SlideShare a Scribd company logo
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 10, Issue 3 Ver. III (May – Jun. 2015), PP 29-35
www.iosrjournals.org
DOI: 10.9790/1676-10332935 www.iosrjournals.org 29 | Page
Energy-Efficient Routing Cluster Protocols for Wireless Sensor
Network
Kritika, Ashok Kumar
1,1 Electronic and Communication Engineering Department & Applied Science, Ambala, Harayana, India
Abstract: Wireless Sensor Networks (WSNs) consist of small nodes with sensing, calculation and wireless
communications capability. Many routing, capacity management, and data circulation protocols have been specifically
designed for WSNs where energy alertness is an needed method issue. The final development in the wireless network is the
main condition for us to choose this topic. The focus has been given to the routing protocols which might differ depending
on the application and network architecture. In this paper, we present a analyses of the state-of-the-method routing
techniques in WSNs. We first diagram the design challenges for routing protocols in WSNs followed by an exhaustive of
some of the routing techniques. Overall, the routing techniques are classified into three categories based on the underlying
network structure: flat, hierarchical, and location-based routing .These protocols can be divided into lifetime -based, and
Qos-based, depending on the protocol operation. We review the design trade-offs between energy and communication
upward savings in some of these routing paradigm. We also mention the advantages and achievement issues of each routing
technique.
Keywords: Sensor Networks; Clustering Routing; LEACH; C LEACH;TL-LEACH, PEGASIS.
I. Introduction
Wireless Sensor Networks (WSNs) consists of tiny sensors nodes or environmental conditions such as
temperature, sound, fluctuation, pressure,gesture at different locations. The evolution of wireless sensor
networks was originally inspire by military applications for battlefield neglect. In these situations, it is difficult
to replace the dead nodes caused by energy’s depletion with new ones to supply energy for the system.,sensor
nodes working as deep as possible is the main method to maximize the life cycle of the system. The energy’s
consumption of sensor node mainly emerge from the long distance transmission of data along the routing path,
an efficient routing path formed by the routing protocol will have a great contact on the energy’s consumption
[3]. So how to design an energy-efficient routing protocol becomes the main goal for the wireless sensor
network.Therefore, wireless sensor networks are used in many civilian applications including environmental and
home monitoring, health-care applications etc. This network enclose a large number of nodes which sense data
from an desperately inaccessible area and send their data toward a processing center which is called “sink”.
Since sensor nodes are power constrained devices, frequent and long-distance transmissions should be kept to
minimum in order to prolong the network lifetime [1] Thus, communication between the sensor nodes and the
base station is expensive, and there are no “high-energy” nodes through which communication can proceed.
WSN are a widely applicable, major metalise technology. They bring a whole host of novel research challenges
refer to energy efficiency, robustness, scalability, self-configuration, etc. These challenges must be take up at
multiple levels through different protocols and mechanisms. Present partial solutions offer much hope for the
future, but much work remains to be done. The use of clusters for transmitting data to the base station the
advantages of small transmit distances for most nodes,compelling only a few nodes to transmit far distances to
the base station. However, LEACH show better clustering algorithms by using adaptive clusters and rotating
cluster-heads, among all the sensors. In addition, we show LEACH is able to perform local computation in each
cluster to reduce the amount of data that must be transmitted to the base station. Clustering routing algorithms
are now an active part of routing technology in WSNs due to various advantages, such as more scalable, less
load, less energy consumption and more robustness [1][4]. The rest of the paper is organized as follows: Section
II provides an overview of the LEACH,LEACH-C, ER-LEACH, PEGASIS, LEACH -SM TL LEACH AND V -
LEACH Protocols.In section III, we simulate and compare the protocols. Finally, Section IV concludes this
paper.
II. Literature Survey
The report on a Energy Efficient Clustering Protocols for Wireless Sensor Network by analysing the
advantages and disadvantages of conventional routing protocols using our model of sensor networks, then
developed LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that minimizes
energy dissipation in sensor network.
Different LEACH parameters are studied. Firstly, Allen et al. [17] presented that sensor networks with
the ability to have small devices physically distributed near the objects being sensed brings new opportunities to
observe and act on the world, for example with micro-habitat monitoring, structural monitoring, and wide-area
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 30 | Page
environmental systems. After that Effen et .al [16] presented that wireless sensor networks with thousands of
tiny sensor nodes and expected to find wide applicability and increasing deployment in coming years as they
enabled reliable monitoring and analysis of the environment. This paper proposed a modification to a well-
known protocol for sensor called Low Energy Adaptive Clustering Hierarchy ). Akyildiz et .al [13], further
analyzed that energy conservation have a main priority in all technology and engineering field. Most current
applications that consume energy could be customized or optimized in a process resulting less energy
consumption. Heinemann et al. [11] presented in underwater sensor networks and highlighted potential
applications to off-shore oilseeds for constant monitoring, equipment monitoring, and underwater robotics.
Then, Heinemann et al. [10] analyzed networking of hundreds or thousands of cheap micro sensor nodes and
allowed users to accurately monitor a remote environment by intelligently combining the data from the
individual nodes. Heinzelman et al. [9] proposed that the Hybrid Energy Efficient Distributed protocol for the
heterogeneous wireless sensor network W. Heinzelman et al.[8] presented wireless sensor networks with
thousands of tiny sensor nodes that expected to find wide applicability and increasing deployment in coming
years, as they enable reliable monitoring and analysis of the environment.Balakrishna et al. [7] presented a
growing interest in wireless sensor networks. The hot point in these algorithms was the cluster head selection.
Rabiner et al. presented [6] that the energy conservation had a main order in all technology and engineering
field. Handy et al. [5] presented wireless distributed micro sensor systems which invest the reliable monitoring
of a variety of environments for both civil and military applications. V.Mhatre et al. [4] focused on reducing the
power consumption of wireless micro sensor networks.Manjeshwar et al. [3] presented a formal classification of
sensor networks, based on their mode of functioning, as proactive and reactive networks. Reactive networks, as
opposed to passive data collecting proactive networks. Hssane et al. [2] presented wireless sensor network
(WSN) which was a power constrained system, since nodes run on limited power batteries which shorten its
lifespan. Kumar et al. [1] presented hybrid energy efficient distributed protocol for the homogeneous wireless
sensor network. The main requirements of wireless sensor network were to prolong the network lifetime and
energy efficiency.
III. Leach Protocols
A. Brief Description
LEACH, an application-specific protocol develop. The application that normal micro sensor networks
mean the monitoring of a remote environment. Since living nodes’ data are related in a sensor network, the end
user does not require all the redundant data; rather, the end user needs a high-level purpose of the data that show
the events appearing in the environment. Because the correlation is capable between data signals from nodes
located close to each other, we chose to use a clustering infrastructure as the basis for LEACH. This confess all
data from nodes within the cluster to be processe locally, reducing the data set that needs to be transmitted to the
end user. In particular, data aggregation methods can be used to combine several related data signals into a
smaller set of information that maintains the compelling data (i.e., the information content) of the original
signals. Therefore, much less actual data needs to be transmitted from the cluster to the base station (BS).
LEACH may be better when these assumptions do not hold. In LEACH, the nodes classify themselves
