SlideShare a Scribd company logo
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 1/31
(1)
Wireless Personal Communications
An International Journal
© Springer Science+Business Media New York 2014
10.1007/s11277-014-1629-y
Heterogeneous HEED Protocol for Wireless
Sensor Networks
Satish Chand 1 , Samayveer Singh 1 and Bijendra Kumar1
Netaji Subhas Institute of Technology, Sector-3, Dwarka, New Delhi , 110078, India
Satish Chand (Corresponding author)
Email: schand86@hotmail.com
Samayveer Singh
Email: samayveersingh@gmail.com
Bijendra Kumar
Email: bizender@rediffmail.com
Published online: 6 February 2014
Abstract
One of the important protocols for increasing the network lifetime in wireless sensor networks
(WSNs) is hybrid energy efficient distributed (HEED) protocol. This protocol considers two
parameters for deciding the cluster heads, i.e., residual energy and node density and has been
designed for the homogeneous WSNs. In this paper, we consider the implementation of HEED for a
heterogeneous network. Depending upon the type of nodes, it defines one-level, two-level, and three-
level heterogeneity and accordingly the implementation of HEED is referred to as hetHEED-1,
hetHEED-2, and hetHEED-3, respectively. We also consider one more parameter, i.e., distance and
apply fuzzy logic to determine the cluster heads and accordingly the hetHEED-1, hetHEED-2, and
hetHEED-3 are named as HEED-FL, hetHEED-FL-2, hetHEED-FL-3, respectively. The simulation
results show that as the level of heterogeneity increases in the network, the nodes remain alive for
longer time and the rate of energy dissipation decreases. And also, increasing the heterogeneity level
helps sending more packets to the base station and increases the network lifetime. The increase in the
network energy increases the network lifetime manifold. In fact, using fuzzy logic, the network lifetime
increases by 114.85 % that of the original HEED without any increase in the network energy. Thus,
the hetHEED-FL-3 provides the longest lifetime (387.94 % increase) in lifetime at the cost of 19 %
increase in network energy), sends maximum number of packets to the base station, and has minimum
rate of energy dissipation.
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 2/31
Keywords Sensor networks – Clustering – Network lifetime – Rounds – Load balancing –
Membership function – Fuzzy logic – Heterogeneity
Satish Chand
did his M.Sc. in Mathematics from Indian Institute of Technology, Kanpur, India and M.Tech. in
Computer Science from Indian Institute of Technology, Kharagpur, India and Ph.D. from Jawaharlal
Nehru University, New Delhi, India. Presently he is working as a Professor in Computer Engineering
Division, Netaji Subhas Institute of Technology, Delhi, India. Areas of his research interest are
Multimedia Broadcasting, Networking, Video-on-Demand, Cryptography, and Image processing.
Samayveer Singh
received his B.Tech. in Information Technology from Uttar Pradesh Technical University, Lucknow,
India in 2007 and his M.Tech. in Computer Science & Engineering from National Institute of
Technology, Jalandhar, India, in 2010. He is pursuing his PhD in the Department of Computer
Engineering, Netaji Subhas Institute of Technology, New Delhi, India. His research interest includes
wireless sensor networks.
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 3/31
Bijendra Kumar
did his Bachelor of Engineering from H.B.T.I. Kanpur, India. He has done his Ph.D. from Delhi
University, Delhi, India in 2011. Presently he is working as an Assistant Professor in Computer
Engineering Division, Netaji Subhas Institute of Technology, Delhi, India. His areas of research
interests are Video applications, watermarking, and Design of algorithms.
1 Introduction
The wireless communication is one of the important types of communication that requires no fixed
infrastructure. There are many situations where wireless communication can be deployed such as
volcano, battlefield monitoring, old building structure. It is generally used where the normal cabling is
difficult or financially impractical. The wireless communication done using the sensor devices is called
wireless sensor communication and the resultant network is called the wireless sensor network
(WSN). The WSNs are easily deployable, maintenance free, and provide fault-tolerant platform for
gathering data from the environment [1]. They are cost effective also because the sensors are very
cheap devices and do not require any infrastructure such as lying cabling. The sensors, also called
motes or actuators [2], have an ability to sense the physical environment for an event that may include
sound, humidity, light, temperature, vibration, etc. They collect data by measuring the comprehensive
conditions in their surroundings and transmit it to sink that in turn either processes it or forwards to the
data processing centre using internet. Currently, the wireless systems deal with the integration of low-
power communication, sensing, energy storage, and computation [2]. In a WSN, the communication
can be done using either single hop or multihop. In single hop (also called peer to peer
communication), the sensor nodes directly communicate with any other sensor node or with the base
station. In multihop communication, there may be a sequence of hops while communicating to the base
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 4/31
station from a sensor node. Deployment of sensors in a WSN can be deterministic or random
depending on the application. They can be stationary or location-aware, homogeneous or
heterogeneous in nature. Since the sensors are not supported by external battery, their energy must be
used very efficiently in order to monitor the area for longer time. One possible solution to have longer
lifetime of a WSN is to use more sensors, but it may increase collision and, in that case, a suitable
scheduling mechanism need be employed. Other solution of prolonging the lifetime of a WSN is to
employ the heterogeneity in sensor nodes [3]. There are three common types of resource
heterogeneity in a sensor node, namely, computational, link, and energy heterogeneity. In
computational heterogeneity, the heterogeneous node has more resources such as powerful
microprocessor and relatively more memory so that it can provide complex data processing and
longer-term storage. In link heterogeneity, the heterogeneous node has high-bandwidth and long-
distance network transceiver so that it can provide more reliable data transmission. Energy
heterogeneity means that the sensor nodes have different levels of energy. The computational and link
heterogeneities implicitly depend on the energy as these types of nodes consume more energy. Thus,
the energy based heterogeneity may be considered as the most dominating heterogeneity in WSNs. It
has been reported that providing heterogeneity in sensor nodes prolongs the network lifetime,
improves reliability of data transmission, and decreases the latency of data transportation. There have
been several protocols for WSNs, which may be classified into different categories. One of the
important categories of protocols consists of clustering or hierarchical protocols such as low energy
adaptive clustering hierarchy (LEACH) [4] and its different modifications such as LEACH-C,
LEACH-M [4, 5], threshold sensitive energy efficient sensor network protocol (TEEN) [6], adaptive
periodic threshold-sensitive energy efficient sensor network protocol (APTEEN) [7], power-efficient
gathering in sensor information systems [8], stable election protocol (SEP) [9], energy efficient
clustering scheme (EECS) [10], deterministic energy efficient clustering (DEEC) [11] protocol and
hybrid energy efficient distributed (HEED) [12]. Among these types of protocols, the HEED is one of
the most popular protocols as the cluster heads in this protocol are decided based on the residual
energy and degree of nodes. The degree of nodes distributes load among the cluster heads. In other
protocols, the cluster heads are selected based on the residual energy only and no load balancing is
done. In this paper, we discuss the HEED protocol for deploying the underlying network as our
heterogeneous network model in order to increase the lifetime. Our model can describe one- level,
two-level, and three-level heterogeneity and, accordingly, we may call the implementation of HEED as
hetHEED-1, hetHEED-2, and hetHEED-3. The one-level heterogeneity assumes all sensor nodes in a
WSN to have equal amount of energy, for which the original HEED is implemented. We may also call
it as homogeneous HEED. The two-level and three-level heterogeneity assume the sensor nodes in a
WSN to be equipped with two and three energy levels, respectively, for which we call the
implementation of HEED as hetHEED-2 and hetHEED-3 protocols. The original HEED considers
two parameters—residual energy and node density to determine the cluster heads. In hetHEED-1,
hetHEED-2, and hetHEED-3, we consider the same two parameters to determine the cluster heads
so that we can compare their performance with respect to heterogeneity. We also consider one more
parameter, i.e., distance between a sensor and sink, in addition to residual energy and node density
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 5/31
and apply the fuzzy logic to calculate the probability in order to decide the cluster heads. The resultant
HEED implementation is named as HEED-FL (original HEED with fuzzy logic), hetHEED-FL-2
(hetHEED-2 with fuzzy logic), and hetHEED-FL-3 (hetHEED-3 with fuzzy logic). Increasing the
energy in network in order to make them heterogeneous increases the network lifetime, which is at
much higher side, especially in case of hetHEED-3 (74.2 % energy increase leads to 213.38 %
increase in network lifetime). Using fuzzy logic in HEED without increasing any energy in the network
increases the network lifetime by 114.85 % of that of the original HEED. Increasing the heterogeneity
level with fuzzy logic increases the network lifetime manifold. For example, the 19 % increase in the
network energy enhances the network lifetime by 387.94 %.
The rest of the paper is organized as follows. Section 2 reviews the related literature. Section 3,
discusses the fuzzy system including its different components—fuzzifier, fuzzy rulebase, fuzzy inference
engine, and defuzzifier. In Sect. 4, a heterogeneous model for WSNs is discussed that is used to
simulate hetHEED-1, hetHEED-2, and hetHEED-3, HEED-FL, hetHEED-FL-2, and hetHEED-FL-
3. In Sect. 5, we discuss cluster formation, data collection and data transmission. The simulation
results are given Sect. 6 and, finally, the paper is concluded in Sect. 7.
2 Literature Review
The routing protocols for WSNs may be categorized into different classes based on the applications
such as location based, data-centric, mobility based, multipath based, QoS based, and hierarchical
[13]. The location based protocols utilize the position information of nodes to relay the data of the
desired regions rather than the whole network. Some of the important location based protocols are
minimum energy communication network [14], greedy anti-void routing [15], and geographical and
energy aware routing [16]. In the data centric routing protocols, also called flat-based, all nodes in
WSN use flood based data transferring scheme. Some of the important data centric based protocols
include sensor protocols for information via negotiation [17], directed diffusion [18], and Rumor
routing [19]. The multipath routing protocols such as sensor-disjoint multipath protocol [20] use
multiple paths to enhance the network performance. In QoS based routing protocols, the network
makes balance between the energy consumption and data quality besides the QoS metrics such as
delay, energy, bandwidth while delivering the data to base station or sink. Some of the QoS based
protocols include sequential assignment routing [21], stateless protocol for real-time communication in
sensor networks [22], and energy-aware routing [23]. The hierarchical protocols, also called
clustering protocols, cluster the sensor nodes. These protocols generally work in two phases. In first
phase, the cluster heads are selected and, in second phase, routing/data transmission is performed.
The low energy adaptive clustering hierarchy (LEACH) [4] is the very first clustering protocol that
forms the clusters based on the received signal strength. In this protocol, the data is transmitted
through cluster heads, whose numbers are predetermined. The cluster heads are changed randomly
over the time so that the cluster heads (sensor nodes) do not become dead by draining up their entire
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 6/31
energy. There have been discussed different variants of LEACH such as LEACH-C, LEACH-M,
LEACH-V [4, 5].
Manjeshwar and Agarwal discuss a TEEN protocol [6] that uses hierarchical structure. This protocol
responds to the sudden changes in the sensed attribute, a physical parameter about which a user is
interested and thus it is useful for time-critical applications. The TEEN protocol has been modified as
APTEEN protocol [7] that is meant for both time-critical events and periodic data collections. Lindsey
and Raghavendra discuss power efficient gathering in sensor information systems protocol [8], an
improved version of LEACH, that uses chains of sensor nodes. The data is transmitted from all sensor
nodes through their respective chains to a single node, called cluster head. The cluster head aggregates
the data to remove the duplicity and then transmits it to the base station or sink. It outperforms the
LEACH; however, due to excessive delay, it is not suitable for large networks. Smaragdakis et al.
discuss SEP [9], an extension of LEACH, that uses hierarchical clustering and heterogeneity unlike the
LEACH. In this protocol, a node becomes cluster head on the basis of weighted election probabilities
of each node according to their respective energies. The EECS protocol [10] elects the cluster heads
with more residual energy through local radio communication. It is used for periodical data gathering
applications using WSNs. It uses load balancing and energy efficiently. However, it requires global
knowledge of distances between the cluster-heads and base station. Li et al. discuss DEEC [11] for
two-level and multi level heterogeneous WSNs. This protocol selects cluster heads using the ratio of
residual energy of each node and the average energy of the network. The nodes having high initial and
residual energies have more chance of becoming cluster heads. The nodes nearer to the sink require
spending more energy than those farther because of the extra burden of the nodes within the
neighborhood of the base station. Thus, smaller clusters are formed using the nearer nodes to balance
the load among the cluster heads that fall in different regions and vice versa. This concept has been
discussed by Eshghi and Haghighat [24].
The HEED [12] protocol selects cluster heads based on their residual energy and node degrees. The
node degree helps balancing the load among the cluster heads. In this protocol, the clustering process
is carried out in terms of iterations and, in every iteration, the nodes not covered by any cluster head
double their probability of becoming a cluster head. It has low overhead in terms of processing cycles
and message exchanged. This protocol does not assume any distribution of nodes or location
awareness. It also achieves fairly uniform cluster head distribution across the network and prolongs the
network lifetime besides supporting data aggregation. A variant of HEED protocol, called integrated
HEED (iHEED) [25], has integrated data aggregation in the multihop routing by considering data
aggregation operators such as AVG or MAX. It can serve both source and data driven applications.
Another variant of HEED by Huang and Wu [26] discusses a constant time clustering mechanism that
may be termed as an extended probabilistic algorithm for HEED protocol. In this algorithm, the nodes
having high energy participate in cluster head election and the remaining are eliminated; thus, requiring
less rounds for selecting cluster heads. Another variant of HEED, called Misense hierarchical cluster
based routing algorithm (MiCRA) [27], maintains the balanced energy consumption of nodes so that
the network lifetime increases. The paper [28] discusses the HEED for heterogeneous network model;
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 7/31
(1)
however, no new heterogeneous network model is discussed in that paper. It uses two-level and
multilevel heterogeneous model from [11] and three-level heterogeneous model from [3]. Its
performance is poorer than that of ours. In [29], similar work has been discussed as in [28], but it
considers the nodes movable unlike in [28] that has static nodes. As regard to performance of [29],
our proposed hetHEED protocols perform better and same is the case with HEED-FL, hetHEED-
FL-2 and hetHEED-FL-3. In next section, we discuss fuzzy system as it is needed for finding the
cluster heads.
3 Fuzzy System
The system based on fuzzy logic consists of four parts: fuzzifier, fuzzy knowledge base, fuzzy inference
engine, and defuzzifier as shown in Fig. 1.
Fig. 1
Fuzzy logic based system
The inputs to the system are crisp numbers. The fuzzifier transforms these crisp values into fuzzy values
and stores in a fuzzy set by applying a suitable fuzzification function. The fuzzy rules are of the form IF-
THEN, which are stored in fuzzy rulebase, also called knowledgebase.
The output of the fuzzifier and the rules from the knowledgebase are given to the fuzzy inference engine
as inputs for simulating human reasoning process by making fuzzy inference. The output of the fuzzy
inference engine is provided to the defuzzifier that converts the fuzzy values into crisp values. The
defuzzifier calculates the centroid and uses it to calculate the probability. The centroid is computed as
follows:
where, denotes the membership function of set A.
We have used Mamdani model [30] for inference engine because it is most widely used in applications
Centroid =
∑ (x) ∗ xμ
A
∑ (x)μA
(x)μ
A
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 8/31
due to its simplicity. We consider three input parameters in our fuzzy system that include battery
power, node density, and distance between a sensor and the sink. Each of the input variables has
three membership functions, i.e., the battery power has low, medium, and high; the node density has
sparsely, medium, and densely; the distance has near, medium, and far. The membership function
corresponding to the output variable, i.e., probability has 9 values—very weak, weak, little weak,
lower medium, medium, higher medium, little strong, strong, very strong (Fig. 2).
Fig. 2
Layered fuzzy scheme
The membership functions for battery power consists of one full and two half trapezoidal; for node
density, two trapezoidal and one triangular; for distance, two half trapezoidal and one triangular; and
for output probability, two half trapezoidal and seven triangular, as shown in Fig. 3a–d, respectively
(Table 1).
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 9/31
Fig. 3
Fuzzy sets corresponding to fuzzy inputs and output parameters. a Fuzzy set for fuzzy input variable:
battery power. b Fuzzy set for fuzzy input variable: node density. c Fuzzy set for fuzzy input variable:
distance. d Fuzzy set for fuzzy output variable: probability
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 10/31
Table 1
Fuzzy rule base
Battery power Node density Distance Probability
Low(0) Sparsely(0) Near(0) Little weak(2)
