Documente Academic
Documente Profesional
Documente Cultură
Abstract: A wireless sensor networks (WSN) is made up of microscopic sensor nodes to handle physical or
environmental conditions like temperature, pressure, sound, and humidity. WSN acquires self configuration
strengths as the positions of the individual sensor nodes are not calculated in advance. Routing techniques and
security issues are a great research challenge now days in WSN (Nayak, et al., 2015). Hence, this paper will
accentuate on the WSN’s routing protocol mainly LEACH. Numerous of routing protocols have been suggested
for WSN but hierarchical protocols are the most famous ones. Therefore, in this paper we propose energy based
optimization and gives clustered based architecture. The results of the proposed LEACH protocols provide
optimal results for WSN.
Keywords: Wireless Sensor Networks, Routing, Leach, Cluster, Energy Efficient
1. Introduction
Wireless device networks were first used for military applications in the tertiary of honor inspection but now a
day these networks are employed in certain industrial and shopper operations such as process observation and
management, machine health observation etc. In computer science and telecommunications, wireless device
networks such as IPSN, SenSys, and EWSN are a dynamic inventory area for many diverse workshops and
conferences organized every year. In this paper we will analyze all the features about LEACH protocol such as
various phases of LEACH, various attacks on LEACH protocol, pros and cons of LEACH and moreover this
paper will also give an overview for other existing routing protocols like AODV, DSDV, DSR etc. In the figure
0 we can see how WSN connects to the user. (Nayak, et al., 2015)
A number of security issues are there in WSN which need to be analyzed very carefully thus we need to make
an acceptable security mechanisms and overcome security issues that arise within the device atmosphere.
However, coming up with new security protocols and mechanisms is strained by the capabilities of the device
nodes. This section discusses the constraints that complicate the safety style and readying in device networks.
It’s vital to know the strained capabilities of device nodes if you want to develop correct security that balances
exacting security performance against device nodes' limitations (Sangulagi, et al., 2011). Sensor networks may
be deployed in remote or hostile environments like battlefields. In these cases, the nodes cannot be shielded
from physical attacks, since anyone may have access to the placement wherever they're deployed. A human may
capture a device node or perhaps introduce his own malicious nodes within the network. If the latter is that the
case, the advisors aim is to trick the network into exceptive his nodes as legitimates.
Most of the time, deploying a device network during a hostile environment is done by random distribution, i.e.
from an airplane. Therefore, it's tough to understand the topology of device networks a priori. In these things,
it's arduous to store varied secret writing keys on nodes so as to ascertain secret writing among a bunch of
neighbors, since the neighborhood cannot be identified a priori.
The power restrictions of device nodes area unit raised attributable to their tiny physical size and lack of wires.
Since the absence of wires ends up in lack of a relentless power provide, not several power choices exist. .
However, as a result of a device network contains tons of to thousands of nodes, and because typically WSN
area unit deployed in remote or hostile environments, it is difficult to exchange or recharge batteries (Bechkit et
al., 2012). In the case of process power, computations area unit coupled with the offered quantity of power. As
we will perceive, since there's a restricted quantity of power, computations area unit strained additionally. The
restricted capability for storage affects the storage of crypto logical keys moreover per the secret writing theme
used, every device node may have to understand variety of keys for every alternative node within the network to
secure communication, and so store the keys within the nodes’ space for storing.
