Mobile wireless sensor network

From Wikipedia, the free encyclopedia
Jump to: navigation, search

A mobile wireless sensor network (MWSN)[1] can simply be defined as a wireless sensor network (WSN) in which the sensor nodes are mobile. MWSNs are a smaller, emerging field of research in contrast to their well-established predecessor. MWSNs are much more versatile than static sensor networks as they can be deployed in any scenario and cope with rapid topology changes. However, many of their applications are similar, such as environment monitoring or surveillance. Commonly, the nodes consist of a radio transceiver and a microcontroller powered by a battery, as well as some kind of sensor for detecting light, heat, humidity, temperature, etc.


Broadly speaking, there are two sets of challenges in MWSNs; hardware and environment. The main hardware constraints are limited battery power and low cost requirements. The limited power means that it's important for the nodes to be energy efficient. Price limitations often demand low complexity algorithms for simpler microcontrollers and use of only a simplex radio. The major environmental factors are the shared medium and varying topology. The shared medium dictates that channel access must be regulated in some way. This is often done using a medium access control (MAC) scheme, such as carrier sense multiple access (CSMA), frequency division multiple access (FDMA) or code division multiple access (CDMA). The varying topology of the network comes from the mobility of nodes, which means that multihop paths from the sensors to the sink are not stable.


Currently there is no standard for MWSNs, so often protocols from MANETs are borrowed, such as Associativity-Based Routing (AR), Ad hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR) and Greedy Perimeter Stateless Routing (GPSR).[2] MANET protocols are preferred as they are able to work in mobile environments, whereas WSN protocols often aren't suitable.


Topology selection plays an important role in routing because the network topology decides the transmission path of the data packets to reach the proper destination. Here, all the topologies (Flat / Unstructured, cluster, tree, chain and hybrid topology) are not feasible for reliable data transmission on sensor nodes mobility. Instead of single topology, hybrid topology plays a vital role in data collection, and the performance is good. Hybrid topology management schemes include the Cluster Independent Data Collection Tree (CIDT).[3] and the Velocity Energy-efficient and Link-aware Cluster-Tree (VELCT);[4] both have been proposed for mobile wireless sensor networks (MWSNs).


Since there is no fixed topology in these networks, one of the greatest challenges is routing data from its source to the destination. Generally these routing protocols draw inspiration from two fields; WSNs and mobile ad hoc networks (MANETs). WSN routing protocols provide the required functionality but cannot handle the high frequency of topology changes. Whereas, MANET routing protocols can deal with mobility in the network but they are designed for two way communication, which in sensor networks is often not required.[5]

Protocols designed specifically for MWSNs are almost always multihop and sometimes adaptations of existing protocols. For example, Angle-based Dynamic Source Routing (ADSR),[6] is an adaptation of the wireless mesh network protocol Dynamic Source Routing (DSR) for MWSNs. ADSR uses location information to work out the angle between the node intending to transmit, potential forwarding nodes and the sink. This is then used to insure that packets are always forwarded towards the sink. Also, Low Energy Adaptive Clustering Hierarchy (LEACH) protocol for WSNs has been adapted to LEACH-M (LEACH-Mobile),[7] for MWSNs. The main issue with hierarchical protocols is that mobile nodes are prone to frequently switching between clusters, which can cause large amounts of overhead from the nodes having to regularly re-associate themselves with different cluster heads.

Another popular routing technique is to utilise location information from a GPS module attached to the nodes. This can be seen in protocols such as Zone Based Routing (ZBR),[8] which defines clusters geographically and uses the location information to keep nodes updated with the cluster they're in. In comparison, Geographically Opportunistic Routing (GOR),[9] is a flat protocol that divides the network area into grids and then uses the location information to opportunistically forward data as far as possible in each hop.

Multipath protocols provide a robust mechanism for routing and therefore seem like a promising direction for MWSN routing protocols. One such protocol is the query based Data Centric Braided Multipath (DCBM).[10]

Medium access control[edit]

There are three types of medium access control (MAC) techniques: time division based, frequency division based and code division based. Due to the relative ease of implementation, the most common choice of MAC is time division based and are closely related to the popular CSMA/CA MAC.


Protocols designed for MWSNs are usually validated with the use of either analytical, simulation or experimental results. Detailed analytical results are mathematical in nature and can provide good approximations of protocol behaviour. Simulations can be performed using software such as OPNET, NetSim and NS2 and is the most common method of validation. Simulations can provide close approximations to the real behaviour of a protocol under various scenarios. Physical experiments are the most expensive to perform and, unlike the other two methods, no assumptions need to be made. This makes them the most reliable form of information, when determining how a protocol will perform under certain conditions.


