Anda di halaman 1dari 14

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/265926657

A Minimum Hop Routing Protocol for Wireless Sensor Networks A Minimum


Hop Routing Protocol for Wireless Sensor Networks

Article

CITATIONS READS

3 303

3 authors, including:

Shao-Shan Chiang Kuang-Chiung Chang


Lunghwa University of Science and Technology Lunghwa University of Science and Technology
26 PUBLICATIONS   911 CITATIONS    135 PUBLICATIONS   2,482 CITATIONS   

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Shao-Shan Chiang on 30 June 2015.

The user has requested enhancement of the downloaded file.


A Minimum Hop Routing Protocol for Wireless Sensor Networks

A Minimum Hop Routing Protocol for Wireless Sensor Networks

Shao-Shan Chiang1 Chih-Hung Huang2 Kuang-Chiung Chang1

1
Department of Electrical Engineering
2
Department of Information Management
Lunghwa University of Science and Technology

Abstract
A wireless sensor network is a data communication system that consists of from several
to thousands of tiny wireless sensor nodes. These battery-powered sensor nodes cooperate
with each other to accomplish data transmission. A variety of wireless sensor networks have
been developed for different applications in the recent years. In this paper, a data routing
protocol designed for wireless sensor networks is proposed. Due to the lifetime of such a
network depends entirely on the lifetime of the battery, the proposed routing protocol
chooses hop counts and battery power levels as metrics in order to conserve as much energy
as possible, both in computations and data communications. In addition, when some of the
nodes run out of battery power, the routing protocol could effectively adapt the change and
find an alternative path. Simulation results demonstrate the robustness and the
energy-efficiency of the proposed routing protocol.

Keywords: wireless sensor network, routing protocol, multihop relay, energy-efficiency.

I. Introduction wide range of civil and military applications,


Recent advances in micro fabrications such as health care [1], bridge monitoring
and wireless communications technology [2], and home automation [3].
have enabled the development of low-cost, In a wireless sensor network, a sensor
small-sized, low power-consuming, node cooperates with neighbor nodes to
multifunctional sensor nodes, which are accomplish data transmission. This is so
capable of communicating wirelessly in called the multihop relay. When such a
short distances with each other. A wireless network is used in a specific application, it
sensor network could consist of from several usually scatters sensors in a specific area to
to thousands of these tiny wireless sensor collect data. By means of a multihop relay
nodes, which can be added and removed scheme, the collected data is transmitted to a
conveniently to the network whenever it is base station for further analysis or for
necessary. It achieves the goals of low-cost remote monitoring and controlling.
and flexibility of deployment. Wireless Therefore, a routing protocol is needed to
sensor networks are being developed for a ensure the message delivery. Even if there
龍華科技大學學報第二十四期,2007.12

are node failures, a robust routing protocol summing the costs and counting the hops
could dynamically adjust the transmission along each route, the total cost of {A–B–F}
path accordingly. There has been much is 10 with two hops, the total cost of
research in the field of network layer {A–B–D–F} is 14 with three hops, and the
protocols for wireless sensor networks, such total cost of {A–C–E–F} is 8 with three
as flooding [4,5], directed diffusion [6], hops. Consequently, the optimal path from
sequential assignment routing [7], node A to node F will be different
gradient-based routing [8] to mention a few. depending on the metric chosen. By
An important issue on wireless sensor choosing the minimum hop counts as the
networks is to find an optimal routing path only metric, the route {A–B–F} is the
to transmit the collected data from a source optimal one with only two hops. On the
node to the sink. Because wireless sensor other hand, by choosing the total cost as the
networks are different from one to another, metric, {A–C–E–F} is optimal with a cost
the optimal path could be defined in of 8. Lastly, if we choose the maximum
different ways. For example, energy available power as the metric, {A–B–D–F}
dissipation, radio coverage range, and would be the optimal path because the total
number of nodes used are all possible available power along this path is maximal.
factors, or called metrics, to consider. When Energy-efficiency is one of the most
deciding an optimal path, these metrics can important metrics in the routing design for
be taken into account separately or in any wireless sensor networks because the battery
combinations. As the number of the sensor power of each sensor node is limited. There
nodes increases, a management scheme to are two strategies to deduce the energy
choose from those metrics becomes more dissipation for the networks. One is to
important. control the variable-range transmission
power of the sensor nodes [9]. The other is
to develop energy-efficient routing protocols
based on common-range transmission, i.e.,
nodes broadcast using the same transmission
power level without any power control [4-8,
10].
Figure 1. Routing metrics of the paths. In this paper, we present an
energy-efficient, scalable and robust routing
Assuming a data packet is to be algorithm in the data link layer for wireless
transmitted from source node A to sensor networks. Our approach is to flood a
destination node F as shown in Fig. 1, where special setup packet to establish a local
Cij denotes the cost from node i to node j, routing table for every node in the network
and Pi denotes the available power of node i. before data transmission actually takes place.
There are three possible paths {A–B–F}, The routing table consists of parent, sibling,
{A–B–D–F}, and {A–C–E–F}. By and child nodes, together with their
A Minimum Hop Routing Protocol for Wireless Sensor Networks

