The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - May (2009 vol.20)
pp: 607-622
Abdelmounaam Rezgui , Virginia Tech, Blacksburg
Mohamed Eltoweissy , Virginia Tech, Blacksburg
ABSTRACT
We present Reliable Adaptive serviCe-driven Efficient Routing (μRACER), a routing protocol suite based on a novel service-oriented design for sensor-actuator networks where nodes expose their capabilities to applications as a service profile. A node's service profile consists of a set of services (i.e., sensing and actuation capabilities) that it provides and the quality-of-service (QoS) parameters associated with those services (delay, accuracy, freshness, etc.). μRACER uses an efficient service-aware routing approach that aggressively reduces downstream traffic (from the sink to the network's nodes) by translating service profiles into efficient paths for queries. To support QoS,μRACER dynamically adapts each node's routing behavior and service profile according to the current context of that node, i.e., number of pending queries and number and type of messages to be routed. Finally, μRACER improves end-to-end reliability through a scalable reputation-based approach in which each node is able to locally estimate the next hop of the most reliable path to the sink. Service- and context-aware reliable routing enhances the network's efficiency and effectiveness (satisfaction of applications' QoS requirements). We implemented μRACER on top of TinyOS and conducted several experiments that confirmed μRACER's ability with regard to each of its design objectives.
INDEX TERMS
μRACER, sensor-actuator networks, routing, service-oriented architectures, trust, reputation, context-aware routing.
CITATION
Abdelmounaam Rezgui, Mohamed Eltoweissy, "μRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks", IEEE Transactions on Parallel & Distributed Systems, vol.20, no. 5, pp. 607-622, May 2009, doi:10.1109/TPDS.2008.94
REFERENCES
[1] K. Akkaya and M. Younis , “Energy-Aware Routing of Delay-Constrained Data in Wireless Sensor Networks,” J. Comm. Systems, special issue on QoS Support and Service Differentiation in Wireless Networks, vol. 17, pp. 663-687, 2004.
[2] I. Akyildiz , W. Su , Y. Sankarasubramaniam , and E. Cayirci , “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, 2002.
[3] J.N. Al-Karaki and A.E. Kamal , “Routing Techniques in Sensor Networks: A Survey,” IEEE Comm., vol. 11, no. 6, pp. 6-28, Dec. 2004.
[4] A. Cerpa and D. Estrin , “ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies,” IEEE Trans. Mobile Computing, special issue on Mission-Oriented Sensor Networks, vol. 3, no. 3, pp. 272-285, July-Sept. 2004.
[5] A. Boukerche , R.W.N. Pazzi , and R.B. Araujo , “Fault-Tolerant Wireless Sensor Network Routing Protocols for the Supervision of Context-Aware Physical Environments,” J. Parallel and Distributed Computing, vol. 66, no. 4, pp. 586-599, Apr. 2006.
[6] S. Buchegg and J.Y. Le Boudec , “A Robust Reputation System for Peer-to-Peer and Mobile Ad-Hoc Networks,” Proc. Second Workshop Economics of Peer-to-Peer Systems (P2PEcon '04), June 2004.
[7] D. Gay , P. Levis , D. Culler , and E. Brewer , nesC 1.1 Language Reference Manual, http://nescc.sourceforge.net/papersnesc-ref.pdf , May 2003.
[8] B. Deb , S. Bhatnagar , and B. Nath , “Information Assurance in Sensor Networks,” Proc. Second ACM Int'l Conf. Wireless Sensor Networks and Applications (WSNA '03), pp. 160-168, 2003.
[9] B. Deb , S. Bhatnagar , and B. Nath , “Reinform: Reliable Information Forwarding Using Multiple Paths in Sensor Networks,” Proc. 28th Ann. IEEE Int'l Conf. Local Computer Networks (LCN '03), p. 406, 2003.
[10] A. Dey , “Understanding and Using Context,” Personal and Ubiquitous Computing, vol. 5, no. 1, pp. 4-7, 2001.
[11] S. Ganeriwal , L. Balzano , and M.B. Srivastava , “Reputation-Based Framework for High Integrity Sensor Networks,” ACM Trans. Sensor Networks, 2008.
[12] A. Gopalan and T. Znati , “A Context-Aware Data Forwarding Algorithm for Sensor Networks,” Proc. 38th IEEE Ann. Simulation Symp. (ANSS '05), pp. 7-14, Apr. 2005.
[13] Q. He , D. Wu , and P. Khosla , “SORI: A Secure and Objective Reputation-Based Incentive Scheme for Ad-Hoc Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '04), Mar. 2004.
[14] H. Kwon , T.H. Kim , S. Choi , and B.G. Lee , “Lifetime Maximization under Reliability Constraint via Cross-Layer Strategy in Wireless Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05), vol. 3, pp. 1891-1896, Mar. 2005.
