<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Comparison of Routing Protocols in Wireless Sensor Networks</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Djamil A ̈ıssani Laboratory of Modelling and Optimization of Systems (LAMOS), Faculty of Exact Sciences, University of Bejaia- 06000 Bejaia - Algeria lamos</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Louiza Bouallouche-Medjkoune Laboratory of Modelling and Optimization of Systems (LAMOS), Faculty of Exact Sciences, University of Bejaia- 06000 Bejaia - Algeria louiza</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Samira Yessad Laboratory of Modelling and Optimization of Systems (LAMOS), Faculty of Exact Sciences, University of Bejaia- 06000 Bejaia - Algeria sam</institution>
        </aff>
      </contrib-group>
      <fpage>135</fpage>
      <lpage>142</lpage>
      <abstract>
        <p>Several routing protocols have been proposed to maximize the sensor networks lifetime. However, most of these solutions try to find an energy efficient path and don't account for energy consumption balancing in sensor network. This usually leads to network partitioning. The aim of this paper is to evaluate, analyze and compare three routing protocols (EAR, FEAR and BEER) that balance energy consumption, through a mathematical model and simulations. Obtained results show that FEAR enables fair energy efficient use and enhances the sensor network lifetime more than EAR. BEER outperforms the two protocols and balances energy consumption between sensor nodes better than FEAR and EAR.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>A Wireless sensor network (WSN) is composed of a large
number of sensor nodes deployed in an ad hoc manner.
Each sensor node senses phenomena in the environment
in which it is deployed, performs a local processing
on the sensed data, and then transmits it to a sink.
WSNs have been used in many application domains such
as intelligent houses, intelligent agriculture, battlefield
surveillance, integrated patient monitoring, environment
monitoring, chemical/biological detection and other
commercial applications (3). As sensor nodes are
batterypowered and are uneasy, if not impossible to recharge, the
energy efficiency is a critical design concern in WSNs.
This implies minimizing energy of calculation, sensing
and communication tasks. But, especially minimizing
communications as, radio transmission is expensive in
terms of energy (3).</p>
      <p>
        In the literature, some contributions minimize the average
of consumed energy over time and others enhance
network lifetime. According to (
        <xref ref-type="bibr" rid="ref3">6</xref>
        ), network lifetime
is time span from the deployment to the instant
when the network is considered nonfunctional. When a
network should be considered nonfunctional is, however,
application-specific. It can be, for example, the instant
when the first sensor dies, a percentage of sensors die,
the network partitions, or the loss of coverage occurs. The
network layer has already received an important attention
in this field. Thus, routing protocols have been proposed
to enhance the network lifetime. Most of them are based
on finding the optimal multi-hop route considering the
residual energy of forwarding nodes. This can exhausting
the energy of some nodes more than others. So, these
solutions minimize the average of the consumed energy
without really enhancing the network lifetime.
In (
        <xref ref-type="bibr" rid="ref12">15</xref>
        ), we have proposed a multi-path routing protocol
(FEAR for Fair Energy Aware Routing) where each sensor
node uses multiple paths to route its data to the sink. Our
protocol is based on two ideas. The first idea proposed in
the work of (
        <xref ref-type="bibr" rid="ref10">13</xref>
        ) (Energy Aware Routing, EAR) consists
to save multiple sub-optimal paths indeed of one optimal
path. In addition, path selection is based on a given
probability assigned to each path. The second idea, which
is our new idea is to add a parameter to calculate the
probability use of a forwarding node to route data to the
sink. This parameter is the number of forwarding tables
to which the forwarding node belongs. In our protocol,
the route for forwarding data is chosen according to a
probability which counts in addition to the residual energy
and the energy of the communication as in EAR, the
number of the paths including the forwarding node. This
is intended to use nodes forwarding data for many nodes
less than ones that forward for few nodes and to create
some kind of fairness in the loss of energy between sensor
nodes and improve the network lifetime. We have noticed
in FEAR, that, if a unique route of a given source node
is used equally by other source nodes, the source node
can be isolated quickly. To counter this problem, we have
already ameliorated FEAR in (
        <xref ref-type="bibr" rid="ref13">16</xref>
        ). We have proposed
BEER for Balanced Energy Efficient Routing. BEER adds
a new parameter to the calculation of the route probability.
