You are on page 1of 50

CHAPTER 1: INTRODUCTION

OPTIMIZING EFFICIENCY AND PERFORMANCE IN


WIRELESS SENSOR NETWORKS

A Thesis Submitted
For the Fulfilment of the Requirements
For the Degree of

MASTER OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

BY
SUMIT BHATT
(Roll No. 210000705007)

Under The Supervision of

MR. SANJAY KUMAR


H.O.D.

FACULTY OF TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
VEER MADHO SINGH BHANDARI
UTTRAKHAND TECHNICAL UNIVERSITY, DEHRADUN
2024

i
CHAPTER 1: INTRODUCTION

DECLARATION

I hereby affirm that the thesis entitled “Optimizing Energy Efficiency and Performance in

Wireless Sensor Networks ” submitted for the award of Master of technology, Computer

Science and Engineering, from Veer Madho Singh Bhandari uttrakhand Technical

University, Dehradun embodies result of Genuine work, and learning done by me and the

content of the thesis does not form the base for the award of any other degree to me or to anyone

else from this or any other University/Institution.

SUMIT BHATT

M.Tech(CSE)
Roll No. 210000705007

Faculty of Technology

Veer Madho Singh Bhandari

Uttarakhand Technical University

Dehradun

ii
CHAPTER 1: INTRODUCTION

CERTIFICATE

This is to certify that Sumit Bhatt (210000705007) has carried out the research work presented in

this given thesis entitled "Optimizing Energy Efficiency and Performance in Wireless Sensor

Networks" for the award of Master of Technology in Computer Science and Engineering

from Veer Madho Singh Bhandari Uttarakhand Technical University, Dehradun under my

supervision. The thesis represents the results of genuine efforts and learning done by the scholar,

and the work of this thesis will not be used as grounds for the award of any other degree to me or

to any other person from Uttarakhand Technical University or any other University/Institute.

Place: MR. SANJAY KUMAR


Date: Department of Computer Science &Engineering
Faculty of technology
Veer Madho Singh Bhandari
Uttrakhand Technical University,
Dehradun-248007

iii
CHAPTER 1: INTRODUCTION

ACKNOWLEDGEMENT

I express my heartly gratitude to Mr Sanjay Kumar, Department of Computer Science and


Engineering, Faculty of Technology, Veer Madhav Singh Bhandari Uttarakhand Technical
University, Dehradun, under whose guidance I have performed my duties during this phase of
developing my thesis. He provided the necessary inputs without which I would not have
considered me self successful in executing the extended responsibility given to me. I also
want to present my heartly thank to all faculties for facility and support. They all inspired me
during the process.
Through their guidance and supportive attitude, I completed my task in the best possible way.
He was generous to share her knowledge and express for the accomplishment of the series.

Sumit Bhatt
MTech(CSE)
Roll No:- 210000705007
Faculty of Technology
Veer Madho Singh Bhandari
Uttarakhand Technical University
Dehradun

iv
CHAPTER 1: INTRODUCTION

ABSTRACT

Wireless Sensor Network (WSN) has been widely used for monitoring and control

applications in our daily lives due to its promising features; such as low cost, low power, and

ease of implementation. The choice of energy efficient routing protocol is a vital task in the

network layer of wireless sensor networks to improve their lifetime. A performance analysis

of energy consumption referring to opportunistic routing algorithms is presented in this

paper. The particularly analysis is evaluated in terms of energy consumption, number of

candidate groups, flow rate, number of packets lost, and lifetime. Based on the simulation

results, we observe that opportunistic routing protocol perform better characteristic than

traditional protocol (TR). Furthermore, our findings disclose that opportunistic routing

algorithm yields in a significant improvement of power consumption.

In wireless sensor networks, protocols play a major and important role. These protocols vary

depending on the application and network architecture. It has specifically designed data

centric, location based and hierarchical protocols where special attention is taken to energy

awareness. The main objective of this research is to discuss the routing protocol and its

comparison. These are the basic protocols for data centric, location based and hierarchical.

In my research I will be comparing basic routing protocols and finding the most efficient

routing protocols among them. These protocols were originally proposed for wired networks.

But later wireless sensor networks were proposed to increase the efficiency of sensor nodes

and lifespan. These protocols also reduce network overhead and traffic.

v
CHAPTER 1: INTRODUCTION

TABLE OF CONTENTS

Declaration……………………………………………………………………………… ii

Certificate……………………………………………………………………………… iii

Acknowledgements…………………………………………………………………… iv

Abstract………………………………………………….…………………………… v

Table of Content……………………………….…………………………………… vi-vii

List of Figures……………………………………….……………………………… viii

List of Symbols and Abbreviations…………………………………………………


ix

CHAPTER-1: INTRODUCTION……………………………………………… 2

1.1 Wireless Sensor Network (WSN)……………………………………………… 2


1.2 Types of WSNs (Wireless Sensor Networks)………………………………….. 3
1.3 Wireless Sensor Networks Applications……………………………………… 4
1.4. Challenges and Limitations in WSNs……………………………………….. 5
1.5. Architectural Overview of WSNs…………………………………………… 6
1.6 Importance of Routing Protocols in WSNs………………………………… 6
1.7. Objectives and Scope of the Study ………………………………………… 6
1.8 . Components of WSN:……………………………………………..………… 7
1.9. Sink Node…………………………………………………………………… 7
1.9.1 Data Collection Approaches in Wireless Sensor Networks with Mobile Sink Nodes. 8
1.10 Sensor Node ……………………………………………………………… 9

CHAPTER-2: LITERATURE SURVEY…………………………………… 12

2.1 Directed Diffusion (DD):…………………………………………………… 12


2.2. LEACH (Low-Energy Adaptive Clustering Hierarchy):…………………… 15
2.3. SEP (Stable Election Protocol)……………………………………………… 15
2.4. HEED (Hybrid Energy-Efficient Distributed Clustering)…………………… 15
2.5.TEEN ………………………………………………………………………… 16
2.6.PEGASIS…………………………………………………………………… 16

vi
CHAPTER 1: INTRODUCTION

2.7. SPIN ……………………………………………………………………… 16


2.8. Geographic Adaptive Fidelity (GAF):………………………………………… 16
2.9Wireless Sensor Network Topologies:………………………………………… 16

CHAPTER-3 : METHODOLOGY………………………………………..…… 33

3.1.Field Characteristics and Coordinates: ……………………………………… 33


3.2.Node Quantity and Election Probability:…………………………………… 33
3.3.Energy Modeling: • Initial Energy (Eo)…………………………………… 33
3.4.Network Heterogeneity: Percentage of Advanced Nodes ………………… 33

CHAPTER-4: PROPOSED WORK……………………………………….… 37

4.1.Development of Criteria for Optimizing Routing Protocols:……………… 37


4.2.Suggestions for Protocol Enhancements Based on Comparative Analysis:…… 37
4.3.Proposing New Algorithms or Modifications to Existing Protocols:………… 38

CHAPTER-5: IMPLEMENTATION AND RESULT ANALYSIS………… 41

CHAPTER-6: CONCLUSION AND FUTURE SCOPE…………………… 54


6.1 Key Contribution of leach………………………………………………… 54
6.2 Future scope……………………………………………………………… 55

REFERENCES……………………………………………………………… 58

vii
CHAPTER 1: INTRODUCTION

LIST OF FIGURES
Figure No. Title Page No.

