Sei sulla pagina 1di 5

A Survey of Architecture and Node deployment in Wireless Sensor

Network
Pradnya Gajbhiye, Anjali Mahajan
Post Graduate Department of Computer Science and Engineering
G.H.Raisoni College of Engineering, Nagpur, M.S., INDIA
pmgajbhiye@gmail.com, armahajan@rediffmail.com

Abstract networks should support adaptability in the way to


Wireless Sensor Networks consist of small nodes with operate through adapting to the environmental changes
sensing, computation and wireless communication that sensors monitor, e.g. sensors may decrease their duty
capabilities. Various architectures and node deployment cycles in order to reduce the power consumption in the
strategies have been developed for wireless sensor sensors when there is no significant change in sensor
network, depending upon the requirement of application. readings [5]. Some applications of sensor networks
Sensor networks are used in different applications e.g. involve mobility. Communication in sensor networks is
environmental monitoring, habitat monitoring, home totally depending upon the application and the way of
automation, military application etc. In this paper we collecting data, mainly it consist of the tasks of data sent
present survey of state-of-the-art of architecture and node to nodes and the data recorded by nodes about the
deployment in wireless sensor network. We present the environment [6]. Also, Node deployment is the basic
characteristics of the environment in which the sensor problem in wireless sensor network. According to the
networks may deploy. Node deployment in wireless applications, the node deployment strategy is decided.
sensor network is application dependent and can be Most of these work [7], [8], [9], [10] assume that the
either deterministic or randomized. But in both the cases environment is sufficiently known and under control.
coverage of interested area is the main issue. We also However, when the environment is unknown or hostile
explain the routing protocols for wireless sensor network. such as remote harsh fields, disaster areas and toxic urban
Keywords- Wireless sensor networks, Node regions, sensor deployment cannot be performed
deployment, manually. To scatter sensors by aircraft is one possible
solution. However, using this technique, the actual
landing position cannot be controlled due to the existence
1. Introduction of wind and obstacles such as trees and buildings.
Consequently, the coverage may be inferior to the
Wireless sensor networks are composed of a large application requirements no matter how many sensors are
number of sensor nodes; communicate with each other dropped. In building toxic-leaks detection [11], [12],
through wireless transmission. Many feasible applications chemical sensors must be placed inside a building from
are proposed such as industrial sensor networks [1], the entrance of the building. In such cases, it is necessary
volcano monitoring networks [2], habitat monitoring [3], to make use of mobile sensors, which can move to the
health monitoring, and home automation etc. The correct places to provide the required coverage.
organization of internal software and hardware should be
in a manner that will allow them to work properly and be In general, without having any fixed strategy, we can able
able to adapt dynamically to new environments, to deploy the sensors by aircraft and these sensors spread
requirements and applications. Similarly, it makes sure to out in random fashion, but there may be the problem of
be general enough to be suited for as many applications trees and landscapes. To avoid these types of problems,
as possible. Architecture may include the topology, the researchers tried to identify the feasible node
organization of sink node, other nodes, and a global deployment strategies. Key issues in the node deployment
view of the whole network [4]. The important things that strategies are: the coverage area of the nodes, finding the
have to be considered are the autonomy and adaptability. dead nodes in the coverage area as well as the nodes on
Autonomy specifies that sensors can be deployed in an the boundary of the other nodes coverage area. Due to
unattended area or physically unreachable area and hence this, more attention of the researches moved to the node
they are required to operate with the minimum efforts deployment methods with and without the constraints
from the base stations or human administrators. Sensor according to the applications and in general.

