You are on page 1of 6

IET Wireless Sensor Systems

Research Article

Energy-efficient modified LEACH protocol for ISSN 2043-6386


Received on 23rd August 2017
Revised 13th April 2018
IoT application Accepted on 19th May 2018
doi: 10.1049/iet-wss.2017.0099
www.ietdl.org

Trupti Mayee Behera1 , Umesh Chandra Samal1, Sushanta Kumar Mohapatra1


1School of Electronics Engineering, KIIT University, Bhubaneswar, Odisha, India
E-mail: truptifet@kiit.ac.in

Abstract: Wireless sensor networks (WSNs) have a wide range of applications in various fields. One of the most recent
emerging applications are in the world of Internet of Things (IoT), which allows inter-connection of different objects or devices
through the Internet. However, limited battery power is the major concern of WSNs as compared to mobile ad-hoc network,
which affects the longevity of the network. Hence, a lot of research has been focused on to minimise the energy consumption of
the WSNs. Designing of a hierarchical clustering algorithm is one of the numerous approaches to minimise the energy of the
WSNs. In this study, the existing low-energy adaptive clustering hierarchy (LEACH) clustering protocol is modified by introducing
a threshold limit for cluster head selection with simultaneously switching the power level between the nodes. The proposed
modified LEACH protocol outperforms as compared to the existing LEACH protocol with 67% rise in throughput and extending
the number of alive nodes to 1750 rounds which can be used to enhance the WSN lifetime. When compared with other energy
efficient protocols, it is found that the proposed algorithm performs better in terms of stability period and network lifetime in
different scenarios of area, energy and node density.

1 Introduction manner that the energy consumed in the total path can be
minimised.
Connecting anything that can be monitored or controlled from the The remaining of this paper is as follows. Section 2 reviews the
internet is called Internet of Things (IoT). Wireless is the most related work about low-energy adaptive clustering hierarchy
preferred medium to achieve this wide range of connectivity. (LEACH) and other successors of LEACH protocol. Section 3
Wireless sensor networks (WSN) can be described as the collection presents our system model. Section 4 describes our proposed
of enormous sensor nodes deployed over a large area to sense and scheme in details. Section 5 represents the simulation results and
accumulate various data from the environment and systems for discussion and finally, the conclusion is presented in Section 6.
different applications such as weather monitoring, animal tracking,
disaster management, bio-medical applications and also in the field
of IoT [1, 2]. Wireless sensors can be useful for the IoT 2 Related work
applications in order to gather and process data while extracting the Apart from being a fundamental and diverse protocol, LEACH also
useful information and communicating it to the end user, in some has some limitations. The selection of cluster head (CH) is done
cases which is out of reach for human beings. Hence WSN can be randomly, hence a node with higher energy and a low energy has
considered to be one of the integral parts of the IoT applications the same probability of becoming a CH. If a node with low energy
[3]. The Micro-Electro-Mechanical System sensor technology has is selected as CH, it will die quickly affecting the robustness of the
been very helpful in developing smart sensors for IoT application network. Also, the position and number of CHs vary in each round
that uses tiny smart sensor nodes with limited power and [8]. The clusters which are far from the base station (BS) consume
computation resources [4]. WSN acts as a virtual layer and has more energy and die out fast as compared to the nearby cluster.
become an intrinsic part of IoT in a secure manner. However, to do This also reduces the network lifetime. Hence these lacunae in the
so, it has to overcome various challenges such as security, protocol open door for many modifications based on the
integration issues, energy optimisation, network lifetime and so on. requirement and applications of the network.
The IoT [5] in a broad sense is like a brain that can both store In a WSN, the researcher mainly focuses on two important
the real-world data (in cloud services or databases) and can also be aspects which include reduction of energy consumption and
used to monitor the real world parameters, make meaningful prolonging the network lifetime. Considering LEACH protocol [9]
interpretation and even make decisions based on the sensed data. as a fundamental algorithm, many modifications have been done
Thus, we can say IoT is responsible for the data processing, based different applications. A detailed survey of LEACH and its
manipulation and decision making. WSN [6] is like the eyes and successors are shown in [10] considering four important
ears of the IoT. It is the bridge that connects the real world to the parameters such as clustering method, data aggregation, mobility
digital world. Moreover, it is also responsible for passing on the type and scalability. The LEACH protocol randomly selects CHs
sensed real-world values to the Internet. and no information about the residual energy of the network is
Extraction of useful information from a huge amount of data known to the BS. In order to address this problem, LEACH-C [11,
requires high processing and computation to be executed at the 12] protocol was proposed. LEACH-C is a centralised LEACH
sensor nodes, which are battery driven devices with limited power. protocol where all the decision powers are given to the BS. Each
Hence WSN has some limitations in terms of power, computational node is equipped with a GPS to send its position and residual
capability and so on, which need to be optimised [7]. On the other energy information to the BS for each round. The main limitation
hand, IoT connects a vast number of devices which collects of this protocol is the use of GPS which drains the enormous
metadata for processing. This again will lead to excess use of amount of energy as well as is not cost-effective. In LEACH-
available power and will simultaneously affect the network Deterministic Cluster-Head Selection [13] and Improved-LEACH
lifetime. In order to maximise the network lifetime in WSN, the [14], the authors proposed a new threshold by modifying the
paths for routing the data packets must be selected in such a primitive threshold formula. A coverage-preserving CH selection
algorithm (CPCHSA) for the LEACH protocol is proposed in [15],

