A Review on State of Art Variants of LEACH
Transkript
A Review on State of Art Variants of LEACH
Sensors & Transducers, Vol. 186, Issue 3, March 2015, pp. 25-32 Sensors & Transducers © 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com A Review on State of Art Variants of LEACH Protocol for Wireless Sensor Networks * Yuvaraj P., Vikram K., Venkata Lakshmi Narayana K. School of Electrical Engineering, VIT University, Vellore, Tamilnadu, 632014, India * Tel.: +91 9865324440 * E-mail: [email protected] Received: 4 February 2015 /Accepted: 5 March 2015 /Published: 31 March 2015 Abstract: Recent advances in wireless communication lead to many improvements in application specific wireless sensor network (WSN) deployment. Sensing different data from different environments is essential to monitor and control the situations. For instance, it is very important to sense the forest fire as early as possible to control the upshot. So efficient and timely gathering of the data from a network of small sensor nodes is necessary. In WSN, the small sized sensor nodes are working with very small batteries with limited energy. Since those are randomly deployed over a wide area, replacement of battery or recharging is not feasible. So, for getting prolonged life time of WSN, energy efficient operation is the key factor. Among many protocols proposed for enhancing the life time of WSN, the clustering based hierarchical protocols are popular and gaining the attention of researchers because of their high energy efficiency. Low Energy Adaptive Clustering Hierarchy (LEACH) is energy efficient hierarchical, clustering based protocol. It is considered as the base of many hierarchical clustering protocols. In this paper, some of the recent tailored protocols proposed to strengthen LEACH are examined. Copyright © 2015 IFSA Publishing, S. L. Keywords: LEACH protocol, Energy efficient protocol, Lifetime, Cluster, Wireless sensor networks. 1. Introduction Wireless sensor network (WSN) is a network with many number (from hundreds to several thousands) of small, battery operated sensor modules (generally called as nodes), formulated for a particular application [1-5]. A node comprises of a sensor, central processing unit, memory device, and the antenna. The architecture of the sensor node is shown in Fig. 1. The different sensors are now available for measuring temperature, moisture, vibrations, brightness, and sounds etc. These sensors can sense the data from the environment and communicate to location where the data is required (generally called as Base Station (BS)). That data can be utilized for analysis, monitoring and controlling. The WSNs can http://www.sensorsportal.com/HTML/DIGEST/P_2619.htm be used in a variety of regular life activities. A standard application of WSNs is monitoring. Fig. 1. Wireless sensor node architecture. 25 Sensors & Transducers, Vol. 186, Issue 3, March 2015, pp. 25-32 In interested area of monitoring, the WSN is deployed over a wide region to monitor some event. The sensor nodes are randomly deployed in ad-hoc manner over the interested area using helicopters. The applications include habitat observation [6-7], military application for monitoring enemy territory [8], environment monitoring like earth quake, wild fire monitoring and Tsunami forecasting etc. [9], traffic management and road safety [10], under water surveillance system [11], biomedical signal monitoring [12], and agricultural applications for measuring the condition of soil, etc. [13]. send the data directly to the BS. But the nodes which are far away from the base station need to spend very high energy for transmitting the data since the energy spent for communication is directly proportional to the distance between the sender and the receiver. Therefore, those nodes will drain their complete energy soon, and similar kind of data is obtained in the base station from the nodes which are closely deployed with in a region. 1.1. Energy Efficiency in WSN Many energy efficient protocols are prescribed in the past [14-16]. The battery of a sensor node in WSN is drained in various operations like sending and receiving the signal (data), memory operations, data aggregation, retransmissions due to loss of data. Among all the above aspects, the majority of the power is drained in: 1.1.1. Communicating the Data to Other Nodes and BS 1.2.2. Multi hop Communication From the first order wireless radio model, it is valuable to note the energy needed for sensor node to send one data to other node is given in Equation (1). ETX(k, d)=Eelec×k+Eamp×k×d2, (1) where ETX is the transmitter energy, Eelec is the electronics energy, k is the number of bits of data, Eamp is the amplifier energy and d is the distance between the sender and the receiver node. From Equation (1) it is easily identified that when the distance increases, the total energy dissipated is increased to the square of the distance. 