SlideShare a Scribd company logo
1
Challenges for Routing Protocols in Wireless
Sensor Networks: A Survey
Auwal Tijjani Amshi
Email: auwalamshi@gmail.com
School of Software Engineering, Nanchang Hang Kong University (南昌航空大學).
Abstract- Wireless Sensor Networks (WSNs) consist of small nodes with sensing,
computation, and wireless communications capabilities. Recent advances in wireless
sensor networks have led to many new protocols specifically designed for sensor
networks where they face great challenges. In this paper, we present a survey of the
challenges for Routing in WSNs. We first introduce Wireless Sensor Networks then
outline the challenges for routing in WSNs, in the end we briefly discuss on energy
consumption as it’s the focus of many researchers.
Keyword: Wireless Sensor Network,routing challenges, Energy consumption.
1. Introduction To Wsn
Wireless Sensor Networks WSNs is a popular research area that has taken on
considerable importance in recent years. Because of their convenience, low installation
costs, high mobility, simple deployment and no cabling, WSN has many benefits when
compared to wired networks. WSNs are the technology used in smart infrastructure; for
example, applications for automation systems, development and process control [1][2]. A
large number of these disposable sensors can be networked in many applications that
require unattended operations. A Wireless Sensor Network (WSN) contain hundreds or
thousands of these sensor nodes. These sensors have the ability to communicate either
among each other or directly to an external base-station (BS). [3] Figure 1 shows a
diagram of WSN.
Wireless Sensor Network (WSN) is the set of various sensor nodes deployed inanarea to
track parameters of environmental and physical conditions such as temperature, sound,
object movement, light etc. There is also sink node in a wireless sensor network which is
also known as base station. Military applications motivate the development of the
wireless sensor networks.
2
Figure 1. wireless sensor networks
The Wireless Sensor Network sensor nodes capture information from the atmosphere
and then relay it to a base station. [4] Information sent to the base station by all the senor
nodes in the network is gathered and this collected information is sent to the user via the
internet. The base station is generally more resource-potential than the sensor nodes. The
sensor node is Low-Equipped. [5]
The area covered by Wireless sensor nodes is called region of interest (ROI) where in
figure 1 it was label as sensor field. There must be at least one base station for every
region of interest as in Figure 1. Sensor nodes communicate with each other to send data
to base station, this communication can be direct transmission or multi hop. [6]
2. Routing ChallengesInWsn
In this section we discussed on the challenges that influence routing in WSN. [7][8][9] Some
of these challenging issues in wireless sensor network are as follows:
a) Energy consumption
Sensor nodes have limited energy capacity in wireless sensor network. Energy
consumption in the wireless sensor network depends on various operations performed
by sensor nodes, such as data receiving and transmission. The development and design
of hardware and software, routing protocol, and architecture used in sensor networks
also affects energy constraint in the sensor network.[10] sensor nodes can use up their
limited supply of energy performing computations and transmitting information in a
wireless environment. As such, energy conserving forms of communication and
computationare essential. Sensor node lifetime shows a strongdependence onthe battery
lifetime [1] In a multi hop WSN, each node plays a dual role as data sender and data
router. The malfunctioning of some sensor nodes due to power failure can cause
significant topologicalchanges and might require reroutingofpackets and reorganization
of the network.
3
b) Nodes Deployment
Wireless sensor network consists of several nodes deployed either randomly or
manually inside an area. Deployment of sensor nodes requires a handling of topology
very carefully. This deployment of nodes is either deterministic or self-organizing.
Sensor network topology is prone to frequent changes after deployment. In dynamic
wireless sensor network some additional sensor nodes can be added to the network at
any time to replace the faulted node or due to any change in the task dynamic. Addition
of new nodes needs reorganization of the network very carefully.[11]
Node deployment in WSNs is application dependent and affects the performance of the
routing protocol. The deployment can be either deterministic or randomized. In
deterministic deployment, the sensors are manually placed and data is routed through
pre-determined paths. However, in random node deployment, the sensor nodes are
scattered randomly creating an infrastructure in an ad hoc manner. If the resultant
distribution of nodes is not uniform, optimal clustering becomes necessary to allow
connectivity and enable energy efficient network operation. Inter-sensor communication
is normally within short transmission ranges due to energy and bandwidth limitations.
Therefore, it is most likely that a route will consist of multiple wireless hops. [6]
c) Production Cost:
Since the sensor networks consist of large number of nodes and the cost ofa single node
is very important to justify the cost of overall network. Sensor nodes with advanced
features are very costly. As a result, cost of each sensor node has kept being low.
Wireless sensor network also consists of some additional components so keeping the
cost low is a challenging task.
d) Failure Tolerance
Sensor nodes fail due to some hardware problems or physical damage and energy
depletion. Nodes failure in wireless sensor network is higher as compare to wired
network. Protocol used in wireless sensor network should be able to detect the node
failure as soon as possible and should be robust to handle the failure with maintaining
the working of network.
Some sensor nodes may fail or be blocked due to lack of power, physical damage, or
environmental interference. [13] The failure of sensor nodes should not affect the overall
task of the sensor network. If many nodes fail, MAC and routing protocols must
accommodate formation of new links and routes to the data collection base stations. This
4
may require actively adjusting transmit powers and signalingrates onthe existing links to
reduce energy consumption, or rerouting packets through regions of the network where
more energy is available. Therefore, multiple levels of redundancy may be needed in a
