Skip to main content

ARROW: Azimuth-Range ROuting for large-scale Wireless sensor networks

Abstract

During the past few years, the development of wireless sensor network technologies has spurred the design of novel protocol paradigms capable of meeting the needs of a wide broad of applications while taking into account the inherent constraints of the underlying network technologies, e.g. limited energy and computational capacities. Geographic routing is one of such paradigms whose principles of operation are based on the geographic location of the network nodes. Even though the large number of works already reported in the literature, there are still many open issues towards the design of robust and scalable geographic routing algorithms. In this study, after an analysis of the most relevant solutions reported in the literature, we introduce Azimuth-Range ROuting for large-scale Wireless (ARROW) sensor networks. ARROW goes a step further on the design of geographic routing protocols by defining a simple and robust routing protocol whose operation principles completely free the network nodes of the burden of keeping routing records. Under ARROW, nodes carry out all routing decisions exclusively using the information imbedded in the data packets while avoiding the risk of routing loops, a major challenge when designing routing protocols for large-scale networks. Moreover, ARROW is supplemented with a simple yet effective forwarder resolution protocol, also introduced in this study, allowing the fast and loop-free selection of the forwarding node in a hop-to-hop basis. Both protocols, ARROW and the proposed forwarder resolution protocol, are validated by extensive computer simulations. Our results show that both protocols exhibit excellent scalability properties by limiting the overhead.

1. Introduction

Wireless Sensor Networks (WSNs), as a research topic, are currently a subject of intensive investigation. They are being used in a broad spectrum of applications, (i.e. tracking patients at hospitals, gathering data from a hostile environment, controlling electronic equipment at households and many others) and are considered as one of the enabling technologies of the Future Internet. However, the diversity of possible applications creates numerous problems when defining a standard for WSNs, as the requirements may completely be different depending on the network purpose.

In this article, we address routing in a large-scale WSN scenario: a sensor network consists of an arbitrary large number of nodes (hundreds or thousands), randomly deployed in an outdoor area. The nodes then sense the environment and send the data to a few master-nodes, called sinks, responsible of gathering the data generated by a group of nodes located close by. Such a scenario corresponds to the deployment of WSNs used for collecting data for applications, such as environmental or agriculture monitoring, observing enemy units in a military context, as well as measuring the parameters of a polluted or inaccessible region.

Taking into account the abovementioned operational features and applications, the design of the underlying routing protocol must fulfil the following requirements: (1) the protocol should be highly scalable. The protocol should be able to deliver the packets to the closest reachable sink independently of the network size; (2) the protocol should be able to recover quickly from network topology changes. In a sensor network, the topology may vary due to sensor energy depletion (some nodes may disappear from the network), wireless channel fading, node movements, or node mobility; so the topology information stored in the network quickly becomes outdated. (3) the protocol should be robust in the sense that it has to efficiently operate in irregular network topologies. It is very likely that, because of their large size and nature of the target application, WSNs will be deployed randomly or quasi-randomly. Random network topologies result in routing problems, e.g. a data packet can get stuck somewhere in the network or circulate in loops. Recovery mechanisms are thus needed to avoid such situations. Furthermore, as the number of nodes is very large, their production cost should be reduced as much as possible. This issue imposes physical constraints to the sensor processors complexity and the battery capacity, which in addition, limits the complexity of the transmission protocols and the computing processes to be performed by the sensor nodes. To reduce the energy consumption and extend the lifetime of the battery-limited nodes, the number of packets exchanged and the protocol overhead should also be minimized.

Geographic routing meets the aforementioned restrictions in a natural way. Packet forwarding is performed in a localized manner, only involving the relevant nodes, i.e. those within the path, and with the routing decisions using the information imbedded within the header of the packet. It is based on the assumption that a localization mechanism exists enabling the sensor nodes to calculate their own position and the position of the nearest sink. Localization can be done by different methods, e.g. by received signal strength measurements, angle-of arrival, or time-of-arrival techniques implemented in radio frequencies or by using acoustic waves. These techniques are thoroughly discussed in the open literature, see, e.g. [16]. All these techniques (except passive localization where, however, the localized node is not aware of its own position coordinates) require receiving some radio beacons. An accurate localization algorithm consumes some time: an example of trade-off calculations between the accuracy, number of beacons and localization time can be found in [5].

Afterwards, a node can exploit the position knowledge to forward a data packet in the proper direction. This feature simplifies the whole routing procedure and enhances its scalability, since large routing tables can be avoided. It also increases the robustness of the routing mechanism, making it more resilient to network topology variations.

Geo-routing protocols usually operate in one of two modes: greedy forwarding [1] or face routing [7]. Under the former, a node chooses as forwarder, the neighbour with the shortest distance to the sink as long as such neighbour can be identified. However, in the case that a local minimum is reached, that is to say, if no neighbour is closer to the sink than the current node, the routing protocol should change its operating mode. This situation arises in the presence of a hole in the network, i.e. a large area not covered by nodes. In this case, a face routing mechanism must be initiated whose main task is to forward the packet along the boundary of the hole. However, it requires the network subgraph be planar, since intersecting links may cause a routing loop. In the presence of intersecting links, some planarization process must be done prior to forwarding the data. Such process consists on disabling some links in order to avoid routing loops. The planarization process can be performed following one of two approaches, beacon and beaconless planarization. The former requires that the current node gets to know the overall neighbourhood topology by exchanging beacon packets with its neighbours. Since this may be an intensive signalling procedure in terms of energy consumption and communication overhead, the latter approach avoids exchanging full knowledge and tries to construct a local planar subgraph by exchanging a limited number of control messages during the routing process.

Although beaconless planarization is more efficient, it still requires a considerable overhead and may result in the use of longer routing paths (see Figure 1). In this article, we adopt a novel approach to geographic routing in large-scale WSNs. The main idea is to avoid planarization at all, beacon or beaconless. In our proposed routing protocol, packets are routed using the greedy forwarding mode as long as possible. Whenever the packet gets stuck in a local minimum, the packet is routed along the boundary of the hole without requiring a planarization process. Instead, the routing along the boundary of the hole will be performed using a simple mechanism relying on the information included in the packet header. Moreover, the routing decision at each hop is taken distributedly by the current node and its neighbours by means of a simple forwarder resolution protocol. Even though similar approaches have already been reported in the literature, our proposed resolution protocol does not require that the nodes get to know their transmission ranges. The operation details and a performance evaluation of the overall solution are given in Sections 3 and 4, respectively.

Figure 1
figure 1

An example of routing paths with planarization (solid arrows) and without it (dashed arrows). Planarization disables the link AB, which results in unnecessary hops.

The main contributions of this article can be summarized as follows:

  1. a)

    A novel geo-routing protocol ARROW. The protocol is based on simple angle and range calculations to be performed by the sensor nodes without requiring at all a local or global planarization of the network. We also provide a detailed performance evaluation of ARROW for different network sizes and node densities.

  2. b)

    A novel forwarder resolution protocol that enables sensors to compute a routing decision allowing the selection of the best forwarder in a distributed way, i.e. in a hop-by-hop basis. This protocol uses simple metrics that can be computed from local information.

  3. c)

    An analysis of the proposed forwarder resolution under uncertainty. Differently to previous resolution protocols, the forwarder resolution protocol introduced herein does not require the nodes to have a perfect knowledge of their transmission ranges. Numerical results obtained via analysis and simulation show the effectiveness of the proposed protocol in routing the packets through the network even in the case where the nodes do not have perfect knowledge of their coverage ranges.

The remainder of the article is organized as follows. In Section 2, we describe the most common geo-routing approaches and discuss related work. Our proposed routing algorithm and the accompanying forwarder resolution protocol are explained in Section 3. The protocol performance is evaluated by simulations in Section 4. Section 5 discusses propagation issues and provides some conclusions. Finally, in Appendices 1 and 2, we explain the details of the routing metrics and provide a mathematical analysis of the forwarder resolution protocol.