Figure 1.1Wireless Sensor Network............................................................................... 2

Figure 1.2 Wireless Sensor Networks Applications....................................................... 5

Figure 1.3 Basic structure of wsn………………………………………………… 6

Figure 1.3Sink Node..................................................................................................... 8

Figure 1.4Sensor Node............................................................................................. 9

Figure 1.5 Bus Topology.................................................................................. 18

Figure 1.6 Tree Topology................................................................................. 19

Figure 1.7 Star Topology.................................................................................. 22

Figure 1.8 Ring Topology................................................................................... 18

Figure 1.9 Mesh Topology................................................................................... 26

Figure 1.10 Circular Topology............................................................................... 28

Figure 1.11 Grid Topology................................................................................... 31

Figure 3.1 energy leach protocol............................................................................ 35

Figure 5.1 leach performance before…………..................................................... 51

Figure5.2 leach performance after….………………………………………… 51

viii
CHAPTER 1: INTRODUCTION

LIST OF SYMBOLS AND ABBREVIATIONS

Abbreviation Explanation

WSN Wireless Sensor Network

Sync Synchronization

LEACH Low Energy adaptive Clustering

Fig Figure

MODLEACH Modify LEACH

CH Cluster Head

BS Base Station

AZR-LEACH Advanced Zonally Rectangular LECH

LEACH-C Centralized LEACH

SEP Stable Electron Protocol

TSC Track Sector Clustering

PEGASIS Power Efficient Gathering in Sensor Information Systems

HEED Hybrid Energy Efficient Distributed Clustering

E-SEP Enhanced Stable Electron Protocol

MATLAB Matrix Laboratory

CHEF Cluster Head Electron Mechanism Using Fuzzy

HWSN Hierarchical Wireless Sensor Network

ix
CHAPTER 1: INTRODUCTION

CHAPTER 1

INTRODUCTION

1
CHAPTER 1: INTRODUCTION

CHAPTER 1

INTRODUCTION

1.1 Wireless Sensor Network (WSN):

Introduction to Wireless Sensor Networks (WSNs): Wireless Sensor Networks (WSNs)


signify a noteworthy progression in the realm of remote sensing and monitoring.
Essentially, WSNs are comprised of spatially dispersed independent sensors that
collaboratively oversee environmental and physical conditions, encompassing factors like
temperature, sound, vibration, pressure, motion, or pollutants. The development of these
networks has been remarkable in recent decades, driven by advancements in micro-
electronics, wireless communication, and digital electronics. A typical WSN includes key
components such as sensor nodes, a gateway, and a user interface. Each sensor node
serves as a compact device equipped with sensing, processing, and communication
capabilities.

Figure1.1: Wireless Sensor Network

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 2


CHAPTER 1: INTRODUCTION

1.2 Types of WSNs (Wireless Sensor Networks)


Wireless Sensor Networks (WSNs) encompass various types tailored to specific
environments such as terrestrial, underground, underwater, multimedia, and mobile settings.

a) Terrestrial WSNs: These networks efficiently link with base stations and comprise
numerous wireless sensor nodes. Deployment methods vary, ranging from random
distribution to deliberate placement strategies like optimal positioning or grid-based
arrangements. Energy conservation techniques, including low duty cycle operations and solar
cell utilization as secondary power sources, are employed due to limited battery power.

b) Underground WSNs: Underground WSNs, in contrast to terrestrial ones, are more


expensive due to deployment and maintenance costs. They involve concealing sensor nodes
in the ground to monitor subterranean conditions, with additional sink nodes positioned
above ground for data transmission. Challenges include limited battery capacity and wireless
communication difficulties due to signal attenuation.

c) Underwater WSNs: Covering over 70% of the Earth's surface, these networks deploy
sensor nodes and vehicles in aquatic environments. Autonomous underwater vehicles aid in
data collection, yet challenges such as propagation delays and limited bandwidth persist.
Energy conservation is crucial in this context, necessitating advancements in underwater
communication techniques.

d) Multimedia WSNs: Proposed to enable event tracking using multimedia forms like
images, videos, and audio, these networks feature cost-effective sensor nodes equipped with
microphones and cameras. However, challenges such as high energy consumption and
intricate data processing techniques hinder their efficiency.

e) Mobile WSNs: These networks comprise sensor nodes capable of autonomous movement
and interaction with the physical environment, offering versatility and advantages like
improved coverage and energy efficiency compared to static networks.

Each type of WSN serves distinct purposes and faces its own set of challenges, yet they
collectively contribute to various applications including military operations such as
command, control, surveillance, and reconnaissance.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 3


CHAPTER 1: INTRODUCTION

1.3 Applications of Wireless Sensor Networks:


a) Military Applications: WSNs serve as integral components in military command, control,
communications, intelligence, surveillance, and reconnaissance (C3ISR). Leveraging sensor
technology, WSNs detect and respond to enemy intrusions, enhancing situational awareness
and bolstering security measures.

b) Area Monitoring: Deployed sensor nodes monitor specific regions for events such as
heat, pressure, or motion. When an event is detected, base stations take relevant actions. For
instance, oil refineries in places like Hoima benefit from this monitoring.

c) Transportation:

WSNs play a crucial role in real-time traffic systems.Sensors collect data, which is then used
by transportation models (such as traffic lights) to alert drivers about congestion and traffic
issues.This technology is also aiding research on self-driving cars.

a) Health Applications: Wireless Sensor Networks (WSNs) are seamlessly integrated into
wearable devices like smartwatches to cater to a variety of health-related needs. These
applications encompass interfaces designed for individuals with disabilities, continuous
patient monitoring, diagnostics, precise drug administration within hospital settings, tele-
monitoring of physiological data, and real-time tracking of doctors or patients within hospital
premises.
b) Environmental Sensing: Dedicated Environmental Sensor Networks serve a broad
spectrum of applications relevant to earth science research. These networks are instrumental
in monitoring various environmental phenomena such as volcanoes, oceans, glaciers, and
forests. Specific areas of focus within this domain include air pollution monitoring, forest fire
detection, greenhouse gas monitoring, and landslide detection.
c) Structural Monitoring: Wireless Sensor Networks are also employed for structural
monitoring purposes to ensure the safety and stability of various structures. They enable the
detection and response to changes in structural conditions, thereby enhancing maintenance
efforts and safety protocols.
d) Other application:Wireless Sensor Networks (WSNs) find utility in a plethora of other
applications, including rapid emergency response, industrial process monitoring, automated
building climate control, ecosystem and habitat monitoring, and civil structural health

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 4


CHAPTER 1: INTRODUCTION

monitoring. These diverse uses demonstrate the versatility and effectiveness of WSNs across
various domains.