identification numbers and energy levels, matching entry exists in the cache already.
within one hop distance. Based on the The interest entry contains a timestamp and
routing table, each sensor node can several gradient fields. The timestamp marks
determine the best next-hop node, which has the time when the last matching interest was
the highest energy level, to relay the received, and the gradient, up to one per
message. neighbor, indicates the neighbor node from
The rest of the paper is organized as which the interest was received. As the
follows. Section II is a brief literature review interest diffuses throughout the entire sensor
on this topic. Section III describes the network, the gradients from the source back
system model of the proposed routing to the sink node are set up. Then, any data
scheme in details. The system matching the interest is sent back toward the
implementations and experimental results sink node through paths that the gradients
are discussed in Section IV. Some describe.
conclusions are given in Section V. The sequential assignment routing
(SAR) algorithm creates multiple trees, or
II. Related Works multiple paths from each node to the sink
Classic flooding is an old technique that node, in a wireless sensor network, where
can also be used for routing in sensor the root of each tree is a one-hop neighbor
networks [4,5]. When a sensor node detects from the sink node [7]. Each tree grows
an event, it broadcasts the message to other from every root node by successively
sensor nodes within its radio transmission branching to neighbors with higher hop
distance, which is called one hop. Again, all distances while avoiding nodes with very
the receiving nodes broadcast the message to low quality of service (QoS) and energy
all of their neighbor nodes within one hop, resources. At the end of this tree-building
except the node from which they receive the procedure, most nodes belong to multiple
message. This process is recursively trees. This allows a sensor node to choose a
performed until the message reaches the sink tree to relay its data back to the sink node.
node, which is a designated node directly There are two parameters, energy resources
linked to the base station or until a and additive QoS, associated with each path
maximum number of hops for the message back to the sink node. The SAR algorithm
is reached. This routing method has several selects the path based on the two parameters
deficiencies such as implosion, overlap, and of each path. As a result, each sensor node
resource blindness [5]. would select the most energy-efficient path
A directed data dissemination paradigm to route the data back to the sink node.
is proposed in [6], where the sink node The authors in [8] proposed a variant of
sends out an interest, which is a task directed diffusion, called gradient-based
description, to all sensors by a diffusion or a routing (GBR). The key idea in GBR is to
flooding mechanism. Each receiving node memorize the number of hops when an
then stores the interest in its cache if no interest is diffused through the whole
龍華科技大學學報第二十四期,2007.12