1.1.2. The Multi hop communication is illustrated in Fig. 3. Here, the nodes deployed far away from the base station send the data to the nearest node which is in the path of Base Station. Thus long distance communication is eliminated, but the nodes deployed closer to the base station are in operating condition every time because the data should be routed through them. The duplicate data from the nodes from the same region are obtained from this type of communication. Data Aggregation When more sensor nodes are densely placed in a particular location, the data sensed by several nodes are almost same. In that case, only the consolidated data can be sent to the base station. This is known as data aggregation and considerable amount of energy is drained for this operation. But it is necessary to avoid the duplicate data because we need the state of an area rather than individual numbers. By doing this, we are eliminating unnecessary data transmission to the base station and increasing the life time of the node as well as the network. 1.2. Types of Communication 1.2.1. Direct Communication The Direct communication is illustrated in Fig. 2. In the earlier stage, the sensor nodes are instructed to 26 Fig. 2. Direct communication. Fig. 3. Multi hop Communication. 1.2.3. Clustered Communication The Clustered communication is illustrated in Fig. 4. In Clustered communication, the closer nodes are grouped in to a cluster. One leader (generally called as Cluster Head (CH)) is elected for gathering all the data from that cluster. After gathering all the similar data, the CH aggregates the data and sends the aggregated data to the BS. By doing this, the Sensors & Transducers, Vol. 186, Issue 3, March 2015, pp. 25-32 transmission between very far nodes is avoided and the duplicate data received by the BS is eliminated. Fig. 4. Clustered communication. This paper is further organized as follows. Section 2 describes the LEACH in detail. Section 3 illustrates the energy efficiency of LEACH over conventional methods. Section 4 states various modified versions of LEACH. In Section 5, Table 2 compares all the discussed modified LEACH versions. Section 6 concludes the paper. k : Ci (t ) = 1 N Pi (t ) = N − k × ( r mod ) , k 0 : Ci (t ) = 0 (2) where is Pi(t) the probability of ith node to become CH, k is the desired percentage of nodes to be CHs, N is the total number of nodes in the network, r is the current round. After the CHs are decided, the CH sends an advertisement message to the other nodes that they are elected as CH. Based on the signal strength, the nodes which receive that advertisement message will join the cluster. In the second stage, the Time Division Multiple Access (TDMA) schedule is created for each sensor node to send their data to the corresponding CH. After receiving all the data from the normal sensor nodes, the CH performs the data aggregation in form of Beam forming algorithm or Data Fusion. Finally The CH sends the data to the Base Station. 2. LEACH Protocol When clustered communication was introduced, a fixed cluster and the cluster head is arranged for communication. CH is drained quickly since it is gathering all the data from the sensor nodes and it has to aggregate that data. After aggregating the data it has to send the data to the base station which is far away generally. Hence it is identified that rotation of CH among the nodes is mandatory. So based on the concept of rotating the CH, researchers proposed many clustered communication protocols [17-21]. LEACH [22] is the very popular protocol for WSN, based on rotation of CHs using probabilistic method. It is developed in the year 2002. Still it is used by many researchers as a reference [23]. In LEACH, the sensor nodes can organize themselves based on the received signal strength, in to a cluster which is known as distributed clustering method. Every node has the possibility of becoming the CH at least once to ensure the proper load balancing. The non-cluster nodes use the least energy for joining the cluster. That is the other advantage of LEACH protocol. All non-cluster nodes send the data to the CH. So the distance for which the communication to be done, is reduced. The CH performs the data aggregation locally in the cluster and sends the data to the BS. LEACH consists of two important phases. One is setup phase and the other is communication phase. In setup phase, an optimum percentage of nodes which would be acting as CH are decided. The cluster formation flow chart is shown in Fig. 5. The CH is selected based on the threshold value shown in Equation (2). Fig. 5. Cluster formation process of LEACH. 