlife and Object Tracking.
• Smart Agriculture.
• Urban Sensing.
CONCLUSION
• Geographic routing is a powerful, efficient method for wireless sensor
networks, leveraging node locations to simplify routing decisions.
• It offers energy efficiency and scalability, making it well-suited for large,
dynamic networks.
• Its applications in areas like environmental monitoring, disaster response, and
object tracking demonstrate its versatility and practicality.
• Overall, geographic routing provides a robust solution for modern sensor
networks, ensuring reliable data transmission with minimal overhead.

routing protocol of sensor networks.pptx

  • 1.
  • 2.
    TERM: ENERGY EFFICIENCY? Energyefficiency is about using less energy to accomplish the same task, essentially eliminating energy waste It refers to a method of reducing energy consumption while maintaining the same level of useful output. Reducing energy use has the added benefit of reducing energy costs, potentially resulting in financial savings for consumers.
  • 3.
    QUICK INTRODUCTION OFWIRELESS SENSOR NETWORK • Wireless Sensor Network (WSN): A network of small, self-sufficient devices (sensors) that gather data about physical or environmental conditions. Data Collection: Sensors gather various types of data, such as temperature, sound, vibration, weight, and movement. • Data Transmission: Data is sent to a base station. • Data Processing: The base station analyzes the data. • Applications: WSNs can be used in various applications to detect events like pressure, movement, and fire.
  • 4.
    NEED FOR EFFICIENCYIN WSN? • WSN nodes carry limited power source which is non-rechargeable and non-replaceable power sources which makes energy consumption an significant issue. • It is not easy to replace the nodes which makes power saving important to increase the lifetime of nodes.
  • 5.
    REASON FOR ENERGYEFFICIENT ROUTING PROTOCOL • Energy-efficient routing protocols are required to minimize the utilization of the power resources and prolonging the network lifetime path while transferring data. • Routing strategies are required for transferring data between the sensor nodes and the base station. • Energy conservation is a very important issue for prolonging the lifetime of the network.
  • 6.
  • 7.
    FUNCTIONING MODE BASEDROUTING PROTOCOLS • The function of a wireless sensor network specifies its application. • Therefore, routing protocols can be categorized according to the operation used to satisfy a WSN function as follows: • Proactive Protocols: These protocols are also called table-driven protocols. In Proactive, the data is transmitted to a BS through the predefined route. Example: LEACH, PEGASIS. • Reactive Protocol: In Reactive Protocol the route is established on demand. The route is established dynamically i.e. Network-based route is found when needed. TEEN, AODV, DSR are some reactive protocols. • Hybrid protocols: All the routes are found initially and then improved at the time of sending data. These protocols possess the concepts of both reactive and proactive. Example: APTEEN.
  • 8.
    PARTICIPATION STYLE BASEDROUTING PROTOCOLS • Some WSNs consist of homogeneous nodes, while others consist of heterogeneous nodes. These nodes may participate differently in the network based on factors like remaining energy or their role as a cluster head. Based on this concept, we can classify the protocols as: • Direct Communication protocols: In this type, the information sensed by nodes is sent directly to the Base Station (BS). SPIN is an example of this type of protocol. • Flat protocols: In this, the nodes search for a valid path and then transmit it to the BS. For example, the Rumor Routing protocol. • Clustering Protocols: In this, the area is divided into clusters, and Cluster Heads are assigned to each cluster. All the nodes in the cluster send data to their corresponding cluster heads, and then the cluster head sends it to the Base Station. TEEN is an example of a Network-based routing protocol that falls under this category. Sources and related content
  • 9.
    NETWORK – BASEDROUTING PROTOCOLS • Network-based routing protocols depend on how the network is prearranged. They fall under three categories: Data Centric, Hierarchical, and Location Based. • Data Centric protocols: They are query-based and depend on the naming of the desired data. They use queries to get information and wait for a reply from the nodes. SPIN is a data-centric protocol. • Hierarchical protocols: They use nodes with lower energy to capture information and nodes with higher energies to process and transfer it. This is why they are used to perform energy-efficient routing. TEEN and APTEEN are hierarchical protocols. • Location Based protocols: They require knowing the location of nodes to find an optimal path using flooding. GPS is used to get the information about the location of nodes. GEAR is an example of a location-based protocol.