IET Wirel. Sens. Syst. 1


© The Institution of Engineering and Technology 2018
introduced a new clustering technique to balance the load in the
network by dividing it into virtual circles. The cluster size depends
on the distance from the BS and is different from each other. When
compared with LEACH protocol, they found that network lifetime
can be increased to almost 73%. V-LEACH is proposed in [27] as a
modification to LEACH that elects a vice-CH after the election of
CH. In some cases, when the CH dies out, the vice-CH takes
charge of CH for data collection and compression. Simulation
result shows that V-LEACH outperforms LEACH. Another
approach to enhance network lifetime was suggested in [28] that
demonstrates a load balanced clustering method. The CHs are
Fig. 1  System model of WSN elected by considering the residual energy that leads to an equitable
CH distribution within the network.
According to the LEACH protocol, a new CH is elected in each
iteration or round which requires the formation of new clusters
regularly [29]. This may lead to excessive utilisation of energy due
to routing overhead, which may not be acceptable for any IoT
devices [30]. In case, a CH has not utilised a good amount of
energy in the previous round and there is a fair probability that a
node with a low energy may become CH in the next selection
process. Hence an efficient CH replacement method has been
employed in order to avoid utilisation of extra energy in cluster
formation and transmission of advertisement message to cluster
members.
As per the author's knowledge, a unique CH replacement
Fig. 2  Phases of LEACH protocol
method with an optimum switching of power levels has not been
reported in the previous works. In this paper, we enhance the
to maximise the network sensing coverage. One of the limitations
fundamental LEACH algorithm with hard and soft threshold
of these protocols is that the number of CHs chosen is not certain
strategies for effective CH selection. In addition to this, we also
in each round. In LEACH-H [16], the CHs are selected through an
modify the algorithm in such a way that when a node is selected as
iterative process and are constant in each round and aims to
CH, high power amplification level is assigned to the node.
enhance the network lifetime. The protocol cannot be implemented
However, in the next round, if it again becomes a member node, a
in large-scale networks and also suffers from large overhead. In
low energy level is assigned. Again, this helps to maintain uniform
[17], the authors have extended the CH selection algorithm by
energy throughout the network.
modifying the probability of sensor node to become CH based on
the remaining energy of the network.
In the primitive LEACH protocol, the selection of CH is not 3 System model
done considering the energy of an individual node, that leads to the LEACH [9] is a time division multiple access (TDMA)-based
death of some CHs even before the completion of the current MAC protocol that uses clustering mechanism to evenly distribute
round. This adversely affects the network lifetime. In order to the supply energy among sensors within the network. The sensor
address this problem, Sasikala et al. [18] have proposed V-LEACH nodes are responsible for the processing of the aggregated data and
that has three types of nodes in the network named as member transmit the useful information to the BS through CH. The CH is
