Академический Документы
Профессиональный Документы
Культура Документы
Abstract
Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor net-
works where energy awareness is an essential consideration. Most of the attention, however, has been given to the
routing protocols since they might differ depending on the application and network architecture. This paper surveys
recent routing protocols for sensor networks and presents a classification for the various approaches pursued. The three
main categories explored in this paper are data-centric, hierarchical and location-based. Each routing protocol is de-
scribed and discussed under the appropriate category. Moreover, protocols using contemporary methodologies such as
network flow and quality of service modeling are also discussed. The paper concludes with open research issues.
2003 Elsevier B.V. All rights reserved.
1570-8705/$ - see front matter 2003 Elsevier B.V. All rights reserved.
doi:10.1016/j.adhoc.2003.09.010
ARTICLE IN PRESS
setup, a large number of sensors can be dropped redundancy in it since multiple sensors may gen-
by a helicopter. Networking these sensors can as- erate same data within the vicinity of a phenom-
sist rescue operations by locating survivors, iden- enon. Such redundancy needs to be exploited by
tifying risky areas and making the rescue crew the routing protocols to improve energy and
more aware of the overall situation. Such appli- bandwidth utilization. Fourth, sensor nodes are
cation of sensor networks not only can increase the tightly constrained in terms of transmission power,
efficiency of rescue operations but also ensure the on-board energy, processing capacity and storage
safety of the rescue crew. On the military side, and thus require careful resource management.
applications of sensor networks are numerous. For Due to such differences, many new algorithms
example, the use of networked set of sensors can have been proposed for the problem of routing
limit the need for personnel involvement in the data in sensor networks. These routing mecha-
usually dangerous reconnaissance missions. In nisms have considered the characteristics of sensor
addition, sensor networks can enable a more civic nodes along with the application and architecture
use of landmines by making them remotely con- requirements. Almost all of the routing protocols
trollable and target-specific in order to prevent can be classified as data-centric, hierarchical or
harming civilians and animals. Security applica- location-based although there are few distinct ones
tions of sensor networks include intrusion detec- based on network flow or quality of service (QoS)
tion and criminal hunting. awareness. Data-centric protocols are query-based
However, sensor nodes are constrained in en- and depend on the naming of desired data, which
ergy supply and bandwidth. Such constraints helps in eliminating many redundant transmis-
combined with a typical deployment of large sions. Hierarchical protocols aim at clustering the
number of sensor nodes have posed many chal- nodes so that cluster heads can do some aggrega-
lenges to the design and management of sensor tion and reduction of data in order to save energy.
networks. These challenges necessitate energy- Location-based protocols utilize the position
awareness at all layers of networking protocol information to relay the data to the desired regions
stack. The issues related to physical and link layers rather than the whole network. The last category
are generally common for all kind of sensor includes routing approaches that are based on
applications, therefore the research on these areas general network-flow modeling and protocols that
has been focused on system-level power awareness strive for meeting some QoS requirements along
such as dynamic voltage scaling, radio communi- with the routing function. In this paper, we will
cation hardware, low duty cycle issues, system explore the routing mechanisms for sensor net-
partitioning, energy-aware MAC protocols [6–10]. works developed in recent years. Each routing
At the network layer, the main aim is to find ways protocol is discussed under the proper category.
for energy-efficient route setup and reliable relay- Our aim is to help better understanding of the
ing of data from the sensor nodes to the sink so current routing protocols for wireless sensor net-
that the lifetime of the network is maximized. works and point out open issues that can be sub-
Routing in sensor networks is very challenging ject to further research.
due to several characteristics that distinguish them The paper is organized as follows. In the bal-
from contemporary communication and wireless ance of this section, we will briefly summarize the
ad hoc networks. First of all, it is not possible to system architecture design issues for sensor net-
build a global addressing scheme for the deploy- works and their implications on data routing. We
ment of sheer number of sensor nodes. Therefore, then set our work apart from prior surveys on
classical IP-based protocols cannot be applied to sensor networks. In the Section 2, data-centric
sensor networks. Second, in contrary to typical routing approaches are covered. Section 3 sum-
communication networks almost all applications marizes hierarchical routing protocols. Location-
of sensor networks require the flow of sensed data based routing in sensor networks is discussed in
from multiple regions (sources) to a particular Section 4. In Section 5, we describe other routing
sink. Third, generated data traffic has significant approaches that are based on network flow or QoS
ARTICLE IN PRESS
modeling. Finally, Section 6 concludes the paper tion of the sink or the cluster-head is also crucial in
with a comparative summary of the surveyed ap- terms of energy efficiency and performance. When
proaches and points out open research problems. the distribution of nodes is not uniform, optimal
clustering becomes a pressing issue to enable en-
1.1. System architecture and design issues ergy efficient network operation.
works [5,18,19], all sensor nodes are assumed to be through data aggregation. This technique has been
homogenous, having equal capacity in terms of used to achieve energy efficiency and traffic opti-
computation, communication and power. How- mization in a number of routing protocols
ever, depending on the application a node can be [18,20,24–27]. In some network architectures, all
dedicated to a particular special function such as aggregation functions are assigned to more pow-
relaying, sensing and aggregation since engaging erful and specialized nodes [11]. Data aggregation
the three functionalities at the same time on a node is also feasible through signal processing tech-
might quickly drain the energy of that node. Some niques. In that case, it is referred as data fusion
of the hierarchical protocols proposed in the lit- where a node is capable of producing a more
erature designate a cluster-head different from the accurate signal by reducing the noise and using
normal sensors. While some networks have picked some techniques such as beamforming to combine
cluster-heads from the deployed sensors [14,20,21], the signals [14].
in other applications a cluster-head is more pow-
erful than the sensor nodes in terms of energy, 1.2. Related work
bandwidth and memory [11,15]. In such cases, the
burden of transmission to the sink and aggregation The growing interest in wireless sensor net-
is handled by the cluster-head. works and the continual emergence of new archi-
Inclusion of heterogeneous set of sensors raises tectural techniques inspired some previous efforts
multiple technical issues related to data routing for surveying the characteristics, applications and
[22]. For instance, some applications might require communication protocols for such a technical area
a diverse mixture of sensors for monitoring tem- [1,13]. In this subsection we highlight the features
perature, pressure and humidity of the surround- that distinguish our survey and hint the difference
ing environment, detecting motion via acoustic in scope.
