An enhanced location-free Greedy Forward algorithm with hole bypass capability in wireless sensor networks

https://doi.org/10.1016/j.jpdc.2014.10.007Get rights and content

Highlights

  • We propose a new Greedy Forward algorithm for routing protocols in WSNs.

  • It does not require localization information, but only the RSSI of the packets.

  • It is also able to deal with nodes located near network holes.

Abstract

Greedy Forward is a technique for data routing in Wireless Sensor Networks (WSNs) in which data packets are forwarded to the node that is geographically closer to the destination node. Two main concerns can be found in routing algorithms based on this technique: first, it requires all sensor nodes to know their physical location. Second, this kind of algorithm does not work in cases when a node is located in a network ’hole’, i.e., the node does not have any neighbor closer to the destination node. In this work, we propose a new Greedy Forward algorithm that can be used in routing protocols for WSNs that does not require localization of the nodes and also is able to deal with nodes located near network holes. Differently from current greedy forward algorithms, our approach uses only the Received Signal Strength Indicator (RSSI) of exchanged packets. Based on this observation, we propose the RSSR (Received Signal Strength Routing) algorithm with two variants: RSSR Election and RSSR Selection. In the RSSR Election, the next hop is dynamically elected and no packets are required for the routing task. In the RSSR Selection, neighbors exchange packets with RSSI information and the next hop of the packet is then selected from a routing table. Then, we present a novel technique for dealing with network holes even when the physical location of the nodes is unknown. This technique improves the reliability and applicability of the proposed schemes in most WSN scenarios. Our results indicate clearly that the proposed algorithms have all the benefits of a greedy forward algorithm but with better performance, better packet delivery rate and without requiring position information.

Introduction

Wireless sensor networks (WSNs)  [1], [10], [36], [3], [46] are composed of a large number of sensor nodes used to monitor an area of interest. This type of network has become popular due to its applicability that includes several areas, such as environmental, health, industrial, domestic, agricultural, meteorological, spacial, and military applications. Several physical properties can be monitored, including temperature, humidity, pressure, ambient light, and movement. Usually, the gathered information needs to be sent hop-by-hop to a central node, called sink, that is able to process the data and send the results to a Network Management and Monitoring facility using a more powerful data communication equipment.

Despite the fact that the main goal of a WSN is to monitor an area of interest, several secondary objectives, or prerequisites, need also to be achieved to reach the main objective, as shown in Fig. 1. Data routing is one of these prerequisites.

As a matter of fact, data routing toward the sink node is an important task to make viable most of the WSN applications. Therefore, different routing algorithms for WSNs have been proposed  [25], [16], [39], [21], [29], [43], [15], [2]. In particular, geographic routing algorithms  [25], [16], [39], [21], [27], [4], [35], [5], [18] are closely related to the current work and have a number of advantages especially important for WSNs, such as scalability, energy-efficiency, low route discovery overhead, and low memory requirements (nodes need to store only information about their neighbors). For these reasons, geographic routing is the protocol of choice for many emerging applications in sensor networks  [39]. A well-known technique used by most geographic routing algorithms is the greedy forward  [4].

Greedy algorithms present advantages over other algorithmic strategies, such as simplicity and efficiency. Greedy strategies are often easier to describe and can often be implemented more efficiently when compared with other algorithms. The main drawbacks of a greedy strategy are (i) to find the right approach to design a greedy algorithm and (ii) to show that the used approach is correct. In WSN, the approach to design greedy routing algorithms uses location information of neighbor nodes to forward the packet to the node that is geographically closer to the destination node. This approach overcome the drawbacks of a greedy algorithm and is used by many geographic routing algorithms in WSNs  [3]. Geographic routing is an interesting solution in terms of scalability and energy efficiency, but in order to work it requires the previous execution of a localization discovery system, which is not always available  [34], [38], [23], [8]. Furthermore, in most cases, the localization system must provide very precise position information since even small localization errors can lead to loops and low routing performance  [39], [35], [23], [28], [11], [33]. Another challenge in the greedy forward technique is how to deal with network holes, i.e., areas of WSNs not covered by sensor nodes  [4]. To reach the sink node, in these cases, packets may need to bypass the network hole by passing thorough the nodes located near the border of the hole (see Fig. 2).