Low(0) Sparsely(0) Medium(1) Weak(1)
Low(0) Sparsely(0) Far(2) Very weak(0)
Low(0) Medium(1) Near(0) Lower medium(3)
Low(0) Medium(1) Medium(1) Little weak(2)
Low(0) Medium(1) Far(2) Weak(1)
Low(0) Densely(2) Near(0) Medium(4)
Low(0) Densely(2) Medium(1) Lower medium(3)
Low(0) Densely(2) Far(2) Little weak(2)
Medium(1) Sparsely(0) Near(0) Medium(4)
Medium(1) Sparsely(0) Medium(1) Lower medium(3)
Medium(1) Sparsely(0) Far(2) Little weak(2)
Medium(1) Medium(1) Near(0) Higher medium(5)
Medium(1) Medium(1) Medium(1) Medium(4)
Medium(1) Medium(1) Far(2) Lower medium(3)
Medium(1) Densely(2) Near(0) Little strong(6)
Medium(1) Densely(2) Medium(1) higher medium(5)
Medium(1) Densely(2) Far(2) Medium(4)
High(2) Sparsely(0) Near(0) Little strong(6)
High(2) Sparsely(0) Medium Higher medium(5)
High(2) Sparsely(0) Far(2) Medium(4)
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 11/31
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
High(2) Medium(1) Near(0) Strong(7)
High(2) Medium(1) Medium(1) Little strong(6)
High(2) Medium(1) Far(2) Higher medium(5)
High(2) Densely(2) Near(0) Very strong(8)
High(2) Densely(2) Medium(1) Strong(7)
High(2) Densely(2) Far(2) Little strong(6)
We use fuzzy model for selecting the cluster heads. The node corresponding to maximum probability is
chosen as the cluster head. In next section, we discuss our heterogeneous network model.
4 Proposed Heterogeneity Network Model
Before discussing our network model, we outline the basic assumptions made for WSN in our work:
All sensor nodes and base station are stationary after deployment; each is identified by a
unique ID.
Nodes are location-unaware, i.e. not equipped with GPS-capable antennae.
All nodes have similar capabilities (processing/communication), but different in terms of
energies.
Nodes are left unattended after deployment, meaning thereby battery recharge is not possible.
There is only one BS, located at the centre in the network, has a constant power supply; thus
has no energy, memory and computation constraints.
Each node has the ability to aggregate data; as a result several data packets can be
compressed as one packet.
The distance between nodes can be computed based on the received signal strength.
Nodes have the capability of controlling the transmission power according to the distance of
receiving nodes and the node failure is considered due to energy depletion.
The radio link is symmetric such that energy consumption of data transmission from node A to
node B is the same as that of transmission from node B to node A.
Now, we discuss a three level heterogeneous network model. This model describes a WSN that
consists of three types of sensor nodes based on their energy levels. The nodes having more energy
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 12/31
(2)
(3)
(4)
are supposed to be costlier than those having less energy. Because of the high cost, the nodes having
maximum energy are assumed to be minimum in numbers. The nodes having minimum energy level are
the cheapest ones and hence they can be deployed abundantly. We assume that the WSN has N
number of nodes out of which nodes have minimum energy, where 0 1. We may
call them as the normal nodes and the energy of these types of nodes denoted as . The
nodes have more energy than the normal nodes. We may call these nodes as the advance nodes and
denote the node energy by . The remaining nodes have the
maximum energy, denoting the node energy by . These nodes may be called as super nodes.
Thus, we have the inequalities for the number of nodes and their energy levels.
The total energy of the network, , is given by the following expression.
We will show that this model (2) can describe one-level, two-level, and three-level heterogeneity
depending on the value of . The bounds of are 0 and 1. When 0, we have only one term in
(2) as the first two terms in (2) become zero. For 0, in (2) contains super nodes only,
which signifies one-level heterogeneity. We may also call it homogeneity because the network contains
only a single type of nodes. In this case, a node in the network has energy. We impose suitable
constraints so that the model contains normal nodes rather the super nodes in case of one-level
heterogeneity. This can be obtained by defining the following relation:
where n is a positive integer greater than 1 and is a function of and . In a very simple form,
we can have . The value of in (3) should be in the
consonant with the condition: .
Now, we will show that this model can describe two-level heterogeneity, i.e., the network contains
only two types of nodes. For this, we find the value of , which is given by the solution of the following
equation:
Equation (4) is not an arbitrary; it basically diminishes the third term in (2), making thus the model of
two-level heterogeneity. Using (4), the model in (2) contains two types of nodes: normal and advance
nodes. Equation (4) has two solutions: and . Since is upper-
bounded by 1 and , the valid solution of (4) is . For
, the model (2) contains two types of nodes that have energies and
.
For three-level heterogeneity, we need to determine the range of . The upper bound of the range is
⊖ ∗ N ≤ ⊖ ≤
E0 ∗ N⊖
2
E1 (N − (⊖ ∗ N + ∗ N))⊖
2
E2
⊖ ∗ N > ∗ N > (N − (⊖ ∗ N + ∗ N)) and < <⊖
2
⊖
2
E0 E1 E2
Tenergy
= ⊖ ∗ N ∗ + ∗ N ∗ + (1 − ⊖ − ) ∗ N ∗Tenergy E0 ⊖
2
E1 ⊖
2
E2
θ θ θ =
θ = Tenergy
E2
⊖ =
−E2 E0
n ∗ f( , )E1 E2
f E1 E2
f either ( + ) or ( − )E2 E1 E2 E1 θ
< <E0 E1 E2
θ
1 − ⊖ − = 0⊖
2
(( ) − 1)/25√ (( ) + 1)/25√ θ
(( ) + 1)/2 > 15√ (( ) − 1)/25√
θ = (( ) − 1)/25√ E0
E1
⊖
(( ) − 1)/2√
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 13/31
(5)
(6)
(7)
(8)
(9)
. Let the lower bound of be that is to be determined. The range of for
three-level heterogeneity is . Taking as and
from (3), we have
Let and . From (5), we have
It can be written as
Or
Since LHS of inequality (6) is negative, we should have
This gives
From (5) can be written as
The inequality may be written as
In this way, we have shown that the energy model in (2) can describe one-level, two-level and three-
level heterogeneity in a WSN.
5 Cluster Formation and Data Transmission
In this section, we discuss in general cluster formation, data collection, data aggregation, and then data
transmission to the base station. In our network of sensors, a sensor acts either as a cluster head or
simply a cluster member. We discuss the computation of the energy spent by the cluster head and the
cluster members in a cluster in collecting or transmitting the data. The energy spent in transmitting L-bit
message by a sensor depends on the distance [4, 5].
(( ) − 1)/25√ ⊖ θL θ
< ⊖ < (( ) − 1)/2⊖L 5√ f ( − )E2 E1 θ
< < (( ) − 1)/2⊖L
−E2 E0
n ∗ ( − )E2 E1
5√
= +E1 α1 E0 = +E2 α2 E1
<⊖L
+α2 α1
n ∗ α2
<
α2
α1
1
n ∗ − 1⊖L
− ≥
α2
α1
1
1 − n ∗ ⊖L
1 − n ∗ < 0⊖L
<
1
n
⊖L
( − ) ≤ ∗ ( − )E2 E0
n ∗ (( ) − 1)5√
2
E2 E1
n ∗ (( ) − 1) ∗ − 2 ≤ (n ∗ (( ) − 1) − 2)5√ E1 ∗ E0 5√ ∗ E2
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 14/31
(10)
(11)
(12)
(13)
(14)
(15)
For short distance , the energy consumed is given by
For long distance , the energy consumed is given by
where signifies energy dissipated per bit per m and to run the
transmitter or receiver circuitry and are transmitter-amplifier model parameters.
The first terms in (10) and (11) signify the energy spent by the transmitter circuitry that is basically
related to the digital coding, modulation, filtering, etc. and the second terms signify the energy spent in
actual transmission of the message data of L-bits. We generally refer this total energy as the energy
spent in transmission. The distance is short or long is decided on the value of , also called as
threshold, whose value is given by [4, 5]
This threshold value is maximum and in practice less value of is considered, e.g., 70, 75, 85, etc.
The energy spent in receiving L-bits data is given by [4, 5]
The energy spent in sensing L-bits data is given by [4, 5]
Here, and each are equal to (i.e., .
The head node receives the data from several sensors, which are meant for monitoring/sensing some
activity. It is quite likely that the duplicate data may be received by the cluster head from different
sensors as they are monitoring the same activity.
The energy spent in aggregating L-bits data is given by [4, 5]
where, nJ per message bit.
Normally, the number of clusters are predetermined, say, 5 % and so, of the total nodes in the
network. Once the cluster head are decided, these heads broadcast advertisement message to all
sensors. Depending upon the received signal energy (assuming residual energy is the only parameter
for deciding cluster heads), each sensor node decides its cluster head and informs its decision to the
cluster head that corresponds to the maximum received signal energy. In our work, the cluster heads
are selected based on the residual energy and the node degree. The very first time, the residual
energy of a node is equal to its initial energy and after each iteration (iteration is defined later), it gets
d ETXS
= L ∗ + L ∗ ∗ if d ≤ETXS
∈elec ∈fs
d
2
d0
d ETXL
= L ∗ + L ∗ if d >ETXL ∈elec ∈mp ∗ d
4
d0
∈elec
2
signifies the energy∈fs
∈mp
d0
= = = 87.70d0
∈fs
∈mp
− −−−
√
10 ∗ 10
−12
0.0013 ∗ 10
−12
− −−−−−−−−−−−−
√
d0
= L ∗ERx ∈R
= L ∗ESx
∈S
∈R ∈S
∈elec = = )∈elec ∈R ∈S
= L ∗EDA
∈DA
= 5∈DA
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 15/31
(16)
(17)
reduces by the amount spent in sensing or data transmission, etc. The degree of a node is the number
of nodes in its sensing range. The energy spent by the cluster head to broadcast advertisement is given
by (10) as it is the short distance and the energy spent by a sensor node to inform its cluster head is
also given by (10). In this way, the clusters are formed. It may be mentioned here that there is very
small probability to be two cluster heads within each other’s cluster range [12]. The sensors are
inexpensive devices; they are normally deployed in abundant. All sensors gather data for (or sense) the
same activity taken/taking place in the given area, there is a possibility of the same data collection by
multiple sensors. Since all sensors send their data to their respective cluster heads, a cluster head may
get duplicate data that need be discarded. The non-head nodes sense the area/collect the data by
spending the energy according to (14) and send the sensed/collected data to their cluster heads by
spending the energy according to (10). The head nodes receive the data from their respective cluster
members and send it to the sink. The energy spent by the head nodes in receiving the data from cluster
members is given by (13) and the energy spent by the head nodes aggregating the data (removing the
duplicate data) is given by (15) and the energy spent by the head nodes in sending the received data to
the sink is given by (11). Collecting the data from cluster members and sending to sink by a cluster
head, we term it as iteration. The energy spent by the network containing total nodes out of which
as the head nodes in an iteration consists of the energy spent by the cluster members in sensing the
data and sending it to their respective cluster heads and the energy spent by the cluster heads in
receiving the data from their respective cluster members, aggregating the data and then sending it to
the sink. This data may be termed as one frame. Thus, in an iteration, one frame data is
collected/sensed from the area and sent to the base station (sink).
The energy spent by a single non-head sensor is given by, assuming each message size of L bits, for a
single frame data (i.e., per iteration) is
The energy spent by a cluster head for a single frame data is given by
For simplicity, we uniformly divide nodes into clusters; each consists of sensors, assuming
is divisible by . In case is not divisible by , some clusters have one node more than other
clusters and accordingly (17) can be modified for such clusters. Among sensors, one sensor is
cluster head and the remaining sensors are cluster members. The first term in (17)
signifies the energy spent by the cluster head in receiving the data from cluster members.
The second term specifies the energy spent in aggregation of the data received from
cluster members. The last two terms signify the energy spent by the cluster head in transmission of the
message to base station/sink. Figure 4 shows an instance of clusters formed in three-level
heterogeneity for non-fuzzy implementation. In this figure, the normal, advance, and super nodes have
n
k
= L ∗ +L ∗Enh ∈elec ∈
fs
∗ d
2
= L ∗ ( − 1) + L ∗ ∗( − 1) + L ∗ +L ∗Eh ∈elec
n
k
∈DA
n
k
∈elec ∈mp ∗d
4
n k n/k
n k n k
n/k
( − 1)
n
k
( − 1)
n
k
( − 1)
n
k
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 16/31
(18)
been denoted by circular , star (*), and plus ( ) marks, respectively. The sink or base station has
been marked as X, situated at the center of the region. The members of a cluster including cluster
head, that has been explicitly pointed by in each cluster, are shown by the same color. In case of fuzzy
implementation, such types of clusters are formed; however, for repeated nature we have not showed
them.
Fig. 4
Clusters with their cluster heads shown in different colors. (Color figure online)
The current cluster heads have sent the frame data to the sink and these head nodes are marked as
non-member, i.e., they cannot be considered to be selected as cluster heads till all the sensor nodes
in the network have become the cluster heads. In this way, one iteration is complete. In next iteration,
another set of sensors from the unmarked sensors are selected as cluster heads depending on the
residual energy and the node degree in case of non-fuzzy and for the fuzzy case the cluster heads
depend upon the residual energy, node degree, and the distance. The probability for fuzzy
implementation is computed as follows:
where a, b, and c are weights of residual energy, node density, and distance, respectively. ,
and signify level values for residual energy, node density, and distance, respectively, and
, and are maximum level values for residual energy, node density, and distance,
respectively. In our work, the residual energy has values low, medium, and high, which correspond to
(∘) +
P robability =
a ∗ + b ∗ + c ∗ ( − )Lre Lnd Dm Ld
a ∗ + b ∗ + c ∗M re M nd M d
,Lre Lnd
Ld
,M re M nd M d
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 17/31
level values as 0, 1, and 2, respectively. The node density has sparsely, medium, and densely that
correspond to level values as 0, 1, and respectively. The distance has values near, medium, far and the
corresponding level values are 0, 1, 2. Thus, the values of , and each are 2 and
each of , and can have values as 0 or 1, or 2 (because we have considered three
membership functions, i.e. low, medium, high in case of battery power; sparsely, medium, densely in
case of node density; and near, medium, far for distance). For giving equal weightage to each of the
parameters, i.e., residual energy, node density, and distance, we can have a b c 1. However,
the residual energy normally has more weightage than the node density and distance, each. In
literature, the values of a, b, c have been taken as 2, 1, 1, respectively. Selection of a cluster head (or
rotating cluster head) amongst the nodes is based on the probabilities.
These newly cluster heads form their clusters by broadcasting advertisement message. Once their
clusters are formed, the cluster members collect the data and send to their cluster heads. The cluster
heads aggregate the received data and then send to the base station/sink, it is the second frame. The
second iteration is complete. We carry out further iterations as long as there are unmarked sensors
(which have not been cluster heads). The number of iterations when all sensors have become cluster
heads forms a round. It may happen that some of the sensors have exhausted their energies. These
sensors will not able to sense/collect the data and hence will not participate in further clustering
process. Such nodes are called dead nodes. A WSN contains redundant sensors, whose sole
purpose is to monitor a given area for activities. Even if some sensors are dead, the remaining sensors
will participate in clustering process and hence in data collection. When all sensors have depleted their
energies, no clustering process will take place and hence no data collection. This determines the
network life time in our case.
In our work, a pre-specified percentage of the number of sensors nodes are taken as the initial cluster
heads that form their respective clusters by broadcasting advertisement message and receiving
responses from the nodes wishing to be cluster member. The cluster formation process is called T
(cluster process). Each of the cluster heads collects the sensed data from their cluster members,
aggregates it, and then sends the aggregated data to the base station. Collecting, aggregating data, and
sending the aggregated data by a cluster head to the base station forms T (network operation) and
the current cluster heads are marked as non-candidates. The non-candidates will not participate in
selection of cluster heads unless all sensors have become cluster heads. This entire process starting
from the cluster selection to the data transmission by the cluster heads to base station, i.e., (T T
forms a single iteration. The iterations are carried out till all sensors have not become cluster
heads in some iteration. The number of iterations, when all clusters have become cluster heads, forms
one round. In the beginning of a round, no sensor is non-candidate. The iterations and hence the
rounds are performed till there is a cluster. In other words, even if there is a single sensor that has not
depleted its energy, it will form a cluster of itself that perform data collection/sensing and sending it to
the base station. Thus, load balancing is done automatically as it takes care of all sensors.
,M re M nd M d
,Lre Lnd Ld
= = =
CP
NO
CP
+
)NO
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 18/31
6 Results and Discussions
In this section, we discuss the implementation of HEED protocol for our heterogeneity network model
and call it as hetHEED. We have shown in the previous section that our network model is capable to
define one-level, two-level, and three-level heterogeneity of the wireless sensor networks.
Accordingly, we call the implementation of HEED as one-level HEED or hetHEED-1, two-level
HEED or hetHEED-2 and three-level HEED or hetHEED-3 heterogeneity, respectively. The
heterogeneity affects the cluster head selection that in turn affects the network lifetime. In original
HEED, the probability for selecting a cluster head has been calculated based on the residual energy
and neighbor density of nodes. Since our proposed protocol hetHEED is based on the original HEED,
we use the same parameters for cluster head selection. In literature, one more parameter, i.e., the
distance between a sensor and sink has also been considered for computing probability. The distance
between the sink and a sensor can be computed based on the received signal energy. We incorporate
this distance parameter in our hetHEED and apply fuzzy logic to calculate the probability for cluster
head selection and the corresponding hetHEED are denoted as HEED-FL, hetHEED-FL-2, and
hetHEED-FL-3, respectively.
In our simulations, we consider random deployment of 100 number of sensor nodes in a square field
of dimension 100 100 m . We discuss simulation results for various values of . For ,
there are only normal nodes in the network and the corresponding WSN has one-level heterogeneity.
We may also call this network as homogeneous network and the implementation of HEED is the