into local clusters, with one node acting as the cluster head. All non-cluster head nodes transmit their data to the
cluster head, while the cluster head node receives data from all the cluster members, performs signal processing
part on the data (e.g., data aggregation), and transmits data to the remote BS. LEACH Low-Energy Adaptive
Clustering Hierarchy (LEACH) was proposed by Heinzelman [5] and is one of the first clustering routing
algorithms proposed for WSNs. LEACH was originally for wireless micro-sensor networks. LEACH is based on
a clustering infrastructures, as all the data is handled in the cluster locally and only limited data is sent to the end
user
B. LEACH-C
LEACH-Centralized [6] is an advancement of LEACH, it uses the variable steady state protocol as of
LEACH but, uses a consolidate clustering algorithm for cluster formation. During the set up phase all the nodes
transmits its area and energy level to the BS and then the BS decides which nodes should be CH and which
nodes should combine to which CH. After this the BS broadcasts a message containing the CH ID for each
node, if it accept its own ID it knows it is the CH. LEACH-C and LEACH have the same steady state phase.
C. TL-LEACH
The cluster formation protocol is a local process that recognise, a two-level hierarchy .In this way each
node can decide to result in a good cluster. The use of two-levels of clusters for transmitting data to the base
stations leverages the advantages of small transmit distances for more nodes more than in the beginning
LEACH. In this way less nodes are required to transmit far distances to the base station and it is especially true
in networks where the density of nodes is high. The use of clusters for transmitting data to the base station
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 31 | Page
advantages of small transmit distances for most nodes, involving only a few nodes to transmit far distances to
the base station.
Fig 2 Token Passing Scheme
D. V-Leach
V-LEACH protocol, the cluster contains; CH (responsible only for sending data that is received from
the cluster members to the BS), vice-CH (the node that will become a CH of the cluster in case of CH dies),
cluster nodes (gathering data from environment and send it to the CH .In the newest LEACH, the CH is always
on receiving data from cluster members, combined these data and then send it to the BS that might be located
far away from it. The CH will die previous than the other nodes in the cluster because of its operation of
receiving, sending and overhearing. When the CH die, the cluster will become worthless because the data
gathered by cluster nodes will never reach the base station. In V-LEACH protocol,likewise having a CH in the
cluster, there is a vice-CH that takes the role of the CH when the CH dies because the reasons we show above by
doing this, cluster nodes data will always reach the BS; no need to elect a new CH each time the CH dies.me.
Fig.3 V -LEACH PROTOCOL
The main issue with LEACH protocol lies in the random selection of cluster heads. There exists a
probability that the cluster heads formed are unbalanced and may remain in one part of the network making
some part of the network unreachable. This problem is resolved by using the concept of V-Leach. V Leach uses
the concept of alternate Cluster Head called Vice Cluster Head and finally the network dies completely.
E. PEGASIS
Power-Efficient Gathering in Sensor Information Systems (PEGASIS) [7] is an improved version of
LEACH. The goal of PEGASIS is that the node discourse to the other nodes in its organise and the nodes take
turns to become a CH. It only selects one node as a CH to send data to the BS in each round. Each node
compare with its close next door neighbors and takes turns to correspond with the BS.
• Phase 1: Chain Construction: Starting from the node furthest from the BS the chain is constructed using a
greedy algorithm, the chain formation can be adept by the sink or the nodes itself.
• Phase 2: Data gathering and Transmission to BS: One node is selected as the CH randomly that communicates
with the BS. When a node dies in the network a new chain is formed by passing the dead node. The CH receives
all the fused data from the Sensor Node (SN) and sends it to the Base Station (BS). Data transmission in
PEGASIS.
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 32 | Page
FIG. 4 LEACH NETWORK
F. Efficient-Routing Leach (ER-LEACH)
Efficient Routing LEACH (ER-LEACH) [3] which is a modified version of the well-known LEACH
protocol.There are three contributions in this protocol which are upgrading the selection of the cluster head
during setup phase by taking into account the residual energy of any sensor node which intends to become a CH
to prolong the network lifetime. The second contribution is trying to reduce the overhead of dynamic clusters
generation by using alternative CH which is expected to take the role of the CH in case that the underlying CH
died which will prolong the lifetime of each cluster, and finally for the sake of load balancing the zone routing
protocol is used which attempts to balance the load over CHs evenly by permitting the CH to discover the
optimal route to the BS with less cost messages update and then sends the fused data to the BS through many
other CHs instead of direct sending to the BS. ER-LEACH is normal to perform well especially when the
mobility is very high and will prolong the overall network lifetime through load balancing
G. Leach – Spare Management (LEACH-SM)
LEACH-SM protocol [5] modifies LEACH by enhancing it with an efficient management of spares. It
is also designed for static sensor nodes and static targets. LEACH-SM contract with both energy-consumption in
efficiencies of LEACH. LEACH-SM adds a phase, called the spare selection phase.
IV. Comparison Of Leach,Leach-C, Er-Leach, Pegasis, Leach -Sm Tl Leach
And V - Leach
There are many techniques available for data evaluation such as real-life measurements, analytic
modeling and software simulations. For real-life measurements we will require hardware to set up a wireless
sensor network. This is not a feasible method for data evaluation as we usually want to acquire data for
hundreds of nodes and to setup such a large network can be a time and money consuming task. The second
method which involves formulating mathematical equations for the network. This also is a very heavy task as it
will involve a lot of time consuming and clear calculations. So we will use simulation using Network
Simulator-2 (NS-2) [8] to imitate the behavior of a WSN.
A.Throughput
To represent the throughput of each protocol we use data received at the BS with respect to time and
energy dissipation. LEACH-C performs 20% better than LEACH due to the built up computation by the BS to
find better clusters. LEACH-C successfully delivers more data to the BS than LEACH with respect to both time
and energy. Hence proving that LEACH-C has a higher throughput than LEACH..PEGASIS performs better
than both LEACH and LEACH-C. PEGASIS performs 260% better than LEACH and 200% better than
LEACH-C.TL LEACH performs better than LEACH, LEACH-C and PEGASIS..In TL LEACH throughput
(data signals received at the BS) .
B.Network Lifetime
To represent network lifetime we will compare the nodes alive of each protocol to time and data
received at BS. PEGASIS sends multifold data to the BS in comparison to LEACH or LEACH-C.PEGASIS
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 33 | Page
deliver the most data per unit energy followed by LEACH-C and then than LEACH, hence PEGASIS achieves
both energy efficiency and latency efficiency but TL LEACH achieve density of nodes is high .
LEACH is not as efficient as LEACH-C or PEGASIS (LEACH-C delivers about 20% and PEGASIS
delivers more than 250% data per unit energy than LEACH respectively). The reason for this is that in LEACH-
C the BS has global information of the position and energy of the other nodes, due to it can create enhanced
clusters that need lesser energy for transmission. PEGASIS outperforms LEACH and LEACH-C as it removes
the overhead of dynamic cluster information, PEGASIS also minimizes the sum of distances and restrict the
number of transmissions, but TL LEACH require less nodes to transmit far distances to the base station
,network lifetime of TL LEACH (number of nodes alive over time).
C.Energy Consumption
As LEACH-C is able to send more data packets per unit energy consumed which confirm that LEACH-
C performs better than LEACH in terms of energy consumption. PEGASIS consumes the least energy to per
data packet sent to the BS and behave the best and hence is the most energy efficient. In TL LEACH we do
not assume any constant energy dissipating nor do we remove energy during carrier-sense operations.
D. CH Selection
In clustering head selection of LEACH and V -LEACH is arbitrary,C - LEACH CH Selection done by
