SlideShare a Scribd company logo
1 of 4
Download to read offline
Poonam Shrivastava et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.386-389

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Analysis of LEACH and Its Variants for Routing In Wireless
Sensor Networks
Poonam Shrivastava*, Srija Unnikrishnan**
*(Watumull Institute of Electronics Engg and Computer Technology, University of Mumbai, India)
** (Fr Conceicao Rodrigues College of Engg, University of Mumbai, India)

ABSTRACT
Wireless sensor networks (WSNs) have revolutionized many segments of our economy as well as our lives.
Various modern devices require sensory data from the real world around them. This data is provided by WSNs,
which consists of several tiny sensor nodes. Different routing protocols govern the movement of this
information. Energy efficiency is one of the main design objective for these sensor networks. Low-Energy
Adaptive Clustering Hierarchy (LEACH) is a classical cluster based routing protocol for WSNs having good
performance. In this paper we mainly focus on implementing wireless sensor network using LEACH protocol to
analyze performance of WSNs in terms of energy, throughput and lifetime using ns-2 and present a survey of
variants of LEACH , that has produced different routing protocols for WSNs and highlight their features.
Keywords - Cluster, Energy, LEACH, Lifetime, Wireless Sensor Network

I.

Introduction

WSNs with number of tiny sensor nodes;
find wide applicability in various fields, as they
enable reliable monitoring and analysis of the
environment. Within its radio communication range
each sensor node communicates wirelessly with a few
other local nodes. These sensor nodes are equipped
with small batteries with limited power capacities. If
each node transmits its sensed data directly to the
base station, then its power depletes quickly [1]. The
advancement in technology results in extremely small
and low powered devices, equipped with
programmable computing, multiple parameter sensing
and wireless communication capability [2].The sensor
nodes are small embedded computing devices that
interface with sensors or actuators and communicate
using short-range wireless transmitters. Such nodes
act autonomously as well as cooperatively to form a
logical network, in which data packets are routed
towards management nodes, called sinks or base
stations. In order to save energy, it is necessary to
schedule the state of the nodes, vary the transmission
range between the sensing nodes and use efficient
routing protocols.
On the basis of network structure, routing in
wireless sensor networks can be classified as:
i) Flat-based routing: All the nodes in this topology
have assigned the same function to perform the
sensing task.
ii) Hierarchical-based routing: In this architecture,
higher energy nodes process and send the
information, while low-energy nodes perform
sensing in the proximity of the target.
iii) Location-based routing: Routing path for the data
is decided according to the position of sensor
nodes in the field.
www.ijera.com

II.

LEACH Protocol

It is a cluster based routing protocol that
minimizes energy dissipation in sensor networks and
is proposed by W. R. Heinzelman [3]. In this
protocol, the total number of nodes are divided in
many small groups or cluster for equal distribution of
power consumption inside the network. A cluster
head (CH) is a sensor node that can be selected either
randomly or in a predefined sequential manner inside
a cluster to transmit an aggregated sensor data to the
distant base station. At every iteration, the CH shifts
to other and communicates directly to each node
inside the cluster to collect data and sends it to the
sink or router or to another CH to propagate data
towards sink. LEACH operation is divided into two
phases i.e., Setup phase and Steady-state phase.
2.1 Setup phase
In this phase clusters are formed and a CH is
chosen for each cluster. Every node produces a
random number between 0 and 1, and if this number
is less than threshold value T (n), then it becomes CH.
In every round, T(n) is set to 0, for the node which
already worked as CH before, so that this node will
not be selected again. For the nodes that have not
been selected once, the possibility of being selected is
T(n). If only one node left then T (n) =1, means this
node will be certainly selected as CH[3,4,7].
T (n) is defined as follows :
T (n) = p/ [1-p×{r mod (1/p)}] , n ε G
0,
otherwise (1)
Where,
p= percentage of number of CH in the total number of
nodes,
r = number of current round,
386 | P a g e
Poonam Shrivastava et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.386-389

www.ijera.com

G= set of nodes that have not been elected in the past
1/p rounds of election.
When any of the nodes is selected as CH, it
informs other nodes. Based on the received signal
strength non-CH nodes choose their CH for this
round. The CH node sets up a TDMA schedule and
transmits this schedule to all the nodes in its cluster
[3,4, 5, and 6].

network but energy consumption increases. Thus
there is a trade-off between energy efficiency and
accuracy. The drawback of this scheme is the
complexity of forming clusters in multiple levels.
Moreover, TEEN only transmits time-critical data
while sensing the environment continuously and the
nodes will never communicate if the thresholds are
not reached[2,11].