signatures and capturing the image or video The goal of [1] is to make a comprehensive
tracking of moving objects. These special sensors survey of design issues and techniques for sensor
either deployed independently or the functionality networks describing the physical constraints on
can be included on the normal sensors to be used sensor nodes and the protocols proposed in all
on demand. Reading generated from these sensors layers of network stack. Possible applications of
can be at different rates, subject to diverse quality sensor networks are also discussed. That survey is
of service constraints and following multiple data a good introductory for readers interested in the
delivery models, as explained earlier. Therefore, broad area. Although a number of routing pro-
such a heterogeneous environment makes data tocols for sensor networks are covered, the paper
routing more challenging. does not make a classification for such routing
protocols and the list of discussed protocols is not
1.1.6. Data aggregation/fusion meant to be complete given the scope of the sur-
Since sensor nodes might generate significant vey. Our survey is more focused and can serve
redundant data, similar packets from multiple those who like deeper insight for routing issues
nodes can be aggregated so that the number of and techniques in wireless sensor networks. To the
transmissions would be reduced. Data aggregation best of our knowledge, our paper is the first work
is the combination of data from different sources to make a classification of routing protocols in
by using functions such as suppression (eliminating sensor networks. Moreover, our work reflects the
duplicates), min, max and average [23]. Some of current state of art in routing research by including
these functions can be performed either partially a comprehensive list of recently proposed routing
or fully in each sensor node, by allowing sensor protocols.
nodes to conduct in-network data reduction Taxonomy of the different architectural attri-
[18,20,24]. Recognizing that computation would butes of sensor networks is developed in [13]. This
be less energy consuming than communication work gives a high-level description of what is
[14], substantial energy savings can be obtained considered a typical sensor network architecture
ARTICLE IN PRESS
along with its components. Sensor networks are section, we will describe these protocols in details
classified by considering several architectural fac- and highlight the key ideas.
tors such as network dynamics and the data
delivery model. Such classification is helpful for a
2.1. Flooding and gossiping
designer to select the appropriate infrastructure
for his/her application. However, the paper nei-
Flooding and gossiping [31] are two classical
ther describes any routing protocol nor talks
mechanisms to relay data in sensor networks
about the potential effects of infrastructure design
without the need for any routing algorithms and
on route setup. Our work is a dedicated study of
topology maintenance. In flooding, each sensor
the network layer, describing and categorizing the
receiving a data packet broadcasts it to all of its
different approaches for data routing. In addition,
neighbors and this process continues until the
we summarize different architectural design issues
packet arrives at the destination or the maximum
that may affect the performance of routing pro-
number of hops for the packet is reached. On the
tocols.
other hand, gossiping is a slightly enhanced ver-
sion of flooding where the receiving node sends the
packet to a randomly selected neighbor, which
2. Data-centric protocols
picks another random neighbor to forward the
packet to and so on.
In many applications of sensor networks, it is
Although flooding is very easy to implement, it
not feasible to assign global identifiers to each
has several drawbacks, see Figs. 1 and 2 redrawn
node due to the sheer number of nodes deployed.
from [25]. Such drawbacks include implosion
Such lack of global identification along with ran-
caused by duplicated messages sent to same node,
dom deployment of sensor nodes make it hard to
overlap when two nodes sensing the same region
select a specific set of sensor nodes to be queried.
send similar packets to the same neighbor and
Therefore, data is usually transmitted from every
resource blindness by consuming large amount of
sensor node within the deployment region with
energy without consideration for the energy con-
significant redundancy. Since this is very inefficient
straints [25]. Gossiping avoids the problem of
in terms of energy consumption, routing protocols
implosion by just selecting a random node to send
that will be able to select a set of sensor nodes and
the packet rather than broadcasting. However, this
utilize data aggregation during the relaying of data
cause delays in propagation of data through the
have been considered. This consideration has led
nodes.
to data-centric routing, which is different from
traditional address-based routing where routes are
created between addressable nodes managed in the
network layer of the communication stack.
In data-centric routing, the sink sends queries to A
(a) (a)
certain regions and waits for data from the sensors
located in the selected regions. Since data is being
requested through queries, attribute-based naming
is necessary to specify the properties of data. SPIN B C
[25] is the first data-centric protocol, which con-
siders data negotiation between nodes in order to
(a) (a)
eliminate redundant data and save energy. Later,
Directed Diffusion [18] has been developed and has D
become a breakthrough in data-centric routing.
Then, many other protocols have been proposed Fig. 1. The implosion problem. Node A starts by flooding its
either based on Directed Diffusion [26–28] or fol- data to all of its neighbors. D gets two same copies of data
lowing a similar concept [16,24,29,30]. In this eventually, which is not necessary.
ARTICLE IN PRESS
ADV DATA
A A A
B B B
REQ
A A DATA A
ADV
REQ
B B B
Fig. 4. Directed Diffusion protocol phases. (a) Interest propagation, (b) initial gradients setup, (c) data delivery along reinforced.
such as intrusion detection, which require reliable quently. Fig. 4, redrawn from [18], summarizes the
delivery of data packets over regular intervals. Directed Diffusion protocol.
Path repairs are also possible in Directed Dif-
2.3. Directed Diffusion fusion. When a path between a source and the sink
fails, a new or alternative path should be identi-
Directed Diffusion [18,19] is an important fied. For this, Directed Diffusion basically reini-
milestone in the data-centric routing research of tiates reinforcement by searching among other
sensor networks. The idea aims at diffusing data paths, which are sending data in lower rates.
through sensor nodes by using a naming scheme Ganesan et al. [32] suggest employing multiple
for the data. The main reason behind using such a paths in advance so that in case of a failure of a
scheme is to get rid of unnecessary operations of path, one of the alternative paths is chosen without
network layer routing in order to save energy. any cost for searching for another one. There is of
Direct Diffusion suggests the use of attribute-value course extra overhead of keeping these alternative
pairs for the data and queries the sensors in an on paths alive by using low data rate, which will
demand basis by using those pairs. In order to definitely use extra energy but more energy can be
create a query, an interest is defined using a list of saved when a path fails and a new path should be
attribute-value pairs such as name of objects, chosen.
interval, duration, geographical area, etc. The Directed Diffusion differs from SPIN in terms
interest is broadcast by a sink through its neigh- of the on demand data querying mechanism it has.
bors. Each node receiving the interest can do In Directed Diffusion the sink queries the sensor
caching for later use. The nodes also have the nodes if a specific data is available by flooding
ability to do in-network data aggregation, which is some tasks. In SPIN, sensors advertise the avail-
modeled as a minimum Steiner tree problem [23]. ability of data allowing interested nodes to query
The interests in the caches are then used to com- that data. Directed Diffusion has many advanta-
pare the received data with the values in the ges. Since it is data centric, all communication is
interests. The interest entry also contains several neighbor-to-neighbor with no need for a node
gradient fields. A gradient is a reply link to a addressing mechanism. Each node can do aggre-
neighbor from which the interest was received. It is gation and caching, in addition to sensing. Cach-
characterized by the data rate, duration and ing is a big advantage in terms of energy efficiency
expiration time derived from the received interestÕs and delay. In addition, Direct Diffusion is highly
fields. Hence, by utilizing interest and gradients, energy efficient since it is on demand and there is
paths are established between sink and sources. no need for maintaining global network topology.