The latter depends on the parameter N sent in NFTM
messages and on the number of routes in forwarding tables
of nodes receiving NFTM with N &gt; 1. This parameter
reduces the probability use of nodes belonging to a unique
route of a source node. In the two previous works, we
have evaluated FEAR and BEER and have compared
them to EAR by simulation. In this paper, we evaluate
and compare the three protocols through a mathematical
model. Obtained results, as simulation results, show the
impact of our solutions on balancing energy consumption
between sensor nodes.
      </p>
      <p>The rest of this paper is organized as follows. In section
2, related work in this area is outlined. In section 3,
we present FEAR and BEER. In section 4, we describe
the analytical model of EAR, FEAR and BEER and we
give numerical results. In section5, we analyze simulation
results. The paper concludes in section 6.</p>
    </sec>
    <sec id="sec-2">
      <title>2. RELATED WORK</title>
      <p>
        In sensor networks, several routing approaches have
been proposed, giving rise to several classifications.
These approaches can be distinguished according to
(2)(? )nd Al-Karaki04 as follows: depending on the
network structure, we find flat-based routing,
hierarchicalbased routing, and location-based routing, Furthermore,
depending on the protocol operation these protocols
can be classified into multipath-based, query-based,
negotiation-based, QoS-based, or coherent-based routing
techniques. According to (
        <xref ref-type="bibr" rid="ref11">14</xref>
        ), routing protocols are
divided into the following seven classes: Location-based
Protocols, Data-centric Protocols, Hierarchical Protocols,
Mobility-based Protocols, Multipath-based Protocols,
Heterogeneity-based Protocols and QoS-based protocols.
To minimize energy consumption and maximize the WSN
lifetime, routing protocols have been proposed in the
literature. Our study focused on a subset of all these
protocols, especially flat-based routing, that we present in
what follows.
      </p>
      <p>
        SPIN ”Sensor Information Protocol for Negotiation” (
        <xref ref-type="bibr" rid="ref5">8</xref>
        )
is among the early work to pursue a data-centric routing
mechanism. It represents an improvement of flooding
and gossiping of (
        <xref ref-type="bibr" rid="ref4">7</xref>
        ) using negotiation and adaptation to
available resources. SPIN uses three types of messages:
ADV: when a node has data to send, it notifies its
neighbors by using this message with a meta-data. REQ:
a node sends this message if it wishes to receive a data in
response to ADV message. DATA: this message contains
the data with a header containing the metadata. The
protocol Directed Diffusion proposed in (
        <xref ref-type="bibr" rid="ref6">9</xref>
        ) is a protocol
reference in the field of Data centric routing. Directed
Diffusion differs from SPIN in terms of the on demand
data querying mechanism it has. This protocol consists
mainly of two phases. In the first phase the sink broadcasts
messages of interest. Indeed, the sink requests service by
sending the interest to the whole network. The interest
represents a task to be performed by the network and can
be designed for one or more nodes. The second phase
shows the reaction of a node upon receipt of an interest.
First, node checks whether it is affected by this message,
then it records the identity of the node sender of the
interest in order to construct the gradient of routes leading
to the sink. If the node is not intended by the interest, it
continues to spread to all neighbors. Once the message
arrived at the destination, the route to the sink is then
well established and the target node chooses this route
to send the information. Rumor Routing (
        <xref ref-type="bibr" rid="ref2">5</xref>
        ) is a variant
of Directed Diffusion, intended primarily for applications
where the geographic routing criteria are not applicable.
This protocol uses a long-lived packet named agent, which
is generated by a node detecting an event. The agent
travels the network to inform the distant nodes about
local events. When a node generates a request for an
event, it does not flood the whole network as in Directed
Diffusion, since, there will be nodes that know the route
to the event and respond to the request. There is a flood of
events and flood of requests. Authors in (
        <xref ref-type="bibr" rid="ref9">12</xref>
        ) proposed a
slightly modified version of the Directed Diffusion, called
”Gradient-Based Routing”. In this protocol, packets are
forwarded on a path with largest gradient, where gradient
is the difference between the minimum hops separating
the node from the sink and the minimum hops separating
its neighbor from the sink.
