IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 343-348

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Review on Different Cluster Head Formation Algorithm of Wireless Sensor Network Chetan S Potdukhe1, Narendra Narole2 1

Research Scholar, Department of Electronics & Telecommunication Engineering. Priyadarshini Institute of Engineering & Technology, Nagpur E-mail: [email protected] 2

Assistant Professor, Department of Electronics & Telecommunication Engineering Priyadarshini Institute of Engineering & Technology, Nagpur E-mail:[email protected]

Abstract- To maximize network lifetime in Wireless Sensor Networks (WSNs) the paths for data transfer are selected in such a way that the total energy consumed along the path is minimized. To support high scalability and superior data aggregation, sensor nodes are often grouped into disjoint, non overlapping subsets, groups of nodes called clusters. Clusters generate hierarchical WSNs which incorporate capable utilization of limited resources of sensor nodes and thus extends network lifetime. The objective of this paper is to compare different cluster head selection algorithms reported in the literature of WSNs. Our paper presents review of different energy efficient cluster head selection algorithms in WSNs. And also present timeline and description of LEACH and its limitations in WSN’s. Keywords: wireless sensor networks, clustering, energy efficient clustering, LEACH, network lifetime, energy efficient algorithms, clustering algorithms.

I. INTRODUCTION Development in Electronics and Wireless communication has improved of low-energy and low cost wireless sensor networks. Wireless sensors networks are combination of autonomous devices transmitting locally gathered to so-called sink nodes by using multi hop wireless. One of the most important challenges in WSNs is to design energy efficient routing mechanism to increase the network lifetime due to the limited energy capacity of the network nodes. Additionally hot spots in WSNs emerge as locations under heavy traffic load [1]. Nodes in such areas quickly exhaust energy resources, leading to disconnection in network services. Cluster based routing algorithms in WSNs have recently gained increased interest, demand and energy efficiency is of selective interest. A cluster head (CH) represents all nodes in the cluster and collects data values from them [2]. To balance the energy consumption and the traffic load in the network, the CH should be reused among all nodes and the cluster size should be carefully determined at different parts of the WSN’s. In proposed research, the virtual concept is used for the formation of cluster head assistance which will be helpful for pretty the life span of network and for communication between cluster head. Through different cluster head with the base station according to efficient energy. Given the importance of clustering for WSNs, rest of the paper is organized in following structure; Section II presents the Challenges and limitations of wireless sensor networks. Section III presents an overview of different cluster head selection algorithms in WSNs. Section IV presents a survey on state-of-art of clustering algorithms reported in the literature and section V presents the conclusion of the paper.

Chetan S Potdukhe, IJRIT-343

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 343-348

II. MAIN OBJECTIVES AND DESIGN CHALLENGES OF CLUSTERING IN WIRELESS SENSOR NETWORKS Hierarchical clustering in WSNs can greatly contribute to overall system scalability, lifetime, and energy efficiency. Hierarchical routing is an efficient way to lower energy consumption within a cluster, performing data aggregation and union in order decrease the number of transmitted messages to the BS. Hierarchical clustering is particularly useful for applications that require scalability to hundreds or thousands of nodes. Scalability in this context implies the need for load balancing and efficient resource utilization. In addition to supporting network scalability and decreasing energy consumption through data aggregation, clustering has numerous other secondary advantages and corresponding objectives [3]. WSNs also present several particular challenges in terms of design and implementation. Beyond the typical (however vital) challenges mentioned above (limited energy, limited capabilities, network lifetime) some additional important considerations in the design process of clustering algorithm.

III. OVERVIEW OF DIFFREENT CLUSTER HEAD SELECTION IN WSNs. Mostly used clustering algorithms are LEACH, EEHC, HEED, PEGASIS, ANCAEE etc. A) LEACH ALGORITHM LEACH forms clusters by using a distributed algorithm, where nodes make autonomous decisions without any central control. All nodes have a chance to become CHs to balance the energy spent per round by each sensor node. Initially a node decides to be a CH with a probability “p” and broadcasts its decision. Specifically, after its election, each CH broadcasts an advertisement message to the other nodes and each one of the other (non-CH) nodes determines a cluster to belong to, by choosing the CH that can be reached using the least communication energy (based on the signal strength of each CH-message.

FIGURE 1: Flowchart of LEACH algorithm In Figure 1 the cluster formation scheme is given in a more clear view. The role of being a CH is rotated periodically among the nodes of the cluster to balance the load. The rotation is performed by getting each node to choose a random number “T” between 0 and 1. A node becomes a CH for the current rotation round if the number is less than the following threshold: p

if ε G Chetan S Potdukhe, IJRIT-344

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 343-348

T (i) =

1-p*(r mod (1/p)) 0

Otherwise.