Several paths can be established so that one of However, Directed Diffusion cannot be applied
them is selected by reinforcement. The sink resends to all sensor network applications since it is based
the original interest message through the selected on a query-driven data delivery model. The
path with a smaller interval hence reinforces the applications that require continuous data deliv-
source node on that path to send data more fre- ery to the sink will not work efficiently with a
ARTICLE IN PRESS
query-driven on demand data model. Therefore, Nj then calculates the average cost for reaching
Directed Diffusion is not a good choice as a the destination using the neighbors in the for-
routing protocol for the applications such as warding fable (FTj ) using the formula:
environmental monitoring. In addition, the nam- X
CostðNj Þ ¼ PNj ;Ni CNj ;Ni :
ing schemes used in Directed Diffusion are appli- i2FTj
cation dependent and each time should be defined
a priori. Moreover, the matching process for data This average cost for Nj is set in the cost field of
and queries might require some extra overhead at the request and forwarded.
the sensors. 2. Data communication phase: Each node for-
wards the packet by randomly choosing a node
2.4. Energy-aware routing from its forwarding table using the probabili-
ties.
Shah and Rabaey [29] proposed to use a set of 3. Route maintenance phase: Localized flooding is
sub-optimal paths occasionally to increase the performed infrequently to keep all the paths
lifetime of the network. These paths are chosen by alive.
means of a probability function, which depends on
the energy consumption of each path. Network The described approach is similar to Directed
survivability is the main metric that the approach Diffusion in the way potential paths from data
is concerned with. The approach argues that sources to the sink are discovered. In Directed
using the minimum energy path all the time will Diffusion, data is sent through multiple paths, one
deplete the energy of nodes on that path. Instead, of them being reinforced to send at higher rates.
one of the multiple paths is used with a certain On the other hand, Shah and Rabaey select a
probability so that the whole network lifetime in- single path randomly from the multiple alterna-
creases. The protocol assumes that each node is tives in order to save energy. Therefore, when
addressable through a class-based addressing compared to Directed Diffusion, it provides an
which includes the location and types of the nodes. overall improvement of 21.5% energy saving and a
There are 3 phases in the protocol: 44% increase in network lifetime. However, such
single path usage hinders the ability of recovering
1. Setup phase: Localized flooding occurs to find from a node or path failure as opposed to Directed
the routes and create the routing tables. While Diffusion. In addition, the approach requires
doing this, the total energy cost is calculated gathering the location information and setting up
in each node. For instance, if the request is sent the addressing mechanism for the nodes, which
from node Ni to node Nj , Nj calculates the cost complicate route setup compared to the Directed
of the path as follows: Diffusion.
CNj ;Ni ¼ CostðNi Þ þ MetricðNj ; Ni Þ:
2.5. Rumor routing
Here, the energy metric used captures transmis-
sion and reception costs along with the residual Rumor routing [26] is another variation of Di-
energy of the nodes. Paths that have a very high rected Diffusion and is mainly intended for con-
cost are discarded. The node selection is done texts in which geographic routing criteria are not
according to closeness to the destination. The applicable. Generally Directed Diffusion floods the
node assigns a probability to each of its neigh- query to the entire network when there is no
bors in routing (forwarding) table (FT) corre- geographic criterion to diffuse tasks. However, in
sponding to the formed paths. The probability is some cases there is only a little amount of data
inversely proportional to the cost, that is: requested from the nodes and thus the use of
1=CNj ;Ni flooding is unnecessary. An alternative approach is
PNj ;Ni ¼ P ; to flood the events if number of events is small and
k2FTj 1=CNj ;Nk number of queries is large. Rumor routing is be-
ARTICLE IN PRESS
tween event flooding and query flooding. The idea as a relay for multiple paths can create a data
is to route the queries to the nodes that have ob- combining entity in order to aggregate data. On
served a particular event rather than flooding the the other hand, three different data spreading
entire network to retrieve information about the techniques have been presented:
occurring events.
In order to flood events through the network, • Stochastic scheme: When there are two or more
the rumor routing algorithm employs long-lived next hops with the same gradient, the node
packets, called agents. When a node detects an chooses one of them at random.
event, it adds such event to its local table and • Energy-based scheme: When a nodeÕs energy
generates an agent. Agents travel the network in drops below a certain threshold, it increases
order to propagate information about local events its height so that other sensors are discouraged
to distant nodes. When a node generates a query from sending data to that node.
for an event, the nodes that know the route, can • Stream-based scheme: The idea is to divert new
respond to the query by referring its event table. streams away from nodes that are currently part
Hence, the cost of flooding the whole network is of the path of other streams.
avoided. Rumor routing maintains only one path
between source and destination as opposed to The data spreading schemes strives to achieve
Directed Diffusion where data can be sent through an even distribution of the traffic throughout the
multiple paths at low rates. whole network, which helps in balancing the load
Simulation results have shown that rumor on sensor nodes and increases the network life-
routing achieves significant energy saving over time. The employed techniques for traffic load
event flooding and can also handle nodeÕs failure. balancing and data fusion are also applicable to
However, rumor routing performs well only when other routing protocols for enhanced performance.
the number of events is small. For large number of Through simulation GBR has been shown to
events, the cost of maintaining agents and event- outperform Directed Diffusion in terms of total
tables in each node may not be amortized if communication energy.
there is not enough interest on those events from
the sink. Another issue to deal with is tuning the 2.7. CADR
overhead through adjusting parameters used in the
algorithm such as time-to-live for queries and Constrained anisotropic diffusion routing
agents. (CADR) [28] is a protocol, which strives to be a
general form of Directed Diffusion. Two tech-
2.6. Gradient-based routing niques namely information-driven sensor querying
(IDSQ) and constrained anisotropic diffusion
Schurgers et al. [27] have proposed a slightly routing are proposed. The idea is to query sensors
changed version of Directed Diffusion, called and route data in a network in order to maximize
Gradient-based routing (GBR). The idea is to keep the information gain, while minimizing the latency
the number of hops when the interest is diffused and bandwidth. This is achieved by activating only
through the network. Hence, each node can dis- the sensors that are close to a particular event and
cover the minimum number of hops to the sink, dynamically adjusting data routes. The major
which is called height of the node. The difference difference from Directed Diffusion is the consid-
between a nodeÕs height and that of its neighbor is eration of information gain in addition to the
considered the gradient on that link. A packet is communication cost. In CADR, each node evalu-
forwarded on a link with the largest gradient. ates an information/cost objective and routes data
The authors aim at using some auxiliary tech- based on the local information/cost gradient and
niques such as data aggregation and traffic end-user requirements. The information utility
spreading along with GBR in order to balance the measure is modeled using standard estimation
traffic uniformly over the network. Nodes acting theory.