      </p>
      <p>
        All the above presented protocols don’t consider load
balancing as is the case in our proposed protocols FEAR
(
        <xref ref-type="bibr" rid="ref12">15</xref>
        ) and BEER (
        <xref ref-type="bibr" rid="ref13">16</xref>
        ).
      </p>
      <p>
        Another improvement of Directed Diffusion is proposed
in (
        <xref ref-type="bibr" rid="ref10">13</xref>
        ), EAR is a reactive protocol, and initiated by the
destination. This protocol have been detailed in our early
work (
        <xref ref-type="bibr" rid="ref12">15</xref>
        ), since our improvement is based primarily on
it. Another routing protocol called SEER ”Simple Energy
Efficient Routing protocol” is proposed in (
        <xref ref-type="bibr" rid="ref8">11</xref>
        ), it uses a
flat structure and a simple method for choosing an optimal
route to the sink based on the distance between the source
and the sink and the residual energy of forwarding nodes.
An improvement of SEER protocol is proposed in (1),
where, authors use learning automata concept to ensure
a fair tradeoffs between energy balancing and optimal
distance. The protocol, named BEAR, aims to improve
SEER in energy balancing and network lifetime.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. FEAR AND BEER DESIGN</title>
      <p>In this section, we present FEAR and BEER protocols.
These protocols aim to improve the WSN lifetime by
ensuring a fair energy wasting of all sensor nodes of the
network.
3.1. FEAR
FEAR is based on two main ideas. The first idea is
that each node maintains multiple routes with different
probabilities use. This idea is that of EAR protocol. The
second idea consists to count the number of nodes using
the same neighbor node for the routing and considers that
number in the calculation of the probability of each route.
As EAR, our protocol has three phases:
• Setup phase: A route request message containing
a cost variable initialized to 0 (Cost = 0) is
broadcasted by the sink. Each node receiving this
message broadcasts it to its neighbors. But before,
it calculates the cost of the communication with the
neighbor who has sent back the message and adds it
to the whole cost of the path to the sink. Thus, if a
node i sends a route request message to its neighbor
j; this last calculates the cost metric Cji using the
following formula:</p>
      <p>Cji= ejαi Rjβ
(1)
Where, eji is the power required for the
communication between nodes i and j, and Rj is the residual
energy of the node j normalized to its initial energy.
The weighting factors α and β can be chosen to
find the minimum energy path or the path with
nodes having the maximum residual energy or the
combination of the above. When Cji is calculated,
the node j adds it to the cost variable sent by i
(costi) to have the cost of the whole path to the sink
through the node i (costji):
costji = costi + Cji
(2)
Once all route request messages are received, the
node j adds each Neighboring node i, if costji
is optimal, to its forwarding table. The identifiers
of all these nodes are broadcasted in an FTM
(Forwarding Table Message) message. Each node
receiving FTM messages, counts the number of
FTM messages containing its identifier. So, each
• Data Communication phase: In this phase, source
nodes and intermediates ones choose randomly a
neighbor to route data using probabilities calculated
earlier.
• Route maintenance: Localized flooding is
performed infrequently from destination to source to
keep all the paths alive.
3.2. BEER
BEER is different from FEAR only in the calculation of
probabilities. So, BEER operates as explained previously,
but, when a node j receives NFTM message with Ni
node i establishes a set of the neighbors j sending
an FTM message containing the identifier i as
following:</p>
      <p>N F = {j|i ∈ F T M (j)}
Once all FTM messages are received by node i,
it calculates the variable N that represents the
cardinality of the set N F :</p>
      <p>N = |N F |
Hence, the node i inserts the variable N in
an NFTM message (Number Forwarding Table
Message) that it sends to its neighbors as response
to FTM messages. To reduce the protocol overhead,
nodes finding N equal to 1 don’t sent the NFTM
message, and the node having a neighbor node in
its forwarding table that have not sent the NFTM
message notes that it is the only one to use it
as relay. Receiving this last message, a node can
calculate probabilities Pji assigned to each node i
of the forwarding table. This probability depends on
the path cost (Costji) and the number of nodes that
use this path (Ni), using the following formula:
Pji = Pk∈F Tj 1/Costjk × Nk</p>
      <sec id="sec-3-1">
        <title>1/Costji × Ni</title>
        <p>Where, F Tj is the forwarding table of node j.
