Paper Menu >>
Journal Menu >>
Wireless Sensor Network, 2010, 2, 710-717 doi:10.4236/wsn.2010.29086 Published Online September 2010 (http://www.SciRP.org/journal/wsn) Copyright © 2010 SciRes. WSN Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network Xiaomin Zhao, Keji Mao, Shaohua Cai, Qingzhang Chen* College of Computer Science and Technology Zhejiang University of Technology, Hangzhou, China E-mail: qzchen@zjut.edu. cn Received July 2, 2010; revised August 18, 2010; accepted September 15, 2010 Abstract Traditional routing protocols as TCP/IP can not be directly used in WSN, so special data-centric routing protocols must be established. The raised data-centric routing protocols can not identify the sensor nodes, because many nodes work under a monitoring task, and the source of data is not so important some times. The sensor node in the network can not judge weather data is come from the some sink node. What’s more, the traditional method use IP to identify sensors in Internet is not suitable for WSN. In this paper, we propose a new naming scheme to identify sensor nodes, which based on a description of sensor node, the description of a sensor node is hashed to a hash value to identify this sensor. The different description generates different identifier. Different from IP schema, this identifier is something about the information of the sensor node. In the above naming scheme, we propose a new data-centric routing mechanism. Finally, the simulation of the routing mechanism is carried out on MATLAB. The result shows our routing mechanism’s predominate in- crease when network size increase. Keywords: Wireless Sensor Network, Routing, Hash Value, Sensor Identifier 1. Introduction Wireless sensor network has become a research focus of computer technology; it is a complex system which combines the sensing, embedded computing, distributed processing, wireless communications, and many other technologies. Since the concept of sensor network was proposed, a growing number of research institutions be- gan to join into the field. The WSN could collect infor- mation from physical world directly, then it links with the logic world through the network [1], it greatly ex- tends the traditional network ability and the ability of human being to control the physical world. 2. Recent Research Wireless Sensor Network is a large scale network of hundreds or thousands of sensor nodes. These sensor nodes are networking by self-organization. WSN with many features: sensor nodes are random spread in sensor field, so it is infrastructure-less; the sensor node is en- ergy restricted, so node can not support long communi- cation range, and they communicate with other nodes by multihop. What’s more, WSN is scalability, easy de- ployment, low cost, application-related and so on. For those features, WSN can not direct use traditional networking technologies. And researchers have begun to study its exclusive techno logy. Wireless sensor networks have many key technologies, such as routing protocols, MAC protocols, location, time synchronization, etc., in these key technologies, the routing protocols is a re- search hotspot. The routing protocols of traditional networks focus on the availability of a high quality of service and the equi- table and efficient of network bandwid th. In the wireless sensor network, the node energy is limited and nonre- newable, the node can not support the large distance of information transmission, so the data packets pass through network to reach the destination node by multi- hop way. So the routing protocols need to use energy efficiently. At the same time, the number of nodes is very large in WSN, the node can only get the nearby network topology information, and every node should find its routing path according this partly information. These problems are not encountered in traditional net- works, which determine the routing algorithm of tradi- tional networks can not apply to wireless sensor net- *Corresponding author. X. M. ZHAO ET AL. Copyright © 2010 SciRes. WSN 711 works. One important goal of the routing protocol of sensor network is to maintain a longer network lifetime. Currently, researchers have classified the proposed rout- ing protocols in WSN into four categories [3-5]. The first category is hierarchical routing protocol, such as LEACH; the second type is geograp h ical routin g, su ch as GAF, GEAR. The third category is a reliable route routi ng protocol, such as SPEED. The fourth category is data-centric routing protocols, such as SPIN, Rumor, DD and so on. For wireless sensor networks is a network which closely related to application, and it is data-cen tric, more researchers focus on data-centric routing