original HEED protocol, which we denote as hetHEED-1. The value of
defines a WSN that consists of normal and advance nodes and the corresponding network is said to
have two-level heterogeneity. The implementation of HEED for these types of networks is denoted by
hetHEED-2.
For three-level heterogeneity, should assume values in accordance with the inequality
. The corresponding network has three types of nodes, namely, normal,
advance, and super nodes. The energy of a super node, , is computed from the values of
and using (2) that must satisfy the inequality .
The hetHEED with fuzzy logic, i.e., HEED-FL, hetHEED-FL-2, and hetHEED-FL-3 use same
number of nodes (of respective types) in the network as the hetHEED-1, hetHEED-2, and hetHEED-
3. The number of nodes in the network is taken as 100, which are assumed to be normal node for
hetHEED-1 and HEED-FL. For hetHEED-2 and hetHEED-FL-2, numbers of normal and advance
nodes are 61 and 39, respectively. For hetHEED-3 and hetHEED-FL-3, the number of normal,
advance, and super nodes are 51, 26, and 23, respectively. It may be noted that the number of
normal, advance, and super nodes cannot be taken arbitrarily. We need to consider total number of
nodes out of which the model parameter determines their respective numbers. We may consider
arbitrary value of the initial energy of a normal node also the advance node, but the energy of a super
node cannot be taken arbitrary, it is determined by (2).
×
2
⊖ θ = 0
⊖ = ( − 1)/25√
⊖
0 < ⊖ < ( − 1)/25√
E2
,E0 E1 ⊖ < <E0 E1 E2
⊖
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 19/31
For all three level of heterogeneity with and without fuzzy logic, we have carried out simulations for
large number of input parameters, i.e., by taking different energy levels of the normal nodes, advance
nodes, super nodes, and various values of . In all cases, we got similar types of results for each type
of heterogeneity. However, we have shown results graphically for one-level heterogeneity by taking
the energy of a normal node as 0.5 J; two-level heterogeneity by taking the energies of normal and
advanced nodes as 0.5 and 0.6 J, respectively; for three-level heterogeneity by taking the energies of
normal, advance, and super nodes as 0.5, 0.6, and 2.0 J, respectively. The energy 2.0 J
corresponds to the value of 0.51 and n 2. The energy for a super node in the hetHEED-FL-3
has been taken as 0.8 J for 0.51 and n 3. We may mention that in the hetHEED the
cluster heads have been decided based on two parameters (residual energy and node density),
whereas in the hetHEED with fuzzy logic the cluster heads have been decided based on three
parameters (residual energy, node density, and distance). The input parameters used in our simulations
are summarily given in Table 2. The simulation time is 900 s, data packet size is 512 bits and the
bandwidth is taken as 1 Mbps.
Table 2
Simulation parameters
Description Symbol Value
N. of Sensors N 100
Sink position (50, 50)
Threshold distance 70 m
Cluster radius 25 m
Energy consumed by the amplifier to transmit at a shorter distance 10 nJ/bit/m
Energy consumed by the amplifier to transmit at a longer distance 0.0013 pJ/bit/m
Energy consumed in the electronics circuit to transmit or receive the signal 50 nJ/bit
Energy for data aggregation 5 nJ/bit/signal
Message size L 4,000 bits
Initial energy 0.5 J
We have computed the simulation results for getting different output parameters for hetHEED and
hetHEED with fuzzy logic. Figure 5 shows how the energies of nodes get drained with respect to the
θ
E2 =
θ = =
E2 = θ = =
Sp
d0
Cr
∈fs
2
∈mp
4
Eelec
∈DA
E0
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 20/31
number of rounds for hetHEED-1 (original HEED), hetHEED-2, hetHEED-3, hetHEED-FL (original
HEED with fuzzy logic), hetHEED-FL-2, hetHEED-FL-3. It is evident from the graphs shown in Fig.
5 that the nodes in the hetHEED-l die earlier than those of the hetHEED-2 and the nodes in
hetHEED-2 die earlier than the hetHEED-3. In other words, increasing the level of heterogeneity
increases the network lifetime. The hetHEED with fuzzy logic keeps some nodes alive for large
number of rounds. The nodes in the hetHEED-2 die earlier than the hetHEED-FL-2. It indeed
performs better than the hetHEED-3. Same is the case for hetHEED-3 and hetHEED-FL-3. In fact,
in all the hetHEED protocols, the nodes die much earlier than the corresponding to the hetHEED with
fuzzy logic protocols. Among all these, hetHEED-FL-3 performs the best as far as the number of alive
nodes is concerned. It is to mention that in the hetHEED-3 the energies have been taken as 0.5, 0.6,
and 2.0 J, respectively, for the normal, advance and super nodes, whereas in the hetHEED-FL-3 the
energies are as 0.5, 0.6, and 0.8 J, respectively, for the corresponding nodes. Even taking less energy
of the super nodes, the hetHEED-FL-3 performs much better than the hetHEED-3 (refer Fig. 5). We
have also obtained the results for network lifetime (number of rounds) when the first node has become
dead and the last node has become dead as shown in Table 3. As evident from Table 3, as the level of
heterogeneity increases, the number of rounds increases in almost all the cases for the both first node
dead and last node dead.
Table 3
Number of rounds when first and last nodes are dead (simulation time: 900 s, packet size: 512 bits,
bandwidth: 1 Mbps)
Protocols First node dead Last node dead
Original HEED 490 1,200
hetHEED-2 level 500 1,476
hetHEED-3 level 502 4,262
HEED-FL 400 2,922
hetHEED-FL-2 level 998 5,278
hetHEED-FL-3 level 998 6,636
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 21/31
Fig. 5
Number of alive nodes versus number of rounds
We have also computed simulation results how the energy of the network is dissipated with respect to
the number of rounds for the hetHEED and hetHEED with fuzzy logic for all levels and they are shown
in Fig. 6. As evident from Fig. 6, the energy of the network dissipates rapidly for the hetHEED-1 as
well as hetHEED-2 with respect to number of rounds. As the level of heterogeneity increases, the rate
of energy consumption decreases. The HEED-FL (original HEED with fuzzy logic) performs better
than the hetHEED-1 and hetHEED-2 both. The hetHEED-FL-2 performs better than all levels of the
hetHEED in spite of the fact that the hetHEED-3 has more network energy than that of the hetHEED-
FL-2. Thus, the rate of energy consumption is much slower in case the hetHEED with fuzzy logic than
the hetHEED for all levels of heterogeneity.
Fig. 6
Residual energy in network versus number of rounds
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 22/31
Figure 7 shows the simulation results in terms of the number of packets sent to the base station (BS)
with respect to the number of rounds. The number of packets sent to the base station increases as the
number of rounds increases. This behavior is depicted in Fig. 7. We also observe that as the level of
heterogeneity increases, the more number of packets are sent to the base station. In case of fuzzy logic
implementation of the hetHEED, more packets reach to the base station. Only the hetHEED-3 is able
to send the packets for large number of rounds (greater than 1,800 rounds), whereas the HEED-FL
can send packets to base station for large number of round in spite of the less energy. Thus, in our
proposed protocol, the nodes remain alive for longer time, more packets are sent to the base station,
and the rate of energy consumption decreases, as the level of heterogeneity increases. We now
discuss effect of the energy increase in the network on its lifetime for our proposed heterogeneous
network model. We have computed the increase in network lifetime with respect to that of the original
HEED for hetHEED-2, hetHEED-3, HEE-FL, hetHEED-FL-2, and hetHEED-FL-3, which are given
below.
Fig. 7
Number of packets sent to base station with respect to number of rounds
hetHEED-2 level:
Number of sensor nodes 100 ( 61+39).
Number of normal nodes 61;
Number of advance nodes 39;
Energy of a normal sensor node 0.5 J.
Energy of an advance sensor node 0.6 J.
Total network energy 61 0.5 39 0.6 53.9 J.
Network lifetime 1,476 h.
= =
=
=
=
=
= × + × =
=
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 23/31
Percentage increase in network energy 7.8
Percentage increase in network lifetime 8.5
hetHEED-3 level:
Number of sensor nodes 100 ( 51 26 23).
Number of normal nodes 51;
Number of advance nodes 26;
Number of super nodes 23;
Energy of a normal sensor node 0.5 J.
Energy of an advance sensor node 0.6 J.
Energy of a super sensor node 2.0 J.
Total network energy 51 0.5 26 0.6 23 2 87.1 J.
Network lifetime 4,262 h.
Percentage increase in network energy 74.2
Percentage increase in network lifetime 213.38
HEED-FL (Original HEED with fuzzy logic):
Number of sensor nodes 100.
Energy of a sensor node 0.5 J.
Total network energy 50 J.
Network lifetime for original HEED 1,360 h
Network lifetime for HEED-FL 2,922 h
Percentage increase in network energy 0.0
Percentage increase in lifetime 114.85.
hetHEED-FL-2 level:
Number of sensor nodes 100 ( 61 39).
Number of normal nodes 61;
Number of advancel nodes 39;
Energy of a normal sensor node 0.5 J.
=
=
= = + +
=
=
=
=
=
=
= × + × + × =
=
=
=
=
=
=
=
=
=
=
= = +
=
=
=
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 24/31
Energy of an advance sensor node 0.6 J.
Total network energy 61 0.5 39 0.6 53.9 J.
Network lifetime 5,278 h.
Percentage increase in network energy 7.8
Percentage increase in network lifetime 288.08
hetHEED-FL-3 level:
Number of sensor nodes 100 ( 51 26 23).
Number of normal nodes 51;
Number of advance nodes 26;
Number of super nodes 23;
Energy of a normal sensor node 0.5 J.
Energy of an advance sensor node 0.6 J.
Energy of a super sensor node 0.8 J.
Total network energy 51 0.5 26 0.6 23 0.8 59.5 J.
Network lifetime 6,636 h.
Percentage increase in network energy 19
Percentage increase in network lifetime 387.94
We observe from Table 4 that increasing the energy in network increases its lifetime in much
proportion. This increase is very high in case of the hetHEED with fuzzy logic. In fact, without
increasing in the network energy, the lifetime increases by 114.85 % when fuzzy logic is used. We
have also computed other performance results that include throughput, traffic load, and aggregate
delay as defined below.
=
= × + × =
=
=
=
= = + +
=
=
=
=
=
=
= × + × + × =
=
=
=
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 25/31
Table 4
Percentage increase in network energy and corresponding increase in network lifetime for hetHEED and
HEED with fuzzy logic
Variant Increase in network energy (%) Increase in network lifetime (%)
hetHEED-2 level 7.8 8.50
hetHEED-3 level 74.2 213.38
HEED-FL 0.0 114.85
hetHEED-FL-2 level 7.8 288.08
hetHEED-FL-3 level 19.0 387.94
Let and denote the time instances when a particular packet is generated at source and received
as destination. The total delay is defined as their difference, i.e.,
The aggregate delay is given by
The throughput and traffic load are given by
The throughput, traffic load, and aggregate delay are shown in Figs. 8, 9, and 10, respectively. We
observe from Fig. 8 that increasing the number of sensors increases the throughput of the network.
Furthermore, as the level of heterogeneity increases, the throughput also increases. For using fuzzy
logic, the increase is higher than that of non-fuzzy implementation. The traffic load has also similar
behaviour as shown in Fig. 9. In both graphs, the increase rate comparatively much higher for
hetHEED-3 level as compared to other cases. The aggregate delay lies in a very small range except
for the hetHEED-3 level as shown in Fig. 10.
ts tr
Total Delay = −tr ts
Aggregate Delay =
Total Delay
Total Receive packets
Throughput =
Total Receive packets ∗ packet size ∗ 8
Total Simulation time
Traffic Load = Total packets Sends ∗ packet size
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 26/31
Fig. 8
Throughput versus number of sensors
Fig. 9
Traffic load versus number of sensors
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 27/31
1.
2.
Fig. 10
Aggregate delay versus number of sensors
7 Conclusions
In this paper, the HEED protocol has been discussed for the heterogeneous wireless sensor network.
In this work, we have incorporated different level of heterogeneity, namely, one-level, two-level, and
three-level heterogeneity in terms of the node energy and accordingly the implementation of HEED has
been named as hetHEED-1 (original HEED), hetHEED-2, and hetHEED-3, respectively. We have
also implemented all these levels of heterogeneity using fuzzy logic that considers distance in addition
to the residual energy and node density for selecting cluster heads. Increasing heterogeneity level
increases network lifetime in much proportion as compared to the increase in the network energy. In
fact, using fuzzy logic for original HEED, the network lifetime increases by 114.85 % without any
increase in the network energy.
References
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor
networks: A survey. Computer Networks, 38(4), 393–422.
Arampatzis, Th., Lygeros, J., & Manesis, S. (2005). A survey of applications of wireless sensors
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 28/31
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
and wireless sensor networks. In Proceedings of 13th Mediterranean conference on control and
automation (pp. 719–724), Limassol, Cyprus, June 27–29, 2005.
Kumar, D., Aseri, T. S., & Patel, T. S. (2009). EEHC: Energy efficient heterogeneous clustered
scheme for wireless sensor networks. International Journal of Computer Communications, 32(4),
662–667.
CrossRef
Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication
protocol for wireless microsensor networks. In Proceedings of 33rd Hawaii international
conference on system sciences (Vol. 8, p. 8020), January 4–7, 2000.
Heinzelman, W. R., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific
protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless
Communications, 1(4), 660–670.
CrossRef
Manjeshwar, A., & Agrawal, D. (2001). TEEN: A protocol for enhanced efficiency in wireless
sensor networks. In Proceedings of the 1st international workshop on parallel and distributed
computing issues in wireless networks and mobile computing, San Francisco, CA, April 2001.
Manjeshwar, A., & Agarwal, D. P. (2002). APTEEN: A hybrid protocol for efficient routing and
comprehensive information retrieval in wireless sensor networks. In Proceedings of international
parallel and distributed processing symposium (IPDPS) (pp. 195–202).
Lindsey, S., & Raghavendra, C. (2002). PEGASIS: Power-efficient gathering in sensor
information systems. In IEEE aerospace conference proceedings (Vol. 3, pp. 1125–1130).
Smaragdakis, G., Matta, I., & Bestavros, A. (2004). SEP: A stable election protocol for
clustered heterogeneous wireless sensor networks. In Second international workshop on sensor
and actor network protocols and applications (SANPA 2004).
Ye, M., Li, C., Chen, G., & Wu, J. (2005). EECS: An energy efficient cluster scheme in
wireless sensor networks. In IEEE international workshop on strategies for energy efficiency in
ad hoc and sensor networks (IEEE IWSEEASN-2005), Phoenix, AZ, April 7–9, 2005.
Li, Q., Qingxin, Z., & Mingwen, W. (2006). Design of a distributed energy efficient clustering
algorithm for heterogeneous wireless sensor networks. Computer Communications, 29, 2230–
2237.
CrossRef
Younis, O. & Fahmy, S. (2004). Distributed clustering in ad-hoc sensor networks: A hybrid,
energy-efficient approach. In Proceedings of IEEE INFOCOM, Hong Kong, March 2004, an
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 29/31
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
extended version appeared in, IEEE transactions on mobile computing (Vol. 3(4)), October-
December 2004.
Padmanabhan, K., & Kamalakkannan, P. (2011). A study on energy efficient routing protocols
in wireless sensor networks. European Journal of Scientific Research, 60(4), 499–511.
Rodoplu, V., & Meng, T. H. (1999). Minimum energy mobile wireless networks. IEEE
Journal on Selected Areas in Communications, 17(8), 1333–1344.
CrossRef
Xu, Y., Heidemann, J., & Estrin, D. (2001). Geography-informed energy conservation for ad-
hoc routing. In Proceedings of ACM/IEEE MobiCom’01 (pp. 70–84), Rome, Italy.
Yu, Y., Govindan, R., & Estrin, D. (2001). Geographical and energy aware routing: A recursive
data dissemination protocol for wireless sensor networks. Technical report UCLA/CSD-TR-01-
0023, UCLA Computer Science Department.
Heinzelman, W. R., Kulik, J., & Balakrishnan, H. (1999). Adaptive protocols for information
dissemination in wireless sensor networks. In Proceedings of ACM MobiCom ’99 (pp. 174–185),
Seattle, WA.
Kulik, J., Heinzelman, W., & Balakrishnan, H. (2002). Negotiation-based protocols for
disseminating information in wireless sensor networks. Wireless Networks, 8(2/3), 169–185.
CrossRef MATH
Intanagonwiwat, C., Govindan, R., & Estrin, D. (2000). Directed diffusion: A scalable and
robust communication paradigm for sensor networks. In Proceedings ACM MobiCom’00 (pp. 56–
67), Boston, MA, August 2000.
Braginsky, D., & Estrin, D. (2002). Rumor routing algorithm in sensor networks. In
Proceedings of ACM WSNA, in conjunction with ACM MobiCom’02 (pp. 22–31), Atlanta, GA.
Lindsey, S., Raghavendra, C. S., & Sivalingam, K. M. (2002). Data gathering algorithms in
sensor networks using energy metrics. IEEE Transactions on Parallel and Distributed Systems,
13(9), 924–935.
CrossRef
Sohrabi, K., Gao, J., Ailawadhi, V., & Pottie, G. J. (2000). Protocols for self-organization of a
wireless sensor network. IEEE Journal of Personal Communications, 7(5), 16–27.
CrossRef
He, T., Stankovic, J. A., Chenyang, L., & Abdelzaher, T. (2003). SPEED: A stateless protocol
for real-time communication in sensor networks. In Proceedings of international conference on
distributed computing systems (pp. 46–55), Providence, RI.
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 30/31
24.
25.
26.
27.
28.
29.
30.
Eshghi, N., & Haghighat, A. T. (2008). Energy conservation strategy in cluster-based wireless
sensor networks. In Proceedings of international conference on advanced computer theory and
engineering (pp. 1015–1019).
Younis, O., & Fahmy, S. (2005). An experimental study of energy-efficient routing and data
aggregation in sensor networks. In Proceedings of international workshop on localized
communication and topology protocols for ad hoc networks (LOCAN) (pp. 50–57), November
2005.
Huang, H., & Wu, J. (2005). A probalilistic clustering algorithm in wireless sensor networks. In
Vehicular technology conference IEEE 62nd VTC-Fall (Vol. 3, pp. 1796–1798).
Khedo, K. K., & Subramanian, R. K. (2009). MiSense hierarchial cluster based routing
algorithm (MiCRA) for wireless sensor networks. World Academy of Science: Engineering and
Technology, 52, 190–195.
Sharma, A. K., & Kour, H. (2010). Hybrid energy efficient distributed protocol for
heterogeneous wireless sensor network. International Journal of Computer Applications, 4(5),
37–41.
Bala, M., & Awasthi, L. (2012). On proficiency of HEED protocol with heterogeneity for
wireless sensor networks with BS and nodes mobility. International Journal of Applied
Information Systems (IJAIS), 2(7), 58–62.
Ben-Mubarak, M. A., Ali, B. M., Noordin, N. K., Ismail, A., & Ng, C. K. (2013). Fuzzy logic
based self-adaptive handover algorithm for mobile WiMAX. Wireless Personal Communications,
71(2), 1421–1442.
CrossRef
Over 8.5 million scientific documents at your fingertips
© Springer International Publishing AG, Part of Springer Science+Business Media
1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 31/31