[15] Q. Huaifeng and Z. Xingshe , “Context Aware Sensornet,” Proc. Third Int'l Workshop Middleware for Pervasive and Ad-Hoc Computing (MPAC '05), pp. 1-7, Nov.-Dec. 2005.
[16] K.-S. Hung , K.-S. Lui , and Y.-K. Kwok , “A Trust-Based Geographical Routing Scheme in Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), 2007.
[17] K. Akkaya , M. Younis , and M. Youssef , “Efficient Aggregation of Delay-Constrained Data in Wireless Sensor Networks,” Proc. Workshop Internet Compatible QoS in Ad Hoc Wireless Networks (IC-QAWN '05), in conjunction with the Third ACS/IEEE Int'l Conf. Computer Systems and Applications, Jan. 2005.
[18] T. Kawai , N. Wakamiya , and M. Murata , “ACM: A Transmission Mechanism for Urgent Sensor Information,” Proc. First Int'l Workshop Research Challenges in Next Generation Networks for First Responders and Critical Infrastructures (NetCri '07), Apr. 2007.
[19] M. Hartmann , H. Ziekow , and M. Mühlhauser , “Context Aware Routing in Sensor Networks,” Proc. Kommunikation in Verteilten Systemen (KiVS '07), pp. 175-180, 2007.
[20] R. Madan , S. Cui , S. Lall , and A.J. Goldsmith , “Cross-Layer Design for Lifetime Maximization in Interference-Limited Wireless Sensor Networks,” IEEE Trans. Wireless Comm., Nov. 2006.
[21] S. Madden , M.J. Franklin , J.M. Hellerstein , and W. Hong , “TinyDB: An Acquisitional Query Processing System for Sensor Networks,” ACM Trans. Database Systems, vol. 30, no. 1, pp.122-173, 2005.
[22] C. Mascolo and M. Musolesi , “SCAR: Context-Aware Adaptive Routing in Delay Tolerant Mobile Sensor Networks,” Proc. Delay Tolerant Mobile Networks Symp. Int'l Wireless Comm. and Mobile Computing Conf. (IWCMC '06), July 2006.
[23] L. Moraru , P. Leone , S. Nikoletseas , and J.D.P. Rolim , “Near Optimal Geographic Routing with Obstacle Avoidance in Wireless Sensor Networks by Fast-Converging Trust-Based Algorithms,” Proc. Third ACM Workshop QoS and Security for Wireless and Mobile Networks (Q2SWinet '07), pp. 31-38, 2007.
[24] N. Sadagopan , B. Krishnamachari , and A. Helmy , “Active Query Forwarding in Sensor Networks (ACQUIRE),” J. Ad Hoc Networks, pp. 91-113, Jan. 2005.
[25] A. Rezgui and M. Eltoweissy , “Service-Oriented Sensor-Actuator Networks,” IEEE Comm., vol. 45, no. 12, pp. 92-100, Dec. 2007.
[26] S. Pai , T. Roosta , S. Wicker , and S. Sastry , “Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust,” Proc. 21st Int'l Conf. Advanced Information Networking and Applications Workshops (AINAW '07), pp. 443-450, May 2007.
[27] B. Schilit and M. Theimer , “Disseminating Active Map Information to Mobile Hosts,” IEEE Network, vol. 8, no. 5, pp. 22-32, 1994.
[28] R.C. Shah , A. Bonivento , D. Petrovic , E. Lin , J. van Greunen , and J. Rabaey , “Joint Optimization of a Protocol Stack for Sensor Networks,” Proc. IEEE Military Comm. Conf. (MILCOM), 2004.
[29] Y. Shi , Y.T. Hou , H.D. Sherali , and S.F. Midkiff , “Cross-Layer Optimization for Routing Data Traffic in UWB-Based Sensor Networks,” Proc. ACM MobiCom '05, pp. 299-312, 2005.
[30] V. Shnayder , M. Hempstead , B.r. Chen , G.W. Allen , and M. Welsh , Simulating the Power Consumption of Large-Scale Sensor Network Applications, J.A. Stankovic, A. Arora, and R. Govindan, eds., SenSys, pp. 188-200, 2004.
[31] N. Tezcan , E. Cayirci , and M.U. Caglayan , “End-to-End Reliable Event Transfer in Wireless Sensor Networks,” Proc. 15th IEEE Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC '04), pp. 989-994, Sept. 2004.
[32] TinyOS Tutorial, http://www.tinyos.net/tinyos-1.x/doctutorial , 2008.
[33] Active Database Systems—Triggers and Rules for Advanced Database Processing, J. Widom and S. Ceri, eds., 1996.
33 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool