Professional Documents
Culture Documents
MASTER OF TECHNOLOGY
IN
SUMIT BHATT
FACULTY OF TECHNOLOGY
2023
CERTIFICATE
Certified that research work entitled “A COMPARATIVE STUDY OF ROUTING PROTOCOLS IN WIRELESS
SENSOR NETWORKS”, is a bonafide work carried out by SUMIT BHATT in partial fulfilment for the award of
Master of Technology in Computer Science & Engineering from Department of Computer Science &
Date:
Supervisor
I declare that
a. The work contained in this thesis is original and has been done by myself under the supervision of
my supervisor/s.
b. The work has not been submitted to any other Institute for any Degree.
c. I have followed the Institute norms and guidelines and abide by the regulation as given in the Ethical
d. Whenever I have used materials (data, theory and text) from other sources, I have given due credit
to them by citing them in the text of the thesis and giving their details in the reference section.
Date :
Place:
SUMIT BHATT
I would like to express my sincere gratitude to all those who helped me in the successful completion of my
venture. I would like to thank to my Supervisor MR. SANJAY KUMAR, Head of Department, Department of
Computer Science & Engineering, Veer Madho Singh Bhandari Uttrakhand Technical University, Dehradun
for helping me in the successful accomplishment of my study and for his timely and valuable suggestions.
His constructive criticism has contributed immensely to the evolution of my ideas on the subject.
I am exceedingly grateful to other faculty members for their inspiration and encouragement. I would also
like to thank my parents and friends for their overwhelming and whole hearted encouragement and support
SUMIT BHATT
M.Tech. Student
Wireless Sensor Network (WSN) has been widely used for monitoring and control applications
in our daily lives due to its promising features; such as low cost, low power, and ease of
implementation. The choice of energy efficient routing protocol is a vital task in the network
layer of wireless sensor networks to improve their lifetime. A performance analysis of energy
flow rate, number of packets lost, and lifetime. Based on the simulation results, we observe that
opportunistic routing protocol perform better characteristic than traditional protocol (TR).
Furthermore, our findings disclose that opportunistic routing algorithm yields in a significant
In wireless sensor networks, protocols play a major and important role. These protocols vary
depending on the application and network architecture. It has specifically designed data centric,
location based and hierarchical protocols where special attention is taken to energy awareness.
The main objective of this research is to discuss the routing protocol and its comparison. These
are the basic protocols for data centric, location based and hierarchical.
In my research I will be comparing basic routing protocols and finding the most efficient routing
protocols among them. These protocols were originally proposed for wired networks. But later
wireless sensor networks were proposed to increase the efficiency of sensor nodes and lifespan.
INTRODUCATION
1.1 Wireless Sensor Network (WSN):
A Wireless Sensor Network (WSN) consists of a collection of spatially distributed sensors that
are dedicated to monitoring and recording environmental conditions. These sensors gather data
related to factors such as temperature, sound, pollution levels, humidity, and wind. The collected
information is then centralized for further analysis. WSNs utilize self-governing devices
equipped with sensors to monitor physical or environmental parameters. These networks play a
crucial role in monitoring various aspects, including temperature, pressure, wind direction,
illumination, vibration intensity, sound levels, power-line voltage, chemical concentrations,
pollutant levels, and even vital body functions. The widespread deployment of sensors enables
efficient data collection and analysis across diverse applications.
1. Terrestrial WSNs
2. Underground WSNs
3. Underwater WSNs
4. Multimedia WSNs
5. Mobile WSNs
Terrestrial WSNs
Terrestrial WSNs efficiently communicate with base stations and comprise hundreds to
thousands of wireless sensor nodes. These nodes are deployed either in an unstructured (ad hoc)
or structured (preplanned) manner. In the unstructured mode, sensor nodes are randomly
distributed across the target area, akin to dropping them from a fixed plane. In contrast, the
preplanned or structured mode involves deliberate placement strategies, including optimal
placement, grid-based arrangements, and 2D or 3D models.
In such WSNs, battery power is limited, but solar cells serve as a secondary power source.
Energy conservation is achieved through strategies like low duty cycle operations, minimizing
delays, and optimizing routing protocols.
2. Underground WSNs
Compared to terrestrial WSNs, underground wireless sensor networks are more costly due to
factors like deployment, maintenance, and equipment expenses. These networks comprise hidden
sensor nodes embedded in the ground to monitor subterranean conditions. To transmit data from
the sensor nodes to the base station, additional sink nodes are positioned above ground.
However, recharging the sensor battery nodes deployed underground is challenging due to their
limited battery capacity. Additionally, wireless communication faces difficulties in the
underground environment due to significant signal attenuation and loss.
3. Under Water WSNs
Over 70% of the Earth’s surface is covered by water. Underwater WSNs comprise sensor nodes
and vehicles deployed in aquatic environments. Autonomous underwater vehicles play a crucial
role in collecting data from these submerged sensor nodes. However, underwater communication
faces challenges such as long propagation delays, limited bandwidth, and sensor failures.