978-1-4244-2624-9/08/$25.00 ©2008 IEEE 426

Authorized licensed use limited to: Indian Institute of Technology Hyderabad. Downloaded on August 16,2010 at 08:45:01 UTC from IEEE Xplore. Restrictions apply.
This paper is organized as follows: section 2 discuss the migration. A platform runs on TinyOS and hosts agents.
characteristics of the environment in which the sensor Each platform controls the state of sensor node i.e. sleep,
networks may deploy. Section 3 presents existing listen and broadcast and provides a set of runtime services
architectures. Existing node deployment strategies are that agents use to read sensor data and perform behaviors.
given in section 4. Paper ends with the conclusion in
The authors of [19] propose an architecture based on the
section 5 followed by the reference listing.
five OSI layers together with three management planes
2. Characteristics of Environment that go through out the whole protocol stack (see Figure
2). A brief description of the layers included can be: the
The environment is said to be dynamic where, there may physical layer addresses mainly the hardware details of
be various types of sensor nodes in a single sensor the wireless communication mechanism: the modulation
network i.e. the environment is heterogeneous in terms of type, the transmission and receiving techniques, etc. The
software as well as hardware. data link layer is concerned with the Media Access
Diversity refers to sensing several parameters and then Control (MAC) protocol that manages communication
combines them to have a decision e.g. the sensed over the noisy shared channel. Routing the data between
information about light, temperature, sound, smoke etc is the nodes is managed by the network layer, while the
helpful for detecting fire. Senor nodes may be deployed transport layer helps to maintain the data flow. Finally,
in harsh environment (in real world) which will be the application layer contains (very often) only one single
dynamic in various manners which will have an influence user application. In addition to the five network layers,
on algorithms requires for the sensor nodes execution. the three management planes have the following
Sometimes, the nodes will be failure at random times and functionality: the power management plane coordinates
allowed to change their ranges for transmission, the energy consumption inside the sensor node. It can, for
reception, computation. This results to continuous change example, based on the available amount
in the network topology [4]. In [6], the network space is divided into rectangular equal
-sized regions (RRs), where the size of the region is set
3. Sensor Network Architectures based on the radio range and how many hops the region
has to cover. Each region (e.g., RRj) is responsible for a
In [5], the authors describes the biologically –inspired
set of resources. The resource key space is divided among
mechanism for sensor network architecture i.e. BiSNET
these regions, such that each resource key (Ki) is mapped
which is based on the concept that bees act
to a region. The key-set to RR mapping (KSeti↔RRj) is
autonomously, influenced by local conditions and local
known by all nodes. The Rendezvous Regions scheme
interactions with other bees. A bee colony adapts to
can be built on top of any routing protocol that can route
dynamic environmental conditions. The BiSNET runtime
packets toward geographic regions. The only requirement
operates a top of TinyOS in each sensor node (figure 1).
of the routing protocol is to maintain approximate
It consists of a middleware platform and one or more
geographic information, such that given an insertion or
agents. BiSNET models a platform as a hive and agents
lookup to a certain region; it should be able to obtain
as bees.
enough information to route the packet toward that
region. Given that the packet is able to reach the region,
there are several design options inside the region itself.
These design options affect the operation of insertions,
lookups, server election, and replication inside the
regions. They also affect the consistency operations for
mobility and failures.

4. Sensor Node Deployment Strategies


Potential-field-based approach for node deployment is
deeply discussed in [11], in which nodes are treated as
Fig. 1: BiSNET Architecture virtual particles, subject to virtual forces. These forces
repel the nodes from each other and from obstacles, and
Agents are designed to follow several biological
ensure that an initial, compact configuration of nodes will
principles such as decentralization, autonomy, food
quickly spread out to maximize the coverage area of the
gathering/storage and natural selection. Each agent reads
network. In addition to these repulsive forces, nodes are
sensor data, and discards or reports it to a base station
also subject to a viscous friction force. This force is used
using biological behaviors such as replication, death and

