Skip to main content

Advertisement

Log in

Systematic Literature Review on Energy Efficient Routing Schemes in WSN – A Survey

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In wireless sensor networks (WSN), routing is quite challenging area of research where packets are forwarded through multiple nodes to the base station. The packet being sent over the network should be shared in an energy efficient manner. It also considers the residual power of battery to enhance the network life time. Existing energy efficient routing solutions and surveys are presented but still there is a need for Systematic Literature Review (SLR) to identify the valid problems. This paper performs SLR for energy efficiency routing with 172 papers at initial stage. Next, 50 papers are shortlisted after filtration based on quality valuation and selection criteria by ensuring relevance with energy efficiency. Initially, we present literature that includes schemes for threshold sensitive, adaptive periodic threshold sensitive, power efficient, hybrid energy efficient distribution and low energy adaptive mechanisms. Result of systematic review reveals that consumption of energy is the most fundamental issue in WSN however, is not noticed by the researchers and practitioners where as it can contribute for the improvement of the energy efficiency. It also elaborates the weaknesses of the existing approaches which make them inappropriate for energy efficient routing in WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. R. Sandhya and N. Sengottaiyan (2016) “S-SEECH secured-scalable energy efficient clustering hierarchy protocol for wireless sensor network,” in International Conference on Data Mining and Advanced Computing (SAPIENCE), Ernakulam, , pp. 306–309

  2. R. Cohen and B. Kapchits (2011) “Energy-delay optimization in an asynchronous sensor network with multiple gateways,” in 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Salt Lake City, , pp. 98–106

  3. Bahale SV, Pund MA (2017) Performance evaluation of SCERP: a cluster based network lifetime improvement protocol for WSN. Int Res J Eng Tech 04:2462–2469

    Google Scholar 

  4. Awan KM, Ali A, Aadil F, Qureshi KN (2018) Energy efficient cluster based routing algorithm for wireless sensors networks. International Conference on Advancements in Computational Sciences (ICACS), Lahore, pp 1–7

    Google Scholar 

  5. Shen J, Wang A, Wang C, Hung PC, Lai C-F (2017) An efficient centroid-based routing protocol for energy management in WSN-assisted IoT. IEEE Access 5:18469–18479

    Article  Google Scholar 

  6. Zhu W, Cao J, Raynal M (2018) Energy-efficient composite event detection in wireless sensor networks. IEEE Commun Lett 22(1):177–180

    Article  Google Scholar 

  7. Suescun CA, Cardei M (2016) event-based clustering for composite event detection in wireless sensors networks. IEEE 35th International Performance Computing and Communications Conference (IPCCC), Las Vegas, pp 1–8

    Google Scholar 

  8. Kitchenham B, Brereton OP, Dudgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature review in software engineering- a systematic literature review. InfSoftw Technol 51(1):7–15

    Google Scholar 

  9. Biswas K, Muthukkumarasamy V, Sithirasenan E, Singh K (2014) An energy aware heuristic-based routing protocol in Wireless Sensor Networks. 17th International Conference on Computer and Information Technology (ICCIT), Dhaka, pp 53–58

    Google Scholar 

  10. M. Razzaq, D. D. Ningombam, and S. Shin (2018) “Energy efficient K-means clustering-based routing protocol for WSN using optimal packet size,” in International Conference on Information Networking (ICOIN), Chiang Mai, pp. 632–635

  11. L. N. Devi and A. N. Rao (2016) “Optimization of energy in wireless sensor networks using clustering techniques,” in Communication and Electronics Systems (ICCES), Coimbatore, pp. 1–4

  12. Huynh T-T, Dinh-Duc A-V, Tran C-H (2016) Delay-constrained energy-efficient cluster-based multi-hop routing in wireless sensor networks. J Commun Netw 18(4):580–588

    Article  Google Scholar 

  13. Istwal Y, Verma SK (2017) Dual cluster head routing protocol in WSN. 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Delhi, pp 1–6

    Google Scholar 

  14. W. Abushiba, P. Johnson, S. Alharthi, and C. Wright (2017) “An energy efficient and adaptive clustering for wireless sensor network (CH-leach) using leach protocol,” in 13thInternational Computer Engineering Conference (ICENCO), Cairo, , pp. 50–54