In underwater WSNs, the sensor nodes operate on finite battery power that cannot be recharged
or replaced. Addressing energy conservation in this context requires advancements in underwater
communication and networking techniques.
4. Multimedia WSNs
Multimedia WSNs have been proposed to facilitate event tracking and monitoring using various
forms of multimedia, including images, videos, and audio. These networks consist of cost-
effective sensor nodes equipped with microphones and cameras. These nodes communicate
wirelessly, enabling tasks such as data compression, retrieval, and correlation.
However, multimedia WSNs face several challenges, including high energy consumption,
substantial bandwidth requirements, intricate data processing, and compression techniques.
Additionally, delivering multimedia content efficiently demands ample bandwidth
5 Mobile WSNs:
o These networks consist of sensor nodes capable of autonomous movement and interaction with
the physical environment.
o Mobile nodes can compute, sense, and communicate.
o Compared to static sensor networks, MWSNs offer greater versatility.
o Advantages of MWSNs over static networks include improved coverage, enhanced energy
efficiency, superior channel capacity, and more
Area Monitoring: Deployed sensor nodes monitor specific regions for events such as heat,
pressure, or motion. When an event is detected, base stations take relevant actions. For instance,
oil refineries in places like Hoima benefit from this monitoring.
Transportation:
WSNs play a crucial role in real-time traffic systems.Sensors collect data, which is then used by
transportation models (such as traffic lights) to alert drivers about congestion and traffic
issues.This technology is also aiding research on self-driving cars.
Health Applications:
WSNs are integrated into wearable devices like smartwatches.Health-related applications include
interfaces for people with disabilities, patient monitoring, diagnostics, drug administration in
hospitals, tele-monitoring of physiological data, and tracking doctors or patients within hospital
premises.
Environmental Sensing:
3 greenhouse monitoring
4 landslide detection.
6 Structural Monitoring:
o Wireless sensor technology is effectively used to monitor activities within buildings and
infrastructure, including bridges, flyovers, embankments, and tunnels.
o By deploying sensors, engineering practices can remotely monitor assets, eliminating the need
for costly site visits.
o Notable examples include the hydro-electric power plant at Bujagali Falls in Jinja, situated along
the Nile River.
7 Industrial Monitoring:
At East African Breweries in Luzira, wireless sensor networks have been implemented for
machinery condition-based maintenance (CBM).
These networks offer significant cost savings and enable new functionalities.
Unlike wired systems, where sensor installation is often limited by wiring costs, wireless
solutions provide greater flexibility.
8 Agricultural Sector:
Farmers can leverage wireless sensor networks to eliminate the need for wiring maintenance in
challenging farming environments.
Automation of farming activities, such as irrigation, enhances water efficiency and reduces
waste.
Military Applications:WSNs play a crucial role in tracking and monitoring environments for
military purposes.
Sensor nodes are deployed in specific fields of interest and remotely controlled by users.
These networks aid in enemy tracking and security detection.
Health Applications:
WSNs facilitate patient and doctor tracking and monitoring.
Transport Systems:WSNs are widely used for traffic monitoring, dynamic routing management,
and parking lot surveillance.
o
Figure1.2 Wireless Sensor Networks Applications
3. Active Sensors:
o Active sensors actively probe and interact with the environment.
o They play an active role in data collection.
Advantages:
Disadvantages:
Security Concerns: WSNs are less secure, as hackers can potentially access the network and
retrieve information.
Lower Speed: Compared to wired networks, WSNs operate at lower speeds.
Configuration Complexity: Configuring WSNs can be more complex than wired networks.
Environmental Impact: WSNs are susceptible to environmental factors such as walls,
microwave interference, and signal attenuation over large distances.
A Wireless Sensor Network (WSN) is a wireless network infrastructure that deploys numerous
sensor nodes in an ad-hoc manner. These nodes monitor system, physical, or environmental
conditions. Each sensor node contains an onboard processor responsible for managing and
observing the local environment. These nodes communicate with a Base Station, which serves as
the central processing unit within the WSN system. The Base Station is connected to the Internet
for data sharing and further analysis.
WSN can be used for processing, analysis, storage, and mining of the data.
Applications of WSN:
1. Internet of Things (IoT): WSNs play a crucial role in IoT by enabling connectivity and data
exchange between various devices.
2. Surveillance and Security Monitoring: WSNs are used for surveillance, threat detection, and
security purposes.
3. Environmental Monitoring: WSNs track environmental factors such as temperature, humidity,
and air pressure.
4. Noise Level Monitoring: WSNs can measure noise levels in the surrounding area.
5. Medical Applications: WSNs facilitate patient monitoring and other healthcare-related tasks.
6. Agriculture: WSNs aid in precision agriculture by monitoring soil conditions, crop health, and
irrigation.
7. Landslide Detection: WSNs contribute to early warning systems for natural disasters like
landslides.
Challenges of WSN:
1. Quality of Service:
o Ensuring reliable and timely data delivery while meeting specific requirements.
2. Security Issues:
o Addressing vulnerabilities and protecting WSNs from unauthorized access, data tampering, and
attacks.
3. Energy Efficiency:
o Optimizing energy consumption to prolong the lifespan of sensor nodes.
4. Network Throughput:
o Balancing data transmission rates to maintain efficient communication.
5. Performance:
o Enhancing overall system performance, including latency and reliability.
6. Node Failure Resilience:
o Developing mechanisms to handle node failures without disrupting network functionality.
7. Cross-Layer Optimization:
o Coordinating interactions between different layers (physical, data link, network) for improved
efficiency.
8. Scalability for Large Deployments:
o Ensuring WSNs can handle a large number of nodes and maintain functionality.
Components of WSN:
1. Sensors:
o Sensors in WSNs capture environmental variables for data acquisition.
o They convert sensor signals into electrical signals.
2. Radio Nodes:
o Radio nodes receive data from sensors and transmit it to the WLAN access point.
o These nodes typically include a microcontroller, transceiver, external memory, and power
source.
3. WLAN Access Point:
o The WLAN access point wirelessly receives data sent by radio nodes.
o It serves as a gateway to the internet for further data processing.
4. Evaluation Software:
o Data received by the WLAN access point is processed using evaluation software.
o This software presents reports to users and enables further data analysis, storage, and mining .
‘
Figure1.1.1: Sink Node
Data Collection Approaches in Wireless Sensor Networks with Mobile Sink Nodes:
1. Discovery:
o This approach is mobility-independent and relies on a knowledge base.
o It focuses on identifying relevant data sources without considering the mobility of the sink node.
2. Data Transfer:
o In this joint approach, both discovery and data transfer are considered together.
o It aims to efficiently transfer data from sensor nodes to the mobile sink.
3. Routing:
o Routing approaches can be either flat or proxy-based.
o Flat routing treats all nodes equally, while proxy-based routing involves specialized nodes
(proxies) that assist in data forwarding.
4. Motion Control and Trajectory:
o The trajectory of the mobile sink can be static, dynamic, or a combination of both (hybrid).
o Speed and movement patterns impact data collection efficiency.
1.4.2 Sensor Node
A sensor node is a device capable of collecting environmental sensor data, processing that
information, and communicating with other nodes. These nodes forward the collected data to a
central point for synchronization. Essentially, they serve as base stations or access points for data
collection and information sharing.
1.4.3 Topologies
There are different types of wireless sensor network topologies such as Bus Topology, Tree
Topology, Star Topology, Ring Topology, Mesh Topology, Circular Topology and Grid
Topology.
1. Bus Topology:
o In this topology, a node sends a message to another node on the network by broadcasting it.
o All other nodes see the broadcast message, but only the intended recipient processes it.
o Bus topology is easy to install but can suffer from traffic congestion and single-path
communication.
o It works best with a limited number of nodes; adding too many nodes can lead to performance
issues.
Figure1.1.3 (a): Bus Topology
Tree Topology
In a tree topology, the network employs a central hub known as the root node for primary
communication routing. The root node is positioned one level below the actual root, forming a
star network. Essentially, the tree network can be considered a hybrid of both star and tree
topologies.
Wireless sensor network paths can consist of either single-hop or multi-hop communication.
Sensor nodes receive and share environmental information. After receiving data messages from
their child nodes, they synchronize and forward the data to their parent nodes. It’s crucial to find
an optimal short-path tree that maximizes network lifetime while minimizing latency. Although
this approach may involve slightly higher time complexity, it allows for distributed
implementations.
However, there’s a challenge related to load balancing at each level of the tree. This load
balancing can lead to communication between two nodes. If there’s a link break in the unipath on
the active route, communication may also be disrupted.
Ring Topology
In a ring topology, each network node is connected to exactly two neighboring nodes, forming a
continuous closed loop. Messages circulate either clockwise or counterclockwise within the ring.
If a node fails, it disrupts the loop, potentially affecting the entire network. However, the
ringnetwork effectively handles traffic and congestion through dual-path communication
management
Figure1.1.3 (d): Ring topology
Mesh topology
In a mesh topology, messages can follow multiple paths from the source to the destination.
Unlike a ring topology where messages travel in only one direction despite the existence of two
paths, mesh networks allow for greater flexibility.