427

Authorized licensed use limited to: Indian Institute of Technology Hyderabad. Downloaded on August 16,2010 at 08:45:01 UTC from IEEE Xplore. Restrictions apply.
to ensure that the network will eventually reach the state new location. Sensor node deployment method based on a
of static equilibrium, i.e. all nodes will ultimately come to centralized virtual force [15], which combines the idea of
potential field and disk packing .In this a powerful cluster
head, which communicate with all the other sensors,
collect sensor position information, calculate forces and
desired position for each sensor. The distance between
two adjacent nodes when all nodes are evenly distributed
is defined as a threshold to distinguish attractive or
repulsive force between two nodes. The force between
two nodes is zero if their distance is equal to the
threshold, attractive if less than and repulsive if greater
than. The total force on a node is the sum of all the forces
given by other sensors together with obstacles and
preferential coverage in the area. In [16], three protocols
are evaluated for sensor network to maximize the sensor
coverage with less time, movement distance and message
complexity. These protocols first discover the existence
of coverage holes in the target area based on the sensing
service required by the application. After discovering a
coverage hole, the protocols calculate the target positions
of these sensors, where they should move. These three
protocols are VEC (VECtor-based), VOR (VORonoi-
based) and Minimax based on the principle of moving
Fig.2: Protocol stack representation of the sensors from densely deployed areas to sparsely deployed
Architecture areas.
For static environment, deterministic deployment is used
a complete stop. The viscous force does not, however,
since the location of each sensor can be predetermined
prevent the network from reacting to changes in the
properly. The stochastic deployment is used when the
environment; if something is moved, the network will
information of sensing area is not known in advance or is
automatically reconfigure itself for the modified
varied with time, that is the position for sensor
environment before return once again to a static
deployment cannot be determined [9, 17].
equilibrium. Thus, nodes move only when it is necessary
to do so, saving a great deal of energy. A hybrid approach In [18], a centralized deterministic sensor deployment
based on clustering in [13] is used for load balancing, method, DT-score is the basis. Given a fixed number of
where the 2-D mesh is partitioned into 1-D arrays by row deployable sensors, DT-score aims to maximize the area
and by column. Two scans are used in sequence: one for coverage of sensing area with obstacles. In the first phase
all rows, followed by the other for all columns. Within of DT-score, a contour-based deployment is used to
each row and columns, the scan operation is used to eliminate the coverage holes near the boundary of sensing
calculate the average load and then to determine the area and obstacles. In the second phase, a deployment
amount of overload and under load in clusters. Load is method based on the Delaunay Triangulation is applied
shifted from overloaded clusters to under load clusters in for uncovered regions. Before deploying a sensor, each
an optimal way to achieve a balanced state. Each cluster candidate position generated from the current sensor
covers a small square area and is controlled by cluster configuration is scored by a probabilistic sensor detection
head, knows the information about cluster’s position in model.
the 2-D mesh and the number of sensors in the cluster.
Limited motilities based approach is discussed in [14], 5. Routing Protocols
where sensor can flip (or hop) only once to a new Low-energy adaptive clustering hierarchy (LEACH) is a
location and the flip distance is bounded. In this cluster-based protocol that minimizes energy dissipation
framework, the problem is to determine the optimal way in sensor networks by randomly selecting sensor nodes as
for flip based sensors to maximize the coverage in the cluster-heads. Power- Efficient Gathering in Sensor
network. After detecting the coverage holes, the sensors Information System (PEGASIS) is a near optimal chain-
move to new position to prevent coverage hole. Such based protocol. The basic idea of the protocol is to extend
movement can be realized in practice by propellers that network lifetime by permitting nodes to communicate
are powered by fuel, coiled springs that unwinds for exclusively with their closest neighbors, employing a
flipping. In this model, sensors can flip only once to a turn-taking strategy to communicate with the Base Station

