Académique Documents
Professionnel Documents
Culture Documents
Review
art ic l e i nf o
a b s t r a c t
Article history:
Received 27 September 2012
Received in revised form
12 February 2013
Accepted 1 April 2013
Available online 10 April 2013
This paper surveys intelligent routing protocols which contribute to the optimization of network lifetime
in wireless sensor networks (WSNs). Different from other surveys on routing protocols for WSNs,
this paper rst puts forward new ideas on the denition of network lifetime. Then, with a view to
prolonging network lifetime, it discusses the routing protocols based on such intelligent algorithms as
reinforcement learning (RL), ant colony optimization (ACO), fuzzy logic (FL), genetic algorithm (GA),
and neural networks (NNs). Intelligent algorithms provide adaptive mechanisms that exhibit intelligent
behavior in complex and dynamic environments like WSNs. Inspired by such an idea, some intelligent
routing protocols have recently been designed for WSNs. Under each category, it discusses the
representative routing algorithms and further analyzes the performance of network lifetime dened
in three aspects. This paper intends to give assistance in the optimization of network lifetime in
WSNs, together with offering a guide for the collaboration between WSNs and computational
intelligence (CI).
& 2013 Elsevier Ltd. All rights reserved.
Keywords:
Intelligent routing protocols
Reinforcement learning
Ant colony optimization
Fuzzy logic
Genetic algorithm
Neural networks
Contents
1.
2.
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1.
Our contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2.
Taxonomy of intelligent routing protocols in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reinforcement learning based routing protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.1.
Q-Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.1.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.1.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.1.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.1.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.
AdaR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.
ATP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4.
FROMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.5.
QELAR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.5.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1084-8045/$ - see front matter & 2013 Elsevier Ltd. All rights reserved.
http://dx.doi.org/10.1016/j.jnca.2013.04.001
187
187
187
187
188
188
188
188
188
188
188
188
189
189
189
189
189
189
190
190
190
190
190
190
190
190
186
2.5.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
2.5.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
2.5.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
2.6.
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
3. Ant colony optimization based routing protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
3.1.
BAR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
3.1.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
3.1.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
3.1.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
3.1.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
3.2.
SCFFFP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
3.2.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
3.2.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
3.2.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
3.2.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
3.3.
EEABR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
3.3.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
3.3.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
3.3.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
3.3.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
3.4.
ACORC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
3.4.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
3.4.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
3.4.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
3.4.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
3.5.
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
4. Fuzzy logic based routing protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
4.1.
FCH. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
4.1.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
4.1.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
4.1.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
4.1.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
4.2.
FMO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
4.2.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
4.2.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
4.2.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
4.2.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
4.3.
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
5. Genetic algorithm based routing protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
5.1.
GA-Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
5.1.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
5.1.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
5.1.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
5.1.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
5.2.
GA-EECP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
5.2.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
5.2.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
5.2.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
5.2.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
5.3.
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
6. Neural networks based routing protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
6.1.
SIR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
6.1.1.
Protocol denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
6.1.2.
Functioning of the scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
6.1.3.
Results and performance analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
6.1.4.
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
6.2.
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
7. Analysis of network lifetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
7.1.
Denition 1 of network lifetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
7.2.
Denition 2 of network lifetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
7.3.
Denition 3 of network lifetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
8. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
1. Introduction
A Wireless Sensor Network (WSN) is a network comprising a
large number of wirelessly connected heterogeneous sensors
which are spatially distributed across an interested eld. It has
been applied in many elds such as military investigation, medical
treatment, environmental monitor and industry management.
However, WSNs differ from other networks, in which sensor nodes
have limited energy supply, constrained computation and communication abilities. Therefore, how to prolong the network lifetime is an important and challenging issue, which is also the focus
of designing the routing protocols for WSNs.
