Selection of Efficiently Adaptable Clustering Algorithm upon Base Station Failure in Wireless Sensor Network
|
|
|
- Jeffrey Randolf Tyler
- 10 years ago
- Views:
Transcription
1 Selection of Efficiently Adaptable Clustering Algorithm upon Base Station Failure in Wireless Sensor Network Dissertation submitted in partial fulfillment of the requirements for the degree of Master of Technology by Tushar D. Maheshwari Roll No: under the guidance of Dr. Jibi Abraham Department of Computer Engineering and Information Technology College of Engineering, Pune Pune June 2012
2 Dedicated to my mother Smt. Sunita D. Maheshwari and my father Shri. Dinesh K. Maheshwari
3 DEPARTMENT OF COMPUTER ENGINEERING AND INFORMATION TECHNOLOGY, COLLEGE OF ENGINEERING, PUNE CERTIFICATE This is to certify that the dissertation titled Selection of Efficiently Adaptable Clustering Algorithm upon Base Station Failure in Wireless Sensor Network has been successfully completed By Tushar D. Maheshwari ( ) and is approved for the degree of Master of Technology. Dr. Jibi Abraham Guide and Head, Department of Computer Engineering and Information Technology College of Engineering, Pune, Shivaji Nagar, Pune Date :
4 Abstract Wireless Sensor Network (WSN) applications have increased in recent times in fields such as environmental sensing, area monitoring, air pollution monitoring, forest fires detection, machine health monitoring, and landslide detection. In such applications, there is a high need of secure communication among sensor nodes. There are different techniques to secure network data transmissions, but due to power constraints of WSN, group key based mechanism is the most preferred one. Hence, to implement scalable energy efficient secure group communication, the best approach would be hierarchical based like Clustering. In most of the WSN designs based on clustering, Base Station (BS) is the central point of contact to the outside world and in case of its failure; it may lead to total disconnection in the communication. Critical applications like these cannot afford to have BS failure as it is a gateway from sensor networks to the outside world. In order to provide better fault tolerant immediate action, a new BS at some other physical location will have to take the charge. This may lead to a total change in the hierarchical network topology, which in turn leads to re-clustering the entire network and in turn formation of new security keys. Therefore, there is a need to find a suitable algorithm which clusters sensor nodes in such a way that when a BS fails and a new BS takes the charge, new group key gets established with minimum computation and less energy consumption. A survey on various clustering algorithms like Energy-Efficient Multi-level Clustering Algorithm for Large-scale WSNs (EEMC), Low Energy Adaptive Clustering Hierarchy Protocol for WSNs (LEACH), Power Efficient and Adaptive Clustering Hierarchy Protocol for WSNs (PEACH), Hybrid, Energy-Efficient, Distributed Clustering Approach for WSNs (HEED) and Energy Efficient Clustering Algorithm for Maximizing Lifetime of WSNs (EECML) has been done to analyze their performance with respect to various parameters like power consumption of sensor nodes, cluster overlapping, cluster stability, fault tolerance and node-cluster information based on the literature survey and on the basis of these parameters we came to know that HEED and EECML are probably the most suitable algorithms to achieve our aim. So HEED and EECML are implemented on TinyOS, an open source platform for building WSN applications and their performance is evaluated for required parameters. From evaluation it is found that EECML could be the most suitable algorithm that makes a WSN adaptable upon failure of BS. iii
5 Acknowledgments I express my sincere gratitude to my guide Dr. Jibi Abraham for her constant help, encouragement and inspiration throughout the project work. Without her invaluable guidance, this work would never have been a successful one. I would also like to thank all the faculty members of the department for their valuable suggestions and helpful discussions. Last, but not the least, I would like to thank my dearest and closest friends and of course parents who have been the backbone, advisors and constant source of motivation throughout the work. Tushar D. Maheshwari College of Engineering, Pune June, 2012 iv
6 Contents Abstract Acknowledgments List of Figures List of Tables iii iv vii viii 1 Introduction Wireless Sensor Networks MICA Clustering Motivation Thesis Objective Thesis Outline Literature Survey Wireless Sensor Networks TinyOS-Platform for Practical Implementation Basic Structure of TinyOS Features of TinyOS File Types in TinyOS The nesc language TOSSIM-TinyOS Simulator Characteristics of TOSSIM Compiling and Running Simulation Clustering Algorithms Low Energy Adaptive Clustering Hierarchy Protocol for WSNs (LEACH)
7 2.3.2 An Energy-Efficient Multi-level Clustering Algorithm for Largescale WSNs (EEMC) Power Efficient and Adaptive Clustering Hierarchy Protocol for WSNs (PEACH) Hybrid, Energy-Efficient, Distributed Clustering Approach for WSNs (HEED) Energy Efficient Clustering Algorithm for Maximizing Lifetime of WSNs (EECML) Proposed Approach Evaluation Parameters Power Consumption of Sensor Nodes Cluster Stability Fault tolerance and Re-clustering Cluster Overlapping Scalability Node Cluster Information Further Approach Implementation and Results Implementation in TinyOS Challenges in Implemetation Estimation of Energy Dissipation Results Power Consumption of sensor nodes Cluster stability Scalability Fault Tolerance Cluster Overlapping Node Cluster Information Power Consumption of Cluster Head Conclusion and Future Work Conclusion Future Work Publications 45 Bibliography 46 vi
8 List of Figures 1.1 Sensor information forwarding without clustering and aggregation Sensor information forwarding with clustering and aggregation Clustering hierarchy before failure of Base Station New clustering hierarchy after failure of Base Station Clustering hierarchy before failure of Base Station Hierarchy of the various files in TinyOS Clustering hierarchy before failure of Base Station System design of HEED protocol Algorithm model of EECML Protocol operation of EECML Complete scenario of sensor network when clustered through EECML Flowchart of each Cluster Head gathering data from its member and the lower layer CH located in the same clustering angle Power Consumption of all sensor nodes in HEED and EECML after formation of clusters but before failure of Base Station Power Consumption of all sensor nodes in HEED and EECML after failure of Base Station (average of different positions of new BS) Stability of clusters in HEED and EECML Residual energy of Cluster Head(s) in a cluster(no. of nodes=25) Residual energy of Cluster Head(s) in a cluster(no. of nodes=50). 42
9 List of Tables 3.1 Comparative results of various clustering algorithm as per literature survey Results for total energy consumed by Sensor Nodes after formation of clusters but before failure of Base Station Results for total energy consumed by Sensor Nodes after failure of Base Station Results for Cluster Stability Results showing residual energy of Cluster Head(s) in a cluster Residual energy of Cluster Head(s) in a cluster viii
10 Chapter 1 Introduction 1.1 Wireless Sensor Networks Wireless sensor network consists of large number of small, low power, low cost sensor nodes with limited memory, computational, and communication resources and a Base Station. These nodes continuously monitor environmental conditions and collect detailed information about the physical environment in which they are installed, then transmits the collected data to the BS. BS is a gateway from sensor networks to the outside world. The BS has a very large storage and large data processing capabilities. It passes the data it receives from sensor nodes to the server from where end-user can access them. The sensors nodes are generally deployed around the area of the Base Station and form groups as per the need of the Base Station. WSN has an advantage of being operated unattended in the environment where continuous human monitoring is either risky, inefficient or infeasible. Sensor nodes run on batteries and once nodes are deployed their batteries cannot be recharged, so they have short lifespan. There are various applications of Wireless Sensor Network; they are mainly deployed in military and health applications. Also they are applied in robot control, automatic manufacturing, office or home automation. WSN is useful in detecting forest fires based on temperature information it receives from large number of distributed sensor nodes. 1
11 1.2 MICA2 1.2 MICA2 The MICA2 [31, 32] is a third generation mote module used for low power Wireless Sensor Networks. A large array of available sensor boards make this mote customizable for various applications. It works on AA batteries which has life of more than one year. Hardware Specifications Sensing: It is available through expansion boards not limiting to Temperature, Barometric Pressure, Acceleration/Seismic, Acoustic, Magnetic. Modulation type : Frequency Shift key Input/Output: MICA2 has 51 pin connector for connecting to the sensor board. It supports analog inputs, digital I/O. It also contains 3 LEDs for diagnostic purposes. Chip :Atmega 128L Microcontroller Flash memory : 128KB External Storage : 512KB Static RAM : 4KB EEPROM : 4KB Execution rate : 16 MIPS. Default Power : 2 AA batteries Typical capacity : 2850mAh Radio Frequency: 868/916Mhz, 433, or 315Mhz Applications: Wireless Sensor Network Security, Surveillance and Force Protection Environmental Monitoring Distributed computing platforms 2
12 1.3 Clustering 1.3 Clustering WSN [1, 2] consists of a large number of sensor nodes, moreover these sensor nodes run on non rechargeable batteries. So to serve the objective of fault-tolerance, load balancing and network connectivity, grouping of nodes is required. Clustering [3] is a process of dividing sensor nodes into groups on the basis of various parameters, and selecting a group leader from each group. The groups are called clusters and group leaders are called Cluster Heads(CHs) of the clusters. Parameters for forming the clusters include distance between cluster head and its member, intracluster communication cost, residual energy of sensor nodes, location of node with respect to BS etc. Figure 1.1: Sensor information forwarding without clustering and aggregation Figure 1.1 and Figure 1.2 gives a pictorial representation of different ways of data communication in Wireless Sensor Network. Figure 1.1 shows communication without clustering whereas figure 1.2 shows the network scenario when there is clustering in the network. Clustering divides the sensor nodes in the network into clusters and selects a Cluster Head (CH) for each cluster so that member from each cluster communicates through their CH in order to communicate to the BS. In this way clustering increases network lifetime as after clustering less number of nodes will access the channel for communication with the BS, all the informations and updates of whole cluster are collected together at CH and forwarded to the next CH in the hierarchy or the BS. CH can also look into other functions like data aggregation, group key management, distributed computation. Clustering 3