Figure1.2 Wireless Sensor Networks Applications

1.4. Challenges and Limitations in WSNs


One of the primary challenges in WSNs is energy management. Most sensor nodes are
battery-operated and are often deployed in inaccessible areas, making battery replacement
impractical. Thus, energy-efficient design in both hardware and software is crucial. Network
management, particularly in large-scale deployments, is another critical challenge, involving
aspects like data aggregation, node synchronization, and network configuration. Security is a
paramount concern, especially in applications involving sensitive data. Environmental factors
such as temperature variations, water exposure, and physical obstacles also impact the
performance and durability of sensor networks.

1.5. Architectural Overview of WSNs


The structure of Wireless Sensor Networks (WSNs) primarily depends on the particular
application and the deployment environment. A standard architecture comprises sensor nodes
responsible for gathering data from the surroundings. These nodes communicate wirelessly,
frequently using a multi-hop approach, to a central gateway or base station. Subsequently, the
base station links the sensor network to an established communication network, such as the

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 5


CHAPTER 1: INTRODUCTION

Internet, facilitating data access for end-users.. The choice of network topology (star, mesh,
or tree) impacts the network's performance and is selected based on application requirements.

FIG 1.3 Basic architecture in an Wsn

1.6 Importance of Routing Protocols in WSNs


Routing protocols play a crucial role in Wireless Sensor Networks (WSNs) as they dictate the
manner in which information is distributed across the network. An optimal routing protocol
for a WSN should prioritize energy efficiency, guarantee dependable data transfer, and
exhibit scalability to adapt to network alterations. Multiple routing protocols have been
created, each possessing distinct advantages and limitations. Comprehending these protocols
and evaluating their appropriateness for various WSN types is fundamental for the efficient
planning and mplementation of these networks.

1.7. Objectives and Scope of the Study


The aim of this research is to provide a comprehensive understanding of Wireless Sensor
Networks (WSNs), covering their types, applications, challenges, and architectural
considerations. This study intends to investigate the potential applications of WSNs across
various fields and examine the challenges associated with their deployment and operation.
The scope encompasses a detailed examination of different WSN types, their applications,
and technological advancements that can enhance their performance and versatility.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 6


CHAPTER 1: INTRODUCTION

1.8 . Components of WSN:


a)Sensors:
Sensors within WSNs capture environmental variables to facilitate data acquisition.
They convert sensor signals into electrical signals.
b)Radio Nodes:
Radio nodes receive data from sensors and transmit it to the WLAN access point.
These nodes typically include a microcontroller, transceiver, external memory, and power
source.
c)WLAN Access Point:
The WLAN access point wirelessly receives data transmitted by radio nodes.
It acts as a gateway to the internet for further data processing.
d)Evaluation Software:
Data received by the WLAN access point undergoes processing using evaluation software.
This software generates reports for users and enables additional data analysis, storage, and
mining.

1.9. Sink Node


Certainly! In the mobile sync node architecture, wireless sensors move across the mobile
sync sensing area of the network to collect data from sensor nodes. These mobile sync nodes
can also act as sensor nodes themselves. Additionally, some systems incorporate data
collectors installed within the sensing area for efficient data retrieval

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 7


CHAPTER 1: INTRODUCTION

Figure1.1.4: Sink Node

1.9.1 Data Collection Approaches in Wireless Sensor Networks


with Mobile Sink Nodes:
1 Discovery:

OThis approach is mobility-independent and relies on a knowledge base. oIt focuses on


identifying relevant data sources without considering the mobility of the sink node.

2. Data Transfer:

OIn this joint approach, both discovery and data transfer are considered together.

 It aims to efficiently transfer data from sensor nodes to the mobile sink.

3.Routing:

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 8


CHAPTER 1: INTRODUCTION

ORouting approaches can be either flat or proxy-based.

OFlat routing treats all nodes equally, while proxy-based routing involves specialized nodes
(proxies) that assist in data forwarding.

4 Motion Control and Trajectory:

OThe trajectory of the mobile sink can be static, dynamic, or a combination of both

OSpeed and movement patterns impact data collection efficiency.

1.10 Sensor Node


A sensor node is a device with the ability to gather environmental sensor data, process the
collected information, and establish communication with other nodes. These nodes transmit
the acquired data to a central point for synchronization. In essence, they function as central
hubs or access points for the purpose of collecting and sharing information.

Figure1.1.5: Sensor Node

a) RELATED WORK

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 9


CHAPTER 1: INTRODUCTION

Researchers have extensively studied wireless sensor networks (WSNs) with diverse
objectives, all centered around the critical goal of enhancing WSNs for better, secure, and
efficient use across various domains.
1. Security Focus: One research paper delves into WSN security, highlighting the
vulnerability of wireless networks due to their broadcast nature. Additionally, WSNs
face heightened susceptibility because nodes are often deployed in aggressive or
hazardous environments where safety cannot be guaranteed.
2. Operational Overview: Another journal provides a comprehensive understanding of
WSNs, emphasizing spectrum sensing as a fundamental aspect. It further explores the
challenges associated with the cognitive cycle, particularly the task of detecting
spectrum usage and identifying potential primary users.
3. QoS Provision: In a distinct investigation, the author assesses the provision of
Quality of Service (QoS) in Wireless Sensor Networks (WSNs). In contrast to
conventional end-to-end multimedia applications, QoS requirements for mission-
critical WSN applications introduce new considerations. The distinct characteristics of
WSNs, featuring resource-constrained sensors and innovative communication
protocols, pose unprecedented challenges in achieving effective QoS.
4. QoS Provision in WSNs:The author initiates the exploration by scrutinizing methods
for Quality of Service (QoS) provision in traditional networks. Subsequently, they
scrutinize the emerging QoS requisites specific to Wireless Sensor Networks (WSNs),
taking into account a varied array of applications categorized by data delivery models.
Additionally, the author suggests collective QoS parameters that are not solely end-to-
end. Challenges associated with QoS provision in this pioneering paradigm are also
deliberated upon, alongside an investigation of ongoing research endeavors and
identification of unexplored research areas to stimulate further inquiry in this
relatively untapped domain
5. Protocol Stack for WSNs: In an alternate publication, the author explores the
protocol stack designed for wireless sensor networks. Recent progress in wireless
communication and electronics has enabled the creation of economical sensor
networks. These networks are applied across diverse domains, including health,
military, and home environments.. Each application area presents unique technical
challenges that researchers are actively addressing. The article provides insights into
the current state of sensor networks, discussing solutions within the context of