2. Related work

Geographic routing protocols for WSNs are a broad topic in the open literature with a large number of solutions proposed to date. Greedy routing, the most straightforward concept described in the previous section, is very effective, but only in dense networks. When the node density is not high enough, less than eight neighbours in average, there is a high probability that a packet may get stuck in a network local minimum, i.e. in a node that has no neighbours closer to the sink [7]. Many authors simply state that an extra procedure is needed [8, 9] while others suggest the use of a flooding mechanism [10] which is time and energy consuming. Face routing which is the most promising recovery solution consists on routing the packet along the hole boundary [11]. This procedure can be further refined in multiple ways, for instance to minimize the routing cost, and is usually combined with greedy routing [7, 1214].

Face routing combined with greedy routing guarantees packet delivery if certain additional conditions are met [15]. However, face routing requires carrying out a previous network planarization process. There are different suitable planar graph constructions like the Gabriel graph or the relative neighbourhood graph [16]. However, this process needs information about the complete neighbourhood of a node in the worst case. Hence, planarization requires that nodes obtain full knowledge of their neighbourhood by exchanging beacon packets [7]. This may be an intensive signalling and maintenance procedure in terms of energy consumption and communication overhead, especially if the topology of the network changes frequently.

The alternative approach of beaconless planarization tries to construct a local planar subgraph using as few messages as possible. Recently, a beaconless planarization and forwarding procedure based on a Select-and-Protest philosophy has been proposed [16] and later extended in [17]. The graph planarization is performed on the run during data transmission by the Angular Relaying algorithm: nodes listen to the transmissions in their vicinity and send protests if they become aware that the selection of a potential forwarder may result in intersecting links, according to the Gabriel graph construction [18]. A protesting node becomes the candidate, but the new potential forwarder is also a subject to further protests. The process of removing links is continued until there are no more protesting nodes. The selection of the forwarder is based on the least angular distance to the previous hop.

Although this procedure is more efficient than other planarization approaches, it still introduces considerable overhead due to the chain of protest messages, and it may result on the use of unnecessary longer paths (see Figure 1). Furthermore, the nodes are assumed to know their radio transmission range which for most practical purposes is unrealistic in wireless networks. This is also the case of the mechanism described in [19], where the message delivery is guaranteed without prior planarization provided that the nodes have a perfect knowledge of their radio transmission range.

The mechanism proposed herein is also based on an angular metric, but as we will show in Section 3, it does not require the implementation of a local planarization procedure and still guarantees the delivery of the data packets. In Section 4, we compare the performance of the face routing variant with our proposal and show that the routing cost is significantly reduced. In our routing protocol, the nodes are not required to keep track of the links having been switched off. Moreover, the forwarder resolution protocol, also proposed in this article, is quite effective in identifying from the very first control exchange the best forwarder candidates among the neighbouring nodes. This latter feature allows that a large majority of the neighbouring nodes be released of further control exchanges which translates on significant energy savings.

A different solution that should also be mentioned is the BoundHole algorithm [20]. As local minima occur at the boundaries of holes, i.e. the regions in the network where greedy routing can fail, BoundHole finds these boundaries in advance, and then routes a data packet along a boundary. BoundHole requires nodes to gather information about their 1-hop neighbourhood enabling them to identify stuck nodes as a previous step to detect a hole boundary. However, routing along the boundary can fail if the destination is inside the hole. In that case, a restricted flooding procedure is initiated by the boundary nodes until a path is found [20]. In either case, the mechanism to be implemented introduces a considerable overhead. Our approach is similar to BoundHole, as we also use the least angle distance to select the next forwarder. However, unlike BoundHole, ARROW does not require to implement the restricted flooding procedure, even if the destination is inside the hole.

Beaconless planarization relies on the assumption that nodes know their neighbours on demand. So there should also be an additional transmission scheme that enables to efficiently forward a data packet from a node to the chosen neighbour, without wasting time and energy in topology discovery procedures. Angular Relaying [16] clearly needs a deterministic procedure but it does not specify how to solve collisions among potential forwarders or protests. Several papers dealing with such schemes and suitable for geographic routing in WSNs have already been proposed. Zorzi and Rao [21, 22] introduced a scheme to select a forwarder based on the distance that a data packet could progress: a backlogged node sends a packet with its own position when the channel is idle. Each neighbour node then calculates the fitness of the forwarder and responds to the initial packet using as a basis a time slotted scheme. In the first slot, the best possible forwarders respond and, later, the worse does. Nodes that hear a previous response withdraw their own transmissions. If the initial transmitter receives a single response, it replies with the data packet and the forwarding procedure is successfully finished. If a collision occurs, i.e. two or more neighbour nodes respond in the same timeslot, the initial transmitter indicates that fact and the colliders reply again with a probability of 50%. This procedure enables to choose the final forwarder in one or few more extra steps.

A similar solution is described in [23, 24] and developed in [25]. To decrease the number of exchanged overhead packets, it is proposed to omit the confirmation packets. After a delay period, the nodes under consideration respond with the same data packet, forwarding it at the same time and shortening the whole procedure. As the nodes that are competing to forward the packet can have different group of neighbours, the entire scheme can lead to packet multiplication and, as a result, additional energy waste and packet collisions. This problem was later solved in [26] by limiting the area where the potential forwarder can be located and storing the hop number in the packet header.

Both described communication schemes share two shortcomings. First, they do not consider the situation when there are no neighbours closer to the sink than the transmitting node, i.e. the packet is stuck in a local minimum. Second, when a collision happens, the forwarder is chosen randomly among the competitors, so it is not guaranteed that the most appropriate neighbour will be selected. The forwarder resolution protocol proposed in Section 3.3 has a similar operation: nodes select a slot according to how good forwarders they are. Our proposal, however, does not suffer from these flaws, as after a collision it organizes another competition in order to elect the best forwarder. Some similar ideas can be found in [17], but without any performance analysis.

Finally, it should be noted that these solutions combine routing with some MAC functions, but others need an additional specific MAC layer. Interestingly, our proposal may be implemented on top of a MAC service that allows nodes to establish activity-sleep periods without knowing their neighbours, like for instance B-MAC [27].

3. ARROW protocol

Taking into account the limitations and goals discussed in the previous sections, we propose a novel approach to geographic routing for large-scale WSNs. Basically, the proposed ARROW protocol proceeds according to two states that can be described as: (a) greedy, where a transmitting node selects the neighbour closest to the sink and (b) azimuth, which is a procedure used to route the data packets along the boundary of a hole using an angle-based metric. As explained in Section 3.1, the azimuth state guarantees that the transmitted packet reaches a node closer to the sink than the local minimum. Then, the greedy state is resumed.

One of the main features of ARROW is to avoid planarization, beacon or beaconless, even in the presence of a hole in the network. Therefore, we use the greedy scheme as long as possible. If the packet gets stuck in a local minimum, it is routed along the boundary of the hole until it reaches a node located closer to the sink than the local minimum (Figure 2). Each routing decision is made with very limited information consisting of the position of the current node, sink node and two previous hop nodes, the least distance to the sink and the forwarding direction (described later). Moreover, each routing decision is taken distributedly by the forwarding node using the aforementioned information imbedded into the packet header and actually implemented by means of the forwarder resolution protocol also proposed in this article.

Figure 2
figure 2

ARROW protocol: a message originated in O is transported according to greedy state to G (local minimum). From the node G, the routing is continued with the azimuth state until the message reaches the node D. As |DS| < |GS|, the greedy state is resumed in the node D.

The flow chart of ARROW is illustrated in Figure 3, while a thorough description and the rationale behind the routing protocol is presented in Section 3.1. A discussion on the processing tasks to be made by the nodes is provided in Section 3.2. Finally, the forwarder resolution protocol that allows ARROW to apply the rules in a distributed manner is explained in Section 3.3.