More Related Content

What's hot

Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
IJCNCJournal
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
IJCNCJournal
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
ijfcstjournal
 
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
IAEME Publication
 
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
IJERA Editor
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
ijasuc
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
Iasir Journals
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
ijwmn
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
ijsrd.com
 
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
IJCNC
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
IJCNCJournal
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
IJORCS
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
ijeei-iaes
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
ijiert bestjournal
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
eSAT Publishing House
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
eSAT Publishing House
 
40120140507001
4012014050700140120140507001
40120140507001
IAEME Publication
 

What's hot (20)

Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
 
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
 
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
 
135 139
135 139135 139
135 139
 
D0606032413 Paper
D0606032413 PaperD0606032413 Paper
D0606032413 Paper
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 
40120140507001
4012014050700140120140507001
40120140507001
 

Viewers also liked

Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
Santosh Regmi
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
Yogesh Fulara
 
Heed presentation
Heed presentationHeed presentation
Heed presentationMazen Farah
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
IJCSIT Journal
 
HEED - Home Energy Efficient Design
HEED - Home Energy Efficient DesignHEED - Home Energy Efficient Design
HEED - Home Energy Efficient Design
Center for Sustainable Energy
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
zhendong
 

Viewers also liked (8)

Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Heed presentation
Heed presentationHeed presentation
Heed presentation
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
 
HEED - Home Energy Efficient Design
HEED - Home Energy Efficient DesignHEED - Home Energy Efficient Design
HEED - Home Energy Efficient Design
 
eeca
eecaeeca
eeca
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 

Similar to Heterogeneous heed protocol for wireless sensor networks springer

Ed33777782
Ed33777782Ed33777782
Ed33777782
IJERA Editor
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
IJERA Editor
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
IRJET Journal
 
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
IOSR Journals
 
Dc31712719
Dc31712719Dc31712719
Dc31712719
IJERA Editor
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
ijfcstjournal
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
ijwmn
 
Iaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routingIaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routing
Iaetsd Iaetsd
 
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
IJCI JOURNAL
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
eSAT Journals
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
eSAT Publishing House
 
15 ijcse-01236
15 ijcse-0123615 ijcse-01236
15 ijcse-01236
Shivlal Mewada
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
eSAT Journals
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
eSAT Publishing House
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
IJTET Journal
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
ijassn
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ijassn
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
ijsrd.com
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
iosrjce
 
G017344246
G017344246G017344246
G017344246
IOSR Journals
 

Similar to Heterogeneous heed protocol for wireless sensor networks springer (20)

Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
 
Dc31712719
Dc31712719Dc31712719
Dc31712719
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
Iaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routingIaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routing
 
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
 
15 ijcse-01236
15 ijcse-0123615 ijcse-01236
15 ijcse-01236
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
G017344246
G017344246G017344246
G017344246
 

More from Raja Ram

Face recognition across non uniform motion blur, illumination, and pose
Face recognition across non uniform motion blur, illumination, and poseFace recognition across non uniform motion blur, illumination, and pose
Face recognition across non uniform motion blur, illumination, and pose
Raja Ram
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Raja Ram
 
Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...
Raja Ram
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
Raja Ram
 
Integrating mobile access with university data processing in the cloud
Integrating mobile access with university data processing in the cloudIntegrating mobile access with university data processing in the cloud
Integrating mobile access with university data processing in the cloud
Raja Ram
 
A novel automated identification of intima media thickness in ultrasound
A novel automated identification of intima media thickness in ultrasoundA novel automated identification of intima media thickness in ultrasound
A novel automated identification of intima media thickness in ultrasound
Raja Ram
 
Multi transmit beam forming for fast cardiac
Multi transmit beam forming for fast cardiacMulti transmit beam forming for fast cardiac
Multi transmit beam forming for fast cardiac
Raja Ram
 
Multi transmit beam forming for fast cardiac
Multi transmit beam forming for fast cardiacMulti transmit beam forming for fast cardiac
Multi transmit beam forming for fast cardiac
Raja Ram
 
Novel modilo based aloha anti collision
Novel modilo based aloha anti collisionNovel modilo based aloha anti collision
Novel modilo based aloha anti collision
Raja Ram
 
A new secure image transmission technique via secret
A new secure image transmission technique  via secretA new secure image transmission technique  via secret
A new secure image transmission technique via secret
Raja Ram
 
06542014
0654201406542014
06542014
Raja Ram
 
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
Raja Ram
 

More from Raja Ram (12)

Face recognition across non uniform motion blur, illumination, and pose
Face recognition across non uniform motion blur, illumination, and poseFace recognition across non uniform motion blur, illumination, and pose
Face recognition across non uniform motion blur, illumination, and pose
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
Integrating mobile access with university data processing in the cloud
Integrating mobile access with university data processing in the cloudIntegrating mobile access with university data processing in the cloud
Integrating mobile access with university data processing in the cloud
 
A novel automated identification of intima media thickness in ultrasound
A novel automated identification of intima media thickness in ultrasoundA novel automated identification of intima media thickness in ultrasound
A novel automated identification of intima media thickness in ultrasound
 
Multi transmit beam forming for fast cardiac
Multi transmit beam forming for fast cardiacMulti transmit beam forming for fast cardiac
Multi transmit beam forming for fast cardiac
 
Multi transmit beam forming for fast cardiac
Multi transmit beam forming for fast cardiacMulti transmit beam forming for fast cardiac
Multi transmit beam forming for fast cardiac
 
Novel modilo based aloha anti collision
Novel modilo based aloha anti collisionNovel modilo based aloha anti collision
Novel modilo based aloha anti collision
 
A new secure image transmission technique via secret
A new secure image transmission technique  via secretA new secure image transmission technique  via secret
A new secure image transmission technique via secret
 
06542014
0654201406542014
06542014
 
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
 

Recently uploaded

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 

Recently uploaded (20)