node, CH, and vice-CH. The vice-CH acts perform the function of the specially selected sensor node of each cluster, which is only
CH when the original CH dies. In [19], the selection of vice-CH is allowed to communicate with the BS. The end user is then able to
made by considering three factors, i.e. minimum distance, receive the data through the core network/Internet as shown in
minimum energy and maximum residual energy. The authors were Fig. 1.
able to increase the network lifetime by 49.3% in V-LEACH as LEACH protocol operates in several rounds, where each round
compared to LEACH protocol. The limitation of the protocol is the consists of two broad phases, i.e. the setup phase and the steady-
increase in overhead and scalability due to two CHs in a cluster. state phase as shown in Fig. 2.
Also, no solution has been reported about the network performance In the initial set-up phase, the clusters are formed and the CH
in case the vice-CH also dies [20]. node is selected. Each node of a particular cluster can participate in
The hierarchical protocol is also combined with flat-based the CH selection process by generating a random priority value
routing protocol as in Sec-LEACH [21]. It is a security-based between 0 and 1 [8]. If this number for a member node is less than
protocol combines the benefits of LEACH and SPIN protocols a threshold value T(n) then that node becomes the CH. The value
enhances the security of the network but increases the overall of the threshold T(n) is given by (1). The CH is also responsible for
network energy consumption. In a similar manner, in [22], the assigning TDMA schedule for the corresponding cluster members
authors have modified LEACH with the characteristics of
quadrant-based directional routing (Q-DIR) protocol to enhance 1
network lifetime and stability of the network but ended up ∀n ∈ G
1
increasing the control overhead. Kandpal and Singh [23] have T(n) = 1 − p r mod p (1)
proposed IL-LEACH, where the correlated data is transmitted
through a group of nodes into the virtual correlated cluster and 0 otherwise
allowing only one node to send data.
The LEACH protocol has also been modified in recent years where p is the desired percentage of sensor nodes that can become
aiming to reduce power consumption at different levels. In [24], the CH, r denotes the current round and G is the set of nodes that have
authors have chosen a deterministic approach for CH selection not participated in CH selection process in the previous 1/ p
rather than a stochastic one which resulted in increasing the rounds. Since a node which is elected as CH for a particular round
lifetime by 30%. Focusing on the defects in the LEACH protocol, r is not allowed to participate for the next 1/ p rounds, hence every
the authors in [25] have proposed LEACH-B, a balanced routing sensor node in a cluster gets fair and equal chance to become CH.
protocol that controls the fluctuations in the number of CHs and Hence the energy dissipation among the sensor nodes is distributed
prolongs the network lifetime. After the selection of CH in the first uniformly in a network.
round, the second set of CHs is selected considering the residual During the steady-state phase, the cluster member nodes
energy to modify the count of CHs in the set-up phase resulting in transmit the sensed data to the respective CH nodes based on
an optimal number of CHs per round. In [26], the authors have TDMA schedule. Any node can transmit the data during a