  15. Khandor P, Chand Aseri T (2017) Reactive energy efficient heterogeneous clustering based routing protocol for WSN. International Conference on Wireless Communication, Signal Processing and Networking (WiSPNET), Chennai, pp 22–24

    Google Scholar 

  16. Wu W, Xiong N, Wu C (2017) Improved clustering algorithm based on energy consumption in wireless sensor networks. IET Netw 6(3):47–53

    Article  Google Scholar 

  17. Zhang W, Li L, Han G, Zhang L (2017) E2HRC: an energy-efficient heterogeneous ring clustering routing protocol for wireless sensor networks. IEEE Access 5:1702–1713

    Article  Google Scholar 

  18. Zhu W, Cao J, Raynal M (Jan. 2018) Energy-efficient composite event detection in wireless sensor networks. IEEE Communications Letters 22(1):177–180

    Article  Google Scholar 

  19. Sun B, Li D (2018) A comprehensive trust aware routing protocol with multi-attributes for WSN. IEEE Access 6:4725–4741

    Article  Google Scholar 

  20. Khan NA, Saghar K, Ahmad R, Kiani AK (2016) RAEED-EA: A formally analyzed energy efficient WSN routing protocol. 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, pp 346–349

    Google Scholar 

  21. N. Kumar and Y. Singh 2016, “An energy efficient and trust management based opportunistic routing metric for wireless sensor networks,” in Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, pp. 611–616

  22. Bawage VP, Mehetre DC (2016) Energy efficient Secured Routing model for wireless sensor networks. International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, pp 865–869

    Google Scholar 

  23. N. A. Khan, K. Saghar, R. Ahmad, and A. K. Kiani (2016) “Achieving energy efficiency through load balancing: A comparison through formal verification of two WSN routing protocols,” in 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, pp. 350–354

  24. N. Kumar and Y. Singh (2017) “Trust and packet load balancing based secure opportunistic routing protocol for WSN,” in 4th International Conference in Signal Processing, Computing and Control (ISPCC), Solan, pp. 463–467

  25. AnandaKrishna B, Madhuri N, Rao MK, VijaySekar B (2018) Implementation of a novel cryptographic algorithm in Wireless Sensor Networks. Conference on Signal Processing And Communication Engineering Systems (SPACES), Vijayawada, pp 149–153

    Google Scholar 

  26. Vadlamudi R, Umar S (2013) A Review of APTEEN in Wireless Sensor Networks. Int. J. Sci. Eng. Comput. Technol 3(9):306

    Google Scholar 

  27. Sharma K, Ghose MK (2011) Security model for hierarchical clustered wireless sensor networks. Int J Comput Sci Secur IJCSS 5(1):85–97

    Google Scholar 

  28. A. Ahmed Abbasi, M. Younis “a survey on clustering algorithms for wireless sensor.”Computer communication, 2007. vol 30, pp 2826–2841

  29. S. Lindsey and C. S. Raghavendra (2002) “PEGASIS: Power-efficient gathering in sensor information systems,” in Proceedings, IEEE Aerospace Conference, Big Sky, pp. 1–6

  30. Younis O, Fahmy S (Dec. 2004) HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Journals & Magazine 3(4):366–379

    Google Scholar 

  31. Li Y, Guo L, Prasad SK (2010) An Energy-Efficient Distributed Algorithm for Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks. IEEE 30th International Conference on Distributed Computing Systems, Genova, pp 827–836

    Google Scholar 

  32. TT Huynh, CS Hong 2006 “an Energy Delay Efficient Multi-Hop Routing Scheme for WSN,” transactions on information and systems

  33. Shi B, Zhang W, Xue G, Tang J, Wang C (2012) DEAR: delay-bounded energy-constrained adaptive routing in wireless sensor networks. Proceedings IEEE INFOCOM, Orlando, pp 1593–1160

    Google Scholar 

  34. Ammari HM (2013) On the energy-delay trade-off in geographic forwarding in always-on wireless sensor networks: A multi-objective optimization problem. ScienceDirect 57(9):1913–1935

    Google Scholar 

  35. Shen J, Wang A, Wang C, Ren Y, Wang J (2015) Performance comparison of typical and improved LEACH protocols in wireless sensor network. First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA), Yilan, pp 187–192