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 

Heterogeneous heed protocol for wireless sensor networks springer

  • 1. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 1/31 (1) Wireless Personal Communications An International Journal © Springer Science+Business Media New York 2014 10.1007/s11277-014-1629-y Heterogeneous HEED Protocol for Wireless Sensor Networks Satish Chand 1 , Samayveer Singh 1 and Bijendra Kumar1 Netaji Subhas Institute of Technology, Sector-3, Dwarka, New Delhi , 110078, India Satish Chand (Corresponding author) Email: schand86@hotmail.com Samayveer Singh Email: samayveersingh@gmail.com Bijendra Kumar Email: bizender@rediffmail.com Published online: 6 February 2014 Abstract One of the important protocols for increasing the network lifetime in wireless sensor networks (WSNs) is hybrid energy efficient distributed (HEED) protocol. This protocol considers two parameters for deciding the cluster heads, i.e., residual energy and node density and has been designed for the homogeneous WSNs. In this paper, we consider the implementation of HEED for a heterogeneous network. Depending upon the type of nodes, it defines one-level, two-level, and three- level heterogeneity and accordingly the implementation of HEED is referred to as hetHEED-1, hetHEED-2, and hetHEED-3, respectively. We also consider one more parameter, i.e., distance and apply fuzzy logic to determine the cluster heads and accordingly the hetHEED-1, hetHEED-2, and hetHEED-3 are named as HEED-FL, hetHEED-FL-2, hetHEED-FL-3, respectively. The simulation results show that as the level of heterogeneity increases in the network, the nodes remain alive for longer time and the rate of energy dissipation decreases. And also, increasing the heterogeneity level helps sending more packets to the base station and increases the network lifetime. The increase in the network energy increases the network lifetime manifold. In fact, using fuzzy logic, the network lifetime increases by 114.85 % that of the original HEED without any increase in the network energy. Thus, the hetHEED-FL-3 provides the longest lifetime (387.94 % increase) in lifetime at the cost of 19 % increase in network energy), sends maximum number of packets to the base station, and has minimum rate of energy dissipation.
  • 2. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 2/31 Keywords Sensor networks – Clustering – Network lifetime – Rounds – Load balancing – Membership function – Fuzzy logic – Heterogeneity Satish Chand did his M.Sc. in Mathematics from Indian Institute of Technology, Kanpur, India and M.Tech. in Computer Science from Indian Institute of Technology, Kharagpur, India and Ph.D. from Jawaharlal Nehru University, New Delhi, India. Presently he is working as a Professor in Computer Engineering Division, Netaji Subhas Institute of Technology, Delhi, India. Areas of his research interest are Multimedia Broadcasting, Networking, Video-on-Demand, Cryptography, and Image processing. Samayveer Singh received his B.Tech. in Information Technology from Uttar Pradesh Technical University, Lucknow, India in 2007 and his M.Tech. in Computer Science & Engineering from National Institute of Technology, Jalandhar, India, in 2010. He is pursuing his PhD in the Department of Computer Engineering, Netaji Subhas Institute of Technology, New Delhi, India. His research interest includes wireless sensor networks.
  • 3. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 3/31 Bijendra Kumar did his Bachelor of Engineering from H.B.T.I. Kanpur, India. He has done his Ph.D. from Delhi University, Delhi, India in 2011. Presently he is working as an Assistant Professor in Computer Engineering Division, Netaji Subhas Institute of Technology, Delhi, India. His areas of research interests are Video applications, watermarking, and Design of algorithms. 1 Introduction The wireless communication is one of the important types of communication that requires no fixed infrastructure. There are many situations where wireless communication can be deployed such as volcano, battlefield monitoring, old building structure. It is generally used where the normal cabling is difficult or financially impractical. The wireless communication done using the sensor devices is called wireless sensor communication and the resultant network is called the wireless sensor network (WSN). The WSNs are easily deployable, maintenance free, and provide fault-tolerant platform for gathering data from the environment [1]. They are cost effective also because the sensors are very cheap devices and do not require any infrastructure such as lying cabling. The sensors, also called motes or actuators [2], have an ability to sense the physical environment for an event that may include sound, humidity, light, temperature, vibration, etc. They collect data by measuring the comprehensive conditions in their surroundings and transmit it to sink that in turn either processes it or forwards to the data processing centre using internet. Currently, the wireless systems deal with the integration of low- power communication, sensing, energy storage, and computation [2]. In a WSN, the communication can be done using either single hop or multihop. In single hop (also called peer to peer communication), the sensor nodes directly communicate with any other sensor node or with the base station. In multihop communication, there may be a sequence of hops while communicating to the base
  • 4. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 4/31 station from a sensor node. Deployment of sensors in a WSN can be deterministic or random depending on the application. They can be stationary or location-aware, homogeneous or heterogeneous in nature. Since the sensors are not supported by external battery, their energy must be used very efficiently in order to monitor the area for longer time. One possible solution to have longer lifetime of a WSN is to use more sensors, but it may increase collision and, in that case, a suitable scheduling mechanism need be employed. Other solution of prolonging the lifetime of a WSN is to employ the heterogeneity in sensor nodes [3]. There are three common types of resource heterogeneity in a sensor node, namely, computational, link, and energy heterogeneity. In computational heterogeneity, the heterogeneous node has more resources such as powerful microprocessor and relatively more memory so that it can provide complex data processing and longer-term storage. In link heterogeneity, the heterogeneous node has high-bandwidth and long- distance network transceiver so that it can provide more reliable data transmission. Energy heterogeneity means that the sensor nodes have different levels of energy. The computational and link heterogeneities implicitly depend on the energy as these types of nodes consume more energy. Thus, the energy based heterogeneity may be considered as the most dominating heterogeneity in WSNs. It has been reported that providing heterogeneity in sensor nodes prolongs the network lifetime, improves reliability of data transmission, and decreases the latency of data transportation. There have been several protocols for WSNs, which may be classified into different categories. One of the important categories of protocols consists of clustering or hierarchical protocols such as low energy adaptive clustering hierarchy (LEACH) [4] and its different modifications such as LEACH-C, LEACH-M [4, 5], threshold sensitive energy efficient sensor network protocol (TEEN) [6], adaptive periodic threshold-sensitive energy efficient sensor network protocol (APTEEN) [7], power-efficient gathering in sensor information systems [8], stable election protocol (SEP) [9], energy efficient clustering scheme (EECS) [10], deterministic energy efficient clustering (DEEC) [11] protocol and hybrid energy efficient distributed (HEED) [12]. Among these types of protocols, the HEED is one of the most popular protocols as the cluster heads in this protocol are decided based on the residual energy and degree of nodes. The degree of nodes distributes load among the cluster heads. In other protocols, the cluster heads are selected based on the residual energy only and no load balancing is done. In this paper, we discuss the HEED protocol for deploying the underlying network as our heterogeneous network model in order to increase the lifetime. Our model can describe one- level, two-level, and three-level heterogeneity and, accordingly, we may call the implementation of HEED as hetHEED-1, hetHEED-2, and hetHEED-3. The one-level heterogeneity assumes all sensor nodes in a WSN to have equal amount of energy, for which the original HEED is implemented. We may also call it as homogeneous HEED. The two-level and three-level heterogeneity assume the sensor nodes in a WSN to be equipped with two and three energy levels, respectively, for which we call the implementation of HEED as hetHEED-2 and hetHEED-3 protocols. The original HEED considers two parameters—residual energy and node density to determine the cluster heads. In hetHEED-1, hetHEED-2, and hetHEED-3, we consider the same two parameters to determine the cluster heads so that we can compare their performance with respect to heterogeneity. We also consider one more parameter, i.e., distance between a sensor and sink, in addition to residual energy and node density
  • 5. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 5/31 and apply the fuzzy logic to calculate the probability in order to decide the cluster heads. The resultant HEED implementation is named as HEED-FL (original HEED with fuzzy logic), hetHEED-FL-2 (hetHEED-2 with fuzzy logic), and hetHEED-FL-3 (hetHEED-3 with fuzzy logic). Increasing the energy in network in order to make them heterogeneous increases the network lifetime, which is at much higher side, especially in case of hetHEED-3 (74.2 % energy increase leads to 213.38 % increase in network lifetime). Using fuzzy logic in HEED without increasing any energy in the network increases the network lifetime by 114.85 % of that of the original HEED. Increasing the heterogeneity level with fuzzy logic increases the network lifetime manifold. For example, the 19 % increase in the network energy enhances the network lifetime by 387.94 %. The rest of the paper is organized as follows. Section 2 reviews the related literature. Section 3, discusses the fuzzy system including its different components—fuzzifier, fuzzy rulebase, fuzzy inference engine, and defuzzifier. In Sect. 4, a heterogeneous model for WSNs is discussed that is used to simulate hetHEED-1, hetHEED-2, and hetHEED-3, HEED-FL, hetHEED-FL-2, and hetHEED-FL- 3. In Sect. 5, we discuss cluster formation, data collection and data transmission. The simulation results are given Sect. 6 and, finally, the paper is concluded in Sect. 7. 2 Literature Review The routing protocols for WSNs may be categorized into different classes based on the applications such as location based, data-centric, mobility based, multipath based, QoS based, and hierarchical [13]. The location based protocols utilize the position information of nodes to relay the data of the desired regions rather than the whole network. Some of the important location based protocols are minimum energy communication network [14], greedy anti-void routing [15], and geographical and energy aware routing [16]. In the data centric routing protocols, also called flat-based, all nodes in WSN use flood based data transferring scheme. Some of the important data centric based protocols include sensor protocols for information via negotiation [17], directed diffusion [18], and Rumor routing [19]. The multipath routing protocols such as sensor-disjoint multipath protocol [20] use multiple paths to enhance the network performance. In QoS based routing protocols, the network makes balance between the energy consumption and data quality besides the QoS metrics such as delay, energy, bandwidth while delivering the data to base station or sink. Some of the QoS based protocols include sequential assignment routing [21], stateless protocol for real-time communication in sensor networks [22], and energy-aware routing [23]. The hierarchical protocols, also called clustering protocols, cluster the sensor nodes. These protocols generally work in two phases. In first phase, the cluster heads are selected and, in second phase, routing/data transmission is performed. The low energy adaptive clustering hierarchy (LEACH) [4] is the very first clustering protocol that forms the clusters based on the received signal strength. In this protocol, the data is transmitted through cluster heads, whose numbers are predetermined. The cluster heads are changed randomly over the time so that the cluster heads (sensor nodes) do not become dead by draining up their entire
  • 6. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 6/31 energy. There have been discussed different variants of LEACH such as LEACH-C, LEACH-M, LEACH-V [4, 5]. Manjeshwar and Agarwal discuss a TEEN protocol [6] that uses hierarchical structure. This protocol responds to the sudden changes in the sensed attribute, a physical parameter about which a user is interested and thus it is useful for time-critical applications. The TEEN protocol has been modified as APTEEN protocol [7] that is meant for both time-critical events and periodic data collections. Lindsey and Raghavendra discuss power efficient gathering in sensor information systems protocol [8], an improved version of LEACH, that uses chains of sensor nodes. The data is transmitted from all sensor nodes through their respective chains to a single node, called cluster head. The cluster head aggregates the data to remove the duplicity and then transmits it to the base station or sink. It outperforms the LEACH; however, due to excessive delay, it is not suitable for large networks. Smaragdakis et al. discuss SEP [9], an extension of LEACH, that uses hierarchical clustering and heterogeneity unlike the LEACH. In this protocol, a node becomes cluster head on the basis of weighted election probabilities of each node according to their respective energies. The EECS protocol [10] elects the cluster heads with more residual energy through local radio communication. It is used for periodical data gathering applications using WSNs. It uses load balancing and energy efficiently. However, it requires global knowledge of distances between the cluster-heads and base station. Li et al. discuss DEEC [11] for two-level and multi level heterogeneous WSNs. This protocol selects cluster heads using the ratio of residual energy of each node and the average energy of the network. The nodes having high initial and residual energies have more chance of becoming cluster heads. The nodes nearer to the sink require spending more energy than those farther because of the extra burden of the nodes within the neighborhood of the base station. Thus, smaller clusters are formed using the nearer nodes to balance the load among the cluster heads that fall in different regions and vice versa. This concept has been discussed by Eshghi and Haghighat [24]. The HEED [12] protocol selects cluster heads based on their residual energy and node degrees. The node degree helps balancing the load among the cluster heads. In this protocol, the clustering process is carried out in terms of iterations and, in every iteration, the nodes not covered by any cluster head double their probability of becoming a cluster head. It has low overhead in terms of processing cycles and message exchanged. This protocol does not assume any distribution of nodes or location awareness. It also achieves fairly uniform cluster head distribution across the network and prolongs the network lifetime besides supporting data aggregation. A variant of HEED protocol, called integrated HEED (iHEED) [25], has integrated data aggregation in the multihop routing by considering data aggregation operators such as AVG or MAX. It can serve both source and data driven applications. Another variant of HEED by Huang and Wu [26] discusses a constant time clustering mechanism that may be termed as an extended probabilistic algorithm for HEED protocol. In this algorithm, the nodes having high energy participate in cluster head election and the remaining are eliminated; thus, requiring less rounds for selecting cluster heads. Another variant of HEED, called Misense hierarchical cluster based routing algorithm (MiCRA) [27], maintains the balanced energy consumption of nodes so that the network lifetime increases. The paper [28] discusses the HEED for heterogeneous network model;
  • 7. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 7/31 (1) however, no new heterogeneous network model is discussed in that paper. It uses two-level and multilevel heterogeneous model from [11] and three-level heterogeneous model from [3]. Its performance is poorer than that of ours. In [29], similar work has been discussed as in [28], but it considers the nodes movable unlike in [28] that has static nodes. As regard to performance of [29], our proposed hetHEED protocols perform better and same is the case with HEED-FL, hetHEED- FL-2 and hetHEED-FL-3. In next section, we discuss fuzzy system as it is needed for finding the cluster heads. 3 Fuzzy System The system based on fuzzy logic consists of four parts: fuzzifier, fuzzy knowledge base, fuzzy inference engine, and defuzzifier as shown in Fig. 1. Fig. 1 Fuzzy logic based system The inputs to the system are crisp numbers. The fuzzifier transforms these crisp values into fuzzy values and stores in a fuzzy set by applying a suitable fuzzification function. The fuzzy rules are of the form IF- THEN, which are stored in fuzzy rulebase, also called knowledgebase. The output of the fuzzifier and the rules from the knowledgebase are given to the fuzzy inference engine as inputs for simulating human reasoning process by making fuzzy inference. The output of the fuzzy inference engine is provided to the defuzzifier that converts the fuzzy values into crisp values. The defuzzifier calculates the centroid and uses it to calculate the probability. The centroid is computed as follows: where, denotes the membership function of set A. We have used Mamdani model [30] for inference engine because it is most widely used in applications Centroid = ∑ (x) ∗ xμ A ∑ (x)μA (x)μ A
  • 8. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 8/31 due to its simplicity. We consider three input parameters in our fuzzy system that include battery power, node density, and distance between a sensor and the sink. Each of the input variables has three membership functions, i.e., the battery power has low, medium, and high; the node density has sparsely, medium, and densely; the distance has near, medium, and far. The membership function corresponding to the output variable, i.e., probability has 9 values—very weak, weak, little weak, lower medium, medium, higher medium, little strong, strong, very strong (Fig. 2). Fig. 2 Layered fuzzy scheme The membership functions for battery power consists of one full and two half trapezoidal; for node density, two trapezoidal and one triangular; for distance, two half trapezoidal and one triangular; and for output probability, two half trapezoidal and seven triangular, as shown in Fig. 3a–d, respectively (Table 1).
  • 9. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 9/31 Fig. 3 Fuzzy sets corresponding to fuzzy inputs and output parameters. a Fuzzy set for fuzzy input variable: battery power. b Fuzzy set for fuzzy input variable: node density. c Fuzzy set for fuzzy input variable: distance. d Fuzzy set for fuzzy output variable: probability