The node becomes cluster head for the current round if the number is less than threshold T(n). Once the node is
elected as a cluster head it cannot become cluster head again until all the nodes of the cluster have become
cluster head once. This helps in balancing the energy consumption. In the second step, the non cluster head
nodes receive the cluster head advertisement and then send join request to the cluster head informing that they
are the members of the cluster under that cluster head as shown in Figure 3. These non cluster head nodes saves
a lot of energy by turning off their transmitter all the time and turn it ON only when they have something to
transmit to the cluster head. In the third step, each of the selected cluster head generates a transmission schedule
for the member nodes of their cluster. TDMA schedule is created according to the number of nodes in the
cluster. Each node then transmits its data in the allocated time schedule. (Niu, et al., 2016, pp. 1985-1990)
The second phase of LEACH is the Steady phase during which the cluster nodes send their data to the cluster
head. The member sensors in each cluster communicate only with the cluster head via a single hop
transmission. The cluster head then aggregates all the acquired data and forwards this data to the base station
either directly or via another cluster head along with the static route defined in the source code as shown below
in Figure 4. After the certain predefined time, which is decided beforehand, the network again goes back to the
Set-up Phase. (Niu, et al., 2016, pp. 1985-1990)
The proposed LEACH protocol has many advantages such as the Cluster Heads aggregates the whole data
which results in reduced traffic in the entire network, As there is a single hop routing from nodes to cluster head
it results in saving energy, It increases the lifetime of the sensor network, In this, location information of the
nodes to make the cluster is not needed, LEACH is completely distributed as it does not require any control
information from the base station as well as no global knowledge of the network is needed. (Nayak, et al., 2015)
6. References
1. Nayak, S.P., Rai, S.C., Pradhan, S.K.,“MERA: A Multi-clustered Energy Efficient Routing Algorithm in
WSN”, 14th International Conference on Information Technology, ICIT 2015, pp. 37-42.
2. Sangulagi, P., Sutagundar, A.V., Manvi, S.S.,“Agent based information aggregation and routing in WSN”,
2011 Communications in Computer and Information Science,Vol.142, pp. 449-451.
3. He, J., Zhou, B., Liu, R ,“Analysis of typical secure routing protocols in WSN”, 2014 International Journal
of Security and its Applications , pp. 51-60.
4. Li, H., Wang, Y, “An Unequal clustering routing algorithm in WSN based on node location and residual
energy”, Advances in Information Sciences and Service Sciences 2012, pp. 37-43.
5. Bechkit, W., Koudil, M., Challal, Y., Souici, B., Benatchba, K, “A new weighted shortest path tree for
convergecast traffic routing in WSN”, Proceedings - IEEE Symposium on Computers and Communications
2012 , pp. 187-192.
6. Ahmed, R.Z., Biradar, R.C., “Energy aware routing in WSN for pest detection in coffee plantation”
International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016, pp.
398-403.
7. Liu, C., Fang, D., Chen, X., (...), Xu, G., Chen, H., “LSVS: Bringing Layer Slicing and Virtual Sinks to
Geographic Opportunistic Routing in Strip WSNs”,IEEE 5th International Conference on Big Data and Cloud
Computing, BDCloud 2015, pp. 281-286.
8. Li, Y., Zhu, M., Qu, H., Wang, N., Song, Y., “Improved minimum hop routing protocol in WSN”, 13th ACIS
International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed
Computing, SNPD 2012, pp. 609-614.
9. El Ghazi, A., Ahiod, B., “Random waypoint impact on bio-inspired routing protocols in WSN”, 7th
International Conference on Sciences of Electronics, Technologies of Information and Telecommunications,
SETIT 2016 , pp. 326-331.
10. X.-M., Mao, K.-J., Wang, Z.-L., Chen, Q.-Z., “Design of energy-distance based cluster routing protocol in
WSN”, JiefangjunLigongDaxueXuebao/Journal of PLA University of Science and Technology (Natural Science
Edition) 2012, pp. 393-397.
11. Liu, X.-C., Yuan, D.-S., Liang, P.-Y., Zhang, X.-Y., “Performance analysis of cost function based energy-
efficient routing protocol in WSN” , TongxinXuebao/Journal on Communications 2011, pp. 132-140.
12. Niu, Y.-G., Chen, W.-G., “A grid-based energy-aware and congestion-aware routing algorithm in WSN”,
KongzhiyuJuece/Control and Decision 2016, pp. 1985-1990.