2 IET Wirel. Sens. Syst.


© The Institution of Engineering and Technology 2018
The efficiency is given by

Ndata × Edata
η= × 100 (6)
Epacket

For large value of Ndata, the efficiency will be almost equal to


100%. To calculate a threshold limit for CH selection, the energy
dissipated by a CH in each round has to be calculated. In our
proposed scheme, we estimate this threshold value of energy in
order to preserve energy and increase network lifetime.

Fig. 3  Phases of LEACH protocol 4 Proposed scheme


LEACH protocol works with a random selection of CH in each
round. For every round, the clusters are formed according to the
advertisement message sent by the CH. For example, we deployed
200 nodes in an area of 100 m × 100 m. Fig. 4a shows the initial
CH and cluster formation. In the next round as shown in Fig. 4b,
the CHs change and new clusters are formed. However, in case a
CH has not used much of its energy during its term and it can still
remain CH for the next round on the basis of remaining energy, but
according to the LEACH algorithm once a CH is selected it cannot
become CH for the next 1/P rounds. This limitation can be
overcome by setting a threshold value in the existing LEACH
protocol, now called as IoT-LEACH (I-LEACH). If the CH is
found to have more energy than the threshold value, then it remains
as CH for the next round also. In this way, the energy wastage
Fig. 4  LEACH Protocol
during routing information to the new CH in each round can be
(a) Round 1, (b) Round 2
controlled. The extra energy consumed for a new cluster formation
due to new CH can also be controlled.
particular time slot, the other nodes go to the sleep state. In this
Moreover, in a cluster-based network, there are three modes of
way, the intra-cluster collision can be avoided [31]. The main
data transmission [35] namely intra-cluster, inter-cluster and long-
objective of LEACH protocol is to increase the energy efficiency
haul communication. The intra-cluster transmission occurs when
by adopting rotation-based CH selection procedure using a random
the cluster members send data to the respective CH on the basis of
number.
a TDMA schedule. The inter-cluster transmission deals with the
We use the first-order radio energy model for communication in
exchange of data between CHs and in the long-haul transmission,
our modified protocol [32] as shown in Fig. 3.
the CHs transmit its fused data to the BS. The energy requirement
Based on the distance between the sensing and the receiving
in all these three modes of transmission cannot be same. A low
nodes, the first-order radio model can be divided into the free-
power level is required for intra-cluster transmission with respect
space model and multi-path fading model [33]. The communication
to long-haul transmission in order to save an enormous amount of
channel is assumed to be symmetrical and the energy consumed by
energy as well as a packet drop ratio. In the proposed scheme,
a sensor node in sending k bits/packet to a node d meters away can
when a node is elected as CH, the algorithm directs it to use a high
be written as [34]
energy amplification level. During the subsequent rounds when it
changes to a cluster member, the algorithm switches it to low
ETx(k, d) = ETx_elec(k) + ETx_amp(k, d) (2) power level. The algorithm of the proposed LEACH modification
is shown in Fig. 5.
Eelec ∗ k + Efs ∗ k ∗ d 2, d ≤ d0 For example, let A, B, C, D, E and F be the CHs of five
ETx(k, d) = (3)
4
Eelec ∗ k + Eamp ∗ k ∗ d , d > d0 different clusters in a network with the initial energy EInit as shown
in Fig. 6a. After completion of the first round, all the nodes
Similarly, the energy consumed by a sensor node in receiving k dissipate energy depending upon various criteria such as distance,
bits/packet can be written as signal strength and data packet size. Let E and F are two CHs
which has not expended much of its energy and has sufficient
ERx(k) = ERx_elec(k) + kEelec (4) power to be elected as CH for the next round. According to the
conventional LEACH algorithm, all the CHs A, B, C, D, E and F
where Eelec is the energy consumed per bit by the transmitter or the are not eligible for selection of CH in the next round. However, in
the proposed algorithm (Fig. 6b), a threshold limit PTh is set and
receiver and Eamp and Efs are the amplifier parameters of
any node (e.g. E and F here) that has an energy level above it can
transmission corresponding to the multi-path fading model and the
continue to be CH with the same cluster for the next round. As a
free-space model, respectively. Each packet contains data bits
result, the energy utilised in CH and cluster formation decreases to
along with overhead. The data bits carry useful information and the
a considerable amount.
overhead has information related to packets, such as coding
Let us consider there are ‘n’ nodes in a network with C
scheme for reliable data transmission, encryption technique used
percentage of clusters and R is the count of CH replacement. PkTx
for security and address of the source and the destination. The size
of the overhead is fixed irrespective of the packet size. So for large and PkRx are the transmitted and received packet sizes, respectively.
packet size, the spectrum and energy used by the overhead may be Let N = nC denotes the number of nodes in each cluster.
negligible and alleviate the WSN spectral and energy efficiency. During cluster formation stage, some energy will be utilised in
Moreover, the throughput is also increased. the CH replacement process. Let this energy be denoted by PHR,
If Ndata represents the number of data bits in a packet and such that
Noverhead represents the number of overhead bits with Edata and
Eoverhead be the energy associated with each data bits and overhead PHR = PkTx ⋅ PTx + PkRx ⋅ PRx(nC − 1) R ⋅ N (7)
bits, respectively. Then total energy of the packets is given by
where PTx = Energy transmitted in the transmission of 1 byte data.
EPacket = Ndata × Edata + Noverhead × Eoverhead (5) PRx = Energy transmitted in the reception of 1 byte data.

