The document describes a study that extends the HEED (hybrid energy-efficient distributed) clustering protocol to work in heterogeneous wireless sensor networks. The study defines one-level, two-level, and three-level heterogeneity models and implements HEED for each, called hetHEED-1, hetHEED-2, and hetHEED-3. It also incorporates fuzzy logic to account for distance as an additional parameter for cluster head selection, calling these versions HEED-FL, hetHEED-FL-2, and hetHEED-FL-3. Simulation results show that increasing heterogeneity and using fuzzy logic can significantly increase network lifetime, energy efficiency, and packet delivery to the base station compared to the original HEED
Abstract Now a day’s wireless sensor network has become an interesting research field. Network life time and energy efficiency are one of the main concerns for wireless sensor networks. Sensors are constrained in terms of battery power, storage, limited processing capacity etc. Because of these reasons new protocols are proposed for wireless sensor network. This paper only deals with cluster based hierarchical protocol TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol). The sensor network architecture in TEEN is based on a hierarchical clustering. TEEN is data-centric, reactive, event-driven protocol which is best suited for time critical application. It transmits data based on hard threshold and soft threshold values. If the thresholds are not reached, then nodes will never communicate. The user will not get any data from network and will not come to know if all the nodes die. So, user will not be able to distinguish between how many nodes are alive or dead in network and will not be able to know about network lifetime. This paper deals with that node will be able to tell base station or sink before leaving network and base station will be aware of alive and dead nodes in the network. Keywords: WSN; TEEN (Threshold Sensitive Energy Efficient Clustering); Hard Threshold; Soft Threshold;
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance,
congestion control are the important metrics that affect the performance of wireless sensor network. As
many approaches were proposed to increase the performance of a wireless sensor network among them
clustering is one of the efficient approaches in sensor network. Many clustering algorithms concentrate
mainly on power Optimization like FSCH, LEACH, and EELBCRP. There is necessity of the above
metrics in wireless sensor network where nodes are densely deployed in a given network area. As the nodes
are deployed densely there is maximum possibility of nodes appear in the sensing region of other nodes. So
there exists an option that nodes have to send the information that is already reached the base station by its
own cluster members or by members of other clusters. This mechanism will affect the QoI, Energy factor
and congestion control of the wireless sensor networks. Even though clustering uses TDMA (Time Division
Multiple Access) for avoiding congestion control for intra clustering data transmission, but it may fail in
some critical situation. This paper proposed a energy efficient clustering which avoid data redundancy in a
dense sensor network until the network becomes sparse and hence uses the TDMA efficiently during high
density of the nodes.
Routing Design Issues in Heterogeneous Wireless Sensor Network IJECEIAES
WSN has important applications such as habitat monitoring, structural health monitoring, target tracking in military and many more. This has evolved due to availability of sensors that are cheaper and intelligent but these are having battery support. So, one of the major issues in WSN is maximization of network life. Heterogeneous WSNs have the potential to improve network lifetime and also provide higher quality networking and system services than the homogeneous WSN. Routing is the main concern of energy consumption in WSN. Previous research shows that performance of the network can be improve significantly using protocol of hierarchical HWSN. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This study presents different aspects of Heterogeneous Wireless Sensor network and design issues for routing in heterogeneous environment. Different perspectives from different authors regarding energy efficiency based on resource heterogeneity for heterogeneous wireless sensor networks have been presented.
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...CSCJournals
The objective of this paper is to develop a mechanism to increase the lifetime of homogeneous wireless sensor networks (WSNs) through minimizing long range communication, efficient data delivery and energy balancing. Energy efficiency is a very important issue for sensor nodes which affects the lifetime of sensor networks. To achieve energy balancing and maximizing network lifetime we divided the whole network into different clusters. In cluster based architecture, the role of aggregator node is very crucial because of extra processing and long range communication. Once the aggregator node becomes non functional, it affects the whole cluster. We introduced a candidate cluster head node on the basis of node density. We proposed a modified cluster based WSN architecture by introducing a server node (SN) that is rich in terms of resources. This server node (SN) takes the responsibility of transmitting data to the base station over longer distances from the cluster head. We proposed cluster head selection algorithm based on residual energy, distance, reliability and degree of mobility. The proposed method can save overall energy consumption and extend the lifetime of the sensor network and also addresses robustness against even/uneven node deployment.
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...IJERA Editor
In recent development, achieving the deployment of nodes, lifetime, fault tolerance, latency, energy efficiency in brief robustness and high reliability have become the prime research goals of wireless sensor network. In recent years many clustering protocols have been suggested on clustering structure based on heterogeneity. We propose improved deterministic energy-efficient clustering protocol for four types of nodes which extend the stability and lifetime of the network in team of first node get dead. Hence, it increases the heterogeneity and energy level of the network. I-DEC performs better than E-SEP, SEP and DEC with more stability and effective messages shows in simulation results.
Abstract Now a day’s wireless sensor network has become an interesting research field. Network life time and energy efficiency are one of the main concerns for wireless sensor networks. Sensors are constrained in terms of battery power, storage, limited processing capacity etc. Because of these reasons new protocols are proposed for wireless sensor network. This paper only deals with cluster based hierarchical protocol TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol). The sensor network architecture in TEEN is based on a hierarchical clustering. TEEN is data-centric, reactive, event-driven protocol which is best suited for time critical application. It transmits data based on hard threshold and soft threshold values. If the thresholds are not reached, then nodes will never communicate. The user will not get any data from network and will not come to know if all the nodes die. So, user will not be able to distinguish between how many nodes are alive or dead in network and will not be able to know about network lifetime. This paper deals with that node will be able to tell base station or sink before leaving network and base station will be aware of alive and dead nodes in the network. Keywords: WSN; TEEN (Threshold Sensitive Energy Efficient Clustering); Hard Threshold; Soft Threshold;
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance,
congestion control are the important metrics that affect the performance of wireless sensor network. As
many approaches were proposed to increase the performance of a wireless sensor network among them
clustering is one of the efficient approaches in sensor network. Many clustering algorithms concentrate
mainly on power Optimization like FSCH, LEACH, and EELBCRP. There is necessity of the above
metrics in wireless sensor network where nodes are densely deployed in a given network area. As the nodes
are deployed densely there is maximum possibility of nodes appear in the sensing region of other nodes. So
there exists an option that nodes have to send the information that is already reached the base station by its
own cluster members or by members of other clusters. This mechanism will affect the QoI, Energy factor
and congestion control of the wireless sensor networks. Even though clustering uses TDMA (Time Division
Multiple Access) for avoiding congestion control for intra clustering data transmission, but it may fail in
some critical situation. This paper proposed a energy efficient clustering which avoid data redundancy in a
dense sensor network until the network becomes sparse and hence uses the TDMA efficiently during high
density of the nodes.
Routing Design Issues in Heterogeneous Wireless Sensor Network IJECEIAES
WSN has important applications such as habitat monitoring, structural health monitoring, target tracking in military and many more. This has evolved due to availability of sensors that are cheaper and intelligent but these are having battery support. So, one of the major issues in WSN is maximization of network life. Heterogeneous WSNs have the potential to improve network lifetime and also provide higher quality networking and system services than the homogeneous WSN. Routing is the main concern of energy consumption in WSN. Previous research shows that performance of the network can be improve significantly using protocol of hierarchical HWSN. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This study presents different aspects of Heterogeneous Wireless Sensor network and design issues for routing in heterogeneous environment. Different perspectives from different authors regarding energy efficiency based on resource heterogeneity for heterogeneous wireless sensor networks have been presented.
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...CSCJournals
The objective of this paper is to develop a mechanism to increase the lifetime of homogeneous wireless sensor networks (WSNs) through minimizing long range communication, efficient data delivery and energy balancing. Energy efficiency is a very important issue for sensor nodes which affects the lifetime of sensor networks. To achieve energy balancing and maximizing network lifetime we divided the whole network into different clusters. In cluster based architecture, the role of aggregator node is very crucial because of extra processing and long range communication. Once the aggregator node becomes non functional, it affects the whole cluster. We introduced a candidate cluster head node on the basis of node density. We proposed a modified cluster based WSN architecture by introducing a server node (SN) that is rich in terms of resources. This server node (SN) takes the responsibility of transmitting data to the base station over longer distances from the cluster head. We proposed cluster head selection algorithm based on residual energy, distance, reliability and degree of mobility. The proposed method can save overall energy consumption and extend the lifetime of the sensor network and also addresses robustness against even/uneven node deployment.
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...IJERA Editor
In recent development, achieving the deployment of nodes, lifetime, fault tolerance, latency, energy efficiency in brief robustness and high reliability have become the prime research goals of wireless sensor network. In recent years many clustering protocols have been suggested on clustering structure based on heterogeneity. We propose improved deterministic energy-efficient clustering protocol for four types of nodes which extend the stability and lifetime of the network in team of first node get dead. Hence, it increases the heterogeneity and energy level of the network. I-DEC performs better than E-SEP, SEP and DEC with more stability and effective messages shows in simulation results.
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is
designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, shortrange,
low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture,
industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide
autonomous Quality of Service (QoS) to the sensor nodes in one-hop QoS retransmission group and two
QoS groups in WSNs where the source nodes do not have receiver circuits. Hence, they can only transmit
data to a sink node, but cannot receive any control signals from the sink node. The proposed protocol
GORMA provides QoS to the nodes which work independently on predefined time by allowing them to
transmit each packet an optimal number of times within a given period. Our simulation results shows that
the performance of GORMA protocol, which maximize the delivery probability of one-hop QoS group and
two QoS groups and minimize the energy consumption.
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSIJCNCJournal
Wireless sensor networks (WSNs) are large scale integration consists of hundreds or thousands or more
number of sensor nodes. They are tiny, low cost, low weight, and limited battery, primary storage,
processing power. They have wireless capabilities to monitor physical or environmental conditions. This
paper compared the performance analysis of some existing routing protocols for target tracking
application with proposed hierarchical binary tree structure to store the routing information. The sensed
information is stored in controlled way at multiple sensor nodes (e.g. node, parent node and grandparent
node) which deployed using complete binary tree data structure. This reduces traffic implosion and
geographical overlapping. Simulation result showed improved network lifetime by 20%, target detection
probability by 25%, and reduces error rate by 20%, energy efficiency, fault tolerance, and routing
efficiency. We have evaluated our proposed algorithm using NS2.
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...ijfcstjournal
Wireless sensor network (WSNs) are network of Sensor Nodes (SNs) with inherent sensing, processing and
communicating abilities. One of current concerns in wireless sensor networks is developing a stable
clustered heterogeneous protocol prolonging the network lifetime with minimum consumption of battery
power. In the recent times, many routing protocols have been proposed increasing the network lifetime,
stability in short proposing a reliable and robust routing protocol. In this paper we study the impact of
hierarchical clustered network with sensor nodes of two-level heterogeneity. The main approach in this
research is to develop an enhanced multi-hop DEEC routing protocol unlike DEEC. Simulation results
show the proposed protocol is better than DEEC in terms of FDN (First Dead Node), energy consumption
and Packet transmission.