The last step in this phase is the broadcast
of the route request message by node j until
it reaches source nodes. Nevertheless, the route
request message is updated by each node before
broadcast it. The value of the Cost field of the
message is replaced by the average cost of reaching
the destination through the neighbors nodes of
the forwarding table which is calculated with the
formula:
costj =</p>
        <p>
          PjkCostjk
(
          <xref ref-type="bibr" rid="ref3">6</xref>
          )
X
k∈F Tj
(3)
(
          <xref ref-type="bibr" rid="ref1">4</xref>
          )
(
          <xref ref-type="bibr" rid="ref2">5</xref>
          )
variable, it calculates probabilities as follows:
Pji = Pk∈F Tj 1/Costjk × Tk
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>1/Costji × Ti</title>
        <p>
          (
          <xref ref-type="bibr" rid="ref4">7</xref>
          )
With Ti = Ni × nbchemNini IIff NNii =&gt; 11
Where, F Tj is the forwarding table of node j and
nbchemin is the number of routes in the forwarding table
of node j.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. EVALUATION OF FEAR AND BEER</title>
      <p>In this section, we propose a mathematical model and we
analyze and compare FEAR, BEER and EAR through the
latter.</p>
    </sec>
    <sec id="sec-5">
      <title>4.1. Mathematical model</title>
      <p>To simplify the calculation of energy consumption, we
assume that we have a wireless sensor network with the
following properties:
• Our sensor network is composed of M sensor nodes
scattered in a field of interest in flat manner, that
means, all sensor nodes play the same role in the
network.
• There is k source nodes that send the sensed data
in the environment to the sink. The network can be
divided into levels of k nodes each one (the first
level L1 is the one composed of source nodes), and
we assume that the ith node of the jth level (Lj )
noted Nji has i forwarding nodes in the next level
Lj+1 (see Figure 1). This assumption will allow us
to have different values for the variables N and T of
FEAR and BEER and have the maximum possible
cases for our analysis.
• There is one sink to gather the sensed data by sensor
nodes.
• Nodes and sink are not mobile.
• The sensor node is not rechargeable.
• There is no method to get location information of
sensor nodes.
• The network application can be either query driven,
event driven, time driven or the hybridization of the
three.</p>
      <p>Let’s calculate the energy consumed E by a given node
Nji in our network model to route data to the sink. Node
Nji can route data sent by nodes N(j−1)(i), N(j−1)(i+1),
N(j−1)(i+2) , ..., and N(j−1)(k) with respectively the
following probabilities: PN(j−1)(i)Nji , PN(j−1)(i+1)Nji ,
PN(j−1)(i+2)Nji ,..., and PN(j−1)(k)Nji .</p>
      <p>Then, we can calculate the energy consumed by the node
as follows:</p>
      <p>E =</p>
      <p>
        PN(j−1)(i)Nji ∗ (Er + Et) +
PN(j−1)(i+1)Nji ∗ (Er + Et) + ... +
PN(j−1)(k)Nji ∗ (Er + Et)
(
        <xref ref-type="bibr" rid="ref5">8</xref>
        )
Where Er and Et are respectively the energy required for
reception and transmission of data by the node Nji.
In EAR protocol, we calculate E as follows:
E =
(Er + Et) ∗
      </p>
      <p>1</p>
      <p>CostN(j−1)(i)Nji
P
P
+
+ ..