In this work, we propose a novel greedy forward algorithm, which we refer to as the RSSR (Received Signal Strength Routing) algorithm. The main idea of RSSR is to take advantage of the greater capability of the sink node and equip this special node with a more powerful communication device so it can send a query packet to all nodes of the WSN in a single hop. This query packet is a simple query message from the monitoring center asking for the sensors’ gathered data such as temperature, humidity, etc. Thus, all nodes receive the same packet sent directly by the sink node using its high powerful transceptor. Then, sensor nodes can reply to the sink query by using the proposed RSSR algorithm, based on a multihop communication, since normal sensor nodes do not send a packet direct to the sink node. The same query packet sent by the sink node will reach all sensor nodes with different RSSI (Received Signal Strength Indicator) values in such a way that the most distant nodes experiment the lower signal strengths due to the propagation loss. The basic principle of RSSR is to forward the packet to the neighbor that received the query with greater signal strength, which is, in theory, the neighbor closest to the sink node. We then define two versions of the proposed approach: the RSSR Election and the RSSR Selection. In the RSSR Election, a leader election algorithm, which requires no packet exchange, chooses the next hop. In the RSSR Selection, neighbor nodes exchange RSSI information and that neighbor with the greatest RSSI is selected at each step. The proposed algorithms allow the execution of a greedy forward strategy that requires neither location information, nor virtual coordinates  [38]. Also, since the positions of the nodes in a WSN are usually computed based on three or more RSSI values together with the positions of beacon nodes, which have inaccuracies, to use only RSSI information, instead of positions, results in better performance, as we show later on.

The main concern with the proposed RSSR algorithms, as mentioned before, is how to deal with network holes. In the literature, we can find several techniques proposed to deal with these scenarios  [16], [47]. However, all of them require the sensor nodes to know their positions. In this work, we propose a novel algorithm that extends our previous work  [4] for dealing with network holes that requires only the signal strength of the received query packet. The proposed algorithm specifies how a node can detect whether it is the border of the hole and also how to forward packets in such a way that paths near holes can be avoided.

The remaining of this paper is organized as follows. In the next section, we describe the related work. Section  3 describes both proposed RSSR algorithms, the RSSR Election and the RSSR Selection, then, in Section  4, we present our algorithm for dealing with network holes. All proposed algorithms and techniques are evaluated in Section  5. In Section  6, we briefly discuss the applicability, scope, advantages, and limitations of the proposed solution. Finally, Section  7 presents our conclusions and future directions.

Section snippets

Related work

Greedy Forward (GF) has been used by a number of geographic routing algorithms  [25], [16], [39], [21], [27], [18], [47], [22], [42] applied to Ad Hoc  [16], Sensor  [47], and Vehicular Networks  [27]. Basically we can identify three classes of protocols and algorithms that use the GF strategy. In the first class, the GF algorithm is combined with a perimeter/face routing algorithm to deal with holes in the network. For instance, GPSR (Greedy Perimeter Stateless Routing)  [16] uses the GF

RSSR—a novel location-free greedy forward algorithm

In this section, we propose a new greedy forward algorithm: the RSSR (Received Signal Strength Routing). The main idea is to take advantage of the greater capability of the sink node and equip this special node with a more powerful communication device so it can send a query packet to all nodes of the WSN in a single hop. This is a reasonable assumption for some scenarios, as discussed in Section  6. The key aspect of the RSSR algorithm is to take advantage of the fact that the same sink query

Dealing with network holes

In this section, we describe our algorithm for dealing with network holes. This algorithm is divided into two parts: hole detection and hole bypass. In the following, we describe those parts and how they can work with the proposed RSSR algorithms.