Where, p is the desired percentage of CH nodes in the sensor population r is the current round number G is the set of nodes that have not been CHs in the last 1/p rounds

FIGURE 2: Energy consumption of nodes .

FIGURE 3: Delay in LEACH PROTOCOL

Chetan S Potdukhe, IJRIT-345

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 343-348

FIGURE 4: Throughput analysis of LEACH PROTOCOL

FIGURE 5: Packet Delivery Ratio B.ENERGY EFFICIENT HIERARCHICAL CLUSTERING: A new significant probabilistic clustering algorithm was earlier proposed.(Energy Efficient Hierarchical Clustering—EEHC)[5]. The main objective of this algorithm was to address the shortcomings of one-hop random selection algorithms such as LEACH by extending the cluster architecture to multiple hops. It is a distributed, hop hierarchical clustering algorithm aiming at the maximization of the network lifetime. Initially, each sensor node is elected as a CH with probability “p” and announces its election to the neighboring nodes within its communication range. The above CHs are now called the “volunteer” CHs. Next, all the nodes that are within “k”-hops distance from a “volunteer” CH, are supposed to receive the election message either directly or through intermediate forwarding. Consequently, any node that receives such CH election message and is not itself a CH, becomes a member of the closest cluster. C. HYBRID ENERGY-EFFICIENT DISTRIBUTED CLUSTERING. (HEED) Another improved and very popular energy-efficient protocol is HEED (Hybrid Energy- Efficient Distributed Clustering)[6]. HEED is a hierarchical, distributed, clustering scheme in which a single-hop communication pattern is retained within each cluster, where as multi-hop communication is allowed among CHs and the BS. The CH nodes are chosen based on two basic parameters, residual energy and intra cluster communication cost. Residual energy of each node is used to probabilistically Chetan S Potdukhe, IJRIT-346

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 343-348

choose the initial set of CHs. On the other hand, intra cluster communication cost reflects the node degree or node’s proximity to the neighbor and is used by the nodes in deciding to join a cluster or not. Thus, unlike LEACH, in HEED the CH nodes are not selected randomly. Only sensors that have a high residual energy are expected to become CH nodes. D. ANCAEE ALGORITHM In order for a node to become cluster head in a cluster the following assumptions were made. 1) All the nodes have the same initial energy. 2) There are S nodes in the sensor field. 3) The number of clusters is K. Based on the above assumptions, the average number of sensor nodes in each cluster is M where After M rounds, each of the nodes must have been a cluster head (CH) once. We assigned each node a unique identifier i, Mi for all 0, 1, 2, 3, 4, S-1…….. Variable i is used to test whether it is the turn of a node to become a CH. Originally, all nodes are the same, i.e. there is no CHs in each cluster, j = 0 where j is CHs counter. A node q is selected among all nodes and continuously executes the following steps: Firstly, q increments i by 1 and check if i is even, if yes that node is selected as the CH for that round and announces its new position to all member nodes in the cluster. Else if i is odd, it cannot be a CH for that round, it will wait for the next round and be ready to receive advertisement message from the new CH. A predetermined value is set (threshold value) for the new CH to transmit for that round. When the value has reached, j will be incremented by 1 and the process of selection of new CH begins. It tests if the following two conditions hold. That a sensor node has not become cluster head for the past 1p rounds.That the residual energy of a node is more than the average energy of all the sensor nodes in the clustering.Thus, the probability of a node becoming new cluster head is given as where remis the remaining energy in node (i), is the average energy of all the nodes in a cluster Eavg. It continues until j = K. The algorithm stops when j = K. The new CHs collect sensed data from member nodes, aggregate them, and transmit the compressed data to the next cluster head or base station. E. LEACH-DC ROUTING PROTOCOL In the network initialization, LEACH-DC uses the design of LEACH-C in [9]. Nodes drive their geographic in turn to a sink. The sink calculates the most distance of each node to the center of the area, and sends it to each node. Allowing for a single node energy ratio, add the current energy Ei-current and the original energy Ei-total of the node i to the threshold formula of selecting cluster head. For a node consuming added energy, it reduces the values of T(n) and the probability of suitable cluster head. In distinction, for a node consuming fewer energy, it increases the values of T(n) and the probability of suitable cluster head. LEACH-DC introduces the second cluster head selection on the basis of the first clustering, making the selected cluster head as put up the shutters as possible to the centroid of the cluster member woody region and its energy more than the average of members’ lasting energy in the cluster. Since the energy using up of transmitting a packet of k bits by all node to the cluster head depends on the distance between the node and the cluster head, if the cluster head is earlier to the centroid, the free of charge space model can be used to transmit data signals, thus can be really save energy to 40%-50% [9]. Choosing a better residual energy node as cluster head is essentially to shun the too much death of cluster head due to low energy.