13 1.4 Motivation Figure 1.2: Sensor information forwarding with clustering and aggregation also helps in optimal utilization of network resources, load balancing, node failure management, energy consumption and network lifetime management. 1.4 Motivation When Wireless Sensor Networks are deployed mainly for military and health applications, there is a high need of secure communication among sensor nodes. There are different techniques to secure network data transmissions, but due to power constraints of WSN, group key based mechanism [11] is the most preferred one. Hence to implement scalable energy efficient secure group communication, the best approach would be hierarchical based like Clustering [3]. In most of the WSN [1,2] designs based on clustering, Base Station is the central point of contact to the outside world and in case of its failure; it may lead to total disconnection in the communication. So in order to provide better fault tolerant immediate action, a new BS at some other physical location will have to take the charge. This may lead to a total change in the hierarchical network topology, which in turn leads to re-clustering the entire network and in turn formation of new security keys. Hence in such situations, we need a clustering algorithm which will perform the minimum re-clustering with minimum energy consumption and minimum execution time. 4
14 1.5 Thesis Objective 1.5 Thesis Objective Figure 1.3 and Figure 1.4 shows the clustering sensor network scenario before and after failure of BS respectively, it is clear that whenever there is a change in location of BS there will be some or more change in clusters and topology of the sensor network, this also results in more efforts in terms of energy consumption and time for establishment of new group key. Figure 1.3: Clustering hierarchy before failure of Base Station Figure 1.4: New clustering hierarchy after failure of Base Station We have to find a suitable algorithm which clusters sensor nodes in such a way that when a BS fails and a new BS takes the charge, new group key gets 5
15 1.6 Thesis Outline established with minimum computation and less energy consumption i.e. our objective is to come up with the most suitable clustering algorithm that requires minimum changes in clusters and topology in such situations and makes WSN efficiently adaptable. In order to accomplish our goal many clustering algorithms from the literature will be considered and their performance will be evaluated on various chosen parameters. The parameters will be chosen in such a way that in effect they will help us to find an efficiently adaptable clustering algorithm. 1.6 Thesis Outline The rest of the thesis is organized as follows: In Section 2 we give a brief description of the important papers that we have studied or utilized as a part of our literature survey. In Section 3, we introduce our proposed system model for mood recognition. Section 4 shows the experimental results achieved so far and finally in Section 5 we present the conclusion and future work. 6
16 Chapter 2 Literature Survey 2.1 Wireless Sensor Networks From the following properties obtained after literature survey of WSNs, it is clear that there are hundreds or thousands of deployed sensor nodes in the application field of WSN. The main features of WSN are:- All sensor nodes are battery operated which has very low power, and after deployment recharging those batteries is not possible. Links among the sensor nodes are symmetric, i.e., two nodes can communicate using the same transmission power. All the sensor nodes which are deployed have initially same amount of communication and battery power. There are various transmission power levels for all sensor nodes, and dynamically each node can change their power level. Mobility of sensor node varies from application to application, so in general they are quasi-stationary. Location of sensor nodes once deployed cannot be tracked down as they are not equipped with GPS antennae. 2.2 TinyOS-Platform for Practical Implementation TinyOS [29, 30] is a lightweight, event-driven, open source operating system developed specially for low-power nodes of sensor network. It operates on ultra-low 7
17 2.2 TinyOS-Platform for Practical Implementation power which is what makes it different from other operating systems. It has very advanced systems and techniques for saving power. TinyOS makes it very easy to build sensor network applications. It provides a set of important abstractions and services, such as storage, communication, timers, and sensing. It defines a concurrent execution model, so developers can build applications out of reusable components and services worrying about unforeseen interactions. TinyOS runs on many of the generic platforms, and most of them support easy addition of new nodes in the network. Furthermore, TinyOSs structure is designed in such a way that it is very easy to port it to new platforms Basic Structure of TinyOS TinyOS [29, 30] basically consists of commands, events and tasks. Commands are used to initiate a particular action in a program, events is a type of notification that notify that action has occurred. Events are generally generated by external interrupts and results are provided to the command which generated the previous command. Task is a program which runs in background doing all the computations for different modules. Figure 2.1 shows the flow of all these basic constructs i.e. application generates a command, some task is performed, then command is passed to component module which in turn generates another command for hardware interface from where event is generated and the results are provided to the application passing through the component module Features of TinyOS TinyOS provides mainly three things which make developing sensor network applications and systems easier: 1. Component Model: It defines how to write small piece of code and convert them into larger abstractions. It is grounded in nesc [29]. It allows us to write pieces of reusable code which explicitly declare their dependencies. 2. Concurrent Execution Model: It defines how components interleave their computations as well as how interrupt and non-interrupt code interact. It enables TinyOS to support many components needing to act at the same time while requiring little RAM. First, every I/O call in TinyOS is splitphase: rather than block until completion, a request returns immediately and the caller gets a callback when the I/O completes. TinyOS only needs only one stack, and does not have threads. 8
18 2.2 TinyOS-Platform for Practical Implementation Figure 2.1: Clustering hierarchy before failure of Base Station 3. Overall component structure with APIs, component libraries and services that simplifies the task of writing new applications and services. TinyOS has a set of APIs for common functionality, such as sending packets, reading sensors, and responding to events. It also provides a component structure and component libraries File Types in TinyOS There are three types of file in TinyOS namely- Interfaces : It specifies functionality to outside world, what type of commands can be called and what events need handling. Standard filename syntax is (xxx.nc). Module : This is a file in which real code is implemented, it contains the code for the interface functions defined in interface file. Its standard filename syntax is (xxxm.nc). Configuration : This is file which is used for wiring of components in an application 9
19 2.2 TinyOS-Platform for Practical Implementation Figure 2.2 shows an example where main.nc file contains abstract of an interface interfacem.nc, code2m.nc and code3m.nc are the files which contain their own defined definition of the interface interfacem.nc in interfacea and interfaceb respectively. This interface are wired through configuration file comp1c.nc and app.nc for comp3m.nc and comp2m.nc respectively. Figure 2.2: Hierarchy of the various files in TinyOS The nesc language TinyOS itself with its applications and systems are written in nesc [29, 30] which is a dialect of C language. nesc is compiler for applications that run on UCB motes built on top of avg-gcc. nesc file has extension.nc. It is a static language with no dynamic memory i.e. no malloc, no heap and no function pointers. It is influenced by Java and is designed to foster code reuse. It eliminates monolithic programs so that code can be used more easily and number of errors get decreased. It has features to reduce code and RAM size, also it supports significant optimizations and help in preventing low-level bugs like race conditions. Figure 2.3 shows execution of program in TinyOS. 10
20 2.2 TinyOS-Platform for Practical Implementation Figure 2.3: Clustering hierarchy before failure of Base Station TOSSIM-TinyOS Simulator TOSSIM [30]is a discrete event simulator provided by TinyOS for high fidelity simulation of all of its applications. User can compile TinyOS application on PC framework of TinyOS instead of compiling them on real mote. So user can test, analyze and debug developed algorithms in a controlled and repeatable environment. As it runs on PC, users can examine their code using debuggers and other development tools. TOSSIM primarily focuses on simulating TinyOS and its execution but not the real world. TOSSIM is not always a right simulation solution as it makes many assumptions focusing on making some behaviors accurate while simplifying others. There is always a question about TOSSIM that whether it can simulate Z or it has an accurate model for Z Characteristics of TOSSIM Various characteristics of TOSSIM as mentioned in [29, 30] are: Fidelity: TOSSIM simulates the network at the bit level, simulates every interrupt in the system and each individual ADC capture. By default, it captures TinyOS behavior at very low level. 11
