Vous êtes sur la page 1sur 5

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal | www.ijtsrd.com

ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep – Oct 2018

A Survey on Clustered and Energy Efficient Routing Protocols for


Wireless Sensor Networks
Diksha Pandita1, Ravi Kumar Malik2
1
Scholar, 2Assistant Professor
Research Scholar
Department of ECE, Geeta Engineering College,
Panipat Kurukshetra University
University, Kurukshetra, Haryana, India

ABSTRACT
The main issue in WSN is energy limited network lifetime. These requirements should be met
characteristic of the sensor node. So the problem is to in
n routing protocols of wireless sensor network.
have the routing protocol in such the manner that it Wireless sensor network consist of tiny nodes called
should be energy efficient in order to increase the life sensor nodes. These nodes are battery powered and
time of the whole WSN. Hierarchical routing have limited energy for use. Also these nodes are
architecture divides the whole network in to a group randomly deployed over an area to monitor the
of cluster and only cluster head is responsible to happeningss in the environment such as humidity,
forwarding the data to base station directly or via seismic events, temperature, pollution, fire detection
other cluster heads. In location based architecture of etc [1]. These nodes are mobile or static depending
routing, localization of the sensor node is to be used on the physical phenomenon monitored. There are
to compute the path to the sensed data. During the two types of WSN- unstructured and structured WSN
creation of network topology, the process of setting [2]. Unstructured WSN – it is the one containing a
up routes in WSNs is usually influenced by energy large collection of tiny sensor nodes. The sensor
considerations, because the power consumption of a nodes are deployed randomly in the area. The network
wireless link is proportional to square or even higher is left unattended to perform monitoring and reporting
order of the distance between the sender and the functions. Whereas in structured WSN, all the nodes
receiver. Hierarchical routing can be centralized or are deployed in a pre-planned
planned manner. Network
non- centralized. In non-centralized
centralized hierarchical maintenance (managing connectivity and detecting
routing, the sensor nodes self-configures
configures for the failures) is quite difficult in unstructured WSN than
cluster head on the basis of selecting a random structured WSN. Also, in structured WSN, the sensor
number. They don’t consider the case of residual nodes are placed at specific positions which help in
energy. But in centralized routing the base station is providing g full coverage, whereas there are uncovered
responsible to create cluster. In hierarchical routing areas in unstructured WSN.
architecture, sensor nodes self-configure
configure themselves
for the formation of cluster heads. In this paper, we The primary function of a sensor node is to collects
have studied different types of hierarchical routing data and sent it to the base station. A sensor node
protocols for wireless sensor networks. contains three basic components [3]:

Keywords: WSN, hierarchical routing, SEP, TEEN, A. Sensing Subsystem: - It is used for acquisition
acqui of
Issues in WSN, Applications of WSN data from the physical environment where nodes
are deployed.
1. INTRODUCTION B. Processing Subsystem: - It is used for storing the
The scattered nature and active topology of wireless data and local data processing is carried out.
sensor network (WSN) have some particular C. Wireless Communication Subsystem: - It is used
requirements that are as follows – the reduced energy for data transmission.
consumption of the network, and maximizing the