A great many routing protocols have been specically designed for
WSNs classied as data centric, hierarchical and location-based. In
recent years, with the development of computational intelligence (CI),
routing protocols based on such intelligent algorithms as reinforcement learning (RL), ant colony optimization (ACO), fuzzy logic (FL),
genetic algorithm (GA), and neural networks (NNs) have been
proposed to improve the performance of WSNs. Intelligent algorithms
provide adaptive mechanisms that enable or facilitate intelligent
behavior in complex and changing environments, which can be
brought to design all-in-one distributed real-time algorithms. Such
algorithms have proved to work well under WSN-specic requirements like communication failures, changing topologies and mobility.
Thus, some researchers make use of intelligent algorithms to address
routing issue in WSNs. However, these intelligent algorithms have
different properties, and they should be used depending on the
specic application scenario. GA and NNs have very high processing
demands and are usually centralized solutions. They are slightly better
suited for clustering when the clustering schemes can be predeployed. FL is suitable for implementing routing and clustering
heuristics like link or cluster head quality classication. However, it
generates non-optimal solutions and fuzzy rules need to be re-learnt
upon topology changes. ACO is very exible, but generates a lot of
additional trafc because of the forward and backward ants. RL has
been proved to work very well for routing and can be implemented at
nearly no additional costs. It should be the rst choice when looking
for a exible and low-cost routing approach.
1.1. Our contributions
In this paper, we discuss some representative intelligence-based
routing algorithms. There have been several surveys (Karaki and
Kamal, 2004; Villalba et al., 2009; Singh et al., 2010; Baranidharan
and Shanti, 2010; Halawani and Khan, 2010; Celik et al., 2010; Saleem
et al., 2011; Zungeru et al., 2012) on the routing protocols for WSNs.
The former focus on the traditional routing protocols, and the latter
research on ACO based routing protocols. However, besides ACO, many
other intelligent algorithms such as RL, FL, GA and NNs have also been
used to optimize the routing issue for WSNs. This paper intends to
present a comprehensive survey of intelligent routing protocols in
WSNs. The main contributions of this paper are listed as follows:
1. With a view to the optimization of network lifetime in WSNs,
this paper picks out some typical intelligent routing protocols
to discuss. It intends to provide new ideas and incentives for
WSNs, and at the same time to offer a guide for the collaboration between WSNs and CI.
2. To evaluate the performance of these protocols in the round, it
puts forward new ideas on the denition of the network
lifetime. Most of the routing algorithms for WSNs are proposed
to prolong the network lifetime which is dened as the time
until the rst sensor node is drained of its energy. However,
such time is not always important. For the applications of
WSNs, they are concerned about whether the network can
187
Routing protocols
RL based
ACO
based
FL based
GA based
NNs
based
188
from large data sets, deals with how an agent should take actions
in an environment to maximize the long-term reward. The agent
acquires its knowledge by actively exploring its environment.
Then, it determines the next action according to the knowledge.
The agent has to try many different actions and learns from its
experience since it does not know the best action beforehand. For
a particular state, it selects some possible action and receives a
reward from the environment.
A reinforcement learning task is described as a Markov decision
process (MDP) (S; A; P; R), in which S is the set of possible states, A
is the set of possible actions, P denotes the state transition
probability, and R indicates the environment reward to corresponding action. In addition, the policy (t: S-A) is the mapping from
states to actions. Such a policy denes how the learning agent
behaves at time-step t. The function V (s) denes the expected total
reward that can be received by the agent at states s under the policy
. The goal of solving an MDP is to nd an optimal policy * under
which the cumulative reward is maximized.
The RL algorithm can be used to optimize the network
performance. It has medium requirements for memory and
computation at each node because of keeping some different
possible actions and reward values. And it needs some time to
converge. However, it is easy to implement, and highly exible
to topology changes. By using distributed learning, it is able to
achieve optimal results at nearly no additional costs. Therefore, RL
is well suited to deal with such distributed problems as routing in
WSNs. But for large-scale network, the complexity of learning
should be thought over since it has an exponential increase with
the number of agents. In addition, the difculty of RL is the
fundamental tradeoff between exploration and exploitation.