IET Wirel. Sens. Syst. 3


© The Institution of Engineering and Technology 2018
Table 1 Simulation parameters
Symbol Description Value
Xm distance at X-axis 400 m
Ym distance at X-axis 400 m
N total number of sensor nodes 100 nodes
PTx, PRx total energy of the network 0.5 J
Emp energy dissipation: receiving 0.0013/pJ/bit/m4
Efs energy dissipation: free space model 10/pJ/bit/m2
Eamp energy dissipation: power amplifier 100/pJ/bit/m2
EDA energy dissipation: aggregation 5/nJ/bit
d0 reference distance 87 m
l packet size 4000 bits

The amount of energy consumed in transmitting data from member


node to CH is nPTx. The member node then switches off the radio
and goes to sleep mode until the next round TDMA slot. The CH
removes redundancy by performing data aggregation at this stage.
The energy consumed in the process is given as n(N − 1)PRx. The
CH then sends the fused data to sink node expending n(N − 1)PTx
energy.
For the calculation of the threshold value for the decision of CH
Fig. 5  I-LEACH algorithm replacement, we also have to get the information about the number
of rounds to active as member node within a cluster [24]. CountRnd
represents the number of rounds of operation in the network which
can be calculated by

PHR
CountRnd = × 100 (11)
PWEC

From (10) and (11), we can estimate a minimum level of energy


which can be considered optimum for CH replacement method
Fig. 6  After one round
(a) Conventional method, (b) Proposed method PTh = CountRnd(PkTx + PkRx)PTx (12)

Equation (12) represents a threshold value of power which can be


applied to the LEACH algorithm to improve the network lifetime
while also minimising the total energy of the network.

5 Simulation results and discussion


A sensor network is considered where 100 nodes are deployed
randomly as shown in Fig. 7. The sink is located at the centre with
unlimited energy. The normal sensor nodes have limited energy.
The proposed scheme is implemented to generate simulation
results by considering the parameters as listed in Table 1.
Simulation is conducted using MATLAB for 2000 rounds of
iterations to obtain different plots. In this paper, the packet size is
Fig. 7  Node deployment
considered to be 4000, which is sufficiently large. So the energy
associated with the overhead is less as compared to the total packet
Then the total energy of each cluster PWEC will be the product
energy and can be neglected. Hence throughout the simulation, the
of the initial power given to each node and the total nodes in a comparison is done for different existing energy-efficient protocols
cluster which can be written as with the proposed I-LEACH protocol by neglecting the energy
associated with the overheads for each packet.
PWEC = EInit × nC (8) Simulation results clearly show that I-LEACH outperforms
LEACH protocol under different metrics such as residual energy,
where EInit is the initial energy supplied to each node. To calculate throughput, network lifetime and CH count.
the total energy granted in each cluster unit, we need to know the When LEACH protocol is modified with the threshold power
energy consumed by each cluster ‘i’ per round. This can be level for CH replacement criteria, we can find that the number of
evaluated by calculating the energy cost both when it acts as CH CHs also extends up to 1750 rounds for I-LEACH as compared to
and as member node. Therefore only 850 rounds in LEACH which is due to the efficient CH
replacement method from Fig. 8. In a similar manner, simulation
PHR(i) = (Ni − 1)PkTxPTx ∗ PkRxPRx results in Fig. 9a show that after only 500 rounds the average
(9) energy of LEACH protocol comes to 0, wherein I-LEACH, it
+ (Ni − 1)PkRxPRx + (Ni − 1)PkTxPTx
continues till ∼1250 rounds. This has been possible since energy
Hence we can write has been saved in unnecessary cluster formation and CH selection
process where the existing CH still has sufficient energy to
PHR(i) = n(5Ni − 3)PTx continue as CH for the next round.
(10)
The efficiency of any routing protocol depends on the number
of data packets communicated to BS. The more is the throughput,

4 IET Wirel. Sens. Syst.


© The Institution of Engineering and Technology 2018
Fig. 8  Cluster count Fig. 10  Packets Communicated
(a) LEACH, (b) I-LEACH (a) to BS, (b) to CH

