You are on page 1of 12

www.ietdl.

org

Published in IET Communications


Received on 18th March 2009
Revised on 9th October 2009
doi: 10.1049/iet-com.2009.0197

ISSN 1751-8628

Elastic routing: a novel geographic routing for


mobile sinks in wireless sensor networks
F. Yu1 S. Park2 E. Lee2 S.-H. Kim2
1
Key Lab of Broadband Optical Fiber Transmission and Communication Networks, UESTC, Chengdu, China
2
Department of Computer Engineering, Chungnam National University, Daejeon, Republic of Korea
E-mail: fcyu@uestc.edu.cn

Abstract: Geographic routing has been considered as an efficient, simple and scalable routing protocol for
wireless sensor networks, since it exploits pure location information instead of global topology information to
route data packets towards a static sink. Recently, a number of research works have shown that mobile sinks
can achieve high energy efficiency and load balance than static ones. In order to receive data packets
continuously, a mobile sink must update its location to the source frequently. However, frequent location
updates of mobile sinks may lead to both rapid energy consumption of the sensor nodes and increased
collisions in wireless transmissions. The authors propose a novel geographic routing for mobile sinks to
address this issue. The proposed scheme takes advantage of wireless broadcast transmission nature of
wireless sensor nodes. When a sink moves, the new location information is propagated along the reverse
geographic routing path to the source during data delivery. Analysis and simulation results indicate that elastic
routing is superior to other protocols in terms of control overhead, data delivery delay and energy consumption.

1 Introduction encapsulates the location of the sink in each data packet.


After receiving a data packet, a node sends it to the one-
Wireless sensor networks (WSNs) have been proposed for hop neighbour that is geographically closest to the sink.
observation of events and environments in sensing areas Numerous geographic routing protocols have been
over long periods of time. A large number of sensor devices proposed for WSNs [6– 11], most of which are designed
communicate over short range wireless interfaces to deliver for static sinks, and assume that both sensor nodes and
the observations over multiple hops to sinks. With these sinks do not change their location after deployment. Thus,
properties, WSNs are considered for many application once a source obtains the location of a static sink, it can
scenarios including battlefield surveillance, habitat continuously send data packets to the sink by geographic
monitoring, traffic monitoring, security applications and routing. Recently, mobile sinks have been introduced into
so on. Sensor nodes are small, simple and powered by WSNs because of two main reasons. First, mobile sinks
batteries. Since the sensor network consists of a large have been utilised as mechanical data carriers to prolong
number of sensor nodes, recharging them is often the network lifetime. In static WSNs, the sensor nodes
infeasible. Therefore to minimise the unnecessary close to a static sink will deplete their energy quickly
transmission becomes one of the key challenges in protocol because they have to forward messages originating from
design. many other nodes, and thus shorten the lifetime of the
entire network [12]. If a sink can move, the sensor nodes
Geographic routing has been considered as an attractive in the network can take turns to become the neighbours of
approach, since it exploits pure location information instead the sink, and thus the energy can be evenly consumed
of global topology information to route data packets, and among all the sensor nodes, and consequently, the lifetime
this location-based strategy makes it a more efficient, of the entire network can be prolonged [13]. Second, some
simple and scalable routing protocol in WSNs. In a applications need the support of mobile sinks, such as
geographic routing protocol, a source obtains the location soldiers equipped with personal digital assistants (PDA)
of a sink by some location service [1– 5] in advance and move in a battlefield for enemy detection and a rescuer who

716 IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727


& The Institution of Engineering and Technology 2010 doi: 10.1049/iet-com.2009.0197