Exploration is to grope for new knowledge, whereas exploitation
is to adopt these experienced stateaction pairs which have gained
good reward. The former can bring about a long-term improvement, which is conducive to converging to the optimization.
The latter is able to enhance the performance in a short time,
but maybe it converges to a non-optimal solution. These two
strategies should be selected on the basis of different requirements. At present, it is more popular to gain the optimal solution
by exploration
2.1. Q-Routing
2.1.1. Protocol denition
Q-Routing proposed in Boyan and Littman (1994) is one of the
earliest works in routing using machine learning techniques.
It takes the minimal delivery times into account to learn the best
paths, and assigns a Q-value to each neighbor of each node. Such a
Q-value is dened as the evaluated time spent on the packet
delivery for the current node taking this particular neighbor as the
next hop to the sink.
2.1.2. Functioning of the scheme
The learning process of this protocol is shown as follows.
When a node y receives a packet from node x, it immediately
sends back a reward representing the minimum time taken to
forward the packet to the sink, which is computed in Eq. (1).
t minzneighborsof y Q y d; z
newestimate
z}|{ z}|{
Q x d; y q s t Q x d; y
Q s; a; w i s; awi s; aT w
i1
where
A p
T
b T R
0
B
B
@
4
1
sd1 ; ad1 T
C
C
A
T
sdL ; adL
0
B
p B
@
sd1 ; sd1 T
C
C
A
T
sdL ; sdL
1
r d1
B C
R@
A
r dL
5
(2)
(3)
(4)
(5)
189
Q m 1Q m Om minn NQ m n
190
hopsndi 2jDi j1
dDi
Q ai k1
10
i1
11
12
13
st1 S
14
191
15
Eres sn
Einit sn
2
arctanEres sn Esn
16
17
192
Es
>
if sM k
< Tr;s
Tr;u Eu
pk r; s uMk
18
>
:
0
otherwise
where pk(r,s) is the probability for ant k to choose node s as the
next hop of node r, Mk is a memory carried by ant k which
stores the identity of each visited node by ant k, T is the
routing table at each node storing the amount of pheromone
trail on each correlative link, is the visibility function dened
in Eq. (19), and and are the parameters that control the
relative importance of pheromone trail versus visibility.
E
1
Ces
19
1
NFdk
20
21
pn
eCQ n
CQ n
22
nN
23
1
jNj
24
where n is the neighbor the ant is coming from, and N is the set of
neighbors.
In FP, the ooded data ants carrying the forward list are
controlled by the same strategy in FF. The data ants not only pass
the data to the destination, but also remember the traversed paths,
by which the backward ants update the correlative pheromone
trail. The probability distribution constrains the ooding towards
the destination for future data ants.
3.2.3. Results and performance analysis
In SC, the exponential term in Eq. (22) makes the initial
probability distribution differ more. Accordingly, at the beginning,
the good links are chosen with a much higher probability rather
than the same probability in BAR. Therefore, SC provides better
energy efciency, which contributes to the optimization of network lifetime in terms of the rst denition. However, it is still not
quite effective in latency.
Compared to BAR and SC, FF has shorter delays, which can
indirectly optimize the network lifetime in terms of the last
denition. However, the success of this protocol signicantly
depends on the appropriate frequency of ooding ants since there
is collision problem in FF. The ooded forward ants create a
signicant amount of trafc so that the data ants and the
193
1
CEMink Fdk =EAvg k Fdk
25
where C and Fdk have the same meanings as that in BAR. EMink
and EAvgk respectively represent the average energy of nodes that
have been visited by ant k, and the minimum energy of these
nodes.
T k r; s 1T k r; s T k =Bdk
26
194
3.3.4. Applications
EEABR minimizes communication load and maximizes energy
savings. Moreover, it makes sensor nodes in the network keep
good connectivity to the sink. For different WSNs scenarios, this
protocol can lead to a good result.
3.4. ACORC
3.4.1. Protocol denition
Routing using ant colony optimization router chip (ACORC)
proposed in Okdem and Karaboga (2009) makes use of ACO to
optimize routing paths. It provides an effective multi-path data
transmission method to achieve reliable communications in the
case of node faults. By developing an adaptive approach, the
network lifetime is maximized, while data transmission is
achieved efciently.