2.2 Steady-state phase
In this phase, the non-CH nodes start sensing
data and send it to their CH according to the TDMA
schedule. The CH node compresses the received data
and sends it to the base-station . Communication is
via direct-sequence spread spectrum and each cluster
uses a unique spreading code to reduce inter-cluster
interference. After certain period of time, the network
again goes into the setup phase and enters another
round of selecting cluster heads(CHs).

3.2 Adaptive Threshold sensitive Energy Efficient
sensor Network protocol (APTEEN)
It is an extension to TEEN and aims at both
capturing periodic data collections and reacting to
time critical events. CHs also perform data
aggregation in order to save energy. The nodes in
such a network gives an overall picture of the network
at periodic intervals in an energy efficient manner.
Such a network enables the user to request past,
present and future data from the network. The
performance of APTEEN lies between TEEN and
LEACH with respect to energy consumption and
lifetime of the network. The drawbacks of TEEN can
be overcome using APTEEN which uses periodic data
transmission. APTEEN transmits data, based on the
threshold values unlike LEACH which transmits data
at all times. But this energy saving increases the
response time[8,11].

2.3 Limitations of LEACH Protocol
A few of these assumptions are as follows:
i) All nodes can transmit with enough power to
reach the base station if needed.
ii) Nodes always have data to send.
iii) Nodes located close to each other have correlated
data.
iv) It is not obvious how the number of
predetermined CHs are going to be uniformly
distributed throughout the network. Therefore,
there is a possibility that the elected CHs will be
concentrated in one part of the network. Hence,
some nodes will not have any CH nearer to them.
v) It assumes a homogeneous distribution of sensor
nodes in the given area.
vi) CHs are selected randomly in LEACH, hence
nodes with less energy may be chosen, which
could lead to these nodes die too fast. Moreover,
in LEACH protocol CHs communicate with base
station in single-hop manner, it is energy
consuming and therefore it could not adapt to
large network[7].

III.

Variants of LEACH

3.1Threshold sensitive Energy Efficient sensor
Network protocol (TEEN)
It is a hierarchical protocol with the use of a
data-centric mechanism and is very much suitable for
time critical data sensing applications in terms of
energy consumption and response time. It is
responsive to sudden changes in the sensed attributes.
In the sensor network architecture closer nodes form
clusters and this process goes on the second level
until base station is reached. After the clusters are
formed, the CH broadcasts two thresholds to the
nodes. These are hard and soft thresholds for sensed
attributes. Hard threshold is the minimum possible
value. The soft threshold can be varied, depending on
the target application. A smaller value of the soft
threshold gives a more accurate picture of the
www.ijera.com

3.3 Power-Efficient Gathering in Sensor
Information Systems (PEGASIS)
It is a chain-based protocol and is an
improvement over LEACH protocol. In this protocol
each node
communicates only with its closer
neighbor . The data which moves from one node to
another node, aggregates and send to the base station.
In contrast to LEACH, only one node is used to
transmit data to the base station instead of using
multiple nodes. Hence it extends the network lifetime
by using collaborative techniques. Moreover,
bandwidth consumed in communication is reduced as
there is only local coordination between closer nodes.
PEGASIS has been shown to outperform LEACH by
about 100–200% for different network sizes and
topologies. It is due reduction in the number of
transmissions and receptions using data aggregation
as well as due to the elimination of overhead caused
by dynamic cluster formation in LEACH. However, it
results in excessive delay for distant node on the
chain [9,11].
3.4 Hybrid Energy-Efficient Distributed clustering
HEED (Hybrid Energy-Efficient Distributed
clustering)
This is a stand-alone distributed clustering
protocol that periodically selects CH by only
considering communication distance and the node
residual energy. Thus, a node with high residual
energy has a higher chance to become a CH. HEED
terminates the clustering process within a constant
number of iterations, incurs low message overhead,
387 | P a g e
Poonam Shrivastava et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.386-389
and achieves fairly uniform CH distribution across the
network. But, it does not guarantee the number of
selected CH. If the energy of all nodes is similarly
low, most nodes can become CH[10].HEED
outperforms LEACH in terms of prolonging network
lifetime by distributing energy consumption for a
large network[11].
3.5 Density based Cluster Head Selection
This is a subtractive clustering technique. It
overcomes the shortcomings of
basic LEACH
protocol in handling node’s non-uniform and time
variant energy distribution. In this algorithm the
sensor node with the highest probability is taken up as
the first cluster center and eliminates all nearby
sensor nodes to determine the next probable cluster
and its center location. This process continues until all
sensor nodes are covered. A CH performs data
aggregation and monitors inter as well as intra-cluster
transmission of data in the network. A multi-layer
selection criteria is considered for the selection of
CH. The first level is the Energy Filtration. It checks
the energy level of all the nodes in dominating set
(DS). The next level is based on Node Connectivity
via single hopping. The third level is based on
considering the node identity. Initially nodes are
provided a unique identity (ID), which is basically a
number. Lowest identity (LID) is simple algorithm
that selects a node with its ID lowest among the
remaining nodes in the given set . In third level LID
is considered only for the first round of CH selection.
In LEACH, the CHs are elected randomly, so the
optimal number and distribution of CHs cannot be
ensured. The nodes with low residual energy have the
same priority to be a CH as the node with high
residual energy, resulting in some node with low
residual energy may die first. Hence in this new
approach , the phenomenon of aging is used as the
load balancing parameter for selecting CH. Once, a
node from IDS becomes a CH, its probability to get
re-elected as CH reduces. Therefore proper load
distribution within clusters increases the lifespan of
the sensor network[12].
3.6 LEACH protocol using Fuzzy Logic (LEACHFL)
This protocol takes three variables battery
level, distance and node density into consideration.
As LEACH only depends on probability model, some
CHs may be very close to each other and can be
located in the edge of the WSN. These in-efficient
CHs could not maximize energy efficiency. A CH
election method using fuzzy logic has been
introduced to overcome the defects of LEACH. In this
the network lifetime can be efficiently prolonged by
using fuzzy variables : concentration , energy and
centrality. In this approach a part of energy is spent to
get the data of the three variables especially
concentration and centrality[5].