Performance evaluation

In this section, we evaluate the performance of the proposed RSSR algorithms and compare their performance with the original Greedy Forward (GF) technique. The performance of the Hole Bypass algorithm is also evaluated.

Applicability of the proposed solution

In this work, we consider a sink node equipped with a powerful communication device in such a way that it can send a query packet to all nodes in a single hop. This is a reasonable assumption in some scenarios of WSNs—a number of proposed protocols have the assumption that one or even all nodes (e.g., LEACH  [12]) can communicate in a single hop to other nodes when necessary. In cases a single sink cannot reach all nodes (e.g., a WSN scattered over a large area, we can think of a clustered

Conclusions

In this paper, we proposed two new location-free RSSI-based Greedy Forward algorithms, which we referred to as the RSSR (Received Signal Strength Routing) algorithms. The main idea of RSSR is to reply a query, sent to all nodes by the sink in a single hop, by greedily forwarding it to the neighbor node that received the query with greatest signal strength, which is, in theory, the closest one to the sink. In the RSSR Election, nearby nodes perform a leader election and distributedly decide the

Horacio A.B.F. Oliveira ([email protected]) is a professor of computer science at Federal University of Amazonas (UFAM), Brazil. He holds a Ph.D. in computer science from Federal University of Minas Gerais. His research interests include localization and synchronization algorithms, distributed algorithms, and wireless ad hoc, vehicular, and sensor networks. He is author of several papers in the different areas of his research interests.

References (47)

  • Mario Di Francesco et al.

    Reliability and energy-efficiency in IEEE 802.15.4/ZigBee sensor networks: an adaptive and cross-layer approach

    IEEE J. Sel. Areas Commun.

    (2011)
  • D. Estrin, L. Girod, G. Pottie, M. Srivastava, Instrumenting the world with wireless sensor networks, in: Proc. of the...
  • Tian He, Chengdu Huang, Brian M. Blum, John A. Stankovic, Tarek Abdelzaher, Range-free localization schemes for large...
  • W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor...
  • Ming-Tsung Hsu, Frank Yeong-Sung Lin, Yue-Shan Chang, Tong-Ying Juang, Reliable Greedy forwarding in obstacle-aware...
  • Gyanendra Prasad Joshi et al.

    A distributed geo-routing algorithm for wireless sensor networks

    Sensors

    (2009)
  • Jin Woo Jung et al.

    On using cooperative routing for lifetime optimization of multi-hop wireless sensor networks: analysis and guidelines

    IEEE Trans. Commun.

    (2013)
  • Brad Karp, H.T. Kung, GPSR: Greedy perimeter stateless routing for wireless networks, in: Proc. of the 6th Annual...
  • Anne-Mari Kermarrec, Guang Tan, Greedy geographic routing in large-scale sensor networks: a minimum network...
  • Anne-Mari Kermarrec et al.

    Greedy geographic routing in large-scale sensor networks: a minimum network decomposition approach

  • Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Zollinger, Geometric ad-hoc routing: of theory and practice, in: Proc....
  • Seungjoon Lee, Bobby Bhattacharjee, Suman Banerjee, Efficient geographic routing in multihop wireless networks, in:...
  • Yujun Li et al.

    Rules of designing routing metrics for Greedy, face, and combined Greedy-face routing

    IEEE Trans. Mob. Comput.

    (2010)
  • Cited by (20)

    • Geographic routing and hole bypass using long range sinks for wireless sensor networks

      2017, Ad Hoc Networks
      Citation Excerpt :

      Finally, when the sink receives the reply packet, it sends the received data back to the central station. In this section, we evaluate the proposed REACT algorithm and compare its performance to our previous work called ARESTA [30] and RSSR Enhanced, presented and discussed in [26]. In both REACT and ARESTA algorithms, data aggregation is performed in the tree by nodes having children nodes.