A full mesh network connects every node directly to every other node in the network. On the
other hand, a partial mesh network involves some devices connecting indirectly to others
through intermediate nodes. This partial mesh approach provides redundancy and resilience in
case of failures, ensuring that the network continues to function even if certain nodes or
connections are disrupted
In this topology, the circular is a sensory field. The sensing area has a center. The sensor node
senses the event of interest and transmits these data to the sink
Grid Topology
In a grid topology, the sensor network area is divided into non-overlapping square grids of equal
size. Each grid must have at least one operational node at any given time. To prolong the
network’s lifetime, nodes take turns working within the grid. Within each grid, a designated node
serves as the grid head, responsible for forwarding routing information and transmitting data
packets. Routing occurs in a grid-by-grid manner. The primary purpose of grid-based multi-path
routing protocols is to enhance packet speed, manage network congestion, and efficiently utilize
Figure1.1.3 (g): Grid Topology
RELATED WORK
Researchers have extensively studied wireless sensor networks (WSNs) with diverse objectives,
all centered around the critical goal of enhancing WSNs for better, secure, and efficient use
across various domains.
1. Security Focus: One research paper delves into WSN security, highlighting the vulnerability of
wireless networks due to their broadcast nature. Additionally, WSNs face heightened
susceptibility because nodes are often deployed in aggressive or hazardous environments where
safety cannot be guaranteed.
2. Operational Overview: Another journal provides a comprehensive understanding of WSNs,
emphasizing spectrum sensing as a fundamental aspect. It further explores the challenges
associated with the cognitive cycle, particularly the task of detecting spectrum usage and
identifying potential primary users.
3. QoS Support: In a separate study, the author evaluates Quality of Service (QoS) support in
WSNs. Unlike traditional end-to-end multimedia applications, mission-critical WSN applications
impose new QoS requirements. The unique characteristics of WSNs, including resource-
constrained sensors and novel communication protocols, present unprecedented challenges in
achieving effective QoS
4. QoS Support in WSNs: The author begins by examining techniques for Quality of Service
(QoS) support in traditional networks. They then analyze the emerging QoS requirements
specific to wireless sensor networks (WSNs), considering a diverse range of applications
categorized by data delivery models. Additionally, the author proposes non-end-to-end collective
QoS parameters. Challenges related to QoS support in this novel paradigm are also discussed,
along with an exploration of current research efforts and identification of open research areas to
encourage further investigation in this relatively unexplored domain.
5. Protocol Stack for WSNs: In another journal, the author delves into the protocol stack for
wireless sensor networks. Recent advancements in wireless communication and electronics have
facilitated the development of cost-effective sensor networks. These networks find applications
in various domains such as health, military, and home environments. Each application area
presents unique technical challenges that researchers are actively addressing. The article provides
insights into the current state of sensor networks, discussing solutions within the context of
relevant protocol stack layers. Additionally, it highlights open research issues, aiming to inspire
new interests and advancements in this field
Wireless sensor networks (WSNs) face several technical challenges during deployment, which
extend beyond those encountered in traditional wireless ad-hoc networks. Here are some key
issues:
1. Energy Constraints: WSNs operate on wireless, lossy communication links without a fixed
infrastructure. The sensor nodes rely on limited, often non-renewable energy sources. To
maximize the network’s lifetime, protocols must be designed with energy efficiency as a primary
objective from the outset.
2. Fault Tolerance: Sensor nodes are often deployed in hazardous environments. These nodes can
fail due to hardware issues, physical damage, or energy depletion. Unlike wired or infrastructure-
based wireless networks, WSNs experience higher node failure rates. Protocols within a sensor
network should promptly detect failures and be robust enough to handle a significant number of
failures while maintaining overall network functionality. Routing protocol design plays a crucial
role in ensuring alternative paths are available for packet rerouting. Different deployment
scenarios impose varying fault tolerance requirements
3. Scalability: Sensor networks exhibit a wide range of scales, from a few nodes to potentially
hundreds of thousands. Deployment density also varies. In some cases, a node may have several
thousand neighbors within its transmission range while collecting high-resolution data. Protocols
within sensor networks must be scalable to handle these levels of complexity while maintaining
satisfactory performance.
4. Production Costs: Considering sensor nodes as disposable devices is crucial. For sensor
networks to compete effectively with traditional information-gathering approaches, individual
sensor nodes must be produced at very low cost.
5. Hardware Constraints: Every sensor node requires essential components: a sensing unit, a
processing unit, a transmission unit, and a power supply. Optionally, nodes may include built-in
sensors or additional devices like localization systems for location-aware routing. However, each
added functionality increases costs and power consumption while affecting the physical size of
the node. Balancing additional features against cost and low-power requirements is essential.
6. Sensor Network Topology: Despite advancements, WSNs remain resource-constrained
networks in terms of energy, computing power, memory, and communication capabilities.
Among these constraints, energy consumption stands out as a critical factor. Numerous
algorithms, techniques, and protocols have been developed to optimize energy usage and extend
the network’s lifetime
TOPOLOGY MAINTAINENCE
Researchers across computer science, networking, and medical domains collaborate to realize the
ambitious vision of smart healthcare. Integrating large-scale wireless telecommunication
technologies—such as 3G, Wi-Fi Mesh, and WiMAX—with telemedicine has already garnered
attention from the research community. However, further advancements lie in the harmonious
coexistence of small-scale personal area technologies like radio frequency identification (RFID),
Bluetooth, ZigBee, and wireless sensor networks (WSNs) alongside robust large-scale wireless
networks. This integration enables context-aware applications.