Figure 3
figure 3

The ARROW flow chart.

3.1. Routing algorithm

Our routing proposal has been developed with the following assumptions:

  1. a)

    The connectivity between sensor nodes is characterized by the unit disk graph model [28]. All nodes have the same transmission power and equal circular range. Under these assumptions, the entire network topology can be scaled up or down (dividing all the distances by the nodes transmission range) to set-up the transmission range equal to 1, independently of the transmission power and path loss. In the final section of the article, we discuss the impact of the connectivity model and the propagation scenarios on the routing protocol performance.

  2. b)

    The network is connected. A path between each sensor node and at least one sink exists. If there exists more than a sink in the network, the sensor nodes must be aware of the existence of the nearest sink they are connected to, not simply the closest one. This assumption ensures that a data packet will not circulate indefinitely around the closest sink to the origin node for which no path may exist.

Figure 3 illustrates the general operation of ARROW. As shown in the figure, ARROW switches back and forth between two states: greedy and azimuth. When a node gets ready to transmit a packet, it initiates the routing process in the greedy state. While in this state, the source node as well as all the nodes in the path towards the destination will choose among the neighbours the node meeting the following two conditions: (1) the neighbour with the shortest distance to the closest reachable destination and (2) the neighbour whose distance to the closest reachable destination is shorter than the distance of the current node, i.e. the one currently looking for a suitable neighbour [15]. If such neighbour exists, the node will forward the packet to it. The routing process will proceed in this way until the packet is delivered to the destination or arrives at a stuck node, i.e. a node located at the boundary of a hole (node G in Figure 2) [20]. In this latter case, the current node will be unable to find a neighbour fulfilling the aforementioned two conditions. In order to be able to proceed, ARROW switches to the azimuth state.

Upon entering the azimuth state, and in order to be able to evaluate the progress of the routing strategy, the distance between the stuck node, G, and the destination, S, is first stored in the packet header. We will refer to this value as the shortest distance and it will be denoted by |GS|. While in the azimuth state, the main goal of ARROW will consist of routing the packet around the hole boundary, searching for a path towards the destination. ARROW will switch back to the greedy state as soon as a node closer to the sink than the stuck node is reached. Furthermore, and in order to be able to properly operate under all conditions, while in the azimuth state, ARROW will register the coordinates of the two previously visited nodes in the packet header, (x1, y1) and (x2, y2), where (x1, y1) refers to the very last visited node. Initially, (x1, y1) is set equal to the coordinates of S, i.e. the stuck node, and (x2, y2) is not set.

Upon entering the azimuth state and once having updated the header data, ARROW starts by deciding the way to take to surround the hole. ARROW chooses as next node, from now on referred as the forwarder, the neighbour of the stuck node, G, with the smallest azimuth angle relative to the direction to the sink (see Figure 4). The choice of the first forwarder determines the forwarding direction around the hole, i.e. clockwise or counter-clockwise. In this way, ARROW will attempt to surround the hole following the forwarding direction as long as it finds a suitable forwarder. ARROW then proceeds by choosing the node with the smallest angle relative to the direction of the edge of the previously visited edge as the next forwarder (Figure 5). The angles are calculated taking into account the forwarding direction being followed. This is to say, if ARROW has decided to surround the hole clockwise, the angles are calculated in the counter-clockwise direction and vice versa (Figure 5). In the worst case, if the current node has no further neighbours other than the previous neighbour, the packet will have to be sent one-hop back. Then, the forwarding process resumes following the same forwarding direction, i.e. the node with the smallest angle relative to the direction of the previously visited edge will be chosen as the next forwarder.

Figure 4
figure 4

An illustration of the first hop in the azimuth state (a part of the network topology is shown). The packet has just reached node G which is a local minimum. The next hop node is chosen among all the neighbours of the node G, comparing their azimuth angles relative to the direction to the sink. As α < β < χ, the node A will be the next hop. It also determines the forwarding direction: clockwise around the hole.

Figure 5
figure 5

Next step of the azimuth state (continuation after Figure4). Among the neighbours of A, a forwarder is chosen that has the least angle relative to the direction to G (previous node). The forwarding direction is already set (clockwise), so the angles are calculated in the counter-clockwise direction. As δ < ε < χ, the node D is chosen as the next hop.

This simple 2-state procedure guarantees the delivery of packets in planar networks. To verify the correct operation of ARROW under these conditions, simply consider the stuck node G and the circle centred at the sink S with radius |GS|. In this case, ARROW will not return to the greedy state as long as it has not reached a node closer to the sink than the previous local minimum. Once in the greedy state, the packet may reach the sink or another stuck node, U. Since |US| < |GS| and because the network is composed of a finite number of nodes, by switching back and forth between the greedy and azimuth states, ARROW guarantees the delivery of the packet to the final destination. A rigorous demonstration of the principles on which the ARROW protocol has been developed can be found in ([15]: Theorem 4, [20]: Lemma 3.13).

In the case of a non-planar network, further provisions have to be put in place in order to ensure the delivery of the packet to its final destination. In a non-planar network, the existence of intersecting edges lead to routing loops (Figure 6b). In order to overcome this problem, a graph planarization procedure could be performed. However, such procedure requires the exchange of messages which implies the definition of a protocol for this purpose [16] and the handling of data structures to be stored in the forwarding nodes. In this article, we propose a simple and efficient solution whose only requirement consists of registering the coordinates of the last two visited nodes in the packet header. While in the azimuth state and in order to properly follow the hole boundary, each node will have to verify that the edge to be used is not intersecting the already visited ones and that there is in fact a hidden edge leading to a better positioned node.

Figure 6
figure 6

A planar network (a) and non-planar one with intersecting links (b). A packet is trying to reach the sink while in azimuth state, from the node Y. The first hop is the node B. Then, keeping the clockwise forwarding direction, the next hops are chosen. In the planar network, the packet eventually reaches the sink. In the non-planar one, the packet from the node B will be forwarded to A, because ∟YBA < ∟YBD < ∟YBE < ∟YBX and the node D, being the only way to the sink, does not lie on the hole border. Note, that the forwarding direction which is clockwise around the hole means the counter-clockwise calculation of the azimuth angles (see also Figure 5) and the counter-clockwise circulation around a part of the network. As a result, the packet will remain circulating in a loop.

Our proposed mechanism is built on the results reported in [29]. In that study, the authors have shown that if two links AB and CD intersect in a unit disk graph, only three possible cases may arise, as shown in Figure 7. Case (a) causes no problems: while operating in the azimuth state, ARROW will traverse the exterior boundary (links BC, CA, AD and DB), visiting in the worst case the four nodes. Hence, a better positioned node will always be reached. However, the other cases may cause a packet to fall into a loop. In case (b), if the packet arrives to node A, B or D, it will not be forwarded to node C. It could use the link CD to reach it, but the azimuth state rules do not allow for that. On the other hand, in case (c), all the nodes can be reached, but the routing algorithm is unable to follow the hole border, because it is unaware of crossing a link having been previously visited. See also Figure 8, where this case is explained with further detail. Hence, to avoid loops and errors in cases (b) and (c), we derive a simple stepwise procedure.

Figure 7
figure 7

Three only possible cases of two crossed links AB and CD . Let us assume that the sink is located above the considered nodes (out of their communication range), the forwarding direction is clockwise and B is the node where the packet arrives (other situations can easily be considered by analogy).

Figure 8
figure 8

The azimuth state, clockwise forwarding direction. As δ < ε, the next hop after the node A would be the node B. The backward rule prevents such a situation: the candidates for potential forwarders (nodes B and E) check if their links with the current node (links AB and AE) are not intersecting the penultimate hop edge (the link CD). Because of AB and CD intersection, the node B is not considered as a potential forwarder and, eventually, the packet is routed to the node E.