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 10


CHAPTER 1: INTRODUCTION

relevant protocol stack layers. Additionally, it highlights open research issues, aiming
to inspire new interests and advancements in this field
Wireless Sensor Networks (WSNs) play a pivotal role in supporting systems in e-health.
The integration of large-scale wireless telecommunication technologies such as 3G, Wi-Fi
Mesh, and WiMAX with telemedicine has garnered attention in the research community.
However, further advancements hinge on the seamless coexistence of small-scale
personal area technologies like radio frequency identification (RFID), Bluetooth, ZigBee,
and WSNs alongside robust large-scale wireless networks, enabling the development of
context-aware applications.
The realization of pervasive healthcare relies on leveraging existing mature wireless
network technologies while also developing unobtrusive small sensor devices.
Researchers from various fields collaborate to achieve the ambitious vision of smart
healthcare, ensuring accurate information and dependable data delivery. At the heart of
this integration is the application layer, serving as the conduit between caregivers,
caretakers, sensor devices, and the entire system ecosystem. Context-aware healthcare
applications are crucial for delivering high-quality healthcare services and will play an
increasingly vital role.
6 Remote Monitoring: Remote monitoring is a primary advantage of pervasive
healthcare systems, enabling real-time monitoring of patients during their daily lives. This
capability allows healthcare professionals to promptly identify emergency conditions in
at-risk individuals. Additionally, individuals with varying degrees of cognitive and
physical disabilities gain greater independence.
7 Child and Baby Care: WSNs enhance child and baby care by providing a more secure
environment even when parents are away. These systems alleviate the dependence on
specialized caregivers.
1. Prototypes and Commercial Products: Both prototypes and commercially available
products contribute to the advancement of WSN-based healthcare solutions.
2. Shared charactersticks: Numerous current applications exhibit similar attributes.
Typically, patients utilize one or more sensor types, establishing a Body Area
Network (BAN). Concurrently, environmental sensors form a Personal Area Network
(PAN). These networks link to a central network through a gateway node.
8 Real time monitoring : Healthcare providers and caregivers have immediate access to
essential health data through graphical user interfaces (GUIs). The application generates

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 11


CHAPTER 1: INTRODUCTION

alerts for emergency situations, and this crucial information is accessible through mobile
devices like laptops, Personal Digital Assistants (PDAs), and smartphones.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 12


CHAPTER 1: INTRODUCTION

CHAPTER 2

LITERATURE REVIEW

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 13


CHAPTER 2: LITERATURE REVIEW

CHAPTER 2
LITRATURE REVIEW

Rabiner, W.Kulik, J.Balakrishnan et.al(1999)"Adaptive Protocols for Information


Dissemination in Wireless Sensor Networks" by explores adaptive strategies for
optimizing information dissemination in wireless sensor networks (WSNs). Focusing
on adaptability to dynamic conditions, the authors propose protocols that
dynamically adjust to factors like node mobility, signal strength, and energy
constraints. The paper evaluates these protocols, highlighting their efficiency,
scalability, and reliability in comparison to existing approaches. The significance of
adaptive protocols in overcoming WSN challenges is emphasized, providing valuable
insights for future research and advancements in this field.

S. Lindsey and C.S. Raghavendra et.al.(2002)The paper "PEGASIS: Power-efficient


Gathering in Sensor Information System" by , presented at the IEEE Aerospace
Conference in March , introduces PEGASIS, a power-efficient data gathering protocol
for wireless sensor networks (WSNs). The literature review emphasizes the
significance of PEGASIS in addressing energy consumption challenges in sensor
networks. The protocol organizes sensors into a chain to efficiently transmit data to a
sink, optimizing energy usage and prolonging network lifetime. The authors' work is
recognized for its impact on energy-efficient communication strategies in WSNs,
particularly in scenarios where resource constraints and energy conservation are
critical considerations.

Sunil Kumar Singh, Prabhat Kumar,Jyoti Prakash et.al (2007) propossed a survey
on successor of leach protocol authored by Singh provides a comprehensive and
insightful literature review on the Low Energy Adaptive Clustering Hierarchy (LEACH)
protocol and its successors in the domain of wireless sensor networks (WSN). The
authors highlight the enduring significance of LEACH, even 16 years after its

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 14


CHAPTER 2: LITERATURE REVIEW

inception, as it continues to capture the attention of the research community. The


importance of LEACH is underscored by the multitude of modifications and
successors that researchers have proposed, ranging from single-hop to multi-hop
scenarios.The literature review delves into the extensive body of work related to
LEACH, emphasizing its ongoing relevance and serving as a valuable resource for
researchers embarking on new studies in the field of WSN. The authors meticulously
survey the variants of LEACH routing protocols, categorizing them into single-hop
communication and multi-hop communication based on data transmission from the
cluster head to the base station. This classification facilitates a structured exploration
of the diverse enhancements and modifications proposed by researchers.A key
strength of the literature review is its in-depth comparative analysis of over 60
LEACH-related protocols, covering both single-hop and multi-hop communication
scenarios. The analysis spans nine parameters, including energy efficiency, overhead,
scalability, and more, providing a comprehensive evaluation of the protocols. The
findings indicate that the successors of LEACH generally represent improvements
over the basic protocol, with a particular emphasis on energy efficiency, a crucial goal
for any newly designed WSN protocol.The review sheds light on the challenges
associated with location-based information in distributed protocols, emphasizing the
expense and energy consumption involved in obtaining location coordinates through
GPS devices or localization techniques. Furthermore, it addresses the inherent trade-
off between security and energy efficiency in WSN, particularly in military and hostile
scenarios, where proposed security protocols often compromise energy
efficiency.The authors discuss the rising popularity of deterministic clustering
approaches in recent years, noting their reliability compared to probabilistic
clustering methods. However, they acknowledge the increased complexity and
energy consumption associated with deterministic clustering, employing approaches
such as fuzzy logic, weight-based, heuristic-based, and compound-based methods.

Fan Xiangning Song Yulin et.al (2007) propossed The Improvement on LEACH Protocol
of Wireless Sensor Network by and investigates the enhancement of the Low-Energy
Optimizing Efficiency and Performance in Wireless Sensor Networks Page 15
CHAPTER 2: LITERATURE REVIEW