network. As such, each node can calculate a wireless sensor nodes, as shown in Fig. 2.
parameter called the height of the node, The base station can be located in any
which is the minimum number of hops to convenient place within or far from the field.
reach the base station. The difference The sink node is a specially designed sensor
between the heights of a node and its node that has more memory than other
neighbor is considered as the gradient on sensor nodes and is connected to the base
that link. Then the data packet is forwarded station through a wired or wireless link. The
to a link with the largest gradient. To avoid sensor nodes are densely distributed in the
overusing a particular node, when the node’s field so that the radio coverage of any sensor
energy drops below a certain threshold, it node covers at least one other node. While
increases its height so that other sensors are in the network communications, the sink
discouraged from sending data to that node. node takes commands from the base station
Note that when broadcasts are transmitted at and transmits them to other sensor nodes
the same power level, a minimum hop wirelessly. On the other hand, the sink node
routing is equivalent to a minimum energy also collects data from other nodes and
routing [5]. delivers them to the base station. All the
The authors in [10] proposed a sensor nodes are battery-powered except the
single-path with repair routing (SWR) sink node, because the sink node is the most
scheme. The SWR scheme uses a frequently used node in this sensor network.
flood-based path setup approach to establish When deployed, the transmission power of
a routing table for each sensor node in the each sensor node is regulated so that its
network. The routing table contains the hop radio coverage is fixed, despite the decay of
count from the current sensor node to the battery power, until the battery is exhausted.
sink node, parent nodes, and hop counts of It is required that every sensor node, with a
the parent nodes. Rather than searching unique identification number (ID), can
multiple paths for delivering data packets to monitor its own battery power level.
the sink node, SWR searches a single
optimal path with repair, in which data is
forwarded along a pre-established path to
save energy, and a high delivery ratio is
sink node
achieved by path repair whenever a broken
link during delivery is detected. In the SWR
scheme, a sensor node can skip over path
base station
break by only using the already existing
routing information in its neighborhood.
Figure 2. The system model.
III. System Model
Our system model consists of a base There are two phases in the proposed
station, a sink node, and a number of routing method: the routing table
A Minimum Hop Routing Protocol for Wireless Sensor Networks

establishment phase and the data routing sending node, “hop” represents the hop
phase. As soon as the sensor network is count between the sending node and the sink
activated, it gets into the routing table node, and “energylevel” is the battery
establishment phase in which the flooding energy level of the sending node. For the
[4,5] technique is applied to establish a local setup packet broadcasted by sink node, the
routing table for each sensor node. The hop count value is set to 0 and the
routing tables will be used in the data “energylevel” value is set to a very large
routing phase and will be updated only when value.
the network topology changes, i.e. when any
sensor fails or a new sensor is added. The
data routing phase consists of three
processes: data routing, table updating, and
command routing. In the data routing phase,
as an event is detected, the data packets can
be transmitted only to the designated nodes
and then to the sink node based on the
routing tables. On the other hand, the sink
node takes commands from the base station (a)

and forwards to the specific nodes or floods


to all sensor nodes. In any case at the data
routing phase, the energy consumption is
very low.
In the following, the algorithms to
establish and to update the routing tables are
described, followed by the algorithms to
route data and command packets.

(b)
3.1. The Establishment of Routing Tables Figure 3. (a) The setup packet sent from the
In the sensor network initialization, the sink node. (b) The setup packet is flooded one
base station requests the sink node to start a hop away.
routing table establishment process for the
entire network. Then, the sink node After receiving the setup packet, all the
broadcasts a setup packet to all sensor nodes receiving nodes within one hop from the
within its transmission range. The format of sink node set their hop counts with
the setup packet is defined as increment 1, as shown in Fig. 3(a), and mark
“Setup.ID.hop.energylevel”, where the the sink node as their parent node by
“Setup” indicates that it is a setup packet recording its hop count, ID number and
and should be flooded throughout the entire energy level on their routing tables. Then,
network, “ID” is the ID number of the each node with hop count l, called a relaying
龍華科技大學學報第二十四期,2007.12

node, in turn broadcasts a newly constructed The flowchart in Fig. 4 demonstrates