In order to be able to identify crossing edges, the mechanisms proposed herein require to make us of the nodes coordinates of the two previously visited nodes be recorded in the packet header previously described. The proposed mechanism can be simply stated as below.

First, backward rule: the current node additionally broadcasts the coordinates of the two last hop nodes. Then, each neighbour node locally determines the relative positions of the links and decides if it can serve as a potential forwarder. If the link from the current node to the neighbour crosses the penultimate edge, the neighbour does not propose itself and remains silent. An example is given in Figure 8, where the node B does not propose itself as a next hop for the node A, as links AB and CD are intersected. The details on how the relative positions are obtained by the nodes are described in Section 3.2. The final routing decision is made by the current node after receiving the responses from all potential forwarders. Let us note that this procedure obtains the same results as the procedure of avoiding nodes in the forbidden region, defined in [20], which ensures that we are correctly following the hole boundary. The backward rule solves the problems of case (c) from Figure 7, independently of the node where the packet arrives.

Second, IC triangle rule: the case (b) from Figure 7 shows that it is possible for the routing protocol to miss the only path to the sink. The path could be not accessible from the boundary of the hole because of the crossing edges (Figure 6b) and thus, a transmitted packet may fall into a routing loop.

Our solution is depicted in Figure 9. At each hop, e.g. from B to A, it should be verified if there is a link between a certain node located farther from the hole boundary (let us call it D) to a node located closer to the sink and non-reachable neither from A nor from B (let us call it C). In order to avoid rooting loops, we have to find if such a node D exists and forward the packet to it. If it exists, it must be located within the interconnecting (IC) triangle having as vertices A, B and the point k (Figure 9). The IC triangle is isosceles with the link AB being its base and the angles ABk and BAk being equal to 30° and AkB equal to 120°. In other words, a search within the IC triangle ensures that the node D interconnecting to C will be found, as proved below.

Figure 9
figure 9

The interconnecting nodes can be located only in the indicated shaded zone. For the sake of simplicity of the calculations performed by nodes, the zone is extended into the so-called IC triangle.

Theorem: The interconnecting node D, if exists, is always located in the IC triangle as defined above.

Proof: We are looking for node D connected with node C, this latter fulfils the following two conditions: (1) it is located out of the range of both A and B and (2) it is closer than both A and B to the closest reachable sink. Thus, according to the unit disk graph model, the distance DC must be shorter than AC and BC. If node D exists, it must be located on the opposite side of the link AB to C: if not, D would have been found before as a next hop node instead of A. Thus, D must be located in the circle centred at C and with the radius equal to the radio transmission range, while at the same time the links AB and DC must cross. Consequently, the area where D can be located is limited to the shaded area shown in Figure 9. The size of this area increases as the distance between A and B increases. The size is maximum when A and B are located just on the transmission radius of C. In the borderline case, A, B and C create an equilateral triangle, where A and B are interconnected with each other, but not with D. In this case, the circle determined by the transmission range of C is tangent to the edges Ak and Bk, while the whole shaded zone is located inside the IC triangle. Hence, in all the cases the interconnecting node is located inside the IC triangle. ■

Checking the IC triangle, the node D can verify if it is a potential interconnecting node even if the radio transmission range is unknown. The node D only needs to examine if the angle ∟ADB is larger than 120°. This is a simple procedure that can be done by calculating the cosine function of the angle ∟ADB, as explained in Section 3.2.

To summarize, ARROW with IC triangle rule proceeds as follows. After a hop in the azimuth state, it looks for a potential forwarder in the IC triangle. If such node exists (e.g. the node D in Figure 9), the packet is forwarded to it. If there are two or more such nodes (e.g. D1 and D2 in Figure 10), the protocol chooses the node D i with the largest angle ∟AD i B (closest to link BA). Then, this node sends a request looking for a node located on the opposite side of (above) the link BA (the node C in Figure 9). If eventually node C exists, it is chosen as a forwarder. Note that after forwarding the packet to C, the appropriate node D i and B (not A) are registered as the two last hop nodes having been visited in the packet header, in order to follow properly the border of the hole.

Figure 10
figure 10

The case of multiple nodes located in the IC triangle ( D 1 and D 2 ) and multiple nodes leading out of the loop ( C 1 and C 2 ).

In the very unlikely situations when there is more than one such a node (see the nodes C1 and C2 in Figure 10), we choose the node C j with smallest angle ∟C j D i B. If the node D has no appropriate neighbours, the protocol seeks another D i node in the IC triangle and the procedure is repeated. If there are no more D i nodes, the packet is forwarded back to the node A and the data transmission is resumed along the borderline of the network.

In order to perform all the procedures, each node only needs to check the relative angles, which are calculated on the basis of its own position and the two last-hop coordinates. Therefore, the following information is needed and broadcast by the current forwarder when looking for a next forwarder:

  1. (a)

    the coordinates of the current forwarder,

  2. (b)

    the coordinates of the two last hop nodes,

  3. (c)

    the forwarding direction and

  4. (d)

    the least distance field.

In the greedy state, the situation is even simpler, as the coordinates of the current forwarder are sufficient and the remaining data do not need to be broadcasted. It is worth mentioning that the whole above procedure is done distributedly and without any additional information about the neighbourhood. That is, when a node announces to all its neighbours that it has a packet to forward, each neighbour can locally and independently from all the other neighbours evaluate its fitness as the best forwarder. On this basis, the neighbours decide if they are suitable candidates to the best forwarder and if so they reply to the announcement issued by the current node. In order to actually come out with the best forwarder, the node and its neighbours implement the forwarder resolution procedure described in Section 3.3. One of the main goals of this protocol is to coordinate the exchange of control packets among the current node and its neighbours.

There are also significant advantages of the proposed solution compared with other beaconless approaches based on local planarization. First, the nodes do not need to listen to all the radio transmissions in their vicinity in order to remove the non-planar links: if a node is not suitable as a forwarder, it can go into idle state and save energy. Second, we can avoid forcing the nodes to remember (store) which radio links are switched off. Finally, local planarization requires checking all the possible local forwarders in a suitable planar graph, usually a Gabriel graph. The IC triangle area is around 37% of the area of the Gabriel semicircle, so the number of situations and nodes involved when we need to proceed with the procedure described above is smaller than in local planarization. Furthermore, differently to other routing protocols that do not use planarization [16], ARROW does not require that the nodes get to know their radio ranges in order to successfully route the packet through the network. It should be also stressed that the proposed solution introduces only a minimal overhead associated with Request-To-Send (RTS) packets (typical for wireless routing) and very short (few bytes) Clear-To-Send (CTS) packets of the forwarder resolution protocol, as explained in Section 3.3.

3.2. Local calculations

All the routing decisions are made after the analysis of the relative positions of the current node, the nearest sink and two previous hops. The required computations are very basic and not too demanding for sensor processors. In particular, as it was explained in the previous section, the nodes should be able to:

  1. a)

    compare relative angles,

  2. b)

    calculate the cosine function of an angle (when checking an IC triangle),

  3. c)

    check if two links cross (to avoid routing loops and errors in the azimuth state).

    1. (a)

      To compare the relative angles, we propose that each potential forwarder node calculates the following expression:

      a = x F - x O x S - x O + y F - y O y S - y O x F - x O 2 + y F - y O 2
      (1)

    where (x F , y F ), (x S , y S ) and (x O , y O ) are the coordinates of the potential forwarder F, the sink S and the transmitting node O, respectively. The rationale behind (1) is as follows. According to the well-known definition of the dot product, we can calculate the cosine function of the angle FOS:

    cos FOS = x F - x O x S - x O + y F - y O y S - y O x F - x O 2 + y F - y O 2 × x S - x O 2 + y S - y O 2 .
    (2)

    Consequently:

    a = cos FOS × x S - x O 2 + y S - y O 2 .
    (3)

    Note that FOS is the azimuth angle of the potential forwarder relative to the direction to the sink. The square root in (3) equals the distance from the sink to the transmitting node and is constant in the metrics of all potential forwarders. Thus, the neighbour node with the largest metric a has the least azimuth angle.