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONIAEME Publication
Secured communications in the presence of eavesdropper node is grave for the successful operations in the wireless relay networks. In the proposed work, choose two hop wireless relay networks to enhance security against the eavesdropper node. This paper considers four node networks, they are one source, and three decode and forward relay, one destination and one eavesdropper node. To transmit the information from source to relay node, eavesdropper interrupt and try to capture that relay node messages. To prevent the eavesdropper interception, destination sends artificial jamming noise to the relay node. This jamming noise has the ability to jam the eavesdropper node. According to the channel state information present at the destination, the four types of jamming power allocation methods are introduced; (i) Fixed jamming power allocation, (ii) Rate optimal power allocation, (iii) Outage optimal power allocation, (iv) Statistical optimal power allocation method. The maximum achievable data rate at the destination is also estimated.
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...IJERA Editor
High-quality data transmission is the primary objective of WSN for achieving quality of service.
Heterogeneous wireless sensor networks (HTWSN) can be used to deploy in sensitive and unmanned areas
to monitor the objects. HTWSN is high configured network used to capture high-quality images and videos
of targeted objects. During the data transmission in HTWSN, we identified that, the formation of
interference with in the network due to link capacity overhead. Due to that, the quality data transmission is
not possible through the network. In this research paper, we described the deployment of HTWSN network
and identifying the primary sources for interference and introducing the proposed Interference
Minimization Protocol (IMP). The IM protocol has achieved better quality of service by minimizing the
interference in HTWSN.
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
As wireless sensor networks (WSNs) continue to attract more and more researchers attention, new ideas for
applications are continually being developed, many of which involve consistent coverage with good
network connectivity of a given area of interest. For the successful operation of the wireless Sensor
Network, the active sensor nodes must maintain both coverage and also connectivity. These are two closely
related essential prerequisites and they are also very important measurements of quality of service (QoS)
for wireless sensor networks. This paper presents the design and analysis of novel protocols that can
dynamically configure a sensor network to result in guaranteed degrees of coverage and connectivity. This
protocol is simulated using NS2 simulated and compared against a distributed probabilistic coveragepreserving configuration protocol (DPCCP) with SPAN [1] protocol in the literature and show that it
activates lesser number of sensor nodes, consumes much lesser energy and maximises the network lifetime
significantly.
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...ijwmn
In wireless sensor networks (WSN), conserving energy and increasing lifetime of the network are a critical issue that has been addressed by substantial research works. The clustering technique has been proven particularly energy-efficient in WSN. The nodes form groups (clusters) that include one cluster head and member clusters. Cluster heads (CHs) are able to process, filter, gather the data sent by sensors
belonging to their cluster and send it to the base station. Many routing protocols which have been proposed are based on heterogeneity and use the clustering scheme such as SEP and DEEC. In this paper we introduce a new approach called WDDC in which cluster heads are chosen on the basis
of probability of ratio of residual energy and average energy of the network. It also takes into consideration distances between nodes and the base station to favor near nodes with more energy to be cluster heads. Furthermore, WDDC is dynamic; it divides network lifetime in two zones in which it changes its behavior. Simulation results show that our approach performs better than the other distributed clustering protocols such as SEP and DEEC in terms of energy efficiency and lifetime of the network.
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
The evolution of wireless communication and circuit technology has enabled the development of an infrastructure consists of sensing, computation and communication units that makes administrator capable to observe and react to a phenomena in a particular environment. In a Wireless Sensor Network (WSN), nodes are scattered densely in a large area. Sensor nodes can communicate with the sink node directly or through other nodes. Data transmission is the major issue in WSN. Each node has limited energy which is used in transmitting and receiving the data. Various routing protocols have been proposed to save the energy during the transmission of data. data centric approach based routing protocol which efficiently propagates information between sensor nodes in an energy constrained mode. This paper proposes a data centric routing Using evolutionary apporoach in WSN.The main objective of this protocol with evolutionary apporoach is to use artificial intelligence, to reduce the energy consumption by the nodes in transmitting and receiving the data. Implementation of Basic SEP, intelligence cluster routing and proposed protocols will be done using MATLAB.
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...IJCNC
The Wireless Sensor Networks (WSN) particularly for real time applications raise fundamental problems
for the scientific community. These problems are related to the limit of energy resource and the real time
constraints on the communication delay. The well functioning of such networks depends mainly on the
network lifetime result of nodes energies and the communication delay which should meet the required
deadlines. Thus, the well design of Real-Time Wireless Sensor Networks must be with the prediction of
the energy consumption and the communication delay. Therefore, this paper propose an analytical model
to predict the lifetime and the delay in IEEE 802.15.4/ZigBee WSN. Our proposed model is based on
realistic assumptions. It considers the most important network features such as idle times from the
Backoff, overhearing and interferences by collisions and transmission errors. Compared to simulation
results and other analytical approaches, our model gives a reliable lifetime and delay prediction.
A Survey on Clustering Techniques for Wireless Sensor Network IJORCS
Wireless sensor networks have been used in various fields like battle feilds, surveillance, schools, colleges, etc. It has been used in our day-to-day life. Its growth increases day by day. Sensor node normally senses the physical event from the environment such as temperature, sound, vibration, pressure etc. Sensor nodes are connected with each other through wireless medium such as infrared or radio waves it depends on applications. Each node has its internal memory to store the information regarding the event packets. In this paper we will come to know the various algorithms in clustering techniques for wireless sensor networks and discuss them. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption .It can also increase network scalability. Sensor nodes are considered to be homogeneous since the researches in the feild of WSNs have been evolved but in reality homogeneous sensor networks hardly exist. Here we will discuss some of the impact of heterogeneous sensor networks on WSN and various clustering algorithms used in HWSN.
A Survey on Topology Control and Maintenance in Wireless Sensor Networksijeei-iaes
Wireless Sensor Networks (WSNs) consist of devices equipped with radio transceivers that cooperate to form and maintain a fully connected network of sensor nodes. WSNs do not have a fixed infrastructure and do not use centralized methods for organization. This flexibility enables them to be used whenever a fixed infrastructure is unfeasible or inconvenient, hence making them attractive for numerous applications ranging from military, civil, industrial or health. Because of their unique structure, and limited energy storage, computational and memory resources, many of the existing protocols and algorithms designed for wired or wireless ad hoc networks cannot be directly used in WSNs. Beside this, they offer a flexible low cost solution to the problem of event monitoring, especially in places with limited accessibility or that represent danger to humans. Applications of large scale WSNs are becoming a reality example are being a Smart Grid, Machine to Machine communication networks and smart environment. It is expected that a topology control techniques will play an important role in managing the complexity of such highly complicated and distributed systems through self-organization capabilities. WSNs are made of resource constrained wireless devices, which require energy efficient mechanisms, algorithm/protocol. Control on topology is very important for efficient utilization of networks and is composed of two mechanisms, Topology Construction (TC) and Topology Maintenance (TM). By using these mechanism various protocols/algorithm have came into existence, like: A3, A3-Coverage (A3-Cov), Simple Tree, Just Tree, etc. This paper provides a full view of the studies of above mentioned algorithms and also provides an analysis of their merits and demerits.
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...ijiert bestjournal
Mobile Ad hoc network is an infrastructure less communication network with limited resources. To maintain virtual
infrastructure for communication broadcasting mechanisms is used. Due to lack of energy efficiency in Mobile Ad
hoc network, there is a need to develop an efficient broadcasting model which enhances energy efficiency. Also
nodes with malicious behaviour cause an internal threat that disobeys the standard and degrades the performance of
routing protocols. This paper introduced an enhanced rebroadcasting algorithm, where rebroadcasting decision for
next hop is immediate or delayed on the basis of trust value and energy level of particular node. This approach helps
to decrease number of rebroadcast, energy consumption and also enhances security. The decision is made with trust
value associated with node, their remaining energy and total number of uncovered nodes.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This paper modifies the DYMO protocol and develops the AIS-DYMO protocol that is
capable to handle the network layer attack. It means the performance of the network doesn’t get
degraded under the attack. Various immune algorithms can be used to enhance the performance of
the DYMO protocol, but the clonal selection algorithm is used in this work to enhance the
performance of the DYMO protocol. Overall the DYMO protocol is modified to handle the network
layer attacks by using the clonal selection immune algorithm.
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is
designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, shortrange,
low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture,
industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide
autonomous Quality of Service (QoS) to the sensor nodes in one-hop QoS retransmission group and two
QoS groups in WSNs where the source nodes do not have receiver circuits. Hence, they can only transmit
data to a sink node, but cannot receive any control signals from the sink node. The proposed protocol
GORMA provides QoS to the nodes which work independently on predefined time by allowing them to
transmit each packet an optimal number of times within a given period. Our simulation results shows that
the performance of GORMA protocol, which maximize the delivery probability of one-hop QoS group and
two QoS groups and minimize the energy consumption.
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSIJCNCJournal
Wireless sensor networks (WSNs) are large scale integration consists of hundreds or thousands or more
number of sensor nodes. They are tiny, low cost, low weight, and limited battery, primary storage,
processing power. They have wireless capabilities to monitor physical or environmental conditions. This
paper compared the performance analysis of some existing routing protocols for target tracking
application with proposed hierarchical binary tree structure to store the routing information. The sensed
information is stored in controlled way at multiple sensor nodes (e.g. node, parent node and grandparent
node) which deployed using complete binary tree data structure. This reduces traffic implosion and
geographical overlapping. Simulation result showed improved network lifetime by 20%, target detection
probability by 25%, and reduces error rate by 20%, energy efficiency, fault tolerance, and routing
efficiency. We have evaluated our proposed algorithm using NS2.
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...ijfcstjournal
Wireless sensor network (WSNs) are network of Sensor Nodes (SNs) with inherent sensing, processing and
communicating abilities. One of current concerns in wireless sensor networks is developing a stable
clustered heterogeneous protocol prolonging the network lifetime with minimum consumption of battery
power. In the recent times, many routing protocols have been proposed increasing the network lifetime,
stability in short proposing a reliable and robust routing protocol. In this paper we study the impact of
hierarchical clustered network with sensor nodes of two-level heterogeneity. The main approach in this
research is to develop an enhanced multi-hop DEEC routing protocol unlike DEEC. Simulation results
show the proposed protocol is better than DEEC in terms of FDN (First Dead Node), energy consumption
and Packet transmission.
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONIAEME Publication
Secured communications in the presence of eavesdropper node is grave for the successful operations in the wireless relay networks. In the proposed work, choose two hop wireless relay networks to enhance security against the eavesdropper node. This paper considers four node networks, they are one source, and three decode and forward relay, one destination and one eavesdropper node. To transmit the information from source to relay node, eavesdropper interrupt and try to capture that relay node messages. To prevent the eavesdropper interception, destination sends artificial jamming noise to the relay node. This jamming noise has the ability to jam the eavesdropper node. According to the channel state information present at the destination, the four types of jamming power allocation methods are introduced; (i) Fixed jamming power allocation, (ii) Rate optimal power allocation, (iii) Outage optimal power allocation, (iv) Statistical optimal power allocation method. The maximum achievable data rate at the destination is also estimated.
