BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks

BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks

Rochester Institute of Technology RIT Scholar Works Theses 5-8-2018 BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks Nelson Henry Powell III [email protected] Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Powell, Nelson Henry III, "BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks" (2018). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks By: Nelson Henry Powell III Committee Members: Dr. Sumita Mishra Dr. Yin Pan Dr. Andres Kwasinski In partial fulfillment of the requirements for the degree of Master of Science in Computing Security Rochester Institute of Technology B. Thomas Golisano College of Computing & Information Sciences Department of Computing Security May 8th, 2018 Acknowledgments I’d like to take this opportunity to thank my wife, my love, Emilia; for putting up with the deployments, active duty, and working two jobs, all while going back to school to complete this degree. None of this would have been possible without your love and support. You are my motivation for being a better me. To my children, Connor and Iliana, for teaching me to look at the world as if it were for the first time; and for all the snuggles, hugs, and kisses that happily kept me from my school work. You are both my favorite and most important accomplishments in my life. May you both achieve more than me and maintain the fresh outlook on life. I’d like to thank my parents for everything. You’ve both been my number one fans all my life. I wouldn’t be at this point in my life without your guidance, wisdom, and love. Dad, your candor, spirituality, and introspection has giving me the tools to strive to be the best man I can be and learn from my mistakes. I most definitely inherited your curiosity and engineering skills. Mom, thank you for all your nurturing and affection throughout my life, for being my sounding board, and being the driving force in my education. And thank you for coming out of retirement and giving that final critical review. I’d like to thank my co-workers, Dr. Michael Kurdziel for all your support and assistance reviewing my thesis, David Weiss for being the first victim to review my paper and provide valuable feedback, and James Hood for helping me with a last minute save that really pulled the paper together. To Dr. Kwasinski, I’ve enjoyed our discussions over the years, both regarding this thesis as well as other research topics. I appreciate all the help you’ve provided throughout this project and look forward to working with you again. Finally, I’d like to thank Dr. Sumita Mishra. You never gave up on me and ensured I was able to achieve my goals. For your insight and guidance throughout this endeavor; and most of all, for your empathy regarding the challenges of balancing work, family, and education. I admire all that you have accomplished and you gave me the reality check of how attainable this thesis is. i Nelson Henry Powell III Abstract The proliferation of autonomous Wireless Sensor Networks (WSN) has spawned research seeking power efficient communications to improve the lifetime of sensor motes. WSNs are characterized by their power limitations, wireless transceivers, and the converge-cast communications techniques. WSN motes use low-power, lossy radio systems deployed in dense, random topologies, working sympathetically to sense and notify a sink node of the detectable information. In an effort to extend the life of battery powered motes, and hence the life of the network, various routing protocols have been suggested in an effort to optimize converge-cast delivery of sensor data. It is well known that reducing the overhead required to perform converge-cast routing and communications reduces the effects of the primary power drain in the mote, the transceiver. Furthermore, WSNs are not well protected; network security costs energy both in computation and in RF transmission. This paper investigates the use of a Mobile Ad-hoc Networking (MANET) routing protocol known as B.A.T.M.A.N. in WSN. This thesis proposes that the features of B.A.T.M.A.N. in the MANET realm may prove beneficial to the WSN routing domain; and that slight modifications to the routing technique may prove beneficial beyond current protocol technologies. The B.A.T.M.A.N. variant will be compared against the contemporary LEACH WSN routing protocol to discern any potential energy savings. ii Nelson Henry Powell III Table of Contents 1 INTRODUCTION ................................................................................................................. 1 1.1 PROPOSED SOLUTION ........................................................................................................ 2 1.2 PURPOSE ........................................................................................................................... 3 2 BATMAN ROUTING PROTOCOL ................................................................................... 4 2.1 PROTOCOL DESIGN ............................................................................................................ 5 2.2 SIMULATING BATMAN .................................................................................................... 7 3 TEST CASES ....................................................................................................................... 11 4 USING NS-3 TO SIMULATE SENSORS ......................................................................... 24 4.1 PHYSICAL RF MODEL REUSE .......................................................................................... 24 4.2 SENSOR MAC MODULE .................................................................................................. 29 4.3 SENSOR HELPER CLASS ................................................................................................... 31 4.4 POWER DISSIPATION ....................................................................................................... 32 5 THE LEACH PROTOCOL ................................................................................................ 33 5.1 BENEFITS OF LEACH...................................................................................................... 35 5.2 CONVERTING NS-2 BASELINE CODE ............................................................................... 36 5.2.1 Assumption 1 ........................................................................................................... 37 5.2.2 Assumption 2 ........................................................................................................... 38 5.2.3 Assumption 3 ........................................................................................................... 38 5.2.4 Assumption 4 ........................................................................................................... 39 5.2.5 Assumption 5 ........................................................................................................... 41 5.2.6 Assumption 6 ........................................................................................................... 42 5.2.7 Assumption 7 ........................................................................................................... 43 5.2.8 Assumption 8 ........................................................................................................... 43 5.2.9 Assumption 9 ........................................................................................................... 45 5.3 A LEACH PROTOCOL SPECIFICATION ............................................................................ 45 5.3.1 State Machine Description ...................................................................................... 46 5.3.1.1 Initialization State ......................................................................................................................................... 47 5.3.1.2 Advertisement State ...................................................................................................................................... 47 5.3.1.3 Cluster Setup Phase ....................................................................................................................................... 49 5.3.1.4 Schedule Creation Phase ............................................................................................................................... 50 5.3.1.5 Data Transmission Phase .............................................................................................................................. 51 5.3.2 Protocol Timing Analysis ........................................................................................ 52 5.4 LEACH RESULTS ........................................................................................................... 58 5.4.1 Network Death Rate ................................................................................................ 59 5.4.2 Number of Cluster Heads per Round ...................................................................... 63 5.4.3 LEACH Packet Rate per Round .............................................................................. 68 5.5 THE REAL LEACH ........................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    129 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us