To achieve pervasive healthcare, leveraging existing mature wireless network technologies is
essential. However, equally critical is the development of unobtrusive small sensor devices.
These devices not only provide accurate information but also ensure reliable data delivery. The
linchpin connecting all these technologies is the application layer—the bridge between
caregivers, caretakers, sensor devices, and the entire system ecosystem. As the core of high-
quality healthcare services, intelligent, context-aware healthcare applications will play an
increasingly vital role
1. Remote Monitoring: The primary advantage of pervasive healthcare systems lies in remote
monitoring. By enabling real-time monitoring of patients during their daily lives, healthcare
professionals can swiftly identify emergency conditions in at-risk individuals. Moreover, people
with varying degrees of cognitive and physical disabilities gain greater independence and ease of
living.
2. Child and Baby Care: WSNs enhance child and baby care by providing a more secure
environment even when parents are away. These systems alleviate the dependence on specialized
caregivers.
3. Prototypes and Commercial Products: Both prototypes and commercially available products
contribute to the advancement of WSN-based healthcare solutions.
4. Common Properties: Many existing applications share common features. Typically, patients
wear one or more types of sensors, forming a Body Area Network (BAN). Simultaneously,
environmental sensors create a Personal Area Network (PAN). These networks connect to a
backbone network via a gateway node.
5. Real-Time Monitoring: Healthcare professionals and caregivers can access vital health
information in real time through graphical user interfaces (GUIs). Alerts for emergency
situations are generated by the application, and this critical information can be accessed via
mobile devices such as laptops, Personal Digital Assistants (PDAs), and smartphones.
Wireless Sensor Networks (WSNs) exhibit diverse characteristics based on their deployment
environments. Let’s explore the different types of WSNs:
1. Terrestrial WSNs:
Terrestrial WSNs efficiently communicate with base stations and consist of hundreds to
thousands of wireless sensor nodes. These nodes can be deployed either in an unstructured (ad
hoc) manner or a structured (preplanned) manner. In the unstructured mode, sensor nodes are
randomly distributed within the target area. In contrast, the preplanned mode involves optimal
placement, grid-based arrangements, and 2D or 3D placement models. These WSNs operate with
limited battery power, but some nodes are equipped with solar cells as a secondary energy
source. Energy conservation strategies include low-duty-cycle operations, minimizing delays,
and optimizing routing.
2. Underground WSNs:
Underground WSNs are more expensive to deploy, maintain, and equip compared to terrestrial
WSNs. These networks involve sensor nodes hidden below the ground surface to monitor
underground conditions. To relay information from the sensor nodes to the base station,
additional sink nodes are positioned above ground. Recharging underground sensor nodes is
challenging due to their location. Additionally, the underground environment poses
communication difficulties, characterized by high attenuation and signal loss
Underwater WSNs:
Underwater WSNs operate in aquatic environments, covering more than 70% of the Earth’s
surface. These networks involve sensor nodes and vehicles deployed underwater. Autonomous
underwater vehicles collect data from these sensor nodes. Challenges in underwater
communication include long propagation delays, limited bandwidth, and sensor failures. Energy
conservation strategies are critical due to the nodes’ limited, non-rechargeable batteries.
Multimedia WSNs:
Multimedia WSNs enable tracking and monitoring of events using multimedia data such as
images, videos, and audio. These networks consist of low-cost sensor nodes equipped with
microphones and cameras. Nodes interconnect wirelessly for data compression, retrieval, and
correlation. Challenges in multimedia WSNs include high energy consumption, substantial
bandwidth requirements, and efficient data processing and compression techniques. Proper
delivery of multimedia content necessitates ample bandwidth.
Mobile WSNs:
Mobile WSNs comprise sensor nodes capable of independent movement and interaction with the
physical environment. These mobile nodes can compute, sense, and communicate. Compared to
static sensor networks, mobile WSNs offer improved coverage, enhanced energy efficiency, and
greater channel capacity
CONCLUSION
In ongoing and future research, it is crucial to address a significant challenge related to random
failures and intentional attacks on various network models. These failures may involve the
targeted destruction of critical nodes, especially those heavily connected within the network.
Developing effective solutions for this issue will unlock numerous opportunities across domains,
LITERATURE SURVEY
In my previous presentation, I discussed the communication architecture for sensor networks and
proceeded to survey current research across all layers of the protocol stack: Physical, Data Link,
Network, Transport, and Application layers. A sensor network comprises a multitude of nodes
densely deployed near the phenomenon to be monitored. Each node collects data, with the
ultimate goal of routing this information back to a central sink. The network’s self-organizing
capabilities are essential, as the positions of individual nodes are not predetermined. Cooperation
among nodes is a fundamental characteristic, where groups work together to disseminate locally
gathered information to the user
In this section, the state-of-the-art for routing protocols for WSNs has been presented. Various
routing protocols can be classified as shown in Figure.