  • 10. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 10/31 Table 1 Fuzzy rule base Battery power Node density Distance Probability Low(0) Sparsely(0) Near(0) Little weak(2) Low(0) Sparsely(0) Medium(1) Weak(1) Low(0) Sparsely(0) Far(2) Very weak(0) Low(0) Medium(1) Near(0) Lower medium(3) Low(0) Medium(1) Medium(1) Little weak(2) Low(0) Medium(1) Far(2) Weak(1) Low(0) Densely(2) Near(0) Medium(4) Low(0) Densely(2) Medium(1) Lower medium(3) Low(0) Densely(2) Far(2) Little weak(2) Medium(1) Sparsely(0) Near(0) Medium(4) Medium(1) Sparsely(0) Medium(1) Lower medium(3) Medium(1) Sparsely(0) Far(2) Little weak(2) Medium(1) Medium(1) Near(0) Higher medium(5) Medium(1) Medium(1) Medium(1) Medium(4) Medium(1) Medium(1) Far(2) Lower medium(3) Medium(1) Densely(2) Near(0) Little strong(6) Medium(1) Densely(2) Medium(1) higher medium(5) Medium(1) Densely(2) Far(2) Medium(4) High(2) Sparsely(0) Near(0) Little strong(6) High(2) Sparsely(0) Medium Higher medium(5) High(2) Sparsely(0) Far(2) Medium(4)
  • 11. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 11/31 (a) (b) (c) (d) (e) (f) (g) (h) (i) High(2) Medium(1) Near(0) Strong(7) High(2) Medium(1) Medium(1) Little strong(6) High(2) Medium(1) Far(2) Higher medium(5) High(2) Densely(2) Near(0) Very strong(8) High(2) Densely(2) Medium(1) Strong(7) High(2) Densely(2) Far(2) Little strong(6) We use fuzzy model for selecting the cluster heads. The node corresponding to maximum probability is chosen as the cluster head. In next section, we discuss our heterogeneous network model. 4 Proposed Heterogeneity Network Model Before discussing our network model, we outline the basic assumptions made for WSN in our work: All sensor nodes and base station are stationary after deployment; each is identified by a unique ID. Nodes are location-unaware, i.e. not equipped with GPS-capable antennae. All nodes have similar capabilities (processing/communication), but different in terms of energies. Nodes are left unattended after deployment, meaning thereby battery recharge is not possible. There is only one BS, located at the centre in the network, has a constant power supply; thus has no energy, memory and computation constraints. Each node has the ability to aggregate data; as a result several data packets can be compressed as one packet. The distance between nodes can be computed based on the received signal strength. Nodes have the capability of controlling the transmission power according to the distance of receiving nodes and the node failure is considered due to energy depletion. The radio link is symmetric such that energy consumption of data transmission from node A to node B is the same as that of transmission from node B to node A. Now, we discuss a three level heterogeneous network model. This model describes a WSN that consists of three types of sensor nodes based on their energy levels. The nodes having more energy
  • 12. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 12/31 (2) (3) (4) are supposed to be costlier than those having less energy. Because of the high cost, the nodes having maximum energy are assumed to be minimum in numbers. The nodes having minimum energy level are the cheapest ones and hence they can be deployed abundantly. We assume that the WSN has N number of nodes out of which nodes have minimum energy, where 0 1. We may call them as the normal nodes and the energy of these types of nodes denoted as . The nodes have more energy than the normal nodes. We may call these nodes as the advance nodes and denote the node energy by . The remaining nodes have the maximum energy, denoting the node energy by . These nodes may be called as super nodes. Thus, we have the inequalities for the number of nodes and their energy levels. The total energy of the network, , is given by the following expression. We will show that this model (2) can describe one-level, two-level, and three-level heterogeneity depending on the value of . The bounds of are 0 and 1. When 0, we have only one term in (2) as the first two terms in (2) become zero. For 0, in (2) contains super nodes only, which signifies one-level heterogeneity. We may also call it homogeneity because the network contains only a single type of nodes. In this case, a node in the network has energy. We impose suitable constraints so that the model contains normal nodes rather the super nodes in case of one-level heterogeneity. This can be obtained by defining the following relation: where n is a positive integer greater than 1 and is a function of and . In a very simple form, we can have . The value of in (3) should be in the consonant with the condition: . Now, we will show that this model can describe two-level heterogeneity, i.e., the network contains only two types of nodes. For this, we find the value of , which is given by the solution of the following equation: Equation (4) is not an arbitrary; it basically diminishes the third term in (2), making thus the model of two-level heterogeneity. Using (4), the model in (2) contains two types of nodes: normal and advance nodes. Equation (4) has two solutions: and . Since is upper- bounded by 1 and , the valid solution of (4) is . For , the model (2) contains two types of nodes that have energies and . For three-level heterogeneity, we need to determine the range of . The upper bound of the range is ⊖ ∗ N ≤ ⊖ ≤ E0 ∗ N⊖ 2 E1 (N − (⊖ ∗ N + ∗ N))⊖ 2 E2 ⊖ ∗ N > ∗ N > (N − (⊖ ∗ N + ∗ N)) and < <⊖ 2 ⊖ 2 E0 E1 E2 Tenergy = ⊖ ∗ N ∗ + ∗ N ∗ + (1 − ⊖ − ) ∗ N ∗Tenergy E0 ⊖ 2 E1 ⊖ 2 E2 θ θ θ = θ = Tenergy E2 ⊖ = −E2 E0 n ∗ f( , )E1 E2 f E1 E2 f either ( + ) or ( − )E2 E1 E2 E1 θ < <E0 E1 E2 θ 1 − ⊖ − = 0⊖ 2 (( ) − 1)/25√ (( ) + 1)/25√ θ (( ) + 1)/2 > 15√ (( ) − 1)/25√ θ = (( ) − 1)/25√ E0 E1 ⊖ (( ) − 1)/2√
  • 13. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 13/31 (5) (6) (7) (8) (9) . Let the lower bound of be that is to be determined. The range of for three-level heterogeneity is . Taking as and from (3), we have Let and . From (5), we have It can be written as Or Since LHS of inequality (6) is negative, we should have This gives From (5) can be written as The inequality may be written as In this way, we have shown that the energy model in (2) can describe one-level, two-level and three- level heterogeneity in a WSN. 5 Cluster Formation and Data Transmission In this section, we discuss in general cluster formation, data collection, data aggregation, and then data transmission to the base station. In our network of sensors, a sensor acts either as a cluster head or simply a cluster member. We discuss the computation of the energy spent by the cluster head and the cluster members in a cluster in collecting or transmitting the data. The energy spent in transmitting L-bit message by a sensor depends on the distance [4, 5]. (( ) − 1)/25√ ⊖ θL θ < ⊖ < (( ) − 1)/2⊖L 5√ f ( − )E2 E1 θ < < (( ) − 1)/2⊖L −E2 E0 n ∗ ( − )E2 E1 5√ = +E1 α1 E0 = +E2 α2 E1 <⊖L +α2 α1 n ∗ α2 < α2 α1 1 n ∗ − 1⊖L − ≥ α2 α1 1 1 − n ∗ ⊖L 1 − n ∗ < 0⊖L < 1 n ⊖L ( − ) ≤ ∗ ( − )E2 E0 n ∗ (( ) − 1)5√ 2 E2 E1 n ∗ (( ) − 1) ∗ − 2 ≤ (n ∗ (( ) − 1) − 2)5√ E1 ∗ E0 5√ ∗ E2
  • 14. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 14/31 (10) (11) (12) (13) (14) (15) For short distance , the energy consumed is given by For long distance , the energy consumed is given by where signifies energy dissipated per bit per m and to run the transmitter or receiver circuitry and are transmitter-amplifier model parameters. The first terms in (10) and (11) signify the energy spent by the transmitter circuitry that is basically related to the digital coding, modulation, filtering, etc. and the second terms signify the energy spent in actual transmission of the message data of L-bits. We generally refer this total energy as the energy spent in transmission. The distance is short or long is decided on the value of , also called as threshold, whose value is given by [4, 5] This threshold value is maximum and in practice less value of is considered, e.g., 70, 75, 85, etc. The energy spent in receiving L-bits data is given by [4, 5] The energy spent in sensing L-bits data is given by [4, 5] Here, and each are equal to (i.e., . The head node receives the data from several sensors, which are meant for monitoring/sensing some activity. It is quite likely that the duplicate data may be received by the cluster head from different sensors as they are monitoring the same activity. The energy spent in aggregating L-bits data is given by [4, 5] where, nJ per message bit. Normally, the number of clusters are predetermined, say, 5 % and so, of the total nodes in the network. Once the cluster head are decided, these heads broadcast advertisement message to all sensors. Depending upon the received signal energy (assuming residual energy is the only parameter for deciding cluster heads), each sensor node decides its cluster head and informs its decision to the cluster head that corresponds to the maximum received signal energy. In our work, the cluster heads are selected based on the residual energy and the node degree. The very first time, the residual energy of a node is equal to its initial energy and after each iteration (iteration is defined later), it gets d ETXS = L ∗ + L ∗ ∗ if d ≤ETXS ∈elec ∈fs d 2 d0 d ETXL = L ∗ + L ∗ if d >ETXL ∈elec ∈mp ∗ d 4 d0 ∈elec 2 signifies the energy∈fs ∈mp d0 = = = 87.70d0 ∈fs ∈mp − −−− √ 10 ∗ 10 −12 0.0013 ∗ 10 −12 − −−−−−−−−−−−− √ d0 = L ∗ERx ∈R = L ∗ESx ∈S ∈R ∈S ∈elec = = )∈elec ∈R ∈S = L ∗EDA ∈DA = 5∈DA
  • 15. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 15/31 (16) (17) reduces by the amount spent in sensing or data transmission, etc. The degree of a node is the number of nodes in its sensing range. The energy spent by the cluster head to broadcast advertisement is given by (10) as it is the short distance and the energy spent by a sensor node to inform its cluster head is also given by (10). In this way, the clusters are formed. It may be mentioned here that there is very small probability to be two cluster heads within each other’s cluster range [12]. The sensors are inexpensive devices; they are normally deployed in abundant. All sensors gather data for (or sense) the same activity taken/taking place in the given area, there is a possibility of the same data collection by multiple sensors. Since all sensors send their data to their respective cluster heads, a cluster head may get duplicate data that need be discarded. The non-head nodes sense the area/collect the data by spending the energy according to (14) and send the sensed/collected data to their cluster heads by spending the energy according to (10). The head nodes receive the data from their respective cluster members and send it to the sink. The energy spent by the head nodes in receiving the data from cluster members is given by (13) and the energy spent by the head nodes aggregating the data (removing the duplicate data) is given by (15) and the energy spent by the head nodes in sending the received data to the sink is given by (11). Collecting the data from cluster members and sending to sink by a cluster head, we term it as iteration. The energy spent by the network containing total nodes out of which as the head nodes in an iteration consists of the energy spent by the cluster members in sensing the data and sending it to their respective cluster heads and the energy spent by the cluster heads in receiving the data from their respective cluster members, aggregating the data and then sending it to the sink. This data may be termed as one frame. Thus, in an iteration, one frame data is collected/sensed from the area and sent to the base station (sink). The energy spent by a single non-head sensor is given by, assuming each message size of L bits, for a single frame data (i.e., per iteration) is The energy spent by a cluster head for a single frame data is given by For simplicity, we uniformly divide nodes into clusters; each consists of sensors, assuming is divisible by . In case is not divisible by , some clusters have one node more than other clusters and accordingly (17) can be modified for such clusters. Among sensors, one sensor is cluster head and the remaining sensors are cluster members. The first term in (17) signifies the energy spent by the cluster head in receiving the data from cluster members. The second term specifies the energy spent in aggregation of the data received from cluster members. The last two terms signify the energy spent by the cluster head in transmission of the message to base station/sink. Figure 4 shows an instance of clusters formed in three-level heterogeneity for non-fuzzy implementation. In this figure, the normal, advance, and super nodes have n k = L ∗ +L ∗Enh ∈elec ∈ fs ∗ d 2 = L ∗ ( − 1) + L ∗ ∗( − 1) + L ∗ +L ∗Eh ∈elec n k ∈DA n k ∈elec ∈mp ∗d 4 n k n/k n k n k n/k ( − 1) n k ( − 1) n k ( − 1) n k
  • 16. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 16/31 (18) been denoted by circular , star (*), and plus ( ) marks, respectively. The sink or base station has been marked as X, situated at the center of the region. The members of a cluster including cluster head, that has been explicitly pointed by in each cluster, are shown by the same color. In case of fuzzy implementation, such types of clusters are formed; however, for repeated nature we have not showed them. Fig. 4 Clusters with their cluster heads shown in different colors. (Color figure online) The current cluster heads have sent the frame data to the sink and these head nodes are marked as non-member, i.e., they cannot be considered to be selected as cluster heads till all the sensor nodes in the network have become the cluster heads. In this way, one iteration is complete. In next iteration, another set of sensors from the unmarked sensors are selected as cluster heads depending on the residual energy and the node degree in case of non-fuzzy and for the fuzzy case the cluster heads depend upon the residual energy, node degree, and the distance. The probability for fuzzy implementation is computed as follows: where a, b, and c are weights of residual energy, node density, and distance, respectively. , and signify level values for residual energy, node density, and distance, respectively, and , and are maximum level values for residual energy, node density, and distance, respectively. In our work, the residual energy has values low, medium, and high, which correspond to (∘) + P robability = a ∗ + b ∗ + c ∗ ( − )Lre Lnd Dm Ld a ∗ + b ∗ + c ∗M re M nd M d ,Lre Lnd Ld ,M re M nd M d
  • 17. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 17/31 level values as 0, 1, and 2, respectively. The node density has sparsely, medium, and densely that correspond to level values as 0, 1, and respectively. The distance has values near, medium, far and the corresponding level values are 0, 1, 2. Thus, the values of , and each are 2 and each of , and can have values as 0 or 1, or 2 (because we have considered three membership functions, i.e. low, medium, high in case of battery power; sparsely, medium, densely in case of node density; and near, medium, far for distance). For giving equal weightage to each of the parameters, i.e., residual energy, node density, and distance, we can have a b c 1. However, the residual energy normally has more weightage than the node density and distance, each. In literature, the values of a, b, c have been taken as 2, 1, 1, respectively. Selection of a cluster head (or rotating cluster head) amongst the nodes is based on the probabilities. These newly cluster heads form their clusters by broadcasting advertisement message. Once their clusters are formed, the cluster members collect the data and send to their cluster heads. The cluster heads aggregate the received data and then send to the base station/sink, it is the second frame. The second iteration is complete. We carry out further iterations as long as there are unmarked sensors (which have not been cluster heads). The number of iterations when all sensors have become cluster heads forms a round. It may happen that some of the sensors have exhausted their energies. These sensors will not able to sense/collect the data and hence will not participate in further clustering process. Such nodes are called dead nodes. A WSN contains redundant sensors, whose sole purpose is to monitor a given area for activities. Even if some sensors are dead, the remaining sensors will participate in clustering process and hence in data collection. When all sensors have depleted their energies, no clustering process will take place and hence no data collection. This determines the network life time in our case. In our work, a pre-specified percentage of the number of sensors nodes are taken as the initial cluster heads that form their respective clusters by broadcasting advertisement message and receiving responses from the nodes wishing to be cluster member. The cluster formation process is called T (cluster process). Each of the cluster heads collects the sensed data from their cluster members, aggregates it, and then sends the aggregated data to the base station. Collecting, aggregating data, and sending the aggregated data by a cluster head to the base station forms T (network operation) and the current cluster heads are marked as non-candidates. The non-candidates will not participate in selection of cluster heads unless all sensors have become cluster heads. This entire process starting from the cluster selection to the data transmission by the cluster heads to base station, i.e., (T T forms a single iteration. The iterations are carried out till all sensors have not become cluster heads in some iteration. The number of iterations, when all clusters have become cluster heads, forms one round. In the beginning of a round, no sensor is non-candidate. The iterations and hence the rounds are performed till there is a cluster. In other words, even if there is a single sensor that has not depleted its energy, it will form a cluster of itself that perform data collection/sensing and sending it to the base station. Thus, load balancing is done automatically as it takes care of all sensors. ,M re M nd M d ,Lre Lnd Ld = = = CP NO CP + )NO