21 2.2 TinyOS-Platform for Practical Implementation Time: While TOSSIM precisely times interrupts, it does not model execution time. A piece of code in TOSSIM will run instantaneously so the spin locks will never exit as the event that allow spin lock to stop will never occur unless code execution completes. Model: TOSSIM though provides abstractions of certain real-world phenomena like bit error but it does not model the real world. User can implement models whatever they want to by manipulating these abstractions. TOSSIM always tries to keep the simulation efficient and simple. Building: TOSSIM builds directly from TinyOS code. In-order to simulate a protocol or system, its TinyOS implementation has to be written. Though it is more difficult than an abstract simulation but once it is done it can be taken and run on real motes. Imperfections TOSSIM makes many simplifying assumptions though it captures TinyOS behavior at a very low level. So it may be possible that code which runs in a simulation might not run on real mote. As TOSSIM is discrete-event simulator, its interrupts are non-preemptive so in case of preemptive interrupt real mote may fail but simulation will run Compiling and Running Simulation TOSSIM is built automatically whenever TinyOS application is compiled. Compilation can be done by entering in the application directory and typing make or make pc. make pc will only compile a simulation of the application. The TOSSIM has executable by the name main.exe, and created in build/pc after compilation. It has the following usage: Usage:./build/pc/main.exe [options] numnodes [options] are: -h,- -help Display this message. -gui pauses simulation waiting for GUI to connect -a= model specifies ADC model (generic is default) options: generic random -b= sec motes boot over first sec seconds (default: 10) -ef= file use file for eeprom; otherwise anonymous file is used -l= scale run sim at scale times real time (fp constant) -a= model specifies a radio model (simple is default) options: simple static lossy 12
22 2.3 Clustering Algorithms -rf= file -s= num -t= sec numnodes specifies file input for lossy model (lossy.nss is default) only boot num of nodes run simulation for sec virtual seconds number of nodes to simulate 2.3 Clustering Algorithms From the various proposed clustering algorithms in the literature, five energy efficient algorithms are selected in order to achieve our goal and these algorithms are evaluated further to select the best algorithm which makes WSN better adaptable. Evaluation is done on basis of various parameters which will be studied in chapter 3. In this section we will study the selected algorithms in detail Low Energy Adaptive Clustering Hierarchy Protocol for WSNs (LEACH) LEACH [8] is a distributed hierarchical protocol which provides data aggregation for sensor networks by selecting random CHs in a distributed manner. It forms clusters based on the received signal strength and uses the CH nodes as routers to the Base Station. All data processing such as data fusion and aggregation are local to the cluster. Each node transmits to their CHs which in turn aggregate and compress the data and send to the Base Station. A stochastic algorithm is used (round by round) by each node to determine whether it can become CH in that round or not. All non CH nodes communicate to the CH in TDMA fashion as scheduled by CH. In LEACH, Cluster Head is selected dynamically and rotated periodically which counts for less power consumption of the network. But since it uses singlelevel clustering scheme, power consumption is comparatively more to those algorithms that use multi-level clustering. Nodes that have been CH cannot be CH for next i rounds. At the end of each round, node that is not a CH selects the closest CH and joins its cluster by informing the CH. This protocol creates non overlapping clusters. Although there is no energy-balancing problem in LEACH but it doesn t care about the energy consumption in intra-clusters communication. So clusters formation and its structure in LEACH may not be optimal. 13
23 2.3 Clustering Algorithms An Energy-Efficient Multi-level Clustering Algorithm for Large-scale WSNs (EEMC) EEMC [7] is a multi-level clustering protocol which organizes nodes into hierarchy of clusters and aims at minimizing the total power consumption of the network as they use multi-level clustering scheme. It is an extension of TLCS (Two Level Clustering Scheme) [7] where each cluster is divided into sub clusters (level-2) having their respective cluster heads. These CHs after gathering data packets transmit the aggregated data packet to the corresponding CH of level-1 and finally all CHs (level-1) send data to the BS. Operation of data collection is done in rounds and each round has two phases: 1. Cluster setup phase : This phase means that the nodes execute this algorithm to establish multi-level clustering topology on its own. This phase works in a top-down fashion [20], that is Cluster Heads at level-i will be elected before level-(i + 1). Initially all active nodes are set to non-ch nodes. Then each of these nodes send their location information and current residual energy to the BS to indicate that the algorithm will select a new set of CHs in level-1. When BS receives these values, it sends a message containing total remaining energy of the network and total reciprocal of the distance from all nodes to the BS. Once active nodes receive this command message, they set their probability of becoming level-1 CH on the basis of received values. Since along with node s residual energy, transmission distance of node is also considered as a factor in deciding CH, those nodes which are closer to the BS and/or have higher remaining energy have more chances to become level-1 CH. Transmission distance is considered as a factor because ultimately the CH has to transfer the final packet to BS, so if distance is large more energy will be consumed and vice-versa. Later the elected level-1 CHs will broadcasts an advertisement message in its radio range, whoever non-ch node receive this advertisement message, sends a message back to CH containing its residual energy and joins that cluster. In this way both CHs and cluster members have information of each other. Then CHs will send a command message to their members containing number of nodes in the cluster, total remaining energy of cluster members and total reciprocal distance from normal nodes to the cluster head. In this way level-2 CHs will be selected and so on for further levels. 14
24 2.3 Clustering Algorithms 2. Data transmission phase : This phase signifies transmission of sensed data packets from nodes to BS under such kind of topology. Once n-level clustering topology is established, the non CH nodes start transmitting the sensed data to the lowest CH. Then CHs at level-n will aggregate the data they receive from ordinary nodes and transmits the collected data to the n-1 level CHs ad so on. At last each of the level-1 CHs transmits the collected data(from level-2 cluster heads) to the BS. This phase runs periodically till the end. Energy spent by a regular node in sending a data packet to level-n CHs, then by level-n CHs to send the same to level-n-1 CHs and so on to level-1 CHs and finally the energy spent by level-1 CH to send packet to BS contributes the total cost of delivering the data from non head node to the BS. In order to minimize overhead, the data transmission phase is long as compared to cluster set-up phase in the algorithm. After clustering process, a node can either elect to become CH or join a cluster as per the message it receives from the different CHs within its cluster range then inform that CH about its membership. So it is scalable for large sensor networks. This protocol produces clusters which are relatively stable. Also, since all CH sends advertisement message in their radio range, it may be possible that a non-ch may fall into range of more than one CH. Therefore, this algorithm creates overlapping clusters Power Efficient and Adaptive Clustering Hierarchy Protocol for WSNs (PEACH) PEACH [6] also prolong network lifetime of WSNs. It operates on probabilistic energy-aware routing protocols [12, 13, 14, 15, 16] such as EAR [12], EAR- DPS [16], and GEAR [13]. Therefore, it has very low power consumption. It supports both routing protocols for WSN i.e. location aware and location unaware. Location aware protocols are those which provide location information of sensor nodes like PEGASIS [21] and location unaware are those who do not provide location information of sensor nodes like LEACH [8] and HEED [5]. Based on overheard information of each sensor node, this protocol forms adaptive clusters. In PEACH to achieve the goal of maximizing the lifetime of network with various energy constraints which have been discussed,following things are taken into account while designing the protocol: Cluster formation overhead: There are many protocols [5, 8, 22, 23] which suffer from overhead of cluster formation as these protocols consumes 15
25 2.3 Clustering Algorithms lots of energy of sensor nodes which are basically battery-limited. Also each non-head node has to transmit the data packet to its Cluster Head even if it is at more distance as compared to BS. This type of reverse forwarding of packet may increase energy consumption of intra-cluster communication. So, cluster formation overhead should be the most important parameter in development of a clustering protocol. Adaptive multi-level clustering: As per the condition of WSN the level of clustering hierarchy must be adaptive in nature. Most of the clustering protocols have fixed level of hierarchical clustering. Fixed level clustering [6] can be affected adversely by distribution of WSNs. So, the clustering protocols should have a more adaptive and dynamic hierarchical clustering level. Cluster formation on PEACH Based on the information overheard by each sensor node, this protocol forms adaptive clusters. When a node N i transmits a packet to node N j then this protocol defines two sets of nodes: NodeSet(N i,n j ): It is a set of all nodes which lies in a circle whose center is node N i and radius is the distance between nodes N i and N j. ClusterSet(N i,n j ):It is a set of all nodes which belongs to NodeSet(N i,n j ) but not in NodeSet(Base station,n j ) NodeSet(N i,n j ) consists of nodes which can overhear the transmission of packet from the node N i to node N j and ClusterSet(N i,n j ) includes CH of all those nodes which are overheard. Node N j becomes the CH of ClusterSet(N i,n j ) and it waits for T delay to collect multiple packets from other nodes in ClusterSet(N i,n j ). This set remains active for both before and after T delay, selected CH N j transmits the collected data to next hop in the hierarchy. In comparison to other protocols it has no overhead on CH selection and it forms an adaptive multi-level clustering. It improves the lifetime and power consumption of WSNs significantly. PEACH protocol supporting location-aware routing (which gives location information of sensor nodes) has lowest power consumption of all the other protocols. It produces clusters which are static and fixed and thus stable. Based on overheard information, it forms clusters without any additional packet transmission of advertisement, announcement, joining and scheduling messages. This protocol design supports its scalability nature. But this algorithm being dynamic produces overlapping clusters which is why we dont prefer this algorithm for our purpose. Node can move from one cluster to another cluster. 16
