Effect of Proxy Nodes on the Performance of TCP-Based Transport Layer Protocols in Wireless Sensor Networks

Wireless Sensor Networks have recently attracted many researchers attentions due to their wide range of applications. Even though a plethora of studies have been carried out on characteristics, special conditions, and various aspects of WSNs, transport protocol which is compatible with conditions of Wireless Sensor Networks has not been considerably addressed. Wireless Sensor Networks have limitations such as storage space, energy resources, and wireless communication issues. Accordingly, widely-used transport protocols like Transmission Control Protocol (TCP) may not enjoy sufficient efficiency in such networks. In this paper, we study the characteristics of WSNs leading to design transport layer protocol for WSNs and aim at evaluating the efficiency of TCP and its dependent protocols (TCP variables), which are introduced to wireless networks. We propose to employ proxy nodes near sinks to improve the performance of transport layer. Our NS-2 simulation results indicate that throughput and packet delivery ratio are improved from 20 to 50 percent after employing proxy nodes, while the average message delay is almost increased twice.

[1]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[2]  Larry L. Peterson,et al.  TCP Vegas: End to End Congestion Avoidance on a Global Internet , 1995, IEEE J. Sel. Areas Commun..

[3]  Ian F. Akyildiz,et al.  A scalable approach for reliable downstream data delivery in wireless sensor networks , 2004, MobiHoc '04.

[4]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[5]  John Heidemann,et al.  RMST: reliable data transport in sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Wendi B. Heinzelman,et al.  Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.

[7]  Yong Yao,et al.  The cougar approach to in-network query processing in sensor networks , 2002, SGMD.

[8]  Yuguang Fang,et al.  Throughput, Delay, and Mobility in Wireless Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[9]  N. Sadagopan,et al.  The ACQUIRE mechanism for efficient querying in sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  Ruzena Bajcsy,et al.  Congestion control and fairness for many-to-one routing in sensor networks , 2004, SenSys '04.

[11]  Devavrat Shah,et al.  Throughput-delay trade-off in wireless networks , 2004, IEEE INFOCOM 2004.

[12]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[13]  Vidyasagar Potdar,et al.  Wireless Sensor Network transport protocol: A critical review , 2013, J. Netw. Comput. Appl..

[14]  Deborah Estrin,et al.  Rumor Routing Algorithm For Sensor Networks , 2002 .

[15]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[16]  Shashidhar Gandham,et al.  STCP: a generic transport layer protocol for wireless sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..

[17]  Christian Poellabauer,et al.  PALER: A Reliable Transport Protocol for Code Distribution in Large Sensor Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[18]  Özgür B. Akan,et al.  ESRT: event-to-sink reliable transport in wireless sensor networks , 2003, MobiHoc '03.

[19]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[20]  David E. Culler,et al.  Flush: a reliable bulk transport protocol for multihop wireless networks , 2007, SenSys '07.

[21]  Mário Serafim Nunes,et al.  Performance Evaluation of DTSN in Wireless Sensor Networks , 2008, EuroNGI Workshop.

[22]  Haejun Lee,et al.  A hop-by-hop reliability support scheme for wireless sensor networks , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[23]  Soon-Ju Kang,et al.  IEEE 802.15.4 MAC-based Location-ID Exchange Protocol for Realizing Micro-Cell Connectionless Location-Awareness Services , 2008, J. Comput. Sci. Eng..

[24]  Deborah Estrin,et al.  Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.

[25]  Hongwei Zhang,et al.  Reliable bursty convergecast in wireless sensor networks , 2005, MobiHoc '05.

[26]  Tongtong Li,et al.  An energy efficient link-layer security protocol for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[27]  Chieh-Yih Wan,et al.  Pump-slowly, fetch-quickly (PSFQ): a reliable transport protocol for sensor networks , 2005, IEEE Journal on Selected Areas in Communications.

[28]  Nauman Aslam,et al.  C-Sec: Energy efficient link layer encryption protocol for Wireless Sensor Networks , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).

[29]  Chieh-Yih Wan,et al.  CODA: congestion detection and avoidance in sensor networks , 2003, SenSys '03.

[30]  Ramesh Govindan,et al.  RCRT: rate-controlled reliable transport for wireless sensor networks , 2007, SenSys '07.

[31]  David Martins,et al.  Steganography in MAC Layers of 802.15.4 Protocol for Securing Wireless Sensor Networks , 2010, 2010 International Conference on Multimedia Information Networking and Security.