Adaptive Clustering Hierarchy (LEACH) protocol within wireless sensor networks (WSN).
The paper introduces two innovative protocols, namely Energy-LEACH and Multihop-
LEACH, with the objective of refining the energy efficiency and communication capabilities
inherent in the traditional LEACH protocol.
Energy-LEACH concentrates on improving the selection process of cluster heads by
introducing an enhanced method. It prioritizes nodes with higher residual energy, designating
them as cluster heads in the subsequent round. This adjustment is geared towards extending
the overall lifespan of the network by strategically selecting cluster heads based on their
energy reserves.
Mu Minghao Tang-B et.al (2010) introduces an innovative protocol named LEACH-B
(LEACH-Balanced), aiming to address shortcomings identified in the Low-Energy Adaptive
Clustering Hierarchy (LEACH) protocol. The study, conducted at the College of Information
Science and Technology, Donghua University, Shanghai, China, identifies specific
deficiencies in LEACH, such as the fluctuation in the number of cluster heads and the
oversight of node residual energy.
LEACH-B incorporates a novel approach to overcome these limitations. After the initial
selection of cluster heads following the LEACH protocol, a second selection process is
introduced in each round. This secondary selection aims to adjust the number of cluster
heads, considering the residual energy of nodes. Consequently, the modified protocol
maintains a constant and near-optimal number of cluster heads per round, addressing the
observed fluctuations and improving the protocol's overall effectiveness.
The simulation, implemented using MATLAB, demonstrates that LEACH-B successfully
balances system energy consumption and exhibits superior performance in prolonging the
network lifetime compared to the original LEACH protocol.
TWu Xinhua; Wang Sheng et.al(2010) they proposed the study focuses on the performance
comparison of the LEACH (Low-Energy Adaptive Clustering Hierarchy) and LEACH-C
protocols using NS2 (Network Simulator 2). The primary objective is to analyze how the
performance of these routing protocols varies concerning the locations of the sink nodes. To
provide a more precise characterization of this variation, the research introduces two novel
concepts: Sensor Node Distribution Gravity and Distance Metric between the sink and
Gravity. These concepts aim to enhance the understanding of the regularity in the
performance changes of LEACH and LEACH-C.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 16


CHAPTER 2: LITERATURE REVIEW

The use of NS2 for performance evaluation underscores the significance of simulation tools
in assessing and comparing routing protocols in a controlled environment. NS2 provides a
platform for researchers to study the behavior of protocols under various conditions,
facilitating the identification of key parameters affecting their performance.
The proposed concepts, Sensor Node Distribution Gravity and Distance Metric between sink
and Gravity, contribute to the methodological framework for evaluating and understanding
the performance characteristics of LEACH and LEACH-C. By introducing these concepts,
the research aims to provide a more nuanced and insightful perspective on the factors
influencing the selection of routing protocols based on sink node locations.

Arezoo Yektaparast; Fatemeh-Hoda Nabavi et.al(2012) proposed improvement on the


LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol, referred to as Cell-LEACH,
represents a significant contribution to the field of wireless sensor networks (WSNs). This
literature review aims to provide an overview and analysis of the existing research related to
the LEACH protocol, its hierarchical clustering nature, and the novel enhancements
introduced by Cell-LEACH.
Wireless sensor networks (WSNs) play a crucial role in various applications by enabling
distributed and autonomous sensing of the environment. The efficient utilization of resources,
particularly energy, is paramount for WSNs' prolonged operation and reliability. Routing
protocols, especially hierarchical ones, have a direct impact on the network's overall
performance, making improvements in this area essential.
LEACH is recognized as one of the pioneering hierarchical routing protocols for WSNs,
laying the foundation for subsequent clustering algorithms. It aims to achieve energy
efficiency by organizing nodes into clusters with a designated cluster head responsible for
data aggregation and transmission. Despite its effectiveness, LEACH has room for
enhancement to address specific challenges and optimize its performance.

ia Xu, Ning Jin, Xizhong Lou, Ting Peng, Qian Zhou, and Yanmin et.al (2012) addresses
the critical issue of limited power resources in wireless sensor networks (WSNs) by
proposing an improved version of the Low-Energy Adaptive Clustering Hierarchy (LEACH)
protocol, referred to as E-LEACH. This literature review aims to explore the context of
energy consumption in WSNs, the significance of hierarchical routing protocols, and the
contributions made by the E-LEACH algorithm.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 17


CHAPTER 2: LITERATURE REVIEW

Wireless sensor networks are characterized by resource-constrained sensor nodes, primarily


limited by their power supply. Efficient energy management is crucial for the prolonged
operation of these networks, especially in scenarios where replacing or recharging batteries is
impractical. Routing protocols play a pivotal role in optimizing energy consumption, making
advancements in this domain highly relevant.
LEACH is a well-established hierarchical routing protocol designed to address energy
efficiency in WSNs by organizing nodes into clusters with designated cluster heads.
However, as highlighted in the research paper, the original LEACH algorithm exhibits
limitations in terms of cluster head selection, randomization, and fixed round time, which can
lead to unbalanced network loads.
The proposed E-LEACH algorithm seeks to overcome these limitations by introducing
enhancements to the cluster head selection process. Unlike the random selection method
employed by LEACH, E-LEACH considers the remaining power of sensor nodes during
cluster head selection, aiming to achieve a more balanced distribution of network loads.
Additionally, the algorithm dynamically adjusts the round time based on the optimal cluster
size, further optimizing energy utilization.
Simulation results presented in the research paper demonstrate the effectiveness of E-LEACH
in comparison to the original LEACH algorithm. The proposed protocol exhibits a significant
increase in network lifetime, with improvements of at least 40%. This improvement
underscores the practical implications and efficiency gains achieved by refining the cluster
head selection process and incorporating dynamic adjustments based on remaining power and
optimal cluster size.

Lin, Chen, Wang et.al(2014) presented "Fan-shaped clustering for large-scale


sensor networks" at the International Conference on Cyber-Enabled Distributed
Computing and Knowledge Discovery (CyberC). Their work introduces a novel
clustering approach tailored for large-scale sensor networks. The literature review
underscores the significance of their contribution in addressing scalability challenges
in sensor networks. The fan-shaped clustering technique offers an innovative solution
to efficiently organize sensor nodes into clusters, facilitating better management and
coordination in large-scale deployments. Their research offers valuable insights into
optimizing network performance and resource utilization in sensor network

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 18


CHAPTER 2: LITERATURE REVIEW

environments, making it a noteworthy contribution to the field of distributed


computing and knowledge discovery.

A. Rajandekar and B. Sikdar et.al(2015), published in the IEEE Internet of Things Journal
(vol. 2, no. 2, pp. 175–186), investigates Medium Access Control (MAC) layer issues and
protocols in Machine-to-Machine (M2M) communications. Focusing on challenges unique to
M2M, such as scalability and resource constraints, the review evaluates existing MAC layer
protocols, emphasizing their strengths, weaknesses, and energy efficiency considerations. It
explores the trade-offs between latency and throughput and likely discusses emerging trends
for future MAC layer designs in M2M communication. This survey provides valuable
insights for researchers and practitioners in the field.

窗体底端

T. Zheng, M. Gidlund, and J. Åkerberg et.al(2016) The paper "WirArb: A New MAC
Protocol for Time-Critical Industrial Wireless Sensor Network Applications" by
published in the IEEE Sensors Journal, introduces WirArb, a specialized Medium
Access Control (MAC) protocol tailored for time-critical operations in industrial
wireless sensor networks (WSNs). WirArb addresses the challenges of real-time
communication in industrial settings, offering enhanced efficiency and reliability. The
literature review emphasizes the protocol's unique features, performance evaluation,
and its significance in advancing industrial automation and the Industrial Internet of
Things (IIoT). The authors position WirArb as a promising solution for meeting the
stringent requirements of time-sensitive applications in industrial WSNs.