Energy efficiency is a critical factor in Wireless Sensor Networks (WSNs). As networks grow
larger in size and shape, individual nodes consume significant energy, leading to premature node
failure. To address this challenge, various efficient routing protocols have been developed to
extend the network’s lifetime. Here are some notable energy-efficient routing protocols
where p is the percentage of nodes that are CHs, r is the current round and G is the set of nodes
that have not served as cluster head in the past 1/p rounds
2. Steady Phase:
o In this phase, data aggregation, compression, and transmission to the sink node occur.
o LEACH aggregates original data from sensor nodes into smaller sizes for efficient transmission.
o Every node has a chance to become a cluster head, reducing the probability of sensor node
failure.
o LEACH randomizes the rotation of high-energy cluster heads, ensuring equal energy
consumption across sensors.
o Data fusion (compression) further reduces energy dissipation during data transmission.
LEACH assumes:
All nodes can transmit with sufficient power to reach the base station.
Each node has computational power to support various Medium Access Control (MAC)
protocols.
Nodes in close proximity exhibit correlated data.
. 2.2.1 MODLEACH
MODLEACH represents a new and enhanced version of the LEACH protocol. Notably, it
introduces an efficient and qualified Cluster Head (CH) replacement scheme. Here are the key
features of MODLEACH:
1. CH Replacement:
o MODLEACH incorporates an improved CH replacement mechanism.
o A predetermined threshold level determines when CHs should be replaced.
o If the current CH’s battery power exceeds the set limit, it continues to function as a CH.
o CHs change only when their battery power falls below or exceeds the threshold.
2. Threshold Levels:
o MODLEACH introduces the concept of hard and soft threshold levels.
o In the soft threshold level, slight adjustments are made to recognized attribute values, affecting
node behavior.
o The hard threshold represents a specialized technology that surpasses the predefined threshold
value recognized by the node.
3. MODLEACHST and MODLEACHHT:
o These extended versions of MODLEACH further refine the CH selection technique.
o They adopt a reactive approach and yield comparatively better results than the original
MODLEACH.
o However, weaknesses in routing techniques persist.
o Notably, these routing protocols rely on single-hop routing strategies, which may not be suitable
for large-scale networks.
4. Density-Based Operation:
o MODLEACH operates based on the density of sensor nodes.
o However, this density-centric approach can introduce instability during the setup phase.
In summary, HEED optimizes cluster head selection, contributing to energy efficiency and
overall network performance
In the soft threshold mode, even small changes in the sensed attribute value trigger data
transmission. A Cluster Head (CH) transmits two types of data to its neighbors: hard threshold (HT) and
soft threshold (ST). Here’s how they work:
1. Hard Threshold (HT):
o Nodes transmit data if the sensed attribute falls within the range of interest.
o This approach reduces the overall number of transmissions.
2. Soft Threshold (ST):
o In soft threshold mode, even small changes in the sensed attribute value trigger data transmission.
o Nodes continuously sense their environment and store the sensed values for potential transmission.
o If the sensed value meets either of the following conditions, the node transmits the data:
Sensed value > hard threshold (HT).
Sensed value approximately equals hard threshold and is greater than or equal to soft threshold (ST).
o
3. Hierarchical Structure:
o TEEN follows a cluster-based hierarchical routing protocol based on LEACH.
o The network includes simple nodes, first-level CHs, and second-level CHs.
o First-level CHs are positioned away from the base station (BS), while second-level CHs are
closer to the BS.
4. Assumptions:
o TEEN assumes that the BS and sensor nodes have the same initial energy.
o The BS can directly transmit data to all nodes in the network.
In summary, TEEN optimizes energy usage by dynamically adjusting data transmission based on
thresholds, making it suitable for time-critical applications.
]
Nodes may have to wait for their designated time slots for data transmission, which can lead to
Cluster heads continuously wait for data from nodes by keeping their transmitters active.
During each round, after selecting the cluster head, it broadcasts essential parameters, including:
In summary, APTEEN enhances TEEN by addressing these limitations and providing additional
features for efficient data collection and event responsiveness.
PEGASIS (Power-Efficient Gathering in Sensor Information Systems):
PEGASIS is an energy-efficient protocol designed for sensor networks. It builds upon the
LEACH protocol, introducing improvements to enhance data gathering efficiency. Here are the
key points:
1. Chain-Like Structure: PEGASIS organizes sensor nodes into a chain-like structure. Each node
communicates only with its closest neighbor, minimizing energy consumption during data
transmission.
2. Data Propagation: Data travels from one node to another along the chain. Only a designated
node transmits data to the base station, ensuring efficient communication.
