Cryptography Reference
In-Depth Information
can balance the energy consumption of the entire network. Furthermore, the number
of nodes operating in a WSN scenario is much larger than conventional networks.
Consequently, there is a need for the mass production of low-cost nodes. However, with
the increase in the number of sensor nodes to meet the current demand for sensor appli-
cations, construction of each node to be tamper resistant would be very expensive. As
a result, nodes could be susceptible to a node-capture attack. Hence, routing protocols
used in traditional networks cannot be applied directly to a resource-constraint envi-
ronment such as WSN. Therefore, new arrays of routing protocols have been designed
for WSN (Al-Karaki and Kamal 2004).
7.2 Routing Classifi cations in WSN
Routing protocols in WSN can be classified by several criteria, such as: data centricity,
location information, network layering and in-network processing, path redundancy, a
Quality of Service (QoS) requirement, and network heterogeneity.
7. 2 .1 Data-Centric Communication
Conventional networks such as IP networks use a node-centric routing model in which
information is exchanged using a unique addressing scheme (IP version 4 or 6). Based
on the route the query took to reach the destined node, each source node independently
sends data via the shortest path to the concerned sink node. In contrast, a data-centric
Figure 7.1. Address-Centric Communication in WSN
Search WWH ::




Custom Search