Fig. 9  Network Performance Fig. 11  Lifetime Metrics


(a) Average residual energy, (b) Throughput (a) Dead nodes, (b) Alive nodes

Table 2 Lifetime metrics under different scenarios


Nodes Energy Area LEACH I-LEACH Other protocols
FND LND FND LND FND LND
100 0.5 100 980 1450 1050 1700 600 [15] 1500 [15]
200 780 1150 850 1450 200 [29] 1300 [29]
400 100 800 98 1700 — —
400 0.5 100 1000 1500 1100 1700 820 [28] 950 [28]
200 850 1300 900 1700 190 [29] 1500 [29]
400 100 1200 100 1600 — —
1000 1 100 2000 2700 2000 2700 — —
200 1700 2600 1700 2650 810 [28] 1050 [28]
400 300 2500 300 2700 — —

the better is the algorithm. Fig. 9b clearly shows that in I-LEACH, with same area and energy, the lifetime is increased to 1.2 and 1.8
the throughput is much higher than that of the LEACH protocol. times as that of LEACH and EECS, respectively. When the area is
The improvement in throughput is caused by limiting the number doubled to 100 nodes, the lifetime is 1.26 and 1.1 times of LEACH
of data transmission along with an efficient CH replacement and ModLeach, respectively. For 400 nodes, the lifetime is 1.3 and
scheme that preserves energy globally with dual power level for 1.13 times for LEACH and ModLeach. With the initial energy of 1 
different modes of transmission. The number of data packets sent J for 1000 nodes, the performance of LEACH and I-LEACH is
to BS in LEACH is limited to 0.5 × 104, whereas in I-LEACH, the almost same but when compared to EECS, the lifetime increases to
number rises up to 1.75 × 104 as indicated in Fig. 10a. The same 2.5 times. When I-LEACH is compared with LEACH for a large
rise in the number of data packets sent to CH can be seen in area of 400 m2, it is seen that the stability period increases by 2.2,
Fig. 10b that proves the efficiency of the proposed protocol. 1.3 and 1.08 times for 100, 400 and 1000 nodes, respectively.
With the increase in the number of rounds, the sensor node Hence we can conclude that the proposed protocol shows better
depletes its energy and dies eventually. Figs. 11a and b depict the performance for both small and large areas with scarcely as well as
network lifetime by representing the number of alive and dead densely populated networks.
nodes, respectively. After completion of approximately only 750 From the above analysis, it is clear that when a threshold value
rounds, the number of active nodes goes completely to 0 for is set in the set-up phase for CH replacement and cluster formation
LEACH, whereas with I-LEACH, some nodes are still alive till mechanism of LEACH protocol, we are able to increase different
1500 rounds. This gives a complete scenario for maximising the attributes of a wireless sensor network that is well suited for IoT
network lifetime, which is fairly due to the assignment of different devices.
power levels for different modes of communication within the
network. 6 Conclusion
To study the behaviour of the algorithm for diverse application,
the lifetime metrics in terms of first node dead (FND) and last node Since its existence in the world of WSN, LEACH protocol still
dead (LND) are compared as shown in Table 2. Simulations are gains attention among researchers which itself proves the
carried out by considering three different areas (100, 200 and 400  importance of the protocol. Different descendants of LEACH have
m2) with a network containing scarcely to densely populated sensor also been focused on various applications. In this paper, we
modified the protocol based on efficient CH selection with
nodes. With the initial energy of 0.5 J on a scarcely populated area
simultaneous switching of different power levels. Through
of 100 m2, the network lifetime is increased to 1.2 as that compared
simulation results, we found that this modified protocol
to LEACH and CPCHSA. When the number of nodes is increased