(17)</p>
      <p>+
(18)
+
(19)
Similarly, we assume that the cost of all nodes in the
network is the same and it is equal to C and we find:
E = (Er + Et) ∗
... +</p>
      <p>1
1 C1∗(k−i+1)∗i 1 +
C∗(k)∗(i) + C∗(k−1)∗(i) + ... + C∗(k−i+1)∗(i)</p>
      <p>1</p>
      <p>C∗(k−i+1)∗(i+1)
1 1 1
C∗k∗(i+1) + C∗(k−1)∗(i+1) + ... + C∗(k−i)∗(i+1)
1</p>
      <p>C∗(k−i+1)∗k
1 1 1</p>
      <p>C∗k∗k + C∗(k−1)∗k + ... + C∗(1)
= (Er + Et) ∗








E =






</p>
      <p>1 1
k−i+1 k−i+1
k1 + k −11 + ... + k−1i+1 + k1 + k −11 + ... + k−1i
1
k−i+1
... + k1 + k−1 + ... + k</p>
      <p>1
(Er + Et) ∗ k−1i+1 Pkm=k1−i+1 m 1 1 + ...
1 + Pkm=k−i m
1
+ (Pkm=2 m1 )+k) , for i &lt; k</p>
      <p>1
(Er + Et) ∗ (Pkm=2 m1∗k )+1 , for i = k
(20)</p>
    </sec>
    <sec id="sec-6">
      <title>4.2. Numerical results</title>
      <p>
        As the aim of the three protocols is to consume the energy
of sensor nodes in a fair manner to enhance the network
lifetime, the standard deviation is an interesting metric to
calculate and to present how far node’s energy are spread
out from each other. According to the earlier equations,
we have calculated the energy for k = 1 to k = 10 and for
each value of k the i take values in the interval [1,k].
The Figure 2 shows the variation of standard deviation of
the consumed energy of sensor nodes with different values
of k in each protocol. Results as shown in the graph of
Figure 2 confirm results of the two earlier works ((
        <xref ref-type="bibr" rid="ref12">15</xref>
        )
and (
        <xref ref-type="bibr" rid="ref13">16</xref>
        )). The standard deviation is lower in BEER and
greater in EAR. That means that in BEER the energy
of all nodes in the network are close to the average
energy in contrast to EAR and FEAR where there is a
large difference between the energy of the nodes and the
average energy. These results show that EAR uses some
nodes more than others for routing data from source nodes
to the sink, thing that is avoided in FEAR and even more
in BEER. These results confirm that FEAR and BEER
use forwarding nodes in an equitable manner to balance
energy consumption between sensor nodes and thus avoid
the network partitioning.
      </p>
    </sec>
    <sec id="sec-7">
      <title>5. SIMULATION AND ANALYSIS</title>
      <p>We evaluate and compare EAR, FEAR and BEER
performances by simulation using SENSIM simulator
(sensor simulator framework for OMNeT++) (17)
developed at The Sensor Networking Laboratory at</p>
      <sec id="sec-7-1">
        <title>Parameter</title>
      </sec>
      <sec id="sec-7-2">
        <title>Transmit current</title>
      </sec>
      <sec id="sec-7-3">
        <title>Receive current</title>
      </sec>
      <sec id="sec-7-4">
        <title>Idle current</title>
      </sec>
      <sec id="sec-7-5">
        <title>CPU active current</title>
      </sec>
      <sec id="sec-7-6">
        <title>Radio radius</title>
        <p>sensor.channel radius</p>
        <p>Value
25 mA
8 mA
Louisiana State University, under the topology shown
in Figure 3 in terms of two metrics: network lifetime
and energy variance. As the aim of our protocol is to
consume nodes energy in a fair manner to enhance the
network lifetime, we are interested, obviously, in the
network lifetime and energy variance that can show that
there is no a great difference between the remaining
energy of nodes. The energy variance metric calculates
how far node’s energy are spread out from each other.