    1. (b)

      Calculating the cosine function is the simplest method to verify if a node is located inside an IC triangle. Using the notation from Figure 9, the node D should check if cos ADB<–0.5. Recalling again the dot product definition, D should verify that:

      x A - x D x B - x D + y A - y D y B - y D x A - x D 2 + y A - y D 2 × x B - x D 2 + y B - y D 2 < - 0.5
      (4)
    1. (c)

      In order to check if two vectors AB and CD are crossed, we can calculate if points A and B are on the opposite sides of the line given by points C and D. To meet this condition, we check the angles ACD and BCD: one of them must be larger and the second one smaller than 180°. Thus, we use properties of the cross product which is positive for angles (0°,180°) and negative for angles (-180°,0°). A multiplication of these cross products must be negative

      x A - x C y D - y C - x D - x C y A - y C × x B - x C y D - y C - x D - x C y B - y C < 0
      (5)

At the same time, points C and D must be on the opposite sides of line AB: a condition analogous to Equation (5) must also be met. Only if both conditions hold, the links cross and, thus, the backward rule applies.

3.3. Forwarder resolution protocol

The forwarder resolution protocol described herein has been designed to operate together with ARROW. It is similar to that presented by Zorzi and Rao [21, 22], but more general: it works also if a transmitting node has not any neighbours closer to the sink. It follows the idea of splitting the set of potential forwarders into smaller sets until the correct one is chosen, so it guarantees selecting the best neighbour. It does not need any information about the relative neighbourhood prior to sending a data packet.

The procedure starts when a node has a packet to forward, or is the source of a message. After checking if the channel is idle, it sends an RTS packet, which consists of the routing data and indicates that the node is looking for forwarders. After the initial RTS, time becomes slotted and a frame of timeslots follows (see Figure 11). All the neighbours compute their routing metrics, described in Appendix 1, to decide if they are potential forwarders. The metrics are mapped into the length of the frame, N (e.g. if N = 4, the routing metrics will provide an integer in the interval [1..4]). The potential forwarders select a timeslot to reply with a CTS short packet, according to the computed metric: first slot if metric is 1, second one if it is 2 and so on.

Figure 11
figure 11

The forwarder resolution protocol. a the network topology—the node metrics are given in brackets. b the consecutive packets—the number of slots where the neighbour nodes can respond is equal to 4, thus the maximum metric is also equal to 4.

For the RTS sender, only the first slot with a single response is relevant: that node is the next forwarder. Then, it sends a short confirmation packet, so as to let non-involved nodes go to sleep. Immediately after that the data packet is sent (see Figure 11).

However, it is possible that two potential forwarders compute similar metrics and they both respond in the first occupied slot, resulting in a collision. Then, the RTS sender cannot decode their responses. Thus, it sends another (though very short) RTS showing only the index of the collided slot, followed again by a frame of N slots (see Figure 12). But in this case, only the nodes having collided previously are allowed to reply. The responses (CTS) of the competing nodes are remapped into the N slots again, proportionally to their metrics. As their range is now smaller (from N – 1 to N only), it is very likely that they select different slots. In the worst case, if there is another collision, this process is repeated until the first occurrence of a slot with a single reply.

Figure 12
figure 12

The forwarder resolution protocol when a collision forces the initial node A to send a request for the second selection of the best neighbour. a the network topology. b the consecutive packets.

Note that all collisions or replies following a slot with a single reply are ignored. The details on the mechanism used for the allocation of the timeslots in both routing states, i.e. the mapping of routing metrics, are given in Appendix 1.

Let us also remark that all the timeslots and packets, except the RTS with initial routing data and the data packet, are very short. Just a few bytes are enough to let other nodes know that the channel is occupied or to inform that a collision has happened, as even the addresses of nodes are not needed.

Finally, in all the cases, only one neighbour is chosen as a forwarder. The entire forwarding procedure requires sending the initial routing data and reserving at least N + 1 short timeslots (N slots within the time frame for neighbour responses and 1 slot for the final confirmation sent by the initial node). In the case that a collision occurs or if the routing state changes, another selection round is initiated, i.e. other N + 1 short timeslots are generated in order to put the nodes replies there. From this description, it is clear that the overhead introduced by the ARROW routing protocol and the described forwarder resolution protocol is limited to the initial RTS packet with routing data and the short CTS/confirmation packets. The data packet is sent after the procedure has been able to choose the best neighbour. The nodes not having been chosen as the forwarder can go to sleep immediately after realizing that the node offering the best guarantees has been picked up.

An important design parameter is the length of the frame, N. In order to reduce the complexity of the scheme, the best is to assign a constant value to N. Clearly, a small N allows to get the neighbour responses quickly, but it also increases the probability of a collision. In Appendix 2, we present an analysis proving that, depending on the network density, the forwarding procedure is optimized for N = 2 or N = 3. The mathematical analysis has been restricted to the case when the protocol operates in the greedy state. The general performance for the whole ARROW protocol in both routing states is evaluated with the aid of computer simulations in the following section.

4. Protocol performance results

In order to validate ARROW, we performed extensive C++ computer Monte-Carlo simulations for a wide spectrum of working parameters: network size, node density, number of sink nodes, error of the transmission range and number of timeslots in the time frame. To characterize the connectivity between sensor nodes, we used the well-known unit disk graph model. However, as the transmission range is not known by the nodes in real wireless networks, we assumed that the real range d could be different to the range d' used by the nodes to calculate the routing metrics (see also Appendix 1). We called ratio d'/d the transmission range error.

The sensor network topology was generated randomly, with a two-dimensional uniform distribution of the nodes and the sinks in a square field. Basically, three cases of sensor networks were investigated: (a) a network with 1,000 nodes and 10 sinks, (b) 1,000 nodes and 50 sinks and (c) a large network with 10000 nodes and 100 sinks. These cases were considered to study the influence of network size and percentage of the sinks on the protocol performance. In order to obtain different network densities, the whole area with the nodes was scaled accordingly, i.e. its dimensions were increased or decreased, keeping the same number of sensors. For low-density networks, a large number of the nodes were not connected, i.e. there was no path between them and any sink. In all scenarios, we simulated the full network, counted the number of not connected nodes and then, we calculated the simulation results only for the connected ones. All the simulations were repeated at least 5,000 times, thus all the 95% confidence intervals were smaller than 3% of the measured values.

In Figure 13, the percentage of connected nodes is shown. For a given network density, the connectivity depends on the percentage of the sinks rather than the network size. For all the cases, a low network density (below four nodes per unit disk area) is rather not advantageous, as the majority of the nodes is isolated and has no connection to any of the sinks. The most favourable networks in terms of cost have densities between 5 and 8 nodes per unit disk area (depending on the sinks/nodes ratio). This is a reasonable trade-off between having the majority of the nodes connected and not wasting the resources for redundant nodes. In numerous papers, more dense topologies are considered [23, 24, 30], also as a solution to keep the network connected when some nodes deplete all their energy. However, bearing in mind the low-cost criterion followed in most WSN deployments, increasing the number of nodes may substantially increase the costs of deployment and maintenance rather than enhance the operation of the batteries. However, the best network configuration will very much depend on the nature of the end application.

Figure 13
figure 13

The percentage of the connected nodes.