IV.
www.ijera.com

Simulation

www.ijera.com

To analyze lifetime, throughput and the
effective use of energy of a network, LEACH
algorithm is followed. It is based on two different
radio models i.e., free space model and two-ray
ground propagation model depending upon the
distance between transmitter and receiver[3,4]. When
this distance is less than threshold value i.e. d crossover,
algorithm adopts
free space model (d2 power
loss),otherwise it adopts two-ray ground propagation
model (d 4 power loss). The crossover is defined as
follows:
dcrossover = (4*π*√L*ht*hr) / λ
(2)
Transmit power is attenuated based on the distance
‘d’ between the transmitter and receiver and the
threshold value is given as:
Pr(d) = (Pt* Gt *Gr*λ2) / (4* π*d)2*L
(3)
if d< dcrossover
free space model
Pr(d) = (Pt*Gt*Gr*ht2*hr2)/d4
(4)
if d ≥ dcrossover two-ray ground propagation
where, L = 1 is system loss factor,
ht = height of transmitting antenna
hr = height of receiving antenna
λ = wavelength of carrier signal
Pt = transmitted power
Pr = received power at distance d,
Gt = gain of transmitting antenna
Gr = gain of receiving antenna
A simple model for radio energy dissipation
will be considered where the transmitter dissipates
energy to run the radio electronics and the power
amplifier, and the receiver dissipates energy to run the
radio electronics as shown in Fig.1[3].

figure1: Energy consumption model
Therefore if the transmitter sends k-bit
message to the receiver up to a distance of d, the
energy consumption of the transmitter and the
receiver can be calculated by the following equations:
ET x (k, d) = Eelec−T x (k) + Eamp−T x (k, d) (5)
ETx (k, d) = Eelec * k+ *k*d2,
d<d crossover
(6)
ETx (k, d) = Eelec* k+ *k*d4,
d≥ d crossover
(7)
ERx(k) = Eelec−Rx (k)
(8)
ERx(k) = Eelec ∗ k
(9)
where, ETx (k, d) is the energy consumed by
the transmitter to send a k-bit long packet over
distance d, Eelec−T x (k) is the energy used by the
electronics of the transmitter, and Eamp−T x (k, d) is
the energy expended by the amplifier. Whereas,
388 | P a g e
Poonam Shrivastava et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.386-389
ERx(k) is the energy consumed by the receiver in
receiving a k-bit long packet, which is given by the
energy used by the electronics of the receiver;
and
represent the energy consumption factor of
amplification in the two radio models[5].

V.

[3]

Simulation analysis and results

Simulation is carried out using network
simulator ns-2, considering 100 nodes within the area
of 1000x1000 sqm.
is 100pj/bit/m2,
is
4
0.013pj/bit/m and Eelec−T x is equal to Eelec−Rx
which is equal to Eelec and is 50nj/bit, loss factor is
1, transmitting and receiving antenna gain is 1and
radio frequency is 914MHz, using bidirectional
communication model.

[4]

[5]

Table.1 Simulation Results
% CH Life time(s) Throughput
(bits)
2
418
41968
3
351.6
38441
4
301.09
19431
5
524.1
53777
6
423
39411
7
270.99
23677
8
111.99
5309

Energy
Consumed(J)
429.28
393.52
464.04
326.799
393.965
344.68
394.694

Results show that the energy consumption is
comparatively lesser, lifetime and throughput is
comparatively higher when the no. of cluster heads
are 5 percentage of the sensor nodes.