  • 10.
    CONCLUSION Energy efficiency isa crucial aspect of sensor networks, directly impacting their longevity, performance, and overall functionality. Key Points: 1. Extended Network Lifespan. 2. Optimized Resource Utilization. 3. Improved Data Transmission. 4. Scalability and Flexibility. 5. Environmental Impact.
  • 11.
    GEOGRAPHIC ROUTING INSENSOR NETWORKS
  • 12.
    INTRODUCTION • Geographic routing(also known as position-based routing) is a type of routing protocol commonly used in wireless sensor networks (WSNs), where the routing decisions are based on the geographic positions of the nodes. • This method is particularly suitable for large-scale sensor networks where traditional routing tables would be too cumbersome to maintain.
  • 13.
    KEY CONCEPTS OFGEOGRAPHIC ROUTING : • Node Location Awareness: Each node knows its own position and that of its neighbors. • Greedy Forwarding : Data is forwarded to the neighbor that is closest to the destination. • Local Minimum Problem : When no closer neighbor exists, routing switches to alternative strategies to avoid dead-ends. • Recovery Strategies: Methods like Perimeter Routing and Face Routing are used to get around obstacles or dead-ends. • Energy efficiency : Reduces energy consumption by using local information for routing decisions. • Scalability : Geographic routing scales well for large and dynamic networks without needing global routing tables.
  • 14.
    COMMON GEOGRAPHIC ROUTINGPROTOCOLS • GPSR (Greedy Perimeter Stateless Routing): One of the most well-known geographic routing protocols. It uses greedy forwarding in the absence of obstacles and switches to perimeter forwarding (face routing) when necessary. • GOAFR (Geometric-Adaptive Face Routing): Combines both greedy forwarding and face routing but also adapts its approach based on network density and topology. • GFG (Greedy-Face-Greedy): This protocol alternates between greedy forwarding and face routing to handle dead-end situations. • GHT (Geographic Hash Tables): Instead of routing packets to a specific node, GHTs map data to geographic regions, making them useful for data-centric storage and retrieval in sensor networks.
  • 15.
    SECURITY ISSUES INGEOGRAPHIC PROTOCOLS • Wireless sensor networks are more prone to security attacks than legacy wired communication network. • Geographical routing protocols are inherently less vulnerable to routing attacks mainly due to their local (almost stateless ) operation.
  • 17.
    DEFENDING SYBIL ATTACK •To prevent Sybil attack, a key management scheme can be adopted. • Another way to prevent a sensor node from falsifying its location is to verify its location by challenging it.
  • 18.
    DEFENDING SELECTIVE FORWARDINGATTACK • To defend against selective forwarding or blackhole attacks, nodes should be capable of detecting malicious nodes and excluding them from their forwarding candidates list. • To detect malicious behavior, each node should check whether the selected next hop neighbor has forwarded the packet either based on some type of acknowledgment or overhearing its transmissions. This way, the trustworthiness of the neighbors can be defined and taken into account during routing decisions.
  • 19.
    APPLICATIONS OF GEOGRAPHICROUTING : • Environmental Monitoring. • Disaster Response Networks. • Wildlife and Object Tracking. • Smart Agriculture. • Urban Sensing.
  • 20.
    CONCLUSION • Geographic routingis a powerful, efficient method for wireless sensor networks, leveraging node locations to simplify routing decisions. • It offers energy efficiency and scalability, making it well-suited for large, dynamic networks. • Its applications in areas like environmental monitoring, disaster response, and object tracking demonstrate its versatility and practicality. • Overall, geographic routing provides a robust solution for modern sensor networks, ensuring reliable data transmission with minimal overhead.