3. Simulation Results Direct communication, Static clustering communication, and LEACH protocol are simulated using MATLAB and the life times of the networks are compared. In direct communication, all nodes send the data directly to the base station. If distance between the base station and the nodes are much, it needs a large amount power for transmission. In static clustering, all the nodes send the data to the CHs. The CHs send the data to the base station. But here the CH is fixed. 27 Sensors & Transducers, Vol. 186, Issue 3, March 2015, pp. 25-32 So the burden of the CHs is more compared to ordinary nodes. In LEACH the CHs are rotated for every round. Each node becomes CH at least once. For simulation, simple first order radio model is considered. For sending the data, Equation (1) is used and for receiving the data Equation (3) is used. E RX (k , d ) = Eelec × k (3) The simulation parameters are listed in the Table 1 and simulation results are displayed in Fig. 6. Table 1. Simulation parameters. Nodes 100 Base station location (50, 175) Data size 2000 bits Radio Electronics Energy, Eelec 50 nJ/ bit 4.2. Optimized LEACH (O-LEACH) 2 Amplifier energy, Eamp 100 Pj / bit / m Data aggregation Energy, EDA 5 nJ / bit / signal Fig. 6. Network life time of Direct, Static clustering and LEACH when initial energy of each node = 0.5 J. The simulation results show that the clustering communication with rotating CHs is better than the direct communication and static clustering communication. In fact, the energy efficiency of static clustering is worse than the direct communication. 4. LEACH Based State of Art Protocols 4.1. Security Authentication LEACH (SA-LEACH) Yanhong Sun and Ming Tang [24] proposed SA-LEACH; a Security Added LEACH. The authors are claiming that with some modifications, the energy consumption of total network can be reduced and hence the lifetime can be improved. Further, security 28 is added for safe operation within WSN. SA-LEACH is divided in to three stages: 1) Preparations before the network deployment; 2) Cluster formation stage; 3) Stabilization stage. In the First stage, unique random ID is allotted for every sensor node. That Id is valid for that particular round only. By verifying the ID in both the sender and the receiver side, safe transmission is ensured. In the Second stage, when the clusters are formed, the ordinary nodes which are having the security key of nearest CH can only join with that cluster. Some nodes won’t be in the range of the selected CHs. The left out nodes act as Individual cluster and can send the data to base station or they can be set out to sleep. By this way, the energy consumption is reduced to some extent compared to LEACH. The stabilization stage is designed as it is in the LEACH. Salim EL Khediri, et al. [25] introduced O-LEACH with some optimization in CH selection. Instead of selecting the CHs based on the probabilistic rotation, the authors are taking the dynamic residual energy alone for selecting the CHs and concluding that O-LEACH increases the stability of the network and it can be used for dynamic networks. Moreover, it uses the centralized concept of electing the CHs. The BS is responsible for making efficient clusters based on the residual energy. The BS begins the making of clustering process. The CH is elected by considering the energy of the sensor nodes. Nodes which have energy greater than 10 percentage of minimum residual energy are considered for the selection of CHs. If the energy of nodes are lesser than 10 percentage of minimum residual energy, the original LEACH method is followed for selecting the CHs. Thus, by adding this new factor when selecting the CH, O-LEACH is competing with LEACH. 