3. Dynamic Leadership: The leader node responsible for data transmission changes periodically.
This rotation prevents overburdening a single node and maintains system robustness.
4. Global Knowledge: PEGASIS assumes that all nodes possess global knowledge of the network.
This facilitates easy chain construction using a greedy algorithm.
5. Signal Strength: Nodes determine their closest neighbor based on signal strength. Adjustments
are made to ensure that only one node’s transmission is heard at a time.
The central concept behind SPIN involves naming data using high-level descriptors or metadata.
Since all nodes can be considered base stations, information is broadcasted to every node in the
network. This allows users to query any node and receive immediate information. Nodes use
descriptive metadata to represent their collected data.
Before transmitting data, metadata is exchanged among sensor nodes through a negotiation
process, preventing redundant data transmission. Upon receiving data, each node advertises it to
its neighbors, and interested neighbors request the data via a request message. The specific
format of this metadata is application-dependent.
SPIN addresses the classic flooding problem by achieving energy efficiency through metadata
negotiation. It employs three message types: ADV (advertisement for new data), REQ (data
request), and DATA (actual data transmission). Here’s how SPIN works:
1. A node acquires new data and aims to distribute it across the network. It broadcasts an ADV
message containing metadata.
2. Interested nodes request this data by sending REQ messages, and the data is subsequently
transmitted to them.
3. Neighboring nodes repeat this process until the entire network receives the new data.
Among the various SPIN protocols, SPIN-1 and SPIN-2 stand out. These protocols incorporate
negotiation before data transmission, ensuring that only relevant information is transferred
IMPLEMENTATION OF GAF
class GAFNode:
self.id = id
self.location = location
self.energy = energy
self.grid = grid
class GAFGrid:
self.id = id
self.nodes = nodes
self.master = master
class GAFRoutingProtocol:
def __init__(self):
self.grids = []
self.nodes = []
def init(self):
self.grids.append(grid)
self.nodes.append(node)
if node.location in grid.nodes:
grid.nodes.append(node)
current_node = packet.source
if current_node in grid.nodes:
if destination in grid.nodes:
shortest_path.append(grid)
break
current_node = grid.master
return shortest_path
self.nodes[node.id].location = node.location
self.nodes[node.id].energy = node.energy
LEACH PROTOCOL
3. Introduction
LEACH is a TDMA-based MAC protocol integrated with clustering and a simple routing
protocol for wireless sensor networks (WSNs). Here are the key points:
1. Objective:
o LEACH aims to reduce energy consumption during cluster creation and maintenance, thereby
improving the WSN’s lifetime.
2. Hierarchical Approach:
o Most nodes transmit data to cluster heads.
o Cluster heads aggregate and compress data before forwarding it to the base station (sink).
3. Cluster Head Selection:
o Each node uses a stochastic algorithm to determine whether it becomes a cluster head in a given
round.
o Nodes that have been cluster heads cannot become cluster heads again for a specified number of
rounds (P).
o Afterward, each node has a 1/P probability of becoming a cluster head again.
4. Data Transmission:
o Non-cluster head nodes communicate with the closest cluster head using TDMA.
o Nodes keep their radios on only during their assigned time slots to minimize energy usage.
5. CDMA Usage:
o LEACH employs CDMA to assign different code sets to each cluster, reducing interference
between clusters.
1. Cluster-Based:
o LEACH organizes nodes into clusters.
o Each cluster has a designated cluster head.
2. Cluster Head Selection:
o Cluster heads are randomly selected each round with rotation.
o Alternatively, cluster heads can be chosen based on the sensor with the highest energy.
3. Adaptive Cluster Membership:
o Nodes can dynamically join or leave clusters based on their energy levels.
4. Data Aggregation at Cluster Head:
o Cluster heads aggregate data from member nodes before forwarding it.
5. Direct Communication with Sink/User:
o Cluster heads directly communicate with the base station (sink) or end users.
6. TDMA Communication:
o Communication within clusters is achieved using Time Division Multiple Access (TDMA).
7. Threshold Value:
o LEACH uses threshold values for various decisions within the protocol.
Wireless Sensor Networks (WSNs) employ various routing protocols, including hierarchical,
room for improvement to enhance its energy efficiency. Let’s explore LEACH and its variants in
more detail.
LEACH-A is an advanced version of the LEACH protocol that incorporates mobile agent
techniques for data processing. Here are the key points:
1. Objective:
o LEACH-A aims to decrease the node failure probability and prolong the time interval before the
first node dies (referred to as the stability period).
o It achieves this by using a heterogeneous energy protocol.
2. Synchronized Clocks:
o Each sensor node operates with a synchronized clock, allowing precise timing for each
communication round.
3. Cluster Head Selection:
o Maximum energy nodes are chosen as cluster heads (CAG nodes) for each cluster.
o These cluster heads play a crucial role in data aggregation and transmission.