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org

is equipped with a PDA move in a disaster area for searching that the mobile sink receives data packets from the sensor
survivals. In general, sensor nodes do not have a priori nodes, but the data delivery rate may be very low because of
knowledge of the moving speed and direction of the mobile drastically increased collisions in transmitting flooding
sinks. How to propagate the location of a mobile sink to packets from the sensor nodes [14]. The sink-triggered full
the source in real-time manner with low overhead is a flooding is that a mobile sink consecutively informs its new
difficult issue. location information to the entire network by flooding,
such as dynamic routing protocol (DRP) [15] and gradient
In this paper, we propose a novel geographic routing broadcast (GRAB) [16], so that all the sensor nodes get
termed elastic routing, which can superiorly support mobile updated with the direction of sending future data reports.
sinks in WSNs. Elastic routing exploits the greedy However, frequent location updates from mobile sinks can
forwarding [6] as the data delivery protocol. An important also lead to both large energy consumption of the sensor
feature of wireless communication is that a node can nodes and increased collisions in wireless transmissions.
overhear transmitting packets in the neighbourhood even if
the packets are not destined for it. Elastic routing is Adaptive local update-based routing protocol (ALURP)
motivated by this overhearing feature of wireless [17] is a local flooding-based location update scheme,
transmission. First, a source obtains the location of a which utilises an adaptive area for location update of a
mobile sink by some location service and forwards data mobile sink. A sink only floods it location to the nodes
packets to the sink by greedy forwarding. When the sink within the adaptive area if the sink only moves within the
moves, the last hop forwarding node detects the new adaptive area. If the sink moves beyond the adaptive area, it
location of the sink and resets the sink location information still needs to flood its location information throughout
in a received data packet to the new location of the sink. the entire network and constructs a new adaptive area.
Data transmission of the modified data packet from last Although ALURP can significantly reduce unnecessary
hop forwarding node to the sink can be overheard by the transmissions and energy consumptions by local flooding,
last second hop forwarding node. Then the last second hop the full-network flooding is also required if the sink moves
forwarding node changes the sink location information in beyond the adaptive area.
each subsequently received data packet and forwards them
towards the new location of the sink by greedy forwarding. To reduce the flooding overhead, a rendezvous points-
As a result, with continuous data transmission, the new based solution, termed line proxy target detection (LPTD)
location of the mobile sink will be finally propagated to the [18], was proposed for updating the location of a mobile
source. The elastic routing works like an elastic band with sink. LPTD assumes that all the sensor nodes in the
one end tied to a source and another end tied to a mobile network are time synchronised and achieve the same
sink. When the sink moves, the path between the sink and temporal-based hash function. A network is divided into
the source is inflected, but finally converged to a line path cells (square areas). All cells in the same row or column
like the shrinkage of an elastic band. No significant become rendezvous points (line proxies) at some moment
overhead is generated for propagating the location of a depending on the temporal-based hash function. The
mobile sink. rendezvous points (line proxies) are alternated over time for
network load balance. When a sink wants to query some
The rest of this paper is organised as follows. We event, it first calculates the rendezvous points by the same
introduces the related works which also focus on the issue temporal-based hash function and sends an interest
of efficient data delivery to mobile sinks by geographic registration message to the rendezvous points, and the
routing scheme in Section 2. Section 3 describes the interest registration message is flooded to all sensors within
proposed elastic routing in detail, and Section 4 discusses the same row or column. When a source detected some
elastic routing in special cases. We analyse the performance event, it sends targets registration messages to the same
of elastic routing and compare the performance with other rendezvous points by the same hash function. The cell
protocols by simulations in Section 5. Section 6 concludes where the interest registration and targets registration are
the paper. overlapped forwards the target report to the sink. The sink
may directly send a message to ask the source for
performing continuous reporting. If the sink moves too far
2 Related works away from its previous location, it achieves the same
Existing solutions for addressing the issue of updating process mentioned above. LPTD drastically avoids the full-
the location of a mobile sink can be classified into four network flooding for location update of a mobile sink.
categories: full flooding-based [14 – 16], local flooding- However, flooding interest registration message within a
based [17], rendezvous points-based [18] and grid-based row or a column band area across the entire network also
solutions [19]. Full-network flooding can be further generates high overhead. The time synchronisation and
divided into source-triggered full-network flooding and hash function of sensors are also difficult issues in WSNs.
sink-triggered full-network flooding. The source-triggered
full flooding is that a source continuously floods the sensed Two-tier data dissemination (TTDD) [19] is a grid-based
data throughout the entire network. This scheme ensures approach which avoids the entire network flooding for

IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727 717


doi: 10.1049/iet-com.2009.0197 & The Institution of Engineering and Technology 2010
Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org

location update of mobile sinks. TTDD periodically 3 Elastic routing


constructs per-source-based global grid structures, each
grid point is associated with a dissemination node and We assume in this work that all sensors remain static, but
each dissemination node is aware of its upstream and sinks can move freely in the network; each node can obtain
downstream dissemination nodes. A sink floods a data its own location information by global positioning system
query message within about a grid cell size area to find the or other location services [24 – 26]; each node can obtain
nearest dissemination node. Then the query message is its one-hop neighbour list and their locations by beacon
relayed by a series of dissemination nodes and eventually messages [6]. Without any specification, the greedy
received by the source. Then the source sends data packets forwarding referenced in the following sections is referred
to the sink along the reverse path of the query message. as greedy perimeter stateless routing [6].
When a sink moves into another cell, it achieves the same
process described above. Flooding query messages only 3.1 Tracing of mobile sink
within about a grid cell size is an efficient way, however,
To facilitate discussion, we additionally assume that all sensor
the bigger the cell size, the wider the local flooding area,
nodes have the same unit disk radio range. If two nodes are
thus more flooding overhead, whereas small grid size incurs
located in the radio range of each other, then the channel in
more overhead for the grid construction and maintenance.
between is bidirectional (heterogeneous radio range and radio
Periodic per-source-based global grid constructions also
irregularity problem will be further discussed in Section 4.1).
generate additional overhead.
In greedy forwarding, a node selects only the neighbour
We summarise above discussions as follows. Geographic node that is closest to the destination as the next hop.
routing is an efficient routing protocol for WSN. In Since we have assumed that all sensor nodes are static, thus
geographic routing, the location information of a sink is the entire routing path between the source and the sink
encapsulated in each data packet. To support mobile sink, remains static except that some intermediate forwarding
the geographic routing requires the location of the sink to node dies, and which leads to the change of routing path.
be efficiently updated to the source. The existing solutions Fig. 1a shows a scenario of greedy forwarding. The current
for addressing this issue suffer from more or less overheads location of the sink has been obtained by the source by
and excessive energy consumptions. Unlike wired networks, some sink location service. The LOOP problem which was
the wireless sensor nodes forwards data packets in broadcast mentioned in [27] arises if the sink moves. In particular,
manner, thus data transmission can be overheard by all when a sink moves from its original location, before
neighbour nodes. Motivated by the overhearing feature of obtaining the new location, the source still encapsulates the
wireless transmission, this paper proposed a novel approach original location of the sink in each data packet and
termed elastic routing to address this issue. Elastic routing forwards them towards the original location of the sink.
takes advantage of the broadcast nature of wireless If the sink moves to a new location and another node
transmission to propagate the new location of a mobile sink becomes a closest one to the original location of the sink,
to source along the reverse path of geographic routing then this situation is misunderstood as a local maximum
during data delivery. The property of stationarity of sensor by greedy forwarding. In this case, the perimeter mode is
nodes makes the location propagation scheme executable. triggered to resolve this problem. However, in this
The overhearing has been widely employed by previous situation, the packets normally get dropped unless the sink
research for varying applications such as network time comes back to near the original location and becomes the
synchronisation [20, 21], malicious packet-modifying closest node to the destination location of the packet again.
attacks detection [22] and reducing redundant Perimeter mode generates wasteful loops in this situation.
transmissions [23]. To our best knowledge, elastic routing To solve this LOOP problem, a destination location
is the first scheme which exploits the overhearing feature of prediction (DLP) scheme was proposed in [27]. With
wireless transmission to propagate the location of a mobile DLP, each node searches its neighbour list for the sink
sink to a source. before it makes a packet forwarding decision based on the