VI.

REFERENCES

[2]

[7]

[8]

Conclusion and future scope

The energy of sensor nodes plays a very
important role because the lifetime of WSNs depends
upon the energy of these nodes. The Hierarchical
routing protocol LEACH is energy efficient for the
sensor network and is designed to improve the
lifetime of a network. Moreover, proper selection of
CH can be a better solution for making an efficient
WSN in terms of throughput, energy consumption
and life-time of sensor nodes. Analysis of the variants
of LEACH protocol for WSNs , describes various
modifications over the primitive LEACH protcol and
highlight their features. Future scope of this
Hierarchical-based routing protocol may be the use of
multi-hop routing taking into account the improved
way of choosing CHs by considering energy as well
as density of the sensor nodes to further prolong the
lifetime of wireless sensor network and to save
energy.

[1]

[6]

Stephanie Lindsey, Cauligi Raghavendra and
Krishna M. Sivalingam, Data Gathering
Algorithms in Sensor Networks Using Energy
Metrics, IEEE Transactions on parallel and
distributed systems, vol. 13, no. 9, sept., 2002.
Arati Manjeshwar and Dharma P. Agrawal,
TEEN: A Routing Protocol for Enhanced

www.ijera.com

[9]

[10]

[11]

[12]

www.ijera.com

Efficiency in Wireless Sensor Network: Proc.
of the 5th Parallel and distributed Processing
Symposium, San Francisco, IEEE, 2001.
Wendi
Rabiner
Heinzelman,
Anantha
Chandrakasan, and Hari Balakrishnan, EnergyEfficient Communication Protocol for Wireless
Micro sensor Networks, Published in the
Proceedings of IEEE the Hawaii International
Conference on System Sciences, January 4-7,
2000, Maui, Hawaii.
Rajesh Patel, Sunil Pariyani and Vijay Ukani,
Energy and Throughput Analysis of
Hierarchical Routing Protocol (LEACH) for
Wireless Sensor Network, International
Journal of Computer Applications (0975 –
8887) Volume 20– No.4, April 2011.
Ge Ran , Huazhong Zhang b, Shulan Gong,
Improving on LEACH Protocol of Wireless
Sensor Networks Using Fuzzy Logic, Journal
of Information & Computational Science 7: 3
(2010) 767–775.
Rudranath Mitra, Anurupa Biswas, Enhanced
Clusterhead Selection Algorithm Using
LEACH Protocol for Wireless Sensor
Networks, IJCER | May-June 2012 | Vol. 2 |
Issue No.3, 766-770.
WU Xiaoping, LIN Hongan and LI Gang, An
Improved Routing Algorithm Based On
LEACH
Protocol,
Ninth
International
Symposium on Distributed Computing and
Applications to Business, Engineering and
Science, 2010.
Arati Manjeshwar and Dharma P. Agrawal,
APTEEN: A Hybrid Protocol for Efficient
Routing and Comprehensive Information
Retrieval in Wireless Sensor Networks,Center
for Distributed and Mobile Computing: Proc.
of the 2nd int’l Workshop on Parallel and
Distributed Computing Issues in Wireless
Networks and Mobile Computing, Florida,
2002:195~202.
Stephanie
Lindsey
and
Cauligi
S.
Raghavendra,PEGASIS:
Power-Efficient
GAthering in Sensor Information Systems,
Aerospace Conference Proceedings,IEEE,Los
Angeles,2002, CA 90009-2957
O. Younis and S. Fahmy, HEED: A Hybrid,
Energy-Efficient,Distributed
Clustering
Approach for Ad Hoc Sensor Networks, IEEE
Trans. Mobile Computing, vol. 3(4), pp.
366~379, December 2004.
P.T.V.Bhuvaneswari
and
V.Vaidehi,
Enhancement techniques incorporated in
LEACH- a survey, Indian Journal of Science
and Technology Vol.2 No 5 (May 2009).
Priti Narwal, S.S. Tyagi, Density Based
Protocol For Head Selection In Wireless
Sensor Networks, International Journal of Soft
Computing and Engineering (IJSCE) ISSN:
2231-2307, Volume-1, Issue-3, July 2011

389 | P a g e

More Related Content

What's hot

SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNZubin Bhuyan
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksPushpita Biswas
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsnSamruddhi Gaikwad
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing ProtocolSantosh Regmi
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocolssourabhshivtiwari
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolARUNP116
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
 

What's hot (19)

SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSN
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networks
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsn
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
 
Leach
LeachLeach
Leach
 
Kianoosh&amp;sajjad
Kianoosh&amp;sajjadKianoosh&amp;sajjad
Kianoosh&amp;sajjad
 

Viewers also liked (20)