BS based on energy.T-L LEACH is also based on energy.In ER-LEACH CH Selection based on Energy
decided with in the cluster and at last LEACH -SM , during the cluster setup phase ,each node decided in lateral
whether should become in active primary node or passive spare node.In PEGASIS data gathering and
Transmission done by BS on each node correspond with its close next door neighbors and takes turns to
correspond with the BS.
E. Data Transmission
In LEACH and C LEACH both are all CH sends directly to BS.In V - LEACH Vice CH takes over CH
in case CH dies,ER-LEACH if the base station is not within range of CH ,it routed the CH in case of deadhead
and LEACH SM the passive spare nodes goes to asleep where the data is transmitted through the primary active
node.
F. Mobility
The mobility of LEACH ,C LEACH and V LEACH is stationary but ER-LEACH refers to mobile and
SM-LEACH designed for static sensor nodes and static targets.
V. Routing Challenges And Design Issue In Wsns
The design of routing protocols in WSNs is formed by many demanding factors. These factors must be
efficient communication can be achieved in WSNs.
A. Node deployment
Node deployment in WSNs is application debased and modify the performance of the routing protocol.
The performance can be either deterministic or randomized. In deterministic deployment, the sensors are
annually placed and data is routed through pre-determined paths. However, in odd node deployment, the sensor
nodes are dispersed randomly creating an infrastructure in an ad hoc manners. Therefore, it is most likely that a
route will consist of multiple wireless hop.
B. Energy consumption without losing accuracy
Sensor nodes can use up their limited supply of energy operating computations and transmitting
information in a wireless environment. As such, energy sustain forms of communication. In a multihop WSN,
each node show a dual role as data sender and data router.
C. Data Reporting Model
Data sensing and reporting in WSNs is a based on the application and the time essential of the data
reporting. Data reporting can be classified as either time-driven ,event-driven, query-driven, and hybrid.The
time-driven require periodic data monitoring. Sensor nodes will periodically switch on their sensors and
transmitters, sense the environment and transmit the data of relevance at steady periodic time intervals.
D. Fault Tolerance
Some sensor nodes may fail or be blocked due to lack of power or environmental interference etc. The
deficit of sensor nodes should not affect the overall task of the sensor network. If various nodes fail, MAC and
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 34 | Page
routing protocols must involve formation of new links and routes to the data collection base stations and require
adjusting transmit powers and signaling rates on the existing links to reduce energy consumption. Therefore,
various levels of redundancy may be needed in a fault-tolerant sensor network.
E. Scalability
The number of sensor nodes deployed in the sensing area may be in order of hundreds or thousands or
many Any routing scheme must be able to work with this large number of sensor nodes. In addition, sensor
network routing protocols should be expansible to respond to events in the environment. Until most of the
sensors can remain in the sleep state with data from the few remaining sensors providing a quality.
F. Network Dynamics
Most of the network architectures assume that sensor nodes are static. However, mobility of both BS’s
or sensor nodes is sometimes need in many applications.Routing messages from or to moving nodes is more
impose. Since route stability becomes a important to energy, bandwidth etc.
VI. Conclusions
In this paper,Wireless sensor networks consists of thousands of tiny, low cost, low power and
multifunctional sensor nodes where each sensor node has very low battery life. Various energy efficient
algorithms have been designed for this. LEACH uses distributed cluster formation & randomized rotation of the
cluster head to minimize the network energy consumption. This paper proposes a new version of LEACH
protocol called V LEACH protocol,there is less number of dead nodes,Number of alive nodes is enhanced,
Based on our MATLAB simulations described above, we are confident that LEACH will outperform
conventional communication protocols, in terms of energy dissipation, ease of configuration, and system
lifetime / quality of the network.The proposed work improvement over the V-Leach; in this proposed work we
are trying to improve the network life., initially when the cluster heads are selected based on the energy and the
distance parameters; we also select the Vice Cluster Head. LEACH show better clustering algorithms by using
adaptive clusters and rotating cluster-heads, among all the sensors. In addition, we show LEACH is able to
perform local computation in each cluster to reduce the amount of data that must be transmitted to the base
station.,routing technology show in WSNs due to various advantages, such as more scalable, less load, less
energy consumption and more robustness
References
[1]. SasikumarM,Dr.R.Anitha,February2014.“Performance Evaluation of Heterogeneous HEED Protocol for Wireless Sensor Networks”,
International Journal of Advanced Research in Computer and Communication Engineering Volume 3, Issue 2.
[2]. Abderrahim BENI HSSANE , Mosley Lahcen HASNAOUI ,2010. “Improved and Balanced LEACH for heterogeneous s wireless
sensor networks”, Ben Alla Said et al. / (IJCSE) International Journal on Computer Science and Engineering Volume. 02, Number
08.
[3]. V.Mhatre and C. Rosenberg, “Homogeneous vs. heterogeneous clustered sensor networks: A comparative study,” in
Proceedingsof 2004IEEE International Conference on Communications (ICC 2004) June 2000.
[4]. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, January 2000.”Energy-Efficient CommunicatioProtocol
for Wireless Microsensor Networks”Copyright 2000 IEEE. Published in the Proceedings of the Hawaii International Conference on
System Sciences, January 4-7, 2000, Maui, Hawa
[5]. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. “uAMPS ns Code Extensions”.
http://wwwmtl.mit.edu/research/icsystems/uamps/ leach.
[6]. W. R. Heinzelman, “Application-Specific Protocol Architectures for Wireless Networks,” Ph.D. thesis, Massachusetts Institute of
Technology, 2000.
[7]. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari “Energy-Efficient Communication Protocol for Wireless Microsensor
Networks” Copyright 2005 IEEE. Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4-
7, 2000, Maui, Hawaii.
[8]. Wendi B. Heinzelman February “An Application-Specific Protocol Architecture for Wireless Microsensor Networks” IEEE
TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 1,NO. 4, february 2000
[9]. M. Bani Yassein, A. Al-zou'bi, Y. Khamayseh, W. Mardini “ Improvement on LEACH Protocol of Wireless Sensor Network
(VLEACH)”
[10]. Bluetooth Project. http://www.bluetooth.com, 2011.
[11]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E.Cayirci, “A Survey on Sensor Networks”, IEEE Communications Magazine 40 (8)
(2002)104-112,pp. 234
[12]. G. Simon, M. Maroti, A. Ledeczi, G. Balogh, B. Kusy, A. Nadas, G. Pap, J. Sallai, K. Frampton, , 2004. “Sensor Network-Based
Counters Niper System”, In Proceedings of the Second International Conference on Embedded Networked Sensor Systems (Sensys),
Baltimore, MD,pp. 984
[13]. J. Yick, B. Mukherjee, D. Ghosal, 2002“Analysis of a Prediction-Base Mobility Adaptive Tracking Algorithm”, the IEEE Second
International Conference on Broadband Networks,pp. 541-545
[14]. M. Castillo-Effen, D.H. Quintela, R. Jordan, W. Westhoff, W. Moreno, 2004 "Wireless Sensor Networks for Flash-Flood Alerting”, in
Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits and Systems, Dominican Republic,pp. 231
[15]. G. Wener-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, M. Walsh, 2006. “A Wireless Sensor Network on an Active
Volcano, Data-Driven Applications in Sensor Networks”,IEEE Internet Computing, March/April. Volume 2, Issue Number 5, pp. 765
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 35 | Page
[16]. V. Raghunathan, A. Kansai, J. Hse, J. Friedman, M. Srivastava, 2005,"Design Considerations for Solar Energy Harvesting Wireless
Embedded Systems", in Proceedings of the IPSN ,Volume 1, Issue Number 5,pp. 897
[17]. P. Zhang, C.M. Sadler, S.A. Lyon, M. Martonosi, 2004, "Hardware Design Experiences in Zebranet", Proceedings of the SenSys’04,
Baltimore, MD, Volume 2, Issue Number 5,pp.765
[18]. S. Roundy, J.M. Rabaey, P.K. Wright, 2004,"Energy Scavenging for Wireless Sensor Networks" ,Volume 41, Issue Number 5,pp. 762.
[19]. M. Rahimi, H. Shah, G.S. Sukhatme, J. Heideman, D. Estrin, 2003, "Studying the Feasibility of Energy Harvesting in Mobile Sensor
Network " the IEEE ICRA, Volume 41, Issue Number 5, pp. 19–24.
[20]. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks. 2002, 38, 393–422.