ARTICLE IN PRESS
queries for data where a response can be provided scalable for a larger set of sensors covering a wider
by many nodes. Since, the data-centric approaches area of interest since the sensors are typically not
such as Directed Diffusion uses flooding-based capable of long-haul communication. To allow the
query mechanism for continuous and aggregate system to cope with additional load and to be able
queries; it would not make sense to use the same to cover a large area of interest without degrading
mechanism for one-shot complex queries due to the service, networking clustering has been pur-
energy considerations. ACQUIRE mechanism sued in some routing approaches.
provides efficient querying by adjusting the value The main aim of hierarchical routing is to effi-
of parameter d. Note that if d is equal to network ciently maintain the energy consumption of sensor
size, then the protocol behaves similar to flooding. nodes by involving them in multi-hop communi-
On the other hand, the query has to travel more cation within a particular cluster and by per-
hops if d is too small. forming data aggregation and fusion in order to
A mathematical modeling has been derived for decrease the number of transmitted messages to
the energy cost of the ACQUIRE approach and the sink. Cluster formation is typically based on
been compared to both flooding and ring search, the energy reserve of sensors and sensorÕs prox-
i.e. gradual increase in number of hops. An opti- imity to the cluster head [33,34]. LEACH [14] is
mal value of parameter d is calculated for a grid of one of the first hierarchical routing approaches for
sensors where each node has four immediate sensors networks. The idea proposed in LEACH
neighbors. However, there is no validation of re- has been an inspiration for many hierarchical
sults through simulation and the reception costs routing protocols [16,20,21,35], although some
have not taken into account during calculations. protocols have been independently developed
The problem of selecting the next node for [11,15]. We explore hierarchical routing protocols
forwarding the query, which ACQUIRE ad- in this section.
dresses, has been studied in CADR [28] and rumor
routing [26]. In CADR, as described earlier, the 3.1. LEACH
querying nodes uses IDSQ mechanism to deter-
mine which node can provide most useful infor- Low-energy adaptive clustering hierarchy
mation by using estimation theory. Rumor routing (LEACH) [14] is one of the most popular hierar-
[26] tries to forward query to a node, which knows chical routing algorithms for sensor networks. The
the path to the searched event. Since the nodes idea is to form clusters of the sensor nodes based
become aware of events through the event agents, on the received signal strength and use local cluster
the heuristic for defining the route of an event heads as routers to the sink. This will save energy
agent highly affects the performance of next hop since the transmissions will only be done by such
selection. In ACQUIRE, the next node to forward cluster heads rather than all sensor nodes. Optimal
the query is either picked randomly or the selec- number of cluster heads is estimated to be 5% of
tion is based on maximum potential of query sat- the total number of nodes.
isfaction [30]. All the data processing such as data fusion and
aggregation are local to the cluster. Cluster heads
change randomly over time in order to balance the
3. Hierarchical protocols energy dissipation of nodes. This decision is made
by the node choosing a random number between 0
Similar to other communication networks, and 1. The node becomes a cluster head for the
scalability is one of the major design attributes of current round if the number is less than the fol-
sensor networks. A single-tier network can cause lowing threshold:
the gateway to overload with the increase in sen-
( p
sors density. Such overload might cause latency in if n 2 G;
communication and inadequate tracking of events. T ðnÞ ¼ 1 p ðr mod 1=pÞ
In addition, the single-gateway architecture is not 0 otherwise;
ARTICLE IN PRESS
where p is the desired percentage of cluster heads The difference from LEACH is to use multi-hop
(e.g. 0.05), r is the current round, and G is the set routing by forming chains and selecting only one
of nodes that have not been cluster heads in the node to transmit to the base station instead of
last 1=p rounds. using multiple nodes. PEGASIS has been shown
LEACH achieves over a factor of 7 reduction in to outperform LEACH by about 100–300% for
energy dissipation compared to direct communi- different network sizes and topologies. Such per-
cation and a factor of 4–8 compared to the mini- formance gain is achieved through the elimination
mum transmission energy routing protocol. The of the overhead caused by dynamic cluster for-
nodes die randomly and dynamic clustering in- mation in LEACH and through decreasing the
creases lifetime of the system. LEACH is com- number of transmissions and reception by using
pletely distributed and requires no global data aggregation. However, PEGASIS introduces
knowledge of network. However, LEACH uses excessive delay for distant node on the chain. In
single-hop routing where each node can transmit addition the single leader can become a bottleneck.
directly to the cluster-head and the sink. There- Hierarchical-PEGASIS [21] is an extension to
fore, it is not applicable to networks deployed in PEGASIS, which aims at decreasing the delay in-
large regions. Furthermore, the idea of dynamic curred for packets during transmission to the base
clustering brings extra overhead, e.g. head chan- station and proposes a solution to the data gath-
ges, advertisements etc., which may diminish the ering problem by considering energy · delay met-
gain in energy consumption. ric. In order to reduce the delay in PEGASIS,
simultaneous transmissions of data messages are
3.2. PEGASIS and Hierarchical-PEGASIS pursued. To avoid collisions and possible signal
interference among the sensors, two approaches
Power-efficient GAthering in Sensor Informa- have been investigated. The first approach incor-
tion Systems (PEGASIS) [20] is an improvement porates signal coding, e.g. CDMA. In the second
of the LEACH protocol. Rather than forming approach only spatially separated nodes are al-
multiple clusters, PEGASIS forms chains from lowed to transmit at the same time.
sensor nodes so that each node transmits and re- The chain-based protocol with CDMA capable
ceives from a neighbor and only one node is se- nodes, constructs a chain of nodes, that forms a
lected from that chain to transmit to the base tree like hierarchy, and each selected node in a
station (sink). Gathered data moves from node to particular level transmits data to the node in the
node, aggregated and eventually sent to the base upper level of the hierarchy. This method ensures
station. The chain construction is performed in a data transmitting in parallel and reduces the delay
greedy way. As shown in Fig. 6 node c0 passes its significantly. Since the tree is balanced, the delay
data to node c1. Node c1 aggregates node c0Õs data will be in O(lg N ) where N is the number of nodes.
with its own and then transmits to the leader. After For instance, in Fig. 7 redrawn from [21], node c3
node c2 passes the token to node c4, node c4
transmits its data to node c3. Node c3 aggregates
node c4Õs data with its own and then transmits to
the leader. Node c2 waits to receive data from both BS
neighbors and then aggregates its data with its
neighborsÕ data. Finally, node c2 transmits one
c3
message to the base station.
→
c3 c7
c0 → c1 → c2 → c3 → c4 c1 → c3 → c5 → c7
Base Station c0 → c1 c2 → c3 c4 → c5 c6 → c7
Fig. 6. Chaining in PEGASIS. Fig. 7. Data gathering in a chain based binary scheme.