428

Authorized licensed use limited to: Indian Institute of Technology Hyderabad. Downloaded on August 16,2010 at 08:45:01 UTC from IEEE Xplore. Restrictions apply.
(BS). Minimum Energy Communication Network
(MECN) establishes and maintains a minimum energy
network for wireless networks by utilizing low power 7. References
geographic positioning system (GPS). The main idea of [1] Lakshman Krishnamurthy, Robert Adler, Phil
MECN is to find the sub-network with the smallest Buonadonna, Jasmeet Chhabra, Mick Flanigan,
number of nodes that requires the least transmission Nandakishore Kushalnagar, Lama Nachman, and Mark
power between any two particular nodes [20]. In [21], Yarvis, “Design and deployment of industrial sensor
author describes network structure by topology matrix as networks: experiences from a semiconductor plant and the
shown in expression (1) north sea,” Proc. The 3rd international conference on
Embedded networked sensor systems (SenSys '05), pp. 64-
75, ACM Press, 2005.
[2] Geoffrey Werner-Allen, Konrad Lorincz, Mario Ruiz,
Omar Marcillo, Jeff Johnson, Jonathan Lees and Matt
Welsh, “Deploying a Wireless Sensor Network on an
Active Volcano,” Special Sensor Nets issue of IEEE
Internet Computing, 2006.
In the matrix, diagonal elements are energy of nodes and
other elements depict the quality of the corresponding [3] Ning Xu, “A Survey of Sensor Network Applications,”
link between corresponding pairs of nodes. The qualities University of Southern California,
http://enl.usc.edu/~ningxu/papers/survey.pdf, 2003.
of these corresponding links are classified into three
grades: Strong, Weak, and No. Strong represents the [4] Stefan Dulman, Paul Havinga “Architectures for Wireless
condition for which normal communication can be carried Sensor Networks”, IEEE ISSNIP 2005.
out. Weak represents the condition that signal can be [5] Pruet Boonma, Paskon Champrasert, Junichi
detected but communication between the two can’t be set Suzuk”BiSNET: A Biologically-Inspired Architecture for
up. And if the state is No, nothing can be known about Wireless Sensor Networks”, IEEE 2006.
the other node. The first line of the matrix tells us the [6] Karim Seada, Ahmed Helmy”Rendezvous Regions: A
energy of BS and corresponding links between BS and all Scalable Architecture for Service Location and Data-
nodes in the network. TBPAR (Topology Based Power Centric Storage in Large-Scale Wireless Networks” in the
Adapting Routing) uses topology matrix to build more proceedings of the 18th International Parallel and
Distributed Processing Symposium (IPDPS’04), IEEE
reasonable routing paths. Also, nodes will adapt their
2004.
transmitting power according to their energy status to
balance energy consumption among nodes. In order to [7] T. Clouqueur, V. Phipatanasuphorn, P. Ramanathan and K.
save energy and reduce transmission failure, nodes with k. Saluja, “Sensor Deployment Strategy for Target
Detection,” WSNA, 2002.
“Str” corresponding link with BS should take more
responsibility and act as upper level nodes. Then nodes [8] S. Dhillon, K. Chakrabarty and S. Iyengar, “Sensor
having “Str” corresponding link with them fall into the placement for grid coverage under imprecise detections,”
Proc.International Conference on Information Fusion,
next level as their children. These nodes also search for
2002.
nodes having “Str” corresponding link with them as their
children. This process won’t stop until all the nodes in the [9] S. Meguerdichian, F. Koushanfar, M. Potkonjak and M. B.
network join in the tree-like hierarchy. In this hierarchy, a Srivastava, “Coverage Problems in Wireless Ad-hoc
Sensor Network,” IEEE INFOCOM’01, April, 2001.
node in the upper level will receive data from its
immediate children and performs signal processing [10] S. Meguerdichian, F. Koushanfar, G. Qu and M.
functions on the data (e.g., data aggregation), and Potkonjak, “Exposure in Wireless Ad-Hoc Sensor
Networks,” Mobicom, 2001.
transmits the processed data together with its own to its
father node or to the remote BS. Therefore, being an [11] A. Howard, M. J. Mataric and G. S. Sukhatme, “Mobile
upper level node is much more energy intensive, Sensor Networks Deployment using Potential Fields: A
especially for those nodes communicating with BS. Distributed, Scalable Solution to the Area Coverage
Problem,” the 6th International Symposium on Distributed
Autonomous Robotics Systems, Japan, June, 2002.
6. Conclusion
[12] A. Howard, M. J. Mataric and G. S. Sukhatme, “An
In this paper we discussed state-of-the-art of Incremental Self-Deployment Algorithm for Mobile Sensor
architectures and existing node deployment strategies in Networks,” Autonomous Robots, Special Issue on
wireless sensor network. We also discussed the Intelligent Embedded Systems, September, 2002.
characteristics of the environment in which the sensor [13] J. Wu and S. Wang, “Smart: A scan-based movement –
networks may deploy. There are still many challenges that assisted deployment method in wireless sensor networks”,
need to be solved in sensor networks. in Proceedings of IEEE Conference on Computer
Communication (INFOCOM), Miami, March, 2005

429

Authorized licensed use limited to: Indian Institute of Technology Hyderabad. Downloaded on August 16,2010 at 08:45:01 UTC from IEEE Xplore. Restrictions apply.
[14] Sriram Chellappan, Xiable Bai, Din Ma and Dong Xuan,
“Sensor Deployment Using Flip-Based Sensors”.
[15] Y. Zou and K. Chakrabarty, “Sensor deployment and target
localization based on virtual forces,” in Proceedings of
INFOCOM, March, 2003.
[16] G. Wang. G. Cao and T. La Porta, “Movement- assistd
sensor deployment”, in Proceedings of IEEE Conference
on Computer Communication (INFOCOM), Miami, March
2005.
[17] C. Huang, and Y. Tseng, “The Coverage Problem in a
wireless Sensor Network,” in Proceedings of WSNA ’03,
pp.115-121, 2003.
[18] Chun-Hsien Wu, Kuo-Chuan and Yeh-Ching Chung, “A
Delaunay Triangulation Based Method for Wireless Sensor
Network Deployment,” in Proceedings of the 12th
International Conference on Parallel and Distributed
Systems (ICPADS’06), IEEE, 2006.
[19] I.F.Akyildiz, W.Su, Y. Snakarasubramaniam, and E.
Cayirci,”A survey on sensor networks”, IEEE
communication Magazine, 40(8):102-114, August 2002.
[20] R. A. Santos, A. Edwards, O. Álvarez, A González, A.
Verduzco,”A Geographic Routing Algorithm for
Wireless Sensor Networks” in the Proceedings of the
Electronics, Robotics and Automotive Mechanics
Conference (CERMA'06).
[21] Yunquan Dong and Qingyi Quan,” Topology-Based and
Power-Adaptive Routing Algorithm for Wireless
Sensor Network”, IEEE, 2007.

430

Authorized licensed use limited to: Indian Institute of Technology Hyderabad. Downloaded on August 16,2010 at 08:45:01 UTC from IEEE Xplore. Restrictions apply.

Potrebbero piacerti anche