S. Chand, R. Kumar, B. Kumar, S. Singh, and A. Malik et.al(2016) proposed "NEECP:


Novel Energy-Efficient Clustering Protocol for Prolonging the Lifetime of WSNs," Chand
introduce NEECP, a clustering protocol designed to enhance energy efficiency in Wireless
Sensor Networks (WSNs). The protocol aims to significantly extend WSN lifespan through
an innovative clustering mechanism, optimizing energy consumption patterns. The literature
review likely discusses existing challenges in WSNs related to energy consumption, presents
a survey of related work, and compares NEECP with other clustering protocols to highlight

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 19


CHAPTER 2: LITERATURE REVIEW

its advantages. The authors may provide simulation results or analytical assessments
demonstrating NEECP's effectiveness. The review concludes by suggesting future research
directions and practical implications of NEECP in diverse WSN scenarios, contributing
valuable insights to the field.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 20


CHAPTER 2: LITERATURE REVIEW

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 21


CHAPTER 2: LITERATURE REVIEW

CHAPTER 3

METHODOLOGY

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 22


CHAPTER 2: LITERATURE REVIEW

CHAPTER 3

METHODOLOGY

3.1.Field Characteristics and Coordinates:

Area Dimensions: The field dimensions denote the spatial extent of the wireless sensor
network (WSN) deployment. In this simulation, the field takes the form of a square with
dimensions xm×ym meters. • Sink Location: The sink coordinates, representing the central
point or base station for data aggregation, are fixed at 0.5×xm, 0.5×ym.

3.2.Node Quantity and Election Probability:

• Node Count (n): The simulation incorporates n nodes, distributed randomly across the
field. Nodes serve as integral components within the WSN.

• Election Probability (p): The optimal election probability (p) governs the likelihood of a
node assuming the role of a cluster head in each round, thereby influencing the dynamic
clustering process.

3.3.Energy Modeling:

• Initial Energy (Eo): The initial energy level (Eo) designates the starting energy for each
node within the network.

• Transmit and Receive Energy (ETX, ERX): These parameters (ETX, ERX) quantify the
energy consumption during the transmission and reception of data.

• Transmit Amplifier Characteristics (EFS, Emp): These parameters (EFS, Emp) indicate
the energy consumption associated with various types of transmit amplifiers. • Data
Aggregation Energy (EDA): The data aggregation energy (EDA) represents the energy
utilized during the aggregation of data at cluster heads.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 23


CHAPTER 2: LITERATURE REVIEW

3.4.Network Heterogeneity: Percentage of Advanced Nodes (m):


The parameter m signifies the proportion of nodes in the network classified as advanced.
These nodes may possess distinct characteristics or capabilities compared to regular nodes.

.
 Alpha (α): The parameter α defines the degree of heterogeneity in the network. It
could represent the variation in initial energy levels, transmission power, or other
characteristics among nodes.

 Random Election of Node Types: The simulation randomly elects nodes as either
normal or advanced based on the specified percentage (m) of advanced nodes.

 Differential Initial Energy: Advanced nodes may start with different initial energy
levels compared to normal nodes, introducing energy heterogeneity.

 Impact on Clustering: The presence of advanced nodes can influence the clustering
process, as they may have different probabilities of becoming cluster heads.

 Energy Dissipation Variations: Heterogeneity affects how energy is dissipated


during communication, considering differences in initial energy and transmission
distances.

Heterogeneity introduces diversity into the network, allowing for more realistic modeling of
sensor nodes with varying capabilities and energy constraints. It is a crucial factor in
understanding the performance and robustness of the wireless sensor network in different
scenarios.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 24


CHAPTER 2: LITERATURE REVIEW

Figure: 3.1 Energy Leach Protocol

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 25


CHAPTER 4: PROPOSED WORK

CHAPTER 4

PROPOSED WORK

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 26


CHAPTER 4: PROPOSED WORK

CHAPTER 4
PROPOSED WORK

4.1.Development of Criteria for Optimizing Routing Protocols:

1. Energy Efficiency:
 Energy Model Parameters: Evaluate and fine-tune the parameters affecting
energy consumption, such as 0E0, ETX,ERX, EFS, Emp, and EDA.
 Communication Range (do): Comprehend the effects of the communication
range on energy consumption and fine-tune it to enhance communication
efficiency.
 Energy Dissipation Calculation: Develop criteria to optimize energy
dissipation during communication based on distance and amplifier types.
2. Cluster Head Election:
 Probabilistic Model (p): Analyze the probabilistic model for cluster head
election and suggest adjustments for optimal p considering factors like energy
levels and proximity to the sink.
 Load Balancing: Consider load balancing strategies to ensure a fair
distribution of cluster heads, preventing early exhaustion of specific nodes.
3. Adaptability to Heterogeneity:
 Node Types (Advanced Nodes): Develop criteria to adapt routing protocols
to heterogeneous node characteristics, particularly advanced nodes.
 Energy-Aware Routing for Different Nodes: Propose modifications to
routing algorithms to consider the varying energy characteristics of different
node types.

4.2.Suggestions for Protocol Enhancements Based on


Comparative Analysis:

1. Cluster Formation and Stability:


 Comparative Metrics: Analyze metrics related to cluster stability, such as the
frequency of cluster head changes and cluster size distribution.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 27


CHAPTER 4: PROPOSED WORK

 Stability Improvement: Suggest enhancements to the cluster formation


algorithm to improve stability, possibly by incorporating energy-awareness
and load balancing.
2. Energy Consumption Patterns:

a)Energy Consumption Comparison: Perform a comparative examination of energy


usage trends among nodes, identifying any outliers or inefficient patterns. Adaptive
Energy Management: Suggest dynamic energy management tactics, including the
modification of sleep-wake schedules or transmission power, based on real-time
energy levels.

b) Packet Delivery Metrics:

 Comparative Packet Delivery Rates: Analyze packet delivery rates under


various conditions and identify scenarios where improvements are needed.
 Enhanced Routing Mechanisms: Suggest modifications to routing
algorithms to enhance packet delivery, considering factors like reliability,
error correction, and congestion control.