26 2.3 Clustering Algorithms Hybrid, Energy-Efficient, Distributed Clustering Approach for WSNs (HEED) HEED [5] is a distributed clustering algorithm used for Wireless Sensor Networks which is energy efficient. Every node has some limited energy associated with it. But when a node transmits/receives data and processes query requests, its energy reduces. Energy can also get wasted if there are packet collisions in the network or if a node has to do idle listening. As HEED applies clustering, for each cluster a CH is selected. But if the same CH remains for large amount of time performing send/receive operations then residual energy of the CH will become very low. Therefore, HEED chooses to rotate server role among all nodes of the cluster so that a balance will be achieved between residual energy of all nodes of the cluster. Hence, residual energy of any one node(ch) would not drop to minimum leading to less node failures due to energy depletion. For Server role rotation, clustering is triggered periodically at regular intervals in order to select CHs and at each node the process gets terminated in constant number of iterations. Clustering is basically a process which divides network into clusters such that each cluster consists of adjacent nodes and selects CHs from them. Since all the nodes of the network will be competing to become CHs, certain parameters are used for deciding CHs. The parameters are as follows: 1. Residual energy of each node: This is the primary clustering parameter in deciding initial set of CHs. Residual energy means energy remaining with the node. Energy of a fully charged node will be maximum whereas that of a node performing various send/receive operations will get depleted. If energy associated with a node is not greater than minimum energy required by the a node to become CH then such a candidate should be eliminated from probable set of CHs. 2. Intra-Cluster Communication cost: This is used as a secondary parameter to decide in which cluster a node falls. Sometimes it can happen that a node falls in the range of more than clusters. In such a case Intra-Cluster Communication Cost will break ties among the probable CHs.Intra-Cluster Communication cost is the cost required by a CH to communicate with every node of a cluster. The node which has minimum communication cost will become the CH. Cluster range can be defined as transmission power level used for communication inside a cluster. This is also called as Cluster Power Level. The Cluster Power Level is set to one of lower power levels of a node. 17
27 2.3 Clustering Algorithms This cluster range decides how many number of clusters will be formed in the WSN. Let MinPower i be the power required by a node N i to communicate with CH. Then Average Minimum Reachability Power(AMRP) of a node is defined as expected intra-cluster communication cost required if this node becomes CH. AMRP = MinP wri M (2.1) AMRP provides measures intra-cluster communication cost required for a node if it becomes CH. It indicates minimum power level required by all M nodes in the cluster. Clustering Protocol Operation for HEED is as follows: Process of re-clustering is periodically performed after a time interval of T CP + T NO seconds. Here, T CP denotes time required for the clustering protocol for completion of cluster formation and T NO denotes no operation which means this is the time during which formed clusters are stable and nodes in the network communicate with the help of these clusters and no clustering process is taking place. At each node, clustering process requires N iter iterations. Before clustering algorithm executes, initial percentage of CH among n nodes has to be decided (C prob ). For example, suppose we want 5 CHs in 100 sensor nodes then C prob =0.05. Every node in the WSN calculates its probability of becoming a CH as given below: CH prob = C prob E residual E max (2.2) where, E residual is current remaining energy of the node and E max is the maximum energy of a fully charged battery. CH prob is inversely proportional to E max which means as initial energy of a node increases its probability of becoming CH increases. There has to be a certain criterion on the values of CH prob as this is the primary selection parameter for this protocol. Therefore, a condition is set on CH prob such that CH prob > p min. Where p min is the minimum probability to become CH. If CH prob of a node falls below p min then this node will not be part of the set of probable CHs. HEED is an iterative clustering algorithm since CHs change after specific time internal. There are basically three stages in HEED protocol operation. Following stages are part of one iteration of HEED protocol: 1. Initialization: Initially, every sensor node present in the WSN calculates 18
28 2.3 Clustering Algorithms communication cost incurred to communicate with all its neighbors. Neighbors are identified by using concept of cluster range. Cluster range is calculated by the transmission power level used for communicating internally in the cluster. This level is also called as cluster power level. This is set to lower power levels of a node. This way, higher power levels can be kept reserved for inter-cluster communication. Neighbor of a node is a node present in cluster range of a node. After broadcasting cost to neighbors, every node calculates its CH prob using the formula defined in 2.2 and sets is final CH = FALSE which means final Cluster Head is not yet elected 2. Iterate through following steps until CH previous = 1: I. Initially tentative set of Cluster Heads S C H is empty. Hence, a node checks its own CH prob if CH prob = 1 then it elects itself as CH. CH prob > p min then it adds itself to a tentative set of CHs S CH In this way, primary parameter residual energy is used to find tentative set of CHs. II. If this is not initial iteration, then S CH may not be empty. if S CH! = empty then a tentative CH is selected from S CH which has minimum communication cost. If the tentative CH is the node itself and if its CH prob = 1 then it selects itself as final CH and sets is final CH = TRUE. In this way, secondary parameter, communication cost is used to find final set of CHs. III. Also,CH previous is set to CH prob and CH prob is doubled. 3. Finalization I. If a node has is final CH = TRUE, then it declares itself as CH and broadcasts this message to all its neighbors. II. But if is final CH = FALSE then whether S C H is empty or not a node having minimum communication cost is selected as final CH by considering itself uncovered. A node is defined as covered if it has heard either from tentative Cluster Head of final Cluster Head. HEED implements multi-hop router mechanism. shown in the figure 2.4. The main modules of multi-hop router are: 1. Routing Engine: This module mainly controls everything in HEED router. The design of which is as Its task is to decide whether a packet should be forwarded to parent of the tree or pushed 19
29 2.3 Clustering Algorithms Figure 2.4: System design of HEED protocol onto protocol stack. This module helps the process of data aggregation by intercepting incoming packets from nodes in the cluster and its descendants in the aggregation tree and pushes them onto stack. Routing mechanism does not have any effect on routing engine. It sends out packets which come from application layer. 2. Routing Logic: The network has to select a routing algorithm for forwarding packets. This unit selects the routing algorithm to be used. It structures the network into connected graph, maintains information of neighbor nodes and sends update messages fro tree construction. This consists of 2 main modules: i. Clustering Logic: This unit implements the selected clustering algorithm. After clustering process gets completed, Aggregation tree is formed in which only Cluster Heads are considered in infrastructure. ii. Parent Selection: This module estimates link cost for each neighbor based on quality of communications and its closeness to the Base Station. This way, CH 20
30 2.3 Clustering Algorithms helps in finding the best parent in the aggregation tree. Quality of communication is measured by symmetry of links and occurrences of data loss. The parameter data loss is very useful in finding quality of communication. This way HEED is energy efficient, distributed clustering algorithm which helps in increasing network lifetime and ensures it has no cluster overlapping. CHs in HEED are well distributed in the network, and also sensor nodes are stationary. So clusters formed are highly stable. Cost can be a function of neighbor proximity or cluster density. This protocol prolongs network lifetime and produces clusters which has several appealing properties. This protocol is scalable as it can cluster large number of sensor nodes. This protocol is applied on various sensor network protocols which require scalability, prolonged network lifetime, fault tolerance and load balancing. Currently this protocol is used to build only two level clustering hierarchies but it can be easily extended for multi-level clustering hierarchies. Once CHs are selected remaining nodes are clustered with them. So Cluster head and cluster members have information about each other Energy Efficient Clustering Algorithm for Maximizing Lifetime of WSNs (EECML) In most of the clustering algorithms including the ones discussed so far, in order to prolong the network lifetime of the cluster and the networks, there is dynamic or periodic selection of CH, which wastes much energy for broadcasting messages to general nodes or to other Cluster Heads i.e. there is additional energy consumption for the cluster head set-up and also for general nodes who spent their energy in receiving broad casted message from different new Cluster Heads frequently. So energy of general nodes cannot be used effectively. Furthermore, in actual application, WSN contains thousand number of nodes and they are deployed randomly in an area of density, so it gets difficult to balance energy balance for all the nodes. If each CH acts uninterrupted as the local control center and will not be replaced by other nodes located in the same cluster until its working times reach the threshold, then the frequency of updating CH and the energy consumption for broadcasting messages can be reduced effectively. Therefore, a new clustering algorithm EECML [6] is proposed by Xiang Min and his team which is designed to prolong network lifetime by reducing energy consumption for inter-cluster and intra-cluster communication. Nodes are divided into static clusters and the pro- 21