setup packet, as also shown in Fig. 3(b). The the workflow of a sensor node receiving a
new setup packet has the same format as that setup packet. The following algorithm
was sent by the sink node, but with the describes the establishment of the routing
relaying node’s ID number and energy level table for sensor node j when receiving a
instead, and the hop count is now set to 1. setup packet from sensor node i, where hop(i)
This broadcasting process repeats denotes the hop count of sensor node i.
hop-by-hop until all the nodes in the
network have been notified. Routing table establishment algorithm
As also shown in Fig. 3(b), the setup IF hop(j) = empty
packets, either sent by the sink node or any
Set hop(j) = hop(i) + 1.
of the relaying nodes, may be received by
Record node i into the parent list.
any other sensor nodes within one hop. On
Transmit a new setup packet.
the other hand, every sensor node may
receive more than one setup packet from its ELSE
neighbor nodes. IF hop(j) > hop(i)
Record node i into the parent list.
ELSEIF hop(j) = hop(i)
Record node i into the sibling list.
ELSE
Record node i into the child list.
END
END

Referring to Fig. 3(b), nodes F, G and H


record node A as their parent node, and node
E records both nodes A and B as its parent
nodes. Also, the sink node records nodes A,
B, C, and D as its child nodes, and both
nodes B and D record node A as a sibling
node while nodes A, C and D record node B
as a sibling node.
Flooding the setup packet in this way
may cause several problems such as
collision and incorrect setting of the hop
count. If several nodes broadcast the packet
at the same time, they will collide to each
Figure 4. Flowchart of the routing table
other. To prevent collisions, all nodes
establishment.
receiving the setup packet for the first time
A Minimum Hop Routing Protocol for Wireless Sensor Networks

have to wait for a fixed time plus a random 3.2. Deletion and Addition of Sensor
time, like the back-off algorithm used in Nodes
Ethernet, before relaying the setup packet. When the battery power of a sensor
The duration of the fixed time is node falls below a predetermined level, it
proportional to the hop count value in the sends a delete packet to all the sensor nodes
first received packet. The design of the fixed listed in its routing table. In this situation,
time may lengthen the time needed to each receiving node simply deletes the
establish the routing tables. However, it can dying-out node from its routing table. The
prevent the receiving sensor node from deletion of a dead node is part of the node
setting its hop count to a higher value than it updating process illustrated in Fig. 5.
should be. In other words, once a receiving
node has set its hop count, it is impossible to
receive any setup packet that has smaller
hop count value. To further reduce the
amount of setup packets flooded in the
entire network, every sensor node only
relays the setup packet once.
A routing table consists of three rows. All
the parent, sibling and child nodes, together
with their ID numbers and energy levels, are
put at the bottom, middle and upper row,
respectively. As a result, the memory
capacity needed for the sensor node is very
low because only a local routing table needs
to be stored. Besides, searching for an
optimal path for data routing is merely by
looking up the local routing table stored,
therefore the demand of calculation ability is
relatively low, compared to other classical Figure 5. The node updating sub-process.
methods. The correctness of routing table
can be easily verified when the routing table As time goes by, sensor nodes will
establishment phase is completed. The hop gradually be energy-exhausted and be
count values of all the parent, sibling and deleted from the routing tables one after
child nodes should be three consecutive another. Once the number of deleted nodes
numbers. If it is not true, this sensor node increases so that the sensor network
resets the current routing table and acts as a becomes disconnected, new sensor nodes
newly added node to establish its routing must be added on in order to maintain the
table (see the next subsection). connectivity of the network. The procedures
of the new sensor node and its neighbor
龍華科技大學學報第二十四期,2007.12

nodes in the node addition process are Routing table establishment algorithm for
shown respectively in Fig. 5 and Fig. 6. a newly added sensor node
Receive ACK packets from all its neighbor
node i, for i = 1, 2, …, m.
Set hop(N) = min{hop(i), i = 1, 2, …, m}+1.
Sort the responding nodes.
FOR i = 1 to m
IF hop(i) < hop(N)
Record node i into the parent list
ELSEIF hop(i) = hop(N)
Record node i into the sibling list
ELSE
Record node i into the child list
END
END
Broadcast an update packet.

Figure 6. Workflow of the new sensor node in


the node addition process.