Figure 1 Tracing of a mobile sink

718 IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727


& The Institution of Engineering and Technology 2010 doi: 10.1049/iet-com.2009.0197

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org

location information of sink. If the sink exists in the However, mobile sink also leads to detour path problem as
neighbour list and is located within the transmission range the real-line path shown in Fig. 1c. The detour path problem
of the packet holder, the packet is forwarded directly to the leads to increasing of data delivery delay and total energy
sink without further calculation for finding a closest consumption. An intuitive solution is that the mobile sink
neighbour to the destination. LOOP problems can be updates its new location to source in real-time manner, so
overcome by utilising the ID of nodes as well as location that the source can encapsulate the new location of sink
information. A significant amount of lost packets and into each data packet and forwards data packets to the sink
wasted network resources can be saved by avoiding along the dashed line path, as shown in Fig. 1c. The
misjudgement on the local maximum situation. The DLP existing solutions [14 –19] for supporting mobile sinks
scheme is efficient if the sink moves within the radio range may generate more or less overhead and delay. In the next
of the last hop forwarding node A as shown in Fig. 1a. section, we describe a new location propagation scheme
Considering the situation in Fig. 1b, when the sink moves which takes advantage of overhearing feature of wireless
outside of the radio range of the last hop forwarding node transmission.
A, the new location of the sink becomes unknown to node
A. DLP fails in this situation. Forwarding the data packet
to the node which is located closest to the location where 3.2 Sink location propagation scheme
the sink disappeared is an intuitive but unreliable way
An important feature of wireless communication is that
because of the uncertain mobility of the sink. To solve this
a node can overhear transmitting packets in the
problem, in elastic routing, besides sending periodic beacon
neighbourhood even if the packets are not destined for it.
messages to neighbour nodes, a sink also informs its
Elastic routing is motivated by the overhearing feature of
current location to the node from which it received the last
wireless transmission, where if the channel between two
data packet by greedy forwarding. In Fig. 1b, when the
nodes is bidirectional, the data transmission from one node
sink moves outside of the radio range of node A, it updates
can be overheard by the other node.
its new location to node A by greedy forwarding, then node
A resets the sink location information in the data packet to
As shown in Fig. 2, we assume that the source has
the new sink location and selects node B as the next hop
obtained the location of the mobile sink by some location
forwarding node to forward the subsequent data packets. In
service and forwards continuous data packets to the sink
this situation node B becomes the last hop forwarding node
by greedy forwarding. The mobile sink may move in three
to the sink. The mobility of the mobile sink can be traced
cases: (i) the sink moves within the radio range of the last
by this way. The mobile sink tracing scheme discussed
hop forwarding node A, but outside of the radio range of
above can guarantee continuous data delivery to a mobile
the last second hop forwarding node B, as shown in
sink. The function of a mobile sink is given as follows:
Fig. 2a; (ii) the sink moves into the radio range of last
second hop forwarding node B, as shown in Fig. 2b and
1. Sends beacon messages to announce its current location to (iii) the sink moves outside of the radio range of both
neighbour sensor nodes. nodes A and B, as shown in Fig. 2c. In the first case, the
source sends data packets along the path source ! C !
2. Checks whether it has moved outrange of the last hop B ! A ! sink by greedy forwarding. When the sink
forwarding node; if so, informs its current location to the moves to a new location inside the radio range of node A
last hop forwarding node by unicasting. but outside of the radio range of node B as shown in

Figure 2 Location propagation of a mobile sink

IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727 719


doi: 10.1049/iet-com.2009.0197 & The Institution of Engineering and Technology 2010
Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org

Fig. 2a, from the perspective of the source, since the sink in the received data packet to the new location and
movement of the sink is unknown to the source, the source directly sends them to the sink by greedy forwarding. In
still encapsulates the original location of the sink in each the third case, when the sink moves outside of the radio
data packet and forwards them towards the original range of both nodes A and B, as shown in Fig. 2c, the sink
location of the sink. Since we have assumed that all sensor detects this situation and sends its new location to node A
nodes are static, the data packets are sent along the original by greedy forwarding. Then node A resets the sink location
path source ! C ! B ! A until received by node A. information in the received data packets to the new
From the perspective of node A, since the sink moves location of the sink and then forwards them to the sink by
within its radio range, the new location of the sink can be greedy forwarding. The following processes are the same as
obtained by the beacon message of the sink, thus node A other two cases described above.
first resets the location information of the sink in the
received data packet to the new location of the sink and The above presentations only discuss the actions of the
then forwards it to the sink directly by the DLP scheme sensor nodes which have participated in data forwarding,
proposed in [27]; that is, if the sink exists in the neighbour for example, nodes A, B and C in Fig. 2. How about the
list and is located within the transmission range of the other sensor nodes which are located in the radio range of
packet holder, the packet is forwarded directly to the sink these forwarding node? From the above discussions we can
without further calculation for finding a closest neighbour see that the new location of the sink is propagated to
to the destination. We have assumed that the channel source along the reverse path of greedy forwarding. Thus,
between two neighbour nodes is bidirectional, so when the nearer to the sink, the fresher the sink location
node A forwards a data packet which contains the new information is. In elastic routing, when a node overhears a
location of the sink to the sink, the transmission can be transmission, it first extracts the sink location information
overheard by node B, thus node B obtains and caches the in the overheard packet, then compares whether it is farther
new location of the sink. Node B then resets the sink to that location than the originator of the transmission. If
location information in the subsequently received data so, it records the sink location information in memory,
packets to the cached new location of the sink and forwards otherwise, it just discards it. For instance, node M
them towards the sink by the greedy forwarding, as shown overhears a transmission from node N and the location
in Fig. 2d. Node C can also obtain the new location information in the overheard data packet is D. If
information of the sink by overhearing the transmission of MD . ND, this means node N is closer to D than node
node B, as shown in Fig. 2e. Finally, the new location M, thus node M believes that node N has a fresher sink
information of the sink can be propagated to the source location than itself, and so node M records location D
step-by-step during data forwarding. Then the source in memory. Otherwise, node M just discards the overheard
encapsulates the new location of the sink in each data packet. This location propagation scheme is crucial if a
packet and directly forwards them towards the sink as certain greedy forwarding node fails. Detailed explanation
shown in Fig. 2f. is given in Section 4.2. The function of sensor nodes for
location propagation of mobile sinks is summarised as
In the second case, if the sink moves into the radio range of follows:
the last second hop forwarding node B, as shown in Fig. 2b,
then node B can directly detect the location of the sink and 1. Checks whether the sink is located in its radio range; if so,
resets the location information of the sink in the received records the sink ID and location.
data packet to the new location and directly sends them
to the sink by DLP scheme. Node C overhears this 2. On overhearing a transmission, for instance, node M
transmission and also resets the location information of the overhears a transmission from node N (Fig. 3).