4. Advantages of LEACH-A:
o Data Fusion: LEACH-A reduces the amount of transmitted information by fusing data.
o Energy Savings: TDMA/CDMA techniques enable hierarchy and efficient clustering, leading to
energy conservation.
o Robust Communication: CAG nodes continue to send data to the sink even after other normal
nodes fail.
LEACH-B employs decentralized algorithms for cluster formation in wireless sensor networks.
Here are the key points:
1. Decentralized Approach:
o Each sensor node only knows its own position and the destination node’s position.
o It lacks knowledge about other sensor nodes’ positions.
2. Cluster Formation and Data Transmission:
o LEACH-B utilizes multiple accesses to different nodes for cluster formation and data
transmission.
o Energy dissipation along the path between the destination and originating nodes is calculated.
o Based on this energy assessment, each sensor node selects its own cluster head.
3. Efficiency Improvement:
o Compared to LEACH, LEACH-B demonstrates higher efficiency due to its energy-aware
approach.
LEACH is a hierarchical protocol where most nodes transmit data to cluster heads.
Cluster heads aggregate and compress data before forwarding it to the base station (sink).
Each node uses a stochastic algorithm to decide whether it becomes a cluster head in a given
round.
LEACH assumes that nodes have radios powerful enough to reach the base station or nearest
cluster head directly, but using full power constantly would waste energy.
Nodes that have been cluster heads cannot become cluster heads again for a specified number of
rounds (P). Afterward, each node has a 1/P probability of becoming a cluster head again.
At the end of each round, non-cluster head nodes join the closest cluster head, and the cluster
head creates a transmission schedule for each node.
Properties of LEACH:
Shortcomings of LEACH:
Conclusion:
This paper provides an in-depth exploration of wireless sensor networks (WSNs), covering their
applications, network challenges, and inherent characteristics. Routing plays a crucial role in
WSNs, where energy efficiency significantly impacts network longevity. Among the hierarchical
routing protocols, LEACH stands out for its lower energy consumption. However, ongoing
research aims to further enhance energy efficiency. The paper also introduces various LEACH
variants, reflecting the continuous efforts to minimize energy usage in WSNs.
CHAPTER 4
RESULT ANALYSIS
In this study, we thoroughly examined the key features of various wireless sensor network
(WSN) technologies. Our analysis focused on factors such as the presence of one or more sinks,
node mobility (stationary or mobile), event-based formation, and the existence of a network
backbone. We critically evaluated the strengths and weaknesses of different metrics used in
WSN research, aiming to enhance and fortify the field.
When considering centralized versus distributed technologies, we found that distributed solutions
are preferable. These approaches offer scalability, autonomy for nodes, flexible deployment, and
the ability to adapt using self-organization strategies inspired by natural systems. In contrast,
centralized techniques lack broadcast or reception conflicts due to the central node’s
coordination.
However, several questions remain. How can we ensure that our application has sufficient
resources? Which technology—centralized or distributed—should we implement? Without a
precise framework for improvement, how do we choose the right approach? Can a combination
of techniques yield better performance? We conclude by summarizing the advantages and
challenges of the presented techniques and highlighting the primary classification used in our
survey of sensor networks.
Now we compare the above mentioned routing protocols according to their performance
depending on different parameters. Table 1 shows the comparison.
Protoco Mobility Power Network Scala Resource Classif Data Query Multi
gation
Based
Based Clustering
N Based
CHAPTER 5
CONCLUSION
This paper reviews relevant research on wireless sensor networks (WSNs), focusing on their
development, design, and implementation. Routing within WSNs has been a longstanding
challenge, especially when compared to traditional wired networks. Various routing techniques
have been explored for specific sensor network applications.
The study classifies routing techniques into active, reactive, and hybrid modes, as well as direct
communication and flat approaches based on task and target applications. Additionally,
clustering protocols vary based on node participation styles and network structures (hierarchical,
data-centric, or location-based).
In Chapter 2, we delve into an extensive survey of eight routing protocols: LEACH, TEEN,
APTEEN, PEGASIS, SPIN, DD, RR, and GEAR. While no single protocol is universally
superior due to the network-specific nature of sensor applications, we evaluate these protocols
based on specific parameters. Our focus lies in modifying existing routing protocols to enhance
energy efficiency across the entire system.
REFERENCES
Rabiner, Kulik, and Balakrishnan proposed adaptive protocols for information dissemination in
wireless sensor networks (WSNs) at the Fifth Annual International Conference on Mobile
Computing and Networking (MOBICOM) in 1999.
Heinzelman’s Ph.D. thesis at the Massachusetts Institute of Technology (MIT) explored
application-specific protocol architectures for wireless networks.
Ossama Younis and Sonia Fahmy proposed a hybrid, energy-efficient approach for distributed
clustering in ad-hoc sensor networks in 2002.
A. Manjeshwar and D. P. Agrawal introduced the TEEN protocol in 2001.
S. Lindsey and C.S. Raghavendra presented the PEGASIS protocol in 2002.