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...IJERA Editor
High-quality data transmission is the primary objective of WSN for achieving quality of service.
Heterogeneous wireless sensor networks (HTWSN) can be used to deploy in sensitive and unmanned areas
to monitor the objects. HTWSN is high configured network used to capture high-quality images and videos
of targeted objects. During the data transmission in HTWSN, we identified that, the formation of
interference with in the network due to link capacity overhead. Due to that, the quality data transmission is
not possible through the network. In this research paper, we described the deployment of HTWSN network
and identifying the primary sources for interference and introducing the proposed Interference
Minimization Protocol (IMP). The IM protocol has achieved better quality of service by minimizing the
interference in HTWSN.
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
As wireless sensor networks (WSNs) continue to attract more and more researchers attention, new ideas for
applications are continually being developed, many of which involve consistent coverage with good
network connectivity of a given area of interest. For the successful operation of the wireless Sensor
Network, the active sensor nodes must maintain both coverage and also connectivity. These are two closely
related essential prerequisites and they are also very important measurements of quality of service (QoS)
for wireless sensor networks. This paper presents the design and analysis of novel protocols that can
dynamically configure a sensor network to result in guaranteed degrees of coverage and connectivity. This
protocol is simulated using NS2 simulated and compared against a distributed probabilistic coveragepreserving configuration protocol (DPCCP) with SPAN [1] protocol in the literature and show that it
activates lesser number of sensor nodes, consumes much lesser energy and maximises the network lifetime
significantly.
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...ijwmn
In wireless sensor networks (WSN), conserving energy and increasing lifetime of the network are a critical issue that has been addressed by substantial research works. The clustering technique has been proven particularly energy-efficient in WSN. The nodes form groups (clusters) that include one cluster head and member clusters. Cluster heads (CHs) are able to process, filter, gather the data sent by sensors
belonging to their cluster and send it to the base station. Many routing protocols which have been proposed are based on heterogeneity and use the clustering scheme such as SEP and DEEC. In this paper we introduce a new approach called WDDC in which cluster heads are chosen on the basis
of probability of ratio of residual energy and average energy of the network. It also takes into consideration distances between nodes and the base station to favor near nodes with more energy to be cluster heads. Furthermore, WDDC is dynamic; it divides network lifetime in two zones in which it changes its behavior. Simulation results show that our approach performs better than the other distributed clustering protocols such as SEP and DEEC in terms of energy efficiency and lifetime of the network.
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
The evolution of wireless communication and circuit technology has enabled the development of an infrastructure consists of sensing, computation and communication units that makes administrator capable to observe and react to a phenomena in a particular environment. In a Wireless Sensor Network (WSN), nodes are scattered densely in a large area. Sensor nodes can communicate with the sink node directly or through other nodes. Data transmission is the major issue in WSN. Each node has limited energy which is used in transmitting and receiving the data. Various routing protocols have been proposed to save the energy during the transmission of data. data centric approach based routing protocol which efficiently propagates information between sensor nodes in an energy constrained mode. This paper proposes a data centric routing Using evolutionary apporoach in WSN.The main objective of this protocol with evolutionary apporoach is to use artificial intelligence, to reduce the energy consumption by the nodes in transmitting and receiving the data. Implementation of Basic SEP, intelligence cluster routing and proposed protocols will be done using MATLAB.
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...IJCNC
The Wireless Sensor Networks (WSN) particularly for real time applications raise fundamental problems
for the scientific community. These problems are related to the limit of energy resource and the real time
constraints on the communication delay. The well functioning of such networks depends mainly on the
network lifetime result of nodes energies and the communication delay which should meet the required
deadlines. Thus, the well design of Real-Time Wireless Sensor Networks must be with the prediction of
the energy consumption and the communication delay. Therefore, this paper propose an analytical model
to predict the lifetime and the delay in IEEE 802.15.4/ZigBee WSN. Our proposed model is based on
realistic assumptions. It considers the most important network features such as idle times from the
Backoff, overhearing and interferences by collisions and transmission errors. Compared to simulation
results and other analytical approaches, our model gives a reliable lifetime and delay prediction.
A Survey on Clustering Techniques for Wireless Sensor Network IJORCS
Wireless sensor networks have been used in various fields like battle feilds, surveillance, schools, colleges, etc. It has been used in our day-to-day life. Its growth increases day by day. Sensor node normally senses the physical event from the environment such as temperature, sound, vibration, pressure etc. Sensor nodes are connected with each other through wireless medium such as infrared or radio waves it depends on applications. Each node has its internal memory to store the information regarding the event packets. In this paper we will come to know the various algorithms in clustering techniques for wireless sensor networks and discuss them. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption .It can also increase network scalability. Sensor nodes are considered to be homogeneous since the researches in the feild of WSNs have been evolved but in reality homogeneous sensor networks hardly exist. Here we will discuss some of the impact of heterogeneous sensor networks on WSN and various clustering algorithms used in HWSN.
A Survey on Topology Control and Maintenance in Wireless Sensor Networksijeei-iaes
Wireless Sensor Networks (WSNs) consist of devices equipped with radio transceivers that cooperate to form and maintain a fully connected network of sensor nodes. WSNs do not have a fixed infrastructure and do not use centralized methods for organization. This flexibility enables them to be used whenever a fixed infrastructure is unfeasible or inconvenient, hence making them attractive for numerous applications ranging from military, civil, industrial or health. Because of their unique structure, and limited energy storage, computational and memory resources, many of the existing protocols and algorithms designed for wired or wireless ad hoc networks cannot be directly used in WSNs. Beside this, they offer a flexible low cost solution to the problem of event monitoring, especially in places with limited accessibility or that represent danger to humans. Applications of large scale WSNs are becoming a reality example are being a Smart Grid, Machine to Machine communication networks and smart environment. It is expected that a topology control techniques will play an important role in managing the complexity of such highly complicated and distributed systems through self-organization capabilities. WSNs are made of resource constrained wireless devices, which require energy efficient mechanisms, algorithm/protocol. Control on topology is very important for efficient utilization of networks and is composed of two mechanisms, Topology Construction (TC) and Topology Maintenance (TM). By using these mechanism various protocols/algorithm have came into existence, like: A3, A3-Coverage (A3-Cov), Simple Tree, Just Tree, etc. This paper provides a full view of the studies of above mentioned algorithms and also provides an analysis of their merits and demerits.
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...ijiert bestjournal
Mobile Ad hoc network is an infrastructure less communication network with limited resources. To maintain virtual
infrastructure for communication broadcasting mechanisms is used. Due to lack of energy efficiency in Mobile Ad
hoc network, there is a need to develop an efficient broadcasting model which enhances energy efficiency. Also
nodes with malicious behaviour cause an internal threat that disobeys the standard and degrades the performance of
routing protocols. This paper introduced an enhanced rebroadcasting algorithm, where rebroadcasting decision for
next hop is immediate or delayed on the basis of trust value and energy level of particular node. This approach helps
to decrease number of rebroadcast, energy consumption and also enhances security. The decision is made with trust
value associated with node, their remaining energy and total number of uncovered nodes.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This paper modifies the DYMO protocol and develops the AIS-DYMO protocol that is
capable to handle the network layer attack. It means the performance of the network doesn’t get
degraded under the attack. Various immune algorithms can be used to enhance the performance of
the DYMO protocol, but the clonal selection algorithm is used in this work to enhance the
performance of the DYMO protocol. Overall the DYMO protocol is modified to handle the network
layer attacks by using the clonal selection immune algorithm.
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
In recent years, Wireless Sensor Networks have gained growing attention from both the research community and actual users. As sensor nodes are generally battery-energized devices, so the network lifetime can be widespread to sensible times.
n this Hands-On workshop participants will learn how to design high performance homes that operate with minimum energy consumption, operation costs, and generation of green house gases.
Participants will learn how to quickly design and fine-tune homes using the latest version of HEED (Home Energy Efficient Design). If attendees bring their laptop, MAC or PC, they will be able to install this software for a hand’s on learning experience. Users can input their own designs using HEED’s fill-in-the-squares multi-story floor planner and click and drag window placement. The program then generates graphic plots of Annual Energy Consumption (kBTU), Carbon Footprint (CO2), or Annual Cost for Fuel and Electricity, among many other analysis images.
Audience Level: Architects, builders, energy consultants, homeowners, educators, and students with all levels of experience.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...ijfcstjournal
Wireless sensor network (WSNs) are network of Sensor Nodes (SNs) with inherent sensing, processing and
communicating abilities. One of current concerns in wireless sensor networks is developing a stable
clustered heterogeneous protocol prolonging the network lifetime with minimum consumption of battery
power. In the recent times, many routing protocols have been proposed increasing the network lifetime,
stability in short proposing a reliable and robust routing protocol. In this paper we study the impact of
hierarchical clustered network with sensor nodes of two-level heterogeneity. The main approach in this
research is to develop an enhanced multi-hop DEEC routing protocol unlike DEEC. Simulation results
show the proposed protocol is better than DEEC in terms of FDN (First Dead Node), energy consumption
and Packet transmission.
This paper considers a heterogeneous network of energy constrained sensors deployed over a region. Each
Normal sensor node in a network is systematically gathering and transmitting sensed data to the clusterhead,
and then cluster head sending data to a base station (via intermediate cluster- heads). This paper
focuses on reducing the energy consumption and hence improving lifetime of wireless sensor Networks.
Clustering sensor node is an effective topology for the energy constrained networks. So energy saving
algorithm has been developed in which clusters are formed considering a subset of high energy nodes as a
cluster-head and another subset of powerful nodes is ask to go to sleep. When Cluster heads deplete their
energy another subset of nodes becomes active and acts as a cluster head. Proposed approach is
implemented in MATLAB, Simulation results shows that it can prolong the network lifetime than LEACH
protocol, and achieves better performance than the existing clustering algorithms such as LEACH.
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...IJCI JOURNAL
Wireless sensor network is composed of hundreds and thousands of small wireless sensor nodes which
collect information by sensing the physical environment. The sensed data is processed and communicated
to other sensor nodes and finally to Base Station. So energy efficient routing to final destination called base
station is ongoing current requirement in wireless sensor networks. Here in this research paper we propose
a multi-hop DEEC routing scheme i.e. G-DEEC for heterogeneous networks where we deploy rechargeable
intermediate nodes called gateways in-between cluster head and base station for minimizing energy
consumption by sensor nodes in each processing round thereby increasing the network lifetime and
stability of wireless sensor networks unlike DEEC.