31 2.3 Clustering Algorithms tocol produces different size clusters i.e. clusters which are closer to the Base Station are smaller in size and those who are distant are larger in size. This is because CHs which are closer to Base Station could have enough energy to transmit the data which comes from other CHs away from the BS. So in this way energy consumption for inter-cluster communication is balanced. In intra-cluster, one cluster-head will continue to be the CH, so energy consumption for new CH set up and updating cluster is reduced. These clusters are referred as layers, clusters closest to Base Station belong to the top layer. So, entire network is divided into V-wedges of clustering angle θ and these wedges form cluster of varying size. The operation is broken into rounds where each CH receives data either from its members or from lower layer CH and send the aggregated data either to the base station or the upper layer cluster with TDMA mechanism. It has high scalability due to these layering mechanisms. This protocol creates non-overlapping cluster with high stability as there is no node mobility possible. Initially Base Station informs to all the nodes of top layer about their CH and informs CH about its members. Then for lower layer immediate upper layer CH plays the role of Base Station in giving node information. Energy Consumption Model Xiang Min and team in their algorithm [6] says that in WSN, energy consumption of sensor nodes is mainly due to three reasons: Message sending Message receiving Data processing Considering k is the length in bits of packets, d is the transmission distance in meters, the simplified energy consumption model for each part can be defined as: P T (k) = E elec k + Eamp d y k P R (k) = E elec k (2.3) P cpu (k) = E cpu k where, E elec : Dissipation energy (in nj/bit) of a radio to run its circuitry E amp : power (in nj/bit/m 2 ) above E elec needed by the transmitter for an 22
32 2.3 Clustering Algorithms acceptable E b /N 0 at the receivers demodulator. γ : Path loss exponent that is related to the transmission distance. E cpu : Dissipation of energy (in nj/bit) for processing a bit. On the basis of equations 2.3, the energy consumption for the Cluster Head receiving and transmitting k bits packets can be defined as: P = P T (k) + P cpu (k) + P R (k) = k(2e elec + E cpu + E amp d γ ) (2.4) The energy consumption is in direct proportion to the length of data packets or message packets. If the message packets can be reduced, the energy consumption can be reduced. When the transmission distance is less than a threshold, the energy consumption is in direct proportion to d 2. In other case, the energy consumption is in direct proportion to d 4. Thus, shortening the transmission distance can reduce the energy consumption. Protocol Model As discussed EECML [6] protocol by Xiang Min and team is designed in a manner that the CH acts as the local control center instead of frequently changing the cluster head in order to balance the load. CH is burdened with transmitting data from other CHs through multi-hop, thus the energy dissipation of the CH is much more than that of the general nodes [26, 27]. Obviously, to maintain the connectivity of the entire network, it is very important that the CHs closer to the Base station keep alive as long as possible for the intercluster communication. So the number of the nodes in the clusters closer to the BS ought to be smaller than those farther away from the BS [28]. Assuming n sensor nodes are deployed in a wedge V area with angle called the clustering angle, and the nodes are deployed with uniform density (nodes/m 2 ). V is partitioned into m rings V 1, V 2,..., V m. Each ring denotes a cluster, and the center distance between the two adjacent rings is d 1, d 2,..., d m, and d i (1<=i<=m) is a one-hop distance for inter-cluster communication, i.e. the cluster closer to the BS is called the upper layer cluster and other is called the lower layer cluster. The schematic diagram of the model is shown in figure 2.5. cluster C 1 is made of nodes located in ring V 1, and cluster C 2 is made of nodes located in ring V 2,and so forth. 23
33 2.3 Clustering Algorithms In each cluster, the CH receives data from its members and sends fused data to the upper layer cluster or to the BS at least once. If the number of the nodes in the cluster is very large, the CH may be out of work before finishing its first task. If the size of the cluster is very small, then the number of nodes of the cluster is very small. Thus, the energy supply of its nodes is mainly used to transmit data that come from the lower layer clusters, and its nodes may have much residual energy when the network is invalid, which cannot make the best of the energy supply of its nodes. So the optimum clustering angle must be selected to control the size of the cluster. As already said that in EECML each Cluster Head acts as local control center until its working times reach the threshold. In figure 2.5, the size of the cluster C m is the largest of all the clusters. Let f i, i = 1, 2, 3,..., m be the continuous working times of the CH that acts continuously as the local control center. If the continuous working times of each CH with the same clustering angle satisfy f 1 >= f 2 >=.... >= f m, then the connectivity of the cluster with the same clustering angle can be maintained effectively. Figure 2.5: Algorithm model of EECML So, for the energy consumption and the systems lifetime the main parameters of this algorithms are one-hop distance d 1hop, the clustering angle θ and the continuous working times f i. The optimal value of these parameters are calculated in [6] by the following equations: 24
34 2.3 Clustering Algorithms 2Eelec + E d opt = γ cpu (2.5) E amp (γ 1) θ opt = 8π3 (3E elec + E cpu (2.6) N(2E elec + E cpu where, d 1hop <= d opt Protocol Operation In [6], protocol assumes that the Base Station is located at (0,0) and operation of the clustering algorithm is broken up into rounds that consists of CHs receiving data packets from its members and sending the fused data to the Base station or the upper layer cluster with the TDMA mechanism. The optimum one-hop transmission distance and the optimum clustering angle can be obtained based on equations 2.5 and 2.6 During the cluster set-up phase, BS broadcasts an advertisement message that contains the one-hop distance d 1hop and its location to the closer nodes, and decides which node acts as the first CH based on the received answer message that contains the location and ID of the closer nodes. To satisfy the condition d 1hop <= d opt, the nodes whose locations approach the boundary between the top layer and the second layer must be selected as the first CHs by BS. The node receives a message from the Base Station which tells to which cluster the node belongs. Protocol operation is shown in figure 2.6. After the clusters and their CHs are selected, the first set-up is completed. The CHs broadcast, respectively, the message that contains their flags and location of their members and other nodes located in the lower layer clusters. There are two functions, one of which informs their members, and the other which is the same as the Base Station. In the same way, all clusters and their first CHs can be constructed through backward mechanism from Base Station to the last cluster. Figure 2.7 shows the complete picture of WSN clustered through EECML algorithm. In the figure it is shown that how the algorithm covers the complete area by performing EECML protocol on different wedges of angle θ. The steady-state operation is broken into rounds, where nodes send their data to the CH during their allocated transmission slot based on the TDMA mechanism. Assuming that all nodes are time synchronized. The duration of each slot in which a node transmits data is constant, so the time of sending data depends on the number of nodes in the cluster, and the slot of the lower layer CH is treated as 25
35 2.3 Clustering Algorithms Figure 2.6: Protocol operation of EECML a general node of the upper layer cluster. Figure 2.8 shows the flow of each CH gathering data from its member and other CHs with the same clustering angle. Since the number of nodes deployed in the upper layer cluster is smaller than that of the lower layer cluster, the time slot of each cluster is different. At the same time, the lower layer CH is treated as a general node of the upper layer cluster, so the time slot of the lower layer cluster must be the sub-time slot of the upper layer cluster. For example, assume one round time is T and the number of layer is L. Thus, the time slot for the cluster with the same clustering angle can be allocated as 0 to T /L, T /L to 2T /L,..., (L 1)T/L to T. Assume that the number of nodes in each cluster with the same clustering angle is n 1, n 2,..., n L1, n L. Then, the minimal time unit of each node can be calculated as T /(L (n 1 + 1)), T /(L (n 2 + 1)),..., T /(L (n L1 + 1)), T /(L n L ), and the time slot for each node can be allocated the same as the cluster. To reduce energy dissipation, the radio of each general node is turned off until its allocated transmission time. 26
36 2.3 Clustering Algorithms Figure 2.7: Complete scenario of sensor network when clustered through EECML 27
37 2.3 Clustering Algorithms Figure 2.8: Flowchart of each Cluster Head gathering data from its member and the lower layer CH located in the same clustering angle 28
38 Chapter 3 Proposed Approach 3.1 Evaluation Parameters There are many metrics which would determine strength of clustering algorithm for WSNs. After the detailed study, it can be inferred that below mentioned six metrics decide the extent of adaptability in the clustering algorithm in case of failure of Base Station. These metrics are selected and are defined as follows: Power Consumption of Sensor Nodes Power Consumption [1] for all systems, process and communication protocols in sensor nodes and sensor networks should be minimum as sensor nodes run on batteries and recharging them is very difficult since large number of nodes are generally not attended after the deployment. The clustering algorithm which minimizes energy expense will in effect increase the lifetime of the sensor nodes and hence of the entire network. Power consumption also depends on the communication cost in the network. Nodes in clustered Wireless Sensor Network [1, 2] communicate via CHs. If the clusters are not properly formed then the communication cost might increase. Therefore, clustering technique should be properly selected Cluster Stability Clustering [3] divides WSN into groups of sensor nodes. Once clusters are formed, node membership changing from one cluster to another cluster generally may not happen, but CH in a cluster may change. In order to balance the load in the cluster. This will indirectly help to reduce the energy expense towards the rekeying process of group key management activity in Wireless Sensor Network. 29