When a new sensor node appears in the


network, it has to establish its own routing
table and updates routing tables of the
sensor nodes within its one hop distance.
The new sensor node broadcasts an add
packet in the format “Add.ID.energylevel”,
where the “Add” indicates it is an add Figure 7. Sensor node addition procedure.
packet and should be answered, to notify the
sensor nodes within one hop, as node N In Fig. 7, for example, node N sets its
shown in Fig. 7. Every receiving node hop count as 2 and marks the nodes with
replies an ACK packet with its hop count, hop count 1 as its parent nodes, the nodes
energy level and ID number destined to the with hop count 2 as its sibling nodes, and the
new sensor node after a random time delay. nodes with hop count 3 as its child nodes.
Waiting for a predefined time interval to The correctness of the routing table created
ensure that all receiving sensor nodes have by this addition procedure need also be
responded, the new sensor node N generates verified. If it is correct, the new sensor node
its routing table according to the following broadcasts an update packet in the format
criteria. “Update.ID.hop.energylevel”, where its hop
A Minimum Hop Routing Protocol for Wireless Sensor Networks

count, energy level and ID number are sent level to ensure the delivery of the data
to all sensor nodes listed in the routing table. packet and to update the energy information
The receiving sensor nodes append the new in the routing table. The algorithm to select
sensor node into their routing tables the next relay node in an energy-based
according to its hop count. manner is described as follows, and the
workflow is shown in Fig. 8.
3.3. The Data Routing Scheme
The data routing scheme is developed to Data routing algorithm
ensure the data delivery based on the routing IF a data packet is received
tables. When a sensor node detects an event,
Reply an ACK packet back.
the collected data must be sent back to the
ELSEIF an NAK packet is received
sink node and then to the base station by the
Delete the replying node from the
relay scheme. Since processing and
routing table.
transmitting data packets both consume
END
energy, the purpose of the proposed data
IF parent nodes are available
routing scheme is not only to find a path to
the sink node, but also to conserve as much Forward the data packet to the
parent node with the highest energy.
battery energy as possible. Besides, to
ELSEIF sibling nodes are available
extend the lifetime of the wireless sensor
Forward the data packet to the
network, it also needs to consider how to
sibling node with the highest
avoid overuse of certain nodes in data energy.
packet delivery process. ELSE
The proposed routing algorithm
Reply an NAK packet back.
determines an optimal path to the sink node
Broadcast a delete packet.
by choosing the hop count and the energy
END
level as the metrics. When several paths
exist, the sensor node with the most energy
should be chosen as the next recipient to The node or path failure detection
relay data packets. Every data packet has a mechanism is different from the mechanism
field specifying the designated recipient’s ID. in [10] where the sensor node broadcasts a
All nodes other than the designated recipient packet to all the neighbor nodes for help.
would ignore the packet when receiving it. The sensor node in the proposed method
Beside the designated recipient field, the makes its own decision to opt a neighbor
data packet also contains fields of the energy node for an alternative path. Once a node or
level, ID number, and event description of path failure occurs, the failed node will be
the sending node. Not only process and relay removed from the routing tables of all its
the data packet, the designated recipient but neighbor nodes. It means the neighbor nodes
also must acknowledge the reception by will not try to use the node or path to deliver
replying an ACK packet with its energy packets in order to conserve energy. The
method provided here not only guarantees
龍華科技大學學報第二十四期,2007.12

data packet delivery but also saves energy. node receives the same ComALL from
different parent nodes, it only relays the
Listening
command once.
Sending a command to a designated
Receive packet
node may use ComALL with the ID of the
Reply the routing
Yes
Is an ENQ sensor node in it to tell who should respond.
table packet?
However, this mechanism requires the
No
Update the routing
Yes
Is an ACK participation of all the nodes in the network,
table packet?
No
which may unnecessarily consume battery
Is a data Yes power. Alternatively, the sink node could
packet?
No build a global routing table showing the
No Is an NAK Reply ACK to the
Other process
packet? sending node
entire tree structure of the network. The
Yes global routing table can be established by
Delete the
sending node from
sending an ENQ (enquiry) packet which is a
the routing table
ComALL command to ask every sensor
node to reply its routing table to the sink
Is there any Yes
parent node? node. The procedure of generating the
No
No Is there any
global routing table is similar to the data
sibling node?
routing process, as shown in Fig. 8.
Yes