Throughput analysis of energy aware routing protocol for real time load distr...eSAT Journals
Abstract Wireless sensor network (WSNs) are self-organized systems that depend on highly distributed and scattered low cost tiny devices. These devices have some limitations such as processing capability, memory size, communication distance coverage and energy capabilities. In order to maximize the autonomy of individual nodes and indirectly the lifetime of the network, most of the research work is done on power saving techniques. Hence, we propose energy-aware load distribution technique that can provide an excellent data transfer of packets from source to destination via hop by hop basis. Therefore, by making use of the cross-layer interactions between the physical layer and the network layer thus leads to an improvement in energy efficiency of the entire network when compared with other protocols and it also improves the response time in case of network change. Keywords:- wireless sensor network, energy-aware, load distribution, power saving, cross layer interactions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
Abstarct Wireless sensored network is nowadays very popular in the field of research because world is now switching faster from wired communication to the wireless communication. It is used in environment monitoring, habitat monitoring, battlefield etc. WSN is made up of tiny sensor nodes which senses the data and communicate to the base station via other nodes.WSN networks are data-centric rather than node centric. So, main issues in WSN networks are energy consumption of network, lifetime of a network, delay, latency, quality of service etc.WSN has defined many routing protocols for the network. The main challenge in WSN is to design a routing protocol which gives the maximum energy efficient routing because nodes in sensored network are equipped with the battery. So, as time passes the battery of nodes will decrease so in turn network lifetime will decreases. There are many routing protocols which are classified as their working and their application to different conditions. This paper describes a brief information about routing protocols. The main focus of this paper is to give the comparison of different hierarchical routing protocols. Keywords: Leach, Pegasis,Teen/Apteen, WSN
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
Energy efficient data communication approach in wireless sensor networksijassn
Wireless sensor network has a vast variety of applications. The adoption of energy efficient cluster-based
configuration has many untapped desirable benefits for the WSNs. The limitation of energy in a sensor
node creates challenges for routing in WSNs. The research work presents the organized and detailed
description of energy conservation method for WSNs. In the proposed method reclustering and multihop
data transmission processes are utilized for data reporting to base station by sensor node. The accurate use
of energy in WSNs is the main challenge for exploiting the network to the full extent. The main aim of the
proposed method is that by evenly distributing the energy all over the sensor nodes and by reducing the
total energy dissipation, the lifetime of the network is enhanced, so that the node will remain alive for
longer times inside the cluster. The result shows that the proposed clustering approach has higher stable
region and network life time than Topology-Controlled Adaptive Clustering (TCAC) and Low-Energy
Adaptive Clustering Hierarchy (LEACH) for WSNs.
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSijassn
Wireless sensor network has a vast variety of applications. The adoption of energy efficient cluster-based configuration has many untapped desirable benefits for the WSNs. The limitation of energy in a sensor node creates challenges for routing in WSNs. The research work presents the organized and detailed description of energy conservation method for WSNs. In the proposed method reclustering and multihop data transmission processes are utilized for data reporting to base station by sensor node. The accurate use of energy in WSNs is the main challenge for exploiting the network to the full extent. The main aim of the proposed method is that by evenly distributing the energy all over the sensor nodes and by reducing the total energy dissipation, the lifetime of the network is enhanced, so that the node will remain alive for longer times inside the cluster. The result shows that the proposed clustering approach has higher stable region and network life time than Topology-Controlled Adaptive Clustering (TCAC) and Low-Energy Adaptive Clustering Hierarchy (LEACH) for WSNs.
Review of Various Enhancements of Modified LEACH for Wireless Sensor Networkijsrd.com
Wireless sensor network depends on the nodes have limited energy, memory, computational power, range and it is important to increase energy efficiency by saving the battery power so as to extend of the life time of the given wireless sensor network deployment. In wireless sensor network, data is measured by node and same is send to base station at regular interval. Clustering sensor nodes is an effective technique in wireless sensor network. Different protocols are used for energy consumption in which Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is the first hierarchal cluster based routing protocol successfully used in the wireless sensor network. In this paper, various enhancements used in the original leach protocol are studied.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
2. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 2/31
Keywords Sensor networks – Clustering – Network lifetime – Rounds – Load balancing –
Membership function – Fuzzy logic – Heterogeneity
Satish Chand
did his M.Sc. in Mathematics from Indian Institute of Technology, Kanpur, India and M.Tech. in
Computer Science from Indian Institute of Technology, Kharagpur, India and Ph.D. from Jawaharlal
Nehru University, New Delhi, India. Presently he is working as a Professor in Computer Engineering
Division, Netaji Subhas Institute of Technology, Delhi, India. Areas of his research interest are
Multimedia Broadcasting, Networking, Video-on-Demand, Cryptography, and Image processing.
Samayveer Singh
received his B.Tech. in Information Technology from Uttar Pradesh Technical University, Lucknow,
India in 2007 and his M.Tech. in Computer Science & Engineering from National Institute of
Technology, Jalandhar, India, in 2010. He is pursuing his PhD in the Department of Computer
Engineering, Netaji Subhas Institute of Technology, New Delhi, India. His research interest includes
wireless sensor networks.
3. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 3/31
Bijendra Kumar
did his Bachelor of Engineering from H.B.T.I. Kanpur, India. He has done his Ph.D. from Delhi
University, Delhi, India in 2011. Presently he is working as an Assistant Professor in Computer
Engineering Division, Netaji Subhas Institute of Technology, Delhi, India. His areas of research
interests are Video applications, watermarking, and Design of algorithms.
1 Introduction
The wireless communication is one of the important types of communication that requires no fixed
infrastructure. There are many situations where wireless communication can be deployed such as
volcano, battlefield monitoring, old building structure. It is generally used where the normal cabling is
difficult or financially impractical. The wireless communication done using the sensor devices is called
wireless sensor communication and the resultant network is called the wireless sensor network
(WSN). The WSNs are easily deployable, maintenance free, and provide fault-tolerant platform for
gathering data from the environment [1]. They are cost effective also because the sensors are very
cheap devices and do not require any infrastructure such as lying cabling. The sensors, also called
motes or actuators [2], have an ability to sense the physical environment for an event that may include
sound, humidity, light, temperature, vibration, etc. They collect data by measuring the comprehensive
conditions in their surroundings and transmit it to sink that in turn either processes it or forwards to the
data processing centre using internet. Currently, the wireless systems deal with the integration of low-
power communication, sensing, energy storage, and computation [2]. In a WSN, the communication
can be done using either single hop or multihop. In single hop (also called peer to peer
communication), the sensor nodes directly communicate with any other sensor node or with the base
station. In multihop communication, there may be a sequence of hops while communicating to the base
4. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 4/31
station from a sensor node. Deployment of sensors in a WSN can be deterministic or random
depending on the application. They can be stationary or location-aware, homogeneous or
heterogeneous in nature. Since the sensors are not supported by external battery, their energy must be
used very efficiently in order to monitor the area for longer time. One possible solution to have longer
lifetime of a WSN is to use more sensors, but it may increase collision and, in that case, a suitable
scheduling mechanism need be employed. Other solution of prolonging the lifetime of a WSN is to
employ the heterogeneity in sensor nodes [3]. There are three common types of resource
heterogeneity in a sensor node, namely, computational, link, and energy heterogeneity. In
computational heterogeneity, the heterogeneous node has more resources such as powerful
microprocessor and relatively more memory so that it can provide complex data processing and
longer-term storage. In link heterogeneity, the heterogeneous node has high-bandwidth and long-
distance network transceiver so that it can provide more reliable data transmission. Energy
heterogeneity means that the sensor nodes have different levels of energy. The computational and link
heterogeneities implicitly depend on the energy as these types of nodes consume more energy. Thus,
the energy based heterogeneity may be considered as the most dominating heterogeneity in WSNs. It
has been reported that providing heterogeneity in sensor nodes prolongs the network lifetime,
improves reliability of data transmission, and decreases the latency of data transportation. There have
been several protocols for WSNs, which may be classified into different categories. One of the
important categories of protocols consists of clustering or hierarchical protocols such as low energy
adaptive clustering hierarchy (LEACH) [4] and its different modifications such as LEACH-C,
LEACH-M [4, 5], threshold sensitive energy efficient sensor network protocol (TEEN) [6], adaptive
periodic threshold-sensitive energy efficient sensor network protocol (APTEEN) [7], power-efficient
gathering in sensor information systems [8], stable election protocol (SEP) [9], energy efficient
clustering scheme (EECS) [10], deterministic energy efficient clustering (DEEC) [11] protocol and
hybrid energy efficient distributed (HEED) [12]. Among these types of protocols, the HEED is one of
the most popular protocols as the cluster heads in this protocol are decided based on the residual
energy and degree of nodes. The degree of nodes distributes load among the cluster heads. In other
protocols, the cluster heads are selected based on the residual energy only and no load balancing is
done. In this paper, we discuss the HEED protocol for deploying the underlying network as our
heterogeneous network model in order to increase the lifetime. Our model can describe one- level,
two-level, and three-level heterogeneity and, accordingly, we may call the implementation of HEED as
hetHEED-1, hetHEED-2, and hetHEED-3. The one-level heterogeneity assumes all sensor nodes in a
WSN to have equal amount of energy, for which the original HEED is implemented. We may also call
it as homogeneous HEED. The two-level and three-level heterogeneity assume the sensor nodes in a
WSN to be equipped with two and three energy levels, respectively, for which we call the
implementation of HEED as hetHEED-2 and hetHEED-3 protocols. The original HEED considers
two parameters—residual energy and node density to determine the cluster heads. In hetHEED-1,
hetHEED-2, and hetHEED-3, we consider the same two parameters to determine the cluster heads
so that we can compare their performance with respect to heterogeneity. We also consider one more
parameter, i.e., distance between a sensor and sink, in addition to residual energy and node density
5. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 5/31
and apply the fuzzy logic to calculate the probability in order to decide the cluster heads. The resultant
HEED implementation is named as HEED-FL (original HEED with fuzzy logic), hetHEED-FL-2
(hetHEED-2 with fuzzy logic), and hetHEED-FL-3 (hetHEED-3 with fuzzy logic). Increasing the
energy in network in order to make them heterogeneous increases the network lifetime, which is at
much higher side, especially in case of hetHEED-3 (74.2 % energy increase leads to 213.38 %
increase in network lifetime). Using fuzzy logic in HEED without increasing any energy in the network
increases the network lifetime by 114.85 % of that of the original HEED. Increasing the heterogeneity
level with fuzzy logic increases the network lifetime manifold. For example, the 19 % increase in the
network energy enhances the network lifetime by 387.94 %.
The rest of the paper is organized as follows. Section 2 reviews the related literature. Section 3,
discusses the fuzzy system including its different components—fuzzifier, fuzzy rulebase, fuzzy inference
engine, and defuzzifier. In Sect. 4, a heterogeneous model for WSNs is discussed that is used to
simulate hetHEED-1, hetHEED-2, and hetHEED-3, HEED-FL, hetHEED-FL-2, and hetHEED-FL-
3. In Sect. 5, we discuss cluster formation, data collection and data transmission. The simulation
results are given Sect. 6 and, finally, the paper is concluded in Sect. 7.