The routing costs of ARROW and Angular Relaying [16] protocols are compared in Figure 14. The cost of routing is defined as the average number of hops done with the protocol to reach the sink divided by the average number of hops in the shortest possible path [7]. This cost not only gives an idea of the energy spent for the subsequent retransmission of a packet, but also of its end-to-end delay. It also informs about the approximate overhead of ARROW, as in each hop we have exactly one RTS and at least one CTS packet. The actual number of time slots with CTS packets depends not only on the network density, but also on the frame size and the ratio between the real and estimated radio transmission range (see Figures 15 and 16). The routing cost is the largest in case of the mid-density networks: here, the greedy routing has a significant probability to fail and the azimuth state is required very frequently. In low-density networks, the topologies are very simple, with many nodes not-connected (see Figure 13). On the other hand, when the density is high, there is a large probability that the whole routing path can be done in the greedy state. A higher percentage of sinks (see the scenario with 50 sinks) also decreases the routing cost substantially. Obviously, the average routing paths are also shorter, in this case, and it results in larger energy savings.

Figure 14
figure 14

The algorithm cost for ARROW and Select-and-Protest protocols. It also informs about the number of RTS packets, as there is exactly one RTS packet per hop.

Figure 15
figure 15

The overhead of the proposed protocol when the transmission range is perfectly known to all the sensor nodes.

Figure 16
figure 16

The case of the unknown transmission range, the network density is eight nodes per unit disk area.

In all the scenarios, ARROW exhibits similar routing cost than Angular Relaying, except in the case when the mid levels of network density. Under these latter scenarios, ARROW shows its value outperforming the Angular Relaying protocol. These results clearly show that ARROW is able to route the packets in a very effective manner, i.e. via a shorter path than the ones used by Angular Relaying. Therefore, it effectively reduces the number of unnecessary hops introduced by the planarization process. Unlike Angular Relaying, it is achieved without forcing the nodes to remember which radio links should be switched off. In addition, we reduce the number of listening nodes in each transmission: part of the sensors can go into a sleeping state just after becoming aware that they are not proper forwarders. In the Angular Relaying algorithm, the nodes need to listen longer in order to check the links planarity.

Comparing ARROW with other geo-routing algorithms like Angular Relaying, it would be also interesting to verify the real memory usage and energy consumption. This, though, depends strictly on the specific hardware where the geo-routing protocol is implemented and thus it is a topic for future work.

We also investigated the performance of the forwarder resolution protocol, described in Section 3.3, as a function of the frame size N. The procedure of forwarding a single data packet requires reserving N + 1 timeslots and, in the case of a collision, other N + 1 timeslots, and so on. Thus, we studied the expected total number of timeslots E s required for a single routing hop, what gave us a measure of the protocol overhead.

In Figure 15, the results for the network consisting of 1 000 nodes and 10 sinks are presented. The minimal E s occurs for N = 3: no more than 8 slots are required to perform the forwarding procedure, it means 2 time frames, with 3 slots each one, and 2 confirmations (see Figure 12), in average. As a comparison, the theoretical results (only the greedy state, see Appendix 2) are given. Simulations show larger E s values than theoretical calculations, particularly for the density of 4 or 6 nodes per unit disk area. It is understandable, as the azimuth state is more frequent there. This routing state is usually less efficient in limiting the number of timeslots (see Appendix 1).

In these simulations, we assumed that all the nodes knew their maximum transmission range d. Since this parameter is not known for the nodes in real networks, we tested two additional scenarios: when the assumed transmission range d' is lower or higher than the real range d. As explained in Appendix 1, our protocol can manage that issue; however we are expecting that the timeslots are not used effectively. If d < d, the first timeslot is overloaded, while for d > d too many CTS responses occur in the last slot. Both situations can lead to CTS collisions and, in consequence, they could increase the overhead of the resolution protocol, though, as presented in Figure 16, the proposed protocol is rather robust against the errors in the transmission range. For the suggested case of N = 3, even if d = d/10, E s does not increase by more than six additional slots compared to the ideal case of the known transmission range.

5. Conclusions

Numerous current and envisioned applications, e.g. environmental, agricultural, military or research ones, require large-scale WSNs. In contrast with small-scale WSNs, the objectives like the low node cost, scalability and robustness against irregular and changing topologies are crucial for the good performance and profitability of a network with a huge number of nodes. The design of the WSN communication protocol for a large-scale network should strictly concentrate on fulfilling these goals.

It is the localization ability which enables to achieve the abovementioned design objectives. If a sensor node knows its own position and the position of the nearest sink, it can just send a data packet in the proper direction, avoiding the maintenance of routing tables. The location-based transmission protocols are more scalable and resilient to adverse network topologies. Also, they effectively limit the protocol overhead, simplifying the communication and decreasing the energy consumption.

In this article, we propose and discuss ARROW: a new geo-routing protocol for WSNs. ARROW avoids local planarization, while simultaneously guaranteeing message delivery in non-planar networks without requiring sensors to keep any topological data in their memories. ARROW is based on distance and angular metrics applied together with simple rules in order to avoid routing loops because of crossing links. We also present a forwarder resolution protocol integrated with ARROW that enables each sensor to efficiently and distributedly choose the best neighbour in the forwarding process according to the ARROW rules. The nodes do not need to be aware of their neighbours, making the communication more robust against network topology variations. Each node decides if it is a potential forwarder by computing a simple metric only with knowledge about its own position, current forwarder and two previous hop positions. These metrics are also used to distributedly select the next forwarder.

Our extensive simulation results validate both proposed protocols. They show that ARROW effectively reduces the number of hops comparing to beaconless planarization techniques. The protocol overhead could be very limited, especially when the transmission frame size is chosen carefully. Moreover, the protocols are very scalable in sensor networks of different size, density and percentage of sink nodes. Finally, although the forwarder resolution protocol operates optimally when the transmission range is known, it also shows a good robustness when this parameter is not known for the sensors.

ARROW has been designed to exploit geometric properties of the unit disk communication model. Nevertheless, the assumed unit disk graph model is only a rough approximation of the network connectivity. In real networks, a wireless channel fading may result in a network topology where the proper routing path is contrary to the geographic intuition that stands behind the idea of geo-routing. In such a scenario, the message delivery can be guaranteed only with very extensive and energy-consuming topology discovery procedures. While more research is required on this topic, a good connectivity model suitable for routing simulations in wireless networks is also an open issue. There are numerous proposals that are able to neatly characterize the propagation channel between two wireless devices. However, we still need a decent model of spatial correlations of wireless communication channels which are crucial for the performance of routing protocols.

Appendix 1: Routing metrics

To clarify how the neighbour nodes choose proper timeslots, we consider both routing states separately. In the greedy state, only the nodes that are closer to the sink are competing. The length of the frame is N. Assuming that the maximum transmission range d is known to all the sensors, after the transmitting nodes send initial routing data, each neighbour can calculate its metric with the following formula:

m i = N × L 0 - L i d
(6)

where L0 and L i are the distances to the sink from the transmitting node and i th neighbour, respectively. Now, for the timeslots indexed as N - 1, N - 2, …, 1, 0, the mapping to the slot number is calculated as the floor function of its metric. If a collision occurs in the first occupied slot, the selection procedure needs to be repeated. However, the selection is now limited only to the nodes that have sent the colliding packets, as we know that the best forwarder is among them. If the collision has a place in the slot with the index M (the previous slots, if any, were not occupied), the nodes that have responded in that slot are recalculating their metric:

m i 2 = N × m i - M
(7)

and they are responding in the timeslot with the index being the floor function of their new metrics mi2. This procedure is repeated until there is only one response in the first occupied slot.

In a real case, range d is not known to the wireless nodes. Instead, the nodes must use a certain value d' possibly close to the real range. The theoretical range can be derived from the appropriate propagation models for WSN [6]. There are two cases: if d > d, the protocol works properly, but the timeslots are not used effectively: the first slots are occupied rarely. The situation is more difficult if d < d. Then, it can happen that some nodes have their metrics larger than N. Of course, such nodes could just respond in the first slot but, if there are two or more of them, the collision cannot be resolved in any number of retrials, as all these nodes have the maximum value of the metric. Therefore, we propose to proceed as follows. If the collision occurs in any timeslot but the first one, the metrics are recalculated according to (7) and the selection procedure is continued as we described before. But if there is a collision in the first slot, instead of recalculating the metrics, the nodes that responded in the first slot divide their metrics by 2. If the collision happens in the first slot for the second time, the metrics are again divided by 2, and so on, until we are sure that there is no more than one neighbour node with the metric larger than N. In Section 4, where the forwarder resolution protocol performance is evaluated, we considered several situations when the maximum transmission range is not known to the nodes and it is under- or over-rated.