fault-tolerant sensor network.
e) Scalability
The number of sensor nodes deployed inthe sensingarea may be in the order of hundreds
or thousands, or more. Any routing scheme must be able to work with this huge number
of sensor nodes. In addition, sensor network routing protocols should be scalable enough
to respond to events in the environment. Until an event occurs, most of the sensors can
remain in the sleep state, with data from the few remaining sensors providing a coarse
quality.
The deployment of sensor nodes is dependent on the nature of the application. Sensor
node consumption varies with respect to the demand of the application; therefore, the
number of sensor nodes can be hundreds, thousand or still more. To handle network
scalability, routing algorithm should have the capability to cope with scalable network.
[12]
f) Hardware Constraints
Generally, a sensor node has sensing unit, power unit, processing unit and transmission
unit. In some application for extra functionality there is requirement of some extra
hardware components which may increase the cost ofdeployment, energyconsumption
and size of sensor node.
g) Security
Security is one of the important issues in WSNs [14]. WSNs operate on remote location
and remains unattended which increase their chances of being exposed to malicious
intrusion and attacks. All WSNs must be protected from unauthorized access to data.
There are some fundamental security requirements to be meet by WSNs like: Data
Authentication, Data confidentiality, Data integrity, Availability and Redundancy. [15]
Maintaining the security ofdata sensed by sensor nodes is another challenge in wireless
sensor network. Data maybe captured during the transmission from sensor node to base
station.
3. Summary
5
Out of all the routing challenges listed and discuss in the above section, much
researchers such as [16] [17] [18.][19] [20] focuses on energy consumption. Energy must be
conserved to increase the lifespan of the sensor nodes. Energy is required by the sensor
node to sense, collect, communicate and process data. Batteries when depleted can be
replaced or recharged. The most important task in WSNs is to design and implement
various energy efficient hardware and software protocols to manage limited battery life
efficiently.
Since In a wireless sensor network, sensor nodes are energy constrained, so if all the
sensors nodes transmit their sensed data directly to the base station then it consumes a
lot of energy of sensor nodes and decreases the network lifetime. In order to maximize
the lifetime of wireless sensor networks different architectures are used. These
architectures of WSN or types of wireless sensor networks help in maximizing the
lifetime of WSN.
4. Conclusion
Routing in sensor networks is not a new area of research, but with rapidly growing set of
research results. In this paper, we give a survey of challenges for routing WSNs. Those
challenges affect the lifetime of the sensor network, and can also compromise security
and data delivery. We highlighted those challenges in this paper because by identifying
and resolving those challenges quickly we can be able to have an effective routing and
data delivery in WSNs.
5. Reference
[1]. Mohamed, Reem E.,Ahmed I. Saleh, MaherAbdelrazzak, and Ahmed S. Samra. "Survey
on Wireless Sensor Network Applications and Energy Efficient Routing Protocols."Wireless
PersonalCommunications 101, no. 2 (2018): 1019-1055
[2]. Willig, A.,Matheus,K.,& Wolisz, A. (2005). Wireless technology in industrial
networks. Proceedings of the IEEE, 93(6),1130–1151.
[3]. JamalN. Al-Karaki Ahmed E. Kamal, Routing Techniques in Wireless Sensor Networks:
A Survey, Iowa State University,Ames,Iowa 50011.
[4]. Goyal, Deepak, and Malay Ranjan Tripathy. "Routing protocols in wireless sensor networks:
A survey." In 2012 Second InternationalConference on Advanced Computing & Communication
Technologies, pp. 474- 480. IEEE, 2012
[5]. https://www.computersciencejunction.in/2015/12/19/introduction-to-wireless-sensor-net
work/
[6]. Syed Mohd Ali, Wireless Sensor Networks Routing Design Issues:ASurvey, International
Journalof Computer Applications (0975 – 8887) Volume 178 – No. 26, June 2019
[7]. Bala, T., Bhatia, V., Kumawat, S. and Jaglan, V., 2018. Asurvey:issues and challenges in
wireless sensor network. International Journalof Engineering & Technology, 7(2.4), pp.53-55.
[8]. Sharma, Sukhwinder, Rakesh Kumar Bansal, and Savina Bansal. "Issues and challenges in
wireless sensor networks." In 2013 InternationalConference on Machine Intelligence and Research
Advancement, pp. 58-62. IEEE, 2013.
[9]. Twinkle Deshwal, Parveen Verma, Routing Challenges in WSN (Wireless Sensor Networks),
International Journal of Advanced Computing Research Volume 02– Issue 01, Jul2016.
6
[10]. Al-Karaki, Jamal N., and Ahmed E. Kamal. "Routing techniques in wireless sensor networks:
a survey." IEEE wireless communications 11, no. 6 (2004):6-28.
[11]. Singh, Santar Pal, and S. C. Sharma. "Asurvey on cluster-based routing protocols in wireless
sensor networks." Procedia computer science 45 (2015):687- 695.
[12]. Loveneet Kaur, Dinesh Kumar,”Optimization techniques for Routing in Wireless Sensor
Network”, Vol. 5 (3) , 2014
[13]. B. R. Tapas Bapu,K. Thanigaivelu, A. Rajkumar, Fault Tolerance in Wireless Sensor
Networks – A Survey,February 2015.
[14]. Weiping Wang1, Shigeng Zhang,Guihua Duan, and Hong Song, Security in Wireless
Sensor Networks,springer,2015.
[15]. S. Ahmad Salehi ; M.A. Razzaque ; Parisa Naraei; Ali Farrokhtala,Security in Wireless
Sensor Networks:Issues and challenges,ieee,2013.
[16]. Ming Yu, Senior Member, IEEE, Kin K. Leung, Fellow, IEEE, and Aniket Malvankar,
Student Member, IEEE,”ADynamic Clustering and Energy Efficient Routing Technique for Sensor
Networks”, Vol. 6, No. 8, August 2007
[17]. W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient Communication
Protocol for Wireless Microsensor Networks”, in IEEE Computer Society Proceedings of the Thirty
Third Hawaii International Conference on System Sciences (HICSS '00), Washington, DC, USA, Jan.
2000, vol. 8, pp. 8020
[18]. Ridha Azizi, Consumption of Energy and Routing Protocols in Wireless Sensor
Network, Network Protocols and Algorithms, 2016, Vol. 8, No. 3
[19]. Yan, Jingjing, Mengchu Zhou, and Zhijun Ding. "Recent advances in energy-efficient routing
protocols for wireless sensor networks: Areview." IEEE Access 4 (2016):5673-5686
[20]. Yong Wang,Garhan Attebury,And Byrav Ramamurthy,A Survey of Security Issues in
Wireless Sensor Networks,2006.