2 Literature Review
The routing protocols for WSNs may be categorized into different classes based on the applications
such as location based, data-centric, mobility based, multipath based, QoS based, and hierarchical
[13]. The location based protocols utilize the position information of nodes to relay the data of the
desired regions rather than the whole network. Some of the important location based protocols are
minimum energy communication network [14], greedy anti-void routing [15], and geographical and
energy aware routing [16]. In the data centric routing protocols, also called flat-based, all nodes in
WSN use flood based data transferring scheme. Some of the important data centric based protocols
include sensor protocols for information via negotiation [17], directed diffusion [18], and Rumor
routing [19]. The multipath routing protocols such as sensor-disjoint multipath protocol [20] use
multiple paths to enhance the network performance. In QoS based routing protocols, the network
makes balance between the energy consumption and data quality besides the QoS metrics such as
delay, energy, bandwidth while delivering the data to base station or sink. Some of the QoS based
protocols include sequential assignment routing [21], stateless protocol for real-time communication in
sensor networks [22], and energy-aware routing [23]. The hierarchical protocols, also called
clustering protocols, cluster the sensor nodes. These protocols generally work in two phases. In first
phase, the cluster heads are selected and, in second phase, routing/data transmission is performed.
The low energy adaptive clustering hierarchy (LEACH) [4] is the very first clustering protocol that
forms the clusters based on the received signal strength. In this protocol, the data is transmitted
through cluster heads, whose numbers are predetermined. The cluster heads are changed randomly
over the time so that the cluster heads (sensor nodes) do not become dead by draining up their entire
6. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 6/31
energy. There have been discussed different variants of LEACH such as LEACH-C, LEACH-M,
LEACH-V [4, 5].
Manjeshwar and Agarwal discuss a TEEN protocol [6] that uses hierarchical structure. This protocol
responds to the sudden changes in the sensed attribute, a physical parameter about which a user is
interested and thus it is useful for time-critical applications. The TEEN protocol has been modified as
APTEEN protocol [7] that is meant for both time-critical events and periodic data collections. Lindsey
and Raghavendra discuss power efficient gathering in sensor information systems protocol [8], an
improved version of LEACH, that uses chains of sensor nodes. The data is transmitted from all sensor
nodes through their respective chains to a single node, called cluster head. The cluster head aggregates
the data to remove the duplicity and then transmits it to the base station or sink. It outperforms the
LEACH; however, due to excessive delay, it is not suitable for large networks. Smaragdakis et al.
discuss SEP [9], an extension of LEACH, that uses hierarchical clustering and heterogeneity unlike the
LEACH. In this protocol, a node becomes cluster head on the basis of weighted election probabilities
of each node according to their respective energies. The EECS protocol [10] elects the cluster heads
with more residual energy through local radio communication. It is used for periodical data gathering
applications using WSNs. It uses load balancing and energy efficiently. However, it requires global
knowledge of distances between the cluster-heads and base station. Li et al. discuss DEEC [11] for
two-level and multi level heterogeneous WSNs. This protocol selects cluster heads using the ratio of
residual energy of each node and the average energy of the network. The nodes having high initial and
residual energies have more chance of becoming cluster heads. The nodes nearer to the sink require
spending more energy than those farther because of the extra burden of the nodes within the
neighborhood of the base station. Thus, smaller clusters are formed using the nearer nodes to balance
the load among the cluster heads that fall in different regions and vice versa. This concept has been
discussed by Eshghi and Haghighat [24].
The HEED [12] protocol selects cluster heads based on their residual energy and node degrees. The
node degree helps balancing the load among the cluster heads. In this protocol, the clustering process
is carried out in terms of iterations and, in every iteration, the nodes not covered by any cluster head
double their probability of becoming a cluster head. It has low overhead in terms of processing cycles
and message exchanged. This protocol does not assume any distribution of nodes or location
awareness. It also achieves fairly uniform cluster head distribution across the network and prolongs the
network lifetime besides supporting data aggregation. A variant of HEED protocol, called integrated
HEED (iHEED) [25], has integrated data aggregation in the multihop routing by considering data
aggregation operators such as AVG or MAX. It can serve both source and data driven applications.
Another variant of HEED by Huang and Wu [26] discusses a constant time clustering mechanism that
may be termed as an extended probabilistic algorithm for HEED protocol. In this algorithm, the nodes
having high energy participate in cluster head election and the remaining are eliminated; thus, requiring
less rounds for selecting cluster heads. Another variant of HEED, called Misense hierarchical cluster
based routing algorithm (MiCRA) [27], maintains the balanced energy consumption of nodes so that
the network lifetime increases. The paper [28] discusses the HEED for heterogeneous network model;
7. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 7/31
(1)
however, no new heterogeneous network model is discussed in that paper. It uses two-level and
multilevel heterogeneous model from [11] and three-level heterogeneous model from [3]. Its
performance is poorer than that of ours. In [29], similar work has been discussed as in [28], but it
considers the nodes movable unlike in [28] that has static nodes. As regard to performance of [29],
our proposed hetHEED protocols perform better and same is the case with HEED-FL, hetHEED-
FL-2 and hetHEED-FL-3. In next section, we discuss fuzzy system as it is needed for finding the
cluster heads.
3 Fuzzy System
The system based on fuzzy logic consists of four parts: fuzzifier, fuzzy knowledge base, fuzzy inference
engine, and defuzzifier as shown in Fig. 1.
Fig. 1
Fuzzy logic based system
The inputs to the system are crisp numbers. The fuzzifier transforms these crisp values into fuzzy values
and stores in a fuzzy set by applying a suitable fuzzification function. The fuzzy rules are of the form IF-
THEN, which are stored in fuzzy rulebase, also called knowledgebase.
The output of the fuzzifier and the rules from the knowledgebase are given to the fuzzy inference engine
as inputs for simulating human reasoning process by making fuzzy inference. The output of the fuzzy
inference engine is provided to the defuzzifier that converts the fuzzy values into crisp values. The
defuzzifier calculates the centroid and uses it to calculate the probability. The centroid is computed as
follows:
where, denotes the membership function of set A.
We have used Mamdani model [30] for inference engine because it is most widely used in applications
Centroid =
∑ (x) ∗ xμ
A
∑ (x)μA
(x)μ
A
8. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 8/31
due to its simplicity. We consider three input parameters in our fuzzy system that include battery
power, node density, and distance between a sensor and the sink. Each of the input variables has
three membership functions, i.e., the battery power has low, medium, and high; the node density has
sparsely, medium, and densely; the distance has near, medium, and far. The membership function
corresponding to the output variable, i.e., probability has 9 values—very weak, weak, little weak,
lower medium, medium, higher medium, little strong, strong, very strong (Fig. 2).
Fig. 2
Layered fuzzy scheme
The membership functions for battery power consists of one full and two half trapezoidal; for node
density, two trapezoidal and one triangular; for distance, two half trapezoidal and one triangular; and
for output probability, two half trapezoidal and seven triangular, as shown in Fig. 3a–d, respectively
(Table 1).
9. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 9/31
Fig. 3
Fuzzy sets corresponding to fuzzy inputs and output parameters. a Fuzzy set for fuzzy input variable:
battery power. b Fuzzy set for fuzzy input variable: node density. c Fuzzy set for fuzzy input variable:
distance. d Fuzzy set for fuzzy output variable: probability
10. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 10/31
Table 1
Fuzzy rule base
Battery power Node density Distance Probability
Low(0) Sparsely(0) Near(0) Little weak(2)
Low(0) Sparsely(0) Medium(1) Weak(1)
Low(0) Sparsely(0) Far(2) Very weak(0)
Low(0) Medium(1) Near(0) Lower medium(3)
Low(0) Medium(1) Medium(1) Little weak(2)
Low(0) Medium(1) Far(2) Weak(1)
Low(0) Densely(2) Near(0) Medium(4)
Low(0) Densely(2) Medium(1) Lower medium(3)
Low(0) Densely(2) Far(2) Little weak(2)
Medium(1) Sparsely(0) Near(0) Medium(4)
Medium(1) Sparsely(0) Medium(1) Lower medium(3)
Medium(1) Sparsely(0) Far(2) Little weak(2)
Medium(1) Medium(1) Near(0) Higher medium(5)
Medium(1) Medium(1) Medium(1) Medium(4)
Medium(1) Medium(1) Far(2) Lower medium(3)
Medium(1) Densely(2) Near(0) Little strong(6)
Medium(1) Densely(2) Medium(1) higher medium(5)
Medium(1) Densely(2) Far(2) Medium(4)
High(2) Sparsely(0) Near(0) Little strong(6)
High(2) Sparsely(0) Medium Higher medium(5)
High(2) Sparsely(0) Far(2) Medium(4)
11. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 11/31
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
High(2) Medium(1) Near(0) Strong(7)
High(2) Medium(1) Medium(1) Little strong(6)
High(2) Medium(1) Far(2) Higher medium(5)
High(2) Densely(2) Near(0) Very strong(8)
High(2) Densely(2) Medium(1) Strong(7)
High(2) Densely(2) Far(2) Little strong(6)
We use fuzzy model for selecting the cluster heads. The node corresponding to maximum probability is
chosen as the cluster head. In next section, we discuss our heterogeneous network model.
4 Proposed Heterogeneity Network Model
Before discussing our network model, we outline the basic assumptions made for WSN in our work:
All sensor nodes and base station are stationary after deployment; each is identified by a
unique ID.
Nodes are location-unaware, i.e. not equipped with GPS-capable antennae.
All nodes have similar capabilities (processing/communication), but different in terms of
energies.
Nodes are left unattended after deployment, meaning thereby battery recharge is not possible.
There is only one BS, located at the centre in the network, has a constant power supply; thus
has no energy, memory and computation constraints.
Each node has the ability to aggregate data; as a result several data packets can be
compressed as one packet.
The distance between nodes can be computed based on the received signal strength.
Nodes have the capability of controlling the transmission power according to the distance of
receiving nodes and the node failure is considered due to energy depletion.
The radio link is symmetric such that energy consumption of data transmission from node A to
node B is the same as that of transmission from node B to node A.
Now, we discuss a three level heterogeneous network model. This model describes a WSN that
consists of three types of sensor nodes based on their energy levels. The nodes having more energy
12. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 12/31
(2)
(3)
(4)
are supposed to be costlier than those having less energy. Because of the high cost, the nodes having
maximum energy are assumed to be minimum in numbers. The nodes having minimum energy level are
the cheapest ones and hence they can be deployed abundantly. We assume that the WSN has N
number of nodes out of which nodes have minimum energy, where 0 1. We may
call them as the normal nodes and the energy of these types of nodes denoted as . The
nodes have more energy than the normal nodes. We may call these nodes as the advance nodes and
denote the node energy by . The remaining nodes have the
maximum energy, denoting the node energy by . These nodes may be called as super nodes.