Figure 3 Location propagation algorithm of elastic routing

720 IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727


& The Institution of Engineering and Technology 2010 doi: 10.1049/iet-com.2009.0197

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org

4 Discussions
In this section, we extend the elastic routing to heterogeneous
sensor networks and discuss the robustness of elastic routing
protocol.

4.1 Elastic routing in heterogeneous


sensor networks Figure 4 Location propagation of a mobile sink in the case
The preceding descriptions are based on the assumption that of failing of an intermediate forwarding node
all sensor nodes have uniform unit disk radio range, that is,
the channel between two neighbour nodes is bidirectional. transmission of corresponding forwarding nodes, as
A practical sensor network may have heterogeneous nodes discussed in Section 3.2. Since the location propagation of
with different radio ranges, which leads to unidirectional the mobile sink was terminated because of the failure of
channels between neighbour sensor nodes. Another node D, thus the source still encapsulates the original
phenomenon termed radio irregularity [28] may also lead location of the sink in each data packet and forwards them
to unidirectional channels between neighbour sensor nodes towards the original location of the sink. Node E detects
even though they have the same radio range. The proposed the failure of node D and selects node F as a new next hop
location propagation scheme is achieved by overhearing the forwarding node. Since the original location of the sink
next hop transmission to obtain the new location of a is inside the shadow area, the new greedy forwarding path
mobile sink. The unidirectional channels may lead to a from node F certainly crosses with the boundary of the
node failure in overhearing the next hop transmission, thus shadow area. Thus, when a node inside the shadow area
fails to propagate the new sink location towards the source. (node G in Fig. 4) receives the data packets, it resets the
To solve this problem, a symmetric geographic forwarding sink location information in each packet to the new
(SGF) mechanism, which has been proposed in [28], can location and forwards them towards sink. At that time, the
be exploited by elastic routing. SGF allows a node to add propagation process of the new sink location can be
the IDs of all its neighbours it has discovered into a beacon continued from node G towards the source.
message. When a node receives a beacon message, it
registers the sender as its neighbour in its local neighbour 4.3 Location update of a continuous
table, and then checks whether its own ID is in the
beacon message. If the receiver finds its own ID in
moving sink
the neighbour list in the beacon message, then it marks the In this section, we discuss the location propagation process
channel connecting it to the sender as bidirectional. of a continuous moving sink. In Fig. 5, only the nodes
Otherwise, it marks the channel between them as which need to reset the location information in the received
unidirectional. Whenever a node needs to forward a packet, data packets are drawn out. The thin black arrowheaded
it selects only those neighbouring nodes with which it is lines indicate the greedy forwarding path towards the
connected through bidirectional channels. By using SGF original location of the sink. When the sink moves to sink0 ,
scheme, elastic routing forwards data packets only through the location of sink0 is propagated towards the source along
bidirectional channels, thus can guarantee that each the path A ! B ! C step-by-step. We assume that the
transmission can be overheard by the previous forwarding sink moves to sink00 when the location of sink0 is propagated
node. to node D. Node D resets the location information in the
received data packet to sink0 and forwards it to sink0 directly.
4.2 Failure of an intermediate However, at this time, the sink moves to sink00 and the new
location is detected by node F. Thus when node F received
forwarding node the data packet from node D, it resets the sink location
We have discussed that, for a static sensor network, the in the packet to location of sink00 and forwards the data
location of a mobile sink can be propagated to source along packets to sink00 . At this time, the location of sink00 is
the reverse path of greedy forwarding step-by-step. It propagated to node G by node F. In Fig. 5, the thick real
might happen that an intermediate forwarding node fails arrowheaded lines show the data forwarding paths along
because of exhaustion of energy or physical destruction, for
example, node D in Fig. 4. When the sink moves to a new
location, the new location of the sink is propagated to
source along the path A ! B ! C step-by-step. However,
the propagation is terminated because of the failure of node
D. The shaded disks in Fig. 4 indicate the radio range of
corresponding forwarding nodes. All sensor nodes within
the shaded area covered by these disks have obtained the
new location of the mobile sink by overhearing the Figure 5 Location update of a continuous moving sink

IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727 721


doi: 10.1049/iet-com.2009.0197 & The Institution of Engineering and Technology 2010
Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org

which, the sink location in all data packets were set to sink0 ; the triggers one-time location update if the sink moves 20 m
thick dotted arrowheaded lines show the data forwarding away from its previous location. The adaptive area of
paths along which, the sink location in all data packets were ALURP is set to be a circle with radius of 20 m. In elastic
set to sink00 . In short, the location of sink0 is propagated routing, the sink sends location announcement beacon
to source along the path A ! B ! C ! D ! E and the messages once it moves 1 m away from its previous
location of sink00 is propagated to source along the path location. Elastic routing exploits XYLS [5] for initial
F ! G ! H ! I ! J. Finally, the source obtains the location discovery of the mobile sink.
location of sink00 and encapsulates the location of sink00 in
each data packet and forwards them towards sink00 directly.
From the above discussion, we can see that the elastic
5.2 Analysis and simulation results
routing works like an elastic band with one end tied to a with different moving speeds
source and another end tied to a mobile sink. When the sink In elastic routing, a mobile sink sends periodic beacon
moves, the path between the sink and the source is inflected, messages to announce its current location and unicasts its
but finally converged to a line path like the shrinkage of an current location information to the last hop forwarding node
elastic band. with a short distance. No other special messages are used for
location propagation of a mobile sink. Location propagation
is done by overhearing the transmission of data packets, thus
5 Analysis and performance elastic routing does not generate significant overhead. In this
evaluations simulation scenario, a source which is randomly selected in
the network generates and forwards 128 bytes data packets
In this section, we analyse and evaluate the performance of at a constant rate of 10 packets/s. We vary the maximum
elastic routing with ALURP [17], LPTD [18] and TTDD sink moving speed from 1 to 10 m/s; a sink moves with a
[19]. Elastic routing exploits Column – Row Location random speed between 1 m/s and the maximum speed and
Service (XYLS) [5] location service to discover the location follows a random waypoint model. The simulation duration
of a sink initially. XYLS is a quorum-based location service is set to 500 s.
for WSNs, where a source sends a sink location query
message along east–west direction and a sink sends a sink In Fig. 6a, the control overhead of elastic routing consists
location announcement message along the south–north of the overhead of XYLS location service for initial location
direction, respectively, throughout the entire network, and the discovery of the mobile sink and a small quantity of beacon
intersection node informs the source about the sink location. messages sent by the sink for location announcement. Thus,
We use the following metrics for performance analysis and the control overhead of the elastic routing nearly remains
evaluations: the control overhead is defined as the total unchanged with the sink’s moving speed increasing. The
number of control packets. The average delivery delay is control overhead of TTDD consists of the overhead of
defined as the average time between the moment when a source-based grid construction and maintenance, and local
source sends a packet and the moment when a sink receives flooding within the area of about one grid size for the nearest
the packet. The energy consumption is defined as the total dissemination node discovery if the sink moves from one cell
energy consumption for location update of mobile sinks and to another. With the increasing moving speed, the number of
data delivery. The convergence time is defined as the time cells traversed by the sink also increases, thus the moving sink
required by a source to obtain the new location of a mobile requires more frequent local flooding for location update.
sink. The success delivery ratio is defined as the ratio of the In LPTD, once a sink moves 20 m away from its previous
number of data packet successfully received by the sink to the location, it needs flooding in its new location within the
number of data packets generated by the source. Owing to rendezvous points (line proxies). In our simulation, the
the maximum length limitations, we do not analyse ALURP, rendezvous point area is larger than the grid size of TTDD.
LPTD and TTDD in this paper. Detailed analysis of them So the local flooding overhead of LPTD is higher than that
can be found in [17–19]. This section focuses on analysing of TTDD. However, TTDD spends more overhead for grid
elastic routing and makes intuitive comparisons with other structure maintenance. Thus, the total overhead of TTDD is
protocols. The analysis results are validated by simulations. comparative as that of LPTD. The overhead of ALURP is
significantly higher than that of other protocols because of
frequent full-network flooding. If the sink moves within the
5.1 Simulation environments adaptive area, it just announces its location by local flooding
We implemented simulations in a network simulator Qualnet within the adaptive area, whereas if the sink moves out of the
3.8 and utilised IEEE 802.15.4 as the MAC protocol. The adaptive area, it needs to flood throughout the entire network.
transmission range of sensor nodes is set to 15 m. The size
of the sensor network is set to 250  250 m2, where 2000 The metric of energy consumption is closely related to the
nodes are randomly distributed. For all simulations, we use total transmission. Elastic routing exploits the overhearing
one source– sink pair for performance evaluation. The grid feature of wireless transmission for location propagation.
size of TTDD is set to 30 m. The width of rendezvous However, overhearing is not a special feature of elastic
points (line proxies) of LPTD is set to 20 m and LPTD routing, but a general feature of WSNs. In general, when a

722 IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727


& The Institution of Engineering and Technology 2010 doi: 10.1049/iet-com.2009.0197

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org

Figure 6 Simulation results with different moving speeds


a Control overhead impacted by sink mobility
b Energy consumption impacted by sink mobility
c Average delivery delay impacted by sink mobility
d Success delivery ratio impacted by sink mobility

node forwards a packet, all nodes within the node radio range delay. The per-hop forwarding delay is an inherent
need to overhear the transmission and check whether the characteristic in sensor networks; hence we do not discuss
packet is destined for them. A node just discards the the per-hop forwarding delay in this paper and just assume
overheard packet if the node is not a desired receiver or a that it is a fixed value tp . The average delivery delay can be
forwarding candidate of the packet. A little difference of represented as follows
the overhearing action in elastic routing is that a node
Pk
might extract the sink location information in an overheard 1 ntp
packet before discarding it. This extraction action does not TDelay ¼ (1)
k
consume significant energy. In fact, excessive energy
consumption is incurred because of the overhead of other where k is the total number of forwarded data packets and n is
protocols for location update of a mobile sink. We evaluate the hops between a source and a sink, thus ntp present the time
the energy consumption by using the parameter values in during which a packet was sent from the source to the sink.
[29], where the energy consumption to transmit and receive TTDD forwards data packets along grid structure, and the
p
a packet during one slot are 0.0100224 and 0.0113472 mJ, path length is at most 2 times the length of that of a
respectively. Fig. 6b shows the energy consumption of the straight line. Thus, when the other three protocols forwards
four protocols. Fig. 6b is similar to Fig. 6a, but the data packets along a nearly straight-line path, the ntp of
gradient of the curves in Fig. 6b are more gentle than that TTDD is significantly longer than that of the other three
of Fig. 6a. This is because most energy is consumed for protocols. In both ALURP and LPTD, if a sink moves with
data packets forwarding in all these protocols. a relative short distance from the previous location, data
packets are sent to the previous location and then sent to the
The average delivery delay of geographic routing is mostly sink in detour manner. If the sink moves far away from its
affected by two factors: path length and per-hop forwarding previous location, then the sink location update procedure is

IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727 723


doi: 10.1049/iet-com.2009.0197 & The Institution of Engineering and Technology 2010
Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org

triggered. While in elastic routing, the routing path tends to be 5.3 Simulation results with different
shrunk to a straight-line path even though the sink only moves packet generation rates
with a short distance, thus the ntp of elastic routing is further
shorter than that of ALURP and LPTD. The simulation We define the packet generation rate as the rate of the packets
results in Fig. 6c can validate this analysis result. generated and sent by a source. Among the four protocols,
only elastic routing exploits the overhearing feature of
The success delivery ratio is mostly affected by network wireless transmission to propagate the location of a mobile
collisions and the invalid location information of mobile sink to the source. The overhead for location update
sinks. In other words, before obtaining the new location of of a mobile sink in ALURP, LPTD and TTDD is
a mobile sink, a source still encapsulates the known original independent of the packet generation rate. In elastic
location of the sink in each data packet, and this invalid routing, a node obtains the sink location by overhearing the
location information may lead to unsuccessful data delivery. next hop data transmission. If a sink moves with a relative
Fig. 6d shows the success delivery ratio of these protocols higher speed and the data packets are generated by a source
affected by the sink mobility. Both TTDD and LPTD with a relative lower rate, then it might happen frequently
exploit agent nodes to trace a mobile sink, thus the success that a sink moves out of the radio range of the last hop
delivery ratio is mostly affected by collisions. In TTDD, a forwarding node during the interval between two times
mobile sink only floods within about a grid size area to find data transmissions. In this case, the sink must send
the nearest dissemination node if the sink moves to another its current location to the node from which it received the
grid. Although the flooding frequency is proportional to last data packet by unicasting, and this process may
the sink moving speed, but only flooding within a small generate a little overhead. In addition, since the location of
local area does not generate too many collisions, thus a sink is propagated to a source by overhearing the data
TTDD achieves a higher success delivery ratio. The transmission, thus a lower packet generation rate may lead
flooding areas of LPTD are two zonal areas which spread to a longer location propagation time. During the location
across the whole networks, and this leads to a wider propagation time, the sink may move to another location if
collision area compared to TTDD. In elastic routing, the the sink moves with a relative higher speed. As a result,
mobility of a sink can be traced by overhearing feature of data packets might be delivered to the sink in a flexural
the last hop forwarding node if the sink does not move too path, thus leads to a higher packet delivery delay. To verify
fast, and no flooding messages are required to support the the above discussion, we set a source at the centre of the
sink mobility. Thus elastic routing achieves higher success network and a sink moves around the source with a
delivery ratio. With a higher moving speed, the sink may random changing speed between 1 and 10 m/s. The
move out of the radio range of the last hop forwarding distance between the source and the sink is set to 100 m
node with a higher probability. In this case, the sink has to fixedly. The source generates and forwards 128 bytes data
inform its location to the last hop forwarding node by packets at a varying rate from 10 to 0.2 packet/s. The
unicasting, and the data packets forwarded by the last hop simulation duration is set to 500 s. Each simulation is done
forwarding node during this period are all dropped, thus ten times, and we take the average value as the simulation
leads to degradation in success delivery ratio. In ALURP, results.
once the sink moves out of the adaptive area, it has to
construct a new adaptive area by full-network flooding, and Fig. 7a shows the control overhead impacted by the packet
thus leads to a wider collision area. The data packets generation rate. In Fig. 7a, the packet generation rate does
delivered during this period are all dropped, thus ALURP not affect the control overhead of ALURP, LPTD and
achieves the worst success delivery ratio among these TTDD, whereas the control overhead of elastic routing
protocols. increases a little if the packet generation rate is less than

Figure 7 Simulation results with different packet generation rates


a Control overhead impacted by packet generation rate
b Average delivery delay impacted by packet generation rate
c Success delivery ratio impacted by the packet generation rate

724 IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727


& The Institution of Engineering and Technology 2010 doi: 10.1049/iet-com.2009.0197