Cq36554559
Cq36554559Cq36554559
Cq36554559
 
Bk36372377
Bk36372377Bk36372377
Bk36372377
 
Bu36433437
Bu36433437Bu36433437
Bu36433437
 
Ci36507510
Ci36507510Ci36507510
Ci36507510
 
Ck36515520
Ck36515520Ck36515520
Ck36515520
 
Cf36490495
Cf36490495Cf36490495
Cf36490495
 
Cp36547553
Cp36547553Cp36547553
Cp36547553
 
Bp36398403
Bp36398403Bp36398403
Bp36398403
 
Cg36496501
Cg36496501Cg36496501
Cg36496501
 
De36636639
De36636639De36636639
De36636639
 
Da36615618
Da36615618Da36615618
Da36615618
 
Bl36378381
Bl36378381Bl36378381
Bl36378381
 
Bw36444448
Bw36444448Bw36444448
Bw36444448
 
Bt36430432
Bt36430432Bt36430432
Bt36430432
 
Bz36459463
Bz36459463Bz36459463
Bz36459463
 
By36454458
By36454458By36454458
By36454458
 
Bf36342346
Bf36342346Bf36342346
Bf36342346
 
Bi36358362
Bi36358362Bi36358362
Bi36358362
 
Bo36390397
Bo36390397Bo36390397
Bo36390397
 
Bv36438443
Bv36438443Bv36438443
Bv36438443
 

Similar to Analysis of LEACH and Its Variants for Routing in WSNs

Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
 
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTCLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTijassn
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...Chính Cao
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...ijfcstjournal
 

Similar to Analysis of LEACH and Its Variants for Routing in WSNs (20)

Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
B05630814
B05630814B05630814
B05630814
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
 
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTCLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...
 
H0421043049
H0421043049H0421043049
H0421043049
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
A04560105
A04560105A04560105
A04560105
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Analysis of LEACH and Its Variants for Routing in WSNs