More Related Content

What's hot (20)

Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
nehabsairam
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
ijujournal
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
Darpan Dekivadiya
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
Jasleen Kaur (Chandigarh University)
 
Mac
MacMac
Mac
Vrince Vimal
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
SyedAhamed44
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
Vidhi603146
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
DEBABRATASINGH3
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
ejbyun77
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 
Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...
Mohamed Mostafa
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsn
Samruddhi Gaikwad
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
Gokuldhev mony
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
Darwin Nesakumar
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
nehabsairam
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
ijujournal
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
SyedAhamed44
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
Vidhi603146
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
DEBABRATASINGH3
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
ejbyun77
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 
Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...
Mohamed Mostafa
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsn
Samruddhi Gaikwad
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
Gokuldhev mony
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
Darwin Nesakumar
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 

Similar to Challenges for routing in wireless sensor networks (20)

Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
IJRES Journal
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
cscpconf
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Journals
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Publishing House
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
ijassn
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
IJMER
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal
 
Chapter
ChapterChapter
Chapter
Rajat Soni
 
B0470208027
B0470208027B0470208027
B0470208027
ijceronline
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ijscai
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSN
Eswar Publications
 
Routing techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a surveyRouting techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a survey
Amandeep Sohal
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
iosrjce
 
G017344246
G017344246G017344246
G017344246
IOSR Journals
 
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
IJERA Editor
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
Tekle12
 
De3211001104
De3211001104De3211001104
De3211001104
IJMER
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
IJRES Journal
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
cscpconf
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Journals
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Publishing House
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
ijassn
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
IJMER
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ijscai
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSN
Eswar Publications
 
Routing techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a surveyRouting techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a survey
Amandeep Sohal
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
iosrjce
 
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
IJERA Editor
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
Tekle12
 
De3211001104
De3211001104De3211001104
De3211001104
IJMER
 

More from Auwal Amshi (9)

Identifying Most Powerful Node In Complex Networks: A Triangle Graph Decompos...
Identifying Most Powerful Node In Complex Networks: A Triangle Graph Decompos...Identifying Most Powerful Node In Complex Networks: A Triangle Graph Decompos...
Identifying Most Powerful Node In Complex Networks: A Triangle Graph Decompos...
Auwal Amshi
 
Brief Introduction Predictive Analytics:
Brief Introduction  Predictive Analytics:Brief Introduction  Predictive Analytics:
Brief Introduction Predictive Analytics:
Auwal Amshi
 
RAMADAN MEAL CROWD CONTROL DISTRIBUTION SYSTEM USING QR CODE MEAL CARD
RAMADAN MEAL CROWD CONTROL DISTRIBUTION SYSTEM USING QR CODE MEAL CARDRAMADAN MEAL CROWD CONTROL DISTRIBUTION SYSTEM USING QR CODE MEAL CARD
RAMADAN MEAL CROWD CONTROL DISTRIBUTION SYSTEM USING QR CODE MEAL CARD
Auwal Amshi
 
Conceptual Design of LiFi Audio Transmission Using Pre-Programmed Modules
Conceptual Design of LiFi Audio Transmission Using Pre-Programmed ModulesConceptual Design of LiFi Audio Transmission Using Pre-Programmed Modules
Conceptual Design of LiFi Audio Transmission Using Pre-Programmed Modules
Auwal Amshi
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
Auwal Amshi
 
Audio Transmission using LED
Audio Transmission using LEDAudio Transmission using LED
Audio Transmission using LED
Auwal Amshi
 
comparative study software quality models
comparative study  software quality models comparative study  software quality models
comparative study software quality models
Auwal Amshi
 
Li fi and its application
Li fi and its applicationLi fi and its application
Li fi and its application
Auwal Amshi
 
Web container and Apache Tomcat
Web container and Apache TomcatWeb container and Apache Tomcat
Web container and Apache Tomcat
Auwal Amshi
 
Identifying Most Powerful Node In Complex Networks: A Triangle Graph Decompos...
Identifying Most Powerful Node In Complex Networks: A Triangle Graph Decompos...Identifying Most Powerful Node In Complex Networks: A Triangle Graph Decompos...
Identifying Most Powerful Node In Complex Networks: A Triangle Graph Decompos...
Auwal Amshi
 
Brief Introduction Predictive Analytics:
Brief Introduction  Predictive Analytics:Brief Introduction  Predictive Analytics:
Brief Introduction Predictive Analytics:
Auwal Amshi
 
RAMADAN MEAL CROWD CONTROL DISTRIBUTION SYSTEM USING QR CODE MEAL CARD
RAMADAN MEAL CROWD CONTROL DISTRIBUTION SYSTEM USING QR CODE MEAL CARDRAMADAN MEAL CROWD CONTROL DISTRIBUTION SYSTEM USING QR CODE MEAL CARD
RAMADAN MEAL CROWD CONTROL DISTRIBUTION SYSTEM USING QR CODE MEAL CARD
Auwal Amshi
 
Conceptual Design of LiFi Audio Transmission Using Pre-Programmed Modules
Conceptual Design of LiFi Audio Transmission Using Pre-Programmed ModulesConceptual Design of LiFi Audio Transmission Using Pre-Programmed Modules
Conceptual Design of LiFi Audio Transmission Using Pre-Programmed Modules
Auwal Amshi
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
Auwal Amshi
 
Audio Transmission using LED
Audio Transmission using LEDAudio Transmission using LED
Audio Transmission using LED
Auwal Amshi
 
comparative study software quality models
comparative study  software quality models comparative study  software quality models
comparative study software quality models
Auwal Amshi
 
Li fi and its application
Li fi and its applicationLi fi and its application
Li fi and its application
Auwal Amshi
 
Web container and Apache Tomcat
Web container and Apache TomcatWeb container and Apache Tomcat
Web container and Apache Tomcat
Auwal Amshi
 

Recently uploaded (20)

SAP Sapphire 2025 ERP1612 Enhancing User Experience with SAP Fiori and AI
SAP Sapphire 2025 ERP1612 Enhancing User Experience with SAP Fiori and AISAP Sapphire 2025 ERP1612 Enhancing User Experience with SAP Fiori and AI
SAP Sapphire 2025 ERP1612 Enhancing User Experience with SAP Fiori and AI
Peter Spielvogel
 
New Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDBNew Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDB
ScyllaDB
 
AI Trends - Mary Meeker
AI Trends - Mary MeekerAI Trends - Mary Meeker
AI Trends - Mary Meeker
Razin Mustafiz
 
UiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPath Community Berlin: Studio Tips & Tricks and UiPath InsightsUiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPathCommunity
 
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Eugene Fidelin
 
Measuring Microsoft 365 Copilot and Gen AI Success
Measuring Microsoft 365 Copilot and Gen AI SuccessMeasuring Microsoft 365 Copilot and Gen AI Success
Measuring Microsoft 365 Copilot and Gen AI Success
Nikki Chapple
 