Thus, we have the inequalities for the number of nodes and their energy levels.
The total energy of the network, , is given by the following expression.
We will show that this model (2) can describe one-level, two-level, and three-level heterogeneity
depending on the value of . The bounds of are 0 and 1. When 0, we have only one term in
(2) as the first two terms in (2) become zero. For 0, in (2) contains super nodes only,
which signifies one-level heterogeneity. We may also call it homogeneity because the network contains
only a single type of nodes. In this case, a node in the network has energy. We impose suitable
constraints so that the model contains normal nodes rather the super nodes in case of one-level
heterogeneity. This can be obtained by defining the following relation:
where n is a positive integer greater than 1 and is a function of and . In a very simple form,
we can have . The value of in (3) should be in the
consonant with the condition: .
Now, we will show that this model can describe two-level heterogeneity, i.e., the network contains
only two types of nodes. For this, we find the value of , which is given by the solution of the following
equation:
Equation (4) is not an arbitrary; it basically diminishes the third term in (2), making thus the model of
two-level heterogeneity. Using (4), the model in (2) contains two types of nodes: normal and advance
nodes. Equation (4) has two solutions: and . Since is upper-
bounded by 1 and , the valid solution of (4) is . For
, the model (2) contains two types of nodes that have energies and
.
For three-level heterogeneity, we need to determine the range of . The upper bound of the range is
⊖ ∗ N ≤ ⊖ ≤
E0 ∗ N⊖
2
E1 (N − (⊖ ∗ N + ∗ N))⊖
2
E2
⊖ ∗ N > ∗ N > (N − (⊖ ∗ N + ∗ N)) and < <⊖
2
⊖
2
E0 E1 E2
Tenergy
= ⊖ ∗ N ∗ + ∗ N ∗ + (1 − ⊖ − ) ∗ N ∗Tenergy E0 ⊖
2
E1 ⊖
2
E2
θ θ θ =
θ = Tenergy
E2
⊖ =
−E2 E0
n ∗ f( , )E1 E2
f E1 E2
f either ( + ) or ( − )E2 E1 E2 E1 θ
< <E0 E1 E2
θ
1 − ⊖ − = 0⊖
2
(( ) − 1)/25√ (( ) + 1)/25√ θ
(( ) + 1)/2 > 15√ (( ) − 1)/25√
θ = (( ) − 1)/25√ E0
E1
⊖
(( ) − 1)/2√
13. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 13/31
(5)
(6)
(7)
(8)
(9)
. Let the lower bound of be that is to be determined. The range of for
three-level heterogeneity is . Taking as and
from (3), we have
Let and . From (5), we have
It can be written as
Or
Since LHS of inequality (6) is negative, we should have
This gives
From (5) can be written as
The inequality may be written as
In this way, we have shown that the energy model in (2) can describe one-level, two-level and three-
level heterogeneity in a WSN.
5 Cluster Formation and Data Transmission
In this section, we discuss in general cluster formation, data collection, data aggregation, and then data
transmission to the base station. In our network of sensors, a sensor acts either as a cluster head or
simply a cluster member. We discuss the computation of the energy spent by the cluster head and the
cluster members in a cluster in collecting or transmitting the data. The energy spent in transmitting L-bit
message by a sensor depends on the distance [4, 5].
(( ) − 1)/25√ ⊖ θL θ
< ⊖ < (( ) − 1)/2⊖L 5√ f ( − )E2 E1 θ
< < (( ) − 1)/2⊖L
−E2 E0
n ∗ ( − )E2 E1
5√
= +E1 α1 E0 = +E2 α2 E1
<⊖L
+α2 α1
n ∗ α2
<
α2
α1
1
n ∗ − 1⊖L
− ≥
α2
α1
1
1 − n ∗ ⊖L
1 − n ∗ < 0⊖L
<
1
n
⊖L
( − ) ≤ ∗ ( − )E2 E0
n ∗ (( ) − 1)5√
2
E2 E1
n ∗ (( ) − 1) ∗ − 2 ≤ (n ∗ (( ) − 1) − 2)5√ E1 ∗ E0 5√ ∗ E2
14. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 14/31
(10)
(11)
(12)
(13)
(14)
(15)
For short distance , the energy consumed is given by
For long distance , the energy consumed is given by
where signifies energy dissipated per bit per m and to run the
transmitter or receiver circuitry and are transmitter-amplifier model parameters.
The first terms in (10) and (11) signify the energy spent by the transmitter circuitry that is basically
related to the digital coding, modulation, filtering, etc. and the second terms signify the energy spent in
actual transmission of the message data of L-bits. We generally refer this total energy as the energy
spent in transmission. The distance is short or long is decided on the value of , also called as
threshold, whose value is given by [4, 5]
This threshold value is maximum and in practice less value of is considered, e.g., 70, 75, 85, etc.
The energy spent in receiving L-bits data is given by [4, 5]
The energy spent in sensing L-bits data is given by [4, 5]
Here, and each are equal to (i.e., .
The head node receives the data from several sensors, which are meant for monitoring/sensing some
activity. It is quite likely that the duplicate data may be received by the cluster head from different
sensors as they are monitoring the same activity.
The energy spent in aggregating L-bits data is given by [4, 5]
where, nJ per message bit.
Normally, the number of clusters are predetermined, say, 5 % and so, of the total nodes in the
network. Once the cluster head are decided, these heads broadcast advertisement message to all
sensors. Depending upon the received signal energy (assuming residual energy is the only parameter
for deciding cluster heads), each sensor node decides its cluster head and informs its decision to the
cluster head that corresponds to the maximum received signal energy. In our work, the cluster heads
are selected based on the residual energy and the node degree. The very first time, the residual
energy of a node is equal to its initial energy and after each iteration (iteration is defined later), it gets
d ETXS
= L ∗ + L ∗ ∗ if d ≤ETXS
∈elec ∈fs
d
2
d0
d ETXL
= L ∗ + L ∗ if d >ETXL ∈elec ∈mp ∗ d
4
d0
∈elec
2
signifies the energy∈fs
∈mp
d0
= = = 87.70d0
∈fs
∈mp
− −−−
√
10 ∗ 10
−12
0.0013 ∗ 10
−12
− −−−−−−−−−−−−
√
d0
= L ∗ERx ∈R
= L ∗ESx
∈S
∈R ∈S
∈elec = = )∈elec ∈R ∈S
= L ∗EDA
∈DA
= 5∈DA
15. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 15/31
(16)
(17)
reduces by the amount spent in sensing or data transmission, etc. The degree of a node is the number
of nodes in its sensing range. The energy spent by the cluster head to broadcast advertisement is given
by (10) as it is the short distance and the energy spent by a sensor node to inform its cluster head is
also given by (10). In this way, the clusters are formed. It may be mentioned here that there is very
small probability to be two cluster heads within each other’s cluster range [12]. The sensors are
inexpensive devices; they are normally deployed in abundant. All sensors gather data for (or sense) the
same activity taken/taking place in the given area, there is a possibility of the same data collection by
multiple sensors. Since all sensors send their data to their respective cluster heads, a cluster head may
get duplicate data that need be discarded. The non-head nodes sense the area/collect the data by
spending the energy according to (14) and send the sensed/collected data to their cluster heads by
spending the energy according to (10). The head nodes receive the data from their respective cluster
members and send it to the sink. The energy spent by the head nodes in receiving the data from cluster
members is given by (13) and the energy spent by the head nodes aggregating the data (removing the
duplicate data) is given by (15) and the energy spent by the head nodes in sending the received data to
the sink is given by (11). Collecting the data from cluster members and sending to sink by a cluster
head, we term it as iteration. The energy spent by the network containing total nodes out of which
as the head nodes in an iteration consists of the energy spent by the cluster members in sensing the
data and sending it to their respective cluster heads and the energy spent by the cluster heads in
receiving the data from their respective cluster members, aggregating the data and then sending it to
the sink. This data may be termed as one frame. Thus, in an iteration, one frame data is
collected/sensed from the area and sent to the base station (sink).
The energy spent by a single non-head sensor is given by, assuming each message size of L bits, for a
single frame data (i.e., per iteration) is
The energy spent by a cluster head for a single frame data is given by
For simplicity, we uniformly divide nodes into clusters; each consists of sensors, assuming
is divisible by . In case is not divisible by , some clusters have one node more than other
clusters and accordingly (17) can be modified for such clusters. Among sensors, one sensor is
cluster head and the remaining sensors are cluster members. The first term in (17)
signifies the energy spent by the cluster head in receiving the data from cluster members.
The second term specifies the energy spent in aggregation of the data received from
cluster members. The last two terms signify the energy spent by the cluster head in transmission of the
message to base station/sink. Figure 4 shows an instance of clusters formed in three-level
heterogeneity for non-fuzzy implementation. In this figure, the normal, advance, and super nodes have
n
k
= L ∗ +L ∗Enh ∈elec ∈
fs
∗ d
2
= L ∗ ( − 1) + L ∗ ∗( − 1) + L ∗ +L ∗Eh ∈elec
n
k
∈DA
n
k
∈elec ∈mp ∗d
4
n k n/k
n k n k
n/k
( − 1)
n
k
( − 1)
n
k
( − 1)
n
k
16. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 16/31
(18)
been denoted by circular , star (*), and plus ( ) marks, respectively. The sink or base station has
been marked as X, situated at the center of the region. The members of a cluster including cluster
head, that has been explicitly pointed by in each cluster, are shown by the same color. In case of fuzzy
implementation, such types of clusters are formed; however, for repeated nature we have not showed
them.
Fig. 4
Clusters with their cluster heads shown in different colors. (Color figure online)
The current cluster heads have sent the frame data to the sink and these head nodes are marked as
non-member, i.e., they cannot be considered to be selected as cluster heads till all the sensor nodes
in the network have become the cluster heads. In this way, one iteration is complete. In next iteration,
another set of sensors from the unmarked sensors are selected as cluster heads depending on the
residual energy and the node degree in case of non-fuzzy and for the fuzzy case the cluster heads
depend upon the residual energy, node degree, and the distance. The probability for fuzzy
implementation is computed as follows:
where a, b, and c are weights of residual energy, node density, and distance, respectively. ,
and signify level values for residual energy, node density, and distance, respectively, and
, and are maximum level values for residual energy, node density, and distance,
respectively. In our work, the residual energy has values low, medium, and high, which correspond to
(∘) +
P robability =
a ∗ + b ∗ + c ∗ ( − )Lre Lnd Dm Ld
a ∗ + b ∗ + c ∗M re M nd M d
,Lre Lnd
Ld
,M re M nd M d
17. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 17/31
level values as 0, 1, and 2, respectively. The node density has sparsely, medium, and densely that
correspond to level values as 0, 1, and respectively. The distance has values near, medium, far and the
corresponding level values are 0, 1, 2. Thus, the values of , and each are 2 and
each of , and can have values as 0 or 1, or 2 (because we have considered three
membership functions, i.e. low, medium, high in case of battery power; sparsely, medium, densely in
case of node density; and near, medium, far for distance). For giving equal weightage to each of the
parameters, i.e., residual energy, node density, and distance, we can have a b c 1. However,
the residual energy normally has more weightage than the node density and distance, each. In
literature, the values of a, b, c have been taken as 2, 1, 1, respectively. Selection of a cluster head (or
rotating cluster head) amongst the nodes is based on the probabilities.