protocols and got many achievements. SPIN [6] is a kind of data-centric routing protocols; it sends messages though network by negotiation. When a node A want to send a message, it first send a ADV, ADV is used to broadcast meta-data which is a descrip- tion of the data that ready to send; another node B who receive the ADV and it is willing to receive the data send REQ back to A to request data; at last, the node A send the data to B. Directed diffusion [7] is a data-centric routing mecha- nism. “Interests” in particular sensing information are disseminated over the sensor network starting from the sink. “Gradients” back towards the sink are constructed in the meanwhile. This essentially uses flooding to sub- scribe to interested events. Once a sensor detects the in- terested events, an energy-efficient routing path between this sensor and the sink will be reinforced. To maintain robust paths for information flows, the sinks need to pe- riodically cast their “interests” to the sensor network. Directed diffusion also supports in-network processing. Every sensor is equipped with local memory to cache sensor data for identical data aggregatio n or suppression. Rumor routing [8]: when a sensor node in sensor field sensing an event, it generates a proxy message (agent), agent messages randomly select a neighbor node to for- ward, at the same time the query sent by sink node is also spread in the network randomly. When the two of them meet, the path from source node to sink node formed. Rumor overcomes the defect of energy consuming DD in broadcast interest in network, but it is so rando mness that the delay of data is obviously. 3. Main Title The nodes in SPIN, Rumor, and directed diffusion rout- ing mechanism algorithms are not have an identifier. Because there are too many nodes in a WSN, to maintain an identifier will consuming lots unnecessary energy, what’s more, WSN is a network of data-centric, care little about where the data come from but the detail of the data; so identifier in WSN is seems not so important as in traditional network. But this no identifier also bring many problems, we can not know where the data is ex- actly come from. Take DD for example, a node in net- work can not judge the different interest come from which specific node, in Figure 1, several sink nodes all broadcast a interest , and they reach node A, in this mo- ment A can not distinguish the source of the interest, and do not know how to deal with it. And in Figure 2, an interest reach node A from one sink node in different path. The node can throw all interest but the first one or it can establish gradient for each interest. But what abo ut the situation in Figure 3. In this paper we propose a new naming schema to give an identifier to each node in WSN. Considering the fea- ture WSN have, the identifier is not just numbered like IP address, but something about data-centric. Base on this naming schema, we propose a new routing mecha- nism. At the last of paper, we have simulate to verifica- tion the effectively of th e routing mechanism. Figure 1. Interests from different sink nodes. Figure 2. Interests from one sink node. Figure 3. The complex topology from source node to sink node X. M ZHAO ET AL. Copyright © 2010 SciRes. WSN 712 4. Naming Scheme Based on Hash Value Paper [9,10] proposed a data-centric storage scheme, use data itself to describe its storage location, that is the name of the data represent a keyword, you can use this keyword to find the data. And queries can be routed to the data directly by the name of the corresponding node. In this paper, we propose a new naming scheme accord- ing to data-centric scheme above. We first describe the data by attribute pairs, for example: there is a sensor node in the room 621 of library to monitor the tempera- ture, and then it has a description below: ATTRIBUTION{ Service = temperature Room = R621 Building = library } (1) If the node has more than one sensor model, performs several monitor task, for example the sensor node in room 621 not only monitor the temperature but also ob- ject monitor, then it can also describe like this: ATTRIBUTION{ Service = Object Monitor Room = R621 Building = library } (2) One node could have several descriptions, but one de- scription can only describe one node. Meanwhile, we use the same naming scheme to name the query, such as a query to check the room 621’s tem- perature, and then the description of this query is: ATTRIBUTION{ Service = temperature Room = R621 Building = library } (3) After each node and query has its description, we use a certain hash algorithm to generate a hash value, and use this hash value to identify the node or query. For the above description (1) and (3), (1) describes the detail of node in room 621 and (3) describes the query whose des- tination is node in room621. We can find that the de- scription of (1) and (3) is identical; by the same hash function the query will generate the same hash value with its destination node. So it can be routed directly and correctly. Thus each node in network will have a unique identifier. According to this naming scheme, we can map the complex physical topology of a network to one-dimen- sional logical topology. As shown in Figure 4. One node could have several ID to identify itself, for example v6 mapped to a3 and a6, but one ID can unique identify a node. Figure 4. Mapping from physical topology to logical topol- ogy. This naming scheme based on hash value is aiming to solve the problems in raised data-centric routing mecha- nism which has no uniform identification. And this naming scheme is different from the traditional network which base on IP address, the ID of node is not just a number, but a keyword of data, it is data-centric. 5. Routing Mechanism Base on the above naming schema, each node maintains a routing table, a logical neighbor table and a physical neighbor table, and according to those routing informa- tion, messages can be delivered to destination efficiently. 5.1. Tables of Routing Information 5.1.1. Routin g Table Routing table is used to help messages to deliver to des- tination, it maintains three paramet ers. The first parame ter is leader node, leader nodes are those identifying hash-value that closest to R/2n away from the hash value of local sensor, while R as the range of the hash domain, and n is the routing scope. The second parameter is path, it record the path to the leader and the third parameter is cost it spends from local node to leader. Figure 5 is the structure of the routing table. For one node, there are several scopes about leader. The first scope is the node whose ID is closest to R/2, and the second scope is the node whose ID is closest to R/4, and third scope R/8…, we select leader by the for- mula below: 2 nn R Uv “n” is the scope of leader. So, node v0’s namespace can be segmented as in Figure 6. X. M. ZHAO ET AL. Copyright © 2010 SciRes. WSN 713 Figure 5. Routing table. Figure 6. Name space of node v0. With the segmentation of the name space and the se- lect of leader, routing table records the path to the nodes whose identifying hash values are exponentially changed, and it makes message to reach the destination quickly. 5.1.2. Logical Neighbor Table Each node also maintains a logical neighbor table; the logical neighbor records the node whose hash value is closest to local node. It provides a shortcut to reach the destination. Logical neighbor: the node whose hash value is closest to local node. Path: the path from local node to logical neighbor. Cost: the spending from local node to logical neighbor. Figure 7 shows the logical neighbor table. 5.1.3. Physical Neighbor Table Each node also maintains a physical neighbor table, it record the physical neighbor which is one hop away from local node. The parameters maintain by physical table is similar with logical neighbor table. Physical neighbor: the node which is one hop away from local node. Path: the path from local node to physi- cal neighbor. Cost: the spending from local node to physical neighbor. Figure 8 shows the ph ysical neighbor table. 5.2. Routing Process Wireless sensor net w or k has m a ny restrict i o ns i n vario us Figure 7. The logic neighbor table. Figure 8. The physical neighbor table resources, so the process of routing should be simple and efficient. When the networking begins, nodes in network broadcast “hello” packet to other nodes. And node con- structs its routing tables by received packet. The step is below: (local node with hash value V0 receive a message send by node whose hash value is V1) 1) Node V0 receives a hello packet which contains its destination V1. 2) Node V0 judges whether the packet is sent from its physical neighbor who is on ly a hop away, if yes, records the node to its physical neighbor table, and continue. 3) Node V0 judges whether it is the first packet re- ceived, If yes, records V1 to its logical neighbor table, else compare with the item which is already in logical table, if it is closer to local node’s hash value, replace the original item with new V1. 