Choose the sibling Choose the parent


According to the global routing table, the
Reply NAK to the
node with the node with the
sending node
highest energy highest energy sink node could find a path to the destination
and fill the path into the command packet.
Broadcast a delete Forward packet to Forward packet to
packet the sibling node the parent node Due to the global routing table building
process is energy and time consuming, it is
Figure 8. The data routing process. not necessarily updated every time the sink
node sends a command. The node failure
3.4. The Command Routing Scheme detection mechanism in the data routing
There are two types of commands from algorithm could detect dead routes and
the sink node in the proposed scheme: one is return the message to the sink node for
to all sensor nodes, namely, ComALL, and updating the global routing table.
the other is to a designated node. The
algorithm to deliver ComALL from the sink IV. Simulation Results
node is similar to that of the routing table We compare the energy-efficient
establishment expect the command packet is performance of the proposed method with
forwarded only to the child nodes in the the classic flooding scheme and the SWR
routing table. The delivery of ComALL scheme in this section. In this comparative
stops when the relaying node has no child experiment, we used a simple abstract
nodes. To reduce the amount of information energy model other than a particular one to
flooded in the network, when a relaying compute energy consumption in one data
A Minimum Hop Routing Protocol for Wireless Sensor Networks

packet delivery. It is well known that in robustness of the proposed algorithm. To


wireless sensor network communications, make a fair comparison, in each test, each
idle listening or signal transmitting/receiving scheme used exactly the same network
consumes much more energy of a sensor topologies where 20 nodes were randomly
node than calculation of an optimal path or selected as source nodes. Each source node
memory accessing does. Therefore, in this sent one data packet to the sink node, using
experiment, the energy consumption of the three different schemes. The size of the
calculation and memory access is not data packet was 1 Kbit, including header.
considered. This model assumed that, from a With 20 successful deliveries of the data
pure energy/bit standpoint, the sensor nodes packet, the average energy consumption per
spent 1.0 and 2.0 energy units respectively data packet delivery for the proposed
for transmitting and receiving one data bit. algorithm is shown in Fig. 9. In SWR, a
Thus, for a data packet of 1 Kbit long, the sending node will broadcast a call-for-help
energy for relaying (transmitting and packet when its next relay node fails. Every
receiving) one data packet was 3000 energy sensor node receiving the packet must
units. respond in order that the sending node finds
Experiments were carried out using an alternative path. In contract, in the
random network topologies. In each network proposed method, the sending node can
topology, sensor nodes were randomly decide an alternative path directly from its
scattered in a fixed 50 × 50 m2 deployed own routing table. Therefore, the proposed
area, and the sink node was located at the method is more energy-efficient than SWR.
lower left corner. The number of sensor Besides the energy saving, we see that, from
nodes changed from 50 to 100 with this figure, the proposed method is more
increments of 10. Each sensor node had a scalable.
maximum transmission range of 10 m and a
detection range of 5 m. The maximum hop
count was set 8 for all the routing schemes.
Before data delivery, the routing table had
been set up at each sensor node. The energy
dissipated in the routing table establishment
process was not included in the total energy
consumption, because both of the proposed
method and SWR use a technique similar to
the classic flooding method to establish the
routing table. At the time between the end of
the routing table establishment and Figure 9. Energy consumption of the proposed
beginning of the data delivery, for each test, method (real line), SWR (broken line) and the
a 10% of the sensor nodes were randomly classic flooding method (dashed line).
selected as failure nodes, in order to test the
龍華科技大學學報第二十四期,2007.12