ARTICLE IN PRESS
3.4. Energy-aware routing for cluster-based sensor Fig. 9. A typical cluster in a sensor network.
networks
Younis et al. [15] have proposed a different sidered inactive and can turn off its sensing and
hierarchical routing algorithm based on a three- communication circuitry.
tier architecture. Sensors are grouped into clusters Fig. 9, redrawn from [15], shows an example of
prior to network operation. The algorithm em- the state of sensors and routes within a typical
ploys cluster heads, namely gateways, which are cluster for a target-tracking application. A cost
less energy constrained than sensors and assumed function is defined between any two nodes in terms
to know the location of sensor nodes. Gateways of energy consumption, delay optimization and
maintain the states of the sensors and sets up other performance metrics. Using this cost func-
multi-hop routes for collecting sensorsÕ data. A tion as the link cost, a least-cost path is found
TDMA based MAC is used for nodes to send data between sensor nodes and the gateway. The gate-
to the gateway. The gateway informs each node way will continuously monitor the available en-
about slots in which it should listen to other nodesÕ ergy level at every sensor that is active in data
transmission and slots, which the node can use for processing, sensing, or in forwarding data packets,
its own transmission. The command node (sink) relaying. Rerouting is triggered by an application-
communicates only with the gateways. related event requiring different set of sensors to
The sensor is assumed to be capable of oper- probe the environment or the depletion of the
ating in an active mode or a low-power stand-by battery of an active node.
mode. The sensing and processing circuits can be A variant of this routing approach has been
powered on and off. In addition both the radio proposed in [36]. The algorithm constrains the
transmitter and receiver can be independently minimum transmission range in order to limit the
turned on and off and the transmission power can delay. Simulation results have demonstrated that
be programmed based on the required range. The such approach consistently performs well with re-
sensor nodes in a cluster can be in one of four spect to both energy-based metrics, e.g. network
main states: sensing only, relaying only, sensing- lifetime, as well as contemporary metrics, e.g.
relaying, and inactive. In the sensing state, the throughput and end-to-end delay. The results also
node probes the environment and generates data have indicated that combining the routing ap-
at a constant rate. In the relaying state, the node proach with the time-based medium arbitration
does not sense the target but its communications can further increase the life of the network by an
circuitry is on to relay the data from other active order of magnitude. However, such approach as-
nodes. When a node is both sensing and relaying sumes simple propagation model, which might
messages from other nodes, it is considered in the require the deployment of many gateways to en-
sensing-relaying state. Otherwise, the node is con- sure high sensor coverage. The approach is further
ARTICLE IN PRESS
extended in [37] to overcome ambiguity in signal Each node informs the neighbors about its rout-
propagation by introducing an additional tier to ing table and energy level. LML are used to
the network. Basically nodes that are not reach- maintain broadcast trees.
able are assigned an agent sensor to convey com- • Self-reorganization phase: In case of partition
mands from the gateway and pass nodes status or node failures, group reorganizations are per-
back to the gateway. formed.
4.3. GEAR
network flow and QoS. In some approaches, route residual energy that reflect the forecasted energy
setup is modeled and solved as a network flow consumption rate.
problem. QoS-aware protocols consider end-to-
end delay requirements while setting up the paths
5.2. Maximum lifetime data gathering
in the sensor network. We discuss sample of these
protocols in this section.
Kalpakis et al. [46] models the data routes setup
in sensor networks as the maximum lifetime data-
5.1. Maximum lifetime energy routing gathering problem and presents a polynomial time
algorithm. The lifetime ‘‘T ’’ of the system is de-
Chang and Tassiulas [45] presents an interesting fined as the number of rounds or periodic data
solution to the problem of routing in sensor net- readings from sensors until the first sensor dies.
works based on a network flow approach. The The data-gathering schedule specifies for each
main objective of the approach is to maximize the round how to get and route data to the sink. A
network lifetime by carefully defining link cost as a schedule has one tree for each round, which is
function of node remaining energy and the re- directed from the sink and spans all the nodes in
quired transmission energy using that link. Find- the system. The system lifetime depends on the
ing traffic distribution is a possible solution to the duration for which the schedule remains valid. The
routing problem in sensor networks and based on aim is to maximize the lifetime of the schedule. An
that, comes the name ‘‘maximum lifetime energy algorithm called maximum lifetime data aggrega-
routing’’. The solution to this problem maximizes tion (MLDA) is proposed. The algorithm consid-
the feasible time the network lasts. In order to find ers data aggregation while setting up maximum
out the best link metric for the stated maximiza- lifetime routes. In this case, if a schedule ‘‘S’’ with
tion problem, two maximum residual energy path ‘‘T ’’ rounds is considered, it induces a flow net-
algorithms are presented and simulated. The two work G. The flow network with maximum lifetime
algorithms differ in their definition of link costs subject to the energy constraints of sensor nodes is
and the incorporation of nodesÕ residual energy. called an optimal admissible flow network. Then, a
Rather than using eij , the energy consumed when a schedule is constructed by using this admissible
packet is transmitted over link i–j, the following flow network. The paper presents an algorithm for
link costs are used: generating such schedule.
A variant of the problem is also considered for
1 eij the applications where data aggregation is not
cij ¼ and cij ¼
Ei eij Ei possible, i.e. steams from video sensors. In this
case, the scenario is called maximum lifetime data
where Ei is the residual energy at node i. routing (MLDR) and is modeled as a network flow
By using Bellman–Ford shortest path algorithm problem with energy constraints on sensors. A
for the above link costs, the least cost paths to the solution with integer programming is presented.
destination (gateway) are found. The least cost Both MLDR and MLDA are implemented and
path obtained is the path whose residual energy is compared to hierarchical-PEGASIS [21] in terms
largest among all the paths. The algorithms uti- of system lifetime. The results show that both of
lizing these link costs are compared to Minimum them perform significantly better than hierarchi-
transmitted energy (MTE) algorithm, which con- cal-PEGASIS. However, in MLDA the delay for a
siders eij as the link cost. Simulation results show data packet is slightly greater than hierarchical-
that the proposed maximum residual energy path PEGASIS. While MLDA is performing better
approach has better average lifetime than MTE for than the other protocols in terms of system life-
both link cost models. This is due to the absolute time, the algorithm is computationally expensive
residual energy metric that MTE uses. The newly for very large sensor networks. Therefore, the
proposed metrics are concerned with relative authors propose another solution (CMLDA)
ARTICLE IN PRESS
based on clustering to ensure scalability of the flooding could be reduced by a factor of 50 using
algorithm in [47]. the back off based algorithm with a proper setting
of the back off timer.