More Related Content

What's hot

Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
IAEME Publication
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
IJCNCJournal
 
Survey: energy efficient protocols using radio scheduling in wireless sensor ...
Survey: energy efficient protocols using radio scheduling in wireless sensor ...Survey: energy efficient protocols using radio scheduling in wireless sensor ...
Survey: energy efficient protocols using radio scheduling in wireless sensor ...
IJECEIAES
 

What's hot (18)

3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)
 
FUNDAMENTALS OF WSN
FUNDAMENTALS OF WSNFUNDAMENTALS OF WSN
FUNDAMENTALS OF WSN
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
IRJET- LEACH Protocol for Wireless Sensor Network
IRJET-  	  LEACH Protocol for Wireless Sensor NetworkIRJET-  	  LEACH Protocol for Wireless Sensor Network
IRJET- LEACH Protocol for Wireless Sensor Network
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
 
Survey: energy efficient protocols using radio scheduling in wireless sensor ...
Survey: energy efficient protocols using radio scheduling in wireless sensor ...Survey: energy efficient protocols using radio scheduling in wireless sensor ...
Survey: energy efficient protocols using radio scheduling in wireless sensor ...
 

Viewers also liked

A comparative study of various diagnostic techniques for Cryptosporidiosis
A comparative study of various diagnostic techniques for CryptosporidiosisA comparative study of various diagnostic techniques for Cryptosporidiosis
A comparative study of various diagnostic techniques for Cryptosporidiosis
IOSR Journals
 

Viewers also liked (20)

Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Needs Assessment Approach To Product Bundling In Banking Enterprise
Needs Assessment Approach To Product Bundling In Banking  EnterpriseNeeds Assessment Approach To Product Bundling In Banking  Enterprise
Needs Assessment Approach To Product Bundling In Banking Enterprise
 
Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using...
Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using...Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using...
Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using...
 
Effect of substrate temperature on the morphological and optical properties o...
Effect of substrate temperature on the morphological and optical properties o...Effect of substrate temperature on the morphological and optical properties o...
Effect of substrate temperature on the morphological and optical properties o...
 