4) Node V0 should determine whether the V1 is a leader, a simple calculation of distance between the hash value can be drawn. If yes, records it in routing table and records the path to it, else forward it. 5) Wireless sensor networks based on specific size and the number of nodes to define the hello packet time to live. Before the routing mechanism works, we should design a reasonable life time for “hello” packet to save energy consumption of network. Figure 9 is the flow chart. The judge in dashed box is to construct node’s rou ting table, Figure 10 shows the detail flow chart. Figure 9. Flow chart of routing tables establish. X. M ZHAO ET AL. Copyright © 2010 SciRes. WSN 714 star t “Hello” message (include V 1) V1-V0=R/2 V1-V0=R/4 V1-V0=R/8 R ecord V 1 as 1st leader Re c o r d V1 as 2 n d leader R eco rd V1 a s 3th leader end forward …… Y Y Y Figure 10. Flow chart of leader definite. With the three tables of routing information, the node can forward every packet wherever its destination is. The routing mechanism as: 1) When a node receives a packet from other node, it first checks its physical neighbor table and logical neighbor table to determine whether there is a path to the destination node, if yes, send the packet to node record by either table. 2) Otherwise, the node calculate its own hash value and the packet hash value to determine which scope of leader the node need to help to forwar d the packet. For example: If the packet’s hash value is closer to the 1st leader, then it forwards the packet to its 1st leader. 3) Repeat step one, step two, until the packet accu- rately reach its destination. 5.3. Route Maintenance By the networking is complete, we need maintenan ce the routing information regular to ensure the correctness. The simplest method is to periodically broadcast the node’s hash value contains in a “hello” packet, to declare its own survival. If one node hasn’t broadcast a hello packet for a long time, then other node will think it is fo r some reasons departed from network, and the path con- tains this node will failure. When invalid nodes leaver or new nodes join the net- work, the routing table and neighbor table need to be updated. 5.3.1. New Nodes Join the Network When a new node needs to join a network, its routing information should be constructed first. 1) To join a sensor network, a new sensor first con- tacts one of its “physical” neighbors randomly to con- struct physical neighbor table. A sensor’s physical neighbors are those sensors geographically close. 2) Then this sensor generates log 1R joining re- quests with a key R/2n plus its identifying hash value. Conceptually, these jo ining requests will be forwarded to the sensors that are numerically closest to each key. The Sensors visited by a joining request will be recorded in this request to track the routing path. When those re- quests reach the destination, the destination node records the new node and reply. After collecting all the replies, the new sensor can construct its own routing table. 3) This sensor generates a joining request with a key of its own identifying hash value. This joining request is used to construct the neighbor table. When the nu merica ll y closest sensor to that hash value receives the joining re- quest, it returns its logical neighbors and the paths to the neighbors to the new sensor and meanwhile updates its neighbor table with that hash value and the routing path recorded in the request. The reply of this reply provides the information of node’s logical neighbor. 5.3.2. Nodes Withdraw from the Network Wireless sensor network is a kind of dynamic, adaptive network, if a node’s energy is exhaust, or for other rea- sons lost its contact with the network. So the routing in- formation is not correctness, to supp ort robustness of the sensor network, the sensors need to update the routing tables periodically. 5.3.3. Support for Mobile Node Although most of the nodes in wireless sensor network are fixed, there is a part of node need mobility, and those nodes always play an important role. How to support mobile nodes properly is a new challenge in wireless sensor network. Figure 11 shows the WSN with mobile node A. By the naming schema raised in paper, each nodes use a hash value to identify themselves, so we can map the complex physical topology into a 1-D logical topology, as Figure 1 describe. In this case, as shown in Figure 7, a mobile node S5, it moved from T0, T1, T2 moment, but the hash value of S5 is changeless, so whenever the X. M. ZHAO ET AL. Copyright © 2010 SciRes. WSN 715 physical topology of the network changes, the logical topology is changeless, shows in Figure 12, because the identifier of the mobile node is abiding. In this paper, we support mobile nodes by the routing information that each nodes maintains. Firstly, we re- quest node add an attribute to describe the node’s mobili ty. And then we add constraints to routing tables: 1) Each node maintain a routing table, all the nodes maintained in this table must be immovable. 