4.3. Energy Efficient LEACH Protocol (EELP) Abdullah Erdal Tumer and Mesut Gunduz [26] introduced a more practical protocol called EELP which is not designed for the ad hoc wireless sensor networks. It is specifically designed for the network of sensor nodes, whose locations are predetermined. The general application of EELP is to identify the hazardous gases in residential or commercial buildings. In EELP, two thresholds are set namely Lower Threshold (LT) value and Higher Threshold (HT) value. If the sensed data is below the LT, it will not be sent to the BS. If the sensed data (dangerous level) is greater than the HT, there is no need to wait for the CH. It can send the sensed data directly to the BS. Another important aspect is EELP uses XOR operation for eliminating the duplicate data sensed by the nearby nodes. Sensors & Transducers, Vol. 186, Issue 3, March 2015, pp. 25-32 4.4. Cognitive LEACH (CogLEACH) 4.7. Improved LEACH Rashad M. Eletreby, et al. [27] developed CogLEACH for cognitive radio sensor networks. The authors are utilizing the potentials of cognitive radios and WSNs to form a new high-speed, distributed, spectrum-aware protocol. CogLEACH uses the sensor nodes as SU (Secondary Unit) and some PU (Primary Units). The sensor nodes are free from congestion bands and can utilize less crowded bands with the capacities of cognitive radios. The threshold is fixed based on the vacant channels mainly. It has very less control overhead, and can support for different PU models. The CH is selected based on availability of more number of idle channels of nodes. It considerably improves the throughput and network life time of WSN. Sandeep Sharma and Sapna Choudhary [30] developed improved LEACH. In this, three types of nodes are used namely normal, intermediate and advanced with different energy levels. Normal nodes are used for getting the data from the area of interest. Intermediate nodes which are having some higher energy level compared to normal nodes are elected as CHs. The advanced nodes are used as the router between CHs and BS. Initially the intermediate nodes are selected as CHs based on the threshold value as in the LEACH protocol. After collecting all the information from the normal nodes which are associated with the particular clusters, these CHs are doing the data aggregation once and send the data to either the adjacent CH or to the advanced nodes. The advanced nodes once again aggregate data collected from various CHs and forward the result to the BS. 4.5. LEACH with Spare Management (LEACH-SM) Bilal Abu Bakr and Leszek T. Lilien [28] introduced the concept of managing spare nodes for the primary CHs. LEACH has two demerits. One is the hotspot problem which is occurred due to additional workload of CHs. The second is redundant data transmissions to CHs. Both the problems are rectified when spare nodes are used. When the primary CH loses its entire energy, the spare node takes the responsibility and thus avoiding the discontinuation in obtaining data. LEACH-SM also elects the appropriate spare nodes and decides how long the spare nodes should be in idle condition. The authors are claiming that using this protocol, life time of LEACH can be extended up to 50 %. 4.6. Air Quality Monitoring LEACH (AQM-LEACH) Henady M. Abdulsalam, et al. [29] developed AQM-LEACH specifically for Monitoring the Air Quality. Unlike LEACH, the nodes do not continuously send the data to the BS at every round. This protocol is an event driven protocol in which the nodes are mostly in sleep mode. When any abnormality occurs in the Air Quality, the nodes tend to send more details to the BS regarding the abnormality. Based on some preset Air Quality Index (AQI), it is decided to send the data to the BS or not. The AQI is a measure of air quality to indicate the level of pollution in the surrounding. It is used for forecasting the level of danger for human health. The value is different for different countries. When any one of the senor nodes senses the event which is abnormal, more data is collected from the nodes. Thus by keeping the nodes idle for most of the time, the life time of the network is increased. 4.8. Energy Based LEACH Mohammad Shurman, et al. [31] introduced two different approaches for enhancing the life time of the network. The first approach uses the transmission radius of nodes, i.e. node coverage for finding the threshold along with probabilistic approach as in LEACH. In Second approach, the residual energy and the distance between the nodes are considered for selecting the CH. In both the approaches, the number of CHs is not defined randomly. It is based on the transmission range of the nodes. 