3.4.2. Functioning of the scheme
The operation of this routing scheme is summarized as follows:
A node having information for the base station initializes the
routing task by transferring data in packages to different neighbor
nodes. Each node then chooses other neighbor nodes and so on.
Thus, paths towards the base are formed and each routing
operation supplies some information about optimum paths for
the consequent routing tasks.
While performing this operation, the ACO algorithm is used to
achieve efcient routing. Once a node has data to be transferred to
the destination node, ants are launched from the source node and
move through repeater nodes to reach the destination. The rule
determining the probability distribution is shown in
8
r; s
28
nRs
1
J kw t
29
30
ij t1ij t
31
3.4.4. Applications
ACORC provides an effective multi-path data transmission
method to achieve reliable communications in the case of node
faults. This protocol has also been implemented on a small sized
hardware component and tested on the router chip. Such a
protocol is suitable for applications in which transmission speed
is not essential but transmission reliability is important. In addition, the idea of this protocol and its hardware implementation
seem to be a promising solution for node designers.
3.5. Summary
The ACO-based routing protocols choose routing path according to the probability distribution, which can make nodes keep
good connectivity to the base station. Thus, such procotols contribute to the optimization of the network lifetime in terms of the
second denition. Moreover, these protocols also solve other
problems. SC, FF and FP address the initial pheromone settings
of ACO to lead to a good start-up. They take measures to make the
initial probability distribution different. SC stores the energycorrelative cost of each neighbor to the destination. At the
beginning, good links are chosen with a much higher probability.
Compared to BAR, SC provides better energy efciency, which
contributes to the optimization of network lifetime in terms of the
rst denition. FF oods forward ants to the destination. Once the
forward ants arrive at the destination, the backward ants are
created to traverse back to the source. When a shorter path is
traversed, the rate of releasing ooding ants is decreased. Compared to BAR and SC, FF has shorter delays, which can indirectly
optimize the network lifetime in terms of the last denition.
FP adopts the ooding mechanism to release ants, and combines
forward ants with data ants. The data ants not only pass the data
to the destination, but also remember the traversed paths, by
which the backward ants update the correlative pheromone trail.
The probability distribution constrains the ooding towards the
destination for future data ants. Such a protocol provides higher
success rates of data delivery, which leads to the optimization of
network lifetime in terms of the third denition. EEABR takes the
energy levels of sensor nodes and the lengths of routed paths into
account to update the pheromone trail. It strives to reduce the
communication load related to the ants and the energy spent on
communications. This protocol minimizes the communication
load and maximizes the energy saving, which emphasizes the
enhancement of network lifetime in terms of the rst denition.
ACORC has been proved to offer signicant reductions of energy
consumption compared to EEABR. Thus, it can further prolong the
network lifetime in terms of the rst denition.
However, there are some problems. For the BAR protocol, the
forward ants have no sense about the destination at the beginning.
The energy level of nodes and pheromone trail on links are all the
1
B
2 A
32
AB x minA ; B 1
1
B
2 A
33
195
34
lt sTX revi TX ij if TX ij o revi s
ij
>
>
>
:0
if revi TX ij
196
revi cevi TX ij
35
where re(vi) and ce(vi) denote the residual energy and current
energy of node vi respectively, s is the initial energy of nodes, TXij
represents the consumed energy in transmission from node vi to
node vj, and , are the algorithmic parameters.