Talk: On an adventure into the depths of Maven - Kaya Weers
Talk: On an adventure into the depths of Maven - Kaya WeersTalk: On an adventure into the depths of Maven - Kaya Weers
Talk: On an adventure into the depths of Maven - Kaya Weers
Kaya Weers
 
Splunk Leadership Forum Wien - 20.05.2025
Splunk Leadership Forum Wien - 20.05.2025Splunk Leadership Forum Wien - 20.05.2025
Splunk Leadership Forum Wien - 20.05.2025
Splunk
 
Security Operations and the Defense Analyst - Splunk Certificate
Security Operations and the Defense Analyst - Splunk CertificateSecurity Operations and the Defense Analyst - Splunk Certificate
Security Operations and the Defense Analyst - Splunk Certificate
VICTOR MAESTRE RAMIREZ
 
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AI Emotional Actors:  “When Machines Learn to Feel and Perform"AI Emotional Actors:  “When Machines Learn to Feel and Perform"
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AkashKumar809858
 
A Comprehensive Guide on Integrating Monoova Payment Gateway
A Comprehensive Guide on Integrating Monoova Payment GatewayA Comprehensive Guide on Integrating Monoova Payment Gateway
A Comprehensive Guide on Integrating Monoova Payment Gateway
danielle hunter
 
UiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build PipelinesUiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build Pipelines
UiPathCommunity
 
"AI in the browser: predicting user actions in real time with TensorflowJS", ...
"AI in the browser: predicting user actions in real time with TensorflowJS", ..."AI in the browser: predicting user actions in real time with TensorflowJS", ...
"AI in the browser: predicting user actions in real time with TensorflowJS", ...
Fwdays
 
Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...
pranavbodhak
 
Building Agents with LangGraph & Gemini
Building Agents with LangGraph &  GeminiBuilding Agents with LangGraph &  Gemini
Building Agents with LangGraph & Gemini
HusseinMalikMammadli
 
Fully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and ControlFully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and Control
ShapeBlue
 
cloudgenesis cloud workshop , gdg on campus mita
cloudgenesis cloud workshop , gdg on campus mitacloudgenesis cloud workshop , gdg on campus mita
cloudgenesis cloud workshop , gdg on campus mita
siyaldhande02
 
Introducing FME Realize: A New Era of Spatial Computing and AR
Introducing FME Realize: A New Era of Spatial Computing and ARIntroducing FME Realize: A New Era of Spatial Computing and AR
Introducing FME Realize: A New Era of Spatial Computing and AR
Safe Software
 
Content and eLearning Standards: Finding the Best Fit for Your-Training
Content and eLearning Standards: Finding the Best Fit for Your-TrainingContent and eLearning Standards: Finding the Best Fit for Your-Training
Content and eLearning Standards: Finding the Best Fit for Your-Training
Rustici Software
 
The 2025 Digital Adoption Blueprint.pptx
The 2025 Digital Adoption Blueprint.pptxThe 2025 Digital Adoption Blueprint.pptx
The 2025 Digital Adoption Blueprint.pptx
aptyai
 
SAP Sapphire 2025 ERP1612 Enhancing User Experience with SAP Fiori and AI
SAP Sapphire 2025 ERP1612 Enhancing User Experience with SAP Fiori and AISAP Sapphire 2025 ERP1612 Enhancing User Experience with SAP Fiori and AI
SAP Sapphire 2025 ERP1612 Enhancing User Experience with SAP Fiori and AI
Peter Spielvogel
 
New Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDBNew Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDB
ScyllaDB
 
AI Trends - Mary Meeker
AI Trends - Mary MeekerAI Trends - Mary Meeker
AI Trends - Mary Meeker
Razin Mustafiz
 
UiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPath Community Berlin: Studio Tips & Tricks and UiPath InsightsUiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPathCommunity
 
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)
Eugene Fidelin
 
Measuring Microsoft 365 Copilot and Gen AI Success
Measuring Microsoft 365 Copilot and Gen AI SuccessMeasuring Microsoft 365 Copilot and Gen AI Success
Measuring Microsoft 365 Copilot and Gen AI Success
Nikki Chapple
 
Talk: On an adventure into the depths of Maven - Kaya Weers
Talk: On an adventure into the depths of Maven - Kaya WeersTalk: On an adventure into the depths of Maven - Kaya Weers
Talk: On an adventure into the depths of Maven - Kaya Weers
Kaya Weers
 
Splunk Leadership Forum Wien - 20.05.2025
Splunk Leadership Forum Wien - 20.05.2025Splunk Leadership Forum Wien - 20.05.2025
Splunk Leadership Forum Wien - 20.05.2025
Splunk
 