39 3.2 Further Approach Fault tolerance and Re-clustering Fault tolerance [2] is the ability to sustain network functionalities without any interruption due to node failures. Even if a node fails, network should be able to establish new paths for communication between remaining nodes. When a new sensor node gets added in the network, clustering algorithm should be able to adapt the change in the network with minimum energy-consumption and computation. Also Re-clustering should require minimum efforts and reconfigure the clusters in minimum time Cluster Overlapping While forming clusters [3], one node should fall under only one cluster. But there are some clustering algorithms [17, 18, 19] which clusters one sensor node in more than one cluster due to which network overhead increases. Overlapping nodes will increase the communication cost for the network since that overlapped node will try to communicate using multiple CHs. Thus, overlapping should be less in a Wireless Sensor Network Scalability A Wireless Sensor Network [1, 2] should perform its functionality correctly even when the number of nodes or workload in the network increases. Therefore Wireless Sensor Network must be scalable and adaptive to changes in network topology Node Cluster Information When clusters are created, each cluster member must have information about its corresponding CH and each CH must have the information about its member nodes in order to establish and maintain proper secure group key management in the cluster. 3.2 Further Approach From literature, we selected many clustering algorithms in order to achieve our goal. These algorithms were studied against above mentioned parameters and Table 3.1 shows the abstract results which were obtained after the study. It is clear that EECML and HEED are more appropriate choices for a clustering algorithm in order to have adaptability in WSN. Since we have to select the most 30
40 3.2 Further Approach suitable one, and these results only give us abstract informations. So, EECML and HEED are analyzed further by implementing them on TinyOS, their performance is evaluated on various aspects like Power consumption, cluster stability, cluster overlapping, scalability and fault tolerance. performance will be selected as the most suitable algorithm. The algorithm which gives better Table 3.1: Comparative results of various clustering algorithm as per literature survey Metric Power Consumption of Sensor Nodes Cluster Stability Fault tolerance and Reclustering Cluster Overlapping Node Cluster Scalability Information EEMC Low High High Yes High Yes PEACH Very Low Low High Yes Very High Yes LEACH Medium High High No High Yes HEED Very Low Very High Very High No High Yes EECML Very Low Very High Very High No Very High Yes Firstly in both algorithms, clusters are formed, hierarchy among the nodes is created and once the clustering process is completed, BS is made to fail. Then in order to keep the network in running state (as required by critical applications) another BS will take the charge and as discussed earlier whole process of clustering is repeated and new clusters, new hierarchy and new topology will be established. In this whole process a track on power consumption by sensor nodes is kept. Total power consumption of all nodes before failure of BS is recorded for both the algorithms. New BS can be any random node located in any random location. So, we consider different positions of new BS by repeating the process and then average of power consumed by all the nodes after failure of BS in all the cases is 31
41 3.2 Further Approach recorded. For calculating cluster stability, membership of all the nodes for clusters is recorded before and after failure of BS when clustering process is completed. These recorded readings are compared and checked to see how many nodes change their membership. 32
42 Chapter 4 Implementation and Results 4.1 Implementation in TinyOS From table 3.1, it is clear that amongst all clustering algorithms surveyed, HEED and EECML are the more appropriate choices for an energy-efficient clustering algorithm which makes wireless sensor network adaptable upon failure of Base Station. So, we need to evaluate their performance in detail against all discussed metrics. There is no cluster overlapping in both the algorithms and in both algorithms Cluster Head contains information of its cluster members and cluster members have information about its CH. So we need to evaluate the performance of HEED and EECML for Cluster Stability, Power Consumption of sensor nodes, fault tolerance and scalability. These algorithms are implemented in TinyOS, an open-source development environment and a platform to build WSN applications in easiest way. These algorithms once implemented are simulated on TOSSIM,a discrete event simulator provided by TinyOS Challenges in Implemetation The primary challenge is scarcity of energy that in effect drives protocol design. In order to deal with this challenge proper management of topology is required so that most of the sensor nodes remain in operating state as long as possible. Sensor nodes are deployed randomly in the field and can be distributed arbitrarily on the ground, so some nodes may on paths which is accessed most of the times to communicate to the Base Station, this results in radially depletion of their energy while other node s energy can be left unmonitored. This effect is significantly reduced in HEED as clustering is done periodically on 33
43 4.1 Implementation in TinyOS the basis of residual energy i.e. nodes with higher remaining energy are elected to perform more loaded task of CHs and nodes with lower remaining energy perform task of sensing. While in EECML this effect is taken care by keeping size of clusters closer to BS smaller as compared to clusters away from BS. Different sizes gives us an assurance that the closer CHs have enough energy to transmit the data it receives from the CHs farther from BS. Also as current CH is kept fixed in a cluster, frequency of updating cluster-head is reduced and thus minimizes energy consumption. Clustering enables nodes to communicate with smaller power ranges at intra-cluster level for more energy savings. Another challenge is the estimation of remaining energy of battery after some operation. It can be done by inspecting analog-to-digital converter(adc) for battery voltage. Since ADC results have coarse granularity, this approach may not be useful. So we use a simplistic approach called credit-point system (CREP) where all sources of energy consumption are considered. We are not using an accurate CREP system instead only a rough estimate of remaining energy is computed for all sensor nodes using an integrated method independent of hardware Estimation of Energy Dissipation We simulate the algorithms considering that they are running on Mica2 mote. So all the values required in the implementation are taken as per Mica2 mote values and most of the information is taken from [24, 25]. Assuming battery of sensor node has V b average voltage and A b Amp-hr capacity. The maximum residual energy of each node, E max is computed as follows: E max = V b A b Joule (4.1) If I is the current drawn while receiving or transmitting a packet and t b be the bit transmission time then the energy consumed in transmitting/receiving one packet of size k is defined as: E = V b I t b k 8 (4.2) In a sensor network, energy dissipation of a sensor node is mainly due to following reasons: Processing Send/Receive Each sensor node is initialized with maximum value of 0.5J and it is shown in [24] 34
44 4.1 Implementation in TinyOS that the it is better to express least energy in micro joules. Since we are using credit point systems, for each sensor node maximum remaining power with which each sensor node is initialized in simulation, MAX REM POWER= points and for declaring a node is dead i.e. minimum remaining power of node, MIN REM POWER=300. As given in [24], following parameters values are used: E amp = nj/m 2 (for EECML) E cpu = 7 nj/bit (for EECML) E elec = 50 nj/bit (for EECML) C prob =0.03 (for HEED) clustering operational interval length (t c ) = 11 seconds routing update frequency = 6/min route recalculation frequency = 2/min INTRA CLUSTER POWER = -20dBm (PA POW register=0x02) INTER CLUSTER POWER = -13dBm (PA POW register=0x06) Data rate = 0.5 packets/sec Size of packet = 29 bytes bit transmission time,t b = 62.4ms Effective average voltage, V b = 3V (mica2 mote uses two AA batteries) Algorithms are experimented on the network using our credit point system. We use the values of drawn current from [25]. For PA POW=0x02, the drawn current =5.3mA and for PA POW=0x06, the drawn current = 6.7mA. The intra-cluster and inter-cluster energy consumption E intra and E inter are defined as: E intra = = 230 microj. (4.3) E inter = = 291 microj. (4.4) 35
45 4.2 Results 4.2 Results Experiments are conducted with 10,25,50 and 75 number of sensor nodes with the above taken parameters. Both EECML and HEED algorithms are evaluated against the selected metrics in chapter 3 in each of the experiments and their results are obtained as follows: Power Consumption of sensor nodes Table 4.1 shows the power consumed by all the sensor nodes to form a clustering hierarchy in the network for both HEED and EECML algorithms. These are the values obtained in both algorithms as soon as clusters are established in the network. Graph in figure 4.1 gives us the comparative results for both the algorithms. After this state, the current Base Station is made to fail by stopping it, and another takes the charge. As soon as this happens clustering protocol (HEED or EECML) starts forming their clusters again with respect to new location of BS. New BS can come at any random location, so we have taken three different positions by simulating the algorithm three times and then total power consumption of network is calculated. Table 4.2 shows the average of power consumed by wireless sensor networks for both HEED and EECML algorithms in all three different positions of new BS. Graph in figure 4.2 shows comparative power consumption of all sensor nodes in WSN. It is clear from graphs 4.1 and 4.2that power consumption in HEED is much more than that of EECML Cluster stability Cluster stability is the extent to which change in membership of a node from one cluster to another cluster doesn t happen when one BS fails and another takes the charge. We evaluate this metric by recording the clusters and its members after formation of clusters in both the cases i.e. before and after the failure of BS (considering three different positions of new BS). Table 4.3 shows the average(of all three case) number of nodes who don t change their cluster membership i.e. they doesn t move from one cluster to another cluster. Graph in figure 4.3 shows the cluster stability (in percentage) of both algorithms in a comparative way which tells that clusters formed for large number of nodes are more stable in EECML as compared to HEED. 36