  • 1. Poonam Shrivastava et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.386-389 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Analysis of LEACH and Its Variants for Routing In Wireless Sensor Networks Poonam Shrivastava*, Srija Unnikrishnan** *(Watumull Institute of Electronics Engg and Computer Technology, University of Mumbai, India) ** (Fr Conceicao Rodrigues College of Engg, University of Mumbai, India) ABSTRACT Wireless sensor networks (WSNs) have revolutionized many segments of our economy as well as our lives. Various modern devices require sensory data from the real world around them. This data is provided by WSNs, which consists of several tiny sensor nodes. Different routing protocols govern the movement of this information. Energy efficiency is one of the main design objective for these sensor networks. Low-Energy Adaptive Clustering Hierarchy (LEACH) is a classical cluster based routing protocol for WSNs having good performance. In this paper we mainly focus on implementing wireless sensor network using LEACH protocol to analyze performance of WSNs in terms of energy, throughput and lifetime using ns-2 and present a survey of variants of LEACH , that has produced different routing protocols for WSNs and highlight their features. Keywords - Cluster, Energy, LEACH, Lifetime, Wireless Sensor Network I. Introduction WSNs with number of tiny sensor nodes; find wide applicability in various fields, as they enable reliable monitoring and analysis of the environment. Within its radio communication range each sensor node communicates wirelessly with a few other local nodes. These sensor nodes are equipped with small batteries with limited power capacities. If each node transmits its sensed data directly to the base station, then its power depletes quickly [1]. The advancement in technology results in extremely small and low powered devices, equipped with programmable computing, multiple parameter sensing and wireless communication capability [2].The sensor nodes are small embedded computing devices that interface with sensors or actuators and communicate using short-range wireless transmitters. Such nodes act autonomously as well as cooperatively to form a logical network, in which data packets are routed towards management nodes, called sinks or base stations. In order to save energy, it is necessary to schedule the state of the nodes, vary the transmission range between the sensing nodes and use efficient routing protocols. On the basis of network structure, routing in wireless sensor networks can be classified as: i) Flat-based routing: All the nodes in this topology have assigned the same function to perform the sensing task. ii) Hierarchical-based routing: In this architecture, higher energy nodes process and send the information, while low-energy nodes perform sensing in the proximity of the target. iii) Location-based routing: Routing path for the data is decided according to the position of sensor nodes in the field. www.ijera.com II. LEACH Protocol It is a cluster based routing protocol that minimizes energy dissipation in sensor networks and is proposed by W. R. Heinzelman [3]. In this protocol, the total number of nodes are divided in many small groups or cluster for equal distribution of power consumption inside the network. A cluster head (CH) is a sensor node that can be selected either randomly or in a predefined sequential manner inside a cluster to transmit an aggregated sensor data to the distant base station. At every iteration, the CH shifts to other and communicates directly to each node inside the cluster to collect data and sends it to the sink or router or to another CH to propagate data towards sink. LEACH operation is divided into two phases i.e., Setup phase and Steady-state phase. 2.1 Setup phase In this phase clusters are formed and a CH is chosen for each cluster. Every node produces a random number between 0 and 1, and if this number is less than threshold value T (n), then it becomes CH. In every round, T(n) is set to 0, for the node which already worked as CH before, so that this node will not be selected again. For the nodes that have not been selected once, the possibility of being selected is T(n). If only one node left then T (n) =1, means this node will be certainly selected as CH[3,4,7]. T (n) is defined as follows : T (n) = p/ [1-p×{r mod (1/p)}] , n ε G 0, otherwise (1) Where, p= percentage of number of CH in the total number of nodes, r = number of current round, 386 | P a g e
  • 2. Poonam Shrivastava et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.386-389 www.ijera.com G= set of nodes that have not been elected in the past 1/p rounds of election. When any of the nodes is selected as CH, it informs other nodes. Based on the received signal strength non-CH nodes choose their CH for this round. The CH node sets up a TDMA schedule and transmits this schedule to all the nodes in its cluster [3,4, 5, and 6]. network but energy consumption increases. Thus there is a trade-off between energy efficiency and accuracy. The drawback of this scheme is the complexity of forming clusters in multiple levels. Moreover, TEEN only transmits time-critical data while sensing the environment continuously and the nodes will never communicate if the thresholds are not reached[2,11]. 2.2 Steady-state phase In this phase, the non-CH nodes start sensing data and send it to their CH according to the TDMA schedule. The CH node compresses the received data and sends it to the base-station . Communication is via direct-sequence spread spectrum and each cluster uses a unique spreading code to reduce inter-cluster interference. After certain period of time, the network again goes into the setup phase and enters another round of selecting cluster heads(CHs). 3.2 Adaptive Threshold sensitive Energy Efficient sensor Network protocol (APTEEN) It is an extension to TEEN and aims at both capturing periodic data collections and reacting to time critical events. CHs also perform data aggregation in order to save energy. The nodes in such a network gives an overall picture of the network at periodic intervals in an energy efficient manner. Such a network enables the user to request past, present and future data from the network. The performance of APTEEN lies between TEEN and LEACH with respect to energy consumption and lifetime of the network. The drawbacks of TEEN can be overcome using APTEEN which uses periodic data transmission. APTEEN transmits data, based on the threshold values unlike LEACH which transmits data at all times. But this energy saving increases the response time[8,11]. 