In the azimuth state, there are three sub-cases that must be considered. Choosing a forwarding neighbour, the priority should be given to the nodes that are closer to the sink than the least distance value remembered in the data packet (see Section 3.1). If there are no such nodes, the packet must be transmitted to a node in the IC triangle with respect to the previous hop (if this hop was also the azimuth one). Eventually, other neighbours may be potential forwarders, according to their azimuth angle (see Figure 5). Thus, we need multiple metrics, suitable to these three categories. For the nodes closer to the sink than the least distance value, we propose

m i = N - 1 3 + L 0 - L i 3 d .
(8)

It guarantees that such nodes receive the highest possible metrics (N – 1/3, N). For the nodes in an IC triangle, we suggest

m i = N - 1 - 4 cos β + 2 3 .
(9)

The angle β is equal to the angle ∟ BC i A and can be computed from the information broadcast in the RTS packet, as described in Section 3.1. As ∟ BC i A (120°, 180°), the nodes located in an IC triangle receive metrics (N – 1, N – 1/3). All the nodes classified into these two categories occupy the first timeslot. Concluding from our experience of computer simulations, a single slot is enough, as most of the neighbour nodes fall into the third category and their metrics are calculated according to their azimuth angles:

m i = N - 1 × cos α + 3 4 , α 180 ° N - 1 × 1 - cos α 4 , α > 180 ° .
(10)

This metric is constructed so that the nodes from the third category are distributed into all the slots but the first one, proportionally to the angle α, that is, their angular distance to the current forwarder.

It is worth to remark that, for the azimuth state, competing nodes can be located in the whole unit disk area around the current forwarder. In comparison, for the greedy state, they can occupy only half of the disk area: the nodes farther to the sink do not respond. Thus, we can conclude that, for greedy state, the forwarder resolution protocol is more efficient in terms of limiting the number of timeslots. It is confirmed by the simulations, as shown in Figure 15.

Appendix 2: Number of slots in the time frame

Here, we present the mathematical analysis to compare the ARROW performance for different time frame sizes. Still, the analysis is valid only for the greedy state. In the azimuth state, we cannot assume that the node density is the same in the whole range of a transmitting node, as we know there is a hole nearby.

Let us assume that the transmission range of all the nodes is equal to d (according to the unit disk graph model). The nodes in the analysed network are distributed randomly with a two-dimensional uniform distribution over an unlimited area and their density, i.e. the number of nodes per circle with radius d is ρ. Now, let us consider a situation where a node A is going to forward a packet (Figure 17) and it broadcasts the RTS. The closest sink is at the distance L, where L > d. If the number of timeslots is equal to N, the neighbours of the node A are grouped into N zones, according to their distance to the sink. The j th zone contains the nodes located in the distance (L - d + (j - 1) · d/N, L - d + j · d/N) from the sink. The nodes respond in timeslots according to the zone numbers: the ones from the first zone (closest to the sink) respond in the first timeslot, etc. The nodes that are farther to the sink than the node A, do not respond at all. If a collision happens in the first occupied slot (a collision after a slot with a single reply can be ignored, see Section 3.3), the next selection round (next N + 1 slots) is required. In such an adverse situation, the zone where the colliding nodes are located needs to be further divided into N smaller sub-zones. Only these nodes will respond again and the forwarder will be selected among them. If a collision occurs once more, the sub-zone with colliding nodes is again divided into N smaller sub-zones and next N + 1 slots are created, etc. The whole procedure is repeated until there is no collision in the first occupied timeslot. We can calculate the expected total number of timeslots as follows:

E S = N + 1 × i = 1 i × P i ,
(11)

where P i is the probability that the best forwarder is chosen in i th selection round. The probability P1 can be expressed as follows:

P 1 = 1 1 - p 0 L - d , L × a = 1 N p 0 L - d , L - d + a - 1 × d N × p 1 L - d + a - 1 × d N , L - d + a × d N ,
(12)

where p k (r1, r2) is the probability that there are k nodes in the zone stretching in the distance (r1, r2) from the sink. Equation (12) can also be explained as follows. In order to have the forwarder chosen in the first selection round, there should be exactly one node in the first zone or no nodes in the first zone, and one node in the second zone or no nodes in the first two zones, and one node in the third zone, and so on. The scaling factor 1 1 - p 0 L - d , L is the result of the fact that we are considering only the greedy state, so we need to assume that there is at least one node in one of the zones. When i > 1 (a case with i – 1 collisions), there is at least one zone where there are two or more nodes and there are no nodes in other zones located closer to the sink. The zone with nodes is divided i – 1 times, thus, there is no collision in the first occupied timeslot during the final selection round. Accordingly, Pi> 1 is equal to

P i > 1 = 1 1 - p 0 L - d , L × a = 1 N i - 1 p 0 L - d , L - d + a - 1 × d N i - 1 × R i ,
(13)

where:

R i = b = 1 N - 1 p 0 A , A + b - 1 × d N i × p 1 A + b - 1 × d N i , A + b × d N i × 1 - p 0 A + b × d N i , A + d N i - 1
(14)

and:

A = L - d + a - 1 × d N i - 1 .
(15)
Figure 17
figure 17

An example of the forwarding process for the time frame with four slots. If for example the area of the second zone needs to be calculated, the radii r1 and r2 should be taken into account.

The variable R i describes how the nodes should be distributed in order to have exactly i – 1 collisions. After all zone divisions, we have N sub-zones. There are two or more nodes in total in these sub-zones, as we know that we had a collision in the previous selection round. But, there is no collision in the i th selection round, so there is only one node in the first occupied sub-zone and other nodes (at least one) are located further. Equation (13) shows that there are no other nodes located closer.

In all cases, the probability p k (r1, r2) is given by a two-dimensional Poisson distribution with the node density ρ:

p k = ρ × S k k ! · e - ρ S .
(16)

where S is the area of a zone, sub-zone or multiple sub-zones. Its borders are determined by radii r1 and r2 and it can be expressed as (see also equations (3–5) in [21] or the circular segment entry in [31]) follows:

S = d 2 arcsin x 2 d + r 2 2 arcsin x 2 r 2 - d 2 arcsin x 1 d - r 1 2 arcsin x 1 r 1 + L × x 1 - x 2 ,
(17)

where:

x i i = 1 , 2 = 2 L 2 d 2 + 2 L 2 r i 2 + 2 d 2 r i 2 - L 4 - d 4 - r i 4 4 L 2 .
(18)

Finally, to obtain E s , we need to compute the infinite sum given in (11). On the basis of numerical calculations, we can state that limiting the number of sum elements to 15 is sufficient, as the next element does not change the result by more than 0.05%.

We compared E s for different values of N, testing three cases: L = 2d, L = 10d and L = 100d for node densities between 4 and 10. The minimal values of E s were obtained for

  1. a)

    N = 2, when ρ ≤ 5 or (ρ = 6 and L = 2d),

  2. b)

    N = 3, when ρ ≥ 7 or (ρ = 6 and L > 2d).

Therefore, fixing a frame of N = 3 timeslots is usually a good choice for the scenarios of real interest, as the greedy routing needs to be supported by the azimuth one (see the simulation results in Section 4) in order to work properly.