ijme 1
1 TX ij
maxTX ij
maxTX ij maxj TX ij
36
j s:t:
vj N i
37
39
according to the dened tness function. For a particular chromosome, the better the tness value, the higher the chance of being
selected to create new chromosomes by crossover. The probability
of crossover taking place depends on the crossover rate which is
usually around 8095%. In nature, crossover is a recombination of
component materials due to mating. It is a binary genetic operator
acting on two chromosomes which have been chosen in the
selection process. Different methods for crossover are developed,
and the simplest is the single-point crossover in which a point is
randomly chosen and the two parents exchange genes after that
point. By means of crossover, the offspring chromosomes only
inherit the traits of the parent chromosomes, which will lead to a
problem that no new genetic material is introduced in the next
generation. Therefore, mutation which allows new genetic patterns to be introduced in the new generation is needed. As with
crossover, the mutation rate is dened to control how often
mutation is applied, which is around 0.51%. However, unlike
crossover, mutation is a unitary genetic operator that affects only a
single chromosome. Then, in the chromosome which has been
selected for mutation, a random bit is selected to change from 0 to
1, or vice versa. By such a way, a new sequence of genes is
introduced into a chromosome. Only if the tness of the mutated
chromosome evaluated in the selection process is higher than the
general population, will it be retained. The procedures presented
above are repeated generation after generation until either a tenough solution is found or a given limit is reached.
The GA algorithm is able to explore the search space efciently
through parallel evaluation of tness and mixing of partial solutions
through crossover. It maintains a search frontier to seek global
optima, and solve multi-criterion optimization problems. In addition,
a more specic advantage of GA is its ability to represent rule-based,
permutation-based, and constructive solutions to many pattern
recognition and machine learning problems (Hsu, 2008). This algorithm has been applied to address design, control, classication,
clustering, and performance tuning. In WSNs, GA is suited for
clustering when the clustering schemes can be pre-deployed. But it
has very high processing demands and is usually a centralized
solution. In addition, the denition of a good tness measure is the
most critical challenge in a genetic approach.
5.1. GA-Routing
5.1.1. Protocol denition
GA-Routing presented in Islam and Hussain (2006) is a GAbased multi-hop routing protocol. In the protocol, the GA technique is used to generate an aggregation tree which spans all the
sensor nodes.
5.1.2. Functioning of the scheme
In the application of WSNs, a sensor node aggregates data
received from neighboring nodes with its own, and forwards the
aggregated packet in the direction of the base station. An aggregation tree indicates the path to transmit data, and the best one is
the most efcient path. However, if the best path is continuously
used, a few nodes in that path may die earlier so that the network
lifetime is shortened. Therefore, a sequence of routing paths is
generated. In GA-Routing, a chromosome represents a spanning
tree. By means of initiation, selection, crossover, and mutation, the
nal solution is obtained. It strives to construct an aggregation tree
and to nd the number of times a particular tree is used.
5.1.3. Results and performance analysis
Simulation results show that GA-Routing prolongs the network
lifetime in terms of the rst denition compared to the single best
tree algorithm. And for a network in small size, it can achieve the
40
C dih dhs
where dih is the distance from node i to the cluster head h, and dhs
is the distance from the cluster head h to the base station.
DD, direct distance to the base station, is the sum of all
distances from sensor nodes to the base station.
m
46
47
1
48
1 ef i
Based on this tness function, the quality of each chromosome
in the current population is evaluated, and the best one is
introduced to the future generation.
Just as Fig. 2 shows, GA-EECP uses GA to determine the initial
set of hierarchical clusters. Based on GA, all the living nodes are
organized into clusters. Then, the cluster optimizer uses the GA's
suggested clusters, query type, and the current network condition
to create optimized clusters that provide the query execution plan
and the transmission schedules. The sensor nodes are congured
according to the optimized cluster information, which is followed
by the data transfer phase. Once receiving the required transmissions, the base station creates a new set of clusters by GA
according to the current condition.
ci
41
i1
DD dis
42
5.2.4. Applications
This protocol can extend network lifetime for different network
deployment environments. Such a GA-based hierarchical clusters
protocol is suitable for large scale WSNs which can be used for
various pervasive and ubiquitous applications such as security,
health-care, industry automation, agriculture, environment and
habitat monitoring.
i1
where dis is the distance from node i to the base station. E, the
transfer energy, represents the energy consumed to transfer the
aggregated message from the cluster to the base station. For a
cluster with k member nodes, E is dened as follows:
k
E ETjh k ER EThs
43
j1
The three terms reveal the energy consumption in the transmission from member nodes to the cluster head, the cluster head
receiving messages from the member nodes, and the transmission
from the cluster head to the base station, respectively.