ADVANTAGE OF LEACH DC PROTOCOL Considering the nodes’ left over energy and their distances to the area center in a wireless sensor network makes the nodes with more remaining energy additional possible to become cluster heads and these cluster heads will not emerge at the edge of the area, so the cluster heads can cover up larger area. Reselecting cluster head in the cluster makes the cluster head as close as possible to the centroid of the cluster area and its energy is greater than the average residual energy of nodes in the cluster, reducing the energy consumption for inside cluster communications. Simulation shows that LEACH-DC protocol improves

Chetan S Potdukhe, IJRIT-347

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 343-348

LEACH protocol in the way that LEACH-DC protocol balances the energy consumption of nodes in the network, delays the nodes' death time, and prolongs the life time of the entire WSN effectively.

IV.THE LIMITATION OF LEACH ALGORITHM From the formula, the short-comings of LEACH are Analyzed: 1. From the T (n), the cluster head node which is selected will not become a cluster head in the next 1/P recycling round. The threshold value T (n) of the remaining node will increase. The node produces the probability of random numbers which is less than T(n), the probability of the selected cluster head will increases. The value of P determines the number of cluster head in each round. However, how to determine the best value P is very difficult in practical applications because it relates with the size and density of the network. 2. T(n) does not consider the energy factor. This algorithm must be based on two assumptions in order to achieve the average energy consumption target: (1) the initial energy of each node is equal; (2) the energy consumption is equal when each node is selected as a cluster head. However, the size and distance from the cluster head to the base a station is different.

V. CONCLUSION: We have surveyed different routing algorithms along with advantageous and disadvantageous comparison with LEACH protocol. LEACH and its advanced protocols reported in the literature of WSNs till today and presented the comparison of some advancement in LEACH protocol [7]. We have found that some energy efficient algorithms increases the network lifetime and also consumes energy in routing. Although every effort has been made to provide complete and accurate state of the art survey on energy efficient clustering algorithms along with LEACH and its advanced protocols as applicable to WSNs.

VI.REFERENCES [1] W. Heinzelman, A. Chandraksan, and H. Balakrishnan, “An application specific protocol architecture for wireless micro sensor networks,” IEEE Transactions on Wireless Communications, pp. 660–670, 2002. [2]S.D. Muruga Nathan, D.C.F. Ma, R.I. Bhasin, and A.O. Fapojuwo, "A centralized energy-efficient routing protocol for wireless sensor networks," IEEE Radio Communications Magazine, pp. 8-13, 2005. [3] S. Lindsey and C.S. Raghavendra, “Power-efficient gathering in sensor information systems,”.IEEE Aerospace Conference, Montana, 2002. [4] F. Tang, H. You, and S. Guo “A chain-cluster based routing algorithm for wireless sensor networks", Springer Science, May 2010. [5] A. Samia and K. Shreen, “Chain-Chain Based Routing Protocol,” IJCSI International Journal of Computer Science, Vol. 8, Issue 3, 2011. [6] X. Bian, X. Liu, and H. Cho, "Study on a Cluster-Chain Routing Protocol in Wireless Sensor Networks," In the 3rd international conference on communications and networking, China, 2008. [7] F. Xiangning and S. Yulin, “Improvement on LEACH Protocol of Wireless Sensor Network,” In Proceedings of the International Conference on Sensor Technologies and Applications, USA, 2007. [8]. A.A. Abbasi and M. Younis, A survey on clustering algorithms for wireless sensor networks, Computer Communications, 30, 2826–2841, 2007. [9]. Heinzelman W. B., Chandrakasan A. P., Balakrishnan H., “An application-specific protocol architecture for wireless microsensor networks,” IEEE Trans on Wireless Communications, Vol. 1, No. 4, 2002, pp. 660-670, doi:10.1109/TWC.2002.804190.

Chetan S Potdukhe, IJRIT-348

Review on Different Cluster Head Formation Algorithm of ... - IJRIT

IJRIT International Journal of Research in Information Technology, Volume 3, .... On the other hand, intra cluster communication cost reflects the node degree or ...