These newly cluster heads form their clusters by broadcasting advertisement message. Once their
clusters are formed, the cluster members collect the data and send to their cluster heads. The cluster
heads aggregate the received data and then send to the base station/sink, it is the second frame. The
second iteration is complete. We carry out further iterations as long as there are unmarked sensors
(which have not been cluster heads). The number of iterations when all sensors have become cluster
heads forms a round. It may happen that some of the sensors have exhausted their energies. These
sensors will not able to sense/collect the data and hence will not participate in further clustering
process. Such nodes are called dead nodes. A WSN contains redundant sensors, whose sole
purpose is to monitor a given area for activities. Even if some sensors are dead, the remaining sensors
will participate in clustering process and hence in data collection. When all sensors have depleted their
energies, no clustering process will take place and hence no data collection. This determines the
network life time in our case.
In our work, a pre-specified percentage of the number of sensors nodes are taken as the initial cluster
heads that form their respective clusters by broadcasting advertisement message and receiving
responses from the nodes wishing to be cluster member. The cluster formation process is called T
(cluster process). Each of the cluster heads collects the sensed data from their cluster members,
aggregates it, and then sends the aggregated data to the base station. Collecting, aggregating data, and
sending the aggregated data by a cluster head to the base station forms T (network operation) and
the current cluster heads are marked as non-candidates. The non-candidates will not participate in
selection of cluster heads unless all sensors have become cluster heads. This entire process starting
from the cluster selection to the data transmission by the cluster heads to base station, i.e., (T T
forms a single iteration. The iterations are carried out till all sensors have not become cluster
heads in some iteration. The number of iterations, when all clusters have become cluster heads, forms
one round. In the beginning of a round, no sensor is non-candidate. The iterations and hence the
rounds are performed till there is a cluster. In other words, even if there is a single sensor that has not
depleted its energy, it will form a cluster of itself that perform data collection/sensing and sending it to
the base station. Thus, load balancing is done automatically as it takes care of all sensors.
,M re M nd M d
,Lre Lnd Ld
= = =
CP
NO
CP
+
)NO
18. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 18/31
6 Results and Discussions
In this section, we discuss the implementation of HEED protocol for our heterogeneity network model
and call it as hetHEED. We have shown in the previous section that our network model is capable to
define one-level, two-level, and three-level heterogeneity of the wireless sensor networks.
Accordingly, we call the implementation of HEED as one-level HEED or hetHEED-1, two-level
HEED or hetHEED-2 and three-level HEED or hetHEED-3 heterogeneity, respectively. The
heterogeneity affects the cluster head selection that in turn affects the network lifetime. In original
HEED, the probability for selecting a cluster head has been calculated based on the residual energy
and neighbor density of nodes. Since our proposed protocol hetHEED is based on the original HEED,
we use the same parameters for cluster head selection. In literature, one more parameter, i.e., the
distance between a sensor and sink has also been considered for computing probability. The distance
between the sink and a sensor can be computed based on the received signal energy. We incorporate
this distance parameter in our hetHEED and apply fuzzy logic to calculate the probability for cluster
head selection and the corresponding hetHEED are denoted as HEED-FL, hetHEED-FL-2, and
hetHEED-FL-3, respectively.
In our simulations, we consider random deployment of 100 number of sensor nodes in a square field
of dimension 100 100 m . We discuss simulation results for various values of . For ,
there are only normal nodes in the network and the corresponding WSN has one-level heterogeneity.
We may also call this network as homogeneous network and the implementation of HEED is the
original HEED protocol, which we denote as hetHEED-1. The value of
defines a WSN that consists of normal and advance nodes and the corresponding network is said to
have two-level heterogeneity. The implementation of HEED for these types of networks is denoted by
hetHEED-2.
For three-level heterogeneity, should assume values in accordance with the inequality
. The corresponding network has three types of nodes, namely, normal,
advance, and super nodes. The energy of a super node, , is computed from the values of
and using (2) that must satisfy the inequality .
The hetHEED with fuzzy logic, i.e., HEED-FL, hetHEED-FL-2, and hetHEED-FL-3 use same
number of nodes (of respective types) in the network as the hetHEED-1, hetHEED-2, and hetHEED-
3. The number of nodes in the network is taken as 100, which are assumed to be normal node for
hetHEED-1 and HEED-FL. For hetHEED-2 and hetHEED-FL-2, numbers of normal and advance
nodes are 61 and 39, respectively. For hetHEED-3 and hetHEED-FL-3, the number of normal,
advance, and super nodes are 51, 26, and 23, respectively. It may be noted that the number of
normal, advance, and super nodes cannot be taken arbitrarily. We need to consider total number of
nodes out of which the model parameter determines their respective numbers. We may consider
arbitrary value of the initial energy of a normal node also the advance node, but the energy of a super
node cannot be taken arbitrary, it is determined by (2).
×
2
⊖ θ = 0
⊖ = ( − 1)/25√
⊖
0 < ⊖ < ( − 1)/25√
E2
,E0 E1 ⊖ < <E0 E1 E2
⊖
19. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 19/31
For all three level of heterogeneity with and without fuzzy logic, we have carried out simulations for
large number of input parameters, i.e., by taking different energy levels of the normal nodes, advance
nodes, super nodes, and various values of . In all cases, we got similar types of results for each type
of heterogeneity. However, we have shown results graphically for one-level heterogeneity by taking
the energy of a normal node as 0.5 J; two-level heterogeneity by taking the energies of normal and
advanced nodes as 0.5 and 0.6 J, respectively; for three-level heterogeneity by taking the energies of
normal, advance, and super nodes as 0.5, 0.6, and 2.0 J, respectively. The energy 2.0 J
corresponds to the value of 0.51 and n 2. The energy for a super node in the hetHEED-FL-3
has been taken as 0.8 J for 0.51 and n 3. We may mention that in the hetHEED the
cluster heads have been decided based on two parameters (residual energy and node density),
whereas in the hetHEED with fuzzy logic the cluster heads have been decided based on three
parameters (residual energy, node density, and distance). The input parameters used in our simulations
are summarily given in Table 2. The simulation time is 900 s, data packet size is 512 bits and the
bandwidth is taken as 1 Mbps.
Table 2
Simulation parameters
Description Symbol Value
N. of Sensors N 100
Sink position (50, 50)
Threshold distance 70 m
Cluster radius 25 m
Energy consumed by the amplifier to transmit at a shorter distance 10 nJ/bit/m
Energy consumed by the amplifier to transmit at a longer distance 0.0013 pJ/bit/m
Energy consumed in the electronics circuit to transmit or receive the signal 50 nJ/bit
Energy for data aggregation 5 nJ/bit/signal
Message size L 4,000 bits
Initial energy 0.5 J
We have computed the simulation results for getting different output parameters for hetHEED and
hetHEED with fuzzy logic. Figure 5 shows how the energies of nodes get drained with respect to the
θ
E2 =
θ = =
E2 = θ = =
Sp
d0
Cr
∈fs
2
∈mp
4
Eelec
∈DA
E0
20. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 20/31
number of rounds for hetHEED-1 (original HEED), hetHEED-2, hetHEED-3, hetHEED-FL (original
HEED with fuzzy logic), hetHEED-FL-2, hetHEED-FL-3. It is evident from the graphs shown in Fig.
5 that the nodes in the hetHEED-l die earlier than those of the hetHEED-2 and the nodes in
hetHEED-2 die earlier than the hetHEED-3. In other words, increasing the level of heterogeneity
increases the network lifetime. The hetHEED with fuzzy logic keeps some nodes alive for large
number of rounds. The nodes in the hetHEED-2 die earlier than the hetHEED-FL-2. It indeed
performs better than the hetHEED-3. Same is the case for hetHEED-3 and hetHEED-FL-3. In fact,
in all the hetHEED protocols, the nodes die much earlier than the corresponding to the hetHEED with
fuzzy logic protocols. Among all these, hetHEED-FL-3 performs the best as far as the number of alive
nodes is concerned. It is to mention that in the hetHEED-3 the energies have been taken as 0.5, 0.6,
and 2.0 J, respectively, for the normal, advance and super nodes, whereas in the hetHEED-FL-3 the
energies are as 0.5, 0.6, and 0.8 J, respectively, for the corresponding nodes. Even taking less energy
of the super nodes, the hetHEED-FL-3 performs much better than the hetHEED-3 (refer Fig. 5). We
have also obtained the results for network lifetime (number of rounds) when the first node has become
dead and the last node has become dead as shown in Table 3. As evident from Table 3, as the level of
heterogeneity increases, the number of rounds increases in almost all the cases for the both first node
dead and last node dead.
Table 3
Number of rounds when first and last nodes are dead (simulation time: 900 s, packet size: 512 bits,
bandwidth: 1 Mbps)
Protocols First node dead Last node dead
Original HEED 490 1,200
hetHEED-2 level 500 1,476
hetHEED-3 level 502 4,262
HEED-FL 400 2,922
hetHEED-FL-2 level 998 5,278
hetHEED-FL-3 level 998 6,636
21. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 21/31
Fig. 5
Number of alive nodes versus number of rounds
We have also computed simulation results how the energy of the network is dissipated with respect to
the number of rounds for the hetHEED and hetHEED with fuzzy logic for all levels and they are shown
in Fig. 6. As evident from Fig. 6, the energy of the network dissipates rapidly for the hetHEED-1 as
well as hetHEED-2 with respect to number of rounds. As the level of heterogeneity increases, the rate
of energy consumption decreases. The HEED-FL (original HEED with fuzzy logic) performs better
than the hetHEED-1 and hetHEED-2 both. The hetHEED-FL-2 performs better than all levels of the
hetHEED in spite of the fact that the hetHEED-3 has more network energy than that of the hetHEED-
FL-2. Thus, the rate of energy consumption is much slower in case the hetHEED with fuzzy logic than
the hetHEED for all levels of heterogeneity.
Fig. 6
Residual energy in network versus number of rounds
22. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 22/31
Figure 7 shows the simulation results in terms of the number of packets sent to the base station (BS)
with respect to the number of rounds. The number of packets sent to the base station increases as the
number of rounds increases. This behavior is depicted in Fig. 7. We also observe that as the level of
heterogeneity increases, the more number of packets are sent to the base station. In case of fuzzy logic
implementation of the hetHEED, more packets reach to the base station. Only the hetHEED-3 is able
to send the packets for large number of rounds (greater than 1,800 rounds), whereas the HEED-FL
can send packets to base station for large number of round in spite of the less energy. Thus, in our
proposed protocol, the nodes remain alive for longer time, more packets are sent to the base station,
and the rate of energy consumption decreases, as the level of heterogeneity increases. We now
discuss effect of the energy increase in the network on its lifetime for our proposed heterogeneous
network model. We have computed the increase in network lifetime with respect to that of the original
HEED for hetHEED-2, hetHEED-3, HEE-FL, hetHEED-FL-2, and hetHEED-FL-3, which are given
below.