4.9. Optimized LEACH (Op-LEACH) Sapna Gambhir and Nida Fatima [32] introduced Op-LEACH. It is the optimized version of LEACH in which the TDMA slots are utilized wisely. LEACH uses a TDMA based MAC protocol to maintain balanced energy consumption. But it distributes the slots uniformly. Since Op-LEACH is an event driven, after the cluster formation, when the sensor node does not have any data to send, then the TDMA slot is allotted for some other sensor node to send its data. So, latency of the overall network is reduced considerably. By keeping the idle nodes in sleep mode, the overall life time is increased. Op-LEACH reduces the network traffic. 4.10. LEACH with Mobile Sink and Rendezvous Nodes Saeid Mottaghi and Mohammad Reza Zahabi [33] introduced a Mobile Sink (MS) and Rendezvous points (RP) for collecting the information from the WSN effectively with reduced energy consumption. MS can traverse between the nodes either randomly or in the preset MS trajectory. When MS is travelling in a fixed trajectory, the Rendezvous Nodes (RN) is 29 Sensors & Transducers, Vol. 186, Issue 3, March 2015, pp. 25-32 helpful in getting the data from the sensor nodes. Cluster formation is done as in LEACH protocol, and the CHs send the aggregated data to the RN. The RN nodes send it to MS when MS is travelling through the Trajectory and passing via RNs. 4.11. Multi-Level LEACH Ravi Kishore Kodali and Naveen Kumar Aravapalli [34] introduce the different layer level concept for collecting the information from the sensor network. In Level 1, every node is considered as leaf nodes with equal energy. The first round is setup same as that of LEACH Protocol. In consecutive rounds, the CHs maintain a list of its members. Level 2 CHs are elected based on the residual energy and distance between nodes. Now the Level 2 CHs also maintain the Level 1 CH members. Level 2 CHs collect the aggregated data from the Level 1 CHs and store it. Similarly Level 3, Level 4, Level 5 and Level 6 are created and thus provide the multi-hop mode of communication between the nodes and the base station. Thus Multi-level LEACH cleverly utilizes the concept of multi hop inter cluster connectivity and improves the life time of the network. 4.12. Percentage LEACH (PR-LEACH) Mahmoud M. Salim, et al. [35] introduced PR-LEACH; an event driven, multi-hop interclustering protocol. Initially CHs are selected randomly as in LEACH and data transmission is taken place. After first round, each node sends the residual energy to the corresponding CH. After receiving data from the nodes, CH sends the data to adjacent CHs with their residual energies. The same operation is done in every cluster. BS calculates the Network Energy Range (NER) based on a predefined threshold value. If residual energy of the node is less than the threshold value, then that node is considered as ordinary node, and if it is maximum of all the nodes in the cluster, that node is elected as CH for further round. Since it is an event driven protocol, the data transmission occurs between the nodes randomly in every round. 5. Comparison of LEACH Based Protocols Table 2 compares all the discussed modified LEACH versions. Table 2. Comparison of LEACH based protocols. LEACH Inter Cluster Connectivity Single hop LEACH-C Single hop LEACH-F Single hop SA-LEACH O-LEACH EELP Single Hop Single Hop Single Hop Parameters Clustering Cluster Cluster Head Selection Method Count Distributed Variable Random Energy and Centralized Fixed simulated annealing algorithm based Energy and centralized Fixed simulated annealing algorithm based Distributed Variable Random Distributed Variable Energy based Centralized Fixed Purely energy based CogLEACH Single Hop Distributed Variable Random LEACH-SM Single Hop Distributed Variable Random 9. AQM-LEACH 10. Improved LEACH 11. Enhanced LEACH 12. Multi-level LEACH 13. Op-LEACH 14. LEACH with mobile sink and rendezvous nodes 15. PR – LEACH Single hop Distributed Variable Random Multi Hop Distributed Variable Energy based Single hop Distributed Variable Energy & distance based Multi Hop Distributed Variable Energy Based Scalability Single hop Distributed Variable Random Multi Hop Distributed Variable Energy Based Single Hop Distributed Variable Energy Based Event Driven Mobile Sink Rendezvous nodes Event Driven S. No. 1. 2. Protocol Name 3. 