IET Wirel. Sens. Syst. 5


© The Institution of Engineering and Technology 2018
outperforms the LEACH algorithm and can be adopted in sensor [18] Sasikala, A.S.D., Sangameswaran, N., Aravindh, P., et al.: ‘Improving the
energy efficiency of LEACH protocol using VCH in wireless sensor
networks used for IoT applications which require extra power to network’, Int. J. Eng. Dev. Res., 2015, 3, (2), pp. 918–924
process huge data. The protocol also succeeds in enhancing [19] Ahlawat, A., Malik, V.: ‘An extended vice-cluster selection approach to
network lifetime by reducing energy consumption in a distributed improve v leach protocol in WSN’. 2013 Third Int. Conf. on Advanced
manner. When compared with other energy-efficient protocols, it Computing and Communication Technologies (ACCT), Rohtak, India, 2013,
pp. 236–240
was found that the proposed protocol will be best suited for the [20] Sindhwani, N., Vaid, R.: ‘V LEACH: an energy efficient communication
diverse applications changing area, energy and number of nodes. protocol for WSN’, Mechanica Confab, 2013, 2, (2), pp. 79–84
The work can be extended for heterogeneous routing protocols to [21] Oliveira, L.B., Wong, H.C., Bern, M., et al.: ‘SecLEACH – a random key
find various results. distribution solution for securing clustered sensor networks’. Fifth IEEE Int.
Symp. on Network Computing and Applications, 2006, NCA 2006,
Cambridge, MA, USA, 2006, pp. 145–154
7 References [22] Gnanambigai, J., Rengarajan, N., Anbukkarasi, K.: ‘Q-LEACH: an energy
efficient cluster based routing protocol for wireless sensor networks’. 2013
[1] Yick, J., Mukherjee, B., Ghosal, D.: ‘Wireless sensor network survey’, 7th Int. Conf. on Intelligent Systems and Control (ISCO), Coimbatore, India,
Comput. Netw., 2008, 52, (12), pp. 2292–2330 2013, pp. 359–362
[2] Kim, D.S., Chung, Y.J.: ‘Self-organization routing protocol supporting mobile [23] Kandpal, R., Singh, R.: ‘Improving lifetime of wireless sensor networks by
nodes for wireless sensor network’. First Int. Multi-Symp. on Computer and mitigating correlated data using LEACH protocol’. 2016 1st India Int. Conf.
Computational Sciences, IMSCCS ‘06, Hanzhou, Zhejiang, China, 2006, vol. on Information Processing (IICIP), Delhi, India, 2016, pp. 1–6
2, pp. 622–626 [24] Handy, M., Haase, M., Timmermann, D.: ‘Low energy adaptive clustering
[3] Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., et al.: ‘Wireless sensor hierarchy with deterministic cluster-head selection’. 4th Int. Workshop on
networks: a survey’, Comput. Netw., 2002, 38, (4), pp. 393–422 Mobile and Wireless Communications Network, Stockholm, Sweden, 2002,
[4] Kumar, V., Jain, S., Tiwari, S., et al.: ‘Energy efficient clustering algorithms pp. 368–372
in wireless sensor networks: a survey’, Int. J. Comput. Sci. Issues, 2011, 8, [25] Tong, M., Tang, M.: ‘LEACH-b: an improved leach protocol for wireless
(5), pp. 814–1694 sensor network’. 2010 6th Int. Conf. on Wireless Communications
[5] Zorzi, M., Gluhak, A., Lange, S., et al.: ‘From today's intranet of things to a Networking and Mobile Computing (WiCOM), Chengdu, China, 2010, pp. 1–
future internet of things: a wireless-and mobility-related view’, IEEE Wirel. 4
Commun., 2010, 17, (6), pp. 44–51 [26] Siavoshi, S., Kavian, Y.S., Sharif, H.: ‘Load-balanced energy efficient
[6] Gubbi, J., Buyya, R., Marusic, S., et al.: ‘Internet of things (IoT): a vision, clustering protocol for wireless sensor networks’, IET Wirel. Sens Syst., 2016,
architectural elements, and future directions’, Future Gener. Comput. Syst., 6, (3), pp. 67–73
2013, 29, (7), pp. 1645–1660 [27] Yassein, M.B., Khamayseh, Y., Mardini, W., et al.: ‘Improvement on leach
[7] Padmavathi, D.G., Shanmugapriya, M., et al.: ‘A survey of attacks, security protocol of wireless sensor network VLEACH’, Int. J. Digit. Content Technol.