  • 18. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 18/31 6 Results and Discussions In this section, we discuss the implementation of HEED protocol for our heterogeneity network model and call it as hetHEED. We have shown in the previous section that our network model is capable to define one-level, two-level, and three-level heterogeneity of the wireless sensor networks. Accordingly, we call the implementation of HEED as one-level HEED or hetHEED-1, two-level HEED or hetHEED-2 and three-level HEED or hetHEED-3 heterogeneity, respectively. The heterogeneity affects the cluster head selection that in turn affects the network lifetime. In original HEED, the probability for selecting a cluster head has been calculated based on the residual energy and neighbor density of nodes. Since our proposed protocol hetHEED is based on the original HEED, we use the same parameters for cluster head selection. In literature, one more parameter, i.e., the distance between a sensor and sink has also been considered for computing probability. The distance between the sink and a sensor can be computed based on the received signal energy. We incorporate this distance parameter in our hetHEED and apply fuzzy logic to calculate the probability for cluster head selection and the corresponding hetHEED are denoted as HEED-FL, hetHEED-FL-2, and hetHEED-FL-3, respectively. In our simulations, we consider random deployment of 100 number of sensor nodes in a square field of dimension 100 100 m . We discuss simulation results for various values of . For , there are only normal nodes in the network and the corresponding WSN has one-level heterogeneity. We may also call this network as homogeneous network and the implementation of HEED is the original HEED protocol, which we denote as hetHEED-1. The value of defines a WSN that consists of normal and advance nodes and the corresponding network is said to have two-level heterogeneity. The implementation of HEED for these types of networks is denoted by hetHEED-2. For three-level heterogeneity, should assume values in accordance with the inequality . The corresponding network has three types of nodes, namely, normal, advance, and super nodes. The energy of a super node, , is computed from the values of and using (2) that must satisfy the inequality . The hetHEED with fuzzy logic, i.e., HEED-FL, hetHEED-FL-2, and hetHEED-FL-3 use same number of nodes (of respective types) in the network as the hetHEED-1, hetHEED-2, and hetHEED- 3. The number of nodes in the network is taken as 100, which are assumed to be normal node for hetHEED-1 and HEED-FL. For hetHEED-2 and hetHEED-FL-2, numbers of normal and advance nodes are 61 and 39, respectively. For hetHEED-3 and hetHEED-FL-3, the number of normal, advance, and super nodes are 51, 26, and 23, respectively. It may be noted that the number of normal, advance, and super nodes cannot be taken arbitrarily. We need to consider total number of nodes out of which the model parameter determines their respective numbers. We may consider arbitrary value of the initial energy of a normal node also the advance node, but the energy of a super node cannot be taken arbitrary, it is determined by (2). × 2 ⊖ θ = 0 ⊖ = ( − 1)/25√ ⊖ 0 < ⊖ < ( − 1)/25√ E2 ,E0 E1 ⊖ < <E0 E1 E2 ⊖
  • 19. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 19/31 For all three level of heterogeneity with and without fuzzy logic, we have carried out simulations for large number of input parameters, i.e., by taking different energy levels of the normal nodes, advance nodes, super nodes, and various values of . In all cases, we got similar types of results for each type of heterogeneity. However, we have shown results graphically for one-level heterogeneity by taking the energy of a normal node as 0.5 J; two-level heterogeneity by taking the energies of normal and advanced nodes as 0.5 and 0.6 J, respectively; for three-level heterogeneity by taking the energies of normal, advance, and super nodes as 0.5, 0.6, and 2.0 J, respectively. The energy 2.0 J corresponds to the value of 0.51 and n 2. The energy for a super node in the hetHEED-FL-3 has been taken as 0.8 J for 0.51 and n 3. We may mention that in the hetHEED the cluster heads have been decided based on two parameters (residual energy and node density), whereas in the hetHEED with fuzzy logic the cluster heads have been decided based on three parameters (residual energy, node density, and distance). The input parameters used in our simulations are summarily given in Table 2. The simulation time is 900 s, data packet size is 512 bits and the bandwidth is taken as 1 Mbps. Table 2 Simulation parameters Description Symbol Value N. of Sensors N 100 Sink position (50, 50) Threshold distance 70 m Cluster radius 25 m Energy consumed by the amplifier to transmit at a shorter distance 10 nJ/bit/m Energy consumed by the amplifier to transmit at a longer distance 0.0013 pJ/bit/m Energy consumed in the electronics circuit to transmit or receive the signal 50 nJ/bit Energy for data aggregation 5 nJ/bit/signal Message size L 4,000 bits Initial energy 0.5 J We have computed the simulation results for getting different output parameters for hetHEED and hetHEED with fuzzy logic. Figure 5 shows how the energies of nodes get drained with respect to the θ E2 = θ = = E2 = θ = = Sp d0 Cr ∈fs 2 ∈mp 4 Eelec ∈DA E0
  • 20. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 20/31 number of rounds for hetHEED-1 (original HEED), hetHEED-2, hetHEED-3, hetHEED-FL (original HEED with fuzzy logic), hetHEED-FL-2, hetHEED-FL-3. It is evident from the graphs shown in Fig. 5 that the nodes in the hetHEED-l die earlier than those of the hetHEED-2 and the nodes in hetHEED-2 die earlier than the hetHEED-3. In other words, increasing the level of heterogeneity increases the network lifetime. The hetHEED with fuzzy logic keeps some nodes alive for large number of rounds. The nodes in the hetHEED-2 die earlier than the hetHEED-FL-2. It indeed performs better than the hetHEED-3. Same is the case for hetHEED-3 and hetHEED-FL-3. In fact, in all the hetHEED protocols, the nodes die much earlier than the corresponding to the hetHEED with fuzzy logic protocols. Among all these, hetHEED-FL-3 performs the best as far as the number of alive nodes is concerned. It is to mention that in the hetHEED-3 the energies have been taken as 0.5, 0.6, and 2.0 J, respectively, for the normal, advance and super nodes, whereas in the hetHEED-FL-3 the energies are as 0.5, 0.6, and 0.8 J, respectively, for the corresponding nodes. Even taking less energy of the super nodes, the hetHEED-FL-3 performs much better than the hetHEED-3 (refer Fig. 5). We have also obtained the results for network lifetime (number of rounds) when the first node has become dead and the last node has become dead as shown in Table 3. As evident from Table 3, as the level of heterogeneity increases, the number of rounds increases in almost all the cases for the both first node dead and last node dead. Table 3 Number of rounds when first and last nodes are dead (simulation time: 900 s, packet size: 512 bits, bandwidth: 1 Mbps) Protocols First node dead Last node dead Original HEED 490 1,200 hetHEED-2 level 500 1,476 hetHEED-3 level 502 4,262 HEED-FL 400 2,922 hetHEED-FL-2 level 998 5,278 hetHEED-FL-3 level 998 6,636
  • 21. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 21/31 Fig. 5 Number of alive nodes versus number of rounds We have also computed simulation results how the energy of the network is dissipated with respect to the number of rounds for the hetHEED and hetHEED with fuzzy logic for all levels and they are shown in Fig. 6. As evident from Fig. 6, the energy of the network dissipates rapidly for the hetHEED-1 as well as hetHEED-2 with respect to number of rounds. As the level of heterogeneity increases, the rate of energy consumption decreases. The HEED-FL (original HEED with fuzzy logic) performs better than the hetHEED-1 and hetHEED-2 both. The hetHEED-FL-2 performs better than all levels of the hetHEED in spite of the fact that the hetHEED-3 has more network energy than that of the hetHEED- FL-2. Thus, the rate of energy consumption is much slower in case the hetHEED with fuzzy logic than the hetHEED for all levels of heterogeneity. Fig. 6 Residual energy in network versus number of rounds
  • 22. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 22/31 Figure 7 shows the simulation results in terms of the number of packets sent to the base station (BS) with respect to the number of rounds. The number of packets sent to the base station increases as the number of rounds increases. This behavior is depicted in Fig. 7. We also observe that as the level of heterogeneity increases, the more number of packets are sent to the base station. In case of fuzzy logic implementation of the hetHEED, more packets reach to the base station. Only the hetHEED-3 is able to send the packets for large number of rounds (greater than 1,800 rounds), whereas the HEED-FL can send packets to base station for large number of round in spite of the less energy. Thus, in our proposed protocol, the nodes remain alive for longer time, more packets are sent to the base station, and the rate of energy consumption decreases, as the level of heterogeneity increases. We now discuss effect of the energy increase in the network on its lifetime for our proposed heterogeneous network model. We have computed the increase in network lifetime with respect to that of the original HEED for hetHEED-2, hetHEED-3, HEE-FL, hetHEED-FL-2, and hetHEED-FL-3, which are given below. Fig. 7 Number of packets sent to base station with respect to number of rounds hetHEED-2 level: Number of sensor nodes 100 ( 61+39). Number of normal nodes 61; Number of advance nodes 39; Energy of a normal sensor node 0.5 J. Energy of an advance sensor node 0.6 J. Total network energy 61 0.5 39 0.6 53.9 J. Network lifetime 1,476 h. = = = = = = = × + × = =
  • 23. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 23/31 Percentage increase in network energy 7.8 Percentage increase in network lifetime 8.5 hetHEED-3 level: Number of sensor nodes 100 ( 51 26 23). Number of normal nodes 51; Number of advance nodes 26; Number of super nodes 23; Energy of a normal sensor node 0.5 J. Energy of an advance sensor node 0.6 J. Energy of a super sensor node 2.0 J. Total network energy 51 0.5 26 0.6 23 2 87.1 J. Network lifetime 4,262 h. Percentage increase in network energy 74.2 Percentage increase in network lifetime 213.38 HEED-FL (Original HEED with fuzzy logic): Number of sensor nodes 100. Energy of a sensor node 0.5 J. Total network energy 50 J. Network lifetime for original HEED 1,360 h Network lifetime for HEED-FL 2,922 h Percentage increase in network energy 0.0 Percentage increase in lifetime 114.85. hetHEED-FL-2 level: Number of sensor nodes 100 ( 61 39). Number of normal nodes 61; Number of advancel nodes 39; Energy of a normal sensor node 0.5 J. = = = = + + = = = = = = = × + × + × = = = = = = = = = = = = = + = = =
  • 24. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 24/31 Energy of an advance sensor node 0.6 J. Total network energy 61 0.5 39 0.6 53.9 J. Network lifetime 5,278 h. Percentage increase in network energy 7.8 Percentage increase in network lifetime 288.08 hetHEED-FL-3 level: Number of sensor nodes 100 ( 51 26 23). Number of normal nodes 51; Number of advance nodes 26; Number of super nodes 23; Energy of a normal sensor node 0.5 J. Energy of an advance sensor node 0.6 J. Energy of a super sensor node 0.8 J. Total network energy 51 0.5 26 0.6 23 0.8 59.5 J. Network lifetime 6,636 h. Percentage increase in network energy 19 Percentage increase in network lifetime 387.94 We observe from Table 4 that increasing the energy in network increases its lifetime in much proportion. This increase is very high in case of the hetHEED with fuzzy logic. In fact, without increasing in the network energy, the lifetime increases by 114.85 % when fuzzy logic is used. We have also computed other performance results that include throughput, traffic load, and aggregate delay as defined below. = = × + × = = = = = = + + = = = = = = = × + × + × = = = =
  • 25. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 25/31 Table 4 Percentage increase in network energy and corresponding increase in network lifetime for hetHEED and HEED with fuzzy logic Variant Increase in network energy (%) Increase in network lifetime (%) hetHEED-2 level 7.8 8.50 hetHEED-3 level 74.2 213.38 HEED-FL 0.0 114.85 hetHEED-FL-2 level 7.8 288.08 hetHEED-FL-3 level 19.0 387.94 Let and denote the time instances when a particular packet is generated at source and received as destination. The total delay is defined as their difference, i.e., The aggregate delay is given by The throughput and traffic load are given by The throughput, traffic load, and aggregate delay are shown in Figs. 8, 9, and 10, respectively. We observe from Fig. 8 that increasing the number of sensors increases the throughput of the network. Furthermore, as the level of heterogeneity increases, the throughput also increases. For using fuzzy logic, the increase is higher than that of non-fuzzy implementation. The traffic load has also similar behaviour as shown in Fig. 9. In both graphs, the increase rate comparatively much higher for hetHEED-3 level as compared to other cases. The aggregate delay lies in a very small range except for the hetHEED-3 level as shown in Fig. 10. ts tr Total Delay = −tr ts Aggregate Delay = Total Delay Total Receive packets Throughput = Total Receive packets ∗ packet size ∗ 8 Total Simulation time Traffic Load = Total packets Sends ∗ packet size
  • 26. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 26/31 Fig. 8 Throughput versus number of sensors Fig. 9 Traffic load versus number of sensors
  • 27. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 27/31 1. 2. Fig. 10 Aggregate delay versus number of sensors 7 Conclusions In this paper, the HEED protocol has been discussed for the heterogeneous wireless sensor network. In this work, we have incorporated different level of heterogeneity, namely, one-level, two-level, and three-level heterogeneity in terms of the node energy and accordingly the implementation of HEED has been named as hetHEED-1 (original HEED), hetHEED-2, and hetHEED-3, respectively. We have also implemented all these levels of heterogeneity using fuzzy logic that considers distance in addition to the residual energy and node density for selecting cluster heads. Increasing heterogeneity level increases network lifetime in much proportion as compared to the increase in the network energy. In fact, using fuzzy logic for original HEED, the network lifetime increases by 114.85 % without any increase in the network energy. References Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422. Arampatzis, Th., Lygeros, J., & Manesis, S. (2005). A survey of applications of wireless sensors
  • 28. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 28/31 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. and wireless sensor networks. In Proceedings of 13th Mediterranean conference on control and automation (pp. 719–724), Limassol, Cyprus, June 27–29, 2005. Kumar, D., Aseri, T. S., & Patel, T. S. (2009). EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. International Journal of Computer Communications, 32(4), 662–667. CrossRef Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of 33rd Hawaii international conference on system sciences (Vol. 8, p. 8020), January 4–7, 2000. Heinzelman, W. R., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670. CrossRef Manjeshwar, A., & Agrawal, D. (2001). TEEN: A protocol for enhanced efficiency in wireless sensor networks. In Proceedings of the 1st international workshop on parallel and distributed computing issues in wireless networks and mobile computing, San Francisco, CA, April 2001. Manjeshwar, A., & Agarwal, D. P. (2002). APTEEN: A hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks. In Proceedings of international parallel and distributed processing symposium (IPDPS) (pp. 195–202). Lindsey, S., & Raghavendra, C. (2002). PEGASIS: Power-efficient gathering in sensor information systems. In IEEE aerospace conference proceedings (Vol. 3, pp. 1125–1130). Smaragdakis, G., Matta, I., & Bestavros, A. (2004). SEP: A stable election protocol for clustered heterogeneous wireless sensor networks. In Second international workshop on sensor and actor network protocols and applications (SANPA 2004). Ye, M., Li, C., Chen, G., & Wu, J. (2005). EECS: An energy efficient cluster scheme in wireless sensor networks. In IEEE international workshop on strategies for energy efficiency in ad hoc and sensor networks (IEEE IWSEEASN-2005), Phoenix, AZ, April 7–9, 2005. Li, Q., Qingxin, Z., & Mingwen, W. (2006). Design of a distributed energy efficient clustering algorithm for heterogeneous wireless sensor networks. Computer Communications, 29, 2230– 2237. CrossRef Younis, O. & Fahmy, S. (2004). Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach. In Proceedings of IEEE INFOCOM, Hong Kong, March 2004, an
  • 29. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 29/31 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. extended version appeared in, IEEE transactions on mobile computing (Vol. 3(4)), October- December 2004. Padmanabhan, K., & Kamalakkannan, P. (2011). A study on energy efficient routing protocols in wireless sensor networks. European Journal of Scientific Research, 60(4), 499–511. Rodoplu, V., & Meng, T. H. (1999). Minimum energy mobile wireless networks. IEEE Journal on Selected Areas in Communications, 17(8), 1333–1344. CrossRef Xu, Y., Heidemann, J., & Estrin, D. (2001). Geography-informed energy conservation for ad- hoc routing. In Proceedings of ACM/IEEE MobiCom’01 (pp. 70–84), Rome, Italy. Yu, Y., Govindan, R., & Estrin, D. (2001). Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Technical report UCLA/CSD-TR-01- 0023, UCLA Computer Science Department. Heinzelman, W. R., Kulik, J., & Balakrishnan, H. (1999). Adaptive protocols for information dissemination in wireless sensor networks. In Proceedings of ACM MobiCom ’99 (pp. 174–185), Seattle, WA. Kulik, J., Heinzelman, W., & Balakrishnan, H. (2002). Negotiation-based protocols for disseminating information in wireless sensor networks. Wireless Networks, 8(2/3), 169–185. CrossRef MATH Intanagonwiwat, C., Govindan, R., & Estrin, D. (2000). Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proceedings ACM MobiCom’00 (pp. 56– 67), Boston, MA, August 2000. Braginsky, D., & Estrin, D. (2002). Rumor routing algorithm in sensor networks. In Proceedings of ACM WSNA, in conjunction with ACM MobiCom’02 (pp. 22–31), Atlanta, GA. Lindsey, S., Raghavendra, C. S., & Sivalingam, K. M. (2002). Data gathering algorithms in sensor networks using energy metrics. IEEE Transactions on Parallel and Distributed Systems, 13(9), 924–935. CrossRef Sohrabi, K., Gao, J., Ailawadhi, V., & Pottie, G. J. (2000). Protocols for self-organization of a wireless sensor network. IEEE Journal of Personal Communications, 7(5), 16–27. CrossRef He, T., Stankovic, J. A., Chenyang, L., & Abdelzaher, T. (2003). SPEED: A stateless protocol for real-time communication in sensor networks. In Proceedings of international conference on distributed computing systems (pp. 46–55), Providence, RI.
  • 30. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 30/31 24. 25. 26. 27. 28. 29. 30. Eshghi, N., & Haghighat, A. T. (2008). Energy conservation strategy in cluster-based wireless sensor networks. In Proceedings of international conference on advanced computer theory and engineering (pp. 1015–1019). Younis, O., & Fahmy, S. (2005). An experimental study of energy-efficient routing and data aggregation in sensor networks. In Proceedings of international workshop on localized communication and topology protocols for ad hoc networks (LOCAN) (pp. 50–57), November 2005. Huang, H., & Wu, J. (2005). A probalilistic clustering algorithm in wireless sensor networks. In Vehicular technology conference IEEE 62nd VTC-Fall (Vol. 3, pp. 1796–1798). Khedo, K. K., & Subramanian, R. K. (2009). MiSense hierarchial cluster based routing algorithm (MiCRA) for wireless sensor networks. World Academy of Science: Engineering and Technology, 52, 190–195. Sharma, A. K., & Kour, H. (2010). Hybrid energy efficient distributed protocol for heterogeneous wireless sensor network. International Journal of Computer Applications, 4(5), 37–41. Bala, M., & Awasthi, L. (2012). On proficiency of HEED protocol with heterogeneity for wireless sensor networks with BS and nodes mobility. International Journal of Applied Information Systems (IJAIS), 2(7), 58–62. Ben-Mubarak, M. A., Ali, B. M., Noordin, N. K., Ismail, A., & Ng, C. K. (2013). Fuzzy logic based self-adaptive handover algorithm for mobile WiMAX. Wireless Personal Communications, 71(2), 1421–1442. CrossRef Over 8.5 million scientific documents at your fingertips © Springer International Publishing AG, Part of Springer Science+Business Media
  • 31. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 31/31