The topology is made of 10 sensor nodes (SensorN ode0
to SensorN ode9) of which two nodes are source nodes
(SensorN ode0 and SensorN ode1) and one sink node
(SB).</p>
        <p>In this simulation scenario, we have use a simple MAC
protocol which is defined in the implementation of
EAR in the sensor simulator framework of omnet++,
to avoid influencing the performance with a particular
MAC algorithm. The three routing protocols use the same
energy metrics for path selection. This was the metric
function given in the previous section with α = 1 and
β = 1. Other simulation parameters are given in Table 1.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>5.1. Energy Variance</title>
      <p>To measure the energy variance, we have run the
simulation both with EAR, FEAR and BEER protocols.
Obtained results are shown by the graph of figure 4. The
graph presents the variation of the energy variance over
simulation time.</p>
      <p>The figure shows clearly that the energy variance is
greater in EAR and FEAR, that means that in BEER
the energy of all nodes in the network are close to the
average energy in contrast to EAR and FEAR where the
energy variance is very large thereby demonstrating the
large difference between the energy of the nodes and the
average energy.</p>
    </sec>
    <sec id="sec-9">
      <title>5.2. Network Lifetime</title>
      <p>In the present paper, we consider the network lifetime as
the time till the first node runs out of energy. To measure
the network lifetime, we run simulation eight times with
eight different seeds as presented in Table 2 with FEAR,
BEER and EAR protocols. Obtained results are presented
in the graph of Figure 5. This figure shows that BEER</p>
      <sec id="sec-9-1">
        <title>Configuration Seed Value 1 2</title>
        <p>3
4
5
enhances significantly the network lifetime comparing
with EAR and FEAR.</p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>6. CONCLUSION</title>
      <p>Wireless sensor networks lifetime is a critical property
which should be considered in routing protocols.
However, most of proposed routing protocols in the
literature focused on minimizing the energy consumption
of each sensor node so that the mean of the consumed
energy be reduced and do not balance the energy
consumption in the network so that the network lifetime
be enhanced. The purpose of this paper was to propose a
mathematical model for our routing protocols for sensor
networks (FEAR and BEER) that enhance the EAR
protocol for maximizing the network lifetime. The idea
behind these protocols is simple, but helps to avoid
depleting the energy of some nodes more than others and
thus to maximize the WSN lifetime. We have calculated
the energy consumed by a node in routing task using the
model and results show that BEER outperforms FEAR
and EAR, and FEAR outperforms EAR in term of network
lifetime. Theses results have been confirmed also by
simulation.</p>
      <p>We would like, in future work, improve our approach by
using information that can be given by MAC layer to
network layer. This information will help in reducing the
protocol overhead and in enhancing the network lifetime.</p>
    </sec>
    <sec id="sec-11">
      <title>7. REFERENCES</title>
      <p>[1]Ahvar, E. and Fathy, M. (2010) BEAR: A Balanced
Energy-Aware Routing Protocol for Wireless Sensor
Networks. Wireless Sensor Network journal, 2, 793–800.
[2]Akkaya, K. and Younis, M. (2005) A survey on routing
protocols for wireless sensor networks. Ad Hoc Networks,
3, 325–349.
[17]http://csc.lsu.edu/sensor web/simulator.html.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Al-Karaki</surname>
            ,
            <given-names>J. N.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Kamal</surname>
            ,
            <given-names>A. E.</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>Routing techniques in wireless sensor networks : A survey</article-title>
          .
          <source>IEEE Wireless Communication</source>
          ,
          <volume>11</volume>
          ,
          <fpage>6</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Braginsky</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Estrin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2002</year>
          )
          <article-title>Rumor Routing Algorithm for Sensor Networks</article-title>
          .
          <source>First Workshop on Sensor Networks and Applications (WSNA)</source>
          , Atlanta,
          <string-name>
            <surname>GA</surname>
          </string-name>
          ,
          <year>October 2002</year>
          ,
          <fpage>22</fpage>
          -
          <lpage>31</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          (
          <year>2005</year>
          )
          <article-title>On the Lifetime of Wireless Sensor Networks</article-title>
          .
          <source>IEEE Communications Letters</source>
          ,
          <volume>9</volume>
          ,
          <fpage>976</fpage>
          -
          <lpage>978</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Hedetniemi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Liestman</surname>
            <given-names>A.</given-names>
          </string-name>
          (
          <year>1988</year>
          )
          <article-title>survey of gossiping and broadcasting in communication networks</article-title>
          .