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct


Oct 2018 Page: 1026
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
2456
Also a power source ce consisting of non rechargeable communication. Once the nodes are organized
batteries supplies the energy needed to perform the into clusters each cluster head creates a schedule
programmed task. As it is inconvenient to recharge for all the nodes belonging to its cluster.
the batteries because nodes when once deployed are B. Low Energy Adaptive ClusteringCluster Hierarchy
unreachable to users. In some cases it is possible to Centralized (Leach-C): -Since LEACH has a
scavenge the energy
nergy from the external environment, problem of determining the number of cluster
energy buffers are sometimes needed as well. But in heads in every round. For the formation of
any case, energy resource is very vital resource and clusters, LEACH-C C utilizes the base-station
base [6]. In
must be used carefully. Therefore, energy LEACH the nodes configure themselves to form
conservation is the key issue in the design of systems clusters, but in LEACH--C at each iteration or
based on wireless sensor network. To prolong the round the base-stationstation first receives the
lifetime of network different techniques are applied. information about location, state and the energy
For example, energy efficient protocols are aimed for level of the nodes. This information is used then to
minimizing the energy consumption during network calculate the mean value of network node energy;
activities. and base-station
station finds predetermined
predeterm number of
cluster heads and hence configures the network
2. HIERARCHICAL PROTOCOLS into clusters [6]. The nodes that are selected as
It is also known as Cluster Based Routing. The cluster head have higher energy level that the
routing protocols in this category force a structure on mean energy value. LEACH-C
LEACH is an improvement
the wireless sensor networks to provide energy over LEACH by the following points: First, to
efficient communication and scalability to the producee clusters that require less energy for
network. The network nodes are organized into transmission Base-Station
Station utilizes it global
clusters and based on some criteriaria a cluster head for knowledge of the network, Second, unlike
each cluster is selected [5]] i.e. higher energy nodes LEACH where the number of cluster head varies
are used to route the data, and lower energy nodes are from round to round due to lack of global
used to sense the area. Figure 1 illustrates the coordination amongst nodes, in LEACH-CLEACH the
clustering based scheme of the wireless sensor number of cluster heads in each round equals a
network. The cluster heads are re then responsible for predetermined optimal value [7].[7
organizing the activities within the cluster. Here, in
hierarchical routing the number of messages that are
transferred to the base-station
station are decreased due to
fusion and data aggregation thus it lowers the energy
consumption and hence
ence helps to improve the lifetime
of the network [5]. In such protocols the nodes around
the base station and cluster head will exhaust their
energy faster than all the other nodes.

Some of the well known protocols under this section


are: -
A. Low Energyy Adaptive Clustering Hierarchy
(LEACH): - LEACH is a clustering based
algorithm. Key features of LEACH are [7]: - First,
to reduce the global communication it uses local
compression. Second, it uses randomized rotation Figure 1: Clustering Schema for Wireless Sensor
for making clusters. Third, for clus
cluster setup and Network (redrawn from [6]).
other operations localized coordination and
control is required. Unlike, the conventional Stable Election Protocol (SEP):
clustering algorithm, LEACH is selfself-organizing, A percentage of the population of sensor nodes is
adaptive clustering algorithm [8]. of the network. equipped with more energy resources than the t rest of
The non cluster head nodes have to decide to the nodes. Let m be the fraction of the total number of
which cluster
uster it wants to belongs by choosing the nodes n, which are equipped with α times more
cluster heads which require less energy for energy than the others. We refer to these powerful