Minimum cost forwarding protocol [48] aims Sequential assignment routing (SAR) is the first
at finding the minimum cost path in a large protocol for sensor networks that includes the
sensor network, which will also be simple and notion of QoS in its routing decisions [1,2]. It is a
scalable. The protocol is not really flow-based, table-driven multi-path approach striving to
however since data flows over the minimum achieve energy efficiency and fault tolerance. The
cost path and the resources on the nodes are up- SAR protocol creates trees rooted at one-hop
dated after each flow, we have included it in this neighbors of the sink by taking QoS metric, energy
section. resource on each path and priority level of each
The cost function for the protocol captures the packet into consideration. By using created trees,
effect of delay, throughput and energy consump- multiple paths from sink to sensors are formed.
tion from any node to the sink. There are two One of these paths is selected according to the
phases in the protocol. First phase is a setup phase energy resources and QoS on the path. Failure
for setting the cost value in all nodes. It starts from recovery is done by enforcing routing table con-
the sink and diffuses through the network. Every sistency between upstream and downstream nodes
node adjusts its cost value by adding the cost of on each path. Any local failure causes an auto-
the node it received the message from and the cost matic path restoration procedure locally. Simula-
of the link. Such cost adjustment is not done tion results show that SAR offers less power
through flooding. Instead, a back-off based algo- consumption than the minimum-energy metric
rithm is used in order to limit the number of algorithm, which focuses only the energy con-
messages exchanged. The forwarding of message is sumption of each packet without considering its
deferred for a preset duration to allow the message priority. SAR maintains multiple paths from
with a minimum cost to arrive. Hence, the algo- nodes to sink. Although, this ensures fault-toler-
rithm finds optimal cost of all nodes to the sink by ance and easy recovery, the protocol suffers from
using only one message at each node. Once these the overhead of maintaining the tables and states
cost fields are set, there will be no need to keep at each sensor node especially when the number of
next hop states for the nodes. This will ensure nodes is huge.
scalability.
In the second phase, the source broadcasts the 5.5. Energy-aware QoS routing protocol
data to its neighbors. The nodes receiving the
broadcast message, adds its transmission cost (to A fairly new QoS aware protocol for sensor
sink) to the cost of the packet. Then the node networks is proposed by Akkaya and Younis [22].
checks the remaining cost in the packet. If the Real-time traffic is generated by imaging sensors.
remaining cost of the packet is not sufficient to The proposed protocol extends the routing ap-
reach the sink, the packet is dropped. Otherwise proach in [15] and finds a least cost and energy
the node forwards the packet to its neighbors. The efficient path that meets certain end-to-end delay
protocol does not require any addresses and for- during the connection. The link cost used is a
warding paths. Simulation results show that the function that captures the nodesÕ energy reserve,
cost values for each node obtained by the pro- transmission energy, error rate and other com-
posed protocol is same as flooding. As a conse- munication parameters.
quence, optimal forwarding is achieved with In order to support both best effort and real-
minimum number of advertisement messages. The time traffic at the same time, a class-based queu-
average number of advertisement messages in ing model is employed. The queuing model allows
ARTICLE IN PRESS
(AODV) [52], SPEED performs better in terms of in sensor networks and classified the approaches
end-to-end delay and miss ratio. Moreover, the into three main categories, namely data-centric,
total transmission energy is less due to the sim- hierarchical and location-based. Few other pro-
plicity of the routing algorithm, i.e. control packet tocols followed the traditional network flow and
overhead is less, and to the even traffic distribu- QoS modeling methodology. However, we have
tion. Such load balancing is achieved through the also observed that there are some hybrid protocols
SNGF mechanism of dispersing packets into a that fit under more than one category as shown in
large relay area [50]. As explained earlier, similar Table 1. The table summarizes the classification of
energy saving technique is used in GBR [27] by the protocols covered in this survey. We also in-
spreading traffic uniformly through the network. cluded in the table whether the protocol is utilizing
SPEED does not consider any further energy data aggregation or not, since it is an important
metric in its routing protocol. Therefore, for more consideration for routing protocols in terms of
realistic understanding of SPEEDÕs energy con- energy saving and traffic optimization.
sumption, there is a need for comparing it to a Protocols, which name the data and query the
routing protocol, which is energy-aware. nodes based on some attributes of the data are
categorized as data-centric. Many of the
researchers follow this paradigm in order to avoid
6. Conclusion and open issues the overhead of forming clusters, the use of spe-
cialized nodes etc. However, the naming schemes
Routing in sensor networks has attracted a lot such as attribute-value pairs might not be sufficient
of attention in the recent years and introduced for complex queries and they are usually depen-
unique challenges compared to traditional data dent on the application. Efficient standard naming
routing in wired networks. In this paper, we have schemes are one of the most interesting future re-
summarized recent research results on data routing search direction related to this category.
Table 1
Classification of routing protocols in sensor networks
Routing protocol Data-centric Hierarchical Location- QoS Network-flow Data aggregation
based
SPIN U U
Directed Diffusion U U
Rumor routing U U
Shah and Rabaey U U
GBR U U
CADR U
COUGAR U U
ACQUIRE U
Fe et al. U
LEACH U U
TEEN and APTEEN U U U
PEGASIS U U
Younis et al. U U
Subramanian and Katz U U
MECN and SMECN U
GAF U U
GEAR U
Chang and Tassiulas U U
Kalpakis et al. U U
Akkaya et al. U U
SAR U
SPEED U U
ARTICLE IN PRESS
On the other hand, cluster-based routing pro- bile. In such cases, the frequent update of the
tocols group sensor nodes to efficiently relay the position of the command node and the sensor
sensed data to the sink. The cluster heads are nodes and the propagation of that information
sometimes chosen as specialized nodes that are less through the network may excessively drain the
energy-constrained. A cluster-head performs energy of nodes. New routing algorithms are
aggregation of data and sends it to the sink on needed in order to handle the overhead of
behalf of the nodes within its cluster. The most mobility and topology changes in such energy
interesting research issue regarding such protocols constrained environment.
is how to form the clusters so that the energy Other possible future research for routing
consumption and contemporary communication protocols includes the integration of sensor net-
metrics such as latency are optimized. The factors works with wired networks (i.e. Internet). Most of
affecting cluster formation and cluster-head com- the applications in security and environmental
munication are open issues for future research. monitoring require the data collected from the
Moreover, the process of data aggregation and sensor nodes to be transmitted to a server so that
fusion among clusters is also an interesting prob- further analysis can be done. On the other hand,
lem to explore. the requests from the user should be made to the
Protocols that utilize the location information sink through Internet. Since the routing require-
and topological deployment of sensor nodes are ments of each environment are different, further
classified as location-based. The number of en- research is necessary for handling these kinds of
ergy-aware location-based approaches found in situations.
the literature is rather small. The problem of
intelligent utilization of the location information
in order to aid energy efficient routing is the main References
research issue. Spatial queries and databases using
[1] I.F. Akyildiz et al., Wireless sensor networks: a survey,
distributed sensor nodes and interacting with the
Computer Networks 38 (4) (2002) 393–422.
location-based routing protocol are open issues for [2] K. Sohrabi et al., Protocols for self-organization of a
further research. wireless sensor network, IEEE Personal Communications 7
Although the performance of these protocols is (5) (2000) 16–27.