          <source>IEEE Networks</source>
          ,
          <volume>18</volume>
          ,
          <fpage>319</fpage>
          -
          <lpage>349</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Heinzelman</surname>
            ,
            <given-names>W. R.</given-names>
          </string-name>
          <string-name>
            <surname>Kulik</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Balakrishnan</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2002</year>
          )
          <article-title>Negotiation-based protocols for disseminating information in wireless sensor networks</article-title>
          .
          <source>Wireless Networks</source>
          ,
          <volume>8</volume>
          ,
          <fpage>169</fpage>
          -
          <lpage>185</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Intanagonwiwat</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Govindan</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Estrin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2000</year>
          )
          <article-title>Directed diffusion: a scalable and robust communication paradigm for sensor networks</article-title>
          .
          <source>ACM MobiCom '00</source>
          , Boston, MA,
          <year>2000</year>
          ,
          <fpage>56</fpage>
          -
          <lpage>67</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Jiang</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Manivannan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>Routing protocols for sensor networks</article-title>
          .
          <source>the First IEEE Consumer Communications and Networking Conference</source>
          ,
          <year>Juin 2004</year>
          ,
          <fpage>93</fpage>
          -
          <lpage>98</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Leuschner</surname>
            ,
            <given-names>C.J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Hancke</surname>
            ,
            <given-names>G.P.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>SEER: A Simple New Routing Protocol for Wireless Sensor Networks</article-title>
          .
          <source>SA Computer Journal</source>
          ,
          <volume>39</volume>
          ,
          <fpage>17</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Schurgers</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Srivastava</surname>
            ,
            <given-names>M. B.</given-names>
          </string-name>
          (
          <year>2001</year>
          )
          <article-title>Energy efficient routing in wireless sensor networks</article-title>
          .
          <source>Military Communications Conference</source>
          (MILCOM)
          <article-title>on Communications for Network-Centric Operations : Creating the Information Force</article-title>
          , IEEE,
          <fpage>357</fpage>
          -
          <lpage>361</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Shah</surname>
            ,
            <given-names>R. C.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Rabaey</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2002</year>
          )
          <article-title>Energy aware routing for low energy ad hoc sensor networks</article-title>
          .
          <source>IEEE Wireless Communications and Networking Conference (WCNC)</source>
          , pp.
          <fpage>350</fpage>
          -
          <lpage>355</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>M. P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>D. K.</given-names>
          </string-name>
          (
          <year>2010</year>
          )
          <article-title>Routing Protocols in Wireless Sensor Networks -</article-title>
          A
          <string-name>
            <surname>Survey</surname>
          </string-name>
          .
          <source>International Journal of Computer science and engineering Survey (IJCSES)</source>
          ,
          <volume>1</volume>
          ,
          <fpage>63</fpage>
          -
          <lpage>83</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Yessad</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Bouallouche-Medjkoune</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          and
          <string-name>
            <surname>A</surname>
          </string-name>
          ¨ıssani,
          <string-name>
            <surname>D.</surname>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>proposition and evaluation of a novel routing protocol for wireless sensor networks</article-title>
          .
          <source>International Workshop on Verification and Evaluation of Computer and Communication Systems VECoS'11</source>
          ,
          <string-name>
            <surname>Tunis</surname>
          </string-name>
          , Tunisia,
          <fpage>15</fpage>
          -
          <lpage>16</lpage>
          September,
          <year>2011</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . British Computer Society Ed.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Yessad</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Tazarart</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Bakli</surname>
            , L. BoualloucheMedjkoune, L. and
            <given-names>A</given-names>
          </string-name>
          ¨ıssani,
          <string-name>
            <surname>D.</surname>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>Balanced Energy Efficient routing protocol for WSN</article-title>
          .
          <source>International Conference on Communications and information Technology ICCIT'12</source>
          ,
          <string-name>
            <surname>Hammamet</surname>
          </string-name>
          , Tunisia, juin
          <year>2012</year>
          ,
          <fpage>326</fpage>
          -
          <lpage>330</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>