2.3 Limitations of LEACH Protocol A few of these assumptions are as follows: i) All nodes can transmit with enough power to reach the base station if needed. ii) Nodes always have data to send. iii) Nodes located close to each other have correlated data. iv) It is not obvious how the number of predetermined CHs are going to be uniformly distributed throughout the network. Therefore, there is a possibility that the elected CHs will be concentrated in one part of the network. Hence, some nodes will not have any CH nearer to them. v) It assumes a homogeneous distribution of sensor nodes in the given area. vi) CHs are selected randomly in LEACH, hence nodes with less energy may be chosen, which could lead to these nodes die too fast. Moreover, in LEACH protocol CHs communicate with base station in single-hop manner, it is energy consuming and therefore it could not adapt to large network[7]. III. Variants of LEACH 3.1Threshold sensitive Energy Efficient sensor Network protocol (TEEN) It is a hierarchical protocol with the use of a data-centric mechanism and is very much suitable for time critical data sensing applications in terms of energy consumption and response time. It is responsive to sudden changes in the sensed attributes. In the sensor network architecture closer nodes form clusters and this process goes on the second level until base station is reached. After the clusters are formed, the CH broadcasts two thresholds to the nodes. These are hard and soft thresholds for sensed attributes. Hard threshold is the minimum possible value. The soft threshold can be varied, depending on the target application. A smaller value of the soft threshold gives a more accurate picture of the www.ijera.com 3.3 Power-Efficient Gathering in Sensor Information Systems (PEGASIS) It is a chain-based protocol and is an improvement over LEACH protocol. In this protocol each node communicates only with its closer neighbor . The data which moves from one node to another node, aggregates and send to the base station. In contrast to LEACH, only one node is used to transmit data to the base station instead of using multiple nodes. Hence it extends the network lifetime by using collaborative techniques. Moreover, bandwidth consumed in communication is reduced as there is only local coordination between closer nodes. PEGASIS has been shown to outperform LEACH by about 100–200% for different network sizes and topologies. It is due reduction in the number of transmissions and receptions using data aggregation as well as due to the elimination of overhead caused by dynamic cluster formation in LEACH. However, it results in excessive delay for distant node on the chain [9,11]. 3.4 Hybrid Energy-Efficient Distributed clustering HEED (Hybrid Energy-Efficient Distributed clustering) This is a stand-alone distributed clustering protocol that periodically selects CH by only considering communication distance and the node residual energy. Thus, a node with high residual energy has a higher chance to become a CH. HEED terminates the clustering process within a constant number of iterations, incurs low message overhead, 387 | P a g e
  • 3. Poonam Shrivastava et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.386-389 and achieves fairly uniform CH distribution across the network. But, it does not guarantee the number of selected CH. If the energy of all nodes is similarly low, most nodes can become CH[10].HEED outperforms LEACH in terms of prolonging network lifetime by distributing energy consumption for a large network[11]. 3.5 Density based Cluster Head Selection This is a subtractive clustering technique. It overcomes the shortcomings of basic LEACH protocol in handling node’s non-uniform and time variant energy distribution. In this algorithm the sensor node with the highest probability is taken up as the first cluster center and eliminates all nearby sensor nodes to determine the next probable cluster and its center location. This process continues until all sensor nodes are covered. A CH performs data aggregation and monitors inter as well as intra-cluster transmission of data in the network. A multi-layer selection criteria is considered for the selection of CH. The first level is the Energy Filtration. It checks the energy level of all the nodes in dominating set (DS). The next level is based on Node Connectivity via single hopping. The third level is based on considering the node identity. Initially nodes are provided a unique identity (ID), which is basically a number. Lowest identity (LID) is simple algorithm that selects a node with its ID lowest among the remaining nodes in the given set . In third level LID is considered only for the first round of CH selection. In LEACH, the CHs are elected randomly, so the optimal number and distribution of CHs cannot be ensured. The nodes with low residual energy have the same priority to be a CH as the node with high residual energy, resulting in some node with low residual energy may die first. Hence in this new approach , the phenomenon of aging is used as the load balancing parameter for selecting CH. Once, a node from IDS becomes a CH, its probability to get re-elected as CH reduces. Therefore proper load distribution within clusters increases the lifespan of the sensor network[12]. 