4. 5. 6. 7. 8. 30 Value added with LEACH Centralization Fixed Cluster Security Stability Spectrum awareness Cognitive Radios Energy Efficiency Event driven Multi hop communication Reduced number of clusters Sensors & Transducers, Vol. 186, Issue 3, March 2015, pp. 25-32 6. Conclusions Energy efficiency of WSNs is a vital point to be discussed because of their wide application. The LEACH protocol is considered to be a basis for all hierarchical protocols proposed in the literature. It has many merits like load balancing, energy efficiency and self-organization. But it has some demerits like poor scalability for very large network areas and it is not considering the residual energy of individual sensor nodes. Hence, to overcome the demerits many researchers are being still proposing the modified versions of LEACH protocol. In this article, we have reviewed some of the state of art LEACH based protocols. It has been found that there is a scope of improvement in energy efficient hierarchical clustering algorithms for real time applications. References [1]. Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, Wireless sensor network survey, Computer Networks, Elsevier Publications, Vol. 52, Issue 12, 2008, pp. 2292-2330. [2]. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Computer Networks, Vol. 38, Issue 4, 2002, pp. 393-422. [3]. Feng Zhao, Leonidas Guibas, Wireless Sensor Networks – An Information Processing Approach, Morgan Kaufmann Publishers, 2004. [4]. C. Siva Ram Murthy, B. S. Manoj, Ad Hoc Wireless Sensor Networks – Architectures and Protocols, Pearson Education, 2006. [5]. Holger Karl, Andreas Willig, Protocols and Architectures for Wireless Sensor Networks, Wiley – India Edition, 2005. [6]. E. S. Nadimi, R. N. Jorgensen, V. Blanes-Vidal, S. Christensen, Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks, Computer and Electronics in Agriculture, Vol. 82, 2012, pp. 44-54. [7]. Joseph Polastre, Robert Szewczyk, Alan Mainwaring, David Culler, John Anderson, Analysis of Wireless Sensor Networks for Habitat Monitoring, Wireless sensor Networks, 2004, pp. 399-423. [8]. Sang Hyuk Lee, Soobin Lee, Heecheol Song, Hwang Soo Lee, Wireless sensor network design for tactical military applications: Remote large-scale environments, in Proceedings of the Conference on IEEE Military Communications Conference (MILCOM’09), Boston, MA, 18-21 October 2009, pp. 1-7. [9]. Yuan Guo, McNair J., Fault Tolerant Three Dimensional Environment Monitoring using Wireless Sensor Networks, in Proceedings of the Conference on IEEE Military Communications (MILCOM’06), Washington, DC, 23-25 October 2006, pp. 1-7. [10]. A. Pascale, M. Nicoli, F. Deflorio, B. Dalla Chiara, U. Spagnolini, Wireless sensor networks for traffic management and road safety, IET Intelligent [11]. [12]. [13]. [14]. [15]. [16]. [17]. [18]. [19]. [20]. [21]. [22]. [23]. [24]. Transportation Systems, Vol. 6, Issue 1, 2012, pp. 67-77. Ian F. Akyildiz, Dario Pompili, Tommaso Melodia, Underwater acoustic sensor networks: research challenges, Ad Hoc Networks, Vol. 3, 2005, pp. 257-279. V. Naveen Kumar, K. Venkata Lakshmi Narayana, Implementation issues of body area sensor networks for ubiquitous long-term biomedical signal monitoring and conditioning, in Proceedings of the IEEE International Conference on Green Computing, Communication and Conversation of Energy (ICGCE’13), Chennai, 12-14 December 2013, pp. 934-937. Aqeel-Ur-Rehman, Abu Zafar Abbasi, Noman Islam, Zubair Ahmed Shaikh, A review of wireless sensors and networks' applications in agriculture, Computer Standards & Interfaces, Vol. 36, Issue 2, 2014, pp. 263-270. V. Naveen Kumar, K. Siva Sankar, L. Srinivasa Rao, I. Santiprabha, Comparative analysis of QoS-aware routing protocols for wireless sensor networks, Journal of Innovative Systems Design and Engineering, IISTE, Vol. 3, Issue 4, 2012, pp. 1-5. Nikolaos A. Pantazis, Stefanos A. Nikolidakis, Dimitrios D. Vergados, Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, Vol. 15, Issue 2, 2013, pp. 531-591. V. Naveen Kumar, I. Santiprabha, Comparative analysis of energy-efficient cluster-based QoS-aware routing protocols for wireless sensor networks, Sensors & Transducers, Vol. 142, Issue 7, July 2012, pp. 23-32. Ameer Ahmed Abbasi, Mohamed Younis, A survey on clustering algorithms for wireless sensor networks, Computer Communications, Vol. 30, 2007, pp. 2826-2841. M. Mehdi Afsar, Mohammad-H. Tayarani-N, Clustering in sensor networks: A literature survey, Journal of Network and Computer Applications, Vol. 46, 2014, pp. 198-226. W. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient routing protocols for wireless microsensor networks, in Proceedings of 33rd Annual Hawaii International Conference on System Sciences (HICSS’00), 4-7 January 2000, pp. 1-10. Pratyay Kuila, Prasanta K. Jana, Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach, Engineering Applications of Artificial Intelligence, Vol. 33, 2014, pp. 127-140. Md Azharuddin, Pratyay Kuila, Prasanta K. Jana, Energy efficient fault tolerant clustering and routing algorithms for wireless sensor networks, Computers & Electrical Engineering, 2014, pp. 1-14. Wendi B. Heinzelman, Anantha P. Chandrakasan, Hari Balakrishnan, An Application-Specific Protocol Architecture for Wireless Microsensor Networks, IEEE Transactions on Wireless Communications, Vol. 1, Issue 4, 2002, pp. 660-670. Triana Mugia Rahayu, Sang-Gon Lee, Sang-Gon Lee, Survey on LEACH-based Security Protocols, in Proceedings of IEEE International Conference on Advanced Communication Technology (ICACT’14), Pyeongchang, 16-19 February 2014, pp. 304-309. Yanhong Sun, Ming Tang, An Enhanced Protocol for LEACH Based Wireless Sensor Networks, in Proceedings of the IEEE International Symposium on 31 Sensors & Transducers, Vol. 186, Issue 3, March 2015, pp. 25-32 [25]. [26]. [27]. [28]. [29]. [30]. Computer, Consumer and Control (IS3C’14), Taichung, 10-12 June 2014, pp. 344-347. Salim El Khediri, Nejah Nasri, Anne Wei, Abdennaceur Kachouri, A New Approach for Clustering in Wireless Sensors Networks Based on LEACH, Procedia Computer Science, Vol. 32, pp. 1180-1185. Abdullah Erdal Tumer, Mesut Gunduz, An improved leach protocol for indoor wireless sensor networks, in Proceedings of IEEE International Conference on Signal Processing and Integrated Networks (SPIN’14), Noida, 20-21 February 2014, pp. 432-437. Rashad M. Eletreby, Hany M. Elsayed, Mohamed M. Khairy, CogLEACH: A Spectrum Aware Clustering Protocol for Cognitive Radio Sensor Networks, in Proceedings of the 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM’14), Oulu, 2-4 June 2014, pp. 179-184. Bilal Abu Bakr, Leszek T. Lilien, Comparison by Simulation of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM, Procedia Computer Science, Vol. 34, 2014, pp. 180-187. Hanady M. Abdulsalam, Bader A. Ali, Anwar Al Yatama, Eman S. Al Roumi, Deploying a LEACH Data Aggregation Technique for Air Quality Monitoring in Wireless Sensor Network, Procedia Computer Science, Vol. 34, 2014, pp. 499-504. Sandeep Sharma, Sapna Choudhary, Heterogeneous Multi-hop LEACH routing protocol, in Proceedings of the IEEE International Conference on Green [31]. [32]. [33]. [34]. [35]. Computing Communication and Electrical Engineering (ICGCCEE’14), Coimbatore, 6-8 March 2014, pp. 1-6. Mohammad Shurman, Noor Awad, Mamoun F. AlMistarihi, Khalid A. Darabkh, LEACH Enhancements for Wireless Sensor Networks Based on Energy Model, in Proceedings of the IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD’14), Barcelona, 11-14 February 2014, pp. 1-4. Sapna Gambhir, Nida Fatima, Op-LEACH: An Optimized LEACH Method for busty traffic in WSNs, in Proceedings of the IEEE Fourth International Conference on Advanced Computing & Communication Technologies (ACCT’14), Rohtak, 8-9 February 2014, pp. 222-229. Saeid Mottaghi, Mohammad Reza Zahabi, Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes, International Journal of Electronics and Communications (AEU), Vol. 69, Issue 2, 2015, pp. 1-8. Ravi Kishore Kodali, Naveen Kumar Aravapalli, Multi-level LEACH Protocol model using NS-3, in Proceedings of the IEEE International Advance Computing Conference (IACC’14), Gurgaon, 21-22 February 2014, pp. 375-380. Mahmoud M. Salim, Hussein A. Elsayed, Salwa H. El Ramly, PR-LEACH: Approach for Balancing Energy Dissipation of LEACH Protocol for Wireless Sensor Networks, in Proceedings of the IEEE 31st National Radio Science Conference (NRSC’14), Cairo, 28-30 April 2014, pp. 252-259. ___________________ 2015 Copyright ©, International Frequency Sensor Association (IFSA) Publishing, S. L. All rights reserved. (http://www.sensorsportal.com) 32
Benzer belgeler
Forest Fire Detection with Wireless Sensor Networks
measuring temperature, moisture, vibrations,
brightness, and sounds etc. These sensors can sense
the data from the environment and communicate to
location where the data is required (generally call...