Simulation of a linear oscillating tubular motor
Simulation of a linear oscillating tubular motorSimulation of a linear oscillating tubular motor
Simulation of a linear oscillating tubular motor
 
Orientation of Radar Antenna
Orientation of Radar AntennaOrientation of Radar Antenna
Orientation of Radar Antenna
 
Mouth dissolving tablets- A unique dosage form curtailed for special purpose:...
Mouth dissolving tablets- A unique dosage form curtailed for special purpose:...Mouth dissolving tablets- A unique dosage form curtailed for special purpose:...
Mouth dissolving tablets- A unique dosage form curtailed for special purpose:...
 
Increase In Electrical And Thermal Conductivities Of Doped Polymers Dependent...
Increase In Electrical And Thermal Conductivities Of Doped Polymers Dependent...Increase In Electrical And Thermal Conductivities Of Doped Polymers Dependent...
Increase In Electrical And Thermal Conductivities Of Doped Polymers Dependent...
 
Integrated E-Health Approach For Early Detection of Human Body Disorders in R...
Integrated E-Health Approach For Early Detection of Human Body Disorders in R...Integrated E-Health Approach For Early Detection of Human Body Disorders in R...
Integrated E-Health Approach For Early Detection of Human Body Disorders in R...
 
Application of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion Recognition
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
Electronic Load Controller for Self Exited Induction Generator Using Fuzzy Lo...
Electronic Load Controller for Self Exited Induction Generator Using Fuzzy Lo...Electronic Load Controller for Self Exited Induction Generator Using Fuzzy Lo...
Electronic Load Controller for Self Exited Induction Generator Using Fuzzy Lo...
 
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...
 
B0340818
B0340818B0340818
B0340818
 
Causes of Delay in Construction of Bridge Girders
Causes of Delay in Construction of Bridge GirdersCauses of Delay in Construction of Bridge Girders
Causes of Delay in Construction of Bridge Girders
 
Game Theory Approach for Identity Crime Detection
Game Theory Approach for Identity Crime DetectionGame Theory Approach for Identity Crime Detection
Game Theory Approach for Identity Crime Detection
 
A comparative study of various diagnostic techniques for Cryptosporidiosis
A comparative study of various diagnostic techniques for CryptosporidiosisA comparative study of various diagnostic techniques for Cryptosporidiosis
A comparative study of various diagnostic techniques for Cryptosporidiosis
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 

Similar to D010332935

Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
IAEME Publication
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
IJERD Editor
 
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
IOSR Journals
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
IJCNCJournal
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
International Journal of Technical Research & Application
 

Similar to D010332935 (20)

Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
 
G017344246
G017344246G017344246
G017344246
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
A multi-hop routing protocol for an energy-efficient in wireless sensor network
A multi-hop routing protocol for an energy-efficient in wireless sensor networkA multi-hop routing protocol for an energy-efficient in wireless sensor network
A multi-hop routing protocol for an energy-efficient in wireless sensor network
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
 