46 4.2 Results Table 4.1: Results for total energy consumed by Sensor Nodes after formation of clusters but before failure of Base Station Total energy consumed by Sensor Nodes (in micro joules) Before Base Station Failure No.of nodes EECML HEED Figure 4.1: Power Consumption of all sensor nodes in HEED and EECML after formation of clusters but before failure of Base Station 37
47 4.2 Results Table 4.2: Results for total energy consumed by Sensor Nodes after failure of Base Station Total energy consumed by Sensor Nodes (in micro joules) After Base Station Failure (Average Consumption) No.of nodes EECML HEED Figure 4.2: Power Consumption of all sensor nodes in HEED and EECML after failure of Base Station (average of different positions of new BS) 38
48 4.2 Results Table 4.3: Results for Cluster Stability Cluster Stability Average No. of Nodes not changing their membership Stability (%) No.of nodes HEED EECML Figure 4.3: Stability of clusters in HEED and EECML Scalability Scalability signifies that the network should perform correctly even if number of nodes get increased. We have conducted experiments considering 10,25,75 and 39
49 4.2 Results 100 number of nodes. In all these cases we were able to get results, this accounts accounts that HEED and EECML algorithms for WSN are scalable Fault Tolerance Fault tolerance is the ability of Wireless Sensor Network to sustain any interruption due to node failures i.e. network should be able to establish new paths even if a node fails for communication among rest of the nodes. Also Re-clustering should require minimum efforts and reconfigure the clusters in minimum time. We are dealing with failure of BS in both HEED and EECML algorithms, and in both the cases after failure, network runs in normal way by coming up with new BS and re-clustering the entire network. Similarly, if an ordinary node fails, re-clustering is performed in the same way Cluster Overlapping Since in both HEED and EECML algorithms, a CH is assigned to a node only once in the process of clustering, their is no chance that any node would fall inside two clusters i.e. a node at a time can belong to only one cluster Node Cluster Information In both HEED and EECML algorithm, CHs have information of their cluster members and cluster members have information of their CH Power Consumption of Cluster Head It is clear from these results that power consumed by all sensor nodes in HEED protocol is much more than that of EECML protocol. This difference may be because in HEED protocol CH role is rotated periodically, due to the frequent updates inside the cluster. While in EECML algorithm, CH is fixed so no energy is required in updating cluster. Due to this intra cluster power consumption will be more in HEED as compared to EECML. Therefore, an experiment is done which records the residual power of CH in EECML algorithm and average residual power of different CHs of same cluster in HEED algorithm, at different time in the network. Table 4.4 shows experiment results for 25 number of nodes and Table 4.5 shows the result for 50 nodes. Graphs in figure 4.4 and 4.5 show comparative variations in CH power consumption with time(in sec) for 25 and 50 nodes respectively. 40
50 4.2 Results Table 4.4: Results showing residual energy of Cluster Head(s) in a cluster Residual energy of Cluster Head(s) in a cluster (in micro joules) No. of Nodes 25 Time (in sec) EECML HEED ( No. of CH=4 ) Figure 4.4: Residual energy of Cluster Head(s) in a cluster(no. of nodes=25) 41
51 4.2 Results Table 4.5: Residual energy of Cluster Head(s) in a cluster Residual energy of Cluster Head(s) in a cluster (in micro joules) No. of Nodes 50 Time(in sec) EECML HEED ( No. of CH=6 ) Figure 4.5: Residual energy of Cluster Head(s) in a cluster(no. of nodes=50) 42
52 Chapter 5 Conclusion and Future Work 5.1 Conclusion A survey on different clustering algorithms has been done for selecting the best one in order for the Wireless Sensor Network to become adaptable. The main purpose is, whenever a Base Station fails, and a new Base Station takes the charge, re-clustering has to be done, but new clusters formed should not be completely different so that later when security algorithm acts on the updated cluster, the overhead reduces to minimum. Therefore, after the detailed study, it can be inferred that mentioned six metrics decide the extent of adaptability in the clustering algorithm. Specially, it has been observed that the more the cluster stability and less the cluster overlapping, the more will be the network reliability. Also power consumption has become a significant factor for improving network lifetime. Even though energy depletion of CH in EECML is faster as compared to that in HEED, the total power consumption of sensor network in EECML is much less as compared to HEED. Therefore, considering the overall network, the above factors and results obtained, it can be concluded that EECML is the appropriate choice of clustering algorithms to achieve high adaptability in Wireless Sensor Network upon failure of BS. 5.2 Future Work From this thesis it has been concluded that EECML is the most appropriate clustering algorithm for a WSN to have adaptability in WSN upon failure of Base Station. Power consumption of sensor nodes in EECML algorithm can further be improved as in EECML when member wants to send packet to the Base Station 43
53 5.2 Future Work it first send to its CH which is in reverse direction of BS, so there is reverse forwarding of packet in clusters in order to send to the Base Station. Therefore, while selecting the clusters head in EECML, instead of selecting the node closer to the boundary of the cluster and next cluster, select the one which closer to the boundary of the same cluster and previous cluster. So that cluster members need not have to spend their energy in reverse forwarding of packets, but sending in the direction of BS. In this way total energy consumption of member nodes will be reduced. Since EECML algorithm is required by critical applications those who cannot afford BS failure and requires a secure communication among sensor nodes which can be provided by group key mechanism. So, this EECML algorithm should be implemented with a group key establishment algorithm [33, 34] and then the performance of the algorithm should be analyzed in various events like adding of a node inside network, removal of a node from the network. That is how group key in a group of a network changes whenever any node joins the group of sensor node, or any node leaves the group or when the BS fails in the network. 44
54 Chapter 6 Publications Our paper has been accepted: Tushar Maheshwari, Dr. Jibi Abraham, Selection of Efficiently Adaptable Clustering Algorithm upon Base Station Failure in Wireless Sensor Network: A survey, International Conference on Computing, Communication and Information Technology(ICCCIT),
55 Bibliography [1] G. J. Pottie and W. J. Kaiser, Wireless Integrated Network Sensors, Communications of the ACM, volume 43, number 5, pages 51-58, May, [2] I. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A Survey on Sensor Networks, IEEE Communications Magazine, pages , [3] V. Kawadia and P. R. Kumar, Power Control and Clustering in Ad Hoc Networks, Proceedings of IEEE INFOCOM, April [4] Xiang Min, Shi Wei-Ren, Jiang Chang-Jiang, Zhang Ying, Energy Efficient Clustering Algorithm for Maximizing Lifetime of Wireless Sensor Networks, International Journal of Electronics and communications (AE) 64 pages , [5] Ossama Younis, Sonia Fahmy, HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks, IEEE Transactions on Mobile Computing, volume 3, issue 4, pages , Oct-Dec [6] Sangho Yi, Junyoung Heo, Jiman Hong, PEACH: Power-efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks, Science Direct, Computer communications 30, pages , [7] Yan Jin, Ling Wang, Yoohwan Kim, Xiaozong Yang, EEMC: An Energy- Efficient Multi-level Clustering Algorithm for Large-Scale Wireless Sensor Networks, Science Direct, Computer Networks 52, pages , [8] W.R. Heinzelman, A.P. Chandrakasan, H. Balakrishnan, Energy efficient communication protocol for wireless microsensor networks, Hawaii International Conference System Sciences (HICSS),2000. [9] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, Next Century Challenges: Scalable Coordination in Sensor Networks, Proceedings of the 46
56 BIBLIOGRAPHY ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), August [10] S. Banerjee and S. Khuller, A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks, Proceedings of IEEE INFOCOM, April [11] Mohamed Eltoweissy, Ashraf Wadaa, Stephan Olariu, Larry Wilson, Group Key Management Scheme for Large-scale Sensor Networks, Ad Hoc Networks 3, ELSEVIER, pages , [12] R. Shah, J. Rabaey, Energy Aware Routing for Low Energy Ad hoc Sensor Networks, Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), [13] Y. Yu, R. Govindan, D. Estrin, Geographical and Energy Aware Routing: a Recursive Data Dissemination Protocol for Wireless Sensor networks, May [14] J. Chang, L. Tassiulas, Energy conserving routing in wireless ad-hoc networks, IEEE Infocom, pages 2231, [15] J. Chang, L. Tassiulas, Maximum Lifetime Routing in Wireless Sensor Networks, IEEE/ACM Transactions on Networking 12 (4), pages , [16] G. Park, S. Yi, J. Heo, W.C. Choi, G. Jeon, Y. Cho, C. Shim, Energy Aware Routing with Dynamic Probability Scaling, Lecture Notes in Computer Science (RSFDGrC) 3642, pages , [17] R. Nagpal, D. Coore, An algorithm for group formation in an amorphous computer, Proceedings of the 10th International Conference on Parallel and Distributed Systems (PDCS98), Las Vegas, NV, October [18] H. Zhang, A. Arora, GS3: Scalable Self-Configuration and Self-Healing in Wireless Networks, Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC 2002), Monterey,CA, July [19] A. Youssef, M. Younis, M. Youssef, A. Agrawala, Distributed Formation of Overlapping Multi-hop Clusters in Wireless Sensor Networks, Proceedings of the 49th Annual IEEE Global Communication Conference (Globecom06), San Francisco, CA, November
57 BIBLIOGRAPHY [20] S. Bandyopadhyay, E.J. Coyle, Minimizing communication costs in hierarhically-clustered networks of wireless sensors, Computer Networks 44 (1), pages 1-16,2004. [21] S. Lindsey, C. Raghvendra, K.M. Sivalingam, Data gathering algorithms in sensor networks using energy metrics, IEEE transactions on Parallel and Distributed Systems 13, pages ,2002. [22] W.R. Heinzelman, An Application-Specific Protocol Architecture for Wireless microsensor Networks, Ph.D. thesis, Massachusetts Institute of Technology. [23] C.Li, M.Ye, G.Chen, J.Wu, An energy-efficient unequal clustering mechanism for wireless sensor networks, 2nd IEEE International conference on Mobile Adhoc and Sensor Systems(MASS 05), [24] O.Younis, Sonia Fahmy, Energy-efficient Routing and Data aggregation in sensor networks : An Experimental Study, Department of Computer Sciences,Purdue University, West Lafayette, 47907, [25] V. Shnayder, M.Hempstead, C.G.Werner, M. Welsh, Simulating the Power Consumption of Large Scale Sensor Network Applications, ACM conference on Embedded Networked Sensor Systems (ACM SenSys), [26] Guo B, Li Z, United voting dynamic cluster routing algorithm based on residual-energy in wireless sensor networks, Journal of Electronics & Information Technology 29(12), pages ,2007. [27] Yuan H-y, Yang S-q, Li X-l et al, Time-controlled routing algorithm for sensor networks, Journal of System Simulation 20(5), pages , [28] Li C-f, Cheng G-h, Ye M. et al, An uneven cluster-based routing protocol for wireless sensor networks, Chinese Journal of Computers 30(8), pages 2730, [29] J.Hill, R. Szewczyk, A.Woo, S.Hollar, D.E. Culler, K.S.J. Pister, System Architecture Directions for Networked Sensors Architectural Support for Programming Languages and Operating Systems, pages , [30] TinyOS [31] Alippi, C.Vanini, G., Wireless sensor networks and radio localizations: a meteriological analysis of MICA2 received signal strength indicator Local Computer Networks, Italy, pages ,