SD represents the standard deviation of cluster distance. With a
deviation , SD can be computed as follows:
hi 1 dclusteri
h
s
SD
dclusteri 2
197
44
45
i1
198
5.3. Summary
For WSNs in medium or large size, GA can be used to build
clusters. GA-Routing uses GA technique to generate an aggregation
tree which spans all the sensor nodes. It prolongs the network
lifetime in terms of the rst denition compared to the single best
tree algorithm, and achieves the same lifetime as the clusteringbased maximum lifetime data aggregation algorithm for network
in small size. GA-EECP considers cluster distance, direct distance to
the base station, transfer energy, standard deviation of cluster
distance, and number of transmissions to create energy efcient
clusters. It performs better than the traditional cluster-based
protocols in terms of network lifetime dened by the rst aspect.
However, GA-Routing has an extra cost to disseminate the optimal
routing paths to sensor nodes. In GA-EECP, there is also an
additional cost caused by the base station gathering information
about the whole network to determine the clusters. In addition,
GA has very high processing demands and is usually a centralized
solution.
6.1. SIR
6.1.1. Protocol denition
Sensor intelligence routing (SIR) proposed in Barbancho et al.
(2006) is a Qos driven routing algorithm for automatic reading of
public utility meters. A NN is introduced in every node to manage
the routing. In the structure, the rst layer has 4 neurons and the
second layer has 12 neurons in a 3 4 matrix. Inputs are latency,
throughput, error-rate, and duty-cycle.
199
Table 2
Intelligent routing protocols optimizing network lifetime in terms of Denition 1.
Routing
protocol
Intelligence
used in routing
Characteristic
Effect
AdaR
ATP
RL
RL
FROMS
RL
QELAR
RL
SC
ACO
EEABR
ACO
ACORC
ACO
FCH
FL
FMO
FL
GARouting
GA
GA-EECP
GA
SIR
NNs
Learns an optimal routing strategy considering hop count, residual energy, aggregated ratio.
Makes uses of RL-based strategies to build an adaptive spanning tree, which considers new routing
metrics for energy-aware load balancing
Makes uses of the RL algorithm to minimize the energy dissipation while delivering packets to many
sinks simultaneously.
Learns the environment effectively to reduce networking overhead. Considers the residual energy of
each node and the energy distribution among a group of nodes in the reward function.
For the initial pheromone settings in ACO, stores the energy-correlative cost to the destination from
each neighbor, good links are chosen with a much higher probability.
Strives to reduce the communication load related to the ants and the energy spent on
communications. Takes the energy levels of sensor nodes and the lengths of routed paths into
account to update the pheromone trail. Has been proved to minimize the communication load and
maximizes the energy saving.
Has been simulated using an event-based simulator and tested running on a router chip in (Okdem
and Karaboga, 2009). Has been shown to offer signicant reductions of energy consumption
compared to EEABR.
Considers energy, concentration and centrality as three linguistic variables to determine the chance
of becoming cluster-head. Has been validated in (Gupta et al., 2005) to be on average 1.8 times
greater than LEACH in terms of rst-node-death.
Makes use of FL to simultaneously optimize multiple objectives, which uses fuzzy membership
functions and rules in the design of cost functions. Has been validated to be superior to a number of
other well-known online routing heuristics in the performance of rst-node-death by experiment in
(Minhas et al., 2008)
Uses GA technique to generate an aggregation tree which spans all the sensor nodes. Has been proved
to prolong network lifetime in terms of the rst denition compared to the single best tree algorithm,
and achieve the same lifetime as the clustering-based maximum lifetime data aggregation algorithm
for network in small size.
Uses GA technique to create energy efcient clusters. Considers cluster distance, direct distance to the
base station, transfer energy, standard deviation of cluster distance, and number of transmissions as
factors of inuence.