    Google Scholar 

  36. M. J. Handy, M. Haase, and D. Timmermann (2002) “Low energy adaptive clustering hierarchy with deterministic cluster-head selection,” in 4th International Workshop on Mobile and Wireless Communications Network, Stockholm, pp. 368–372

  37. W. Abushiba, P. Johnson, S. Alharthi and C. Wright (2017) "An energy efficient and adaptive clustering for wireless sensor network (CH-leach) using leach protocol," in 13th International Computer Engineering Conference (ICENCO), Cairo, pp. 50–54

  38. J. Zheng, A. Jamalipour (2009) “Energy Efficiency and Power Control”, In: “Wireless sensor network a networking perspective (eds),” pp. 307–337, Wiley-IEEE Press

  39. C. Ioannou, V. Vassiliou and C. Sergiou (2017) "An Intrusion Detection System for Wireless Sensor Networks," in 24th International Conference on Telecommunications (ICT), Limassol, pp. 1–5

  40. Diop A, Qi Y, Wang Q, Hussain S (June 2013) An advanced survey on secure energy-efficient hierarchical routing protocols in wireless sensor networks. Int J Comp Sci Iss 10(1):1–11

    Google Scholar 

  41. Patel UA, Modi SV, Suma BJ (2013) A survey: MAC layer protocol for wireless sensor networks. Int J Emerge Technol Adv Eng 3(9):203–211

    Google Scholar 

  42. A. Patle and N. Gupta (2016) “Vulnerabilities, attack effect and different security scheme in WSN: A survey,” in International Conference on ICT in Business Industry & Government (ICTBIG), pp. 1–6

  43. A. S. K. Pathan, Hung-Woo Lee and Chong Seon Hong, "Security in wireless sensor networks: issues and challenges,"8th International Conference Advanced Communication Technology, Phoenix Park, 2006, pp. 6 pp.-1048

  44. S. Avancha (2005) “A holistic approach to secure sensor networks,”

  45. “Algorithms and Protocols for Wireless Sensor Networks | Wiley Online Book, 2008

  46. G. Smaragdakis, I. Matta, and A. Bestavros (2004) “SEP: a stable election protocol for clustered heterogeneous wireless sensor networks,” Boston University Computer Science Department

  47. FA Aderohunmu, JD Deng (2009) “An enhanced stable election protocol for WSN, ” Department of Information Science, New Zealand

  48. N. Javaid, S. N. Mohammad, K. Latif, U. Qasim, Z. A. Khan, and M. A. Khan (2013) “HEER: Hybrid energy efficient reactive protocol for wireless sensor networks,” in Electronics, Communications and Photonics Conference (SIECPC), Saudi International, pp. 1–4

  49. T. Sharma, B. Kumar & G. Tomar (2012) “Performance Comparision of LEACH, SEP and DEEC Protocol in Wireless Sensor Network,”

  50. L. Mahajan and N. Sharma (2014) “Improving the stable period of WSN using dynamic Stable leach Election Protocol,” in International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 393–400

  51. X. Zheng, Y. Feng, J. Yang, and Z. Lu (2014) “Energy efficient and Fault Tolerant Routing Protocol for Mobile Wireless Sensor Networks,” in International Conference on Information and Communications Technologies (ICT), pp. 1–5

  52. Li Y, Ai C, Vu C, Pan Y, Beyah R (2010) Delay-bounded and energy-efficient composite event monitoring in heterogeneous wireless sensor networks. IEEE Trans Parallel Distrib Syst 21(9):1373–1385

    Article  Google Scholar 

  53. Romer K, Mattern F (2004) Event-based systems for detecting real-world states with sensor networks: a critical analysis. Proceedings of the Intelligent Sensors, Sensor Networks and Information Processing Conference, Melbourne, pp 389–395

    Google Scholar 

  54. C. A. Suescun and M. Cardei (2016) “Event-based clustering for composite event detection in wireless sensors networks,” in IEEE 35th International Performance Computing and Communications Conference (IPCCC), Las Vegas, pp. 1–8

  55. Liu K, Abu-Ghazaleh N, Kang K-D (2007) Location verification and trust management for resilient geographic routing. J Parallel Distrib Comput 67(2):215–228