4.3.Proposing New Algorithms or Modifications to Existing


Protocols:

1. Adaptive Cluster Head Election:


 Real-time Factors: Propose an adaptive algorithm that considers real-time
factors like energy levels, distance to the sink, and recent cluster head history
for optimal cluster head election.
 Adaptive Thresholds: Introduce adaptive thresholds for cluster head election
probability based on the current network conditions.
2. Energy-Aware Routing:
 Dynamic Route Selection: Propose algorithms that dynamically select routes
based on nodal energy levels and adjust the routing path to balance energy
consumption.
 Energy-Aware Metrics: Introduce metrics that consider both energy and
distance to make more informed routing decisions.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 28


CHAPTER 4: PROPOSED WORK

3. Cross-Layer Optimization:
 Information Integration: Develop algorithms that integrate information from
multiple protocol layers, such as combining physical layer details with routing
decisions.
 Joint Optimization: Propose protocols that jointly optimize decisions across
layers for improved network performance, addressing challenges like
interference, energy consumption, and data routing.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 29


CHAPTER 5: IMPLEMENTATION AND RESULT ANALYSIS

CHAPTER 5

IMPLEMENTATION AND RESULT ANALYSIS

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 30


CHAPTER 5: IMPLEMENTATION AND RESULT ANALYSIS

CHAPTER 5

IMPLEMENTATION AND RESULT ANALYSIS

1. Parameter Initialization:

The code begins by initializing various parameters crucial for the simulation.
This includes defining the field dimensions (xm and yym), sink coordinates
(sink.x and sink.y), the number of nodes in the network (n), the optimal
election probability for a node to become a cluster head (p), and several
energy model parameters such as initial energy (Eo) and energy
consumption rates for transmission and reception (ETX and ERX).

2. Random Sensor Network Creation:

The code then creates a random sensor network by generating random


coordinates (xd and yd) for each node within the specified field dimensions.
Some nodes are designated as advanced nodes based on a given
percentage (m).
end

3. First Iteration:

The simulation starts with the first round ( r = 0). Nodes are assigned initial
energy, and the process of energy consumption and node clustering
begins.

4. Cluster Head Election:

In each round, nodes decide whether to become cluster heads based on a


probability (p). If a node becomes a cluster head, it forms a cluster,
calculates the energy dissipated during data transmission to the sink, and
updates its status.

5. Associated Cluster Head Election for Normal Nodes:

Normal nodes decide which cluster head to associate with based on the
minimum distance to available cluster heads. The energy dissipated during
data transmission to the selected cluster head is calculated.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 31


CHAPTER 5: IMPLEMENTATION AND RESULT ANALYSIS

6. Energy Update:

The energy of nodes is updated based on the distance to the sink and the
type of transmission (direct to sink or through a cluster head).

7. Statistics Collection:

Statistics are collected for each round, including the number of dead nodes,
number of dead advanced nodes, number of dead normal nodes, and the
number of cluster heads. 1;

8. Graphical Representation:

The code includes plotting commands to visualize the network, alive nodes,
and various statistics over the rounds. However, there are some missing or
incorrect plotting commands in the provided code.

9. Termination Condition:

The simulation continues for a specified number of rounds ( rmax). If a node


dies, the round of its death is recorded. end

10. Output:

The code outputs statistics such as the number of dead nodes, number of
dead advanced nodes, number of dead normal nodes, number of cluster
heads, and other relevant information for each round.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 32


CHAPTER 5: IMPLEMENTATION AND RESULT ANALYSIS

Figure.5.1:leach performance before

As in this previous graph shows the performance of the basic leach protocol as it shows the
first node is decaying at x=519 and y=99 the performance here is not upto the mark

Figure 5.2; leach performance after…

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 33


CHAPTER 5: IMPLEMENTATION AND RESULT ANALYSIS

In the latest leach protocol model implemented by us the first node decay was at x=1367 and
y=99 so here we have increased the stability period by 23 times and first the half node were
decaying at x=841 and y=50 but in the latest implementation the first half node decay was
proposed at x=2431 and y=56 here the stability period was improved by 300 percent

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 34


CHAPTER 6: CONCLUSION AND FUTURE SCOPE

CHAPTER 6
CONCLUSION AND FUTURE SCOPE

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 35


CHAPTER 6: CONCLUSION AND FUTURE SCOPE

CHAPTER 6
CONCLUSION AND FUTURE SCOPE

The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is a significant


advancement in the realm of Wireless Sensor Networks (WSN), specifically addressing
critical concerns regarding energy efficiency. Through strategic cluster formation and
periodic rotation of cluster heads, LEACH has proven to be a pioneering approach that
significantly extends the operational lifespan of sensor networks. Its decentralized design,
coupled with its adaptability to dynamic network conditions, positions it as a resilient and
scalable solution ideal for large-scale WSN deployments.
LEACH's primary focus on energy conservation is instrumental, especially in scenarios
where sensor nodes are resource-constrained or deployed in harsh and remote environments.
The protocol intelligently distributes energy consumption across the network, thereby
mitigating the issues associated with uneven energy depletion among individual nodes.
Extensive simulations and real-world implementations have demonstrated LEACH's
effectiveness under diverse scenarios, providing valuable insights into its strengths and
limitations.

6.1.Key Contributions of LEACH:


a)Energy Conservation: The fundamental advantage of LEACH lies in its capacity to
extend the network's duration by effectively handling energy consumption. This is
accomplished through the establishment of clusters and the implementation of a randomized
rotation mechanism for selecting cluster heads, thereby evenly distributing the energy load.
b).Decentralization: LEACH's decentralized approach enhances the scalability of WSNs. By
enabling nodes to operate autonomously within their clusters, the protocol avoids bottlenecks
and single points of failure, ensuring a more resilient and fault-tolerant network architecture.
3. Adaptability: LEACH's adaptability to changing network conditions, such as variations in
node energy levels and communication patterns, makes it suitable for dynamic environments.
This adaptability is crucial for WSNs deployed in scenarios with unpredictable changes..
Decentralization: LEACH's decentralized approach enhances the scalability of WSNs. By
enabling nodes to operate autonomously within their clusters, the protocol avoids bottlenecks
and single points of failure, ensuring a more resilient and fault-tolerant network architecture.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 36


CHAPTER 6: CONCLUSION AND FUTURE SCOPE

3. Adaptability: LEACH's adaptability to changing network conditions, such as variations in


node energy levels and communication patterns, makes it suitable for dynamic environments.

6.2. Future Scope:


The future development and refinement of LEACH and its variants open up several avenues
for exploration:
1. Heterogeneous Networks: Research can delve into accommodating heterogeneous
characteristics among sensor nodes, including differences in energy storage,
processing capabilities, and communication ranges. This could lead to the
development of protocols that cater to the specific needs of diverse nodes within a
network.
2. Security Enhancements: As WSNs play increasingly critical roles in various
applications, bolstering the security aspects of LEACH becomes imperative. Future
work may involve incorporating advanced cryptographic techniques, intrusion
detection systems, and secure data aggregation methods to protect WSNs from
malicious attacks.
3. Integration with Evolving Technologies: The potential lies in integrating LEACH
with emerging technologies like the Internet of Things (IoT) and edge computing.
This fusion could give rise to hybrid protocols that capitalize on the advantages of
LEACH while incorporating elements to align with the dynamic landscape of
technological progress.
4. Application-Specific Optimizations: Tailoring LEACH or developing protocol
variants to suit specific applications, such as healthcare monitoring, environmental
sensing, or industrial automation, is an area for further exploration. Customizing the
protocol for specific use cases can lead to optimizations that cater to the unique
requirements of different domains.
5. Real-World Validation: Continued validation through real-world deployments is
crucial for confirming the practical viability of LEACH. Gathering data from actual
implementations provides valuable insights, helps validate theoretical findings, and
allows for protocol refinements based on operational experiences.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 37