196KB Sizes 2 Downloads 237 Views

Recommend Documents

Review on Different Cluster Head Formation Algorithm of ... - IJRIT
as locations under heavy traffic load [1]. Nodes in such areas quickly exhaust energy resources, leading to disconnection in network services. Cluster based ...

Effect of Different Body Postures on Sound Wave Propagation ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3, .... For the investigation, the recording was carried out with eight subjects, four ...

Effect of Different Body Postures on Sound Wave Propagation ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3, Issue 6, June 2015, Pg.1-7. Shumila Yaqoob, IJRIT-1. International Journal of ...

Paper on Efficient Cluster Head Selection Scheme for ...
In recent years WSNs gained attention in monitoring applications due to their ability to ..... Kilaso, “A Wireless Sensor Network for Weather and Disaster Alarm.

A survey on Web Service Composition Algorithm - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 5, May ... Service Oriented Computing (SOC) is an emerging cross-disciplinary .... Here authors have proposed a cloud web service ... ICIW '08: Proceedings of the 2008

A survey on Web Service Composition Algorithm - IJRIT
The necessity for fast service composition systems is directly connected with the emergence ... require frequent changes in their business strategy. A SOA is an ...

Review on Various Application of Cloud computing in ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, ... Keywords: Cloud Computing, ICT, Wireless Sensor Actor Network, Agri – Cloud, Mobile Cloud. .... supports the 2.5G, 3G or 4 G technologies, distributed all over.

Review on Various Application of Cloud computing in ... - IJRIT
phones, laptops, software, scientific instruments. Mobile ... components used in availing ICT services, such as virtual computers, traffic monitoring and redirecting, .... [10] Cloud computing and emerging IT platforms: Vision, hype, and reality for 

Study of Data Warehouse Modeling and its different design ... - IJRIT
Requirement gathering can happen as Joint Application Development (JAD) ... the users with applications and data access tools that are appropriate for their ...

A Review on Wireless Inductive Power for A Review on ... - IJRIT
Wireless power provides convenience of charging mobile phones and devices. ... Since data communication has become wireless, users expect similar use ...

A Review on Digital Multiband Orthogonal Digital Multiband ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, ... In Wireless communication systems, the high data transmission rate is ...

Review on Data Warehouse, Data Mining and OLAP Technology - IJRIT
An OLAP is market-oriented which is used for data analysis by knowledge ..... The data warehouse environment supports the entire decision. Database. Source.

Review on Data Warehouse, Data Mining and OLAP Technology - IJRIT
used for transactions and query processing by clerks, clients. An OLAP is market-oriented which is used for data analysis by knowledge employees, including ...

A Review on Neural Network for Offline Signature Recognition ... - IJRIT
Based on Fusion of Grid and Global Features Using Neural Networks. ... original signatures using the identity and four Gabor transforms, the second step is to ...

A Review on Wireless Inductive Power for A Review on ... - IJRIT
To discuss the wireless inductive power system, a closer look at the system is .... winding width w the inductance for a ring coil inductor may vary slightly.

A Review on Search Based Software Engineering - IJRIT
Search-based Software Engineering (SBSE) has emerged as a promising research field. This recent discipline involves the modeling and resolution of complex software engineering problems as optimization problems, especially with the use of. Metaheurist

Formation of contacts on semiconductor substrates
Dec 23, 2010 - The surface resistivity of cadmium-based substrates in par ticular, for example a CdZnTe semiconductor substrate, is degraded when the ...

A Review on Digital Multiband Orthogonal Digital Multiband ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue .... the applications like pipelined ofdm, pulsed ofdm, wired or wireless use of ...

Review on Fingerprint Recognition System Using Minutiae ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, ... it a personal identification and ,thus have a number of disadvantages like tokens.

Cluster Residential Subdivision - Review Process.pdf
File Construction Plans[2] for Planning Commission Engineer review. 11. Final review and approval by Health Board. 12. Installation of erosion control measures.

Survey on Data Clustering - IJRIT
common technique for statistical data analysis used in many fields, including machine ... The clustering process may result in different partitioning of a data set, ...

Identification of Enablers of Poka-Yoke: A Review - IJRIT
Keywords: Indian Manufacturing Industries, Poka-Yoke, Quality, ... method is to eliminate human errors in manufacturing process and management as a result of ...

Identification of Enablers of Poka-Yoke: A Review - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 8, ... application of this tool, errors are removed in production system before they produce ... Chase and Stewart state that Poka-Yoke involves a three steps process