Introduces a NN in each node to manage the routing. As a Qos driven routing algorithm, considers
latency, error rate, duty cycle and throughput to determine the quality of link. Has been shown in
(Barbancho et al., 2006) to achieve superior performance in terms of energy consumption over EAR
and Directed Diffusion
Table 3
Intelligent routing protocols optimizing network lifetime in terms of Denition 2.
Routing
protocol
Intelligence used in
routing
Characteristic
Effect
ATP
RL
FROMS
RL
BAR
SCFFFP
EEABR
ACORC
ACO
ACO
ACO
ACO
Has been proved to be robust for un-predicable link failures and mobile sinks by experiments in (Zhang Has much better
and Huang, 2006).
connectivity
Has been shown in (Forster and Murphy, 2007) to perform well in case of node failure and sink mobility Has much better
connectivity
Chooses routing path according to the probability distribution.
Builds multiple paths
Address the initial pheromone settings in ACO to lead to a good start-up.
Build multiple paths
Has the feature of ACO to choose routing path according to the probability distribution.
Builds multiple paths
Makes use of ACO to provide an effective multi-path data transmission to achieve reliable communications Has much better
in the case of node faults.
connectivity
200
Table 4
Intelligent routing protocols optimizing network lifetime in terms of Denition 3.
Routing
protocol
Effect
Q-Routing
AdaR
ATP
RL
RL
RL
QELAR
RL
Reduces latency
Improves link reliability
Reduces latency and
improves link reliability
Increases packet delivery
FF
ACO
FP
ACO
SIR
NNs
Takes the minimal delivery times into account to learn the best paths
Learns an optimal routing strategy also taking the factor of link reliability into account.
Makes uses of RL-based strategies to build an adaptive spanning tree, which considers new routing
metrics for congestion-aware routing.
Has been proved in (Hu et al., 2010) to achieve high delivery rate and energy efciency even in a
moderately sparse network.
At the beginning, oods forward ants to the destination. Once the forward ants arrive at the destination,
creates backward ants to traverse back to the source. When a shorter path is traversed, the rate of
releasing ooding ants is decreased.
Adopts the ooding mechanism to release ants, and combines forward ants with data ants. Data ants not
only pass the data to the destination, but also remember the traversed paths, by which the backward ants
update the correlative pheromone trail. The probability distribution constrains the ooding towards the
destination for future data ants.
Introduces a NN in each node to manage the routing. As a Qos driven routing algorithm, considers
latency, error rate, duty cycle and throughput to determine the quality of link. Has been shown in
(Barbancho et al., 2006) to achieve superior performance in terms of average latency over EAR and
Directed Diffusion.
6.1.4. Applications
SIR achieves superior performance in terms of average latency
and energy consumption. Such a protocol is well suited for the
real-time application of WSNs.
6.2. Summary
NNs can be utilized to improve performance of WSNs. SIR
considers latency, error rate, duty cycle and throughput to determine the quality of link. This Qos driven routing protocol achieves
superior performance in terms of average latency and energy
consumption. Thus, it optimizes network lifetime in terms of the
rst and third denitions. Especially when the percentage of dead
nodes is high, SIR has much greater superiority. However, there is
an additional cost caused by each node pinging neighbors to learn
the quality of link. In addition, the implementation of a NN on
each node entails computational spending.
Reduces latency
Table 5
Intelligent routing protocols in WSNs.
Routing protocol
RL
Q-Routing
AdaR
ATP
FROMS
QELAR
BAR
SCFFFP
EEABR
ACORC
FCH
FMO
GA-Routing
GA-EECP
SIR
Y
Y
Y
Y
Y
ACO
FL
GA
NNs
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Lifetime optimization
Denition 3
Denitions 1 and
Denitions 13
Denitions 1 and
Denitions 1 and
Denition 2
Denitions 13
Denitions 1 and
Denitions 1 and
Denition 1
Denition 1
Denition 1
Denition 1
Denitions 1 and
3
2
3
2
2
8. Conclusion
201