REFERENCES

REFERENCES

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 38


REFERENCES

REFERENCES
.
[1] In the proceedings of the Fifth Annual International Conference on Mobile Computing
and Networking (MOBICOM) held in Seattle, WA, USA, in August 1999, Rabiner, W.;
Kulik, J.; Balakrishnan, H. presented a paper titled "Adaptive Protocols for Information
Dissemination in Wireless Sensor Networks" (pp. 174–185).
.
.
[2] W. R. Heinzelman's Ph.D. thesis, completed in 2000 at the Massachusetts Institute of
Technology, focuses on "Application-Specific Protocol Architectures for Wireless
Networks."
.
.
[3] Ossama Younis and Sonia Fahmy proposed a "Distributed Clustering in Ad-hoc Sensor
Networks: A Hybrid, Energy-efficient Approach" in September 2002. Their subsequent work,
titled "Heed: A hybrid, Energy-efficient, Distributed Clustering Approach for Ad-hoc
Networks," was published in IEEE Transactions on Mobile Computing (vol. 3, no. 4, Oct.-
Dec. 2004, pp. 366-369).
.
.
[4] A. Manjeshwar and D. P. Agrawal introduced "TEEN: A Protocol for Enhanced
Efficiency in Wireless Sensor Networks" during the 1st International Workshop on Parallel
and Distributed Computing Issues in Wireless Networks and Mobile Computing in San
Francisco, CA, in April 2001.
.
.
[5] S. Lindsey and C.S. Raghavendra presented "PEGASIS: Power-efficient Gathering in
Sensor Information System" at the IEEE Aerospace Conference in Big Sky, MT, in March
2002 (vol. 3, pp. 1125-1130).
.
.
[6] H. Taheri, P. Neamatollahi, O.M. Younis, S. Naghibzadeh, and M.H. Yaghmaee proposed
an energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic
in Ad Hoc Networks (vol. 10, no. 7, 2012, pp. 1469-1481).
.
.
[7] R. Devika, B. Santhi, and T. Sivasubramanian conducted a survey on routing protocols in
wireless sensor networks in the IJET (vol. 5, no. 1, 2013, pp. 350-356).
.
.
[8] H. Lin, P. Chen, and L. Wang introduced "Fan-shaped clustering for large-scale sensor
networks" at the 2014 Int. Conf. Cyber-Enabled Distrib. Comput. Knowl. Discov. CyberC
(2014, pp. 361-364).
.
.
[9] S. Chand, R. Kumar, B. Kumar, S. Singh, and A. Malik proposed "NEECP: novel energy-
efficient clustering protocol for prolonging the lifetime of WSNs" in IET Wirel. Sens. Syst.
(vol. 6, no. 5, 2016, pp. 151-157).

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 39


REFERENCES

.
.
[10] S. Arjunan and S. Pothula conducted a survey on unequal clustering protocols in
Wireless Sensor Networks in the J. King Saud Univ. - Comput. Inf. Sci. (2016).
.
.
[11] Jing Sun, Zhongxiao Wang, Hong Wang, and Xiaofen Zhang presented "Research on
Routing Protocols Based on ZigBee Network" at the IEEE Third International Conference on
Intelligent Information Hiding and Multimedia Signal Processing in November 2007 (pp.
639–642).
.
.
[12] Ran Peng, Sun Mao-heng, and Zou You-min proposed a "ZigBee Routing Selection
Strategy Based on Data Services and Energy-balanced ZigBee Routing" at the IEEE Asia-
Pacific Conference on Services Computing in December 2006 (pp. 400–404).
.
.
[13] Jianpo Li, Xuning Zhu, Ning Tang, and Jisheng Sui conducted a study on "ZigBee
Network Architecture and Routing Algorithm" at the 2nd International Conference on Signal
Processing Systems in July 2010 (pp. 389-392).
.
.
[14] Mohamed Kasraoui, Adnane Cabani, and Joseph Mouzna worked on the "Improvement
of Zigbee Routing Protocol," presented at the IEEE International Conference on Green
Computing and Communications in November 2012 (pp. 788-793).
.
.
[15] Kwang Koog Lee, Seong Hoon Kim, Yong Soon Choi, and Hong Seong Park introduced
"A Mesh Routing Protocol using Cluster Label in the ZigBee Network" at the IEEE
International Conference on Mobile Adhoc and Sensor Systems in October 2006 (pp. 801-
806).
.
.
[16] C. C. Enz, A. El-Hoiydi, J.-D. Decotignie, and V. Peiris presented "WiseNET: an
ultralow-power wireless sensor network solution" in the journal Computer (vol. 37, no. 8,
2004, pp. 62–70).
.
.
[17] W. Sun, Z. Yang, X. Zhang, and Y. Liu conducted a survey on "Energy-efficient
neighbor discovery in mobile Ad Hoc and wireless sensor networks" published in IEEE
Communications Surveys and Tutorials (vol. 16, no. 3, 2014, pp. 1448–1459).
.
.
[18] A. Rajandekar and B. Sikdar surveyed MAC layer issues and protocols for machine-to-
machine communications in the IEEE Internet of Things Journal (vol. 2, no. 2, 2015, pp.
175–186).
.
.

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 40


REFERENCES

[19] T. Zheng, M. Gidlund, and J. Åkerberg proposed "WirArb: a new MAC protocol for
time-critical industrial wireless sensor network applications" in the IEEE Sensors Journal
(vol. 16, no. 7, 2016, pp. 2127–2139).
.
.
[20] G. Dai, C. Miao, K. Ying, K. Wang, and Q. Chen introduced "An energy-efficient MAC
protocol for linear WSNs" in the Chinese Journal of Electronics (vol. 24, no. 4, 2015, pp.
725–728).
.
.
[22] Yong Wang, Garhan Attebury, and Byrav Ramamurthy conducted a survey on "Security
Issues In Wireless Sensor Networks" published in the IEEE Communications Surveys &
Tutorials (2nd Quarter, 2006, pp. 223-237).
.
.
[23] Al-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon Hong addressed "Security in
Wireless Sensor Networks: Issues and Challenges" at ICACT 2006, with ISBN 89-5519-129-
4, on pages 25-32.
.
.
[24] Pallavi Jindal, Vikas Gupta, conducted a study on "Energy Efficient Routing Protocols
of Wireless Sensor Networks and their further researches: a Survey" published in IJCSCE
(vol. 2, 2013, ISSN 2319-7080, pp. 57-62).
.
.
[25] B.V. Manikyala Rao, S. Pallam Setty, and G. Lavanya Devi explored "Energy Efficient
Routing Protocols in Wireless Sensor Networks" published in IJCC (vol. 2, 2013, ISSN 2319
– 8869, pp. 16-23).

Optimizing Efficiency and Performance in Wireless Sensor Networks Page 41

You might also like