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 

More from IOSR Journals

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

D010332935

  • 1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 10, Issue 3 Ver. III (May – Jun. 2015), PP 29-35 www.iosrjournals.org DOI: 10.9790/1676-10332935 www.iosrjournals.org 29 | Page Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network Kritika, Ashok Kumar 1,1 Electronic and Communication Engineering Department & Applied Science, Ambala, Harayana, India Abstract: Wireless Sensor Networks (WSNs) consist of small nodes with sensing, calculation and wireless communications capability. Many routing, capacity management, and data circulation protocols have been specifically designed for WSNs where energy alertness is an needed method issue. The final development in the wireless network is the main condition for us to choose this topic. The focus has been given to the routing protocols which might differ depending on the application and network architecture. In this paper, we present a analyses of the state-of-the-method routing techniques in WSNs. We first diagram the design challenges for routing protocols in WSNs followed by an exhaustive of some of the routing techniques. Overall, the routing techniques are classified into three categories based on the underlying network structure: flat, hierarchical, and location-based routing .These protocols can be divided into lifetime -based, and Qos-based, depending on the protocol operation. We review the design trade-offs between energy and communication upward savings in some of these routing paradigm. We also mention the advantages and achievement issues of each routing technique. Keywords: Sensor Networks; Clustering Routing; LEACH; C LEACH;TL-LEACH, PEGASIS. I. Introduction Wireless Sensor Networks (WSNs) consists of tiny sensors nodes or environmental conditions such as temperature, sound, fluctuation, pressure,gesture at different locations. The evolution of wireless sensor networks was originally inspire by military applications for battlefield neglect. In these situations, it is difficult to replace the dead nodes caused by energy’s depletion with new ones to supply energy for the system.,sensor nodes working as deep as possible is the main method to maximize the life cycle of the system. The energy’s consumption of sensor node mainly emerge from the long distance transmission of data along the routing path, an efficient routing path formed by the routing protocol will have a great contact on the energy’s consumption [3]. So how to design an energy-efficient routing protocol becomes the main goal for the wireless sensor network.Therefore, wireless sensor networks are used in many civilian applications including environmental and home monitoring, health-care applications etc. This network enclose a large number of nodes which sense data from an desperately inaccessible area and send their data toward a processing center which is called “sink”. Since sensor nodes are power constrained devices, frequent and long-distance transmissions should be kept to minimum in order to prolong the network lifetime [1] Thus, communication between the sensor nodes and the base station is expensive, and there are no “high-energy” nodes through which communication can proceed. WSN are a widely applicable, major metalise technology. They bring a whole host of novel research challenges refer to energy efficiency, robustness, scalability, self-configuration, etc. These challenges must be take up at multiple levels through different protocols and mechanisms. Present partial solutions offer much hope for the future, but much work remains to be done. The use of clusters for transmitting data to the base station the advantages of small transmit distances for most nodes,compelling only a few nodes to transmit far distances to the base station. However, LEACH show better clustering algorithms by using adaptive clusters and rotating cluster-heads, among all the sensors. In addition, we show LEACH is able to perform local computation in each cluster to reduce the amount of data that must be transmitted to the base station. Clustering routing algorithms are now an active part of routing technology in WSNs due to various advantages, such as more scalable, less load, less energy consumption and more robustness [1][4]. The rest of the paper is organized as follows: Section II provides an overview of the LEACH,LEACH-C, ER-LEACH, PEGASIS, LEACH -SM TL LEACH AND V - LEACH Protocols.In section III, we simulate and compare the protocols. Finally, Section IV concludes this paper. II. Literature Survey The report on a Energy Efficient Clustering Protocols for Wireless Sensor Network by analysing the advantages and disadvantages of conventional routing protocols using our model of sensor networks, then developed LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that minimizes energy dissipation in sensor network. Different LEACH parameters are studied. Firstly, Allen et al. [17] presented that sensor networks with the ability to have small devices physically distributed near the objects being sensed brings new opportunities to observe and act on the world, for example with micro-habitat monitoring, structural monitoring, and wide-area
  • 2. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 30 | Page environmental systems. After that Effen et .al [16] presented that wireless sensor networks with thousands of tiny sensor nodes and expected to find wide applicability and increasing deployment in coming years as they enabled reliable monitoring and analysis of the environment. This paper proposed a modification to a well- known protocol for sensor called Low Energy Adaptive Clustering Hierarchy ). Akyildiz et .al [13], further analyzed that energy conservation have a main priority in all technology and engineering field. Most current applications that consume energy could be customized or optimized in a process resulting less energy consumption. Heinemann et al. [11] presented in underwater sensor networks and highlighted potential applications to off-shore oilseeds for constant monitoring, equipment monitoring, and underwater robotics. Then, Heinemann et al. [10] analyzed networking of hundreds or thousands of cheap micro sensor nodes and allowed users to accurately monitor a remote environment by intelligently combining the data from the individual nodes. Heinzelman et al. [9] proposed that the Hybrid Energy Efficient Distributed protocol for the heterogeneous wireless sensor network W. Heinzelman et al.[8] presented wireless sensor networks with thousands of tiny sensor nodes that expected to find wide applicability and increasing deployment in coming years, as they enable reliable monitoring and analysis of the environment.Balakrishna et al. [7] presented a growing interest in wireless sensor networks. The hot point in these algorithms was the cluster head selection. Rabiner et al. presented [6] that the energy conservation had a main order in all technology and engineering field. Handy et al. [5] presented wireless distributed micro sensor systems which invest the reliable monitoring of a variety of environments for both civil and military applications. V.Mhatre et al. [4] focused on reducing the power consumption of wireless micro sensor networks.Manjeshwar et al. [3] presented a formal classification of sensor networks, based on their mode of functioning, as proactive and reactive networks. Reactive networks, as opposed to passive data collecting proactive networks. Hssane et al. [2] presented wireless sensor network (WSN) which was a power constrained system, since nodes run on limited power batteries which shorten its lifespan. Kumar et al. [1] presented hybrid energy efficient distributed protocol for the homogeneous wireless sensor network. The main requirements of wireless sensor network were to prolong the network lifetime and energy efficiency. III. Leach Protocols A. Brief Description LEACH, an application-specific protocol develop. The application that normal micro sensor networks mean the monitoring of a remote environment. Since living nodes’ data are related in a sensor network, the end user does not require all the redundant data; rather, the end user needs a high-level purpose of the data that show the events appearing in the environment. Because the correlation is capable between data signals from nodes located close to each other, we chose to use a clustering infrastructure as the basis for LEACH. This confess all data from nodes within the cluster to be processe locally, reducing the data set that needs to be transmitted to the end user. In particular, data aggregation methods can be used to combine several related data signals into a smaller set of information that maintains the compelling data (i.e., the information content) of the original signals. Therefore, much less actual data needs to be transmitted from the cluster