Security Operations and the Defense Analyst - Splunk Certificate
Security Operations and the Defense Analyst - Splunk CertificateSecurity Operations and the Defense Analyst - Splunk Certificate
Security Operations and the Defense Analyst - Splunk Certificate
VICTOR MAESTRE RAMIREZ
 
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AI Emotional Actors:  “When Machines Learn to Feel and Perform"AI Emotional Actors:  “When Machines Learn to Feel and Perform"
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AkashKumar809858
 
A Comprehensive Guide on Integrating Monoova Payment Gateway
A Comprehensive Guide on Integrating Monoova Payment GatewayA Comprehensive Guide on Integrating Monoova Payment Gateway
A Comprehensive Guide on Integrating Monoova Payment Gateway
danielle hunter
 
UiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build PipelinesUiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build Pipelines
UiPathCommunity
 
"AI in the browser: predicting user actions in real time with TensorflowJS", ...
"AI in the browser: predicting user actions in real time with TensorflowJS", ..."AI in the browser: predicting user actions in real time with TensorflowJS", ...
"AI in the browser: predicting user actions in real time with TensorflowJS", ...
Fwdays
 
Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...
pranavbodhak
 
Building Agents with LangGraph & Gemini
Building Agents with LangGraph &  GeminiBuilding Agents with LangGraph &  Gemini
Building Agents with LangGraph & Gemini
HusseinMalikMammadli
 
Fully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and ControlFully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and Control
ShapeBlue
 
cloudgenesis cloud workshop , gdg on campus mita
cloudgenesis cloud workshop , gdg on campus mitacloudgenesis cloud workshop , gdg on campus mita
cloudgenesis cloud workshop , gdg on campus mita
siyaldhande02
 
Introducing FME Realize: A New Era of Spatial Computing and AR
Introducing FME Realize: A New Era of Spatial Computing and ARIntroducing FME Realize: A New Era of Spatial Computing and AR
Introducing FME Realize: A New Era of Spatial Computing and AR
Safe Software
 
Content and eLearning Standards: Finding the Best Fit for Your-Training
Content and eLearning Standards: Finding the Best Fit for Your-TrainingContent and eLearning Standards: Finding the Best Fit for Your-Training
Content and eLearning Standards: Finding the Best Fit for Your-Training
Rustici Software
 
The 2025 Digital Adoption Blueprint.pptx
The 2025 Digital Adoption Blueprint.pptxThe 2025 Digital Adoption Blueprint.pptx
The 2025 Digital Adoption Blueprint.pptx
aptyai
 