The advantage of allowing the sensors to be mobile increases the number of applications beyond those for which static WSNs are used. Sensors can be attached to a number of platforms:

  • People
  • Animals
  • Autonomous Vehicles
  • Unmanned Vehicles
  • Manned Vehicles

In order to characterise the requirements of an application, it can be categorised as either constant monitoring, event monitoring, constant mapping or event mapping.[1] Constant type applications are time-based and as such data is generated periodically, whereas event type applications are event drive and so data is only generated when an event occurs. The monitoring applications are constantly running over a period of time, whereas mapping applications are usually deployed once in order to assess the current state of a phenomenon. Examples of applications include health monitoring, which may include heart rate, blood pressure etc.[11] This can be constant, in the case of a patient in a hospital, or event driven in the case of a wearable sensor that automatically reports your location to an ambulance team in the case of an emergency. Animals can have sensors attached to them in order to track their movements for migration patterns, feeding habits or other research purposes.[12] Sensors may also be attached to unmanned aerial vehicles (UAVs) for surveillance or environment mapping.[13] In the case of autonomous UAV aided search and rescue, this would be considered an event mapping application, since the UAVs are deployed to search an area but will only transmit data back when a person has been found.

See also[edit]


  1. ^ a b T. Hayes and F.H. Ali. 2016. "Mobile Wireless Sensor Networks: Applications and Routing Protocols". Handbook of Research on Next Generation Mobile Communications Systems. IGI Global. ISBN 9781466687325. pp.256-292.
  2. ^ B. Karp and H. T. Kung. 2000. GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom '00). pp.243-254.
  3. ^ R. Velmani, and B. Kaarthick, 2014. An Energy Efficient Data Gathering in Dense Mobile Wireless Sensor Networks,” ISRN Sensor Networks, vol. 2014, Article ID 518268, 10 pages. doi:10.1155/2014/518268.
  4. ^ R. Velmani, and B. Kaarthick, 2015. An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wireless Sensor Networks. IEEE Sensors Journal, vol. 15, no. 4, pp. 2377–2390. doi: 10.1109/JSEN.2014.2377200.
  5. ^ T.P. Lambrou and C.G. Panayiotou. 2009. A Survey on Routing Techniques Supporting Mobility in Sensor Networks. In Proceedings of the 5th international conference on Mobile Ad Hoc and Sensor Networks (MSN'09). pp.78-85.
  6. ^ S. Kwangcheol, K. Kim and S. Kim. 2011. ADSR: Angle-Based Multi-hop Routing Strategy for Mobile Wireless Sensor Networks. In proceedings of the IEEE Asia-Pacific Services Computing Conference (APSCC). pp.373-376.
  7. ^ D. Kim and Y. Chung. 2006. Self-Organization Routing Protocol Supporting Mobile Nodes for Wireless Sensor Network. In proceedings of the 1st international multi-symposiums on Computer and Computational Sciences (IMSCCS’06). pp.622-626.
  8. ^ U. Ahmed and F.B. Hussain. 2011. Energy efficient routing protocol for zone based mobile sensor networks. In proceedings of the 7th international Wireless Communications and Mobile Computing conference (IWCMC). pp.1081-1086.
  9. ^ Y. Han and Z. Lin. 2012. A geographically opportunistic routing protocol used in mobile wireless sensor networks. In proceedings of the 9th IEEE international conference on Networking, Sensing and Control (ICNSC). pp.216-221.
  10. ^ A. Aronsky and A. Segall. 2010. A multipath routing algorithm for mobile Wireless Sensor Networks. In proceedings of the 3rd Joint IFIP Wireless and Mobile Networking Conference. pp.1-6.
  11. ^ H. Yan, H. Huo, Y. Xu and M. Gidlund. 2010. Wireless Sensor Network Based E-Health System – Implementation and Experimental Results. IEEE Transactions on Consumer Electronics, vol. 56, no. 4, pp. 2288-2295.
  12. ^ S. Ehsan et al. 2012. Design and Analysis of Delay-Tolerant Sensor Networks for Monitoring and Tracking Free-Roaming Animals. IEEE Transactions on Wireless Communications, vol. 11, no. 3, pp. 1220-1227.
  13. ^ B. White et al. 2008. Contaminant Cloud Boundary Monitoring Using Network of UAV Sensors. IEEE Sensors Journal, vol. 8, no. 10, pp. 1681-1692.