3.6 LEACH protocol using Fuzzy Logic (LEACHFL) This protocol takes three variables battery level, distance and node density into consideration. As LEACH only depends on probability model, some CHs may be very close to each other and can be located in the edge of the WSN. These in-efficient CHs could not maximize energy efficiency. A CH election method using fuzzy logic has been introduced to overcome the defects of LEACH. In this the network lifetime can be efficiently prolonged by using fuzzy variables : concentration , energy and centrality. In this approach a part of energy is spent to get the data of the three variables especially concentration and centrality[5]. IV. www.ijera.com Simulation www.ijera.com To analyze lifetime, throughput and the effective use of energy of a network, LEACH algorithm is followed. It is based on two different radio models i.e., free space model and two-ray ground propagation model depending upon the distance between transmitter and receiver[3,4]. When this distance is less than threshold value i.e. d crossover, algorithm adopts free space model (d2 power loss),otherwise it adopts two-ray ground propagation model (d 4 power loss). The crossover is defined as follows: dcrossover = (4*π*√L*ht*hr) / λ (2) Transmit power is attenuated based on the distance ‘d’ between the transmitter and receiver and the threshold value is given as: Pr(d) = (Pt* Gt *Gr*λ2) / (4* π*d)2*L (3) if d< dcrossover free space model Pr(d) = (Pt*Gt*Gr*ht2*hr2)/d4 (4) if d ≥ dcrossover two-ray ground propagation where, L = 1 is system loss factor, ht = height of transmitting antenna hr = height of receiving antenna λ = wavelength of carrier signal Pt = transmitted power Pr = received power at distance d, Gt = gain of transmitting antenna Gr = gain of receiving antenna A simple model for radio energy dissipation will be considered where the transmitter dissipates energy to run the radio electronics and the power amplifier, and the receiver dissipates energy to run the radio electronics as shown in Fig.1[3]. figure1: Energy consumption model Therefore if the transmitter sends k-bit message to the receiver up to a distance of d, the energy consumption of the transmitter and the receiver can be calculated by the following equations: ET x (k, d) = Eelec−T x (k) + Eamp−T x (k, d) (5) ETx (k, d) = Eelec * k+ *k*d2, d<d crossover (6) ETx (k, d) = Eelec* k+ *k*d4, d≥ d crossover (7) ERx(k) = Eelec−Rx (k) (8) ERx(k) = Eelec ∗ k (9) where, ETx (k, d) is the energy consumed by the transmitter to send a k-bit long packet over distance d, Eelec−T x (k) is the energy used by the electronics of the transmitter, and Eamp−T x (k, d) is the energy expended by the amplifier. Whereas, 388 | P a g e
  • 4. Poonam Shrivastava et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.386-389 ERx(k) is the energy consumed by the receiver in receiving a k-bit long packet, which is given by the energy used by the electronics of the receiver; and represent the energy consumption factor of amplification in the two radio models[5]. V. [3] Simulation analysis and results Simulation is carried out using network simulator ns-2, considering 100 nodes within the area of 1000x1000 sqm. is 100pj/bit/m2, is 4 0.013pj/bit/m and Eelec−T x is equal to Eelec−Rx which is equal to Eelec and is 50nj/bit, loss factor is 1, transmitting and receiving antenna gain is 1and radio frequency is 914MHz, using bidirectional communication model. [4] [5] Table.1 Simulation Results % CH Life time(s) Throughput (bits) 2 418 41968 3 351.6 38441 4 301.09 19431 5 524.1 53777 6 423 39411 7 270.99 23677 8 111.99 5309 Energy Consumed(J) 429.28 393.52 464.04 326.799 393.965 344.68 394.694 Results show that the energy consumption is comparatively lesser, lifetime and throughput is comparatively higher when the no. of cluster heads are 5 percentage of the sensor nodes. VI. REFERENCES [2] [7] [8] Conclusion and future scope The energy of sensor nodes plays a very important role because the lifetime of WSNs depends upon the energy of these nodes. The Hierarchical routing protocol LEACH is energy efficient for the sensor network and is designed to improve the lifetime of a network. Moreover, proper selection of CH can be a better solution for making an efficient WSN in terms of throughput, energy consumption and life-time of sensor nodes. Analysis of the variants of LEACH protocol for WSNs , describes various modifications over the primitive LEACH protcol and highlight their features. Future scope of this Hierarchical-based routing protocol may be the use of multi-hop routing taking into account the improved way of choosing CHs by considering energy as well as density of the sensor nodes to further prolong the lifetime of wireless sensor network and to save energy. [1] [6] Stephanie Lindsey, Cauligi Raghavendra and Krishna M. Sivalingam, Data Gathering Algorithms in Sensor Networks Using Energy Metrics, IEEE Transactions on parallel and distributed systems, vol. 13, no. 9, sept., 2002. Arati Manjeshwar and Dharma P. Agrawal, TEEN: A Routing Protocol for Enhanced www.ijera.com [9] [10] [11] [12] www.ijera.com Efficiency in Wireless Sensor Network: Proc. of the 5th Parallel and distributed Processing Symposium, San Francisco, IEEE, 2001. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, EnergyEfficient Communication Protocol for Wireless Micro sensor Networks, Published in the Proceedings of IEEE the Hawaii International Conference on System Sciences, January 4-7, 2000, Maui, Hawaii. Rajesh Patel, Sunil Pariyani and Vijay Ukani, Energy and Throughput Analysis of Hierarchical Routing Protocol (LEACH) for Wireless Sensor Network, International Journal of Computer Applications (0975 – 8887) Volume 20– No.4, April 2011. Ge Ran , Huazhong Zhang b, Shulan Gong, Improving on LEACH Protocol of Wireless Sensor Networks Using Fuzzy Logic, Journal of Information & Computational Science 7: 3 (2010) 767–775. Rudranath Mitra, Anurupa Biswas, Enhanced Clusterhead Selection Algorithm Using LEACH Protocol for Wireless Sensor Networks, IJCER | May-June 2012 | Vol. 2 | Issue No.3, 766-770. WU Xiaoping, LIN Hongan and LI Gang, An Improved Routing Algorithm Based On LEACH Protocol, Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science, 2010. Arati Manjeshwar and Dharma P. Agrawal, APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks,Center for Distributed and Mobile Computing: Proc. of the 2nd int’l Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, Florida, 2002:195~202. Stephanie Lindsey and Cauligi S. Raghavendra,PEGASIS: Power-Efficient GAthering in Sensor Information Systems, Aerospace Conference Proceedings,IEEE,Los Angeles,2002, CA 90009-2957 O. Younis and S. Fahmy, HEED: A Hybrid, Energy-Efficient,Distributed Clustering Approach for Ad Hoc Sensor Networks, IEEE Trans. Mobile Computing, vol. 3(4), pp. 366~379, December 2004. P.T.V.Bhuvaneswari and V.Vaidehi, Enhancement techniques incorporated in LEACH- a survey, Indian Journal of Science and Technology Vol.2 No 5 (May 2009). Priti Narwal, S.S. Tyagi, Density Based Protocol For Head Selection In Wireless Sensor Networks, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-3, July 2011 389 | P a g e