V. Conclusions Transactions on Consumer Electronics,


We have presented an energy-efficient vol. 51, pp. 836-839, 2005.
routing scheme in the data link layer for [4] J. N. Al-Karaki and A. E. Kamal,
wireless sensor networks. The time “Routing techniques in wireless sensor
complicity of the proposed protocol is not networks: A survey,” IEEE Wireless
discussed because it is beyond the scope of Communications, pp. 6-28, Dec. 2004.
this paper. In the proposed data routing [5] I. F. Akyildiz, S. Weilian, Y.
scheme, sensor nodes with more energy are Sankarasubramaniam, and E. Cayirci,
selected in data packet transmission relays. “A survey on sensor networks,” IEEE
Since the battery power of the network is Communications Magazine, vol. 40, no.
utilized efficiently and evenly among all the 8, pp. 102-114, 2002.
sensor nodes, the lifetime of the wireless [6] C. Intanagonwiwat, R. Govindan, and
sensor networks could be extended to its D. Estrin, “ Directed diffusion: A
optimum. When any data packet scalable and robust communication
transmission fails due to sensor node’s fault paradigm for sensor networks,”
or battery exhaustion, the proposed scheme Proceedings of the ACM Mobi-Com, pp.
would quickly adapt the change by updating 56-67, 2000.
the routing tables and resending the packet [7] K. Sohrabi, J. Gao, V. Ailawadhi, and
via a new optimal path. Therefore, the G. Pottie, “Protocols for
proposed scheme is robust, energy-efficient self-organization of a wireless sensor
and scalable. network,” IEEE Personal
Communications, pp. 16-27, 2000.
References [8] C. Schurgers and M. B. Srivastava,
[1] R.-G. Lee, C.-C. Lai, S.-S. Chiang, “Energy efficient routing in wireless
H.-S. Liu, C.-C. Chen, and G.-Y. Hsieh, sensor networks,” MILCOM Proc.
“Design and implementation of a Communications for Network-Centric
mobile-care system over wireless Operations: Creating the Information
sensor network for home healthcare Force, pp. 357-361, 2001.
applications,” Proceedings of the 28th [9] J. Gomez and A. T. Campbell, “A case
IEEE EMBS Annual International for variable-range transmission power
Conference, pp. 6004-6007, 2006. control in wireless multihop networks,”
[2] R.-G. Lee, K.-C. Chen, C.-C. Lai, S.-S. Proceedings of Infocom, pp. 1425-1436,
Chiang, H.-S. Liu, and M.-S. Wei, “A 2004.
backup routing with wireless sensor [10] D. Tian, N. D. Georganas, “Energy
network for bridge monitoring system,” efficient routing with guaranteed
Measurement, vol. 40, pp. 55-63, 2007. delivery in wireless sensor networks,”
[3] H. Oh, H. Bahn, and K. J. Chae, “ An IEEE Wireless Communications and
energy-efficient sensor routing scheme Networking Conference, pp. 1923-1929,
for home automation networks,” IEEE 2003.
A Minimum Hop Routing Protocol for Wireless Sensor Networks

無線感測網路之最小跳躍路由協定

江韶珊 1 黃志宏 2 張光瓊 1


1
龍華科技大學電機工程系

2
龍華科技大學資訊管理系

摘要

一個無線感測網路是由包括從數個到上千個極小的無線感測器結點所構成的一個資料
通信網路系統,這些由電池供應電力的感應器結點互相合作來完成資料傳輸。近年來,
各式各樣的無線感應網路已經被研發運用在許多不同的應用領域,因此本文提出一種
為無線感測網路設計的資料路由協定。由於這樣的網路壽命完全取決於電池的使用壽
命,本文所提出的路由協定採用跳躍數和電池電力作為計量標準以達到在資料計算和
通訊時儘可能保存最多的電池能量。此外,當某些結點用盡電池能量時,此路由協定
能有效地適應網路拓樸的變動並立即尋找另一個最佳傳遞路線。在本文中的模擬結果
也確實顯示出此路由協定的穩定性和節能性。

關鍵詞:無線感測網路,路由協定,多重跳躍傳遞,節能效益。

View publication stats

Anda mungkin juga menyukai