Challenges for routing in wireless sensor networks

  • 1. 1 Challenges for Routing Protocols in Wireless Sensor Networks: A Survey Auwal Tijjani Amshi Email: [email protected] School of Software Engineering, Nanchang Hang Kong University (南昌航空大學). Abstract- Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities. Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where they face great challenges. In this paper, we present a survey of the challenges for Routing in WSNs. We first introduce Wireless Sensor Networks then outline the challenges for routing in WSNs, in the end we briefly discuss on energy consumption as it’s the focus of many researchers. Keyword: Wireless Sensor Network,routing challenges, Energy consumption. 1. Introduction To Wsn Wireless Sensor Networks WSNs is a popular research area that has taken on considerable importance in recent years. Because of their convenience, low installation costs, high mobility, simple deployment and no cabling, WSN has many benefits when compared to wired networks. WSNs are the technology used in smart infrastructure; for example, applications for automation systems, development and process control [1][2]. A large number of these disposable sensors can be networked in many applications that require unattended operations. A Wireless Sensor Network (WSN) contain hundreds or thousands of these sensor nodes. These sensors have the ability to communicate either among each other or directly to an external base-station (BS). [3] Figure 1 shows a diagram of WSN. Wireless Sensor Network (WSN) is the set of various sensor nodes deployed inanarea to track parameters of environmental and physical conditions such as temperature, sound, object movement, light etc. There is also sink node in a wireless sensor network which is also known as base station. Military applications motivate the development of the wireless sensor networks.
  • 2. 2 Figure 1. wireless sensor networks The Wireless Sensor Network sensor nodes capture information from the atmosphere and then relay it to a base station. [4] Information sent to the base station by all the senor nodes in the network is gathered and this collected information is sent to the user via the internet. The base station is generally more resource-potential than the sensor nodes. The sensor node is Low-Equipped. [5] The area covered by Wireless sensor nodes is called region of interest (ROI) where in figure 1 it was label as sensor field. There must be at least one base station for every region of interest as in Figure 1. Sensor nodes communicate with each other to send data to base station, this communication can be direct transmission or multi hop. [6] 2. Routing ChallengesInWsn In this section we discussed on the challenges that influence routing in WSN. [7][8][9] Some of these challenging issues in wireless sensor network are as follows: a) Energy consumption Sensor nodes have limited energy capacity in wireless sensor network. Energy consumption in the wireless sensor network depends on various operations performed by sensor nodes, such as data receiving and transmission. The development and design of hardware and software, routing protocol, and architecture used in sensor networks also affects energy constraint in the sensor network.[10] sensor nodes can use up their limited supply of energy performing computations and transmitting information in a wireless environment. As such, energy conserving forms of communication and computationare essential. Sensor node lifetime shows a strongdependence onthe battery lifetime [1] In a multi hop WSN, each node plays a dual role as data sender and data router. The malfunctioning of some sensor nodes due to power failure can cause significant topologicalchanges and might require reroutingofpackets and reorganization of the network.
  • 3. 3 b) Nodes Deployment Wireless sensor network consists of several nodes deployed either randomly or manually inside an area. Deployment of sensor nodes requires a handling of topology very carefully. This deployment of nodes is either deterministic or self-organizing. Sensor network topology is prone to frequent changes after deployment. In dynamic wireless sensor network some additional sensor nodes can be added to the network at any time to replace the faulted node or due to any change in the task dynamic. Addition of new nodes needs reorganization of the network very carefully.[11] Node deployment in WSNs is application dependent and affects the performance of the routing protocol. The deployment can be either deterministic or randomized. In deterministic deployment, the sensors are manually placed and data is routed through pre-determined paths. However, in random node deployment, the sensor nodes are scattered randomly creating an infrastructure in an ad hoc manner. If the resultant distribution of nodes is not uniform, optimal clustering becomes necessary to allow connectivity and enable energy efficient network operation. Inter-sensor communication is normally within short transmission ranges due to energy and bandwidth limitations. Therefore, it is most likely that a route will consist of multiple wireless hops. [6] c) Production Cost: Since the sensor networks consist of large number of nodes and the cost ofa single node is very important to justify the cost of overall network. Sensor nodes with advanced features are very costly. As a result, cost of each sensor node has kept being low. Wireless sensor network also consists of some additional components so keeping the cost low is a challenging task. d) Failure Tolerance Sensor nodes fail due to some hardware problems or physical damage and energy depletion. Nodes failure in wireless sensor network is higher as compare to wired network. Protocol used in wireless sensor network should be able to detect the node failure as soon as possible and should be robust to handle the failure with maintaining the working of network. Some sensor nodes may fail or be blocked due to lack of power, physical damage, or environmental interference. [13] The failure of sensor nodes should not affect the overall task of the sensor network. If many nodes fail, MAC and routing protocols must accommodate formation of new links and routes to the data collection base stations. This