2) An immovable node will maintain two different logical neighbors, an immovable logic neighbor table and a mobile logical neighbor table. However, the mov- able sensor needn’t maintain a mobile logical neighbor table. Figure 11. Mobile nodes in WSN. Figure 12. Mapping from physical topology to logical to- pology with a mobile node. 3) Movable sensors also maintain an immovable logic neighbor table and a mobile logical neighbor table. Dif- ferent from tables immovable node maintain, it didn’t maintain the path to neighbor node for those path is variable. By the constraints written above, When a mob ile node willing to send a packet to the immovable node, it can just forward packet to its nearest immovable physical neighbor, and then the packet will be forwarded accord- ing to routing mechanism. If a node has a packet to send to the mobile node, there is no direct path to the mobile node, the sending node will just sent it to the mobile node's logical neighbors. Mobile node sends regular send hello messages back to its neighbor to get the packet. In this way, data flow from mobile node to immovable node is established. Here follows the concrete steps: 1) The mobile node broadcast a hello packet to other node when reach the new place to get its physical neighbor information. 2) When a mobile node to send a packet, it send the packet to its physical neighbors. 3) When an immovable node has to communicate with mobile node, either node sends packet to it or replies. It sends the packet to mobile node’s logical neighbor. 4) The mobile node periodically sends hello packets to its logical neighbors to get the packet. 6. Simulation We compare proposed routing mechanism to Directed Diffusion, Rumor, and Flooding. Figure 9 is describes 100 nodes random distribution in th e 100 meter multiply 100 meter space. Figure 13 depict node A’s logical neighbor and leader. We can see from Figure 14 that the logical neighbor and leader are well-proportioned in the region. In Figure 14, red arrows point to node A’s leader, and blue arrows point to its logical neighbor. Figure 13. 100 nodes in 100m*100m. X. M ZHAO ET AL. Copyright © 2010 SciRes. WSN 716 The Figure 15 shows the packet number required for a success query Figure 14. Logical neighbor and leader of node A. Figure 15. Packet number of a query. Figure16. Average hops of a query. Figure17. Average energy dissipated of a query. The Figure 16 shows the average hops a packet cost to destination node. From which we can see that pro- posed routing mechanism is advantageous when the network scale increased. The Figure 17 is the average energy dissipated for a discovered routing path. 7. Conclusions The proposed routing mechanism is superior to other data-centric routing, especially when nodes in a WSN increased. 8. References [1] D. Chen, Z. W. Zheng and J. J. Li, “Research on Wire le ss Sensor Network,” Computer Measurement and Control, Vol. 12, No. 8, 2004, pp. 701-704. [2] L. M. Sun, “Wireless Sensor Network,” Tsinghua Uni- versity Press, Beijing, 2005. [3] W. Ye, J. Heidemann and D. Estrin, “An En ergy-E fficien t MAC Protocol for Wireless Sensor Networks,” Proceed- ings of IEEE Infocom, New York, 2002, pp. 1567-1576. [4] W. Ye, J. Heidemann and D. Estrin, “Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks,” IEEE/ACM Transactions on Net- working, Vol. 12, No. 3, December 2004, pp. 493-506. [5] Y. Li, W. Ye and J. Heidemann, “Energy and Latency Control in Low Duty Cycle MAC Protocols,” Proceed- ings of the IEEE Wireless Communications and Net- working Conference, New Orleans, March 2005, pp. 676-682. [6] J. Kulik, W. R. Heinzelmann an d H. Balakrishna n, “Ad a p- tive Protocols for Information Dissemination Information in Wireless Sensor Networks,” Proceedings of the 5th ADM/IEEE Mobicom Conference, Seattle, 1999, pp. 174-185. [7] C. Intanagonwiwat, R. Govindan and D. Estrin, “Directed X. M. ZHAO ET AL. Copyright © 2010 SciRes. WSN 717 Diffusion: A Scalable and Robust Communication Para- digm for Sensor Networks,” Proceedings of the 6th an- nual international conference on Mobile computing and networking, Boston, 2000, pp.56-67. [8] A. Boulis, S. Ganeriwal, M. B. Srivastava, “Aggregation in Sensor Networks: an Energy-accuracy Trade-off,” Sensor Network Protocols and Applications, Vol. 1, No. 2, September 2003, pp. 317-331. [9] S. Ratnasamy, B. Karp, L.Yin, F. Yu, D. Estrin, R. Go- vindan and S. Shenker, “GHT: A Geographic Hash Table for Data-Centric Storage,” Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, September 2002. [10] S. Shenke, S. Ratnasamy, B. Karp, R. Govindan and D. Estrin, “Data-Centric Storage in Sensornets,” ACM SIG- COMM Computer Communication Review, Vol. 33, No. 1, January 2003, pp.137-142. |