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct


Oct 2018 Page: 1027
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
2456
nodes as advanced nodes, and the rest (1 (1−m)×n as the first protocol developed for reactive networks. In
normal nodes. We assume that all nodes are thiss scheme, at every cluster change time, in addition
distributed randomly over the sensor field [7]. to the attributes, the cluster-head
cluster broadcasts to its
members, Hard Threshold (HT): This is a threshold
Suppose that Eo is the initial energy of each normal value for the sensed attribute. It is the absolute value
sensor. The energy of each advanced node is then Eo* of the attribute beyond which, the node sensing
sen this
(1+α).
). The total (initial) energy of the new value must switch on its transmitter and report to its
heterogeneous setting is equal to: cluster head. Soft Threshold (ST): This is a small
n * Eo * (1 + α * m) (1) change in the value of the sensed attribute which
So, the total energy of the system is increased by a triggers the node to switch on its transmitter and
factor of 1+α * m. transmit.
A. each normal node becomes a cluster head once
every 1 popt · (1+α ·m) rounds per epoch; The nodes sense their environment
environ continuously. The
B. each advanced node becomes a cluster head first time a parameter from the attribute set reaches its
exactly 1 + α times every 1 popt· (1+
(1+α·m) rounds hard threshold value, the node switches on its
per epoch; transmitter and sends the sensed data. The sensed
C. the average number of cluster heads per round per value is stored in an internal variable in the node,
epoch is equal to n × popt called the sensed value (SV).
SV). The nodes will next
transmit data in the current cluster period, only when
luster Head Election for normal nodes is based on
Cluster both the following conditions are true:
following equation: 1. The current value of the sensed attribute is greater
than the hard threshold.
2. The current value of the sensed attribute differs
(2) from SV by an amount equal to or greater than the
soft threshold. Whenever a node transmits data;
where r is the current round, G' is the set of normal SV is set equal to the current value of the sensed
nodes that have not become cluster heads within the attribute.
last 1/pnrm rounds of the epoch, and T(snrm) is the
threshold applied to a population of n · (1 − m) Thus, the hard threshold tries to reduce the number of
(normal) nodes. This guarantees that each normal transmissions by allowing the nodes to transmit only
o
node will become a cluster head exactly once every when the sensed attribute is in the range of interest.
1/popt· (1+α·m)
·m) rounds per epoch, and that the The soft threshold further reduces the number of
average number of cluster heads that are normal nodes transmissions by eliminating all the transmissions
per round per epoch is equal to n · (1 − m) × pnrm. which might have otherwise occurred when there is
little or no change in the sensed attribute once
onc the
ster Head Election for advanced nodes is based on
Cluster hard threshold.
following equation:
The main features of this scheme are as follows:
1. Time critical data reaches the user almost
(3) instantaneously.
where G'' is the set of advanced nodes tha
that have not 2. So, this scheme is eminently suited for time
become cluster heads within the last 1 padv rounds of critical sensing applications.
the epoch, and T(sadv) is the threshold applied to a 3. Message transmission consumes much more
population of n x m (advanced) nodes. This energy than data sensing. So, even though the
guarantees that each advanced node will become a nodes sense continuously, the energy consumption
cluster head exactly once every in this scheme can potentially be much less than in
(1/popt)x((1+α·m)/(1+α)) rounds. the proactive network, because data transmission
is done less frequently.
Threshold sensitive Energy Efficient sensor 4. The soft threshold can be varied, depending
dependin on the
Network protocol (TEEN): criticality of the sensed attribute and the target
In this section, we present a new network protocol application.
called TEEN. It is targeted at reactive networks and is