to the base station (BS). LEACH may be better when these assumptions do not hold. In LEACH, the nodes classify themselves into local clusters, with one node acting as the cluster head. All non-cluster head nodes transmit their data to the cluster head, while the cluster head node receives data from all the cluster members, performs signal processing part on the data (e.g., data aggregation), and transmits data to the remote BS. LEACH Low-Energy Adaptive Clustering Hierarchy (LEACH) was proposed by Heinzelman [5] and is one of the first clustering routing algorithms proposed for WSNs. LEACH was originally for wireless micro-sensor networks. LEACH is based on a clustering infrastructures, as all the data is handled in the cluster locally and only limited data is sent to the end user B. LEACH-C LEACH-Centralized [6] is an advancement of LEACH, it uses the variable steady state protocol as of LEACH but, uses a consolidate clustering algorithm for cluster formation. During the set up phase all the nodes transmits its area and energy level to the BS and then the BS decides which nodes should be CH and which nodes should combine to which CH. After this the BS broadcasts a message containing the CH ID for each node, if it accept its own ID it knows it is the CH. LEACH-C and LEACH have the same steady state phase. C. TL-LEACH The cluster formation protocol is a local process that recognise, a two-level hierarchy .In this way each node can decide to result in a good cluster. The use of two-levels of clusters for transmitting data to the base stations leverages the advantages of small transmit distances for more nodes more than in the beginning LEACH. In this way less nodes are required to transmit far distances to the base station and it is especially true in networks where the density of nodes is high. The use of clusters for transmitting data to the base station
  • 3. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 31 | Page advantages of small transmit distances for most nodes, involving only a few nodes to transmit far distances to the base station. Fig 2 Token Passing Scheme D. V-Leach V-LEACH protocol, the cluster contains; CH (responsible only for sending data that is received from the cluster members to the BS), vice-CH (the node that will become a CH of the cluster in case of CH dies), cluster nodes (gathering data from environment and send it to the CH .In the newest LEACH, the CH is always on receiving data from cluster members, combined these data and then send it to the BS that might be located far away from it. The CH will die previous than the other nodes in the cluster because of its operation of receiving, sending and overhearing. When the CH die, the cluster will become worthless because the data gathered by cluster nodes will never reach the base station. In V-LEACH protocol,likewise having a CH in the cluster, there is a vice-CH that takes the role of the CH when the CH dies because the reasons we show above by doing this, cluster nodes data will always reach the BS; no need to elect a new CH each time the CH dies.me. Fig.3 V -LEACH PROTOCOL The main issue with LEACH protocol lies in the random selection of cluster heads. There exists a probability that the cluster heads formed are unbalanced and may remain in one part of the network making some part of the network unreachable. This problem is resolved by using the concept of V-Leach. V Leach uses the concept of alternate Cluster Head called Vice Cluster Head and finally the network dies completely. E. PEGASIS Power-Efficient Gathering in Sensor Information Systems (PEGASIS) [7] is an improved version of LEACH. The goal of PEGASIS is that the node discourse to the other nodes in its organise and the nodes take turns to become a CH. It only selects one node as a CH to send data to the BS in each round. Each node compare with its close next door neighbors and takes turns to correspond with the BS. • Phase 1: Chain Construction: Starting from the node furthest from the BS the chain is constructed using a greedy algorithm, the chain formation can be adept by the sink or the nodes itself. • Phase 2: Data gathering and Transmission to BS: One node is selected as the CH randomly that communicates with the BS. When a node dies in the network a new chain is formed by passing the dead node. The CH receives all the fused data from the Sensor Node (SN) and sends it to the Base Station (BS). Data transmission in PEGASIS.
  • 4. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 32 | Page FIG. 4 LEACH NETWORK F. Efficient-Routing Leach (ER-LEACH) Efficient Routing LEACH (ER-LEACH) [3] which is a modified version of the well-known LEACH protocol.There are three contributions in this protocol which are upgrading the selection of the cluster head during setup phase by taking into account the residual energy of any sensor node which intends to become a CH to prolong the network lifetime. The second contribution is trying to reduce the overhead of dynamic clusters generation by using alternative CH which is expected to take the role of the CH in case that the underlying CH died which will prolong the lifetime of each cluster, and finally for the sake of load balancing the zone routing protocol is used which attempts to balance the load over CHs evenly by permitting the CH to discover the optimal route to the BS with less cost messages update and then sends the fused data to the BS through many other CHs instead of direct sending to the BS. ER-LEACH is normal to perform well especially when the mobility is very high and will prolong the overall network lifetime through load balancing G. Leach – Spare Management (LEACH-SM) LEACH-SM protocol [5] modifies LEACH by enhancing it with an efficient management of spares. It is also designed for static sensor nodes and static targets. LEACH-SM contract with both energy-consumption in efficiencies of LEACH. LEACH-SM adds a phase, called the spare selection phase. IV. Comparison Of Leach,Leach-C, Er-Leach, Pegasis, Leach -Sm Tl Leach And V - Leach There are many techniques available for data evaluation such as real-life measurements, analytic modeling and software simulations. For real-life measurements we will require hardware to set up a wireless sensor network. This is not a feasible method for data evaluation as we usually want to acquire data for hundreds of nodes and to setup such a large network can be a time and money consuming task. The second method which involves formulating mathematical equations for the network. This also is a very heavy task as it will involve a lot of time consuming and clear calculations. So we will use simulation using Network Simulator-2 (NS-2) [8] to imitate the behavior of a WSN. A.Throughput To represent the throughput of each protocol we use data received at the BS with respect to time and energy dissipation. LEACH-C performs 20% better than LEACH due to the built up computation by the BS to find better clusters. LEACH-C successfully delivers more data to the BS than LEACH with respect to both time and energy. Hence proving that LEACH-C has a higher throughput than LEACH..PEGASIS performs better than both LEACH and LEACH-C. PEGASIS performs 260% better than LEACH and 200% better than LEACH-C.TL LEACH performs better than LEACH, LEACH-C and PEGASIS..In TL LEACH throughput (data signals received at the BS) . B.Network Lifetime To represent network lifetime we will compare the nodes alive of each protocol to time and data received at BS. PEGASIS sends multifold data to the BS in comparison to LEACH or LEACH-C.PEGASIS
  • 5. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 33 | Page deliver the most data per unit energy followed by LEACH-C and then than LEACH, hence PEGASIS achieves both energy efficiency and latency efficiency but TL LEACH achieve density of nodes is high . LEACH is not as efficient as LEACH-C or PEGASIS (LEACH-C delivers about 20% and PEGASIS delivers more than 250% data per unit energy than LEACH respectively). The reason for this is that in LEACH- C the BS has global information of the position and energy of the other nodes, due to it can create enhanced clusters that need lesser energy for transmission. PEGASIS outperforms LEACH and LEACH-C as it removes the overhead of dynamic cluster information, PEGASIS also minimizes the sum of distances and restrict the number of transmissions, but TL LEACH require less nodes to transmit far distances to the base station ,network lifetime of TL LEACH (number of nodes alive over time). C.Energy Consumption As LEACH-C is able to send more data packets per unit energy consumed which confirm that LEACH- C performs better than LEACH in terms of energy consumption. PEGASIS consumes the least energy to per data packet sent to the BS and behave the best and hence is the most energy efficient. In TL LEACH we do not assume any constant energy dissipating nor do we remove energy during carrier-sense operations. D. CH Selection In