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org

1 packet/s. In elastic routing, the location of the mobile success delivery ratio of elastic routing declines with
sink is propagated to source by overhearing feature of data decreasing packets generation rate. The simulation results
transmission. With a higher packet generation rate, the of TTDD, ALURP and LPTD in Fig. 7 undulate just a
sink location can be propagated several times within a short little because of the random changing speed of the mobile
moving distance, thus the sink do not require to inform its sink.
location to the last hop forwarding node by unicasting, and
only the periodic beacon messages are required for the sink
to announce its location to the neighbour nodes. With a 5.4 Convergence time with different
lower packet generation rate, the sink may move out of the distances and packet generation rates
radio range of the last hop forwarding node with a In elastic routing, we term the time required by a source
higher probability during the interval between two data to obtain the new location of a mobile sink as path
transmissions, thus the sink need to frequently inform its convergence time t. If a sink moves to a new location,
location to the last hop forwarding node. The lower the before obtaining the new location information, the source
packet generation rate is, the higher the probability still encapsulates the original location of the sink in each
becomes. This is the reason why the control overhead of data packet, thus data packets are sent along a flexural path
elastic routing increases a little with the decreasing packet to the sink until the source has obtained the new location
generation rate. This unicasting overhead is not significant, of the sink. Given a source and a mobile sink, the hop
because the distance between the sink and the last hop between the source and the sink travelled by greedy
forwarding node is not too long even though with a lower forwarding is m and the data packets transmission rate is n
packet generation rate. packets/s. According to Fig. 2, convergence time t can be
calculated as follows
Fig. 7b shows the average delivery delay impacted by
the packet generation rate. In ALURP, LPTD and TTDD, 8m
>
> (the case in Fig: 2a)
the data delivery path are independent of the packet >
>n
>
<m  1
generation rate, thus keep static with the packet generation
rate, whereas the average delivery delay of elastic routing t¼ (the case in Fig: 2b) (2)
> n
>
>
>
significantly degrades with decreasing of packet generation :m þ 1
> (the case in Fig: 2c)
rate. The reason is that, in elastic routing, a source usually n
encapsulates the original location of a sink into each data
packet until obtaining the new location of the sink. From The reason is that the location of a sink can be propagated
Fig. 5 we can see that if the sink is moving continuously, with one hop progress towards the source with each time
the data packets are usually delivered in a flexural path. The forwarding a data packet. Thus m hops propagation
more flexural the path is, the higher the average delivery requires m times data transmission. Thus, the convergence
delay becomes. In elastic routing, an intermediate time t can be calculated by (2). From (2) we can see that
forwarding node directly sends data packet to a sink once the convergence time t is directly proportional to the hop
it obtains the new sink location, thus the fast the location distance between a source and a sink and is inversely
propagation process is, the less flexural the path is. Since proportional to the packet generation rate. To verify the
the elastic routing propagates the sink location by above discussion, in the first simulation scenario, we set the
exploiting the overhearing feature of wireless transmission, distance between a source and a sink to 50, 100 and
so a lower packet generation rate leads to a lower location 150 m, respectively, and vary the packet generation rate
propagation speed, thus leads to a high packet delivery from 1 to 10 packets/s to evaluate the convergence time. In
delay. From Fig. 7b we can see that the elastic routing the second simulation scenario, we set the packet deliver
works well in terms of average delivery delay in case of high rate to 1, 5 and 10 packet/s, respectively, and vary the
packet generation rate. Supporting mobile sink with distance between a source and a sink from 20 to 200 m to
continuous data delivery is a key design object of elastic evaluate the convergence time. In both the simulation
routing. scenarios, the source sends data packets to the sink in a
steady-state, and then the sink moves 30 m distance around
Fig. 7c shows the success delivery ratio affected by the the source with a speed of 5 m/s. The convergence time is
packet generation rate. The success delivery ratio of calculated as the time between the moment when the sink
ALURP, LPTD and TTDD are independent of packet moves and the moment when the source obtains the final
generated rate. While in elastic routing, by using the location of the sink. From Figs. 8a and b, we can see that
overhearing feature of wireless data transmission for the convergence time t is directly proportional to the hop
location propagation of a mobile sink, a lower packet distance between a source and a sink and is inversely
generated rate leads to infrequent location propagation of proportional to the packet generation rate. In summary, a
the mobile sink. Thus, each time the sink moves out of the lower packet generation rate leads to a longer convergence
radio range of the last hop forwarding node, the data time and a higher data delivery delay, but we believe that
packets sent by the last hop forwarding node during the the location propagation scheme is well worth the gain in
moment are all dropped. From Fig. 7c we can see that the control overhead and energy consumption.

IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727 725


doi: 10.1049/iet-com.2009.0197 & The Institution of Engineering and Technology 2010
Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org

Figure 8 Convergence time with different packet generation rates and distances between the source and the sink
a Convergence time impacted by packet generation rate
b Convergence time impacted by the distance between the source and the sink

6 Conclusion [6] KARP B., KUNG H.T. : ‘GPSR: greedy perimeter stateless
routing for wireless networks’. Proc. Sixth Annual Int. Conf.
In this paper, we proposed a novel geographic routing scheme Mobile Computing and Networking, 2000, pp. 243– 254
termed elastic routing for supporting mobile sinks in WSNs.
Elastic routing takes advantage of the broadcast [7] BASAGNI S. , CHLAMTAC I. , SYROTIUK V., WOODWARD B.: ‘A
transmission nature of wireless sensor nodes. The location distance routing effect algorithm for mobility (DREAM)’.
propagation of mobile sink is achieved by overhearing the ACM MOBICOM, 1998, pp. 76– 84
data transmission of the next hop forwarding node. The
location of mobile sink is propagated to source along the [8] KO Y., VAIDYA N.: ‘Location-aided routing (LAR) in mobile
reverse path of geographic routing during data delivery. No ad hoc networks’, Wirel. Netw., 2000, 6, (4), pp. 307– 321
significant overhead is generated for location propagation of
a mobile sink. Elastic routing works like an elastic band with [9] KRANAKIS E., SINGH H. , URRUTIA J.: ‘Compass routing
one end tied to a source and another end tied to a mobile on geometric networks’. Proc. 11th Canadian Conf. on
sink. The routing path between a source and a sink adapts Computational Geometry, August 1999, pp. 51– 54
the movement of the sink in real time manner. Elastic
routing is superior to other protocols in terms of control [10] KUHN F., WATTENHOFER R., ZOLLINGER A.: ‘Worst-case optimal
overhead, data delivery delay and energy consumption. and average-case efficient geometric ad-hoc routing’.
ACM MOBIHOC, 2003, pp. 267 – 278
7 References [11] YU Y., GOVINDAN R., ESTRIN D.: ‘Geographical and energy
[1] LI J., JANNOTTI J., COUTO D., KARGER D., MORRIS R.: ‘A scalable aware routing: a recursive data dissemination protocol for
location service for geographic ad hoc routing’. ACM wireless sensor networks’. UCLA Computer Science
MOBICOM, 2000, pp. 120 – 130 Department Technical Report UCLA/CSD-TR-01-0023
Report, May, 2001
[2] XUE Y., LI B., NAHRSTEDT K.: ‘A scalable location management
scheme in mobile ad-hoc networks’. IEEE Annual Conf. Local [12] AL-KARAKI J.N., KAMAL A.E.: ‘Routing techniques in wireless
Computer Networks (LCN), 2001, pp. 102 – 111 sensor networks: a survey’, IEEE Trans. Wirel. Commun.,
2004, 11, (6), pp. 6 – 28
[3] HE T., HUANG C., BLUM B., STANKOVIC J., ABDELZAHER T.: ‘Range-
free localization schemes for large scale sensor networks’. [13] GANDHAM S.R., DAWANDE M., PRAKASH R. , VENKATESAN S.:
ACM MOBICOM, 2003, pp. 81– 95 ‘Energy efficient schemes for wireless sensor networks
with multiple mobile base stations’. Proc. IEEE
[4] SEADA K. , HELMY A.: ‘Rendezvous regions: a scalable GLOBECOM, San Francisco, CA, 2003, pp. 377 – 381
architecture for service location and data-centric storage
in large-scale wireless networks’. IEEE/ACM IPDPS Fourth [14] SHAH D., SHAKKOTTAI S.: ‘Oblivious routing with mobile
Int. Workshop on Algorithms for Wireless, Mobile, Ad Hoc fusion centers over a sensor network’. Proc. IEEE
and Sensor Networks (WMAN), 2004, pp. 218– 225 INFOCOM, Anchorage, AK, USA, 2007, pp. 1541 – 1549