    • A geographic cross-layer routing adapted for disaster relief operations in wireless sensor networks

      2017, Computers and Electrical Engineering
      Citation Excerpt :

      In a similar way, [18,23] consider the energy and distance of nodes as the parameters to select relay node. De Oliveira et al., [17] proposed a greedy routing method which is referred as RSSI (received signal strength indicator)-based routing. In this method, node's location is determined by received signal strength at the sink, and the node with highest signal strength is selected as a relay node.

    • Efficient disjoint boundary detection algorithm for surveillance capable WSNs

      2017, Journal of Parallel and Distributed Computing
      Citation Excerpt :

      Such scenario creates a local holes problem [28,32]. When surveillance and Greedy routing (dead end [23–25]) is performed, energy consumption becomes a serious issue around the hole boundary. So, to overcome energy depletion problem due to local holes creation, DBN algorithm can be executed periodically.

    • Organized topology based routing protocol in incompletely predictable ad-hoc networks

      2017, Computer Communications
      Citation Excerpt :

      Mainly aimed at discussing the situations where nodes move in certain ranges around the basic positions, Section 5 deeply parses Model II named Dynamic Organized Topology (D-OT). Besides, combined with greedy algorithm [20,21], Dynamic Organized Topology Based Routing using Greedy Algorithm (GrD-OTBR) is proposed to adapt the environment described by D-OT [22,23]. In our simulation in Section 6, we figure out that APS-OTBR shows a reasonable node utilization frequency.

    • Path planning algorithms for mobile anchors towards range-free localization

      2016, Journal of Parallel and Distributed Computing
      Citation Excerpt :

      A wireless sensor network (WSN) consists of autonomous sensors distributed over a region which monitor physical or environmental conditions and cooperatively send data through the network to a sink. Localization of wireless sensors with high degree of accuracy is required for many WSNs applications [4,5], such as security and surveillance, object tracking, geographic routing [12], etc. GPS is one of the widely used techniques for location discovery in outdoor networks [21], but it is not always practical to equip each sensor with a GPS receiver due to cost and energy consumption.

    View all citing articles on Scopus

    Horacio A.B.F. Oliveira ([email protected]) is a professor of computer science at Federal University of Amazonas (UFAM), Brazil. He holds a Ph.D. in computer science from Federal University of Minas Gerais. His research interests include localization and synchronization algorithms, distributed algorithms, and wireless ad hoc, vehicular, and sensor networks. He is author of several papers in the different areas of his research interests.

    Azzedine Boukerche is a Full Professor and holds a Canada Research Chair position at the University of Ottawa. He is the Founding Director of PARADISE Research Laboratory at uOttawa. Prior to this, he held a Faculty position at the University of North Texas, USA, and he was working as a Senior Scientist at the Simulation Sciences Division, Metron Corporation located in San Diego. He was also employed as a Faculty at the School of Computer Science McGill University, and taught at Polytechnic of Montreal. He spent a year at the JPL/NASA-California Institute of Technology where he contributed to a project centered about the specification and verification of the software used to control interplanetary spacecraft operated by JPL/NASA Laboratory.

    His current research interests include wireless ad hoc and sensor networks, wireless networks, mobile and pervasive computing, wireless multimedia, QoS service provisioning, performance evaluation and modeling of large-scale distributed systems, distributed computing, large-scale distributed interactive simulation, and parallel discrete event simulation. Dr. Boukerche has published several research papers in these areas. He was the recipient of the Best Research Paper Award at IEEE/ACM PADS’97, and ACM MobiWac’06, the recipient of the 3rd National Award for Telecommunication Software 1999 for his work on a distributed security systems on mobile phone operations, and has been nominated for the best Paper Award at the IEEE/ACM PADS’99, and ACM MSWiM 2001.