  • 4. 4 may require actively adjusting transmit powers and signalingrates onthe existing links to reduce energy consumption, or rerouting packets through regions of the network where more energy is available. Therefore, multiple levels of redundancy may be needed in a fault-tolerant sensor network. e) Scalability The number of sensor nodes deployed inthe sensingarea may be in the order of hundreds or thousands, or more. Any routing scheme must be able to work with this huge number of sensor nodes. In addition, sensor network routing protocols should be scalable enough to respond to events in the environment. Until an event occurs, most of the sensors can remain in the sleep state, with data from the few remaining sensors providing a coarse quality. The deployment of sensor nodes is dependent on the nature of the application. Sensor node consumption varies with respect to the demand of the application; therefore, the number of sensor nodes can be hundreds, thousand or still more. To handle network scalability, routing algorithm should have the capability to cope with scalable network. [12] f) Hardware Constraints Generally, a sensor node has sensing unit, power unit, processing unit and transmission unit. In some application for extra functionality there is requirement of some extra hardware components which may increase the cost ofdeployment, energyconsumption and size of sensor node. g) Security Security is one of the important issues in WSNs [14]. WSNs operate on remote location and remains unattended which increase their chances of being exposed to malicious intrusion and attacks. All WSNs must be protected from unauthorized access to data. There are some fundamental security requirements to be meet by WSNs like: Data Authentication, Data confidentiality, Data integrity, Availability and Redundancy. [15] Maintaining the security ofdata sensed by sensor nodes is another challenge in wireless sensor network. Data maybe captured during the transmission from sensor node to base station. 3. Summary
  • 5. 5 Out of all the routing challenges listed and discuss in the above section, much researchers such as [16] [17] [18.][19] [20] focuses on energy consumption. Energy must be conserved to increase the lifespan of the sensor nodes. Energy is required by the sensor node to sense, collect, communicate and process data. Batteries when depleted can be replaced or recharged. The most important task in WSNs is to design and implement various energy efficient hardware and software protocols to manage limited battery life efficiently. Since In a wireless sensor network, sensor nodes are energy constrained, so if all the sensors nodes transmit their sensed data directly to the base station then it consumes a lot of energy of sensor nodes and decreases the network lifetime. In order to maximize the lifetime of wireless sensor networks different architectures are used. These architectures of WSN or types of wireless sensor networks help in maximizing the lifetime of WSN. 4. Conclusion Routing in sensor networks is not a new area of research, but with rapidly growing set of research results. In this paper, we give a survey of challenges for routing WSNs. Those challenges affect the lifetime of the sensor network, and can also compromise security and data delivery. We highlighted those challenges in this paper because by identifying and resolving those challenges quickly we can be able to have an effective routing and data delivery in WSNs. 5. Reference [1]. Mohamed, Reem E.,Ahmed I. Saleh, MaherAbdelrazzak, and Ahmed S. Samra. "Survey on Wireless Sensor Network Applications and Energy Efficient Routing Protocols."Wireless PersonalCommunications 101, no. 2 (2018): 1019-1055 [2]. Willig, A.,Matheus,K.,& Wolisz, A. (2005). Wireless technology in industrial networks. Proceedings of the IEEE, 93(6),1130–1151. [3]. JamalN. Al-Karaki Ahmed E. Kamal, Routing Techniques in Wireless Sensor Networks: A Survey, Iowa State University,Ames,Iowa 50011. [4]. Goyal, Deepak, and Malay Ranjan Tripathy. "Routing protocols in wireless sensor networks: A survey." In 2012 Second InternationalConference on Advanced Computing & Communication Technologies, pp. 474- 480. IEEE, 2012 [5]. https://www.computersciencejunction.in/2015/12/19/introduction-to-wireless-sensor-net work/ [6]. Syed Mohd Ali, Wireless Sensor Networks Routing Design Issues:ASurvey, International Journalof Computer Applications (0975 – 8887) Volume 178 – No. 26, June 2019 [7]. Bala, T., Bhatia, V., Kumawat, S. and Jaglan, V., 2018. Asurvey:issues and challenges in wireless sensor network. International Journalof Engineering & Technology, 7(2.4), pp.53-55. [8]. Sharma, Sukhwinder, Rakesh Kumar Bansal, and Savina Bansal. "Issues and challenges in wireless sensor networks." In 2013 InternationalConference on Machine Intelligence and Research Advancement, pp. 58-62. IEEE, 2013. [9]. Twinkle Deshwal, Parveen Verma, Routing Challenges in WSN (Wireless Sensor Networks), International Journal of Advanced Computing Research Volume 02– Issue 01, Jul2016.
  • 6. 6 [10]. Al-Karaki, Jamal N., and Ahmed E. Kamal. "Routing techniques in wireless sensor networks: a survey." IEEE wireless communications 11, no. 6 (2004):6-28. [11]. Singh, Santar Pal, and S. C. Sharma. "Asurvey on cluster-based routing protocols in wireless sensor networks." Procedia computer science 45 (2015):687- 695. [12]. Loveneet Kaur, Dinesh Kumar,”Optimization techniques for Routing in Wireless Sensor Network”, Vol. 5 (3) , 2014 [13]. B. R. Tapas Bapu,K. Thanigaivelu, A. Rajkumar, Fault Tolerance in Wireless Sensor Networks – A Survey,February 2015. [14]. Weiping Wang1, Shigeng Zhang,Guihua Duan, and Hong Song, Security in Wireless Sensor Networks,springer,2015. [15]. S. Ahmad Salehi ; M.A. Razzaque ; Parisa Naraei; Ali Farrokhtala,Security in Wireless Sensor Networks:Issues and challenges,ieee,2013. [16]. Ming Yu, Senior Member, IEEE, Kin K. Leung, Fellow, IEEE, and Aniket Malvankar, Student Member, IEEE,”ADynamic Clustering and Energy Efficient Routing Technique for Sensor Networks”, Vol. 6, No. 8, August 2007 [17]. W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient Communication Protocol for Wireless Microsensor Networks”, in IEEE Computer Society Proceedings of the Thirty Third Hawaii International Conference on System Sciences (HICSS '00), Washington, DC, USA, Jan. 2000, vol. 8, pp. 8020 [18]. Ridha Azizi, Consumption of Energy and Routing Protocols in Wireless Sensor Network, Network Protocols and Algorithms, 2016, Vol. 8, No. 3 [19]. Yan, Jingjing, Mengchu Zhou, and Zhijun Ding. "Recent advances in energy-efficient routing protocols for wireless sensor networks: Areview." IEEE Access 4 (2016):5673-5686 [20]. Yong Wang,Garhan Attebury,And Byrav Ramamurthy,A Survey of Security Issues in Wireless Sensor Networks,2006.