promising in terms of energy efficiency, further [3] R. Min, et al., Low power wireless sensor networks, in:
Proceedings of International Conference on VLSI Design,
research would be needed to address issues such as
Bangalore, India, January 2001.
quality of service posed by video and imaging [4] J.M. Rabaey et al., PicoRadio supports ad hoc ultra low
sensors and real-time applications. Energy-aware power wireless networking, IEEE Computer 33 (7) (2000)
QoS routing in sensor networks will ensure guar- 42–48.
anteed bandwidth (or delay) through the duration [5] R.H. Katz, J.M. Kahn, K.S.J. Pister, Mobile networking
for smart dust, in: Proceedings of the 5th Annual ACM/
of connection as well as providing the use of most
IEEE International Conference on Mobile Computing and
energy efficient path. QoS routing in sensor net- Networking (MobiComÕ99), Seattle, WA, August 1999.
works have several applications including real time [6] W.R. Heinzelman, et al., Energy-scalable algorithms and
target tracking in battle environments, emergent protocols for wireless sensor networks, in: Proceedings of
event triggering in monitoring applications etc. the International Conference on Acoustics, Speech, and
Signal Processing (ICASSP Õ00), Istanbul, Turkey, June
Currently, there is very little research that looks at
2000.
handling QoS requirements in a very energy con- [7] R. Min, et al., An architecture for a power aware
strained environment like sensor networks. distributed microsensor node, in: Proceedings of the IEEE
Another interesting issue for routing protocols Workshop on signal processing systems (SIPSÕ00), October
is the consideration of node mobility. Most of the 2000.
[8] A. Woo, D. Culler. A transmission control scheme for
current protocols assume that the sensor nodes
media access in sensor networks, in: Proceedings of the 7th
and the sink are stationary. However, there might Annual ACM/IEEE International Conference on Mobile
be situations such as battle environments where Computing and Networking (MobicomÕ01), Rome, Italy,
the sink and possibly the sensors need to be mo- July 2001.
ARTICLE IN PRESS
[9] W. Ye, J. Heidemann, D. Estrin, An energy-efficient MAC the IEEE Workshop on Mobile and Wireless Networks
protocol for wireless sensor networks, in: Proceedings of (MWN 2003), Providence, RI, May 2003.
IEEE Infocom 2002, New York, June 2002. [23] B. Krishnamachari, D. Estrin, S. Wicker, Modeling data
[10] E. Shih, et al., Physical layer driven protocol and algorithm centric routing in wireless sensor networks, in: Proceedings
design for energy-efficient wireless sensor networks, in: of IEEE INFOCOM, New York, June 2002.
Proceedings of the 7th Annual ACM/IEEE International [24] Y. Yao, J. Gehrke, The cougar approach to in-network
Conference on Mobile Computing and Networking (Mo- query processing in sensor networks, in: SIGMOD Record,
bicomÕ01), Rome, Italy, July 2001. September 2002.
[11] L. Subramanian, R.H. Katz, An architecture for building [25] W. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive
self configurable systems, in: Proceedings of IEEE/ACM protocols for information dissemination in wireless sensor
Workshop on Mobile Ad Hoc Networking and Comput- networks, in: Proceedings of the 5th Annual ACM/IEEE
ing, Boston, MA, August 2000. International Conference on Mobile Computing and Net-
[12] F. Ye et al., A two-tier data dissemination model for large- working (MobiComÕ99), Seattle, WA, August 1999.
scale wireless sensor networks, in: Proceedings of Mobi- [26] D. Braginsky, D. Estrin, Rumor routing algorithm for
comÕ02, Atlanta, GA, September, 2002. sensor networks, in: Proceedings of the First Workshop on
[13] S. Tilak et al., A taxonomy of wireless microsensor Sensor Networks and Applications (WSNA), Atlanta, GA,
network models, Mobile Computing and Communications October 2002.
Review 6 (2) (2002) 28–36. [27] C. Schurgers, M.B. Srivastava, Energy efficient routing in
[14] W. Heinzelman, A. Chandrakasan, H. Balakrishnan, wireless sensor networks, in: The MILCOM Proceedings
Energy-efficient communication protocol for wireless sen- on Communications for Network-Centric Operations:
sor networks, in: Proceeding of the Hawaii International Creating the Information Force, McLean, VA, 2001.
Conference System Sciences, Hawaii, January 2000. [28] M. Chu, H. Haussecker, F. Zhao, Scalable information-
[15] M. Younis, M. Youssef, K. Arisha, Energy-aware routing driven sensor querying and routing for ad hoc heteroge-
in cluster-based sensor networks, in: Proceedings of the neous sensor networks, The International Journal of High
10th IEEE/ACM International Symposium on Modeling, Performance Computing Applications 16 (3) (2002) 293–
Analysis and Simulation of Computer and Telecommuni- 313.
cation Systems (MASCOTS2002), Fort Worth, TX, [29] R. Shah, J. Rabaey, Energy aware routing for low energy
October 2002. ad hoc sensor networks, in: Proceedings of the IEEE
[16] A. Manjeshwar, D.P. Agrawal, TEEN: a protocol for Wireless Communications and Networking Conference
enhanced efficiency in wireless sensor networks, in: Pro- (WCNC), Orlando, FL, March 2002.
ceedings of the 1st International Workshop on Parallel and [30] N. Sadagopan et al., The ACQUIRE mechanism for
Distributed Computing Issues in Wireless Networks and efficient querying in sensor networks, in: Proceedings of the
Mobile Computing, San Francisco, CA, April 2001. First International Workshop on Sensor Network Protocol
[17] W. Heinzelman, Application specific protocol architectures and Applications, Anchorage, AK, May 2003.
for wireless networks, PhD Thesis, MIT, 2000. [31] S. Hedetniemi, A. Liestman, A survey of gossiping and
[18] C. Intanagonwiwat, R. Govindan, D. Estrin, Directed broadcasting in communication networks, Networks 18 (4)
diffusion: a scalable and robust communication paradigm (1988) 319–349.
for sensor networks, in: Proceedings of the 6th Annual [32] D. Ganesan et al., Highly resilient, energy efficient multi-
ACM/IEEE International Conference on Mobile Comput- path routing in wireless sensor networks, Mobile Comput-
ing and Networking (MobiComÕ00), Boston, MA, August ing and Communications Review 5 (4) (2002) 11–25.
2000. [33] A. Buczak, V. Jamalabad, Self-organization of a hetero-
[19] D. Estrin, et al., Next century challenges: scalable coordi- geneous sensor network by genetic algorithms, in: C.H.
nation in sensor networks, in: Proceedings of the 5th Dagli et al. (Eds.), Intelligent Engineering Systems
annual ACM/IEEE International Conference on Mobile Through Artificial Neural Networks, vol. 8, ASME Press,
Computing and Networking (MobiComÕ99), Seattle, WA, New York, 1998, pp. 259–264.