    Article  Google Scholar 

  56. S. Biswas and R. Morris (2005) “ExOR: Opportunistic Multi-hop Routing for Wireless Networks,” in Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New York, NY, USA, vol. 35, no. 4, pp. 133–144

  57. V Mohindru, Y Singh (2016) “Efficient Approach for Securing Message Communication in Wireless Sensor Networks from Node Clone Attack,” Indian Journal of Science and Technology.” Vol. 9, issue. 32

  58. Gong P, Chen TM, Xu Q (2015) ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks. Journal of Sensors 7:1–10

    Article  Google Scholar 

  59. Ahmed A, Bakar KA, Channa MI, Khan AW (2016) A secure routing protocol with trust and energy awareness for wireless sensor network. Mob Netw Appl 21(2):272–285

    Article  Google Scholar 

  60. H. Liu, B. Zhang, H. T. Mouftah, X. Shen, and J. Ma (2009) “Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions,” IEEE Commun. Mag., vol. 47, no. 12

  61. Das S (2001) Filters, wrappers and a boosting-based hybrid for feature selection. in Icml 1:74–81

    Google Scholar 

  62. Z Zhang, X Chu (2011) “Risk prioritization and failure mode and effects analysis under certainty,” School of Mechanical Engineering, Shanghai Jiao Tong University, Shanghai , PR China

  63. Chen H, Han Z, Fu Z (2015) Quantitative trustworthy evaluation scheme for trust routing scheme in wireless sensor network. IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, pp 20–24

    Google Scholar 

  64. M Zhang, R Zheng, Q Wu, W Wei, X Bai, H Zhao ,“B-iTRS: Abioinspired trusted routing scheme for wireless sensor networks,“Journal of sensors, vol. 5, 2015, pp. 1–8

  65. Chen Z, He M, Liang W, Chen K Trust-aware and low energy consumption security topology protocol of wireless sensor network. Journal of Sensors 6(201):110

  66. Z Hu, Y Bie, H Zhao (2015), “‘Trustedtree-basedtrustmanagementscheme for secure routing in wireless sensor networks,” International Journal of Distributed

  67. M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, and S. Singh (2005), “Exploiting heterogeneity in sensor networks,” in INFOCOM 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 2, pp. 878–890

  68. Karloff C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, pp 113–127

    Google Scholar 

  69. M. A. Jan, P. Nanda, X. He, and R. P. Liu (2015) “A Sybil attack detection scheme for a centralized clustering-based hierarchical network,” in Trustcom/BigDataSE/ISPA, IEEE, vol. 1, pp. 318–325

  70. V. K. Pamula and A. K. Tripartite (2018) “Performance of Selection Combiner over Nakagami Fading Channel with Laplace Cochannel Interference,” IEICE Commun. Express, p. 2018XBL0094

  71. IS Dhillon, Y Guan, B Kulis (2004) “ drawback of k-mean,” Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, US

  72. K. Saghar (2010) “Formal modelling and analysis of denial of services attacks in wireless sensor networks,” PhD Thesis, Northumbria University

  73. A. Sari and E. Caglar (2018) “Load balancing algorithms and protocols to enhance quality of service and performance in data of wsn,” in Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, Elsevier, pp. 143–178

  74. Li J (2017) a symmetric cryptographic algorithm in wsn security. Int.J. Online Eng. IJOE 13(11):102–110

    Article  Google Scholar 

  75. Mohanty P, Panigrahi S, Sarma N (2010) security issues in wireless sensor network data gathering protocols: a survey. Journal of Theoretical and Applied Information Technology, Tezpur

    Google Scholar 

  76. “J. Kelsey, B. Schneier, D. Wagner, and C. Hall (1998) ‘Cryptanalytic attacks on pseudorandom number generators,’ in International Workshop on Fast Software Encryption, pp. 168–188

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ata Ullah.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shafiq, M., Ashraf, H., Ullah, A. et al. Systematic Literature Review on Energy Efficient Routing Schemes in WSN – A Survey. Mobile Netw Appl 25, 882–895 (2020). https://doi.org/10.1007/s11036-020-01523-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-020-01523-5

Keywords

Navigation