58 BIBLIOGRAPHY [32] MICA2, note-0 [33] Ioannis Chatzigiannakisi, Elisavet Konstantinou, Vasiliki Liagkou, Paul Spirakis, Design Analysis And Performance Evaluation of Group Key Establishment in Wireless Sensor Networks, Electronic Notes in Theoretical Computer Science 171, pages 1731, [34] Mohamed Eltoweissy, Ashraf Wadaa, Stephan Olariu, Larry Wilson, Group key management scheme for large-scale sensor Networks, Ad Hoc Networks 3, ELSEVIER, pages ,
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks
Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Sangeeta Rao Department of Computer Science Central University of Haryana Mahendergarh, Haryana, India
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
Data Management in Sensor Networks
Data Management in Sensor Networks Ellen Munthe-Kaas Jarle Søberg Hans Vatne Hansen INF5100 Autumn 2011 1 Outline Sensor networks Characteristics TinyOS TinyDB Motes Application domains Data management
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Thingsquare Technology
Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS
A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS C.Priya, M.Phil Scholar, Department Of Computer Science, Dr. R.A.N.M. Arts & Science College, Erode, Tamilnadu, India. M.Suriya,
Local Load Balancing for Globally Efficient Routing in Wireless Sensor Networks
International Journal of Distributed Sensor Networks, 1: 163 185, 2005 Copyright Taylor & Francis Inc. ISSN: 1550-1329 print/1550-1477 online DOI: 10.1080/15501320590966431 Local Load Balancing for Globally
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Monitoring Software using Sun Spots. Corey Andalora February 19, 2008
Monitoring Software using Sun Spots Corey Andalora February 19, 2008 Abstract Sun has developed small devices named Spots designed to provide developers familiar with the Java programming language a platform
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India
Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur
XBee Wireless Sensor Networks for Temperature Monitoring
XBee Wireless Sensor Networks for Temperature Monitoring Vongsagon Boonsawat, Jurarat Ekchamanonta, Kulwadee Bumrungkhet, and Somsak Kittipiyakul School of Information, Computer, and Communication Technology
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University
Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 26 Real - Time POSIX. (Contd.) Ok Good morning, so let us get
Technology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I [email protected] I www.edx.com Mark Chapman and Greg Leon EDX Wireless
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
Surveillance System Using Wireless Sensor Networks
Surveillance System Using Wireless Sensor Networks Dan Nguyen, Leo Chang Computer Engineering, Santa Clara University Santa Clara, California, USA [email protected] [email protected] Abstract The
Towards Lightweight Logging and Replay of Embedded, Distributed Systems
Towards Lightweight Logging and Replay of Embedded, Distributed Systems (Invited Paper) Salvatore Tomaselli and Olaf Landsiedel Computer Science and Engineering Chalmers University of Technology, Sweden
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu [email protected] Jen-Hou Liu [email protected] Min-Sheng
The Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul [email protected] Overview Brief introduction to Body Sensor Networks BSN Hardware
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
EDK 350 (868 MHz) EDK 350U (902 MHz) EnOcean Developer Kit
EDK 350 (868 MHz) EDK 350U (902 MHz) EnOcean Developer Kit EDK 350 User Manual Important Notes This information describes the type of component and shall not be considered as assured characteristics. No
Effective Communication in Schools of Submersibles
Oceans 06, Singapore (authors manuscript do not distribute) Effective Communication in Schools of Submersibles Felix Schill & Uwe R. Zimmer Research School of Information Sciences and Engineering Autonomous
NOQ_NQ-9121 Z-Wave Data Logger for Gas Meters Firmware Version : 2.55
NOQ_NQ-9121 Z-Wave Data Logger for Gas Meters Firmware Version : 2.55 Quick Start S This device is a Z-Wave Sensor. Inclusion and Exclusion are confirmed by triple clicking the Z-Wave button on the device.
ZME_RC2 Z-Wave Remote Control
ZME_RC2 Z-Wave Remote Control Firmware Version : 1.1 Quick Start S This device is a Z-Wave Remote Control with the logical function of a sensor. Push the "Include" button behind the slider on the back
Hybrid Data Gathering Scheme in Wireless Sensor Networks
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 19 No. 2 (2011), pp. 73-88 Hybrid Data Gathering Scheme in Wireless Sensor Networks Swarup Kumar Mitra 1, Ayon Chakraborty 2, Mrinal Kanti Naskar 2 1 MCKV Institute
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
Online Communication of Critical Parameters in Powerplant Using ZIGBEE
International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Online Communication of Critical Parameters in Powerplant Using ZIGBEE D.Santhiya 1, R.Renita Priyatharshini 2,K.C.Dhivya
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
Wireless Sensor Network: Improving the Network Energy Consumption
Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that
Wireless Sensor Networks Database: Data Management and Implementation
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Wireless Sensor Networks Database: Data Management and Implementation Ping Liu Computer and Information Engineering Institute,
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions. Outline. Performance oriented design
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions Slide 1 Outline Principles for performance oriented design Performance testing Performance tuning General
High-Frequency Distributed Sensing for Structure Monitoring
High-Frequency Distributed Sensing for Structure Monitoring K. Mechitov, W. Kim, G. Agha and T. Nagayama* Department of Computer Science, University of Illinois at Urbana-Champaign 201 N. Goodwin Ave.,
Data Aggregation and Gathering Transmission in Wireless Sensor Networks: A Survey
Data Aggregation and Gathering Transmission in Wireless Sensor Networks: A Survey PHANI PRIYA KAKANI THESIS WORK2011-2013 SUBJECT Master of Electrical Engineering: Specialization inembedded Systems Postadress:
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any
Node Degree based Clustering for WSN
Node Degree based Clustering for WSN Sanjeev Kumar Gupta Dept. of Electronics & Comm. SCOPE College of Engineering,NH-12, Hoshangabad Road, Bhopal (INDIA) Neeraj Jain Dept. of Computer Science SCOPE College
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
Wireless Sensor Networks Chapter 3: Network architecture
Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general
Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks
Department of Electrical Engineering, Mathematics and Computer Science Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks Master Thesis Thijs Mutter 439 Supervisors
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products.
M2M I/O Modules 14 M2M I/O Modules Overview 14-2 M2M I/O Modules Selection Guide 14-6 ADAM-2510Z Wireless Router Node 14-8 ADAM-2520Z Wireless Modbus RTU Gateway 14-9 ADAM-2031Z ADAM-2632Z ADAM-2017Z ADAM-2018Z
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
MOTEWORKS. Key Features. Overview
MOTEWORKS SOFTWARE PLATFORM MoteWorks 2.0 provides a complete software development environment for wireless sensor network applications. Included is a collection of flexible software packages that enables
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
Level 2 Routing: LAN Bridges and Switches
Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense
Energy Constrained Resource Scheduling for Cloud Environment
Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering
- An Essential Building Block for Stable and Reliable Compute Clusters
Ferdinand Geier ParTec Cluster Competence Center GmbH, V. 1.4, March 2005 Cluster Middleware - An Essential Building Block for Stable and Reliable Compute Clusters Contents: Compute Clusters a Real Alternative
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
Chapter 13 Embedded Operating Systems
Operating Systems: Internals and Design Principles Chapter 13 Embedded Operating Systems Eighth Edition By William Stallings Embedded System Refers to the use of electronics and software within a product
Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network
24 Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network Zulhani Rasin Faculty of Electrical Engineering Universiti Teknikal Malaysia Melaka (UTeM) Melaka, Malaysia Email: [email protected]
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
Wireless Sensor Network Performance Monitoring
Wireless Sensor Network Performance Monitoring Yaqoob J. Al-raisi & David J. Parish High Speed Networks Group Loughborough University MSN Coseners 12-13th 13th July 2007 Overview The problem we are trying
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Research Article CAPNet: An Enhanced Load Balancing Clustering Algorithm for Prolonging Network Lifetime in WSNs
International Distributed Sensor Networks, Article ID 234394, 8 pages http://dx.doi.org/1.1155/214/234394 Research Article CAPNet: An Enhanced Load Balancing Clustering Algorithm for Prolonging Network
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks
J Inf Process Syst, Vol.10, No.2, pp.300~313, June 2014 http://dx.doi.org/10.3745/jips.03.0006 pissn 1976-913X eissn 2092-805X Power Consumption Analysis of Prominent Time Synchronization Protocols for
INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware
1 INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware Dr Antoine Bagula ISAT Laboratory, University of Cape Town, South Africa Goal of the lecture 2 The lecture intends
Maximizing Range and Battery Life in Low-Cost Wireless Networks
Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