    Dr. A. Boukerche is a holder of an Ontario Early Research Excellence Award (previously known as Premier of Ontario Research Excellence Award), Ontario Distinguished Researcher Award, and Glinski Research Excellence Award. He is a Co-Founder of QShine Int’l Conference, on Quality of Service for Wireless/Wired Heterogeneous Networks (QShine 2004), served as a General Chair for the 8th ACM/IEEE Symposium on modeling, analysis and simulation of wireless and mobile systems, and the 9th ACM/IEEE Symposium on distributed simulation and real-time application, a Program Chair for ACM Workshop on QoS and Security for Wireless and Mobile networks, ACM/IFIPS Europar 2002 Conference, IEEE/SCS Annual Simulation Symposium ANNS 2002, ACM WWW’02, IEEE MWCN 2002, IEEE/ACM MASCOTS 2002, IEEE Wireless Local Networks WLN 03–04; IEEE WMAN 04–05, ACM MSWiM 98–99, and TPC member of numerous IEEE and ACM sponsored conferences. He served as a Guest Editor for the Journal of Parallel and Distributed Computing (JPDC) (Special Issue for Routing for mobile Ad hoc, Special Issue for wireless communication and mobile computing, Special Issue for mobile ad hoc networking and computing), and ACM/kluwer Wireless Networks and ACM/Kluwer Mobile Networks Applications, and the Journal of Wireless Communication and Mobile Computing.

    He serves as Vice General Chair for the 3rd IEEE Distributed Computing for Sensor Networks (DCOSS) Conference 2007, as Program Co-Chair for Globecom 2007 and 2008 Symposium on Wireless Ad Hoc and Sensor Networks and a Finance Chair for ACM Multimedia 2008. Dr. A. Boukerche serves as an Associate Editor for ACM/Springer Wireless Networks, IEEE Wireless Communication Magazine, IEEE Transaction on Parallel and Distributed Systems, Wiley In’t Journal of Wireless Communication and Mobile Computing, Wiley’s Security and Communication Network Journal, Wiley’s Pervasive and Mobile Computing Journal, the Elsevier’s Journal of Parallel and Distributed Computing, and the SCS Transactions on Simulation. He also serves as a Steering Committee Chair for the ACM Modeling, Analysis and Simulation for Wireless and Mobile Systems Symposium, the ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks and the IEEE/ACM Distributed Simulation and Real-Time Applications Symposium (DS-RT).

    Daniel Ludovico Guidoni holds a Ph.D. in Computer Science from the Federal University of Minas Gerais, Brazil. He received his Masters’ Degree in Computer Science also from Federal University of Minas Gerais, Brazil, 2007. His research interests include wireless sensor networks, small world networks, complex networks, and distributed algorithms.

    Eduardo Freire Nakamura([email protected]) is a Researcher and Full Professor at the Center of Research and Technological Innovation, Brazil. Dr. Nakamura received his Ph.D. in Computer Science from the Federal University of Minas Gerais, Brazil, in 2007. His research interests include data/information fusion, distributed algorithms, localization algorithms, wireless ad hoc and sensor networks, mobile and pervasive computing. Dr. Nakamura has published several papers in the area of wireless sensor networks, and has served as a TPC member of the 2nd Latin American Autonomic Computing Symposium, supported by the IEEE Computer Society.

    Raquel A.F. Mini holds a B.Sc., M.Sc., and Ph.D. in Computer Science from Federal University of Minas Gerais (UFMG), Brazil. Currently she is an Associate Professor of Computer Science at PUC Minas, Brazil. She has worked for nine years in the protocol design for wireless sensor networks with more than 30 papers published in this area. In the last three years, she presented two tutorials about energy in wireless sensor networks in international conferences. Her main research areas are sensor networks, mobile computing, and ubiquitous computing.

    Antonio A.F. Loureiro holds a B.Sc. and a M.Sc. in Computer Science, both from the Federal University of Minas Gerais (UFMG), and a Ph.D. in Computer Science from the University of British Columbia, Canada. Currently he is an Associate Professor of Computer Science at UFMG where he leads the research group in wireless sensor networks. His main research areas are wireless sensor networks, mobile computing, and distributed algorithms.

    View full text