clustering head selection of LEACH and V -LEACH is arbitrary,C - LEACH CH Selection done by BS based on energy.T-L LEACH is also based on energy.In ER-LEACH CH Selection based on Energy decided with in the cluster and at last LEACH -SM , during the cluster setup phase ,each node decided in lateral whether should become in active primary node or passive spare node.In PEGASIS data gathering and Transmission done by BS on each node correspond with its close next door neighbors and takes turns to correspond with the BS. E. Data Transmission In LEACH and C LEACH both are all CH sends directly to BS.In V - LEACH Vice CH takes over CH in case CH dies,ER-LEACH if the base station is not within range of CH ,it routed the CH in case of deadhead and LEACH SM the passive spare nodes goes to asleep where the data is transmitted through the primary active node. F. Mobility The mobility of LEACH ,C LEACH and V LEACH is stationary but ER-LEACH refers to mobile and SM-LEACH designed for static sensor nodes and static targets. V. Routing Challenges And Design Issue In Wsns The design of routing protocols in WSNs is formed by many demanding factors. These factors must be efficient communication can be achieved in WSNs. A. Node deployment Node deployment in WSNs is application debased and modify the performance of the routing protocol. The performance can be either deterministic or randomized. In deterministic deployment, the sensors are annually placed and data is routed through pre-determined paths. However, in odd node deployment, the sensor nodes are dispersed randomly creating an infrastructure in an ad hoc manners. Therefore, it is most likely that a route will consist of multiple wireless hop. B. Energy consumption without losing accuracy Sensor nodes can use up their limited supply of energy operating computations and transmitting information in a wireless environment. As such, energy sustain forms of communication. In a multihop WSN, each node show a dual role as data sender and data router. C. Data Reporting Model Data sensing and reporting in WSNs is a based on the application and the time essential of the data reporting. Data reporting can be classified as either time-driven ,event-driven, query-driven, and hybrid.The time-driven require periodic data monitoring. Sensor nodes will periodically switch on their sensors and transmitters, sense the environment and transmit the data of relevance at steady periodic time intervals. D. Fault Tolerance Some sensor nodes may fail or be blocked due to lack of power or environmental interference etc. The deficit of sensor nodes should not affect the overall task of the sensor network. If various nodes fail, MAC and
  • 6. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 34 | Page routing protocols must involve formation of new links and routes to the data collection base stations and require adjusting transmit powers and signaling rates on the existing links to reduce energy consumption. Therefore, various levels of redundancy may be needed in a fault-tolerant sensor network. E. Scalability The number of sensor nodes deployed in the sensing area may be in order of hundreds or thousands or many Any routing scheme must be able to work with this large number of sensor nodes. In addition, sensor network routing protocols should be expansible to respond to events in the environment. Until most of the sensors can remain in the sleep state with data from the few remaining sensors providing a quality. F. Network Dynamics Most of the network architectures assume that sensor nodes are static. However, mobility of both BS’s or sensor nodes is sometimes need in many applications.Routing messages from or to moving nodes is more impose. Since route stability becomes a important to energy, bandwidth etc. VI. Conclusions In this paper,Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional sensor nodes where each sensor node has very low battery life. Various energy efficient algorithms have been designed for this. LEACH uses distributed cluster formation & randomized rotation of the cluster head to minimize the network energy consumption. This paper proposes a new version of LEACH protocol called V LEACH protocol,there is less number of dead nodes,Number of alive nodes is enhanced, Based on our MATLAB simulations described above, we are confident that LEACH will outperform conventional communication protocols, in terms of energy dissipation, ease of configuration, and system lifetime / quality of the network.The proposed work improvement over the V-Leach; in this proposed work we are trying to improve the network life., initially when the cluster heads are selected based on the energy and the distance parameters; we also select the Vice Cluster Head. LEACH show better clustering algorithms by using adaptive clusters and rotating cluster-heads, among all the sensors. In addition, we show LEACH is able to perform local computation in each cluster to reduce the amount of data that must be transmitted to the base station.,routing technology show in WSNs due to various advantages, such as more scalable, less load, less energy consumption and more robustness References [1]. SasikumarM,Dr.R.Anitha,February2014.“Performance Evaluation of Heterogeneous HEED Protocol for Wireless Sensor Networks”, International Journal of Advanced Research in Computer and Communication Engineering Volume 3, Issue 2. [2]. Abderrahim BENI HSSANE , Mosley Lahcen HASNAOUI ,2010. “Improved and Balanced LEACH for heterogeneous s wireless sensor networks”, Ben Alla Said et al. / (IJCSE) International Journal on Computer Science and Engineering Volume. 02, Number 08. [3]. V.Mhatre and C. Rosenberg, “Homogeneous vs. heterogeneous clustered sensor networks: A comparative study,” in Proceedingsof 2004IEEE International Conference on Communications (ICC 2004) June 2000. [4]. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, January 2000.”Energy-Efficient CommunicatioProtocol for Wireless Microsensor Networks”Copyright 2000 IEEE. Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4-7, 2000, Maui, Hawa [5]. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. “uAMPS ns Code Extensions”. http://wwwmtl.mit.edu/research/icsystems/uamps/ leach. [6]. W. R. Heinzelman, “Application-Specific Protocol Architectures for Wireless Networks,” Ph.D. thesis, Massachusetts Institute of Technology, 2000. [7]. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari “Energy-Efficient Communication Protocol for Wireless Microsensor Networks” Copyright 2005 IEEE. Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4- 7, 2000, Maui, Hawaii. [8]. Wendi B. Heinzelman February “An Application-Specific Protocol Architecture for Wireless Microsensor Networks” IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 1,NO. 4, february 2000 [9]. M. Bani Yassein, A. Al-zou'bi, Y. Khamayseh, W. Mardini “ Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH)” [10]. Bluetooth Project. http://www.bluetooth.com, 2011. [11]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E.Cayirci, “A Survey on Sensor Networks”, IEEE Communications Magazine 40 (8) (2002)104-112,pp. 234 [12]. G. Simon, M. Maroti, A. Ledeczi, G. Balogh, B. Kusy, A. Nadas, G. Pap, J. Sallai, K. Frampton, , 2004. “Sensor Network-Based Counters Niper System”, In Proceedings of the Second International Conference on Embedded Networked Sensor Systems (Sensys), Baltimore, MD,pp. 984 [13]. J. Yick, B. Mukherjee, D. Ghosal, 2002“Analysis of a Prediction-Base Mobility Adaptive Tracking Algorithm”, the IEEE Second International Conference on Broadband Networks,pp. 541-545 [14]. M. Castillo-Effen, D.H. Quintela, R. Jordan, W. Westhoff, W. Moreno, 2004 "Wireless Sensor Networks for Flash-Flood Alerting”, in Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits and Systems, Dominican Republic,pp. 231 [15]. G. Wener-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, M. Walsh, 2006. “A Wireless Sensor Network on an Active Volcano, Data-Driven Applications in Sensor Networks”,IEEE Internet Computing, March/April. Volume 2, Issue Number 5, pp. 765
  • 7. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 35 | Page [16]. V. Raghunathan, A. Kansai, J. Hse, J. Friedman, M. Srivastava, 2005,"Design Considerations for Solar Energy Harvesting Wireless Embedded Systems", in Proceedings of the IPSN ,Volume 1, Issue Number 5,pp. 897 [17]. P. Zhang, C.M. Sadler, S.A. Lyon, M. Martonosi, 2004, "Hardware Design Experiences in Zebranet", Proceedings of the SenSys’04, Baltimore, MD, Volume 2, Issue Number 5,pp.765 [18]. S. Roundy, J.M. Rabaey, P.K. Wright, 2004,"Energy Scavenging for Wireless Sensor Networks" ,Volume 41, Issue Number 5,pp. 762. [19]. M. Rahimi, H. Shah, G.S. Sukhatme, J. Heideman, D. Estrin, 2003, "Studying the Feasibility of Energy Harvesting in Mobile Sensor Network " the IEEE ICRA, Volume 41, Issue Number 5, pp. 19–24. [20]. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks. 2002, 38, 393–422.