Fig. 7
Number of packets sent to base station with respect to number of rounds
hetHEED-2 level:
Number of sensor nodes 100 ( 61+39).
Number of normal nodes 61;
Number of advance nodes 39;
Energy of a normal sensor node 0.5 J.
Energy of an advance sensor node 0.6 J.
Total network energy 61 0.5 39 0.6 53.9 J.
Network lifetime 1,476 h.
= =
=
=
=
=
= × + × =
=
23. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 23/31
Percentage increase in network energy 7.8
Percentage increase in network lifetime 8.5
hetHEED-3 level:
Number of sensor nodes 100 ( 51 26 23).
Number of normal nodes 51;
Number of advance nodes 26;
Number of super nodes 23;
Energy of a normal sensor node 0.5 J.
Energy of an advance sensor node 0.6 J.
Energy of a super sensor node 2.0 J.
Total network energy 51 0.5 26 0.6 23 2 87.1 J.
Network lifetime 4,262 h.
Percentage increase in network energy 74.2
Percentage increase in network lifetime 213.38
HEED-FL (Original HEED with fuzzy logic):
Number of sensor nodes 100.
Energy of a sensor node 0.5 J.
Total network energy 50 J.
Network lifetime for original HEED 1,360 h
Network lifetime for HEED-FL 2,922 h
Percentage increase in network energy 0.0
Percentage increase in lifetime 114.85.
hetHEED-FL-2 level:
Number of sensor nodes 100 ( 61 39).
Number of normal nodes 61;
Number of advancel nodes 39;
Energy of a normal sensor node 0.5 J.
=
=
= = + +
=
=
=
=
=
=
= × + × + × =
=
=
=
=
=
=
=
=
=
=
= = +
=
=
=
24. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 24/31
Energy of an advance sensor node 0.6 J.
Total network energy 61 0.5 39 0.6 53.9 J.
Network lifetime 5,278 h.
Percentage increase in network energy 7.8
Percentage increase in network lifetime 288.08
hetHEED-FL-3 level:
Number of sensor nodes 100 ( 51 26 23).
Number of normal nodes 51;
Number of advance nodes 26;
Number of super nodes 23;
Energy of a normal sensor node 0.5 J.
Energy of an advance sensor node 0.6 J.
Energy of a super sensor node 0.8 J.
Total network energy 51 0.5 26 0.6 23 0.8 59.5 J.
Network lifetime 6,636 h.
Percentage increase in network energy 19
Percentage increase in network lifetime 387.94
We observe from Table 4 that increasing the energy in network increases its lifetime in much
proportion. This increase is very high in case of the hetHEED with fuzzy logic. In fact, without
increasing in the network energy, the lifetime increases by 114.85 % when fuzzy logic is used. We
have also computed other performance results that include throughput, traffic load, and aggregate
delay as defined below.
=
= × + × =
=
=
=
= = + +
=
=
=
=
=
=
= × + × + × =
=
=
=
25. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 25/31
Table 4
Percentage increase in network energy and corresponding increase in network lifetime for hetHEED and
HEED with fuzzy logic
Variant Increase in network energy (%) Increase in network lifetime (%)
hetHEED-2 level 7.8 8.50
hetHEED-3 level 74.2 213.38
HEED-FL 0.0 114.85
hetHEED-FL-2 level 7.8 288.08
hetHEED-FL-3 level 19.0 387.94
Let and denote the time instances when a particular packet is generated at source and received
as destination. The total delay is defined as their difference, i.e.,
The aggregate delay is given by
The throughput and traffic load are given by
The throughput, traffic load, and aggregate delay are shown in Figs. 8, 9, and 10, respectively. We
observe from Fig. 8 that increasing the number of sensors increases the throughput of the network.
Furthermore, as the level of heterogeneity increases, the throughput also increases. For using fuzzy
logic, the increase is higher than that of non-fuzzy implementation. The traffic load has also similar
behaviour as shown in Fig. 9. In both graphs, the increase rate comparatively much higher for
hetHEED-3 level as compared to other cases. The aggregate delay lies in a very small range except
for the hetHEED-3 level as shown in Fig. 10.
ts tr
Total Delay = −tr ts
Aggregate Delay =
Total Delay
Total Receive packets
Throughput =
Total Receive packets ∗ packet size ∗ 8
Total Simulation time
Traffic Load = Total packets Sends ∗ packet size
26. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 26/31
Fig. 8
Throughput versus number of sensors
Fig. 9
Traffic load versus number of sensors
27. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 27/31
1.
2.
Fig. 10
Aggregate delay versus number of sensors
7 Conclusions
In this paper, the HEED protocol has been discussed for the heterogeneous wireless sensor network.
In this work, we have incorporated different level of heterogeneity, namely, one-level, two-level, and
three-level heterogeneity in terms of the node energy and accordingly the implementation of HEED has
been named as hetHEED-1 (original HEED), hetHEED-2, and hetHEED-3, respectively. We have
also implemented all these levels of heterogeneity using fuzzy logic that considers distance in addition
to the residual energy and node density for selecting cluster heads. Increasing heterogeneity level
increases network lifetime in much proportion as compared to the increase in the network energy. In
fact, using fuzzy logic for original HEED, the network lifetime increases by 114.85 % without any
increase in the network energy.
References
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor
networks: A survey. Computer Networks, 38(4), 393–422.
Arampatzis, Th., Lygeros, J., & Manesis, S. (2005). A survey of applications of wireless sensors
28. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 28/31
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
and wireless sensor networks. In Proceedings of 13th Mediterranean conference on control and
automation (pp. 719–724), Limassol, Cyprus, June 27–29, 2005.
Kumar, D., Aseri, T. S., & Patel, T. S. (2009). EEHC: Energy efficient heterogeneous clustered
scheme for wireless sensor networks. International Journal of Computer Communications, 32(4),
662–667.
CrossRef
Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication
protocol for wireless microsensor networks. In Proceedings of 33rd Hawaii international
conference on system sciences (Vol. 8, p. 8020), January 4–7, 2000.
Heinzelman, W. R., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific
protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless
Communications, 1(4), 660–670.
CrossRef
Manjeshwar, A., & Agrawal, D. (2001). TEEN: A protocol for enhanced efficiency in wireless
sensor networks. In Proceedings of the 1st international workshop on parallel and distributed
computing issues in wireless networks and mobile computing, San Francisco, CA, April 2001.
Manjeshwar, A., & Agarwal, D. P. (2002). APTEEN: A hybrid protocol for efficient routing and
comprehensive information retrieval in wireless sensor networks. In Proceedings of international
parallel and distributed processing symposium (IPDPS) (pp. 195–202).
Lindsey, S., & Raghavendra, C. (2002). PEGASIS: Power-efficient gathering in sensor
information systems. In IEEE aerospace conference proceedings (Vol. 3, pp. 1125–1130).
Smaragdakis, G., Matta, I., & Bestavros, A. (2004). SEP: A stable election protocol for
clustered heterogeneous wireless sensor networks. In Second international workshop on sensor
and actor network protocols and applications (SANPA 2004).
Ye, M., Li, C., Chen, G., & Wu, J. (2005). EECS: An energy efficient cluster scheme in
wireless sensor networks. In IEEE international workshop on strategies for energy efficiency in
ad hoc and sensor networks (IEEE IWSEEASN-2005), Phoenix, AZ, April 7–9, 2005.
Li, Q., Qingxin, Z., & Mingwen, W. (2006). Design of a distributed energy efficient clustering
algorithm for heterogeneous wireless sensor networks. Computer Communications, 29, 2230–
2237.
CrossRef
Younis, O. & Fahmy, S. (2004). Distributed clustering in ad-hoc sensor networks: A hybrid,
energy-efficient approach. In Proceedings of IEEE INFOCOM, Hong Kong, March 2004, an
29. 1/30/15 Heterogeneous HEED Protocol for Wireless Sensor Networks - Springer
link.springer.com/article/10.1007/s11277-014-1629-y/fulltext.html 29/31
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
extended version appeared in, IEEE transactions on mobile computing (Vol. 3(4)), October-
December 2004.
Padmanabhan, K., & Kamalakkannan, P. (2011). A study on energy efficient routing protocols
in wireless sensor networks. European Journal of Scientific Research, 60(4), 499–511.
Rodoplu, V., & Meng, T. H. (1999). Minimum energy mobile wireless networks. IEEE
Journal on Selected Areas in Communications, 17(8), 1333–1344.
CrossRef
Xu, Y., Heidemann, J., & Estrin, D. (2001). Geography-informed energy conservation for ad-
hoc routing. In Proceedings of ACM/IEEE MobiCom’01 (pp. 70–84), Rome, Italy.
Yu, Y., Govindan, R., & Estrin, D. (2001). Geographical and energy aware routing: A recursive
data dissemination protocol for wireless sensor networks. Technical report UCLA/CSD-TR-01-
0023, UCLA Computer Science Department.
Heinzelman, W. R., Kulik, J., & Balakrishnan, H. (1999). Adaptive protocols for information
dissemination in wireless sensor networks. In Proceedings of ACM MobiCom ’99 (pp. 174–185),
Seattle, WA.
Kulik, J., Heinzelman, W., & Balakrishnan, H. (2002). Negotiation-based protocols for
disseminating information in wireless sensor networks. Wireless Networks, 8(2/3), 169–185.
CrossRef MATH
Intanagonwiwat, C., Govindan, R., & Estrin, D. (2000). Directed diffusion: A scalable and
robust communication paradigm for sensor networks. In Proceedings ACM MobiCom’00 (pp. 56–
67), Boston, MA, August 2000.
Braginsky, D., & Estrin, D. (2002). Rumor routing algorithm in sensor networks. In
Proceedings of ACM WSNA, in conjunction with ACM MobiCom’02 (pp. 22–31), Atlanta, GA.
Lindsey, S., Raghavendra, C. S., & Sivalingam, K. M. (2002). Data gathering algorithms in
sensor networks using energy metrics. IEEE Transactions on Parallel and Distributed Systems,
13(9), 924–935.
CrossRef
Sohrabi, K., Gao, J., Ailawadhi, V., & Pottie, G. J. (2000). Protocols for self-organization of a
wireless sensor network. IEEE Journal of Personal Communications, 7(5), 16–27.
CrossRef
He, T., Stankovic, J. A., Chenyang, L., & Abdelzaher, T. (2003). SPEED: A stateless protocol
for real-time communication in sensor networks. In Proceedings of international conference on
distributed computing systems (pp. 46–55), Providence, RI.