mechanisms and challenges in wireless sensor networks’, arXiv preprint Appl., 2009, 3, (2), pp. 132–136
arXiv:09090576, 2009 [28] Ye, M., Li, C., Chen, G., et al.: ‘Eecs: an energy efficient clustering scheme in
[8] Singh, S.K., Kumar, P., Singh, J.P.: ‘A survey on successors of LEACH wireless sensor networks’. 24th IEEE Int. Performance, Computing, and
protocol’, IEEE Access, 2017, 5, pp. 4298–4328 Communications Conf. (IPCCC), Phoenix, AZ, USA, 2005, pp. 535–540
[9] Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: ‘Energy-efficient [29] Mahmood, D., Javaid, N., Mahmood, S., et al.: ‘ModLEACH: a variant of
communication protocol for wireless microsensor networks’. Proc. of the 33rd leach for WSNs’. 2013 Eighth Int. Conf. on Broadband and Wireless
Annual Hawaii Int. Conf. on System Sciences, Maui, HI, USA, 2000, vol. 2, Computing, Communication and Applications, Compiegne, France, 2013, pp.
p. 10 158–163
[10] Mahapatra, R.P., Yadav, R.K.: ‘Descendant of LEACH based routing [30] Abidoye, A.P., Obagbuwa, I.C.: ‘Models for integrating wireless sensor
protocols in wireless sensor networks’, Procedia Comput. Sci., 2015, 57, pp. networks into the Internet of things’, IET Wirel. Sens. Syst., 2017, 7, (3), pp.
1005–1014 65–72
[11] Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: ‘An application- [31] Rasheed, M.B., Javaid, N., Khan, Z.A., et al.: ‘E-HORM: An energy-efficient
specific protocol architecture for wireless microsensor networks’, IEEE hole removing mechanism in wireless sensor networks’. 2013 26th Annual
Trans. Wirel. Commun., 2002, 1, (4), pp. 660–670 IEEE Canadian Conf. on Electrical and Computer Engineering (CCECE),
[12] Muruganathan, S.D., Ma, D.C.F., Bhasin, R.I., et al.: ‘A centralized energy- Regina, SK, Canada, 2013, pp. 1–4
efficient routing protocol for wireless sensor networks’, IEEE Commun. Mag., [32] Li, J., Mohapatra, P.: ‘An analytical model for the energy hole problem in
2005, 43, (3), pp. S8–13 many-to-one sensor networks’. IEEE Vehicular Technology Conf., Dallas,
[13] Yadav, L., Sunitha, C.: ‘Low energy adaptive clustering hierarchy in wireless TX, USA, 1999, 2005, vol. 62, p. 2721
sensor network (LEACH)’, Int. J. Comput. Sci. Inf. Technol., 2014, 5, (3), pp. [33] Elbhiri, B., Saadane, R., Aboutajdine, D., et al.: ‘Developed distributed
4661–4664 energy-efficient clustering (DDEEC) for heterogeneous wireless sensor
[14] Wu, W., Xiong, N., Wu, C.: ‘Improved clustering algorithm based on energy networks’. 2010 5th Int. Symp. on I/V Communications and Mobile Network
consumption in wireless sensor networks’, IET Netw., 2017, 6, (3), pp. 47–53 (ISVC), Rabat, Morocco, 2010, pp. 1–4
[15] Tsai, Y.R.: ‘Coverage-preserving routing protocols for randomly distributed [34] Perera, C., Zaslavsky, A., Christen, P., et al.: ‘Sensing as a service model for
wireless sensor networks’, IEEE Trans. Wirel. Commun., 2007, 6, (4), pp. smart cities supported by internet of things’, Trans. Emerg. Telecommun.
1240–1245 Technol., 2014, 25, (1), pp. 81–93
[16] Wang, W., Wang, Q., Luo, W., et al.: ‘Leach-h: an improved routing protocol [35] Abbasi, A.A., Younis, M.: ‘A survey on clustering algorithms for wireless
for collaborative sensing networks’. Int. Conf. on Wireless Communications sensor networks’, Comput. Commun., 2007, 30, (14), pp. 2826–2841
& Signal Processing, WCSP, Nanjing, China, 2009, pp. 1–5
[17] Thein, M.C.M., Thein, T.: ‘An energy efficient cluster-head selection for
wireless sensor networks’. 2010 Int. Conf. on Intelligent Systems, Modelling
and Simulation (ISMS), Liverpool, UK, 2010, pp. 287–291

6 IET Wirel. Sens. Syst.


© The Institution of Engineering and Technology 2018

You might also like