8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
1/24
Click to edit Master subtitle style
4/24/12
Routing Protocols To Mitigate Congestion
In Wireless Sensor Networks
Supritha.C, Usha.M.C,Final Year BE, 8th SEM,
Department of CSE,
RYMEC,Bellary.
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
2/24
4/24/12
Contents
Introduction
Differentiated service
CAR
MCAR
SCAR
Performance Evaluation
Conclusion
References
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
3/24
4/24/12
Introduction
Wireless Sensor Networks
Congestion
Routing protocols
Conzone
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
4/24
4/24/12
Conzone
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
5/24
4/24/12
Proposed Scheme
Existing schemes consider all data to beequally important.
But not all data is equally important
High priority data(HP)
Low priority data(LP)
Differentiated service
Accommodate both, emphasize on HP
LP over longer routes
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
6/24
4/24/12
Contd..
Contributions of this paper
Congestion Aware routing (CAR)
MAC enhanced CAR (MCAR)
Secure CAR (SCAR)
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
7/24
4/24/12
Congestion Aware Routing(CAR)
CAR comprises three steps
1. Network formation
2. Conzone discovery
3. Differentiated routing
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
8/24
4/24/12
1.Network Formation
RYMEC,Bellary
This step divides the
nodes into On-conzone and
Off-conzone nodes
It forms a HP network
(HiNet) to forward HP data
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
9/24
4/24/12
HiNet formation Process
1. Sink broadcasts Build HiNet message
2. Nodes check whether they are joined
3. If not, message source is set as parent
4. Build HiNet is rebroadcasted again
5. Thus, all nodes become part of the graph
6. Periodic rebroadcast
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
10/24
4/24/12
2.Conzone Discovery
A Conzone must be discovered for the delivery of HP data.
Steps in conzone discovery algorithm
1. Critical area nodes broadcast To Sink messages.
2. When a node hears more than Alpha distinct To Sink messages, itmarks itself as on conzone.
3. This message is overheard by neighbors in the neighborhood
table.
4. Flood Destroy conzone message
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
11/24
4/24/12
3.Differentiated Routing
Routing details HP data
LP data generated within the conzone
A B C
LP data generated outside the conzone
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
12/24
4/24/12
MAC-Enhanced CAR(MCAR)
MCAR comprises three steps:
1. Network formation
2. Setting modes
3. Routing data.
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
13/24
4/24/12
1.Network Formation
The nodes are expected to be mobile.
Hence the HP paths are dynamically created.
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
14/24
4/24/12
2.Setting Modes
LP Mode
HP Mode
Shadow Mode
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
15/24
4/24/12
3.Routing
Route discovery is performed dynamically at
the time of HP event detection.
MCAR performs on-demand route discovery.
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
16/24
4/24/12
Security Issues in WSN
Data Authentication
Data secrecy
Replay Protection
Low energy consumption
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
17/24
4/24/12
Secure CAR(SCAR)
SCAR comprises five steps:
1. Formation of HP Routing Network
2. Conzone Discovery
3. Encryption
4. Differentiated Routing
5. DecryptionRYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
18/24
4/24/12
Encryption & Decryption
Encryption is the conversion of data into a
form called Cipher text that cannot be easily
understood by unauthorised users.
Decryption is the process of converting
encrypted data back to its original formwhich can be understood.
In SCAR we use symmetric keys for this.
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
19/24
4/24/12
esu s - er ormanceAnalysis
RYMEC,Bellary
Average no of received packets for
CAR
Average no of received packets for MCAR
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
20/24
4/24/12
Conclusion
Data delivery issues, in the presence of
congestion in wireless sensor networks are
analyzed.
CAR, suitable for networks with low mobility.
MCAR, designed for networks with highmobility.
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
21/24
4/24/12
Contd.. Both support effective HP data delivery in the
presence of congestion.
SCAR, offers a high level of security than the
previous approaches.
RYMEC,Bellary
Contd..
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
22/24
4/24/12
References
[1]K. Akkaya and M.F. Younis, An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks, Proc. 23rd IEEE Int Conf. Distributed ComputingSystems (ICDCS), pp. 710-715, 2003.
[2] C. Lu, B. Blum, T. Abdelzaher, J. Stankovic, and T. He, RAP: A Real-Time Communication Architecture for Large-Scale Wireless Sensor Networks.Eighth IEEE Real-Time and Embedded Technology and Applications Symp. (RTAS), pp. 55-66, 2002.
[3] H. Zhang, A. Arora, Y. Choi, and M. Gouda, Reliable Bursty Convergecast in Wireless Sensor Networks. ACM MobiHoc, 2005.
[4] P. Rogaway, M. Bellare, and J. Black. OCB: A block-cipher mode of operation for efficient authenticated encryption. In ACM TISSEC, November2001.
[5] Kumar, R. Crepaldi, R. Rowaihy, H. Harris, A.F. Guohong Cao Zorzi, M. La Porta, T.F,"Mitigating Performance Degradation in Congested SensorNetworks",IEEE Transactions on Mobile Computing,2008.
[6] C.-Y. Wan, S.B. Eisenman, and A.T. Campbell, CODA: Congestion Detection and Avoidance in Sensor Networks. First ACM Conf. EmbeddedNetworked Sensor Systems (SenSys), pp. 266-279, 2003.
[7] B. Hull, K. Jamieson, and H. Balakrishnan, Mitigating Congestion in Wireless Sensor Networks. Second ACM Conf. Embedded Networked SensorSystems (SenSys), 2004.
[8] Luk, M. Mezzour, G. Perrig, A. Gligor, V., 6th International Symposium on Information Processing in Sensor Networks, 2007.
[9] KASTEN, O. Energy consumption. http://www.inf.ethz.ch/ kasten/ research/bathtub/energy consumption.html.
[10] Draft Supplement to Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC)Enhancements for Quality of Service (QoS), IEEE 802.11e/ D4.0, Nov. 2002.
[11] G.-S. Ahn, L.-H. Sun, A. Veres, and A.T. Campbell, Swan: Service Differentiation in Stateless Wireless Ad Hoc Networks, Proc. IEEE INFOCOM,2002.
[12] S.R. Das, C.E. Perkins, and E.M. Belding-Royer, Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks, Proc.IEEE INFOCOM 00, pp. 3-12, 2000.
[13] C.T. Ee and R. Bajcsy, Congestion Control and Fairness for Many-to-One Routing in Sensor Networks, Proc. Second ACM Conf. EmbeddedNetworked Sensor Systems (SenSys 04), pp. 148-161, 2004.
[14] E. Felemban, C.-G. Lee, and E. Ekici, MMSPEED: Multipath Multi-SPEED Protocol for QoS Guarantee of Reliability and Timeliness in WirelessSensor Networks, IEEE Trans. Mobile Computing, vol. 6, pp. 738-754, 2006.
[15] T. He, J.A. Stankovic, C. Lu, and T. Abdelzaher, Speed: A Stateless Protocol for Real-Time Communication in Sensor Networks, Proc. 23rd IEEEIntl Conf. Distributed Computing Systems (ICDCS), 2003.RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
23/24
4/24/12
Any Questions??
RYMEC,Bellary
8/2/2019 Routing Protocols to Mitigate Congestion in WSN2003
24/24
4/24/12RYMEC Bellary
Top Related