[5] STOJMENOVIĆ I., LIU D., JIA X.: ‘A scalable quorum-based [15] COFFIN D., HOOK D.V., MCGARRY S., KOLEK S.: ‘Declarative ad-
location service in ad hoc and sensor networks’, hoc sensor networking’. SPIE Integrated Command
Int. J. Commun. Netw. Distrib. Syst., 2008, 1, (1), pp. 71– 94 Environments, 2000, pp. 109 – 120

726 IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727


& The Institution of Engineering and Technology 2010 doi: 10.1049/iet-com.2009.0197

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.
www.ietdl.org

[16] YE F. , ZHONG G. , LU S. , ZHANG L.: ‘Gradient broadcast: [23] LE H. , GUYENNET H., FELEA V. : ‘OBMAC: an overhearing
a robust data delivery protocol for large scale sensor based MAC protocol for wireless sensor networks’. Int.
networks’, ACM Wirel. Netw., 2005, 11, (3), pp. 285 – 298 Conf. Sensor Technologies and Applications, 2007,
pp. 547– 553
[17] WANG G., WANG T., JIA W., GUO M., LI J.: ‘Adaptive location
updates for mobile sinks in wireless sensor networks’, [24] YU K., GUO Y.J.: ‘Anchor-free localization algorithm and
J. Supercomput., 2009, 47, (2), pp. 127– 145 performance analysis in wireless sensor networks’, IET
Commun., 2009, 3, (4), pp. 549– 560
[18] LEE J., YU W., FU X.: ‘Energy-efficient target detection in
sensor networks using line proxies’, Int. J. Commun. Syst., [25] JI W.-W., LIU Z.: ‘Locating ineffective sensor nodes in
2008, 21, (3), pp. 251– 275 wireless sensor networks’, IET Commun., 2008, 2, (3),
pp. 432– 439
[19] YE F. , LUO H., CHENG J., LU S., ZHANG L.: ‘A two-tier data
dissemination model for large-scale wireless sensor [26] WANG W.D., ZHU Q.X.: ‘RSS-based Monte-Carlo localization
networks’. ACM MOBICOM, 2002, pp. 148– 159 for mobile sensor networks’, IET Commun., 2008, 2, (5),
pp. 673– 681
[20] CHENG K., LUI K., WU Y., TAM V.: ‘A distributed multihop time
synchronization protocol for wireless sensor networks using [27] SON D., HELMY A.: ‘The effect of mobility-induced location
pairwise broadcast synchronization’, IEEE Trans. Wirel. errors on geographic routing in mobile ad hoc and sensor
Commun., 2009, 8, (4), pp. 1764 – 1772 networks: analysis and improvement using mobility
prediction’, IEEE Trans. Mobile Comput., 2004, 3, (3),
[21] NOH K., SERPEDIN E., QARAQE K.: ‘A new approach for time pp. 233– 245
synchronization in wireless sensor networks: pairwise
broadcast synchronization’, IEEE Trans. Wirel. Commun., [28] ZHOU G., TIAN H., KRISHNAMURTHY S., STANKOVIC J.A.: ‘Models
2008, 7, (9), pp. 3318 – 3322 and solutions for radio irregularity in wireless sensor
networks’, ACM Trans. Sensor Netw. (TOSN), 2006, 2, (2),
[22] SSU K., CHOUA C., CHENG L.: ‘Using overhearing technique pp. 221– 262
to detect malicious packet-modifying attacks in wireless
sensor networks’, Elsevier Comput. Commun., 2007, 30, [29] Chipcon Products: ‘CC2420: ‘2.4 GHz IEEE 802.15.4/
(11 – 12), pp. 2342 – 2352 ZigBee-ready RF transceiver’ (Texas Instruments, 2007)

IET Commun., 2010, Vol. 4, Iss. 6, pp. 716– 727 727


doi: 10.1049/iet-com.2009.0197 & The Institution of Engineering and Technology 2010
Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:03:37 UTC from IEEE Xplore. Restrictions apply.

You might also like