August 1999. [34] C.R. Lin, M. Gerla, Adaptive clustering for mobile wireless
[20] S. Lindsey, C.S. Raghavendra, PEGASIS: power efficient networks, IEEE Journal on Selected Areas in Communi-
gathering in sensor information systems, in: Proceedings of cations 15 (7) (1997) 1265–1275.
the IEEE Aerospace Conference, Big Sky, Montana, [35] A. Manjeshwar, D.P. Agrawal, APTEEN: a hybrid proto-
March 2002. col for efficient routing and comprehensive information
[21] S. Lindsey, C.S. Raghavendra, K. Sivalingam, Data retrieval in wireless sensor networks, in: Proceedings of the
gathering in sensor networks using the energy*delay 2nd International Workshop on Parallel and Distributed
metric, in: Proceedings of the IPDPS Workshop on Issues Computing Issues in Wireless Networks and Mobile
in Wireless Networks and Mobile Computing, San Fran- computing, Ft. Lauderdale, FL, April 2002.
cisco, CA, April 2001. [36] M. Youssef, M. Younis, K. Arisha, A constrained shortest-
[22] K. Akkaya, M. Younis, An energy-aware QoS routing path energy-aware routing algorithm for wireless sensor
protocol for wireless sensor networks, in: Proceedings of networks, in: Proceedings of the IEEE Wireless Commu-
ARTICLE IN PRESS
nication and Networks Conference (WCNC 2002), Orlando, [49] K. Akkaya, M. Younis, Energy and QoS aware routing in
FL, March 2002. wireless sensor networks, Cluster Computing, in press.
[37] M. Younis, P. Munshi, E. Al-Shaer, Architecture for [50] T. He et al., SPEED: a stateless protocol for real-time
efficient monitoring and management of sensor networks, communication in sensor networks, in: Proceedings of
in: Proceedings of the IFIP/IEEE Workshop on End-to- International Conference on Distributed Computing Sys-
End Monitoring Techniques and Services (E2EMONÕ03), tems, Providence, RI, May 2003.
Belfast, Northern Ireland, September 2003. [51] D.B. Johnson et al., Mobile Computing, in: T. Imielinski,
[38] Y. Xu, J. Heidemann, D. Estrin, Geography-informed H. Korth (Eds.), Mobile Computing, Kluwer Academic
energy conservation for ad hoc routing, in: Proceedings of Publishers, Dordrecht, 1996, pp. 153–181, Chapter 5.
the 7th Annual ACM/IEEE International Conference on [52] C. Perkins et al., Ad hoc on-demand distance vector
Mobile Computing and Networking (MobiComÕ01), (AODV) routing, in: Internet Draft draft-ietf-manet-
Rome, Italy, July 2001. aodv-11.txt, June 2002, work in progress.
[39] V. Rodoplu, T.H. Ming, Minimum energy mobile wireless
networks, IEEE Journal of Selected Areas in Communi-
cations 17 (8) (1999) 1333–1344.
Kemal Akkaya received his BS and MS
[40] L. Li, J. Y Halpern, Minimum energy mobile wireless degrees in Computer Science from
networks revisited, in: Proceedings of IEEE International Bilkent University, Ankara, Turkey in
Conference on Communications (ICCÕ01), Helsinki, 1997 and Ortadogu Technical Univer-
Finland, June 2001. sity (ODTU), Ankara, Turkey in 1999
respectively. He worked as a software
[41] G. Finn, Routing and addressing problems in large developer at an automation project of
metropolitan-scale internetworks, University of Southern Siemens and World Bank in Ankara,
California, Tech. Rep. ISI Research Report ISI/RR-87- Turkey in 2000. In the same year, he
180, 1987. joined to University of Maryland
Baltimore County (UMBC) in Balti-
[42] B. Nath, D. Niculescu, Routing on a curve, in: HOTNETS more, MD as a research assistant. He
1, Princeton, NJ, October 2002. is currently a PhD candidate and re-
[43] Y. Yu, D. Estrin, R. Govindan, Geographical and energy- search assistant in Computer Science
aware routing: a recursive data dissemination protocol for Department at UMBC. His research interests include energy
aware routing, security and quality of service issues in ad hoc
wireless sensor networks, UCLA Computer Science wireless and sensor networks.
Department Technical Report, UCLA-CSD TR-01-0023,
May 2001.
[44] B. Karp, H.T. Kung, GPSR: greedy perimeter stateless
Mohamed Younis received B.S. degree
routing for wireless sensor networks, in: Proceedings of the in Computer Science and M.S. in
6th Annual ACM/IEEE International Conference on Engineering Mathematics from Alex-
Mobile Computing and Networking (MobiCom Õ00), andria University in Egypt in 1987 and
Boston, MA, August 2000. 1992, respectively. In 1996, he received
his Ph.D. in Computer Science from
[45] J.-H. Chang, L. Tassiulas, Maximum lifetime routing in New Jersey Institute of Technology.
wireless sensor networks, in: Proceedings of the Advanced He is currently an assistant professor
Telecommunications and Information Distribution Re- in the Department of Computer Sci-
search Program (ATIRPÕ2000), College Park, MD, March ence and Electrical Engineering at the
University of Maryland Baltimore
2000. County (UMBC). Before joining
[46] K. Kalpakis, K. Dasgupta, P. Namjoshi, Maximum UMBC, he was with the Advanced
lifetime data gathering and aggregation in wireless sensor Systems Technology Group, an Aero-
networks, in: Proceedings of IEEE International Confer- space Electronic Systems R&D organization of Honeywell
International Inc. While at Honeywell he led multiple projects
ence on Networking (NETWORKS Õ02), Atlanta, GA, for building integrated fault tolerant avionics, in which a novel
August 2002. architecture and an operating system were developed. This new
[47] K. Dasgupta et al., An efficient clustering-based heuristic technology has been incorporated by Honeywell in multiple
for data gathering and aggregation in sensor networks, in: products and has received worldwide recognition by both the
research and the engineering communities. He also participated
Proceedings of the IEEE Wireless Communications and in the development the Redundancy Management System,
Networking Conference (WCNCÕ03), New Orleans, LA, which is a key component of the Vehicle and Mission Computer
March 2003. for NASAÕs X-33 space launch vehicle. His technical interest
[48] F. Ye, et al., A scalable solution to minimum cost includes network architectures and protocols, embedded sys-
tems, fault tolerant computing and distributed real-time sys-
forwarding in large scale sensor networks, in: Proceedings tems. He has four granted and three pending patents. He served
of International Conference on Computer Communica- on multiple technical committees and published over 40 tech-
tions and Networks (ICCCN), Dallas, TX, October 2001. nical papers in refereed conferences and journals.