Wireless Sensor Network Protocol: Sensor Protocol for Information via Negotiation (SPIN)

 A wireless sensor network is formed using multiple small sensors. Such a network is a self- organized infrastructure-less wireless network that monitors environmental conditions on its own and transmit data in a synchronized manner to main location called sink which analyses the data. Sink addresses the queries generated by users by collecting results and providing required information. Routing protocols play an important role in producing efficient and interruption less communication within the nodes of the WSN. Applications using WSN demand quick data transmission with minimum interruption. The service, performance and reliability of the WSN depends on the choice of its routing protocol.

This article discusses Sensor protocol for information via negotiation (SPIN) which allow exchange of data effectively over a WSN.

Sensor Protocol for Information via Negotiation (SPIN)

This routing protocol is basically for exchanging data about the sensor data in network operation. It is a negotiation-based information dissemination protocol based on meta data [1]. Sensor applications can communicate about the data that is already possessed and the one required. Data negotiation and data adaptive algorithms are used. The nodes can increase the system’s utility time by monitoring and adapting to changes through SPIN. The mechanism uses three kinds of messages:

  • ADV- The SPIN node advertises that it has data for sharing using ADV message with meta-data.
  • REQ- SPIN node sends this message to receive data.
  • DATA- These messages contain sensor data along with meta-data header.

 


Figure: SPIN Routing Protocol [1]

DATA messages are larger than ADV and REQ as the latter contain only meta data. A SPIN peer-to-peer protocol works in three stages. The protocol begins by advertising that it has data available for dissemination through ADV message. The neighboring node receives ADV and checks if it has requested or received the advertised data. It sends REQ to request for missing data to the former node. The sender responds to the REQ with DATA thus completing the protocol.

SPIN protocol design works on data negotiation idea where nodes perform negotiations among metadata thus preventing transmission of redundant data. This protocol begins with broadcasting advertisement (ADV) of metadata. Each node in transmission range sends back a request if it requires that data and subsequently, the data is sent. SPIN is a general technique which addresses query-driven, event driven, time driven as well as application-specific methods.

 Advantages

  • The SPIN protocols achieve high level performance with respect to computation, complexity, communication and energy.
  • Each node in SPIN requires to know its single-hop neighboring node thus allowing localized topological changes.
  • The redundant data is halved through meta data negotiation and SPIN offers better energy savings as compared to flooding [2].

Limitations

Limitation of SPIN protocol is that it does not assure that the data will reach the target and it is not a good choice for high-density distribution of nodes. Data dissemination takes a long time. Node with higher computation uses more energy. Not all nodes compute equally, some may be used multiple times thus loosing energy sooner than other nodes on the network. The idle nodes not transmitting any data reduce energy [3].

References

[1] Kulik, J., Heinzelman, W., Balakrishnan, H., (2002). Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks. Wireless Networks 8, 169–185

[2] Geetu, S. J., (2012). A Study on a Routing Protocol SPIN In WSN. International Journal of Information Technology and Knowledge Management, July-December, Volume 5, No. 2, pp. 345-352

[3] Salamath, M., Sunitha, R., (2016). “A Survey on SPIN Protocol in Wireless Sensor Network”. International Journal of Science and Research (IJSR), Volume 5 Issue 3.

[4] Qureshi, M. D., Ishtiaq, H., Farhat, A., Rehman, O., (2012). Analysis of Various Attacks in Routing Protocols for Wireless Sensor Network. International Journal of Scientific and Engineering Research. International Journal of Scientific & Engineering Research, Volume 3, Issue 9, ISSN 2229-5518


Comments

Popular posts from this blog

IoT: Device Vulnerability & Security Concerns in Wearable Devices

Research Outlet: Industry Academia Collaboration Program

Artificial Intelligence in Patient Health Monitoring System