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct


Oct 2018 Page: 1028
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
2456
5. A smaller value of the soft threshold gives a more monitoring, tracking and monitoring doctors and
accurate picture of the network, at the expense of patients inside the hospital, it also offer significant
increased energy consumption. Thus user can cost saving and enable new functionalities that
control the trade-off
off between energy efficiency will assist people with chronic disease
dis on daily
and accuracy. activities etc [5].
6. At every cluster change time, the attributes are D. Home Applications: -Home Home applications include
broadcast a fresh and so, the user can change them automation and smart environment. In home
as required. automation the sensors are buried in the domestic
devices thatt will help them to interact with each
The main drawback of this scheme is that, if the other and with the external environment via
thresholds are not reached, the nodes will never internet. And, it will allow user to coordinate these
communicate; the userr will not get any data from the devices locally and remotely [3].
network at all and will not come to know even if all
the nodes die. Thus, this scheme is not well suited for 4. CRITICAL ISSUES OF WIRELESS SENSOR
applications where the user needs to get data on a NETWORKS
regular basis. Another possible problem with this The main design goal of WSN is to not no only transmit
scheme is thatt a practical implementation would have the data between source and destination but is also to
to ensure that there are no collisions in the cluster. increase the network lifetime; which can achieved by
applying energy efficient protocols. The task of the
TDMA scheduling of the nodes can be used to avoid protocol is not only to choose a path having lower
this problem. This will however introduce a delay in energy consumption between sources
s to destination
the reporting of the time-critical
critical data. CDMA is (BS), but also to find an efficient approach to prolong
another possible
ossible solution to this problem. the network lifetime. But sometimes continuous use
of low energy path may lead to energy depletion of
3. APPLICATIONS OF WSN sensor nodes in that path leading to network partition.
Wireless sensor networks are used in variety of Performance of thee routing protocol is calculated
everyday life activities or services. The most common based on some terms which includes [1]:-[1]:
application of WSN is for monitoring where we A. Energy per Packet: - the amount of energy
randomly deploy some nodes to monitor some required sending a packet from source to
phenomenon. We categorize the applications of WSN destination safely.
in military, environment, health home and other B. Low Energy Consumption: - it includes such
commercial areas. protocols that considers the remaining energy
A. Military Applications: - Wireless sensor networks level of nodes and selects route accordingly for
can be an integral part of military Command, longevity of the network.
Control, Communication, Computing, C. Total Number of Nodes Alive: - It gives an idea of
Intelligence,
nce, Surveillance, Reconnaissance and the area coverage of the network over time. This
Targeting [6]. ]. The rapid deployment, self self- metrics is related to network lifetime.
organization and fault tolerance characteristics of D. Average Packet Delay: - This metrics measure the
sensor networks make them a very promising accuracy of packet. This metrics is calculated as
sensing technique for military. The military one way latency which is observed between
applications of sensor networks are monitoring transmission and reception of data packet at the
friendly forces, biological and chemical attack sink.
detection, targeting, battle damage assessment etc. E. Time until the First Node Dies: - This metric
B. Environmental Applications: - The environmental indicates the duration forfo which all the sensor
applications of WSN are tracking the movement nodes on the network are alive. There are
of birds, monitoring the environmental conditions protocols in which the first node on the network
that effect crops and livestock’s, precision runs out of energy earlier than in other protocols,
agriculture, pollution study, forest fire detection, but manages to keep the network operational
meteorological or geophysical research, bio bio- much longer.
complexity mapping of the environment [3]. F. Energy Spent Per Round: - This metric is related
C. Health Applications: - This area of WSN provide to the total amount of energy spent in routing
interfaces for the disabled, integrated patient messages in a round. It is a short-term
short measure

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct


Oct 2018 Page: 1029
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
2456
designed to provide an idea of the energy traditional networks they focus primarily on the
efficiency of any proposed method in a particular Quality of Service (QoS). In this paper, we have
round. surveyed hierarchical routing protocols in wireless
G. Packet Size: - the lifetime of the ne network also sensor network. From the above study we can
depends on the packet size; it determines the time conclude that there are many routing protocols and
that a transmission will last. As it is effective in you can use any one of them for your network based
energy consumption so packet size should be on the application. All these protocols use static sink
reduced by combining large number of packets. orr BS for data transmission which leads to energy
H. Distance: - The distance between the transmi
transmitter hole problem. In future, we will propose mobile-sink
and receiver can affect the power that is required and multi-sink
sink strategies to remove energy hole
to send and receive packets. The routing protocols problem. And, it may enhance packet delivery and
can select the shortest paths between nodes and network lifetime.
reduce energy consumption.
REFERENCES
5. CONCLUSION 1. Nikolaos A. Pantazis, Stefanos A. Nikolidakis,
WSNs differ from traditional wireless communication Dimitrios D. Vergados, “Energy-Efficient
“Energy Routing
networks in several of their characteristics. One of Protocols in Wireless Sensor Networks: A
them is power awareness, due to the fact that the Survey,” IEEE Communications Surveys &
batteries of sensor nodes have a restricted lifetime and Tutorials,, 2013, Vol. 15, Issue. 2, pp. 551-590.
551
are difficult to be replaced. Therefore, all protocols
2. Yick J., Mukherjee B., Ghosal D., “Wireless
“Wire
must be designed in such a way as to mini
minimize energy
Sensor Network Survey,” Computer networks,
consumption and preserve the longevity of the
2008, Vol. 52, Issue. 12, pp. 2292 – 2330.
network. That is why, routing protocols in WSNs aim
mainly to accomplish power conservation while in

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct


Oct 2018 Page: 1030

Vous aimerez peut-être aussi