References

  1. Karl H, Willig A: Protocols and Architectures for Wireless Sensor Networks. Chichester, UK: John Wiley & Sons; 2005.

    Book  Google Scholar 

  2. Stojmenovic I (Ed): Handbook of Sensor Networks. Algorithms and Architectures. New Jersey: John Wiley & Sons; 2005.

    Google Scholar 

  3. Patwari N, Ash JN, Kyperountas S, Hero AO III, Moses RL, Correal NS: Locating the nodes: cooperative localization in wireless sensor networks. IEEE Signal Process. Mag. 2005, 22: 54-69.

    Article  Google Scholar 

  4. Wang C, Xiao L: Sensor localization under limited measurement capabilities. IEEE Netw. 2007, 21: 16-23.

    Article  Google Scholar 

  5. Kulakowski P, Vales-Alonso J, Egea-Lopez E, Ludwin W, Garcia-Haro J: Angle-of-arrival localization based on antenna arrays for wireless sensor networks. Comput Electr Eng 2010, 36: 1181-1186. 10.1016/j.compeleceng.2010.03.007

    Article  MATH  Google Scholar 

  6. Verdone R, Dardari D, Mazzini G, Conti A: Wireless Sensor and Actuator Networks – Technologies, Analysis and Design. London: Academic; 2008.

    Google Scholar 

  7. Kuhn F, Wattenhofer R, Zollinger A: An algorithmic approach to geographic routing in ad hoc and sensor networks. IEEE/ACM Trans. Netw. 2008, 16: 51-62.

    Article  Google Scholar 

  8. Blazevic L, Giordano S, Le Boudec J-Y: Self-organized terminode routing. Clust. Comput. 2002, 5: 205-218. 10.1023/A:1013998030317

    Article  Google Scholar 

  9. Blum B, He T, Son S, Stankovic J: IGF: a state-free robust communication protocol for wireless sensor networks, Technical Report CS-2003-11. USA: University of Virginia; 2003.

    Google Scholar 

  10. Stojmenovic I, Lin X: Loop-free hybrid single-path/flooding routing algorithms with guaranteed delivery for wireless networks. IEEE Trans. Parallel Distr. Syst. 2001, 12: 1-10.

    Google Scholar 

  11. Kranakis E, Singh H, Urrutia J: Compass routing on geometric networks. Proc. of 11th Canadian Conference on Computational Geometry, Vancouver 1999, 51-54.

    Google Scholar 

  12. Bose P, Morin P, Stojmenovic I, Urrutia J: Routing with guaranteed delivery in ad hoc wireless networks. Wireless Networks 2001, 7: 609-616. 10.1023/A:1012319418150

    Article  MATH  Google Scholar 

  13. Kuhn F, Wattenhofer R, Zollinger A: Worst-case optimal and average-case efficient geometric ad-hoc routing. Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing, Annapolis 2003, 267-278.

    Google Scholar 

  14. Kuhn F, Wattenhofer R, Zhang Y, Zollinger A: Geometric ad-hoc routing: of theory and practice. Proceedings of the 21st Annual ACM Symposium on Principles of Distributed Computing, Boston, MA 2003, 63-72.

    Google Scholar 

  15. Frey H, Stojmenovic I: On delivery guarantees of face and combined greedy-face routing in ad hoc and sensor networks. Proceedings of the of 12th Annual International Conference on Mobile Computing and Networking (MobiCom '06), Los Angeles 2006, 390-401.

    Chapter  Google Scholar 

  16. Kalosha H, Nayak A, Ruhrup S, Stojmenovic I: Select-and-protest-based beaconless georouting with guaranteed delivery in wireless sensor networks. Proceedings of the 27th IEEE Conference on Computer Communications, Phoenix 2008, 346-350.

    Google Scholar 

  17. Ruhrup S, Kalosha H, Nayak A, Stojmenovic I: Message-efficient beaconless georouting with guaranteed delivery in wireless sensor, ad hoc, and actuator networks. IEEE Trans. Network. 2010, 18: 95-108.

    Article  Google Scholar 

  18. Gabriel K, Sokal R: A new statistical approach to geographic variation analysis. Syst. Zool. 1969, 18: 259-278. 10.2307/2412323

    Article  Google Scholar 

  19. Ruhrup S, Stojmenovic I: Contention-based georouting with guaranteed delivery, minimal communication overhead, and shorter paths in wireless sensor networks. Proceedings of the IEEE International Symposium on Parallel and Distributed Processing, Atlanta 2010, 1-9.

    Google Scholar 

  20. Fang Q, Gao J, Guibas LJ: Locating and bypassing holes in sensor networks. Mob. Netw. Appl. 2006, 11: 187-200. 10.1007/s11036-006-4471-y

    Article  Google Scholar 

  21. Zorzi M, Rao RR: Geographic random forwarding (GeRaF) for ad hoc and sensor networks: multihop performance. IEEE Trans. Mob. Comput. 2003, 2: 337-348. 10.1109/TMC.2003.1255648

    Article  Google Scholar 

  22. Zorzi M, Rao RR: Geographic random forwarding (GeRaF) for ad hoc and sensor networks: energy and latency performance. IEEE Trans. Mob. Comput. 2003, 2: 349-365. 10.1109/TMC.2003.1255650

    Article  Google Scholar 

  23. Fussler H, Widmer J, Kasemann M, Mauve M, Hartenstein H: Contention-based forwarding for mobile ad hoc networks. Ad Hoc Netw. 2003, 1: 351-369. 10.1016/S1570-8705(03)00038-6

    Article  Google Scholar 

  24. Heissenbuttel M: A novel position-based and beacon-less routing algorithm for mobile ad-hoc networks. In Proceedings of the 3rd IEEE Workshop on Applications and Services in Wireless Networks, Bern. 210: 210; 2003:197-210.

    Google Scholar 

  25. Heissenbuttel M, Braun T, Bernoulli T, Walchli M: BLR: beacon-less routing algorithm for mobile ad hoc networks. Comput. Commun. 2004, 27: 1076-1086. 10.1016/j.comcom.2004.01.012

    Article  Google Scholar 

  26. Witt M, Turau V: BGR: blind geographic routing for sensor networks. Proceedings of the 3rd International Workshop on Intelligent Solutions in Embedded Systems, Hamburg 2005, 51-61.

    Google Scholar 

  27. Polastre J, Hill J, Culler D: Versatile low power media access for wireless sensor networks. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04), Baltimore 2004, 95-107.

    Chapter  Google Scholar 

  28. Stojmenovic I: Simulations in wireless sensor and ad hoc networks: matching and advancing models, metrics, and solutions. IEEE Commun. Mag. 2008, 46: 102-107.

    Article  Google Scholar 

  29. Bruck J, Gao J, Jiang A: Localization and routing in sensor networks by local angle information. ACM Trans. Sens. Netw. 2009, 5: 1-31.

    Article  Google Scholar 

  30. Flury R, Wattenhofer R: Randomized 3D geographical routing. Proceedings of the 27th Annual IEEE Conference on Computer Communications (INFOCOM), Phoenix 2008, 834-842.

    Google Scholar 

  31. The Wolfram Mathworld compendium http://mathworld.wolfram.com/

Download references

Acknowledgements

This study was performed thanks to scientific cooperation efforts taken under the frame of the COST Action IC1004. It was supported by the Spanish MICINN, Consolider Programme, Plan E funds and CALM TEC2010-21405-C02-02, “Programa de Ayudas a Grupos de Exelencia de la Region de Murcia, Fundacion Seneca” programmes. It was also co-funded by European Commission FP7 Programme UNITE and FEDER funds, under Grants CSD2006-00046 and TIN2009-14475-C04-03.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pawel Kulakowski.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Kulakowski, P., Egea-Lopez, E., Garcia-Haro, J. et al. ARROW: Azimuth-Range ROuting for large-scale Wireless sensor networks. J Wireless Com Network 2013, 93 (2013). https://doi.org/10.1186/1687-1499-2013-93

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2013-93

Keywords